首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
5G slicing under the hood: An in-depth analysis of 5G RAN features and configurations 5G切片:5G RAN特性和配置的深入分析
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-13 DOI: 10.1016/j.jnca.2025.104298
André Perdigão, José Quevedo, Rui L. Aguiar
There has been extensive discussion on the benefits and improvements that 5G networks can bring to industry operations, particularly with network slicing. However, to fully realize network slices, it is essential to thoroughly understand the mechanisms available within a 5G network that can be used to adapt network performance. This paper surveys and describes existing 5G network configurations and assesses the performance impact of several configurations using a real-world commercial standalone (SA) 5G network, bringing the challenges between purely theoretical mathematical models into realizations with existing equipment. The paper discusses how these features impact communication performance according to industrial requirements.
The survey describes and demonstrates the performance impact of various 5G configurations, enabling readers to understand the capabilities of current 5G networks and learn how to leverage 5G technology to enhance industrial operations. This knowledge is also crucial to fully realize network slices tailored to industrial requirements.
关于5G网络可以给行业运营带来的好处和改进,特别是网络切片,人们进行了广泛的讨论。然而,要完全实现网络切片,必须彻底了解5G网络中可用的机制,这些机制可用于调整网络性能。本文调查和描述了现有的5G网络配置,并使用实际商用独立(SA) 5G网络评估了几种配置对性能的影响,将纯理论数学模型之间的挑战转化为现有设备的实现。本文根据工业需求,讨论了这些特性对通信性能的影响。
{"title":"5G slicing under the hood: An in-depth analysis of 5G RAN features and configurations","authors":"André Perdigão,&nbsp;José Quevedo,&nbsp;Rui L. Aguiar","doi":"10.1016/j.jnca.2025.104298","DOIUrl":"10.1016/j.jnca.2025.104298","url":null,"abstract":"<div><div>There has been extensive discussion on the benefits and improvements that 5G networks can bring to industry operations, particularly with network slicing. However, to fully realize network slices, it is essential to thoroughly understand the mechanisms available within a 5G network that can be used to adapt network performance. This paper surveys and describes existing 5G network configurations and assesses the performance impact of several configurations using a real-world commercial standalone (SA) 5G network, bringing the challenges between purely theoretical mathematical models into realizations with existing equipment. The paper discusses how these features impact communication performance according to industrial requirements.</div><div>The survey describes and demonstrates the performance impact of various 5G configurations, enabling readers to understand the capabilities of current 5G networks and learn how to leverage 5G technology to enhance industrial operations. This knowledge is also crucial to fully realize network slices tailored to industrial requirements.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104298"},"PeriodicalIF":8.0,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145059766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning based mobile charging sequence scheduling algorithm for optimal stochastic event detection in wireless rechargeable sensor networks 基于强化学习的无线可充电传感器网络随机事件最优检测移动充电序列调度算法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-13 DOI: 10.1016/j.jnca.2025.104301
Jinglin Li , Haoran Wang , Sen Zhang , Peng-Yong Kong , Wendong Xiao
Mobile charging provides a new way for energy replenishment in Wireless Rechargeable Sensor Network (WRSN), where the Mobile Charger (MC) is employed for charging sensor nodes sequentially according to the mobile charging sequence scheduling result. Event detection is an essential application of WRSN, but when the events occur stochastically, Mobile Charging Sequence Scheduling for Optimal Stochastic Event Detection (MCSS-OSED) is difficult and challenging, and the non-deterministic detection property of the sensor makes MCSS-OSED complicated further. This paper proposes a novel Multistage Exploration Q-learning Algorithm (MEQA) for MCSS-OSED based on reinforcement learning. In MEQA, MC is taken as the agent to explore the space of the mobile charging sequences via the interactions with the environment for the optimal Quality of Event Detection (QED) evaluated by both considering the sensing probability of the sensor and the probability that events may occur in the monitoring region. Particularly, a new multistage exploration policy is designed for MC to improve the exploration efficiency by selecting the current suboptimal actions with a certain probability, and a novel reward function is presented to evaluate the MC charging action according to the real-time detection contribution of the sensor. Simulation results show that MEQA is efficient for MCSS-OSED and superior to the existing classical algorithms.
