首页 > 最新文献

Computer Communications最新文献

英文 中文
Robust speech command recognition in challenging industrial environments 在具有挑战性的工业环境中进行可靠的语音命令识别
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.comcom.2024.107938
Stefano Bini, Vincenzo Carletti, Alessia Saggese, Mario Vento

Speech is among the main forms of communication between humans and robots in industrial settings, being the most natural way for a human worker to issue commands. However, the presence of pervasive and loud environmental noise poses significant challenges to the adoption of Speech-Command Recognition systems onboard manufacturing robots; indeed, they are expected to perform in real time on hardware with limited computational capabilities and also to be robust and accurate in such complex environments. In this paper, we propose an innovative system based on an End-to-End architecture with a Conformer backbone. Our system is specifically designed to achieve high accuracy in noisy industrial environments and to guarantee a minimal computational burden to meet stringent real-time requirements while running on computing devices that are embedded in robots. In order to increase the generalization capability of the system, the training procedure is driven by a Curriculum Learning strategy combined with dynamic data augmentation techniques, that progressively increase the complexity of input samples by increasing the noise during the training phase. We have conducted extensive experimentation to assess the effectiveness of our system, using a dataset composed of more than 50,000 samples, of which about 2,000 have been acquired during the daily operations of a Stellantis Italian factory. The results confirm the suitability of the proposed approach to be adopted in a real industrial environment; indeed, it is able to achieve, on both English and Italian commands, an accuracy higher than 90%, maintaining a compact model size (the network is 1.81 MB) and running in real-time on an industrial embedded device (namely 41ms over an NVIDIA Xavier NX).

在工业环境中,语音是人类与机器人交流的主要形式之一,也是人类工人发出指令的最自然方式。然而,无处不在的嘈杂环境噪声给制造机器人上的语音命令识别系统的应用带来了巨大挑战;事实上,人们期望这些系统能在计算能力有限的硬件上实时运行,并在如此复杂的环境中保持稳定和准确。在本文中,我们提出了一种基于端到端架构和 Conformer 骨干的创新系统。我们的系统专门设计用于在嘈杂的工业环境中实现高精度,并保证在机器人嵌入式计算设备上运行时,计算负担最小,以满足严格的实时性要求。为了提高系统的泛化能力,训练过程由课程学习策略与动态数据增强技术相结合,通过在训练阶段增加噪声来逐步提高输入样本的复杂性。我们使用由 50,000 多个样本组成的数据集进行了广泛的实验,以评估系统的有效性,其中约 2,000 个样本是在意大利 Stellantis 工厂的日常运营中获取的。实验结果证实,所提出的方法适合在实际工业环境中使用;事实上,该系统对英语和意大利语命令的准确率均高于 90%,模型大小小巧(网络大小为 1.81 MB),可在工业嵌入式设备上实时运行(在英伟达 Xavier NX 上的运行时间为 41 毫秒)。
{"title":"Robust speech command recognition in challenging industrial environments","authors":"Stefano Bini,&nbsp;Vincenzo Carletti,&nbsp;Alessia Saggese,&nbsp;Mario Vento","doi":"10.1016/j.comcom.2024.107938","DOIUrl":"10.1016/j.comcom.2024.107938","url":null,"abstract":"<div><p>Speech is among the main forms of communication between humans and robots in industrial settings, being the most natural way for a human worker to issue commands. However, the presence of pervasive and loud environmental noise poses significant challenges to the adoption of Speech-Command Recognition systems onboard manufacturing robots; indeed, they are expected to perform in real time on hardware with limited computational capabilities and also to be robust and accurate in such complex environments. In this paper, we propose an innovative system based on an End-to-End architecture with a Conformer backbone. Our system is specifically designed to achieve high accuracy in noisy industrial environments and to guarantee a minimal computational burden to meet stringent real-time requirements while running on computing devices that are embedded in robots. In order to increase the generalization capability of the system, the training procedure is driven by a Curriculum Learning strategy combined with dynamic data augmentation techniques, that progressively increase the complexity of input samples by increasing the noise during the training phase. We have conducted extensive experimentation to assess the effectiveness of our system, using a dataset composed of more than 50,000 samples, of which about 2,000 have been acquired during the daily operations of a Stellantis Italian factory. The results confirm the suitability of the proposed approach to be adopted in a real industrial environment; indeed, it is able to achieve, on both English and Italian commands, an accuracy higher than 90%, maintaining a compact model size (the network is 1.81 <span><math><mrow><mi>M</mi><mi>B</mi></mrow></math></span>) and running in real-time on an industrial embedded device (namely <span><math><mrow><mn>41</mn><mspace></mspace><mi>ms</mi></mrow></math></span> over an NVIDIA Xavier NX).</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107938"},"PeriodicalIF":4.5,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Locally verifiable approximate multi-member quantum threshold aggregation digital signature scheme 局部可验证的近似多成员量子阈值聚合数字签名方案
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.comcom.2024.107934
Zixuan Lu, Qingshui Xue, Tianhao Zhang, Jiewei Cai, Jing Han, Yixun He, Yinhang Li

