首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Whale optimization-orchestrated Federated Learning-based resource allocation scheme for D2D communication 基于联合学习的 D2D 通信鲸式优化资源分配方案
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-31 DOI: 10.1016/j.adhoc.2024.103565
Nilesh Kumar Jadav, Sudeep Tanwar

Device-to-Device (D2D) communication plays a prominent role in mobile data offloading from the cellular infrastructure (e.g., base station). This paradigm empowers user equipment to communicate with each other directly, offering an efficient resort for data communication that eliminates the need for the base station. However, significant challenges, such as interference, resource allocation, and energy efficiency, impede the performance of D2D communication. In the context of resource allocation, most of the existing work primarily focuses on game and graph theoretical models, which raises the computational complexity as the number of D2D users increases. In this article, we formulated a sum rate maximization problem, which is solved using a combinatorial scheme comprised of Whale Optimization Algorithm (WOA) and Federated Learning (FL). First, we discover the optimal CUs-D2D Groups (D2DGs) pairs by utilizing the social behavior of whales in the WOA. Only these optimal links are permitted to participate in the FL-based resource allocation, ensuring a physical layer access control. Next, we generated a dataset from the WOA-based optimal CU-D2DG links, which is employed by the Convolutional Neural Network (CNN) model for decentralized learning. FL offers a proactive decision for resource assignment, i.e., whose CU resources will be used by the D2DG. The proposed scheme is evaluated by considering different performance parameters, such as convergence rate, statistical measure (accuracy, loss), fairness (0.72), and overall sum rate (25Mbps).

设备到设备(D2D)通信在从蜂窝基础设施(如基站)卸载移动数据方面发挥着重要作用。这种模式使用户设备能够直接相互通信,为数据通信提供了一个有效的途径,从而消除了对基站的需求。然而,干扰、资源分配和能源效率等重大挑战阻碍了 D2D 通信的性能。在资源分配方面,大多数现有工作主要集中在博弈和图论模型上,随着 D2D 用户数量的增加,计算复杂度也随之提高。在本文中,我们提出了一个总和速率最大化问题,并使用由鲸鱼优化算法(WOA)和联合学习(FL)组成的组合方案来解决该问题。首先,我们利用鲸鱼在 WOA 中的社会行为,发现最优的 CUs-D2D Groups(D2DGs)对。只有这些最佳链路才被允许参与基于 FL 的资源分配,从而确保物理层访问控制。接下来,我们从基于 WOA 的最优 CU-D2DG 链路中生成了一个数据集,该数据集被卷积神经网络 (CNN) 模型用于分散学习。FL 为资源分配提供了主动决策,即 D2DG 将使用谁的 CU 资源。通过考虑不同的性能参数,如收敛速率、统计量(准确度、损失)、公平性(0.72)和总和速率(≈25Mbps),对所提出的方案进行了评估。
{"title":"Whale optimization-orchestrated Federated Learning-based resource allocation scheme for D2D communication","authors":"Nilesh Kumar Jadav,&nbsp;Sudeep Tanwar","doi":"10.1016/j.adhoc.2024.103565","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103565","url":null,"abstract":"<div><p>Device-to-Device (D2D) communication plays a prominent role in mobile data offloading from the cellular infrastructure (e.g., base station). This paradigm empowers user equipment to communicate with each other directly, offering an efficient resort for data communication that eliminates the need for the base station. However, significant challenges, such as interference, resource allocation, and energy efficiency, impede the performance of D2D communication. In the context of resource allocation, most of the existing work primarily focuses on game and graph theoretical models, which raises the computational complexity as the number of D2D users increases. In this article, we formulated a sum rate maximization problem, which is solved using a combinatorial scheme comprised of Whale Optimization Algorithm (WOA) and Federated Learning (FL). First, we discover the optimal CUs-D2D Groups (D2DGs) pairs by utilizing the social behavior of whales in the WOA. Only these optimal links are permitted to participate in the FL-based resource allocation, ensuring a physical layer access control. Next, we generated a dataset from the WOA-based optimal CU-D2DG links, which is employed by the Convolutional Neural Network (CNN) model for decentralized learning. FL offers a proactive decision for resource assignment, i.e., whose CU resources will be used by the D2DG. The proposed scheme is evaluated by considering different performance parameters, such as convergence rate, statistical measure (accuracy, loss), fairness (0.72), and overall sum rate (<span><math><mrow><mo>≈</mo><mn>25</mn><mspace></mspace><mtext>Mbps</mtext></mrow></math></span>).</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep learning framework for blockage mitigation and duration prediction in mmWave wireless networks 用于毫米波无线网络阻塞缓解和持续时间预测的深度学习框架
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-25 DOI: 10.1016/j.adhoc.2024.103562
Ahmed Almutairi , Alireza Keshavarz-Haddad , Ehsan Aryafar

