International Journal of Computer Networks and Applications最新文献

筛选
英文 中文
Energy Efficient Multi Hop D2D Communication Using Deep Reinforcement Learning in 5G Networks 5G网络中使用深度强化学习的高能效多跳D2D通信
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221897
M. Khan, Ashish Adholiya
{"title":"Energy Efficient Multi Hop D2D Communication Using Deep Reinforcement Learning in 5G Networks","authors":"M. Khan, Ashish Adholiya","doi":"10.22247/ijcna/2023/221897","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221897","url":null,"abstract":"– One of the most potential 5G technologies for wireless networks is device-to-device (D2D) communication. It promises peer-to-peer consumers high data speeds, ubiquity, and low latency, energy, and spectrum efficiency. These benefits make it possible for D2D communication to be completely realized in a multi-hop communication scenario. However, the energy efficient multi hop routing is more challenging task. Hence, this research deep reinforcement learning based multi hop routing protocol is introduced. In this, the energy consumption is considered by the proposed double deep Q learning technique for identifying the possible paths. Then, the optimal best path is selected by the proposed Gannet Chimp optimization (GCO) algorithm using multi-objective fitness function. The assessment of the proposed method based on various measures like packet delivery ratio, latency, residual energy, throughput and network lifetime accomplished the values of 99.89, 1.63, 0.98, 64 and 99.69 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45726687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Trustworthy Target Tracking Scheme (3TS) based on Clustering and Task Cycle Scheduling for Wireless Sensor Networks 基于聚类和任务周期调度的无线传感器网络节能可信目标跟踪方案
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221904
S. Sebastian, G. Jagatheeshkumar
{"title":"Energy Efficient Trustworthy Target Tracking Scheme (3TS) based on Clustering and Task Cycle Scheduling for Wireless Sensor Networks","authors":"S. Sebastian, G. Jagatheeshkumar","doi":"10.22247/ijcna/2023/221904","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221904","url":null,"abstract":"– One of the notable uses of Wireless Sensor Networks (WSN) is target detection and tracking. The primary objectives of a target tracking system are to improve target tracking precision and network longevity. This paper presents a Trustworthy Target Tracking Scheme (3TS) for WSN. The entire network region is divided into several grids of equal size, with each grid functioning as a cluster. All the grids include the same number of nodes. A Cluster Head (CH) node is selected for each grid based on the level of trust. The CH node determines the minimum number of active nodes per grid and regulates node activity. Together with the active nodes, the CH node identifies and tracks the target. In addition, the CH node informs the surrounding clusters that the target may cross. This concept enhances the accuracy of detection. Utilizing task cycle scheduling and a clustering approach, this work significantly increases the network's lifespan. The performance of the suggested work is justified in terms of detection accuracy, energy consumption, and network lifetime. The experimental findings demonstrate the effectiveness of the proposed method.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44924911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication 簇内多跳通信中抵御选择性转发攻击和黑洞攻击的鲁棒三态安全机制
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221900
A. Anitha, S. Mythili
{"title":"Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication","authors":"A. Anitha, S. Mythili","doi":"10.22247/ijcna/2023/221900","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221900","url":null,"abstract":"– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41714938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Controller Scheme for Autonomous Navigation in Infotainment on Internet-of-Vehicles 车联网信息娱乐中自主导航的优化控制器方案