Locally verifiable aggregate signature primitives can reduce the complexity of aggregate signature verification by computing locally open algorithms to generate auxiliary parameters. However, the breakthrough results of quantum computers at this stage indicate that it will be possible for quantum computers to break through the security of traditional hardness-based aggregated signature schemes. In order to solve the above problems, this paper proposes for the first time a new locally verifiable class of multi-member quantum threshold aggregated digital signature scheme based on the property that the verification of quantum coset states is a projection on the trans-subspace. Combined with the idea of auxiliary parameter generation in traditional locally verifiable aggregated signatures, it makes the current stage of threshold quantum digital signatures realize the aggregated features, and reduces the complexity of the verification of aggregated signatures while realizing post-quantum security. In addition, the verification of the signature key (quantum state) of the signature members does not require measurement operations, and the generated signatures are classical, so the communication between the trusted third center (TC), the set of signature members, the classical digital signature verifier (CV), and the third-party trusted aggregation generator (TA) are all classical, simplifying the communication model. In the performance analysis we make this quantum aggregation signature scheme more flexible as well as less quantum state preparation compared to other schemes.

可本地验证的聚合签名基元可以通过计算本地开放算法生成辅助参数,从而降低聚合签名验证的复杂性。然而,现阶段量子计算机的突破性成果表明,量子计算机将有可能突破传统基于硬度的聚合签名方案的安全性。为了解决上述问题,本文基于量子余元态的验证是在跨子空间上的投影这一特性,首次提出了一类新的局部可验证的多成员量子阈值聚合数字签名方案。结合传统局部可验证聚合签名中辅助参数生成的思想,使现阶段的阈值量子数字签名实现了聚合特征,在实现后量子安全的同时降低了聚合签名验证的复杂度。此外,验证签名成员的签名密钥(量子态)不需要测量操作,生成的签名是经典的,因此可信第三中心(TC)、签名成员集合、经典数字签名验证器(CV)和第三方可信聚合生成器(TA)之间的通信都是经典的,简化了通信模型。在性能分析中,与其他方案相比,我们使这种量子聚合签名方案更加灵活,同时减少了量子态准备。
{"title":"Locally verifiable approximate multi-member quantum threshold aggregation digital signature scheme","authors":"Zixuan Lu,&nbsp;Qingshui Xue,&nbsp;Tianhao Zhang,&nbsp;Jiewei Cai,&nbsp;Jing Han,&nbsp;Yixun He,&nbsp;Yinhang Li","doi":"10.1016/j.comcom.2024.107934","DOIUrl":"10.1016/j.comcom.2024.107934","url":null,"abstract":"<div><p>Locally verifiable aggregate signature primitives can reduce the complexity of aggregate signature verification by computing locally open algorithms to generate auxiliary parameters. However, the breakthrough results of quantum computers at this stage indicate that it will be possible for quantum computers to break through the security of traditional hardness-based aggregated signature schemes. In order to solve the above problems, this paper proposes for the first time a new locally verifiable class of multi-member quantum threshold aggregated digital signature scheme based on the property that the verification of quantum coset states is a projection on the trans-subspace. Combined with the idea of auxiliary parameter generation in traditional locally verifiable aggregated signatures, it makes the current stage of threshold quantum digital signatures realize the aggregated features, and reduces the complexity of the verification of aggregated signatures while realizing post-quantum security. In addition, the verification of the signature key (quantum state) of the signature members does not require measurement operations, and the generated signatures are classical, so the communication between the trusted third center (TC), the set of signature members, the classical digital signature verifier (CV), and the third-party trusted aggregation generator (TA) are all classical, simplifying the communication model. In the performance analysis we make this quantum aggregation signature scheme more flexible as well as less quantum state preparation compared to other schemes.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107934"},"PeriodicalIF":4.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative adversarial imitation learning assisted virtual network embedding algorithm for space-air-ground integrated network 生成式对抗模仿学习辅助虚拟网络嵌入算法的空-空-地一体化网络
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.comcom.2024.107936
Peiying Zhang , Ziyu Xu , Neeraj Kumar , Jian Wang , Lizhuang Tan , Ahmad Almogren

The space-air-ground integrated network (SAGIN) comprises a multitude of interconnected and integrated heterogeneous networks. Its network is large in scale, complex in structure, and highly dynamic. Virtual network embedding (VNE) is designed to efficiently allocate resources within the physical host to diverse virtual network requests (VNRs) with different constraints while improving the acceptance ratio of VNRs. However, in a heterogeneous SAGIN environment, improving the utilization of network resources while ensuring the performance of the VNE algorithm is a very challenging topic. To address the aforementioned issues, we first introduce a services diversion strategy (SDS) to select embedded nodes based on different service types and network state, thereby alleviating the uneven use of resources in different network domains. Subsequently, we propose a VNE algorithm (GAIL-VNE) based on generative adversarial imitation learning (GAIL). We construct a generator network based on the actor-critic architecture, which can generate the probability of physical nodes being embedded based on the observed network state. Secondly, we construct a discriminator network to distinguish between generator samples and expert samples, which aids in updating the generator network. After offline training, the generator and discriminator reach a Nash equilibrium through game confrontation. During the embedding process of VNRs, the output of the generator provides an effective basis for generating VNE solutions. Finally, we verify the effectiveness of this method through experiments involving offline training and online embedding.

