首页 > 最新文献

IEEE Transactions on Reliability最新文献

英文 中文
ECC-Based Lightweight Authentication for Resource-Constrained Devices Leveraging the Edge Node 利用边缘节点的基于ecc的资源受限设备轻量级认证
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-03-02 DOI: 10.1109/TR.2025.3562300
Mitrup Kabi;Neelam Dayal;Pushpa Raikwal
CPS have undergone significant evolution, integrating computational elements with physical processes to create intelligent, interconnected systems. However, their interconnected nature exposes them to diverse security threats. Authentication emerges as a critical aspect of CPS security, yet traditional methods face limitations, particularly for resource-constrained devices. In this article, we address these challenges by proposing a secure and efficient authentication mechanism based on elliptic curve cryptography. We provide a formal proof of its security using the Mao–Boyd logic and Proverif, ensuring resilience against known attacks. In addition, we compare the performance of the proposed scheme with other established schemes, demonstrating its effectiveness in enhancing CPS security without compromising operational efficiency. Proposed research contributes to the ongoing effort to fortify CPS against evolving cyber threats, fostering safer and more resilient systems for various applications.
CPS经历了重大的发展,将计算元素与物理过程相结合,创造出智能、互联的系统。然而,它们相互关联的特性使它们面临各种安全威胁。身份验证成为CPS安全的一个关键方面,但传统方法面临局限性,特别是对于资源受限的设备。在本文中,我们通过提出一种基于椭圆曲线加密的安全高效的身份验证机制来解决这些挑战。我们使用Mao-Boyd逻辑和Proverif提供了其安全性的正式证明,确保了对已知攻击的弹性。此外,我们将建议方案的表现与其他现有方案进行比较,证明其在不影响运作效率的情况下,有效地提高了CPS的安全性。拟议的研究有助于加强CPS应对不断变化的网络威胁的持续努力,为各种应用培养更安全、更有弹性的系统。
{"title":"ECC-Based Lightweight Authentication for Resource-Constrained Devices Leveraging the Edge Node","authors":"Mitrup Kabi;Neelam Dayal;Pushpa Raikwal","doi":"10.1109/TR.2025.3562300","DOIUrl":"https://doi.org/10.1109/TR.2025.3562300","url":null,"abstract":"CPS have undergone significant evolution, integrating computational elements with physical processes to create intelligent, interconnected systems. However, their interconnected nature exposes them to diverse security threats. Authentication emerges as a critical aspect of CPS security, yet traditional methods face limitations, particularly for resource-constrained devices. In this article, we address these challenges by proposing a secure and efficient authentication mechanism based on elliptic curve cryptography. We provide a formal proof of its security using the Mao–Boyd logic and Proverif, ensuring resilience against known attacks. In addition, we compare the performance of the proposed scheme with other established schemes, demonstrating its effectiveness in enhancing CPS security without compromising operational efficiency. Proposed research contributes to the ongoing effort to fortify CPS against evolving cyber threats, fostering safer and more resilient systems for various applications.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2605-2612"},"PeriodicalIF":5.0,"publicationDate":"2025-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144206145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the Reliability of the Switching-On Process of LV Relays Powered by Distorted AC Supply Source 畸变交流电源供电的低压继电器接通过程可靠性研究
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-28 DOI: 10.1109/TR.2025.3540517
Dariusz Smugala;Pawel Albrechtowicz
The article presents research on the reliability of the switching-on process of electromagnetically actuated alternating current (AC) low voltage relays powered by distorted voltage waveforms. The aim of the research was to assess the influence of the nature and level of supply source distortions on particular switching-on time-related parameters. A measurement stand and software developed for the purposes of the experiments allowed for recognizing the impact of particular factors describing dynamics of the switching-on process. During tests, driving coils of relays were powered through the various AC voltage waveforms characterized by similar total harmonic distortion (THD) values that were applied at different phases of voltage waveform. Performed laboratory measurements showed the various impact of individual parameters (RMS value, shape, harmonic content, THD factor) on the reliability of the switching-on operation, e.g., switching time, contact loss, connection reliability. The carried-out analysis indicated the main factors and their impact level upon the reliability of the switching-on process.