移动充电为无线可充电传感器网络(WRSN)提供了一种新的能量补充方式,移动充电器(MC)根据移动充电顺序调度结果对传感器节点进行顺序充电。事件检测是WRSN的重要应用,但当事件随机发生时,针对最优随机事件检测的移动充电序列调度(MCSS-OSED)是一个难点和挑战,而传感器的不确定性检测特性使MCSS-OSED更加复杂。提出了一种基于强化学习的MCSS-OSED多阶段探索q学习算法。在MEQA中,MC作为智能体,通过与环境的相互作用来探索移动充电序列的空间,通过考虑传感器的感知概率和监测区域可能发生事件的概率来评估最优事件检测质量(QED)。设计了一种新的多阶段探索策略,通过选择具有一定概率的当前次优行为来提高MC的探索效率,并提出了一种新的奖励函数,根据传感器的实时检测贡献来评估MC的收费行为。仿真结果表明,MEQA算法在MCSS-OSED中是有效的,优于现有的经典算法。
{"title":"Reinforcement learning based mobile charging sequence scheduling algorithm for optimal stochastic event detection in wireless rechargeable sensor networks","authors":"Jinglin Li ,&nbsp;Haoran Wang ,&nbsp;Sen Zhang ,&nbsp;Peng-Yong Kong ,&nbsp;Wendong Xiao","doi":"10.1016/j.jnca.2025.104301","DOIUrl":"10.1016/j.jnca.2025.104301","url":null,"abstract":"<div><div>Mobile charging provides a new way for energy replenishment in Wireless Rechargeable Sensor Network (WRSN), where the Mobile Charger (MC) is employed for charging sensor nodes sequentially according to the mobile charging sequence scheduling result. Event detection is an essential application of WRSN, but when the events occur stochastically, Mobile Charging Sequence Scheduling for Optimal Stochastic Event Detection (MCSS-OSED) is difficult and challenging, and the non-deterministic detection property of the sensor makes MCSS-OSED complicated further. This paper proposes a novel Multistage Exploration Q-learning Algorithm (MEQA) for MCSS-OSED based on reinforcement learning. In MEQA, MC is taken as the agent to explore the space of the mobile charging sequences via the interactions with the environment for the optimal Quality of Event Detection (QED) evaluated by both considering the sensing probability of the sensor and the probability that events may occur in the monitoring region. Particularly, a new multistage exploration policy is designed for MC to improve the exploration efficiency by selecting the current suboptimal actions with a certain probability, and a novel reward function is presented to evaluate the MC charging action according to the real-time detection contribution of the sensor. Simulation results show that MEQA is efficient for MCSS-OSED and superior to the existing classical algorithms.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104301"},"PeriodicalIF":8.0,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145120317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RoamML distributed continual learning: Adaptive and flexible data-driven response for disaster recovery operations RoamML分布式持续学习:用于灾难恢复操作的自适应和灵活的数据驱动响应
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-09 DOI: 10.1016/j.jnca.2025.104322
Simon Dahdal , Sara Cavicchi , Alessandro Gilli , Filippo Poltronieri , Mauro Tortonesi , Niranjan Suri , Cesare Stefanelli
In the aftermath of natural disasters, Human Assistance & Disaster Recovery (HADR) operations have to deal with disrupted communication networks and constrained resources. Such harsh conditions make high-communication-overhead ML approaches — either centralized or distributed — impractical, thus hindering the adoption of AI solutions to implement a critical function for HADR operations: building accurate and up-to-date situational awareness. To address this issue we developed Roaming Machine Learning (RoamML), a novel Distributed Continual Learning Framework designed for HADR operations and based on the premise that moving an ML model is more efficient and robust than either large dataset transfers or frequent model parameter updates. RoamML deploys a mobile AI agent that incrementally train models across network nodes containing yet unprocessed data; at each stop, the agent initiate a local training phase to update its internal ML model parameters. To prioritize the processing of strategically valuable data, RoamML Agents follow a navigation system based upon the concept of Data Gravity, leveraging Multi-Criteria Decision Making techniques to simultaneously consider many objectives for Agent routing optimization, including model learning efficiency and network resource utilization, while seamlessly blending subjective insights from expert judgments with objective metrics derived from quantifiable data to determine each next hop. We conducted extensive experiments to evaluate RoamML, demonstrating the framework’s efficiency to train ML models under highly dynamic, resource-constrained environments. RoamML achieves similar performance to centralized ML training under ideal network conditions and outperforms it in a more realistic scenario with reduced network resources, ultimately saving up to 75% in bandwidth utilization across all experiments.
在自然灾害之后,人类援助和灾难恢复(HADR)行动必须处理中断的通信网络和有限的资源。这种恶劣的条件使得高通信开销的机器学习方法(无论是集中式还是分布式)不切实际,从而阻碍了采用人工智能解决方案来实现HADR操作的关键功能:建立准确和最新的态势感知。为了解决这个问题,我们开发了漫游机器学习(RoamML),这是一种为HADR操作设计的新型分布式持续学习框架,其前提是移动ML模型比大型数据集传输或频繁的模型参数更新更有效和健壮。RoamML部署了一个移动AI代理,它可以跨包含未处理数据的网络节点增量训练模型;在每一站,智能体启动一个局部训练阶段来更新其内部ML模型参数。为了优先处理有战略价值的数据,RoamML代理遵循基于数据重力概念的导航系统,利用多标准决策技术同时考虑代理路由优化的许多目标,包括模型学习效率和网络资源利用,同时无缝地将来自专家判断的主观见解与来自可量化数据的客观指标相结合,以确定每个下一跳。我们进行了大量的实验来评估RoamML,证明了该框架在高度动态、资源受限的环境下训练ML模型的效率。RoamML在理想的网络条件下实现了与集中式机器学习训练相似的性能,并在更现实的场景中使用更少的网络资源,最终在所有实验中节省高达75%的带宽利用率。
