IET Networks最新文献

筛选
英文 中文
Green IoT: Energy Efficiency, Renewable Integration, and Security Implications
IF 1.3
IET Networks Pub Date : 2025-04-08 DOI: 10.1049/ntw2.70003
Mohammed Qasim Alazzawi, Juan-Carlos Sánchez-Aarnoutse, Alejandro Santos Martínez-Sala, Maria-Dolores Cano
{"title":"Green IoT: Energy Efficiency, Renewable Integration, and Security Implications","authors":"Mohammed Qasim Alazzawi,&nbsp;Juan-Carlos Sánchez-Aarnoutse,&nbsp;Alejandro Santos Martínez-Sala,&nbsp;Maria-Dolores Cano","doi":"10.1049/ntw2.70003","DOIUrl":"https://doi.org/10.1049/ntw2.70003","url":null,"abstract":"<p>The increasing proliferation of Internet of Things (IoT) networks has resulted in rising energy demands, making energy management a crucial challenge for sustainable development. This paper presents a comprehensive survey of energy management strategies in IoT, focusing on energy harvesting and energy-saving techniques aimed at reducing energy consumption and extending the lifespan of IoT networks. In particular, the authors explore the integration of renewable energy sources, such as solar, thermal, and mechanical energy, to reduce the carbon footprint and improve the efficiency of IoT devices. Additionally, the survey highlights the security vulnerabilities that arise from energy management practices and proposes mitigation strategies to ensure secure and sustainable IoT ecosystems. The findings emphasise the importance of optimising both energy efficiency and security in future IoT deployments.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143801392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A predictive energy-efficient adaptive routing methodology for Mobile Ad hoc Networks
IF 1.3
IET Networks Pub Date : 2025-03-19 DOI: 10.1049/ntw2.70001
Neelam Malyadri, Ramakrishna M, Rajesh Nandalike, Pundalik Chavan, Supreeth S, Dayananda P, Rohith S
{"title":"A predictive energy-efficient adaptive routing methodology for Mobile Ad hoc Networks","authors":"Neelam Malyadri,&nbsp;Ramakrishna M,&nbsp;Rajesh Nandalike,&nbsp;Pundalik Chavan,&nbsp;Supreeth S,&nbsp;Dayananda P,&nbsp;Rohith S","doi":"10.1049/ntw2.70001","DOIUrl":"https://doi.org/10.1049/ntw2.70001","url":null,"abstract":"<p>A Mobile Ad hoc Network (MANET) is a self-configuring, infrastructure-less network of mobile devices connected wirelessly. In this paper, a novel approach, the Predictive Energy-efficient Adaptive Routing Technique (PEAR) approaches to the infrastructure-less network of mobile devices, addressing the intrinsic challenges of MANETs. PEAR is a network management system that uses real-time predictive analytics to forecast and adapt to topological changes due to node mobility, ensuring robust and proactive route management. It incorporates energy-aware routing decisions, conserving battery life and extending operational longevity, and uses a multi-factor routing algorithm. PEAR ensures loop-free routing to minimize latency and maintain scalability, making it adept at handling the growing complexity of MANET applications. PEAR outperformed Mobile Ad hoc On-demand Routing, showing throughput improvements of 2.5% at 5 m/s and 3.125% at 30 m/s, routing overhead reductions of 66.67% at 5 m/s and 50% at 30 m/s, energy consumption decreases by 66.67% at 5 m/s and 55.56% at 30 m/s, and a significant reduction in average delay by 66.67% at 5 m/s and 55.56% at 30 m/s, proving its superior efficiency and reliability in mobile networks.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143689170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-5G and B5G/6G resource allocation and network slicing orchestration using learning algorithms
IF 1.3
IET Networks Pub Date : 2025-02-25 DOI: 10.1049/ntw2.70002
Ado Adamou Abba Ari, Faustin Samafou, Arouna Ndam Njoya, Assidé Christian Djedouboum, Moussa Aboubakar, Alidou Mohamadou
{"title":"IoT-5G and B5G/6G resource allocation and network slicing orchestration using learning algorithms","authors":"Ado Adamou Abba Ari,&nbsp;Faustin Samafou,&nbsp;Arouna Ndam Njoya,&nbsp;Assidé Christian Djedouboum,&nbsp;Moussa Aboubakar,&nbsp;Alidou Mohamadou","doi":"10.1049/ntw2.70002","DOIUrl":"https://doi.org/10.1049/ntw2.70002","url":null,"abstract":"<p>The advent of 5G networks has precipitated an unparalleled surge in demand for mobile communication services, propelled by the advent of sophisticated wireless technologies. An increasing number of countries are moving from fourth generation (4G) to fifth generation (5G) networks, creating a new expectation for services that are dynamic, transparent, and differentiated. It is anticipated that these services will be adapted to a multitude of use cases and will become a standard practice. The diversity of these use cases and the increasingly complex network infrastructures present significant