Millimeter-Wave (mmWave) communication can be highly affected by blockages, which can drastically decrease the signal strength at the receiver side. To overcome the impact of blockages, predicting the optimal mitigation technique and accurately estimating the duration of the blockage events are crucial for maintaining reliable and high-performance mmWave communication systems. Prior works on mitigating blockages have proposed a variety of model and protocol-based blockage mitigation solutions that concentrate on a singular technique at a time, like switching the current beam to an alternative beam at the current base station or client. In this paper, we tackle the overarching question: what blockage mitigation technique should be employed? and what is the optimal sub-selection within that technique? We also address the blockage duration estimation problem. We solve these problems by developing a Gated Recurrent Unit (GRU) model, trained on data from periodic message exchanges in mmWave systems. We tested our neural network models by utilizing a mmWave simulator that is commercially available and widely used in wireless communication to compile a large amount of dataset for this purpose. Our findings reveal that our proposed method introduces no extra communication overhead, while achieving remarkable accuracy, exceeding 91%, in predicting the optimal blockage mitigation technique. Moreover, the blockage duration estimation model achieves a very high accuracy with a residual mean error of less than 0.04 s. Finally, we demonstrate that our proposed blockage mitigation method substantially boosts the volume of data transferred in comparison to various other blockage mitigation strategies.

毫米波(mmWave)通信会受到阻塞的严重影响,这会大大降低接收端的信号强度。为了克服阻塞的影响,预测最佳缓解技术和准确估计阻塞事件的持续时间对于维护可靠和高性能的毫米波通信系统至关重要。之前有关缓解阻塞的研究提出了各种基于模型和协议的阻塞缓解解决方案,这些方案每次只集中使用一种技术,如在当前基站或客户端将当前波束切换为替代波束。在本文中,我们要解决的首要问题是:应采用哪种阻塞缓解技术? 该技术中的最佳子选择是什么?我们还解决了阻塞持续时间估计问题。为了解决这些问题,我们开发了一个门控递归单元(GRU)模型,并根据毫米波系统中周期性信息交换的数据进行了训练。我们利用市场上广泛应用于无线通信领域的毫米波模拟器,为此编制了大量数据集,从而测试了我们的神经网络模型。我们的研究结果表明,我们提出的方法没有引入额外的通信开销,同时在预测最佳阻塞缓解技术方面取得了显著的准确性,准确率超过 91%。最后,我们证明,与其他各种阻塞缓解策略相比,我们提出的阻塞缓解方法大大提高了数据传输量。
{"title":"A deep learning framework for blockage mitigation and duration prediction in mmWave wireless networks","authors":"Ahmed Almutairi ,&nbsp;Alireza Keshavarz-Haddad ,&nbsp;Ehsan Aryafar","doi":"10.1016/j.adhoc.2024.103562","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103562","url":null,"abstract":"<div><p>Millimeter-Wave (mmWave) communication can be highly affected by blockages, which can drastically decrease the signal strength at the receiver side. To overcome the impact of blockages, predicting the optimal mitigation technique and accurately estimating the duration of the blockage events are crucial for maintaining reliable and high-performance mmWave communication systems. Prior works on mitigating blockages have proposed a variety of model and protocol-based blockage mitigation solutions that concentrate on a singular technique at a time, like switching the current beam to an alternative beam at the current base station or client. In this paper, we tackle the overarching question: <em>what blockage mitigation technique should be employed?</em> and <em>what is the optimal sub-selection within that technique?</em> We also address the blockage duration estimation problem. We solve these problems by developing a Gated Recurrent Unit (GRU) model, trained on data from periodic message exchanges in mmWave systems. We tested our neural network models by utilizing a mmWave simulator that is commercially available and widely used in wireless communication to compile a large amount of dataset for this purpose. Our findings reveal that our proposed method introduces no extra communication overhead, while achieving remarkable accuracy, exceeding 91%, in predicting the optimal blockage mitigation technique. Moreover, the blockage duration estimation model achieves a very high accuracy with a residual mean error of less than 0.04 s. Finally, we demonstrate that our proposed blockage mitigation method substantially boosts the volume of data transferred in comparison to various other blockage mitigation strategies.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141241624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache content placement in the presence of fictitious requests in mmWave 5G IAB networks 毫米波 5G IAB 网络中存在虚假请求时的缓存内容放置
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-25 DOI: 10.1016/j.adhoc.2024.103563
Fatemeh Sadat Hashemi Nazarifard , Zahra Rashidi , Vesal Hakami

Caching popular content at the edge of wireless networks leads to backhaul congestion mitigation. To come up with an effective caching policy, content popularity distribution should be taken into account, which is not accurately known in most practical scenarios. Moreover, the mobile users’ (MU) request pattern may not always follow a well-defined distribution since some malicious MUs may deliberately issue their requests incompatible with the content popularity statistics. In this paper, we consider the problem of cache content placement in a 5G mmWave small cell network that relies on integrated access and backhaul (IAB) technology for pushing contents to MUs. We assume that the IAB node is equipped with a cache and has no prior knowledge about the content popularity profiles; instead, it only relies on the observation of the instantaneous demands to shape its caching policy. Also, malicious MUs may exist whose goals are to increase cache miss by issuing fictitious requests. The IAB node decides on which contents to cache and for how long, given that frequently replacing contents incurs administrative costs. We model the content placement problem as an ”adversarial combinatorial multi-armed bandit process with switching costs (ACMAB-SC)” and present an online learning algorithm for shaping the caching policy. We conduct extensive simulation experiments to evaluate the convergence property and assess the performance of our algorithm in terms of backhaul congestion, delay, and cache hit ratio. We also compare against two baseline online learning schemes, including a CMAB-based approach and a generic caching policy based on the ”Follow the Perturbed Leader (FPL)” algorithm.