{"title":"RoamML distributed continual learning: Adaptive and flexible data-driven response for disaster recovery operations","authors":"Simon Dahdal ,&nbsp;Sara Cavicchi ,&nbsp;Alessandro Gilli ,&nbsp;Filippo Poltronieri ,&nbsp;Mauro Tortonesi ,&nbsp;Niranjan Suri ,&nbsp;Cesare Stefanelli","doi":"10.1016/j.jnca.2025.104322","DOIUrl":"10.1016/j.jnca.2025.104322","url":null,"abstract":"<div><div>In the aftermath of natural disasters, Human Assistance &amp; Disaster Recovery (HADR) operations have to deal with disrupted communication networks and constrained resources. Such harsh conditions make high-communication-overhead ML approaches — either centralized or distributed — impractical, thus hindering the adoption of AI solutions to implement a critical function for HADR operations: building accurate and up-to-date situational awareness. To address this issue we developed Roaming Machine Learning (RoamML), a novel Distributed Continual Learning Framework designed for HADR operations and based on the premise that moving an ML model is more efficient and robust than either large dataset transfers or frequent model parameter updates. RoamML deploys a mobile AI agent that incrementally train models across network nodes containing yet unprocessed data; at each stop, the agent initiate a local training phase to update its internal ML model parameters. To prioritize the processing of strategically valuable data, RoamML Agents follow a navigation system based upon the concept of Data Gravity, leveraging Multi-Criteria Decision Making techniques to simultaneously consider many objectives for Agent routing optimization, including model learning efficiency and network resource utilization, while seamlessly blending subjective insights from expert judgments with objective metrics derived from quantifiable data to determine each next hop. We conducted extensive experiments to evaluate RoamML, demonstrating the framework’s efficiency to train ML models under highly dynamic, resource-constrained environments. RoamML achieves similar performance to centralized ML training under ideal network conditions and outperforms it in a more realistic scenario with reduced network resources, ultimately saving up to 75% in bandwidth utilization across all experiments.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104322"},"PeriodicalIF":8.0,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum allocation method for millimeter-wave train-ground communication in high-speed rail based on multi-agent attention 基于多智能体关注的高速铁路毫米波车地通信频谱分配方法
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-08 DOI: 10.1016/j.jnca.2025.104293
Yong Chen, Jiaojiao Yuan, Huaju Liu, Zhaofeng Xin
With the advancement of high-speed railways toward intelligent systems, a large number of IoT devices have been deployed in both onboard and trackside systems. The resulting surge in data transmission has intensified competition for spectrum resources, thereby significantly increasing the demand for train-ground communication systems with high capacity, low latency, and strong interference resilience.The millimeter wave (mmWave) frequency band provides a large bandwidth to support massive data transmission from IoT devices. Aiming at addressing the issues of low network capacity, high interference, and low spectral efficiency in mmWave train-ground communication systems under 5G-R for high-speed railways, we propose a multi-agent attention mechanism for mmWave spectrum allocation in train-ground communication. First, we analyzed the spectrum requirements of mmWave BS and onboard MRS, constructed a spectrum resource allocation model with the optimization objective of maximizing system network capacity, and transformed it into a Markov decision process (MDP) model. Next, considering the need for coordinated spectrum allocation and interference suppression between mmWave BS and MRS, we develop a resource optimization strategy using the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm. Specifically, we combine multi head attention mechanism to improve the Critic network of MADDPG algorithm. This enhancement enables coordinated global–local strategy optimization through attention weight computation, thereby improving decision-making efficiency. Simulation results demonstrate that compared to existing methods, our algorithm achieves superior spectrum allocation performance, significantly increases network capacity while reducing interference levels, and meets the spectrum requirements of HSR communication systems.
随着高铁向智能化方向发展,大量物联网设备已部署在列车上和轨旁系统中。数据传输的激增加剧了对频谱资源的竞争,从而大大增加了对高容量、低延迟和强抗干扰能力的列车-地面通信系统的需求。毫米波(mmWave)频段提供大带宽,支持物联网设备的海量数据传输。针对5G-R高速铁路毫米波车地通信系统存在的网络容量小、干扰大、频谱效率低等问题,提出了一种车地通信毫米波频谱分配的多智能体关注机制。首先,分析了毫米波BS和机载MRS的频谱需求,构建了以系统网络容量最大化为优化目标的频谱资源分配模型,并将其转化为马尔可夫决策过程(MDP)模型。其次,考虑到毫米波BS和MRS之间协调频谱分配和干扰抑制的需要,我们开发了一种使用多智能体深度确定性策略梯度(madpg)算法的资源优化策略。具体来说,我们结合多头注意机制来改进madpg算法的Critic网络。这种增强通过计算注意力权重实现全局-局部协同策略优化,从而提高决策效率。仿真结果表明,与现有的频谱分配方法相比,该算法在显著提高网络容量的同时降低了干扰水平,能够满足高铁通信系统的频谱需求。
{"title":"Spectrum allocation method for millimeter-wave train-ground communication in high-speed rail based on multi-agent attention","authors":"Yong Chen,&nbsp;Jiaojiao Yuan,&nbsp;Huaju Liu,&nbsp;Zhaofeng Xin","doi":"10.1016/j.jnca.2025.104293","DOIUrl":"10.1016/j.jnca.2025.104293","url":null,"abstract":"<div><div>With the advancement of high-speed railways toward intelligent systems, a large number of IoT devices have been deployed in both onboard and trackside systems. The resulting surge in data transmission has intensified competition for spectrum resources, thereby significantly increasing the demand for train-ground communication systems with high capacity, low latency, and strong interference resilience.The millimeter wave (mmWave) frequency band provides a large bandwidth to support massive data transmission from IoT devices. Aiming at addressing the issues of low network capacity, high interference, and low spectral efficiency