天-空-地一体化网络(SAGIN)由众多相互连接和集成的异构网络组成。其网络规模大、结构复杂、动态性强。虚拟网络嵌入(VNE)旨在将物理主机内的资源有效地分配给具有不同约束条件的各种虚拟网络请求(VNR),同时提高虚拟网络请求的接受率。然而,在异构 SAGIN 环境中,如何在提高网络资源利用率的同时确保 VNE 算法的性能是一个极具挑战性的课题。针对上述问题,我们首先引入了服务分流策略(SDS),根据不同的服务类型和网络状态选择嵌入节点,从而缓解不同网络域资源使用不均衡的问题。随后,我们提出了一种基于生成式对抗模仿学习(GAIL)的 VNE 算法(GAIL-VNE)。我们构建了一个基于行为批判架构的生成器网络,它可以根据观察到的网络状态生成物理节点被嵌入的概率。其次,我们构建了一个鉴别器网络,用于区分生成器样本和专家样本,从而帮助更新生成器网络。经过离线训练后,生成器和鉴别器通过博弈对抗达到纳什均衡。在 VNR 的嵌入过程中,生成器的输出为生成 VNE 解决方案提供了有效的基础。最后,我们通过离线训练和在线嵌入实验验证了该方法的有效性。
{"title":"Generative adversarial imitation learning assisted virtual network embedding algorithm for space-air-ground integrated network","authors":"Peiying Zhang ,&nbsp;Ziyu Xu ,&nbsp;Neeraj Kumar ,&nbsp;Jian Wang ,&nbsp;Lizhuang Tan ,&nbsp;Ahmad Almogren","doi":"10.1016/j.comcom.2024.107936","DOIUrl":"10.1016/j.comcom.2024.107936","url":null,"abstract":"<div><p>The space-air-ground integrated network (SAGIN) comprises a multitude of interconnected and integrated heterogeneous networks. Its network is large in scale, complex in structure, and highly dynamic. Virtual network embedding (VNE) is designed to efficiently allocate resources within the physical host to diverse virtual network requests (VNRs) with different constraints while improving the acceptance ratio of VNRs. However, in a heterogeneous SAGIN environment, improving the utilization of network resources while ensuring the performance of the VNE algorithm is a very challenging topic. To address the aforementioned issues, we first introduce a services diversion strategy (SDS) to select embedded nodes based on different service types and network state, thereby alleviating the uneven use of resources in different network domains. Subsequently, we propose a VNE algorithm (GAIL-VNE) based on generative adversarial imitation learning (GAIL). We construct a generator network based on the actor-critic architecture, which can generate the probability of physical nodes being embedded based on the observed network state. Secondly, we construct a discriminator network to distinguish between generator samples and expert samples, which aids in updating the generator network. After offline training, the generator and discriminator reach a Nash equilibrium through game confrontation. During the embedding process of VNRs, the output of the generator provides an effective basis for generating VNE solutions. Finally, we verify the effectiveness of this method through experiments involving offline training and online embedding.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107936"},"PeriodicalIF":4.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative edge-caching based transmission with minimum effective delay in heterogeneous cellular networks 异构蜂窝网络中基于边缘缓存的合作传输与最小有效延迟
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.comcom.2024.107928
Jiachao Yu, Chao Zhai, Hao Dai, Lina Zheng, Yujun Li

In heterogeneous cellular networks (HCNs), neighboring users often request similar contents asynchronously. Based on the content popularity, base stations (BSs) can download and cache contents when the network is idle, and transmit them locally when the network is busy, which can effectively reduce the backhaul burden and the transmission delay. We consider a two-tier HCN, where macro base stations (MBSs) and small base stations (SBSs) can cooperatively and probabilistically cache contents. Each user is associated to the BS with the maximum average received signal power in any tier. With the cooperative content transfer between MBS tier and SBS tier, users can adaptively obtain contents from BSs or remote content servers. We properly model both wired and wireless delays when a user requests an arbitrary content, and propose the concept of effective delay. Content caching probabilities are optimized using the Marine Predators Algorithm via minimizing the average effective delay. Numerical results show that our proposed cooperative caching scheme achieves much shorter delays than the benchmark caching schemes.