本文研究了由畸变电压波形供电的电磁驱动交流(AC)低压继电器开关过程的可靠性。研究的目的是评估供电源扭曲的性质和程度对特定接通时间相关参数的影响。为实验目的而开发的测量台和软件允许识别描述开关过程动力学的特定因素的影响。在测试过程中,继电器的驱动线圈通过施加在电压波形不同相位的具有相似总谐波失真(THD)值的各种交流电压波形供电。进行的实验室测量显示了各个参数(均方根值、形状、谐波含量、THD因子)对开关操作可靠性的各种影响,例如开关时间、触点损耗、连接可靠性。通过分析,指出了影响接通过程可靠性的主要因素及其影响程度。
{"title":"Study of the Reliability of the Switching-On Process of LV Relays Powered by Distorted AC Supply Source","authors":"Dariusz Smugala;Pawel Albrechtowicz","doi":"10.1109/TR.2025.3540517","DOIUrl":"https://doi.org/10.1109/TR.2025.3540517","url":null,"abstract":"The article presents research on the reliability of the switching-<sc>on</small> process of electromagnetically actuated alternating current (AC) low voltage relays powered by distorted voltage waveforms. The aim of the research was to assess the influence of the nature and level of supply source distortions on particular switching-<sc>on</small> time-related parameters. A measurement stand and software developed for the purposes of the experiments allowed for recognizing the impact of particular factors describing dynamics of the switching-<sc>on</small> process. During tests, driving coils of relays were powered through the various AC voltage waveforms characterized by similar total harmonic distortion (THD) values that were applied at different phases of voltage waveform. Performed laboratory measurements showed the various impact of individual parameters (RMS value, shape, harmonic content, THD factor) on the reliability of the switching-<sc>on</small> operation, e.g., switching time, contact loss, connection reliability. The carried-out analysis indicated the main factors and their impact level upon the reliability of the switching-<sc>on</small> process.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"4185-4193"},"PeriodicalIF":5.7,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiclass Graph Embedding Matrix Classification Method for Roller Bearing State Identification Under Limited Sample 有限样本下滚动轴承状态识别的多类图嵌入矩阵分类方法
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-27 DOI: 10.1109/TR.2025.3530441
Haiyang Pan;Haifeng Xu;Jian Cheng;Jinde Zheng;Jinyu Tong
Support matrix machine (SMM) based methods have revolutionized the field of state identification by effectively mining correlations between fault features. However, some flaws limit its ability to handle interfered and limited samples, deriving from the purely focus on the closer samples nearing classify boundary and the thin design of binary classification nature, thus resulting SMM ignores the correlations between different samples and cannot align with the reality on the limited multiclass fault data. To address this issue, a novel approach called multiclass graph embedding support matrix machine (MGESMM) is proposed in this article. First, similarity matrix composed of similarity coefficient between each two samples are calculated by cosine distance. This similarity matrix is then used in manifold regularization-based graph embedding model, which can eliminate the negative impact of interfered and limited samples. Second, hamming loss-based predict error evaluation and multiclass loss-based boundary constraint is designed to form a direct multiclass classification constraint, thus the drawbacks of one-versus-one or one-versus-rest strategies for multiclass classification are prevented. Finally, to evaluate the efficacy of MGESMM, two roller bearing damage identification experiments are analyzed, and the results demonstrate that MGESMM achieves superior performance under different operating conditions.
基于支持矩阵机(SMM)的方法通过有效地挖掘故障特征之间的相关性,彻底改变了状态识别领域。然而,由于单纯关注接近分类边界的更近的样本和二元分类性质的单薄设计,使得SMM在处理干扰样本和有限样本时存在一定的缺陷,从而导致SMM忽略了不同样本之间的相关性,在有限的多类故障数据上无法与实际相符。为了解决这一问题,本文提出了一种新的方法——多类图嵌入支持矩阵机(MGESMM)。首先,利用余弦距离计算由两个样本之间的相似系数组成的相似矩阵;然后将该相似矩阵用于基于流形正则化的图嵌入模型中,可以消除干扰和有限样本的负面影响。其次,设计了基于hamming损失的预测误差评估和基于多类损失的边界约束,形成直接的多类分类约束,从而避免了多类分类采用一对一或一对休息策略的缺点。最后,为了评价MGESMM的有效性,对两个滚动轴承损伤识别实验进行了分析,结果表明MGESMM在不同工况下都取得了优异的性能。
{"title":"A Multiclass Graph Embedding Matrix Classification Method for Roller Bearing State Identification Under Limited Sample","authors":"Haiyang Pan;Haifeng Xu;Jian Cheng;Jinde Zheng;Jinyu Tong","doi":"10.1109/TR.2025.3530441","DOIUrl":"https://doi.org/10.1109/TR.2025.3530441","url":null,"abstract":"Support matrix machine (SMM) based methods have revolutionized the field of state identification by effectively mining correlations between fault features. However, some flaws limit its ability to handle interfered and limited samples, deriving from the purely focus on the closer samples nearing classify boundary and the thin design of binary classification nature, thus resulting SMM ignores the correlations between different samples and cannot align with the reality on the limited multiclass fault data. To address this issue, a novel approach called multiclass graph embedding support matrix machine (MGESMM) is proposed in this article. First, similarity matrix composed of similarity coefficient between each two samples are calculated by cosine distance. This similarity matrix is then used in manifold regularization-based graph embedding model, which can eliminate the negative impact of interfered and limited samples. Second, hamming loss-based predict error evaluation and multiclass loss-based boundary constraint is designed to form a direct multiclass classification constraint, thus the drawbacks of one-versus-one or one-versus-rest strategies for multiclass classification are prevented. Finally, to evaluate the efficacy of MGESMM, two roller bearing damage identification experiments are analyzed, and the results demonstrate that MGESMM achieves superior performance under different operating conditions.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3824-3832"},"PeriodicalIF":5.7,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Note on the Component (Extra) Edge Connectivity of the Cartesian Powers of Regular Multiprocessor Systems 常规多处理器系统笛卡儿幂的分量(额外)边连通性注释