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221882
R. S, C. .
{"title":"Optimized Controller Scheme for Autonomous Navigation in Infotainment on Internet-of-Vehicles","authors":"R. S, C. .","doi":"10.22247/ijcna/2023/221882","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221882","url":null,"abstract":"– The infotainment system curves an innovative mechanism of essential information dissemination for ensuring driving safety and improved driving experiences. However, there are significant challenges in developing an infotainment system to fit into the operational design of advanced technology, e.g","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41853942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) for Quality of Service Enhancement in Internet of Things-Based Wireless Sensor Networks (IWSN) 增强型智能水滴算法优化路由(EIWDR)用于增强基于物联网的无线传感器网络(IWSN)的服务质量
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221889
D. Deepalakshmi, B. Pushpa
{"title":"Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) for Quality of Service Enhancement in Internet of Things-Based Wireless Sensor Networks (IWSN)","authors":"D. Deepalakshmi, B. Pushpa","doi":"10.22247/ijcna/2023/221889","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221889","url":null,"abstract":"– The Internet of Things (IoT) has transformed how humans engage with technology, allowing pervasive connection and data sharing. In the Wireless Sensor Networks (WSNs) framework, IoT-based applications have been created for several areas, including agriculture, where greenhouse automation has been deployed for enhanced agricultural yields. However, WSNs face significant challenges, such as limited resources, unpredictable communication, and energy consumption. These issues become more pronounced when applied to greenhouse agriculture due to interference, congestion, and quality of service (QoS) requirements. Therefore, efficient routing protocols are crucial to address these challenges. The proposed study addresses the routing issues in IoT-based WSNs (IWSN) for greenhouse agriculture. Specifically, the Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) is proposed as a novel routing protocol to enhance the QoS in IoT-based WSNs. The EIWDR protocol utilizes the intelligent water drop algorithm to optimize the routing path selection. The algorithm prioritizes energy-efficient routing, selects the most reliable path with minimum delay and data loss, and balances network load to prevent congestion. The proposed protocol also uses a modified weight function to improve the routing performance when applied in IWSN. To test the efficacy of the EIWDR, simulation tests were conducted in the NS-3 simulator. The EIWDR protocol fares better regarding network lifetime, packet delivery ratio, energy consumption, and packet delay than other routing protocols. Improved greenhouse agricultural quality of service using IWSN is possible with the help of the proposed EIWDR protocol. With the help of intelligent routing algorithms, network resources are used effectively, data is sent reliably, and overall performance is enhanced.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48995452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Secure and Optimized Execution Pattern Analysis Based O-HMACSHA 3 Resource Allocation in Cloud Environment 一种基于O-HMACSHA-3的云环境下安全优化混合执行模式分析
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221890
.. Himanshu, N. Mangla
{"title":"A Hybrid Secure and Optimized Execution Pattern Analysis Based O-HMACSHA 3 Resource Allocation in Cloud Environment","authors":".. Himanshu, N. Mangla","doi":"10.22247/ijcna/2023/221890","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221890","url":null,"abstract":"– According to the analysis, several task scheduling methods have been implemented, such as the Particle Swarm Optimization (PSO) method, which has enhanced the performance of cloud data centers (DCs) in terms of various scheduling metrics. The scheduling issue in cloud computing (CC) is well-known to be NP-hard, with the main challenge arising from the exponential increase in the no. of possible outcomes or groupings as the problem size grows. Therefore, the key aim is to determine secure and optimal solutions for scheduling consumer tasks. In this study, a proposed method called Optimized-Hybrid Medium Access Control Secure Hash Algorithm 3 (O-HMACSHA3) is introduced for CC. The investigation aims to address the issue of reliable resource scheduling access for different tasks in the cloud environment, with a focus on reducing turnaround time (TAT) and energy consumption (EC). The proposed method utilizes optimization with PSO to achieve soft security in resource scheduling. To evaluate its effectiveness, the research method is compared with other task scheduling methods, including PSO and Fruit Fly-Based Simulated Annealing Optimization (FSAO) method, in terms of EC and time. The findings indicate significant improvements in performance metrics, with energy consumption reduced to 47.7 joules and TAT decreased to 316 milliseconds compared to existing methods. This is in contrast to the proposed method, which resulted in 57.3 joules and 479 milliseconds, respectively, for 20 tasks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43769118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System b区块链中个人健康信息管理系统的增强授权协议
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221885
Thakur Saikumari, Grinson George
{"title":"An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System","authors":"Thakur Saikumari, Grinson George","doi":"10.22247/ijcna/2023/221885","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221885","url":null,"abstract":"Blockchain and cloud-edge computing paradigms have gradually evolved as a profitable alternative for managing patient data in clinical Internet-of-Things (IoT) devices. Various studies are presented to secure medical records in IoT devices using blockchain schemes. Amongst, eHealthChain is developed to handle medical records obtained from clinical IoT systems. It utilizes Hyperledger Fabric as a blockchain policy to accumulate private medical records. The client's medical record is collected by utilizing the OAuth 2.0 protocol that guarantees the client's authority. Besides, a Message Queuing Telemetry Transport (MQTT) protocol is applied to communicate within an IoT platform. The reliability of the medical data is guaranteed by a consensus method called Kafka. However, the standard OAuth 2.0 protocol neglects the client security problem. Though MQTT offers many-to-many transmissions, the restricted sleep time of devices related to the fixed query waiting is ineffective for resource-constrained networks. Hence, the major contributions of this article are: (i) to develop an Enhanced OAuth (EOAuth) 2.0-based protocol which solves the client security problem and (ii) to utilize a protocol called Constrained Application Protocol (CoAP) for reliable transmission. It reduces the user verification time by obtaining more trusted clients according to their trust level. Also, a certified security service is employed to get the client’s input securely and conduct the cryptographic processes. Finally, the implementation findings exhibit that the EOAuth and CoAP achieve higher efficiency than the standard protocols. Index Terms – Blockchain, Cloud-Edge Computing, IoT Networks, eHealthChain, OAuth 2.0, MQTT, Consensus, CoAP, Kafka.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43617708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks 在无线传感器网络中实现节能最大化的改进节能混合协议(I-EEHP)
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221901
S. Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N.
