首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
AP Working Mode Selection and Blocklength Optimization for Industrial URLLC in Network-Assisted Full-Duplex Cell-Free Massive MIMO Systems
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-11 DOI: 10.1109/JSYST.2024.3507049
Zheng Sheng;Pengcheng Zhu;Peng Hao;Feng Shu;Fu-Chun Zheng
Network-assisted full-duplex (NAFD) cell-free massive multiple-input–multiple-output (MIMO) systems, which virtually achieve FD transmission by employing half-duplex access points (APs) to simultaneously serve uplink (UL) and downlink (DL) users on the same frequency bands, can decrease latency and enhance reliability since self-interference cancellation is unnecessary and macrodiversity is provided, thus helping industrial ultrareliable low-latency communication applications. In this article, we consider a monitoring scenario of industrial automation in NAFD cell-free systems using finite blocklength codewords and analyze UL and DL signals, end-to-end (E2E) delay, and E2E decoding error probability (DEP). Then, an optimization problem is formulated to minimize the maximum E2E DEP among all actuators by jointly designing AP working mode, UL and DL blocklengths under the E2E delay constraint. We propose the estimation of distribution algorithm-differential evolution (EDA-DE) method with low complexity to obtain a near-optimal solution, where the block coordinate descent is used to divide this problem into two parts. The first AP working mode selection is solved by EDA, and the second UL and DL blocklengths are designed by DE. Simulation results indicate that the performance of our proposed EDA-DE method is close to that of exhaustive search with lower computational complexity.
{"title":"AP Working Mode Selection and Blocklength Optimization for Industrial URLLC in Network-Assisted Full-Duplex Cell-Free Massive MIMO Systems","authors":"Zheng Sheng;Pengcheng Zhu;Peng Hao;Feng Shu;Fu-Chun Zheng","doi":"10.1109/JSYST.2024.3507049","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3507049","url":null,"abstract":"Network-assisted full-duplex (NAFD) cell-free massive multiple-input–multiple-output (MIMO) systems, which virtually achieve FD transmission by employing half-duplex access points (APs) to simultaneously serve uplink (UL) and downlink (DL) users on the same frequency bands, can decrease latency and enhance reliability since self-interference cancellation is unnecessary and macrodiversity is provided, thus helping industrial ultrareliable low-latency communication applications. In this article, we consider a monitoring scenario of industrial automation in NAFD cell-free systems using finite blocklength codewords and analyze UL and DL signals, end-to-end (E2E) delay, and E2E decoding error probability (DEP). Then, an optimization problem is formulated to minimize the maximum E2E DEP among all actuators by jointly designing AP working mode, UL and DL blocklengths under the E2E delay constraint. We propose the estimation of distribution algorithm-differential evolution (EDA-DE) method with low complexity to obtain a near-optimal solution, where the block coordinate descent is used to divide this problem into two parts. The first AP working mode selection is solved by EDA, and the second UL and DL blocklengths are designed by DE. Simulation results indicate that the performance of our proposed EDA-DE method is close to that of exhaustive search with lower computational complexity.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"188-199"},"PeriodicalIF":4.0,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prescribed-Time Target Enclosing and Tracking With Motion and Visibility Constraints
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-09 DOI: 10.1109/JSYST.2024.3506560
Jiayi Zheng;Shulong Zhao;Xiangke Wang
This article investigates a prescribed-time method for multiple fixed-wing autonomous aerial vehicles (AAVs) to enclose and track a moving target based on relative measurements. Utilizing onboard sensors brings two main challenges, i.e., maintaining the target within the field-of-view and tracking a noncooperative target with limited information. To this end, a prescribed-time enclosing and tracking controller is proposed first, guaranteeing that multiple fixed-wing AAVs converge to the desired trajectories within a prescribed time subject to motion and visibility constraints. Then, considering the dilemma of the input saturation and prescribed-time convergence, a basis for selecting the proper prescribed time is analyzed by mathematical formulations. It is determined by different initial states and constraints rather than arbitrarily. Finally, comparison and simulation results verify the effectiveness of the proposed method within a prescribed time.