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-26 DOI: 10.1109/TR.2025.3540068
Liqiong Xu;Shuming Zhou
Reliability assessment of multiprocessor systems presents the theoretical foundation for the layout and optimization of multiprocessor systems. The $h$-extra edge-connectivity $lambda _{h}$ and the $k$-component edge-connectivity $clambda _{k}$, as extensions of the classical edge connectivity, are two precise metrics for the measurement of the reliability of multiprocessor systems. For multiprocessor systems, determining $clambda _{k}$ and $lambda _{k}$ of a large $k$ is still difficult. Let $delta _{G}(0)=0$ and $delta _{G}(i)=frac{1}{2}(text{ex}_{i+1}(G)-text{ex}_{i}(G))$ for $iin lbrace 1, ldots, |G|-1rbrace$, where $text{ex}_{i}(G)={mathrm{max}}lbrace 2|E(G[S])|: Ssubseteq V(G), |S|=i rbrace$. In this article, we obtain $clambda _{k}$ and $lambda _{h}$ of the Cartesian powers of the $d$-regular graphs for which the lexicographic order yields an optimal order and $delta _{G}(i)leq frac{d}{2}$ for $i=0, 1, ldots, lfloor frac{|G|-1}{2}rfloor$. Our result improves some previous results about $clambda _{k}$ of Hamming graphs by Yang et al. (2023), and $lambda _{h}$ of the Cartesian powers of the complete graph $K_{4}$ by Tian et al. (2022).
多处理机系统的可靠性评估为多处理机系统的布局和优化提供了理论基础。$h$ -extra - edge-connectivity $lambda _{h}$和$k$ -component - edge-connectivity $clambda _{k}$作为经典边缘连接的扩展,是测量多处理器系统可靠性的两个精确指标。对于多处理器系统,确定大型$k$的$clambda _{k}$和$lambda _{k}$仍然是困难的。用$delta _{G}(0)=0$和$delta _{G}(i)=frac{1}{2}(text{ex}_{i+1}(G)-text{ex}_{i}(G))$表示$iin lbrace 1, ldots, |G|-1rbrace$,其中$text{ex}_{i}(G)={mathrm{max}}lbrace 2|E(G[S])|: Ssubseteq V(G), |S|=i rbrace$。在本文中,我们得到了$d$ -正则图的笛卡尔幂的$clambda _{k}$和$lambda _{h}$,对于这些正则图,字典顺序产生最优顺序,对于$i=0, 1, ldots, lfloor frac{|G|-1}{2}rfloor$,我们得到了$delta _{G}(i)leq frac{d}{2}$。我们的结果改进了Yang等人(2023)关于Hamming图的$clambda _{k}$和Tian等人(2022)关于完全图的笛卡尔幂$K_{4}$的$lambda _{h}$的一些先前的结果。
{"title":"A Note on the Component (Extra) Edge Connectivity of the Cartesian Powers of Regular Multiprocessor Systems","authors":"Liqiong Xu;Shuming Zhou","doi":"10.1109/TR.2025.3540068","DOIUrl":"https://doi.org/10.1109/TR.2025.3540068","url":null,"abstract":"Reliability assessment of multiprocessor systems presents the theoretical foundation for the layout and optimization of multiprocessor systems. The <inline-formula><tex-math>$h$</tex-math></inline-formula>-extra edge-connectivity <inline-formula><tex-math>$lambda _{h}$</tex-math></inline-formula> and the <inline-formula><tex-math>$k$</tex-math></inline-formula>-component edge-connectivity <inline-formula><tex-math>$clambda _{k}$</tex-math></inline-formula>, as extensions of the classical edge connectivity, are two precise metrics for the measurement of the reliability of multiprocessor systems. For multiprocessor systems, determining <inline-formula><tex-math>$clambda _{k}$</tex-math></inline-formula> and <inline-formula><tex-math>$lambda _{k}$</tex-math></inline-formula> of a large <inline-formula><tex-math>$k$</tex-math></inline-formula> is still difficult. Let <inline-formula><tex-math>$delta _{G}(0)=0$</tex-math></inline-formula> and <inline-formula><tex-math>$delta _{G}(i)=frac{1}{2}(text{ex}_{i+1}(G)-text{ex}_{i}(G))$</tex-math></inline-formula> for <inline-formula><tex-math>$iin lbrace 1, ldots, |G|-1rbrace$</tex-math></inline-formula>, where <inline-formula><tex-math>$text{ex}_{i}(G)={mathrm{max}}lbrace 2|E(G[S])|: Ssubseteq V(G), |S|=i rbrace$</tex-math></inline-formula>. In this article, we obtain <inline-formula><tex-math>$clambda _{k}$</tex-math></inline-formula> and <inline-formula><tex-math>$lambda _{h}$</tex-math></inline-formula> of the Cartesian powers of the <inline-formula><tex-math>$d$</tex-math></inline-formula>-regular graphs for which the lexicographic order yields an optimal order and <inline-formula><tex-math>$delta _{G}(i)leq frac{d}{2}$</tex-math></inline-formula> for <inline-formula><tex-math>$i=0, 1, ldots, lfloor frac{|G|-1}{2}rfloor$</tex-math></inline-formula>. Our result improves some previous results about <inline-formula><tex-math>$clambda _{k}$</tex-math></inline-formula> of Hamming graphs by Yang et al. (2023), and <inline-formula><tex-math>$lambda _{h}$</tex-math></inline-formula> of the Cartesian powers of the complete graph <inline-formula><tex-math>$K_{4}$</tex-math></inline-formula> by Tian et al. (2022).","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"4245-4252"},"PeriodicalIF":5.7,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Field-Based Security Testing of SDN Configuration Updates SDN配置的现场安全测试更新