在无线网络边缘缓存热门内容可缓解回程拥塞。要制定有效的缓存策略,必须考虑到内容的流行度分布,而在大多数实际应用场景中,这一点并不准确。此外,移动用户(MU)的请求模式可能并不总是遵循定义明确的分布,因为一些恶意的 MU 可能会故意发出与内容流行度统计不符的请求。本文考虑了 5G 毫米波小蜂窝网络中的缓存内容放置问题,该网络依靠集成接入和回程(IAB)技术向 MU 推送内容。我们假设 IAB 节点配备了缓存,但事先并不了解内容的流行程度;相反,它只能依靠观察瞬时需求来制定缓存策略。此外,恶意 MU 也可能存在,其目的是通过发出虚假请求来增加缓存缺失。考虑到频繁更换内容会产生管理成本,IAB 节点会决定缓存哪些内容以及缓存多长时间。我们将内容放置问题建模为 "具有切换成本的对抗性组合多臂强盗过程(ACMAB-SC)",并提出了一种在线学习算法来制定缓存策略。我们进行了大量模拟实验,以评估收敛特性,并从回程拥塞、延迟和缓存命中率等方面评估了算法的性能。我们还比较了两种基准在线学习方案,包括基于 CMAB 的方法和基于 "跟随扰动领导者 (FPL) "算法的通用缓存策略。
{"title":"Cache content placement in the presence of fictitious requests in mmWave 5G IAB networks","authors":"Fatemeh Sadat Hashemi Nazarifard ,&nbsp;Zahra Rashidi ,&nbsp;Vesal Hakami","doi":"10.1016/j.adhoc.2024.103563","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103563","url":null,"abstract":"<div><p>Caching popular content at the edge of wireless networks leads to backhaul congestion mitigation. To come up with an effective caching policy, content popularity distribution should be taken into account, which is not accurately known in most practical scenarios. Moreover, the mobile users’ (MU) request pattern may not always follow a well-defined distribution since some malicious MUs may deliberately issue their requests incompatible with the content popularity statistics. In this paper, we consider the problem of cache content placement in a 5G mmWave small cell network that relies on integrated access and backhaul (IAB) technology for pushing contents to MUs. We assume that the IAB node is equipped with a cache and has no prior knowledge about the content popularity profiles; instead, it only relies on the observation of the instantaneous demands to shape its caching policy. Also, malicious MUs may exist whose goals are to increase cache miss by issuing fictitious requests. The IAB node decides on which contents to cache and for how long, given that frequently replacing contents incurs administrative costs. We model the content placement problem as an ”adversarial combinatorial multi-armed bandit process with switching costs (ACMAB-SC)” and present an online learning algorithm for shaping the caching policy. We conduct extensive simulation experiments to evaluate the convergence property and assess the performance of our algorithm in terms of backhaul congestion, delay, and cache hit ratio. We also compare against two baseline online learning schemes, including a CMAB-based approach and a generic caching policy based on the ”Follow the Perturbed Leader (FPL)” algorithm.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple hypothesis testing in cognitive IoT sensor network 认知物联网传感器网络中的多重假设检验
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-24 DOI: 10.1016/j.adhoc.2024.103559
Vidyapati Jha, Priyanka Tripathi

Recent Internet of Things (IoT) research aims to develop generic objects to learn, reason, and perceive their environment. Therefore, a new area has emerged known as cognitive IoT (CIoT). The cognitive Internet of Things integrates IoT with intelligence and behaves as well as humans through intelligent functionality. Several inferential tasks in CIoT require multiple hypothesis testing. The situation becomes cumbersome when the data is massive and heterogeneous. Thus, this research suggests a novel technique for multiple-hypothesis testing that uses a copula function to deal effectively with massive heterogeneous data. In addition, these data may contain missing or corrupted entries. Hence, it introduced probabilistic clustering, which reduces model inefficiency and takes control over the false discovery rate (FDR). Most of the variance from each cluster was extracted using kernel principal component analysis (KPCA) to reduce the processing burden at the fusion centre. Subsequently, it computes the p-value of each cluster's first principal component data and employs the Bonferroni method for multiple hypothesis testing. Finally, this research study evaluates the performance of the proposed algorithm on six-month environmental data, revealing that the proposed technique is efficient in terms of accuracy and computation time compared to other methods in the presence of massive heterogeneous data.