challenges, particularly in the management of resources and the orchestration of services. Network Slicing is emerging as a promising approach to address these challenges, as it facilitates efficient Resource Allocation (RA) and supports self-service capabilities. However, effective network segmentation implementation requires the development of robust algorithms to guarantee optimal RA. In this regard, artificial intelligence and machine learning (ML) have demonstrated their utility in the analysis of large datasets and the facilitation of intelligent decision-making processes. However, certain ML methodologies are limited in their ability to adapt to the evolving environments characteristic of 5G networks and beyond (B5G/6G). This paper examines the specific challenges associated with the evolution of 5G and B5G/6G networks, with a particular focus on ML solutions for RA and dynamic network slicing orchestration requirements. Moreover, the article presents potential avenues for further research in this domain with the objective of enhancing the efficiency of next-generation mobile networks through the adoption of innovative technological solutions.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A methodology for estimating radiofrequency signal attenuation from rainfall and atmospheric gases in 5G-and-beyond networks
IF 1.3
IET Networks Pub Date : 2025-02-16 DOI: 10.1049/ntw2.70000
Andreza P. Batista, Muhammad S. Ayub, Pablo Adasme, Dante C. Begazo, Muhammad R. Shad, Muhammad Saadi, Renata L. Rosa, Demóstenes Z. Rodríguez
{"title":"A methodology for estimating radiofrequency signal attenuation from rainfall and atmospheric gases in 5G-and-beyond networks","authors":"Andreza P. Batista,&nbsp;Muhammad S. Ayub,&nbsp;Pablo Adasme,&nbsp;Dante C. Begazo,&nbsp;Muhammad R. Shad,&nbsp;Muhammad Saadi,&nbsp;Renata L. Rosa,&nbsp;Demóstenes Z. Rodríguez","doi":"10.1049/ntw2.70000","DOIUrl":"https://doi.org/10.1049/ntw2.70000","url":null,"abstract":"<p>Industrial applications demand ultra-reliable and low latency communications, especially in Industrial Internet of Things (IIoT) environments. To meet these expectations, telecommunication network technologies have evolved, culminating in the deployment of fifth-generation (5G) networks by telecom operators worldwide. However, 5G and beyond networks, operating in millimetre-wave frequency bands, can suffer signal degradation caused by atmospheric phenomena, such as rainfall and atmospheric gases. This article presents a significant contribution to scientific research by proposing a methodology that leverages ITU-R recommendations (P.530, P.837, P.838, P.618-13, P.839-4, P.1511-2) for rain-induced attenuation and incorporates local meteorological data using the Gumbel Distribution. Also, the methodology considers ITU-R Recommendations (P.676, P.836, P.835) for atmospheric gas-induced attenuation. A comprehensive flowchart demonstrates the practical application of these recommendations, enabling accurate assessment of signal attenuation for various cities around the world with distinct geographical coordinates. The dataset is obtained from local Meteorological Stations or using digital maps from ITU recommendations. The results obtained with the approximate values of precipitation rates using the proposed method were compared with values from the ITU's study group and verified the effectiveness of the proposed approach, with relative errors not exceeding 1.07%. These analyses indicated the potential impact of atmospheric conditions on 5G network performance, offering valuable insights for optimising network design and improving communication reliability that is relevant to IIoT applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143423732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved affinity propagation method for maximising system sum rate and minimising interference for 3D multi-UAV placement in disaster area
IF 1.3
IET Networks Pub Date : 2025-01-24 DOI: 10.1049/ntw2.12143
Nooshin Boroumand Jazi, Farhad Faghani, Mahmoud Daneshvar Farzanegan
{"title":"An improved affinity propagation method for maximising system sum rate and minimising interference for 3D multi-UAV placement in disaster area","authors":"Nooshin Boroumand Jazi,&nbsp;Farhad Faghani,&nbsp;Mahmoud Daneshvar Farzanegan","doi":"10.1049/ntw2.12143","DOIUrl":"https://doi.org/10.1049/ntw2.12143","url":null,"abstract":"<p>In emergencies where several ground base stations (GBS) are no longer available, mobile base stations based on unmanned aerial vehicles (UAVs) can efficiently resolve coverage issues in remote areas due to their cost-effectiveness and versatility. Natural disasters, such as a deluge, cause damage to the terrestrial wireless infrastructure. The main challenge in these systems is to determine the