在异构蜂窝网络(HCN)中,相邻用户经常异步请求类似的内容。基站(BS)可以根据内容的受欢迎程度,在网络空闲时下载并缓存内容,在网络繁忙时在本地传输内容,从而有效减少回程负担和传输延迟。我们考虑了两层 HCN,其中宏基站(MBS)和小基站(SBS)可以合作并以概率方式缓存内容。每个用户都与任意层中平均接收信号功率最大的基站相关联。通过 MBS 层和 SBS 层之间的合作内容传输,用户可以自适应地从 BS 或远程内容服务器获取内容。我们对用户请求任意内容时的有线和无线延迟进行了适当建模,并提出了有效延迟的概念。通过最小化平均有效延迟,使用海洋捕食者算法优化内容缓存概率。数值结果表明,我们提出的合作缓存方案比基准缓存方案实现了更短的延迟。
{"title":"Cooperative edge-caching based transmission with minimum effective delay in heterogeneous cellular networks","authors":"Jiachao Yu,&nbsp;Chao Zhai,&nbsp;Hao Dai,&nbsp;Lina Zheng,&nbsp;Yujun Li","doi":"10.1016/j.comcom.2024.107928","DOIUrl":"10.1016/j.comcom.2024.107928","url":null,"abstract":"<div><p>In heterogeneous cellular networks (HCNs), neighboring users often request similar contents asynchronously. Based on the content popularity, base stations (BSs) can download and cache contents when the network is idle, and transmit them locally when the network is busy, which can effectively reduce the backhaul burden and the transmission delay. We consider a two-tier HCN, where macro base stations (MBSs) and small base stations (SBSs) can cooperatively and probabilistically cache contents. Each user is associated to the BS with the maximum average received signal power in any tier. With the cooperative content transfer between MBS tier and SBS tier, users can adaptively obtain contents from BSs or remote content servers. We properly model both wired and wireless delays when a user requests an arbitrary content, and propose the concept of effective delay. Content caching probabilities are optimized using the Marine Predators Algorithm via minimizing the average effective delay. Numerical results show that our proposed cooperative caching scheme achieves much shorter delays than the benchmark caching schemes.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107928"},"PeriodicalIF":4.5,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
aBBR: An augmented BBR for collaborative intelligent transmission over heterogeneous networks in IIoT aBBR:用于 IIoT 中异构网络协同智能传输的增强型 BBR
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.comcom.2024.107932
Shujie Yang , Kefei Song , Zhenhui Yuan , Lujie Zhong , Mu Wang , Xiang Ji , Changqiao Xu

In the era of Industry 5.0, with the deep convergence of Industrial Internet of Things (IIoT) and 5G technology, stable transmission of massive data in heterogeneous networks becomes crucial. This is not only the key to improving the efficiency of human–machine collaboration, but also the basis for ensuring system continuity and reliability. The arrival of 5G has brought new challenges to the communication of IIoT in heterogeneous environments. Due to the inherent characteristics of wireless networks, such as random packet loss and network jitter, traditional transmission control schemes often fail to achieve optimal performance. In this paper we propose a novel transmission control algorithm, aBBR. It is an augmented algorithm based on BBRv3. aBBR dynamically adjusts the sending window size through real-time analysis to enhance the transmission performance in heterogeneous networks. Simulation results show that, compared to traditional algorithms, aBBR demonstrates the best comprehensive performance in terms of throughput, latency, and retransmission. When random packet loss exists in the link, aBBR improves the throughput by an average of 29.3% and decreases the retransmission rate by 18.5% while keeping the transmission delay at the same level as BBRv3.

在工业 5.0 时代,随着工业物联网(IIoT)与 5G 技术的深度融合,海量数据在异构网络中的稳定传输变得至关重要。这不仅是提高人机协作效率的关键,也是确保系统连续性和可靠性的基础。5G 的到来给异构环境中的 IIoT 通信带来了新的挑战。由于无线网络的固有特性,如随机丢包和网络抖动,传统的传输控制方案往往无法达到最佳性能。在本文中,我们提出了一种新型传输控制算法--aBBR。aBBR 通过实时分析动态调整发送窗口大小,以提高异构网络中的传输性能。仿真结果表明,与传统算法相比,aBBR 在吞吐量、延迟和重传方面的综合性能最佳。当链路中存在随机丢包时,aBBR 的吞吐量平均提高了 29.3%,重传率降低了 18.5%,同时传输延迟与 BBRv3 保持在同一水平。
{"title":"aBBR: An augmented BBR for collaborative intelligent transmission over heterogeneous networks in IIoT","authors":"Shujie Yang ,&nbsp;Kefei Song ,&nbsp;Zhenhui Yuan ,&nbsp;Lujie Zhong ,&nbsp;Mu Wang ,&nbsp;Xiang Ji ,&nbsp;Changqiao Xu","doi":"10.1016/j.comcom.2024.107932","DOIUrl":"10.1016/j.comcom.2024.107932","url":null,"abstract":"<div><p>In the era of Industry 5.0, with the deep convergence of Industrial Internet of Things (IIoT) and 5G technology, stable transmission of massive data in heterogeneous networks becomes crucial. This is not only the key to improving the efficiency of human–machine collaboration, but also the basis for ensuring system continuity and reliability. The arrival of 5G has brought new challenges to the communication of IIoT in heterogeneous environments. Due to the inherent characteristics of wireless networks, such as random packet loss and network jitter, traditional transmission control schemes often fail to achieve optimal performance. In this paper we propose a novel transmission control algorithm, aBBR. It is an augmented algorithm based on BBRv3. aBBR dynamically adjusts the sending window size through real-time analysis to enhance the transmission performance in heterogeneous networks. Simulation results show that, compared to traditional algorithms, aBBR demonstrates the best comprehensive performance in terms of throughput, latency, and retransmission. When random packet loss exists in the link, aBBR improves the throughput by an average of 29.3% and decreases the retransmission rate by 18.5% while keeping the transmission delay at the same level as BBRv3.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"226 ","pages":"Article 107932"},"PeriodicalIF":4.5,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142097138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on maximizing real demand response based on link addition in social networks 基于社交网络链接添加的真实需求响应最大化研究
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.comcom.2024.107933
Yuxin Gao , Jianming Zhu , Peikun Ni