in mmWave train-ground communication systems under 5G-R for high-speed railways, we propose a multi-agent attention mechanism for mmWave spectrum allocation in train-ground communication. First, we analyzed the spectrum requirements of mmWave BS and onboard MRS, constructed a spectrum resource allocation model with the optimization objective of maximizing system network capacity, and transformed it into a Markov decision process (MDP) model. Next, considering the need for coordinated spectrum allocation and interference suppression between mmWave BS and MRS, we develop a resource optimization strategy using the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm. Specifically, we combine multi head attention mechanism to improve the Critic network of MADDPG algorithm. This enhancement enables coordinated global–local strategy optimization through attention weight computation, thereby improving decision-making efficiency. Simulation results demonstrate that compared to existing methods, our algorithm achieves superior spectrum allocation performance, significantly increases network capacity while reducing interference levels, and meets the spectrum requirements of HSR communication systems.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104293"},"PeriodicalIF":8.0,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient optimal relay design for wireless sensor network in underground mines 矿井无线传感器网络节能优化中继设计
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-06 DOI: 10.1016/j.jnca.2025.104303
Md Zahangir Alam , Mohamed Lassaad Ammari , Abbas Jamalipour , Paul Fortier
The transceiver design for multi-hop multiple-input multiple-output (MIMO) relay is very challenging, and for a large scale network, it is not economical to send the signal through all possible links. Instead, we can find the best path from source-to-destination that gives the highest end-to-end signal-to-noise ratio (SNR). In this paper, we provide a linear minimum mean squared error (MMSE) based multi-hop multi-terminal MIMO non-regenerative half-duplex amplify-and-forward (AF) parallel relay design for a wireless sensor network (WSN) in an underground mines. The transceiver design of such a network becomes very complex. We can simplify a complex multi-terminal parallel relay system into a series of links using selection relaying, where transmission from the source to the relay, relay to relay, and finally relay to the destination will take place using the best relay that provides the best link performance among others. The best relay selection using the traditional technique in our case is not easy, and we need a strategy to find the best path from a large number of hidden paths. We first find the set of simplified series multi-hop MIMO best relays from source to destination using the optimum path selection technique found in the literature. Then we develop a joint optimum design of the source precoder, the relay amplifier, and the receiver matrices using the full channel diagonalizing technique followed by the Lagrange strong duality principle with known channel state information (CSI). Finally, simulation results show an excellent agreement with numerical analysis demonstrating the effectiveness of the proposed framework.
多跳多输入多输出(MIMO)中继的收发器设计非常具有挑战性,对于大型网络来说,通过所有可能的链路发送信号是不经济的。相反,我们可以找到从源到目的地的最佳路径,从而获得最高的端到端信噪比(SNR)。本文提出了一种基于线性最小均方误差(MMSE)的多跳多终端MIMO非再生半双工放大转发(AF)并联中继设计方法,用于矿井无线传感器网络。这种网络的收发器设计变得非常复杂。我们可以使用选择中继将复杂的多终端并行中继系统简化为一系列链路,其中从源到中继,中继到中继,最后中继到目的地的传输将使用提供最佳链路性能的最佳中继进行。在这种情况下,使用传统方法进行最佳中继选择并不容易,我们需要一种从大量隐藏路径中找到最佳路径的策略。我们首先利用文献中发现的最优路径选择技术找到从源到目的的简化串联多跳MIMO最佳中继集。然后利用已知信道状态信息(CSI)的拉格朗日强对偶原理,利用全信道对角化技术对信源预编码器、中继放大器和接收机矩阵进行联合优化设计。最后,仿真结果与数值分析结果非常吻合,验证了所提框架的有效性。
{"title":"Energy-efficient optimal relay design for wireless sensor network in underground mines","authors":"Md Zahangir Alam ,&nbsp;Mohamed Lassaad Ammari ,&nbsp;Abbas Jamalipour ,&nbsp;Paul Fortier","doi":"10.1016/j.jnca.2025.104303","DOIUrl":"10.1016/j.jnca.2025.104303","url":null,"abstract":"<div><div>The transceiver design for multi-hop multiple-input multiple-output (MIMO) relay is very challenging, and for a large scale network, it is not economical to send the signal through all possible links. Instead, we can find the best path from source-to-destination that gives the highest end-to-end signal-to-noise ratio (SNR). In this paper, we provide a linear minimum mean squared error (MMSE) based multi-hop multi-terminal MIMO non-regenerative half-duplex amplify-and-forward (AF) parallel relay design for a wireless sensor network (WSN) in an underground mines. The transceiver design of such a network becomes very complex. We can simplify a complex multi-terminal parallel relay system into a series of links using selection relaying, where transmission from the source to the relay, relay to relay, and finally relay to the destination will take place using the best relay that provides the best link performance among others. The best relay selection using the traditional technique in our case is not easy, and we need a strategy to find the best path from a large number of hidden paths. We first find the set of simplified series multi-hop MIMO best relays from source to destination using the optimum path selection technique found in the literature. Then we develop a joint optimum design of the source precoder, the relay amplifier, and the receiver matrices using the full channel diagonalizing technique followed by the Lagrange strong duality principle with known channel state information (CSI). Finally, simulation results show an excellent agreement with numerical analysis demonstrating the effectiveness of the proposed framework.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104303"},"PeriodicalIF":8.0,"publicationDate":"2025-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From cloud to edge: dynamic placement optimization of business processes in IIoT networks 从云端到边缘:工业物联网网络中业务流程的动态布局优化