{"title":"Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks","authors":"S. Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N.","doi":"10.22247/ijcna/2023/221901","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221901","url":null,"abstract":"– Nodes running on small batteries in a wireless sensor network (WSN) act as sensors, monitors, and controllers for the entire system. In IoT contexts, these sensor nodes are increasingly common for monitoring, measurement, and control. Minimizing the sensor nodes' energy consumption is essential for maximizing energy conservation and extending the nodes' lifespan. Prolonging the lifetime of a WSN helps cut down on the cost needed to replace or redeploy it. According to reviews of the literature, most of the energy is used for routing and data transfer. This article suggests an \"Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks\" that combines these two elements to maximize energy efficiency in order to reduce the energy consumption resulting from routing and data transfer. The data transfer method of an \"Energy Efficient Hybrid Protocol (EEHP)\" is modified to design the I-EEHP. The I-EEHP uses a multihop hierarchical communication method to reduce energy usage. This makes the routing more energy efficient. In addition, this protocol uses a technique based on IEEE 802.15.4 CSMA/CA to exchange data between cluster members, cluster heads, and sink nodes. This aids in node energy conservation, which ultimately increases the lifespan of the network. The efficiency of the proposed I-EEHP was compared with the already existing LEACH, EEHC, and EEHP using the simulation results. The I-EEHP exhibits noteworthy enhancements in network performance with regards to lifetime, energy, overhead, and packet delivery. The I-EEHP is a feasible option for low-cost and low-power WSN applications.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45243256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges 博弈论在VANET中不良行为检测与预测中的应用:综述与挑战
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221903
M. Nabil, Abdelmajid Hajam, Omar Boutkhoum, A. Haqiq
{"title":"Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges","authors":"M. Nabil, Abdelmajid Hajam, Omar Boutkhoum, A. Haqiq","doi":"10.22247/ijcna/2023/221903","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221903","url":null,"abstract":"– The particular features of vehicular ad hoc networks (VANETs) make them very vulnerable to attacks, especially when these latter become frequent and have intelligent behaviors. For these, the security of vehicular ad hoc networks is substantially important to protect them from the misbehavior of cyber-attacks. Game theory is one of the important tools that have been proposed to accurately model and analyze attack misbehavior. This paper presents a review of game theory-based intrusion detection, prediction, and reaction in VANETs for enriching the literature and helping design a new game theory-based framework. It gives state-of-the-art of game theory-based frameworks by showing their advantages and weaknesses against attacks. In addition, it determines their players and strategies, the proposed solutions and their descriptions, and the types of attacks envisaged. Then, it treats the challenges of designing an efficient framework for intrusion detection, prediction, and reaction against attacks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44252286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs) 无线传感器网络中基于簇的动态多径信任安全路由协议的性能分析
International Journal of Computer Networks and Applications Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221891
Darshan B. D., P. C. R.
{"title":"Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)","authors":"Darshan B. D., P. C. R.","doi":"10.22247/ijcna/2023/221891","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221891","url":null,"abstract":"– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44418747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信