{"title":"Prescribed-Time Target Enclosing and Tracking With Motion and Visibility Constraints","authors":"Jiayi Zheng;Shulong Zhao;Xiangke Wang","doi":"10.1109/JSYST.2024.3506560","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3506560","url":null,"abstract":"This article investigates a prescribed-time method for multiple fixed-wing autonomous aerial vehicles (AAVs) to enclose and track a moving target based on relative measurements. Utilizing onboard sensors brings two main challenges, i.e., maintaining the target within the field-of-view and tracking a noncooperative target with limited information. To this end, a prescribed-time enclosing and tracking controller is proposed first, guaranteeing that multiple fixed-wing AAVs converge to the desired trajectories within a prescribed time subject to motion and visibility constraints. Then, considering the dilemma of the input saturation and prescribed-time convergence, a basis for selecting the proper prescribed time is analyzed by mathematical formulations. It is determined by different initial states and constraints rather than arbitrarily. Finally, comparison and simulation results verify the effectiveness of the proposed method within a prescribed time.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"224-233"},"PeriodicalIF":4.0,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Council Information IEEE系统委员会信息
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-04 DOI: 10.1109/JSYST.2024.3486435
{"title":"IEEE Systems Council Information","authors":"","doi":"10.1109/JSYST.2024.3486435","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3486435","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"C3-C3"},"PeriodicalIF":4.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10778091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Publication Information IEEE系统期刊出版信息
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-04 DOI: 10.1109/JSYST.2024.3486431
{"title":"IEEE Systems Journal Publication Information","authors":"","doi":"10.1109/JSYST.2024.3486431","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3486431","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"C2-C2"},"PeriodicalIF":4.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10778090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Information for Authors IEEE系统期刊信息作者
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-04 DOI: 10.1109/JSYST.2024.3486437
{"title":"IEEE Systems Journal Information for Authors","authors":"","doi":"10.1109/JSYST.2024.3486437","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3486437","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"C4-C4"},"PeriodicalIF":4.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10778092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Predictive Control for Nonlinear Discrete Cyber–Physical Systems With Joint Deception Attacks
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-03 DOI: 10.1109/JSYST.2024.3482449
Hongchao Song;Zhenlei Wang
Based on model predictive control and an attack detection mechanism, the stabilization problem of a class of nonlinear discrete-time cyber–physical systems with deception attacks at the sensor-to-controller and controller-to-actuator communication channels is studied. In this article, the deception attacks on both ends of the controller are considered using a more generic probability model. Attack detection models and mechanisms are established to detect the integrity of transmitted information in order to mitigate the impact of deception attacks. To ensure the input-to-state practical stability of the closed-loop system, a model predictive controller is designed based on the detected state. Finally, a simulation case is presented to demonstrate the stability and effectiveness of the proposed method.
{"title":"Model Predictive Control for Nonlinear Discrete Cyber–Physical Systems With Joint Deception Attacks","authors":"Hongchao Song;Zhenlei Wang","doi":"10.1109/JSYST.2024.3482449","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3482449","url":null,"abstract":"Based on model predictive control and an attack detection mechanism, the stabilization problem of a class of nonlinear discrete-time cyber–physical systems with deception attacks at the sensor-to-controller and controller-to-actuator communication channels is studied. In this article, the deception attacks on both ends of the controller are considered using a more generic probability model. Attack detection models and mechanisms are established to detect the integrity of transmitted information in order to mitigate the impact of deception attacks. To ensure the input-to-state practical stability of the closed-loop system, a model predictive controller is designed based on the detected state. Finally, a simulation case is presented to demonstrate the stability and effectiveness of the proposed method.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"20-31"},"PeriodicalIF":4.0,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Resilience Assessment for Power Systems Under Typhoons Based on Spatial Temporal Graphs
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-03 DOI: 10.1109/JSYST.2024.3496754
Yuhong Zhu;Yongzhi Zhou;Yong Sun;Wei Li
Despite great progress in modeling the resilience response of power systems under extreme events, it remains difficult to assess the evolutionary trend of system performance at a specific observation moment during such events. Conventional simulation-based assessment methods are typically time-consuming because a series of scenario-specific optimization problems must be solved as a prerequisite. Thus, a spatial-temporal graph-based approach is proposed for fast resilience assessment to provide timely warning information. The key factors, including observable meteorological information, component vulnerabilities, emergency dispatch, and repair strategies, are modeled in the form of matrices that depict the spatial and temporal relationships. Based on these matrices, a spatiotemporal graph neural network is developed to fit the mapping relationship between observable states and resilience indicators, which is trained offline and enables fast assessment via forward inference. Regarding the uncertainties of various extreme scenarios, the evaluation procedure combines the whole-process simulation and single-state replay technologies, which can respectively consider the uncertainties and provide deterministic data labeling for assessment. Finally, the effectiveness of the proposed method is verified on the benchmarks, including the IEEE 118-bus system and a realistic 2868-bus system.