最近的物联网(IoT)研究旨在开发能够学习、推理和感知环境的通用对象。因此,出现了一个被称为认知物联网(CIoT)的新领域。认知物联网将物联网与智能集成在一起,通过智能功能使物联网的行为与人类无异。认知物联网中的一些推理任务需要进行多重假设检验。当数据是海量和异构的时候,情况就会变得繁琐。因此,本研究提出了一种新的多重假设检验技术,它使用 copula 函数来有效处理海量异构数据。此外,这些数据可能包含缺失或损坏的条目。因此,该研究引入了概率聚类,从而降低了模型的低效率,并控制了错误发现率(FDR)。使用核主成分分析(KPCA)提取每个聚类的大部分方差,以减轻融合中心的处理负担。随后,它计算每个聚类的第一主成分数据的 p 值,并采用 Bonferroni 方法进行多重假设检验。最后,本研究评估了所提算法在六个月环境数据上的性能,结果表明,在存在大量异构数据的情况下,与其他方法相比,所提技术在准确性和计算时间方面都很高效。
{"title":"Multiple hypothesis testing in cognitive IoT sensor network","authors":"Vidyapati Jha,&nbsp;Priyanka Tripathi","doi":"10.1016/j.adhoc.2024.103559","DOIUrl":"10.1016/j.adhoc.2024.103559","url":null,"abstract":"<div><p>Recent Internet of Things (IoT) research aims to develop generic objects to learn, reason, and perceive their environment. Therefore, a new area has emerged known as cognitive IoT (CIoT). The cognitive Internet of Things integrates IoT with intelligence and behaves as well as humans through intelligent functionality. Several inferential tasks in CIoT require multiple hypothesis testing. The situation becomes cumbersome when the data is massive and heterogeneous. Thus, this research suggests a novel technique for multiple-hypothesis testing that uses a copula function to deal effectively with massive heterogeneous data. In addition, these data may contain missing or corrupted entries. Hence, it introduced probabilistic clustering, which reduces model inefficiency and takes control over the false discovery rate (FDR). Most of the variance from each cluster was extracted using kernel principal component analysis (KPCA) to reduce the processing burden at the fusion centre. Subsequently, it computes the p-value of each cluster's first principal component data and employs the Bonferroni method for multiple hypothesis testing. Finally, this research study evaluates the performance of the proposed algorithm on six-month environmental data, revealing that the proposed technique is efficient in terms of accuracy and computation time compared to other methods in the presence of massive heterogeneous data.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141133148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partitioned uneven cluster routing algorithm based on gray wolf optimization in WSNs WSN 中基于灰狼优化的分区不均匀集群路由算法
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-24 DOI: 10.1016/j.adhoc.2024.103564
Yizhuo Zhou, Licui Zhang, Wanglai Li

WSNs have various uses across numerous industries and are one of the essential technologies of modern life. Energy consumption is the issue that has drawn the greatest attention and still has to be resolved because the nodes that comprise WSNs have a limited amount of energy. Numerous factors influence energy consumption, and our algorithm design considerations are centered on extending the network lifetime and energy efficiency through the resolution of imbalance and hotspot issues related to WSNs clustering. Because of this, we suggest a partitioned uneven cluster routing algorithm based on gray wolf optimization. To find the ideal cluster head, we first divide the network into areas with distinct important influence factors, then we improve the final cluster head election function and the candidate cluster head competition radius. Subsequently, to reduce the energy consumption resulting from multiple rounds of clustering, similarity determination is introduced. Finally, the optimal transmission path in the multi-hop process is obtained by combining the Gray Wolf optimization algorithm with the relay node selection function. Simulation results show that the network lifetime of the proposed algorithm is extended by 54.6 %, 46.2 %, 58.6 %, and 18.5 % compared to LEACH, DEBUC, LEACH-EDP, and LEACH-IM, respectively. The energy efficiency of the proposed algorithm is extended by 40.8 %, 7.1 %, 22.7 %, and 34.0 %, respectively. The proposed algorithm significantly extends the network lifetime and improves the energy efficiency of the network.

WSN 在各行各业有着不同的用途,是现代生活中必不可少的技术之一。由于组成 WSN 的节点的能量有限,因此能耗是最受关注的问题,而且仍有待解决。影响能耗的因素有很多,我们在算法设计时考虑的核心是通过解决与 WSNs 集群相关的不平衡和热点问题,延长网络寿命并提高能效。因此,我们提出了一种基于灰狼优化的分区不均匀簇路由算法。为了找到理想的簇头,我们首先将网络划分为具有不同重要影响因素的区域,然后改进最终簇头选举函数和候选簇头竞争半径。随后,为了减少多轮聚类带来的能量消耗,引入了相似性判断。最后,结合灰狼优化算法和中继节点选择函数,得到多跳过程中的最优传输路径。仿真结果表明,与 LEACH、DEBUC、LEACH-EDP 和 LEACH-IM 相比,所提算法的网络寿命分别延长了 54.6%、46.2%、58.6% 和 18.5%。所提算法的能效分别提高了 40.8%、7.1%、22.7% 和 34.0%。所提出的算法大大延长了网络的寿命,提高了网络的能效。
{"title":"Partitioned uneven cluster routing algorithm based on gray wolf optimization in WSNs","authors":"Yizhuo Zhou,&nbsp;Licui Zhang,&nbsp;Wanglai Li","doi":"10.1016/j.adhoc.2024.103564","DOIUrl":"10.1016/j.adhoc.2024.103564","url":null,"abstract":"<div><p>WSNs have various uses across numerous industries and are one of the essential technologies of modern life. Energy consumption is the issue that has drawn the greatest attention and still has to be resolved because the nodes that comprise WSNs have a limited amount of energy. Numerous factors influence energy consumption, and our algorithm design considerations are centered on extending the network lifetime and energy efficiency through the resolution of imbalance and hotspot issues related to WSNs clustering. Because of this, we suggest a partitioned uneven cluster routing algorithm based on gray wolf optimization. To find the ideal cluster head, we first divide the network into areas with distinct important influence factors, then we improve the final cluster head election function and the candidate cluster head competition radius. Subsequently, to reduce the energy consumption resulting from multiple rounds of clustering, similarity determination is introduced. Finally, the optimal transmission path in the multi-hop process is obtained by combining the Gray Wolf optimization algorithm with the relay node selection function. Simulation results show that the network lifetime of the proposed algorithm is extended by 54.6 %, 46.2 %, 58.6 %, and 18.5 % compared to LEACH, DEBUC, LEACH-EDP, and LEACH-IM, respectively. The energy efficiency of the proposed algorithm is extended by 40.8 %, 7.1 %, 22.7 %, and 34.0 %, respectively. The proposed algorithm significantly extends the network lifetime and improves the energy efficiency of the network.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141134270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An active jamming-based helper deployment scheme for underwater acoustic sensor networks 基于主动干扰的水下声学传感器网络辅助部署方案
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-24 DOI: 10.1016/j.adhoc.2024.103561
Yishan Su, Guoqing Pan, Luyu Li, Rong Fan