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-02 DOI: 10.1016/j.jnca.2025.104317
Md Razon Hossain , Alistair Barros , Colin Fidge
Breakthroughs in edge computing offer new prospects for businesses to extend Industrial Internet of Things (IIoT) networks beyond analytics to actionable processing. In particular, cloud-based business processes, which provide administrative actions and rules through workflow-sequenced activities, can be streamlined on the edge for low-latency access in physical spaces. Although this advances business controls, particularly for critical events of industrial applications, it faces operational barriers. Edge devices, which support high volume and competing demands from a large number of sensors, vary in capacity, reliability, and proximity to sensors and cloud gateways. This warrants a highly efficient placement of process activities, from cloud to edge, given a variety of constraints, including resource demand, capacity, and compatibility, to satisfy timeliness constraints. In contrast to the related IIoT optimization research underway, including those of singleton service placements, business processes pose new challenges. Not only do sets of dependent activities have to be considered for co-deployment, but the meaning of timing constraints needs to be respected, given alternative, parallel, and iterative control-flow paths in processes. In addition, instantiation (replication) to scale activities for increasing data volumes poses further deployment constraints, i.e., on sets of nodes supporting dynamic instantiation of order-dependent activities. Here we present an optimization strategy for business processes that addresses these challenges. We first conceptualize processes in coherent fragments to precisely derive both responsiveness and throughput execution time heuristics and formulate a multi-objective process placement problem. Next, we develop a genetic algorithm-based process placement procedure. To adapt to fluctuating event frequencies, we support an interplay between scaling algorithms for service instances and process placement optimization. Validation through an industrial safety monitoring use case drawn from the construction industry shows that our approach improves timeliness responses by almost one-third and more than doubles execution throughput compared to existing methods.
边缘计算的突破为企业将工业物联网(IIoT)网络从分析扩展到可操作的处理提供了新的前景。特别是,基于云的业务流程(通过按工作流程排序的活动提供管理操作和规则)可以在边缘进行简化,以便在物理空间中进行低延迟访问。尽管这提高了业务控制,特别是对于工业应用程序的关键事件,但它面临着操作障碍。边缘设备支持大量传感器的高容量和竞争需求,其容量、可靠性以及与传感器和云网关的接近程度各不相同。这保证了流程活动的高效放置,从云到边缘,给定各种约束,包括资源需求、容量和兼容性,以满足时效性约束。与正在进行的相关工业物联网优化研究(包括单例服务配置)相比,业务流程带来了新的挑战。对于共同部署,不仅需要考虑相关活动的集合,而且需要尊重时间约束的含义,在过程中给定可选的、并行的和迭代的控制流路径。此外,为增加数据量而对活动进行实例化(复制)会带来进一步的部署约束,例如,在支持依赖顺序的活动的动态实例化的节点集上。在这里,我们提出了一个针对业务流程的优化策略,以解决这些挑战。我们首先将过程概念化在连贯的片段中,以精确地推导响应性和吞吐量执行时间启发式方法,并制定了多目标过程放置问题。接下来,我们开发了一个基于遗传算法的过程放置程序。为了适应波动的事件频率,我们支持服务实例的缩放算法和流程放置优化之间的相互作用。通过来自建筑行业的工业安全监控用例的验证表明,与现有方法相比,我们的方法将及时性响应提高了近三分之一,执行吞吐量提高了一倍以上。
{"title":"From cloud to edge: dynamic placement optimization of business processes in IIoT networks","authors":"Md Razon Hossain ,&nbsp;Alistair Barros ,&nbsp;Colin Fidge","doi":"10.1016/j.jnca.2025.104317","DOIUrl":"10.1016/j.jnca.2025.104317","url":null,"abstract":"<div><div>Breakthroughs in edge computing offer new prospects for businesses to extend Industrial Internet of Things (IIoT) networks beyond analytics to actionable processing. In particular, cloud-based business processes, which provide administrative actions and rules through workflow-sequenced activities, can be streamlined on the edge for low-latency access in physical spaces. Although this advances business controls, particularly for critical events of industrial applications, it faces operational barriers. Edge devices, which support high volume and competing demands from a large number of sensors, vary in capacity, reliability, and proximity to sensors and cloud gateways. This warrants a highly efficient placement of process activities, from cloud to edge, given a variety of constraints, including resource demand, capacity, and compatibility, to satisfy timeliness constraints. In contrast to the related IIoT optimization research underway, including those of singleton service placements, business processes pose new challenges. Not only do sets of dependent activities have to be considered for co-deployment, but the meaning of timing constraints needs to be respected, given alternative, parallel, and iterative control-flow paths in processes. In addition, instantiation (replication) to scale activities for increasing data volumes poses further deployment constraints, i.e., on sets of nodes supporting dynamic instantiation of order-dependent activities. Here we present an optimization strategy for business processes that addresses these challenges. We first conceptualize processes in coherent fragments to precisely derive both responsiveness and throughput execution time heuristics and formulate a multi-objective process placement problem. Next, we develop a genetic algorithm-based process placement procedure. To adapt to fluctuating event frequencies, we support an interplay between scaling algorithms for service instances and process placement optimization. Validation through an industrial safety monitoring use case drawn from the construction industry shows that our approach improves timeliness responses by almost one-third and more than doubles execution throughput compared to existing methods.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104317"},"PeriodicalIF":8.0,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145009289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NoRDEx: A decentralized optimistic non-repudiation protocol for data exchanges NoRDEx:用于数据交换的去中心化乐观不可否认协议