{"title":"Fast Resilience Assessment for Power Systems Under Typhoons Based on Spatial Temporal Graphs","authors":"Yuhong Zhu;Yongzhi Zhou;Yong Sun;Wei Li","doi":"10.1109/JSYST.2024.3496754","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3496754","url":null,"abstract":"Despite great progress in modeling the resilience response of power systems under extreme events, it remains difficult to assess the evolutionary trend of system performance at a specific observation moment during such events. Conventional simulation-based assessment methods are typically time-consuming because a series of scenario-specific optimization problems must be solved as a prerequisite. Thus, a spatial-temporal graph-based approach is proposed for fast resilience assessment to provide timely warning information. The key factors, including observable meteorological information, component vulnerabilities, emergency dispatch, and repair strategies, are modeled in the form of matrices that depict the spatial and temporal relationships. Based on these matrices, a spatiotemporal graph neural network is developed to fit the mapping relationship between observable states and resilience indicators, which is trained offline and enables fast assessment via forward inference. Regarding the uncertainties of various extreme scenarios, the evaluation procedure combines the whole-process simulation and single-state replay technologies, which can respectively consider the uncertainties and provide deterministic data labeling for assessment. Finally, the effectiveness of the proposed method is verified on the benchmarks, including the IEEE 118-bus system and a realistic 2868-bus system.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"8-19"},"PeriodicalIF":4.0,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Multiscale Formation Optimization for Multiagent Systems
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-28 DOI: 10.1109/JSYST.2024.3502074
Zhaoxia Peng;Bofan Wu;Guoguang Wen;Tingwen Huang;Ahmed Rahmani
In this article, we study a distributed multiscale formation optimization problem for the multiagent system. The global cost function is subjected to a constraint with an aggregative item, which reveals the degree of aggregation for the multiagent system. A distributed strategy is proposed to optimize the formation configuration at multiple scales, including the position, angle, and size of the formation configuration. The strategy first employs observation and parameter projection technologies to search for the optimal size. Then, it utilizes the gradient and moment to optimize the position and angle of the formation configuration synchronously. Finally, some simulation results are provided to verify the proposed strategy.
{"title":"Distributed Multiscale Formation Optimization for Multiagent Systems","authors":"Zhaoxia Peng;Bofan Wu;Guoguang Wen;Tingwen Huang;Ahmed Rahmani","doi":"10.1109/JSYST.2024.3502074","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3502074","url":null,"abstract":"In this article, we study a distributed multiscale formation optimization problem for the multiagent system. The global cost function is subjected to a constraint with an aggregative item, which reveals the degree of aggregation for the multiagent system. A distributed strategy is proposed to optimize the formation configuration at multiple scales, including the position, angle, and size of the formation configuration. The strategy first employs observation and parameter projection technologies to search for the optimal size. Then, it utilizes the gradient and moment to optimize the position and angle of the formation configuration synchronously. Finally, some simulation results are provided to verify the proposed strategy.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"339-342"},"PeriodicalIF":4.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance-Based Cascading Failure Analysis of Cross-Domain Unmanned Combat System Considering Logistic Support 考虑后勤保障的跨域无人作战系统性能级联失效分析
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-19 DOI: 10.1109/JSYST.2024.3476167
Tianwen Zhang;Guanghan Bai;Yunxiao Lv;Shuai Zhang;Junyong Tao
Failure modeling and analysis are essential to the reliable and safe operation of unmanned combat system, which ultimately influence the success of a mission. Previous studies mainly focus on failure modeling and analysis of unmanned systems in a single domain, where synergy of cross-domain unmanned combat has rarely been considered. In this study, a multilayered heterogeneous network model for cross-domain unmanned combat system has been developed. In addition, the logistic support, which is another key aspect of any combat is incorporated. Given the interdependencies among the layers considering logistic support and cross-domain synergy, importance measure-based malicious attack model is proposed to reflect the intensive dynamics and high uncertainties under modern combat environment. Then, cascading failure analysis based on load-capacity model is conducted, which provides a load redistribution method considering cross-domain synergy. Finally, a case study is given for demonstration and verification, where the number of kill chains and load entropy are adopted as performance indicators.