The impact of social networks on real-life scenarios is intensifying with the diversification of the information they disseminate. Consequently, the interconnection between social networks and tangible networks is strengthening. Notably, we have observed that messages disseminated on social networks, particularly those soliciting aid, exert a significant influence on the underlying network structure. This study aims to investigate the role and importance of social networks in the information dissemination process, as well as to construct a linear threshold model tailored for the dissemination of emergency information across both real and social networks, leveraging conventional models of information spread. We have developed a model to increase the number of connection edges in social networks in order to enhance their worth. Additionally, we discovered that the objective function possesses submodular features and thus the created problem is NP-hard. As a result, we can use algorithms with approximative assurances of 1e1θ to solve our problem and ensures the accuracy of the solution. We also analyze the complexity of the algorithm in solving this problem. Finally we validated our conclusions with three publicly available datasets and one real data set to analysis the results of the solution.

随着社交网络传播信息的多样化,社交网络对现实生活的影响也在不断加强。因此,社交网络与有形网络之间的相互联系正在加强。值得注意的是,我们发现社交网络上传播的信息,尤其是那些寻求援助的信息,对底层网络结构产生了重大影响。本研究旨在研究社交网络在信息传播过程中的作用和重要性,并利用传统的信息传播模型,构建一个线性阈值模型,用于在真实网络和社交网络中传播紧急信息。我们开发了一种增加社交网络连接边数量的模型,以提高社交网络的价值。此外,我们还发现目标函数具有亚模态特征,因此所创建的问题具有 NP 难度。因此,我们可以使用近似保证为 1-e-1-θ′ 的算法来解决我们的问题,并确保解决方案的准确性。我们还分析了解决这个问题的算法的复杂性。最后,我们用三个公开数据集和一个真实数据集验证了我们的结论,分析了解决方案的结果。
{"title":"Research on maximizing real demand response based on link addition in social networks","authors":"Yuxin Gao ,&nbsp;Jianming Zhu ,&nbsp;Peikun Ni","doi":"10.1016/j.comcom.2024.107933","DOIUrl":"10.1016/j.comcom.2024.107933","url":null,"abstract":"<div><p>The impact of social networks on real-life scenarios is intensifying with the diversification of the information they disseminate. Consequently, the interconnection between social networks and tangible networks is strengthening. Notably, we have observed that messages disseminated on social networks, particularly those soliciting aid, exert a significant influence on the underlying network structure. This study aims to investigate the role and importance of social networks in the information dissemination process, as well as to construct a linear threshold model tailored for the dissemination of emergency information across both real and social networks, leveraging conventional models of information spread. We have developed a model to increase the number of connection edges in social networks in order to enhance their worth. Additionally, we discovered that the objective function possesses submodular features and thus the created problem is NP-hard. As a result, we can use algorithms with approximative assurances of <span><math><mrow><mn>1</mn><mo>−</mo><msup><mrow><mi>e</mi></mrow><mrow><mo>−</mo><mn>1</mn></mrow></msup><mo>−</mo><msup><mrow><mi>θ</mi></mrow><mrow><mo>′</mo></mrow></msup></mrow></math></span> to solve our problem and ensures the accuracy of the solution. We also analyze the complexity of the algorithm in solving this problem. Finally we validated our conclusions with three publicly available datasets and one real data set to analysis the results of the solution.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107933"},"PeriodicalIF":4.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G configured grant scheduling for seamless integration with TSN industrial networks 5G 配置的授予调度可与 TSN 工业网络无缝集成
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.comcom.2024.107930
Ana Larrañaga-Zumeta , M. Carmen Lucas-Estañ , Javier Gozálvez , Aitor Arriola

The integration of 5G (5th Generation) and TSN (Time Sensitive Networking) networks is key for the support of emerging Industry 4.0 applications, where the flexibility and adaptability of 5G will be combined with the deterministic communications features provided by TSN. For an effective and efficient 5G-TSN integration both networks need to be coordinated. However, 5G has not been designed to provide deterministic communications. In this context, this paper proposes a 5G configured grant scheduling scheme that coordinates its decision with the TSN scheduling to satisfy the deterministic and end-to-end latency requirements of industrial applications. The proposed scheme avoids scheduling conflicts that can happen when packets of different TSN flows are generated with different periodicities. The proposed scheme efficiently coordinates the access to the radio resources of different TSN flows and complies with the 3GPP (Third Generation Partnership Project) standard requirements.