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-24 DOI: 10.1109/TR.2025.3531654
Jahanzaib Malik;Fabrizio Pastore
Software-defined systems revolutionized the management of hardware devices but introduced quality assurance challenges that remain to be tackled. For example, software defined networks (SDNs) became a key technology for the prompt reconfigurations of network services in many sectors including telecommunications, data centers, financial services, cloud providers, and manufacturing industry. Unfortunately, reconfigurations may lead to mistakes that compromise the dependability of the provided services. In this article, we focus on the reconfigurations of network services in the satellite communication sector, and target security requirements, which are often hard to verify; for example, although connectivity may function properly, confidentiality may be broken by packets forwarded to a wrong destination. We propose an approach for FIeld-based Security Testing of SDN Configurations Updates (FISTS). First, it probes the network before and after configuration updates. Then, using the collected data, it relies on unsupervised machine learning algorithms to prioritize the inspection of suspicious node responses, after identifying the network nodes that likely match across the two configurations. Our empirical evaluation has been conducted with network data from simulated and real SDN configuration updates for our industry partner, a world-leading satellite operator. Our results show that, when combined with K-Nearest Neighbor, FISTS leads to best results (up to 0.95 precision and 1.00 recall). Further, we demonstrated its scalability.
软件定义的系统彻底改变了硬件设备的管理,但引入了仍有待解决的质量保证挑战。例如,软件定义网络(sdn)已成为许多行业(包括电信、数据中心、金融服务、云提供商和制造业)中快速重新配置网络服务的关键技术。不幸的是,重新配置可能会导致错误,从而损害所提供服务的可靠性。在本文中,我们将重点关注卫星通信领域网络服务的重新配置,以及通常难以验证的目标安全需求;例如,尽管连接可能正常工作,但转发到错误目的地的数据包可能会破坏机密性。我们提出了一种基于现场的SDN配置更新(拳头)安全测试方法。首先,它在配置更新前后探测网络。然后,使用收集到的数据,它依赖于无监督机器学习算法,在识别出可能在两种配置中匹配的网络节点后,优先检查可疑节点的响应。我们的经验评估是根据我们的行业合作伙伴(一家世界领先的卫星运营商)的模拟和真实SDN配置更新的网络数据进行的。我们的结果表明,当与k近邻相结合时,拳头产生了最好的结果(高达0.95的精度和1.00的召回率)。此外,我们还演示了它的可伸缩性。
{"title":"Field-Based Security Testing of SDN Configuration Updates","authors":"Jahanzaib Malik;Fabrizio Pastore","doi":"10.1109/TR.2025.3531654","DOIUrl":"https://doi.org/10.1109/TR.2025.3531654","url":null,"abstract":"Software-defined systems revolutionized the management of hardware devices but introduced quality assurance challenges that remain to be tackled. For example, software defined networks (SDNs) became a key technology for the prompt reconfigurations of network services in many sectors including telecommunications, data centers, financial services, cloud providers, and manufacturing industry. Unfortunately, reconfigurations may lead to mistakes that compromise the dependability of the provided services. In this article, we focus on the reconfigurations of network services in the satellite communication sector, and target security requirements, which are often hard to verify; for example, although connectivity may function properly, confidentiality may be broken by packets forwarded to a wrong destination. We propose an approach for FIeld-based Security Testing of SDN Configurations Updates (FISTS). First, it probes the network before and after configuration updates. Then, using the collected data, it relies on unsupervised machine learning algorithms to prioritize the inspection of suspicious node responses, after identifying the network nodes that likely match across the two configurations. Our empirical evaluation has been conducted with network data from simulated and real SDN configuration updates for our industry partner, a world-leading satellite operator. Our results show that, when combined with K-Nearest Neighbor, FISTS leads to best results (up to 0.95 precision and 1.00 recall). Further, we demonstrated its scalability.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3469-3483"},"PeriodicalIF":5.7,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10900588","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Lexicographical Ordering to Software Product Line Testing 词典排序在软件产品线测试中的应用
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-21 DOI: 10.1109/TR.2025.3540479
Tao Li;Chenhui Cui;Yinyin Xu;Rubing Huang
Test case prioritization (TCP) has been widely used in software testing, which aims to execute test cases that are more likely to detect faults earlier than others. Among many proposed TCP approaches, lexicographical ordering-based TCP (LO-TCP) can effectively resolve ties encountered in the prioritization process, leading to better performance than original TCP approaches. However, the current LO-TCP needs to use the white-box information such as the code coverage of the program under test, which may be infeasible in some black-box testing applications such as software product lines (SPLs). In this article, we transfer the traditional LO-TCP to SPL testing by leveraging test configuration coverage instead of code coverage, and also empirically conduct some simulations and evaluate the large-scale real-world programs with real faults. The experimental results show that LO-TCP can have better performance for testing SPLs, as compared with traditional TCP approaches.