optimal 3D placement of UAVs to meet the dynamic demand of users and minimise interference. Various mathematical frameworks and efficient algorithms are suggested for designing, optimising, and deploying UAV-based communication systems. This paper investigates the challenges of 3D UAV placement through machine learning (ML) and enhanced affinity propagation (EAP). Lastly, the simulation results indicate that the proposed approach improves the system sum rate, interference, and coverage performance compared to DBSCAN, k-means, and k-means++ methods. Therefore, this paper identifies UAVs' most effective 3D placement, including minimising the number of UAVs, maximising the number of covered users, and maximising the system sum rate for an arbitrary distribution of users in the disaster area. Additionally, this paper addresses the issue of interference minimisation.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12143","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority-based resource optimisation and user association in integrated networks
IF 1.3
IET Networks Pub Date : 2025-01-24 DOI: 10.1049/ntw2.12140
Sana Sharif, Shahid Manzoor, Waleed Ejaz
{"title":"Priority-based resource optimisation and user association in integrated networks","authors":"Sana Sharif,&nbsp;Shahid Manzoor,&nbsp;Waleed Ejaz","doi":"10.1049/ntw2.12140","DOIUrl":"https://doi.org/10.1049/ntw2.12140","url":null,"abstract":"<p>The future sixth-generation (6G) networks are envisioned to integrate satellites, aerial, ground, and sea networks to provide seamless connectivity. However, some challenges are associated with integrated networks, including optimal resource utilisation, energy efficiency, delay, higher data rates, heterogeneity, and on-demand connectivity. This paper focuses on optimising energy efficiency, resource utilisation, and task priority-based user association. To achieve this, a mathematical framework is formulated to maximise energy efficiency, resource utilisation, and user connectivity in integrated networks while satisfying constraints related to transmit power, data rate, and computation resources. The formulated problem is a binary linear programming problem, as the decision variable is binary and the constraints are linear. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA). The authors use the results obtained from BBA as a benchmark to evaluate the performance of IPM and BSA. Simulation results show that the performance of IPM and BSA is comparable to the BBA but with lower complexity.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relay-assisted D2D communication over novel multicluster two-wave and multi-cluster fluctuating two-ray channels
IF 1.3
IET Networks Pub Date : 2024-12-17 DOI: 10.1049/ntw2.12142
Haider Mehdi, Zakir Hussain, Muhammad Junaid Rabbani, Syed Muhammad Atif Saleem, Syed Areeb Ahmed
{"title":"Relay-assisted D2D communication over novel multicluster two-wave and multi-cluster fluctuating two-ray channels","authors":"Haider Mehdi,&nbsp;Zakir Hussain,&nbsp;Muhammad Junaid Rabbani,&nbsp;Syed Muhammad Atif Saleem,&nbsp;Syed Areeb Ahmed","doi":"10.1049/ntw2.12142","DOIUrl":"https://doi.org/10.1049/ntw2.12142","url":null,"abstract":"<p>A decode and forward relay assisted device-to-device (D2D) communications over a novel multicluster two-wave (MTW) fading is analysed with Terahertz (THz) channel conditions. Co-channel interference (CCI) over a recently proposed multi-cluster fluctuating two-ray (MFTR) fading is also present at relay and receiver. Maximal ratio combining (MRC) and power harvesting based on power splitting are present at relay and receiver. A characteristic function based approach is used here to derive success probability, outage probability and capacity with outage expressions. The expressions depend on THz channel parameters, distances between various nodes in D2D system, power harvesting parameter and fading channel conditions. The system is numerically analysed under various D2D network conditions.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12142","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel strategy for optimal data replication in peer-to-peer networks based on a multi-objective optimisation – NSGA-II algorithm
IF 1.3
IET Networks Pub Date : 2024-12-12 DOI: 10.1049/ntw2.12141
Abouzar Samimi, Maryam Goudarzi