5G(第五代)和 TSN(时间敏感网络)网络的集成是支持新兴工业 4.0 应用的关键,其中 5G 的灵活性和适应性将与 TSN 提供的确定性通信功能相结合。要实现有效和高效的 5G-TSN 整合,需要协调这两个网络。然而,5G 并非为提供确定性通信而设计。在此背景下,本文提出了一种 5G 配置授予调度方案,该方案将其决策与 TSN 调度相协调,以满足工业应用的确定性和端到端延迟要求。当不同 TSN 流量的数据包以不同周期生成时,所提出的方案避免了可能发生的调度冲突。拟议方案有效协调了不同 TSN 流量对无线电资源的访问,符合 3GPP(第三代合作伙伴项目)标准要求。
{"title":"5G configured grant scheduling for seamless integration with TSN industrial networks","authors":"Ana Larrañaga-Zumeta ,&nbsp;M. Carmen Lucas-Estañ ,&nbsp;Javier Gozálvez ,&nbsp;Aitor Arriola","doi":"10.1016/j.comcom.2024.107930","DOIUrl":"10.1016/j.comcom.2024.107930","url":null,"abstract":"<div><p>The integration of 5G (5th Generation) and TSN (Time Sensitive Networking) networks is key for the support of emerging Industry 4.0 applications, where the flexibility and adaptability of 5G will be combined with the deterministic communications features provided by TSN. For an effective and efficient 5G-TSN integration both networks need to be coordinated. However, 5G has not been designed to provide deterministic communications. In this context, this paper proposes a 5G configured grant scheduling scheme that coordinates its decision with the TSN scheduling to satisfy the deterministic and end-to-end latency requirements of industrial applications. The proposed scheme avoids scheduling conflicts that can happen when packets of different TSN flows are generated with different periodicities. The proposed scheme efficiently coordinates the access to the radio resources of different TSN flows and complies with the 3GPP (Third Generation Partnership Project) standard requirements.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"226 ","pages":"Article 107930"},"PeriodicalIF":4.5,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks DTL-5G:5G 及更高网络中基于深度迁移学习的 DDoS 攻击检测
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.comcom.2024.107927
Behnam Farzaneh , Nashid Shahriar , Abu Hena Al Muktadir , Md. Shamim Towhid , Mohammad Sadegh Khosravani

Network slicing is considered as a key enabler for 5G and beyond mobile networks for supporting a variety of new services, including enhanced mobile broadband, ultra-reliable and low-latency communication, and massive connectivity, on the same physical infrastructure. However, this technology increases the susceptibility of networks to cyber threats, particularly Distributed Denial-of-Service (DDoS) attacks. These attacks have the potential to cause service quality degradation by overloading network function(s) that are central to network slices to operate seamlessly. This calls for an Intrusion Detection System (IDS) as a shield against a wide array of DDoS attacks. In this regard, one promising solution would be the use of Deep Learning (DL) models for detecting possible DDoS attacks, an approach that has already made its way into the field given its manifest effectiveness. However, one particular challenge with DL models is that they require large volumes of labeled data for efficient training, which are not readily available in operational networks. A possible workaround is to resort to Transfer Learning (TL) approaches that can utilize the knowledge learned from prior training to a target domain with limited labeled data. This paper investigates how Deep Transfer Learning (DTL) based approaches can improve the detection of DDoS attacks in 5G networks by leveraging DL models, such as Bidirectional Long Short-Term Memory (BiLSTM), Convolutional Neural Network (CNN), Residual Network (ResNet), and Inception as base models. A comprehensive dataset generated in our 5G network slicing testbed serves as the source dataset for DTL, which includes both benign and different types of DDoS attack traffic. After learning features, patterns, and representations from the source dataset using initial training, we fine-tune base models using a variety of TL processes on a target DDoS attack dataset. The 5G-NIDD dataset, which has a sparse amount of annotated traffic pertaining to several DDoS attack generated in a real 5G network, is chosen as the target dataset. The results show that the proposed DTL models have performance improvements in detecting different types of DDoS attacks in 5G-NIDD dataset compared to the case when no TL is applied. According to the results, the BiLSTM and Inception models being identified as the top-performing models. BiLSTM indicates an improvement of 13.90%, 21.48%, and 12.22% in terms of accuracy, recall, and F1-score, respectively, whereas, Inception demonstrates an enhancement of 10.09% in terms of precision, compared to the models that do not adopt TL.