测试用例优先级(TCP)在软件测试中得到了广泛的应用,它旨在执行比其他测试用例更早发现错误的测试用例。在许多提出的TCP方法中,基于字典排序的TCP (LO-TCP)可以有效地解决优先级排序过程中遇到的关系,从而获得比原始TCP方法更好的性能。然而,当前的LO-TCP需要使用白盒信息,如被测程序的代码覆盖率,这在一些黑盒测试应用程序(如软件产品线(SPLs))中可能是不可行的。在本文中,我们通过利用测试配置覆盖率而不是代码覆盖率,将传统的LO-TCP转换为SPL测试,并且还经验地进行了一些模拟,并评估了具有实际故障的大规模真实世界程序。实验结果表明,与传统的TCP方法相比,LO-TCP在测试SPLs方面具有更好的性能。
{"title":"Applying Lexicographical Ordering to Software Product Line Testing","authors":"Tao Li;Chenhui Cui;Yinyin Xu;Rubing Huang","doi":"10.1109/TR.2025.3540479","DOIUrl":"https://doi.org/10.1109/TR.2025.3540479","url":null,"abstract":"Test case prioritization (TCP) has been widely used in software testing, which aims to execute test cases that are more likely to detect faults earlier than others. Among many proposed TCP approaches, lexicographical ordering-based TCP (LO-TCP) can effectively resolve ties encountered in the prioritization process, leading to better performance than original TCP approaches. However, the current LO-TCP needs to use the white-box information such as the code coverage of the program under test, which may be infeasible in some black-box testing applications such as software product lines (SPLs). In this article, we transfer the traditional LO-TCP to SPL testing by leveraging test configuration coverage instead of code coverage, and also empirically conduct some simulations and evaluate the large-scale real-world programs with real faults. The experimental results show that LO-TCP can have better performance for testing SPLs, as compared with traditional TCP approaches.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3326-3340"},"PeriodicalIF":5.7,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aeroengine Life Prediction and Status Evaluation Based on Sequential Multitask Learning and Health Indicators 基于顺序多任务学习和健康指标的航空发动机寿命预测与状态评估
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-19 DOI: 10.1109/TR.2025.3535716
Anping Wan;Hua Zhang;Ting Chen;Khalil Al-Bukhaiti;Wenhui Wang;Jinglin Wang;Tianmin Shan;Luoke Hu
In this article, we introduce a novel method that uses enhanced sequential multitask learning to predict the remaining useful life (RUL) of an aeroengine accurately and efficiently while evaluating its status. The method innovatively employs extreme gradient boosting to extract critical performance parameters and construct a robust health indicator representing performance degradation. To capture the time-series features of the health indicator, the study modifies the traditional multigate mixture-of-experts (MMoE) model and integrates it with the gated recurrent unit (GRU) network, creating a hybrid MMoE-GRU model. In addition, we propose a dynamic weight balancing method to optimize the tradeoff in the joint loss function for multitask learning. Extensive experiments on the new commercial modular aero-propulsion system simulation (N-CMAPSS) dataset demonstrate that the proposed method significantly outperforms the existing models, achieving lower error rates and higher accuracy in RUL prediction and health status evaluation. The technique has a root-mean-square error (RMSE) of 7.1%, 6.9%, 1.3%, 0.6%, 1.7%, and 1.5% lower than the long short-term memory (LSTM), GRU, sequence-based bottom information gated recurrent unit (SB-GRU), deep gated recurrent unit (DGRU), multi-scale and multi-task convolutional neural network (M2STCNN), and MMoE models. The average accuracy of the proposed method is 96.732%, which is 10.629%, 1.587%, and 2.499% higher than those of the LSTM, DGRU, and MMoE, respectively. The superiority of the proposed method is validated on the N-CMAPSS dataset.