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-02 DOI: 10.1016/j.jnca.2025.104291
Fernando Román-García, Juan Hernández-Serrano, Oscar Esparza
This article introduces the Non-Repudiable Data Exchange (NoRDEx) protocol, designed to ensure non-repudiation in data exchanges. Unlike traditional non-repudiation and fair exchange protocols, NoRDEx can be considered decentralized as it eliminates the need for a centralized Trusted Third Party (TTP) by using a Distributed Ledger Technology (DLT) to store cryptographic proofs without revealing the exchanged message. NoRDEx is an optimistic non-repudiation protocol, as it only uses the DLT in case of a dispute. The protocol has been implemented and tested in real-world environments, with performance assessments covering cost, overhead, and execution time. A formal security analysis using the Syverson Van Oorschot (SVO) logical model demonstrates NoRDEx’s ability to resolve disputes securely.
本文介绍了不可抵赖数据交换(NoRDEx)协议,旨在确保数据交换中的不可抵赖性。与传统的不可否认和公平交换协议不同,NoRDEx可以被认为是去中心化的,因为它通过使用分布式账本技术(DLT)来存储加密证明而不泄露交换消息,从而消除了对中心化可信第三方(TTP)的需求。NoRDEx是一个乐观的不可否认协议,因为它只在发生争议的情况下使用DLT。该协议已经在实际环境中实现和测试,性能评估涵盖了成本、开销和执行时间。使用Syverson Van Oorschot (SVO)逻辑模型的正式安全性分析证明了NoRDEx安全解决争议的能力。
{"title":"NoRDEx: A decentralized optimistic non-repudiation protocol for data exchanges","authors":"Fernando Román-García,&nbsp;Juan Hernández-Serrano,&nbsp;Oscar Esparza","doi":"10.1016/j.jnca.2025.104291","DOIUrl":"10.1016/j.jnca.2025.104291","url":null,"abstract":"<div><div>This article introduces the Non-Repudiable Data Exchange (NoRDEx) protocol, designed to ensure non-repudiation in data exchanges. Unlike traditional non-repudiation and fair exchange protocols, NoRDEx can be considered decentralized as it eliminates the need for a centralized Trusted Third Party (TTP) by using a Distributed Ledger Technology (DLT) to store cryptographic proofs without revealing the exchanged message. NoRDEx is an optimistic non-repudiation protocol, as it only uses the DLT in case of a dispute. The protocol has been implemented and tested in real-world environments, with performance assessments covering cost, overhead, and execution time. A formal security analysis using the Syverson Van Oorschot (SVO) logical model demonstrates NoRDEx’s ability to resolve disputes securely.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104291"},"PeriodicalIF":8.0,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145059796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A realistic trust model evaluation platform for the Social Internet of Things (REACT-SIoT) 面向社会物联网的现实信任模型评估平台
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-02 DOI: 10.1016/j.jnca.2025.104302
Marius Becherer , Omar K. Hussain , Frank den Hartog , Yu Zhang , Michael Zipperle
The Social Internet of Things (SIoT) enables cross-organisational collaboration for various industrial applications. However, evaluating trust models within such environments remains challenging due to context-dependent dynamics in SIoT environments. Existing evaluation platforms often rely on overly domain-specific or generic datasets, overlooking the inherent uncertainty and dynamicity of real-world SIoT settings. Additionally, there is a lack of practical platforms to assess the feasibility and effectiveness of trust models across diverse scenarios. In this study, we present the Realistic Trust Model Evaluation Platform for the Social Internet of Things (REACT-SIoT) to rigorously assess trust models in SIoT environments, thereby facilitating trustworthy collaboration for sustainable IoT transformations. REACT-SIoT addresses 21 identified requirements essential for simulating a realistic SIoT environment, including categories of heterogeneity, dynamicity, incompleteness, uncertainty, interdependency, and authentic real-world dynamics. We developed a configurable evaluation procedure that mitigates dataset bias and supports the assessment of both existing and newly developed trust models under various scenario-dependent settings. A real-world example demonstrates the platform’s capability to satisfy these requirements effectively. Our analysis reveals that REACT-SIoT meets all defined requirements and outperforms existing evaluation environments based on accuracy, trust convergence, and robustness criteria. The platform has been successfully applied to existing trust models, showcasing its applicability and enabling comparative assessments that were previously constrained by disparate evaluation settings and datasets. In conclusion, REACT-SIoT offers a highly- adaptable evaluation framework that ensures unbiased and comprehensive trust model assessments in SIoT environments. This platform bridges a critical gap in trust evaluation research, enabling the comparison and validation of trust models across diverse, realistic scenarios, thereby supporting the development of more resilient and trustworthy collaborative SIoT systems.