网络切片被认为是 5G 及以后移动网络的关键推动因素,可在相同的物理基础设施上支持各种新服务,包括增强型移动宽带、超可靠和低延迟通信以及大规模连接。然而,这种技术增加了网络对网络威胁的敏感性,特别是分布式拒绝服务(DDoS)攻击。这些攻击有可能使网络功能超负荷,从而导致服务质量下降,而这些功能对于网络切片的无缝运行至关重要。这就需要入侵检测系统(IDS)来抵御各种 DDoS 攻击。在这方面,一个很有前景的解决方案是使用深度学习(DL)模型来检测可能的 DDoS 攻击。然而,深度学习模型面临的一个特殊挑战是,它们需要大量标注数据来进行有效训练,而这在运营网络中并不容易获得。一种可能的变通方法是采用迁移学习(TL)方法,这种方法可以利用从先前训练中学到的知识,将其应用到标注数据有限的目标领域。本文研究了基于深度迁移学习(DTL)的方法如何利用双向长短期记忆(BiLSTM)、卷积神经网络(CNN)、残差网络(ResNet)和 Inception 等 DL 模型作为基础模型,改进 5G 网络中 DDoS 攻击的检测。我们的 5G 网络切片测试平台生成的综合数据集是 DTL 的源数据集,其中包括良性和不同类型的 DDoS 攻击流量。通过初始训练从源数据集中学习特征、模式和表示之后,我们在目标 DDoS 攻击数据集上使用各种 TL 流程对基础模型进行微调。我们选择了 5G-NIDD 数据集作为目标数据集,该数据集拥有与真实 5G 网络中产生的若干 DDoS 攻击相关的稀疏注释流量。结果表明,与未应用 TL 的情况相比,所提出的 DTL 模型在 5G-NIDD 数据集中检测不同类型的 DDoS 攻击时性能有所提高。结果表明,BiLSTM 和 Inception 模型表现最佳。与未采用 TL 的模型相比,BiLSTM 在准确率、召回率和 F1 分数方面分别提高了 13.90%、21.48% 和 12.22%,而 Inception 在精度方面提高了 10.09%。
{"title":"DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks","authors":"Behnam Farzaneh ,&nbsp;Nashid Shahriar ,&nbsp;Abu Hena Al Muktadir ,&nbsp;Md. Shamim Towhid ,&nbsp;Mohammad Sadegh Khosravani","doi":"10.1016/j.comcom.2024.107927","DOIUrl":"10.1016/j.comcom.2024.107927","url":null,"abstract":"<div><p>Network slicing is considered as a key enabler for 5G and beyond mobile networks for supporting a variety of new services, including enhanced mobile broadband, ultra-reliable and low-latency communication, and massive connectivity, on the same physical infrastructure. However, this technology increases the susceptibility of networks to cyber threats, particularly Distributed Denial-of-Service (DDoS) attacks. These attacks have the potential to cause service quality degradation by overloading network function(s) that are central to network slices to operate seamlessly. This calls for an Intrusion Detection System (IDS) as a shield against a wide array of DDoS attacks. In this regard, one promising solution would be the use of Deep Learning (DL) models for detecting possible DDoS attacks, an approach that has already made its way into the field given its manifest effectiveness. However, one particular challenge with DL models is that they require large volumes of labeled data for efficient training, which are not readily available in operational networks. A possible workaround is to resort to Transfer Learning (TL) approaches that can utilize the knowledge learned from prior training to a target domain with limited labeled data. This paper investigates how Deep Transfer Learning (DTL) based approaches can improve the detection of DDoS attacks in 5G networks by leveraging DL models, such as Bidirectional Long Short-Term Memory (BiLSTM), Convolutional Neural Network (CNN), Residual Network (ResNet), and Inception as base models. A comprehensive dataset generated in our 5G network slicing testbed serves as the source dataset for DTL, which includes both benign and different types of DDoS attack traffic. After learning features, patterns, and representations from the source dataset using initial training, we fine-tune base models using a variety of TL processes on a target DDoS attack dataset. The 5G-NIDD dataset, which has a sparse amount of annotated traffic pertaining to several DDoS attack generated in a real 5G network, is chosen as the target dataset. The results show that the proposed DTL models have performance improvements in detecting different types of DDoS attacks in 5G-NIDD dataset compared to the case when no TL is applied. According to the results, the BiLSTM and Inception models being identified as the top-performing models. BiLSTM indicates an improvement of 13.90%, 21.48%, and 12.22% in terms of accuracy, recall, and F1-score, respectively, whereas, Inception demonstrates an enhancement of 10.09% in terms of precision, compared to the models that do not adopt TL.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107927"},"PeriodicalIF":4.5,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noncoherent multiuser massive SIMO with mixed differential and index modulation 采用混合差分和指数调制的非相干多用户大规模 SIMO
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.comcom.2024.107931
Xiangchuan Gao , Yancong Li , Zheng Dong , Xingwang Li

This paper proposes a new mixed differential and index modulation framework for noncoherent multiuser massive single-input multiple-output (SIMO) systems. While differential modulation and detection is a popular noncoherent scheme, its constellation collisions limit the resulting error performance. To address this issue, we introduce a user with binary index modulation (IM) among the differential users, achieving much reduced collisions. We then analyze a three-user SIMO system with binary modulations, attained a closed-form bit error rate (BER) expression with a fast noncoherent maximum-likelihood (ML) detection algorithm for each user. Furthermore, a closed-form optimal power loading vector is derived by minimizing the worst-case BER under individual power constraints. Finally, an efficient one-dimensional bisection search algorithm is employed to optimize constellations for arbitrary numbers of differential users and constellation sizes by minimizing the system BER. Simulation results validate the theoretical analysis and demonstrate the superiority of the proposed scheme compared to existing differential schemes.