失效建模与分析对无人作战系统的安全可靠运行至关重要,最终影响任务的成败。以往的研究主要集中在单域无人系统的故障建模与分析,很少考虑跨域无人作战的协同作用。本文建立了一种面向跨域无人作战系统的多层异构网络模型。此外,后勤支持,这是任何战斗的另一个关键方面被纳入。考虑到各层之间的相互依赖关系,考虑后勤保障和跨域协同,提出了基于重要度量的恶意攻击模型,以反映现代作战环境下的高动态性和高不确定性。然后,基于荷载-能力模型进行了级联失效分析,提供了一种考虑跨域协同的荷载重分配方法。最后,以kill链数和负载熵为性能指标,进行了实例分析和验证。
{"title":"Performance-Based Cascading Failure Analysis of Cross-Domain Unmanned Combat System Considering Logistic Support","authors":"Tianwen Zhang;Guanghan Bai;Yunxiao Lv;Shuai Zhang;Junyong Tao","doi":"10.1109/JSYST.2024.3476167","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3476167","url":null,"abstract":"Failure modeling and analysis are essential to the reliable and safe operation of unmanned combat system, which ultimately influence the success of a mission. Previous studies mainly focus on failure modeling and analysis of unmanned systems in a single domain, where synergy of cross-domain unmanned combat has rarely been considered. In this study, a multilayered heterogeneous network model for cross-domain unmanned combat system has been developed. In addition, the logistic support, which is another key aspect of any combat is incorporated. Given the interdependencies among the layers considering logistic support and cross-domain synergy, importance measure-based malicious attack model is proposed to reflect the intensive dynamics and high uncertainties under modern combat environment. Then, cascading failure analysis based on load-capacity model is conducted, which provides a load redistribution method considering cross-domain synergy. Finally, a case study is given for demonstration and verification, where the number of kill chains and load entropy are adopted as performance indicators.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"2109-2120"},"PeriodicalIF":4.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Note on “An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing” 关于“移动边缘计算的匿名和无证书身份认证协议”的说明
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-19 DOI: 10.1109/JSYST.2024.3490536
Lihua Liu
We show that the authentication protocol (Ma and Cheng [10]) fails to keep user anonymity, not as claimed. We suggest a method to fix it. Besides, we find there is a flawed equality, in which some terms are inaccessible to the user. This flaw results in the failure for the user to finish his computations. We also suggest a method to fix this mistake.
我们表明,认证协议(Ma和Cheng[10])未能保持用户匿名,而不是声称的那样。我们建议一个方法来解决它。此外,我们发现存在一个有缺陷的等式,其中一些条款是用户无法访问的。这个缺陷导致用户无法完成他的计算。我们也提出了一个解决这个错误的方法。
{"title":"A Note on “An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing”","authors":"Lihua Liu","doi":"10.1109/JSYST.2024.3490536","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3490536","url":null,"abstract":"We show that the authentication protocol (Ma and Cheng [10]) fails to keep user anonymity, not as claimed. We suggest a method to fix it. Besides, we find there is a flawed equality, in which some terms are inaccessible to the user. This flaw results in the failure for the user to finish his computations. We also suggest a method to fix this mistake.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"2169-2172"},"PeriodicalIF":4.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1