Underwater acoustic sensor networks (UASNs) are usually deployed in unattended, opaque and even hostile environments; thus, they may face serious threats. In the last few years, physical layer security (PLS) has emerged as a new technique that can improve the security performance of networks. In this paper, we research the physical layer security scheme of UASNs by actively jamming against eavesdropping attacks. Utilizing the large propagation delay of the underwater acoustic (UWA) signal, the jamming signals can interfere with legitimate signals to prevent eavesdropping. Therefore, we propose an active jamming-based helper deployment scheme (AJHDS) for UASNs, which deploys the helpers to the target water area and realizes the secure transmission of the network. Both the simulation and field test results show that the scheme can significantly reduce the interception capability of eavesdroppers. Furthermore, the field sea experiment evaluates that the location of helpers affects the eavesdropper’s acquisition of legitimate data packets.

水下声学传感器网络(UASN)通常部署在无人值守、不透明甚至敌对的环境中,因此可能面临严重威胁。最近几年,物理层安全(PLS)作为一种新技术出现,可以提高网络的安全性能。本文研究了 UASN 的物理层安全方案,通过主动干扰来抵御窃听攻击。利用水下声学(UWA)信号的大传播延迟,干扰信号可以干扰合法信号,从而防止窃听。因此,我们为 UASNs 提出了一种基于主动干扰的帮助器部署方案(AJHDS),将帮助器部署到目标水域,实现网络的安全传输。仿真和实地测试结果表明,该方案能显著降低窃听者的拦截能力。此外,实地海上实验还评估了帮助者的位置对窃听者获取合法数据包的影响。
{"title":"An active jamming-based helper deployment scheme for underwater acoustic sensor networks","authors":"Yishan Su,&nbsp;Guoqing Pan,&nbsp;Luyu Li,&nbsp;Rong Fan","doi":"10.1016/j.adhoc.2024.103561","DOIUrl":"10.1016/j.adhoc.2024.103561","url":null,"abstract":"<div><p>Underwater acoustic sensor networks (UASNs) are usually deployed in unattended, opaque and even hostile environments; thus, they may face serious threats. In the last few years, physical layer security (PLS) has emerged as a new technique that can improve the security performance of networks. In this paper, we research the physical layer security scheme of UASNs by actively jamming against eavesdropping attacks. Utilizing the large propagation delay of the underwater acoustic (UWA) signal, the jamming signals can interfere with legitimate signals to prevent eavesdropping. Therefore, we propose an active jamming-based helper deployment scheme (AJHDS) for UASNs, which deploys the helpers to the target water area and realizes the secure transmission of the network. Both the simulation and field test results show that the scheme can significantly reduce the interception capability of eavesdroppers. Furthermore, the field sea experiment evaluates that the location of helpers affects the eavesdropper’s acquisition of legitimate data packets.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141130562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed multi-hop clustering algorithm for aeronautical ad-hoc network 用于航空 ad-hoc 网络的分布式多跳聚类算法
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-23 DOI: 10.1016/j.adhoc.2024.103547
Laiwei Jiang , Zheng Chen , Hongyu Yang , Zhenyu Na

The aeronautical ad-hoc network (AANET) aims to provide a wider network connection for aircraft by creating links between them. However, the high speed of flight of aircraft leads to poor sustainability of AANET topology. In order to solve the problem of poor network topological stability, this study proposes a clustering method, called distributed multi-hop clustering algorithm (DMCA), for AANET. DMCA is based on the defined node stability weight and the concept of multi-hop clustering, which can effectively ensure the coverage and stability of clustering. In this study, we divided DMCA into three phases: information table generation stage, cluster head selection and cluster formation stage, and cluster maintenance stage. In order to verify the effectiveness of the proposed method, we compare the proposed method with N-hop, DMCNF, and K-means algorithms from four aspects: average cluster head duration, average cluster member duration, number of cluster head changes, and average number of link broken. According to the simulation results, it can be concluded that the proposed method has improved in these four performance indicators.