本文为非相干多用户大规模单输入多输出(SIMO)系统提出了一种新的混合差分和索引调制框架。虽然差分调制和检测是一种流行的非相干方案,但其星座碰撞限制了由此产生的误差性能。为了解决这个问题,我们在差分用户中引入了一个二进制索引调制(IM)用户,从而大大减少了碰撞。然后,我们分析了采用二进制调制的三用户 SIMO 系统,为每个用户采用快速非相干最大似然 (ML) 检测算法,获得了闭式误码率 (BER) 表达式。此外,通过最小化单个功率约束下的最坏误码率,得出了闭式最优功率负载向量。最后,通过最小化系统误码率,采用高效的一维分段搜索算法来优化任意差分用户数和星座大小的星座。仿真结果验证了理论分析,并证明了与现有差分方案相比,拟议方案的优越性。
{"title":"Noncoherent multiuser massive SIMO with mixed differential and index modulation","authors":"Xiangchuan Gao ,&nbsp;Yancong Li ,&nbsp;Zheng Dong ,&nbsp;Xingwang Li","doi":"10.1016/j.comcom.2024.107931","DOIUrl":"10.1016/j.comcom.2024.107931","url":null,"abstract":"<div><p>This paper proposes a new mixed differential and index modulation framework for noncoherent multiuser massive single-input multiple-output (SIMO) systems. While differential modulation and detection is a popular noncoherent scheme, its constellation collisions limit the resulting error performance. To address this issue, we introduce a user with binary index modulation (IM) among the differential users, achieving much reduced collisions. We then analyze a three-user SIMO system with binary modulations, attained a closed-form bit error rate (BER) expression with a fast noncoherent maximum-likelihood (ML) detection algorithm for each user. Furthermore, a closed-form optimal power loading vector is derived by minimizing the worst-case BER under individual power constraints. Finally, an efficient one-dimensional bisection search algorithm is employed to optimize constellations for arbitrary numbers of differential users and constellation sizes by minimizing the system BER. Simulation results validate the theoretical analysis and demonstrate the superiority of the proposed scheme compared to existing differential schemes.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107931"},"PeriodicalIF":4.5,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0140366424002780/pdfft?md5=04ca178949f6a116168982cd2b675a94&pid=1-s2.0-S0140366424002780-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142161739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure workflow scheduling algorithm utilizing hybrid optimization in mobile edge computing environments 移动边缘计算环境中利用混合优化的安全工作流调度算法
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1016/j.comcom.2024.107929
Dileep Kumar Sajnani, Xiaoping Li, Abdul Rasheed Mahesar

The rapid advancement of mobile communication technology and devices has greatly improved our way of life. It also presents a new possibility that data sources can be used to accomplish computing tasks at nearby locations. Mobile Edge Computing (MEC) is a computing model that provides computer resources specifically designed to handle mobile tasks. Nevertheless, there are certain obstacles that must be carefully tackled, specifically regarding the security and quality of services in the workflow scheduling over MEC. This research proposes a new method called Feedback Artificial Remora Optimization (FARO)-based workflow scheduling method to address the issues of scheduling processes with improved security in MEC. In this context, the fitness functions that are taken into account include multi-objective, such as CPU utilization, memory utilization, encryption cost, and execution time. These functions are used to enhance the scheduling of workflow tasks based on security considerations. The FARO algorithm is a combination of the Feedback Artificial Tree (FAT) and the Remora Optimization Algorithm (ROA). The experimental findings have demonstrated that the developed approach surpassed current methods by a large margin in terms of CPU use, memory consumption, encryption cost, and execution time, with values of 0.012, 0.010, 0.017, and 0.036, respectively.

移动通信技术和设备的飞速发展极大地改善了我们的生活方式。这也带来了一种新的可能性,即数据源可用于完成附近地点的计算任务。移动边缘计算(MEC)是一种计算模式,它提供专门用于处理移动任务的计算机资源。然而,有一些障碍必须认真解决,特别是在 MEC 上工作流调度的安全性和服务质量方面。本研究提出了一种新方法,即基于反馈人工雷莫拉优化(FARO)的工作流调度方法,以解决在 MEC 中提高安全性的流程调度问题。在这种情况下,考虑的适应度函数包括多目标,如 CPU 利用率、内存利用率、加密成本和执行时间。这些函数用于基于安全考虑因素加强工作流任务的调度。FARO 算法是反馈人工树(FAT)和 Remora 优化算法(ROA)的结合。实验结果表明,所开发的方法在 CPU 占用、内存消耗、加密成本和执行时间方面大大超过了现有方法,其值分别为 0.012、0.010、0.017 和 0.036。
{"title":"Secure workflow scheduling algorithm utilizing hybrid optimization in mobile edge computing environments","authors":"Dileep Kumar Sajnani,&nbsp;Xiaoping Li,&nbsp;Abdul Rasheed Mahesar","doi":"10.1016/j.comcom.2024.107929","DOIUrl":"10.1016/j.comcom.2024.107929","url":null,"abstract":"<div><p>The rapid advancement of mobile communication technology and devices has greatly improved our way of life. It also presents a new possibility that data sources can be used to accomplish computing tasks at nearby locations. Mobile Edge Computing (MEC) is a computing model that provides computer resources specifically designed to handle mobile tasks. Nevertheless, there are certain obstacles that must be carefully tackled, specifically regarding the security and quality of services in the workflow scheduling over MEC. This research proposes a new method called Feedback Artificial Remora Optimization (FARO)-based workflow scheduling method to address the issues of scheduling processes with improved security in MEC. In this context, the fitness functions that are taken into account include multi-objective, such as CPU utilization, memory utilization, encryption cost, and execution time. These functions are used to enhance the scheduling of workflow tasks based on security considerations. The FARO algorithm is a combination of the Feedback Artificial Tree (FAT) and the Remora Optimization Algorithm (ROA). The experimental findings have demonstrated that the developed approach surpassed current methods by a large margin in terms of CPU use, memory consumption, encryption cost, and execution time, with values of 0.012, 0.010, 0.017, and 0.036, respectively.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"226 ","pages":"Article 107929"},"PeriodicalIF":4.5,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142097136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1