社会物联网(SIoT)使各种工业应用的跨组织协作成为可能。然而,由于SIoT环境中与上下文相关的动态,在此类环境中评估信任模型仍然具有挑战性。现有的评估平台通常过于依赖于特定领域或通用数据集,忽视了现实世界SIoT设置的固有不确定性和动态性。此外,缺乏实用的平台来评估不同场景下信任模型的可行性和有效性。在本研究中,我们提出了社会物联网现实信任模型评估平台(REACT-SIoT),以严格评估SIoT环境中的信任模型,从而促进可持续物联网转型的可信协作。REACT-SIoT解决了模拟现实SIoT环境的21个基本需求,包括异质性、动态性、不完整性、不确定性、相互依赖性和真实世界动态的类别。我们开发了一个可配置的评估程序,以减轻数据集偏差,并支持在各种场景依赖设置下对现有和新开发的信任模型进行评估。一个真实的例子展示了该平台有效满足这些需求的能力。我们的分析表明,REACT-SIoT满足所有定义的需求,并且在准确性、信任收敛性和鲁棒性标准的基础上优于现有的评估环境。该平台已成功应用于现有的信任模型,展示了其适用性,并实现了以前受不同评估设置和数据集限制的比较评估。总之,REACT-SIoT提供了一个高度适应性的评估框架,确保在SIoT环境中进行公正和全面的信任模型评估。该平台弥补了信任评估研究中的关键空白,能够在不同的现实场景中对信任模型进行比较和验证,从而支持开发更具弹性和可信赖的协作SIoT系统。
{"title":"A realistic trust model evaluation platform for the Social Internet of Things (REACT-SIoT)","authors":"Marius Becherer ,&nbsp;Omar K. Hussain ,&nbsp;Frank den Hartog ,&nbsp;Yu Zhang ,&nbsp;Michael Zipperle","doi":"10.1016/j.jnca.2025.104302","DOIUrl":"10.1016/j.jnca.2025.104302","url":null,"abstract":"<div><div>The Social Internet of Things (SIoT) enables cross-organisational collaboration for various industrial applications. However, evaluating trust models within such environments remains challenging due to context-dependent dynamics in SIoT environments. Existing evaluation platforms often rely on overly domain-specific or generic datasets, overlooking the inherent uncertainty and dynamicity of real-world SIoT settings. Additionally, there is a lack of practical platforms to assess the feasibility and effectiveness of trust models across diverse scenarios. In this study, we present the Realistic Trust Model Evaluation Platform for the Social Internet of Things (REACT-SIoT) to rigorously assess trust models in SIoT environments, thereby facilitating trustworthy collaboration for sustainable IoT transformations. REACT-SIoT addresses 21 identified requirements essential for simulating a realistic SIoT environment, including categories of heterogeneity, dynamicity, incompleteness, uncertainty, interdependency, and authentic real-world dynamics. We developed a configurable evaluation procedure that mitigates dataset bias and supports the assessment of both existing and newly developed trust models under various scenario-dependent settings. A real-world example demonstrates the platform’s capability to satisfy these requirements effectively. Our analysis reveals that REACT-SIoT meets all defined requirements and outperforms existing evaluation environments based on accuracy, trust convergence, and robustness criteria. The platform has been successfully applied to existing trust models, showcasing its applicability and enabling comparative assessments that were previously constrained by disparate evaluation settings and datasets. In conclusion, REACT-SIoT offers a highly- adaptable evaluation framework that ensures unbiased and comprehensive trust model assessments in SIoT environments. This platform bridges a critical gap in trust evaluation research, enabling the comparison and validation of trust models across diverse, realistic scenarios, thereby supporting the development of more resilient and trustworthy collaborative SIoT systems.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104302"},"PeriodicalIF":8.0,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145007485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Deep Learning Models for Intrusion Detection in Industrial Control Systems: Frameworks and Open Issues 工业控制系统中基于区块链的入侵检测深度学习模型:框架和开放问题
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-01 DOI: 10.1016/j.jnca.2025.104286
Devi Priya V.S. , Sibi Chakkaravarthy Sethuraman , Muhammad Khurram Khan
Critical infrastructure and industrial systems are both becoming more and more networked and equipped with computing and communications tools. To manage processes and automate them where possible, Industrial Control Systems (ICS) manage a variety of components, including monitoring tools and software platforms. More complicated data is now being run on the networks, including data(past), money(present), and brains (future). In order to predictably detect specific services and patterns (deep learning) and automatically check authenticity and transfer value (blockchain), deep learning and blockchain are integrated into the ICS network. Hence, we conducted a thorough examination of the models published in the literature in order to comprehend how to integrate machine learning and blockchain efficiently and successfully for intrusion detection services. We also provide useful guidance for future research in this area by noting significant issues that must be addressed before substantial deployments of IDS models in ICS.