航空特设网络(AANET)旨在通过在飞机之间建立链接,为飞机提供更广泛的网络连接。然而,飞机的高速飞行导致 AANET 拓扑的可持续性较差。为了解决网络拓扑稳定性差的问题,本研究提出了一种针对 AANET 的聚类方法,即分布式多跳聚类算法(DMCA)。DMCA 基于定义的节点稳定性权重和多跳聚类概念,能有效保证聚类的覆盖率和稳定性。本研究将 DMCA 分成三个阶段:信息表生成阶段、簇头选择和簇形成阶段以及簇维护阶段。为了验证所提方法的有效性,我们从平均簇头持续时间、平均簇成员持续时间、簇头变化次数和平均链路中断次数四个方面将所提方法与 N-hop、DMCNF 和 K-means 算法进行了比较。根据仿真结果,可以得出结论:本文提出的方法在这四个性能指标上都有所改进。
{"title":"Distributed multi-hop clustering algorithm for aeronautical ad-hoc network","authors":"Laiwei Jiang ,&nbsp;Zheng Chen ,&nbsp;Hongyu Yang ,&nbsp;Zhenyu Na","doi":"10.1016/j.adhoc.2024.103547","DOIUrl":"10.1016/j.adhoc.2024.103547","url":null,"abstract":"<div><p>The aeronautical ad-hoc network (AANET) aims to provide a wider network connection for aircraft by creating links between them. However, the high speed of flight of aircraft leads to poor sustainability of AANET topology. In order to solve the problem of poor network topological stability, this study proposes a clustering method, called distributed multi-hop clustering algorithm (DMCA), for AANET. DMCA is based on the defined node stability weight and the concept of multi-hop clustering, which can effectively ensure the coverage and stability of clustering. In this study, we divided DMCA into three phases: information table generation stage, cluster head selection and cluster formation stage, and cluster maintenance stage. In order to verify the effectiveness of the proposed method, we compare the proposed method with N-hop, DMCNF, and K-means algorithms from four aspects: average cluster head duration, average cluster member duration, number of cluster head changes, and average number of link broken. According to the simulation results, it can be concluded that the proposed method has improved in these four performance indicators.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141131053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing MPTCP performance in wireless networks with PRS-MPTCP 利用 PRS-MPTCP 提高无线网络中的 MPTCP 性能
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-23 DOI: 10.1016/j.adhoc.2024.103560
Atefeh Ahmadniai Khajekini , Hasan Amca , Ali Hakan Ulusoy , Enver Ever

In recent years, there has been a significant increasing demand for wireless networks, particularly mobile communication. Additionally, smart devices like mobile phones and tablets are able to use multiple interfaces simultaneously. In this regard, the concept of Multipath TCP (MPTCP) has been introduced, enabling the utilization of multiple interfaces for concurrent communication. However, packet loss and subflow heterogeneity, especially in wireless networks, cause an increase in Out-of-Order (OfO) packets at the receiver node, which leads to a decrease in the total MPTCP throughput. To address these performance-related challenges, numerous schedulers have been proposed. However, most existing methods have primarily focused on improving performance without adequately considering the impact of packet loss. This research paper provides a comprehensive overview of MPTCP schedulers. Subsequently, we propose a Practical and Robust Scheduler for MPTCP (PRS-MPTCP) with the specific aim of minimizing OfO packets to improve MPTCP performance in wireless systems. The PRS-MPTCP scheduler takes into account various characteristics of each subflow, including RTT, CWND, and the number of packet losses, to effectively decide which packets should be assigned to which subflow. By using Mininet-WiFi emulation, fair comparisons between PRS-MPTCP and the state-of-the-art schedulers have been conducted, considering throughput, the number of OfO packets, and retransmission rates as performance metrics. The evaluation results reveal the profound impact of selected parameters on the behavior of the schedulers and the overall performance of MPTCP. Ultimately, the results demonstrate that PRS-MPTCP guarantees acceptable throughput and achieves lower retransmission rates and fewer OfO packets compared to other methods. In the PRS-MPTCP, the number of OfO packets has decreased by 38 %, 37 %, 45 %, and 44 % compared to BLEST, ECF, RR, and the Default scheduler, respectively.