{"title":"A novel strategy for optimal data replication in peer-to-peer networks based on a multi-objective optimisation – NSGA-II algorithm","authors":"Abouzar Samimi,&nbsp;Maryam Goudarzi","doi":"10.1049/ntw2.12141","DOIUrl":"https://doi.org/10.1049/ntw2.12141","url":null,"abstract":"<p>A peer-to-peer (P2P) network is defined as a distributed network in which nodes with similar characteristics exchange data with others. Efficient data sharing in P2P systems is essentially faced with challenges due to uncertainties of erratic node failures and unreliable network connectivity. Data replication on multiple nodes can improve availability and alleviate latency. However, the number of created replicas and the corresponding location of these replicas need to be determined optimally. In this paper, a novel framework for data replication is proposed in P2P networks, in which optimal allocations are achieved based on the two objectives including the minimisation of delay and maximisation of hit rate of queries. The proposed model finds allocations that specify the number and location of each replica of existing files in the network based on two considered objectives. A multi-objective technique based on the Non-Dominated Sorting Genetic Algorithm II (NSGA-II) algorithm is utilised to solve the proposed model and to extract non-dominated Pareto-optimal solutions of the allocations. Finally, one of the allocations of the obtained Pareto optimal set is applied to the network and the delay and hit rate of queries pertaining to this situation is compared with two models: i) initial model of the network, that is, the state where there is no replica of the files except the original version of the file, and ii) the random replication model to verify the efficiency of the presented method. All simulations in this paper have been done using C++ programming language.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variance-driven security optimisation in industrial IoT sensors
IF 1.3
IET Networks Pub Date : 2024-11-16 DOI: 10.1049/ntw2.12139
Hardik Gupta, Sunil K. Singh, Sudhakar Kumar, Karan Sharma, Hardeep Saini, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
{"title":"Variance-driven security optimisation in industrial IoT sensors","authors":"Hardik Gupta,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Karan Sharma,&nbsp;Hardeep Saini,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/ntw2.12139","DOIUrl":"https://doi.org/10.1049/ntw2.12139","url":null,"abstract":"<p>The Industrial Internet of Things (IIoT) has transformed industrial operations with real-time monitoring and control, enhancing efficiency and productivity. However, this connectivity brings significant security challenges. This study addresses these challenges by identifying abnormal sensor data patterns using machine learning-based anomaly detection models. The proposed framework employs advanced algorithms to strengthen industrial defences against cyber threats and disruptions. Focusing on temperature anomalies, a critical yet often overlooked aspect of industrial security, this research fills a gap in the literature by evaluating machine learning models for this purpose. A novel variance-based model for temperature anomaly detection is introduced, demonstrating high efficacy with accuracy scores of 0.92 and 0.82 on the NAB and AnoML-IOT datasets, respectively. Additionally, the model achieved F1 scores of 0.96 and 0.89 on these datasets, underscoring its effectiveness in enhancing IIoT security and optimising cybersecurity for industrial processes. This research not only identifies security vulnerabilities but also presents concrete solutions to improve the security posture of IIoT systems.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental assessment of containers running on top of virtual machines
IF 1.3
IET Networks Pub Date : 2024-11-10 DOI: 10.1049/ntw2.12138
Hossein Aqasizade, Ehsan Ataie, Mostafa Bastam
{"title":"Experimental assessment of containers running on top of virtual machines","authors":"Hossein Aqasizade,&nbsp;Ehsan Ataie,&nbsp;Mostafa Bastam","doi":"10.1049/ntw2.12138","DOIUrl":"https://doi.org/10.1049/ntw2.12138","url":null,"abstract":"<p>Over the past two decades, the cloud computing paradigm has gradually attracted more popularity due to its efficient resource usage and simple service access model. Virtualisation technology is the fundamental element of cloud computing that brings several benefits to cloud users and providers, such as workload isolation, energy efficiency, server consolidation, and cost reduction. This paper examines the combination of operating system-level virtualisation (containers) and hardware-level virtualisation (virtual machines). To this end, the performance of containers running on top of virtual machines is experimentally compared with standalone virtual machines and containers based on different hardware resources, including the processor, main memory, disk, and network in a real testbed by running the most commonly used benchmarks. Paravirtualisation and full virtualisation as well as type 1 and type 2 hypervisors are covered in this study. In addition, three prevalent containerisation platforms are examined.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信