关键的基础设施和工业系统都变得越来越网络化,并配备了计算和通信工具。为了管理流程并在可能的情况下实现自动化,工业控制系统(ICS)管理各种组件,包括监控工具和软件平台。更复杂的数据现在正在网络上运行,包括数据(过去)、金钱(现在)和大脑(未来)。为了可预测地检测特定的服务和模式(深度学习),并自动检查真实性和传递价值(区块链),将深度学习和区块链集成到ICS网络中。因此,我们对文献中发表的模型进行了彻底的检查,以了解如何有效和成功地将机器学习和区块链集成到入侵检测服务中。通过指出在ICS中大量部署IDS模型之前必须解决的重要问题,我们还为该领域的未来研究提供了有用的指导。
{"title":"Blockchain-based Deep Learning Models for Intrusion Detection in Industrial Control Systems: Frameworks and Open Issues","authors":"Devi Priya V.S. ,&nbsp;Sibi Chakkaravarthy Sethuraman ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.jnca.2025.104286","DOIUrl":"10.1016/j.jnca.2025.104286","url":null,"abstract":"<div><div>Critical infrastructure and industrial systems are both becoming more and more networked and equipped with computing and communications tools. To manage processes and automate them where possible, Industrial Control Systems (ICS) manage a variety of components, including monitoring tools and software platforms. More complicated data is now being run on the networks, including data(past), money(present), and brains (future). In order to predictably detect specific services and patterns (deep learning) and automatically check authenticity and transfer value (blockchain), deep learning and blockchain are integrated into the ICS network. Hence, we conducted a thorough examination of the models published in the literature in order to comprehend how to integrate machine learning and blockchain efficiently and successfully for intrusion detection services. We also provide useful guidance for future research in this area by noting significant issues that must be addressed before substantial deployments of IDS models in ICS.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104286"},"PeriodicalIF":8.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145108681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling cybersecurity mysteries: A comprehensive survey on digital forensics trends, threats, and solutions in network security 揭开网络安全之谜:对网络安全中的数字取证趋势、威胁和解决方案的全面调查
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-09-01 DOI: 10.1016/j.jnca.2025.104296
Tuba Arif , David Camacho , Jong Hyuk Park
The field of digital forensics is undergoing a paradigm shift because security breaches are now occurring outside of conventional domains such as mobile devices, databases, networks, multimedia, cloud platforms, and the Internet of Things (IoT) all require a complete approach. This study report reveals a high level of ambiguities and process redundancies within the subdomains of digital forensics through the completion of a Systematic Literature Review (SLR). To address this, we suggest a high-level theoretical metamodel that unifies tasks, operations, procedures, and methods of research across many subdomains that will help forensic investigators during digital investigations to organize and integrate evidence. The study also discusses the necessity of global perspectives in research on digital forensics and provides a qualitative evaluation of past surveys, highlighting similar difficulties, obstacles, and key issues across domains, whereas earlier surveys concentrated on domains. The findings through examination offer a multidimensional knowledge of the difficulties in digital forensics and suggested metamodels help to create a more cohesive and integrated approach to digital investigations, establishing an environment for further study and collaborations in this crucial domain.
数字取证领域正在经历范式转变,因为安全漏洞现在发生在传统领域之外,如移动设备、数据库、网络、多媒体、云平台和物联网(IoT)都需要一个完整的方法。本研究报告通过系统文献综述(SLR)的完成,揭示了数字取证子领域内的高度模糊性和流程冗余。为了解决这个问题,我们提出了一个高水平的理论元模型,该模型统一了许多子领域的任务、操作、程序和研究方法,这将有助于法医调查员在数字调查期间组织和整合证据。该研究还讨论了数字取证研究中全球视角的必要性,并对过去的调查进行了定性评估,强调了跨领域的类似困难、障碍和关键问题,而早期的调查则集中在领域上。通过检查的发现提供了数字取证困难的多维知识,建议的元模型有助于创建更有凝聚力和集成的数字调查方法,为这一关键领域的进一步研究和合作建立环境。
{"title":"Unveiling cybersecurity mysteries: A comprehensive survey on digital forensics trends, threats, and solutions in network security","authors":"Tuba Arif ,&nbsp;David Camacho ,&nbsp;Jong Hyuk Park","doi":"10.1016/j.jnca.2025.104296","DOIUrl":"10.1016/j.jnca.2025.104296","url":null,"abstract":"<div><div>The field of digital forensics is undergoing a paradigm shift because security breaches are now occurring outside of conventional domains such as mobile devices, databases, networks, multimedia, cloud platforms, and the Internet of Things (IoT) all require a complete approach. This study report reveals a high level of ambiguities and process redundancies within the subdomains of digital forensics through the completion of a Systematic Literature Review (SLR). To address this, we suggest a high-level theoretical metamodel that unifies tasks, operations, procedures, and methods of research across many subdomains that will help forensic investigators during digital investigations to organize and integrate evidence. The study also discusses the necessity of global perspectives in research on digital forensics and provides a qualitative evaluation of past surveys, highlighting similar difficulties, obstacles, and key issues across domains, whereas earlier surveys concentrated on domains. The findings through examination offer a multidimensional knowledge of the difficulties in digital forensics and suggested metamodels help to create a more cohesive and integrated approach to digital investigations, establishing an environment for further study and collaborations in this crucial domain.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"243 ","pages":"Article 104296"},"PeriodicalIF":8.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145003700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1