本文介绍了一种利用增强型顺序多任务学习来准确有效地预测航空发动机剩余使用寿命(RUL)的方法。该方法创新地采用极端梯度增强提取关键性能参数,并构建表征性能退化的鲁棒健康指标。为了捕捉健康指标的时间序列特征,对传统的多门专家混合(MMoE)模型进行了改进,并将其与门控循环单元(GRU)网络相结合,建立了混合MMoE-GRU模型。此外,我们提出了一种动态权重平衡方法来优化多任务学习中联合损失函数的权衡。在新型商用模块化航空推进系统仿真(N-CMAPSS)数据集上的大量实验表明,该方法显著优于现有模型,在RUL预测和健康状态评估中实现了更低的错误率和更高的精度。该技术的均方根误差(RMSE)分别比长短期记忆(LSTM)、GRU、基于序列的底层信息门控循环单元(SB-GRU)、深度门控循环单元(DGRU)、多尺度多任务卷积神经网络(M2STCNN)和MMoE模型低7.1%、6.9%、1.3%、0.6%、1.7%和1.5%。该方法的平均准确率为96.732%,比LSTM、DGRU和MMoE分别提高10.629%、1.587%和2.499%。在N-CMAPSS数据集上验证了该方法的优越性。
{"title":"Aeroengine Life Prediction and Status Evaluation Based on Sequential Multitask Learning and Health Indicators","authors":"Anping Wan;Hua Zhang;Ting Chen;Khalil Al-Bukhaiti;Wenhui Wang;Jinglin Wang;Tianmin Shan;Luoke Hu","doi":"10.1109/TR.2025.3535716","DOIUrl":"https://doi.org/10.1109/TR.2025.3535716","url":null,"abstract":"In this article, we introduce a novel method that uses enhanced sequential multitask learning to predict the remaining useful life (RUL) of an aeroengine accurately and efficiently while evaluating its status. The method innovatively employs extreme gradient boosting to extract critical performance parameters and construct a robust health indicator representing performance degradation. To capture the time-series features of the health indicator, the study modifies the traditional multigate mixture-of-experts (MMoE) model and integrates it with the gated recurrent unit (GRU) network, creating a hybrid MMoE-GRU model. In addition, we propose a dynamic weight balancing method to optimize the tradeoff in the joint loss function for multitask learning. Extensive experiments on the new commercial modular aero-propulsion system simulation (N-CMAPSS) dataset demonstrate that the proposed method significantly outperforms the existing models, achieving lower error rates and higher accuracy in RUL prediction and health status evaluation. The technique has a root-mean-square error (RMSE) of 7.1%, 6.9%, 1.3%, 0.6%, 1.7%, and 1.5% lower than the long short-term memory (LSTM), GRU, sequence-based bottom information gated recurrent unit (SB-GRU), deep gated recurrent unit (DGRU), multi-scale and multi-task convolutional neural network (M<sup>2</sup>STCNN), and MMoE models. The average accuracy of the proposed method is 96.732%, which is 10.629%, 1.587%, and 2.499% higher than those of the LSTM, DGRU, and MMoE, respectively. The superiority of the proposed method is validated on the N-CMAPSS dataset.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3833-3846"},"PeriodicalIF":5.7,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Verification of MRSCAN Based on MapReduce Framework 基于MapReduce框架的MRSCAN建模与验证
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-19 DOI: 10.1109/TR.2025.3535754
Zhengkang Zuo;Yuhan Ke;Ying Hu;Qing Huang;Zhicheng Zeng;Changjing Wang
Network clustering (graph clustering) plays a crucial role in discovering the inherent structures within networks. MapReduce-based structural clustering algorithm for networks (MRSCANs) designed based on MapReduce's parallel computing model, efficiently handles large-scale data. However, MRSCAN can only be tested through experiments, and its correctness cannot be guaranteed. To address this issue, this article has achieved the first implementation of functional MRSCAN modeling and subjected it to rigorous mechanized verification in Isabelle. First, based on Google's MapReduce model type definition and higher-order generic functions, a general MapReduce-based algorithm functional modeling framework is constructed across the fundamental global phases of Map, Shuffle, and Reduce. Moreover, diverse strategies are devised during the Shuffle phases according to user requirements, enhancing the applicability and generality of the MapReduce functional modeling framework. Second, formalizing the definition of MRSCAN, is delineated into four key steps: similarity calculation, core calculation, dimension expansion, and structural clustering. Furthermore, the MapReduce functional modeling framework is applied to these four steps to achieve the functional modeling of MRSCAN, which improves efficiency compared to other structural clustering algorithm for networks (SCANs) algorithms. Lastly, a verification framework for MapReduce-based algorithms is proposed at both the global and shuffle stages. Based on this framework, the correctness and reliability of MRSCAN are ensured. The model framework and verification framework of MapReduce-based algorithms proposed in this article can not only address functional modeling and verification of MRSCAN but also provide a reference for a series of other MapReduce-based functional program designs and proofs.