近年来,人们对无线网络,尤其是移动通信的需求大幅增加。此外,手机和平板电脑等智能设备能够同时使用多个接口。在这方面,多路径 TCP(MPTCP)的概念已经被引入,从而可以利用多个接口进行并发通信。然而,数据包丢失和子流异构(尤其是在无线网络中)会导致接收器节点的失序(OfO)数据包增加,从而导致 MPTCP 总吞吐量下降。为了应对这些与性能相关的挑战,人们提出了许多调度器。然而,现有的大多数方法主要侧重于提高性能,而没有充分考虑数据包丢失的影响。本研究论文全面概述了 MPTCP 调度器。随后,我们提出了一种实用、稳健的 MPTCP 调度器(PRS-MPTCP),其具体目标是最大限度地减少 OfO 数据包,从而提高无线系统中 MPTCP 的性能。PRS-MPTCP 调度器考虑了每个子流的各种特性,包括 RTT、CWND 和丢包数量,以有效决定哪些数据包应分配给哪个子流。通过使用 Mininet-WiFi 仿真,将吞吐量、OfO 数据包数量和重传率作为性能指标,对 PRS-MPTCP 和最先进的调度器进行了公平的比较。评估结果揭示了所选参数对调度程序行为和 MPTCP 整体性能的深远影响。最终,评估结果表明,与其他方法相比,PRS-MPTCP 保证了可接受的吞吐量,并实现了更低的重传率和更少的 OfO 数据包。与 BLEST、ECF、RR 和默认调度器相比,PRS-MPTCP 的 OfO 数据包数量分别减少了 38%、37%、45% 和 44%。
{"title":"Enhancing MPTCP performance in wireless networks with PRS-MPTCP","authors":"Atefeh Ahmadniai Khajekini ,&nbsp;Hasan Amca ,&nbsp;Ali Hakan Ulusoy ,&nbsp;Enver Ever","doi":"10.1016/j.adhoc.2024.103560","DOIUrl":"10.1016/j.adhoc.2024.103560","url":null,"abstract":"<div><p>In recent years, there has been a significant increasing demand for wireless networks, particularly mobile communication. Additionally, smart devices like mobile phones and tablets are able to use multiple interfaces simultaneously. In this regard, the concept of Multipath TCP (MPTCP) has been introduced, enabling the utilization of multiple interfaces for concurrent communication. However, packet loss and subflow heterogeneity, especially in wireless networks, cause an increase in Out-of-Order (OfO) packets at the receiver node, which leads to a decrease in the total MPTCP throughput. To address these performance-related challenges, numerous schedulers have been proposed. However, most existing methods have primarily focused on improving performance without adequately considering the impact of packet loss. This research paper provides a comprehensive overview of MPTCP schedulers. Subsequently, we propose a Practical and Robust Scheduler for MPTCP (PRS-MPTCP) with the specific aim of minimizing OfO packets to improve MPTCP performance in wireless systems. The PRS-MPTCP scheduler takes into account various characteristics of each subflow, including RTT, CWND, and the number of packet losses, to effectively decide which packets should be assigned to which subflow. By using Mininet-WiFi emulation, fair comparisons between PRS-MPTCP and the state-of-the-art schedulers have been conducted, considering throughput, the number of OfO packets, and retransmission rates as performance metrics. The evaluation results reveal the profound impact of selected parameters on the behavior of the schedulers and the overall performance of MPTCP. Ultimately, the results demonstrate that PRS-MPTCP guarantees acceptable throughput and achieves lower retransmission rates and fewer OfO packets compared to other methods. In the PRS-MPTCP, the number of OfO packets has decreased by 38 %, 37 %, 45 %, and 44 % compared to BLEST, ECF, RR, and the Default scheduler, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141130795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method for analyzing the impact of SEUs on satellite networks from the perspective of distributed routing 从分布式路由角度分析 SEU 对卫星网络影响的方法
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-21 DOI: 10.1016/j.adhoc.2024.103546
Gongzhe Qiao, Yi Zhuang, Tong Ye

Single event upset (SEU) refers to the change in the state of a digital circuit caused by a single, energetic particle passing through the sensitive area of semiconductor components. In the space environment, cosmic rays and high-energy particles may lead to SEUs, which can cause failures of routing functions, such as forwarding errors, in satellite networks. This paper focuses on the impact of SEUs on satellite networks from the perspective of distributed routing. The influence of SEUs on a single satellite can easily spread to the entire satellite network through distributed routing, which can influence the reliability of the satellite network. We propose a framework for the reliability analysis of satellite networks under the impact of SEUs. According to the influence of SEUs on the execution of routing programs in different routing phases, we present the error propagation model of satellite networks for understanding SEUs in satellite network routing. We found that all the influences on program execution ultimately converge on data forwarding and can be reflected in the proposed path topology graph. Therefore, we propose an algorithm that can evaluate the impact of SEUs on satellite networks by analyzing the path topology graphs in both normal and SEU scenarios. The feasibility and effectiveness of the proposed method is demonstrated by experiments. The proposed method could provide a new perspective and theoretical basis for research on secure routing mechanisms and program/instruction reinforcement.