网络聚类(图聚类)在发现网络内部固有结构方面起着至关重要的作用。基于MapReduce并行计算模型设计的基于MapReduce的网络结构聚类算法(MRSCANs),可以有效地处理大规模数据。然而,MRSCAN只能通过实验进行测试,其正确性无法保证。为了解决这个问题,本文实现了功能性MRSCAN建模的第一个实现,并在Isabelle进行了严格的机械化验证。首先,基于谷歌的MapReduce模型类型定义和高阶泛型函数,在Map、Shuffle和Reduce的基本全局阶段构建了一个通用的基于MapReduce的算法功能建模框架。此外,在Shuffle阶段根据用户需求设计了多种策略,增强了MapReduce功能建模框架的适用性和通用性。其次,将MRSCAN的定义形式化,分为四个关键步骤:相似性计算、核心计算、维度扩展和结构聚类。此外,将MapReduce功能建模框架应用于这四个步骤,实现MRSCAN的功能建模,与其他网络结构聚类算法(SCANs)算法相比,提高了效率。最后,提出了基于mapreduce算法在全局和shuffle阶段的验证框架。基于该框架,保证了MRSCAN的正确性和可靠性。本文提出的基于mapreduce的算法模型框架和验证框架不仅可以解决MRSCAN的功能建模和验证问题,还可以为其他一系列基于mapreduce的功能程序设计和证明提供参考。
{"title":"Modeling and Verification of MRSCAN Based on MapReduce Framework","authors":"Zhengkang Zuo;Yuhan Ke;Ying Hu;Qing Huang;Zhicheng Zeng;Changjing Wang","doi":"10.1109/TR.2025.3535754","DOIUrl":"https://doi.org/10.1109/TR.2025.3535754","url":null,"abstract":"Network clustering (graph clustering) plays a crucial role in discovering the inherent structures within networks. MapReduce-based structural clustering algorithm for networks (MRSCANs) designed based on MapReduce's parallel computing model, efficiently handles large-scale data. However, MRSCAN can only be tested through experiments, and its correctness cannot be guaranteed. To address this issue, this article has achieved the first implementation of functional MRSCAN modeling and subjected it to rigorous mechanized verification in Isabelle. First, based on Google's MapReduce model type definition and higher-order generic functions, a general MapReduce-based algorithm functional modeling framework is constructed across the fundamental global phases of Map, Shuffle, and Reduce. Moreover, diverse strategies are devised during the Shuffle phases according to user requirements, enhancing the applicability and generality of the MapReduce functional modeling framework. Second, formalizing the definition of MRSCAN, is delineated into four key steps: similarity calculation, core calculation, dimension expansion, and structural clustering. Furthermore, the MapReduce functional modeling framework is applied to these four steps to achieve the functional modeling of MRSCAN, which improves efficiency compared to other structural clustering algorithm for networks (SCANs) algorithms. Lastly, a verification framework for MapReduce-based algorithms is proposed at both the global and shuffle stages. Based on this framework, the correctness and reliability of MRSCAN are ensured. The model framework and verification framework of MapReduce-based algorithms proposed in this article can not only address functional modeling and verification of MRSCAN but also provide a reference for a series of other MapReduce-based functional program designs and proofs.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3311-3325"},"PeriodicalIF":5.7,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep-Learning-Based Framework to Predict the Reliability of Multicomponent Repairable Systems in a Closed-Loop Supply Chain 基于深度学习的闭环供应链多部件可修系统可靠性预测框架
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-19 DOI: 10.1109/TR.2025.3528074
Abdelhamid Boujarif;David W. Coit;Oualid Jouini;Zhiguo Zeng;Robert Heidsieck
In this article, we develop a data-driven approach to predict the reliability of multicomponent repairable systems, considering component dependencies. We estimate component reliability functions from system-level time-to-failure data without prior knowledge of the system structure and use these estimates to generate training data for a deep long short-term memory network. This leads to system reliability prediction and addresses uncertainties through quantile regression. Validated through simulations of 500 systems and real-world data from GE HealthCare magnetic resonance imaging (MRI) machines, our model outperforms traditional methods (such as Cox model and random survival forest) in terms of accuracy, particularly for complex systems, by effectively learning from uncertainties.