单次事件失效(SEU)指的是单个高能粒子穿过半导体元件的敏感区域导致数字电路状态发生变化。在太空环境中,宇宙射线和高能粒子可能会导致 SEU,从而导致卫星网络的路由功能失效,如转发错误。本文主要从分布式路由的角度探讨 SEU 对卫星网络的影响。SEU 对单个卫星的影响很容易通过分布式路由扩散到整个卫星网络,从而影响卫星网络的可靠性。我们提出了 SEUs 影响下卫星网络可靠性分析框架。根据 SEU 在不同路由阶段对路由程序执行的影响,我们提出了卫星网络的错误传播模型,用于理解卫星网络路由中的 SEU。我们发现,所有对程序执行的影响最终都会汇聚到数据转发上,并可反映在所提出的路径拓扑图中。因此,我们提出了一种算法,可以通过分析正常情况和 SEU 情况下的路径拓扑图来评估 SEU 对卫星网络的影响。实验证明了所提方法的可行性和有效性。所提方法可为安全路由机制和程序/指令强化研究提供新的视角和理论基础。
{"title":"A method for analyzing the impact of SEUs on satellite networks from the perspective of distributed routing","authors":"Gongzhe Qiao,&nbsp;Yi Zhuang,&nbsp;Tong Ye","doi":"10.1016/j.adhoc.2024.103546","DOIUrl":"10.1016/j.adhoc.2024.103546","url":null,"abstract":"<div><p>Single event upset (SEU) refers to the change in the state of a digital circuit caused by a single, energetic particle passing through the sensitive area of semiconductor components. In the space environment, cosmic rays and high-energy particles may lead to SEUs, which can cause failures of routing functions, such as forwarding errors, in satellite networks. This paper focuses on the impact of SEUs on satellite networks from the perspective of distributed routing. The influence of SEUs on a single satellite can easily spread to the entire satellite network through distributed routing, which can influence the reliability of the satellite network. We propose a framework for the reliability analysis of satellite networks under the impact of SEUs. According to the influence of SEUs on the execution of routing programs in different routing phases, we present the error propagation model of satellite networks for understanding SEUs in satellite network routing. We found that all the influences on program execution ultimately converge on data forwarding and can be reflected in the proposed path topology graph. Therefore, we propose an algorithm that can evaluate the impact of SEUs on satellite networks by analyzing the path topology graphs in both normal and SEU scenarios. The feasibility and effectiveness of the proposed method is demonstrated by experiments. The proposed method could provide a new perspective and theoretical basis for research on secure routing mechanisms and program/instruction reinforcement.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141136564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimization scheme of data link security transmission based on mobile edge computing 基于移动边缘计算的数据链路安全传输优化方案
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-18 DOI: 10.1016/j.adhoc.2024.103556
Han Zhang , Jianbin Xue , Xiangrui Guan , Zerou Ma , Jialing Xu

For the past few years, the security of data transmission links has been increasingly valued. However, with the increasing requirements for the security performance of data transmission links, how to cut the cost of upgrading while improving security has become a serious challenge. In response to the issue of ensuring low-cost and secure data transmission in wireless communication environments with eavesdroppers, this article innovatively starts with idle roadside units and studies how to incentivize roadside units to transmit interference power to interfere with eavesdroppers, thereby efficiently and economically improving the security performance of mobile user data transmission. Firstly, the impact of roadside unit transmission interference power on the security performance of data transmission links was analyzed by establishing a theoretical model; Then, this paper proposes a three-layer model consisting of ground user groups, eavesdropping users, roadside units, and UAVs equipped with mobile edge computing servers. In this model, by encouraging idle roadside units to send interference power, ground users are assisted to safely unload their own data to mobile edge computing servers. Meanwhile, considering the selfishness of idle roadside units, an improved algorithm based on simulated annealing algorithm is proposed to achieve the optimal mapping between ground users and idle roadside units. Finally, through the analysis of simulation results, this scheme can achieve the goal of reducing system costs while improving the security of data transmission.

近几年来,数据传输链路的安全性越来越受到重视。然而,随着人们对数据传输链路安全性能的要求越来越高,如何在提高安全性的同时降低升级成本已成为一个严峻的挑战。针对在有窃听者的无线通信环境中如何确保低成本、安全的数据传输问题,本文创新性地从闲置路侧单元入手,研究如何激励路侧单元发射干扰功率干扰窃听者,从而高效、经济地提高移动用户数据传输的安全性能。首先,通过建立理论模型,分析了路侧单元发射干扰功率对数据传输链路安全性能的影响;然后,本文提出了一个由地面用户群、窃听用户、路侧单元和配备移动边缘计算服务器的无人机组成的三层模型。在该模型中,通过鼓励闲置的路侧设备发送干扰功率,帮助地面用户安全地将自己的数据卸载到移动边缘计算服务器。同时,考虑到闲置路侧单元的自私性,提出了一种基于模拟退火算法的改进算法,以实现地面用户与闲置路侧单元之间的最优映射。最后,通过对仿真结果的分析,该方案在提高数据传输安全性的同时,实现了降低系统成本的目标。
{"title":"An optimization scheme of data link security transmission based on mobile edge computing","authors":"Han Zhang ,&nbsp;Jianbin Xue ,&nbsp;Xiangrui Guan ,&nbsp;Zerou Ma ,&nbsp;Jialing Xu","doi":"10.1016/j.adhoc.2024.103556","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103556","url":null,"abstract":"<div><p>For the past few years, the security of data transmission links has been increasingly valued. However, with the increasing requirements for the security performance of data transmission links, how to cut the cost of upgrading while improving security has become a serious challenge. In response to the issue of ensuring low-cost and secure data transmission in wireless communication environments with eavesdroppers, this article innovatively starts with idle roadside units and studies how to incentivize roadside units to transmit interference power to interfere with eavesdroppers, thereby efficiently and economically improving the security performance of mobile user data transmission. Firstly, the impact of roadside unit transmission interference power on the security performance of data transmission links was analyzed by establishing a theoretical model; Then, this paper proposes a three-layer model consisting of ground user groups, eavesdropping users, roadside units, and UAVs equipped with mobile edge computing servers. In this model, by encouraging idle roadside units to send interference power, ground users are assisted to safely unload their own data to mobile edge computing servers. Meanwhile, considering the selfishness of idle roadside units, an improved algorithm based on simulated annealing algorithm is proposed to achieve the optimal mapping between ground users and idle roadside units. Finally, through the analysis of simulation results, this scheme can achieve the goal of reducing system costs while improving the security of data transmission.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1