在本文中,我们开发了一种数据驱动的方法来预测多组件可修复系统的可靠性,考虑组件依赖性。我们在不了解系统结构的前提下,从系统级故障时间数据估计组件的可靠性函数,并使用这些估计来生成深度长短期记忆网络的训练数据。这将导致系统可靠性预测,并通过分位数回归解决不确定性。通过对500个系统的模拟和来自GE医疗磁共振成像(MRI)机器的真实数据进行验证,我们的模型通过有效地从不确定性中学习,在准确性方面优于传统方法(如Cox模型和随机生存森林),特别是对于复杂系统。
{"title":"A Deep-Learning-Based Framework to Predict the Reliability of Multicomponent Repairable Systems in a Closed-Loop Supply Chain","authors":"Abdelhamid Boujarif;David W. Coit;Oualid Jouini;Zhiguo Zeng;Robert Heidsieck","doi":"10.1109/TR.2025.3528074","DOIUrl":"https://doi.org/10.1109/TR.2025.3528074","url":null,"abstract":"In this article, we develop a data-driven approach to predict the reliability of multicomponent repairable systems, considering component dependencies. We estimate component reliability functions from system-level time-to-failure data without prior knowledge of the system structure and use these estimates to generate training data for a deep long short-term memory network. This leads to system reliability prediction and addresses uncertainties through quantile regression. Validated through simulations of 500 systems and real-world data from GE HealthCare magnetic resonance imaging (MRI) machines, our model outperforms traditional methods (such as Cox model and random survival forest) in terms of accuracy, particularly for complex systems, by effectively learning from uncertainties.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3809-3823"},"PeriodicalIF":5.7,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Identifier Renaming Opportunity Identification via Context-Based Deep Code Representation 基于上下文的深度代码表示增强标识符重命名机会识别
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-02-19 DOI: 10.1109/TR.2025.3535736
Jingxuan Zhang;Zhuhang Li;Jiahui Liang;Zhiqiu Huang
Source code refactoring brings many benefits to the software being developed, e.g., reduces the likelihood of future development failures and simplifies the implementation of new features. Among the various code refactoring activities, identifier renaming is one of the most frequent software development activities conducted by developers, which plays an important role in program analysis and understanding. However, manually detecting identifier renaming opportunities is time-consuming and labor-intensive. Recently, researchers have proposed several automatic renaming opportunity identification approaches for identifiers. However, existing approaches only focus on one or several specific types of identifiers without generally considering all the types of identifiers. To resolve this problem, we put forward a new approach to detect identifier renaming opportunities by fully exploiting the changes of the programming context and the related code entities. Specifically, we first utilize a siamese network, which employs different attention headers to incorporate the programming context and the related code entities, to derive the semantically meaningful embeddings of identifiers. We then utilize these vectors to train a classifier, which can be used for predicting renaming opportunities for identifiers. Experimental results on 29 255 identifiers from ten Java projects in the Apache community demonstrate that our approach outperforms the state-of-the-art baseline approach by 11.97% as for the average F-Measure in identifying renaming opportunities for all the types of identifiers. In addition, we also verified the effectiveness of some key components of our approach. For instance, utilizing the related code entities into our approach improves the average F-Measure by 6.60%.
源代码重构给正在开发的软件带来了许多好处,例如,减少了未来开发失败的可能性,简化了新特性的实现。在各种代码重构活动中,标识符重命名是开发人员进行的最频繁的软件开发活动之一,它在程序分析和理解中起着重要的作用。但是,手动检测标识符重命名机会既耗时又费力。近年来,研究人员提出了几种标识符的自动重命名机会识别方法。然而,现有的方法只关注一种或几种特定类型的标识符,而没有全面考虑所有类型的标识符。为了解决这一问题,我们提出了一种通过充分利用编程上下文和相关代码实体的变化来检测标识符重命名机会的新方法。具体来说,我们首先利用暹罗网络,它使用不同的注意头来合并编程上下文和相关的代码实体,以派生标识符的语义有意义的嵌入。然后我们利用这些向量来训练一个分类器,该分类器可用于预测标识符的重命名机会。对Apache社区中10个Java项目的29255个标识符的实验结果表明,我们的方法在识别所有类型标识符的重命名机会方面的平均F-Measure优于最先进的基线方法11.97%。此外,我们还验证了我们方法的一些关键组成部分的有效性。例如,在我们的方法中使用相关的代码实体将平均F-Measure提高了6.60%。
{"title":"Boosting Identifier Renaming Opportunity Identification via Context-Based Deep Code Representation","authors":"Jingxuan Zhang;Zhuhang Li;Jiahui Liang;Zhiqiu Huang","doi":"10.1109/TR.2025.3535736","DOIUrl":"https://doi.org/10.1109/TR.2025.3535736","url":null,"abstract":"Source code refactoring brings many benefits to the software being developed, e.g., reduces the likelihood of future development failures and simplifies the implementation of new features. Among the various code refactoring activities, identifier renaming is one of the most frequent software development activities conducted by developers, which plays an important role in program analysis and understanding. However, manually detecting identifier renaming opportunities is time-consuming and labor-intensive. Recently, researchers have proposed several automatic renaming opportunity identification approaches for identifiers. However, existing approaches only focus on one or several specific types of identifiers without generally considering all the types of identifiers. To resolve this problem, we put forward a new approach to detect identifier renaming opportunities by fully exploiting the changes of the programming context and the related code entities. Specifically, we first utilize a siamese network, which employs different attention headers to incorporate the programming context and the related code entities, to derive the semantically meaningful embeddings of identifiers. We then utilize these vectors to train a classifier, which can be used for predicting renaming opportunities for identifiers. Experimental results on 29 255 identifiers from ten Java projects in the Apache community demonstrate that our approach outperforms the state-of-the-art baseline approach by 11.97% as for the average F-Measure in identifying renaming opportunities for all the types of identifiers. In addition, we also verified the effectiveness of some key components of our approach. For instance, utilizing the related code entities into our approach improves the average F-Measure by 6.60%.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3296-3310"},"PeriodicalIF":5.7,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Reliability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1