2020 5th International Conference on Computer and Communication Systems (ICCCS)最新文献

筛选
英文 中文
Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System 异步定位系统中锚点坐标的自动设置方法
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118486
Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng
{"title":"Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System","authors":"Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng","doi":"10.1109/ICCCS49078.2020.9118486","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118486","url":null,"abstract":"For variety of localization algorithms, there are usually two types of node: anchor and agent. The agent has unknown position and need to be located, while the anchor is used as reference point with perfect known location. However, determining anchor position is not an easy task in practically, and manually localizing anchors is boring with increasing of anchor’s number. Moreover, anchor position may be changed by some uncontrollable interference during the localization period, which leads to significant localization error. In this paper, we propose an automatic setup method for anchor relative coordinate under the assumption with anchor position unknown to address the above problem. We first estimate the anchor relative clock skew based on the blink model. Then, the time-of-flight (TOF) among anchors and positions of anchors are jointly determined by a compensated operation using clock skew estimation. Finally, time-difference-of-arrival (TDOA) method is applied to locate the agent. Practical experiment based on Decawave DWIOOO UWB system is carried out to verify the validity of the algorithms in this paper.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups 基于CAB模型的车联网使用意愿:参照组的调节作用
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118548
Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-chu Chan
{"title":"Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups","authors":"Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-chu Chan","doi":"10.1109/ICCCS49078.2020.9118548","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118548","url":null,"abstract":"Because of the emergence and applications of 5G technology, the internet of vehicles (IoV) has facilitated intelligent transportation and altered people’s means of movement, becoming a crucial force supporting the development of the automotive industry. However, some difficulties and challenges have been encountered during the IoV development process. Because of insufficient public awareness regarding IoV, user trust and intention to use the IoV are currently affected by individual perceptions and reference groups (RGs). Therefore, this study investigated consumers in China—the country with the largest number of cars worldwide—as research subjects and used a combination of online questionnaires and physical field observations to examine IoV-related perceived importance (PI), perceived attraction (PA), perceived cost (PC), perceived trust (PT), usage intention (UI), and RGs. A total of 576 questionnaires were returned, among which 410 valid questionnaires were obtained, posting a valid response rate of 71.78%. The results were as follows: (1) PI, PA, and PT all had significant positive effects on UI, whereas PC had a significant negative effect on UI; (2) PI and PA had significant positive effects on PT, whereas PC had a significant negative effect on PT; (3) PT had a partial mediating effect on the positive relationships between perceived importance of control and safety (PICS) and UI and between PA and UI as well as the negative relationship between PC and UI; on the relationship between perceived importance of social entertainment and UI, PT had a perfect mediating effect; (4) RGs had a significant negative moderating effect on the PICS–PT and PA–PT relationships, whereas they had a marginally significant positive moderating effect on the PC–UI relationship.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator 用于PSK调制器的窄带锁相环乘法器鉴相器
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118523
L. Kirasamuthranon, P. Wardkein, J. Koseeyaporn
{"title":"Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator","authors":"L. Kirasamuthranon, P. Wardkein, J. Koseeyaporn","doi":"10.1109/ICCCS49078.2020.9118523","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118523","url":null,"abstract":"Among digital to analog modulation, phase shift keying is superior than amplitude shift keying and frequency shift keying. Especially, the quadrature phase shift keying is the most popular modulating technique. The reason is because this modulation is effective in bandwidth usage. However, the sudden change in amplitude during inversely phase changed, e.g. $pi/4Rightarrow-3pi/4$, requires more bandwidth for transmitting signal. Later, a QPSK modulator based phase locked loop (PLL) [6] is proposed which shows that its QPSK signal consumes less bandwidth compared to the conventional QPSK modulator [7], [8]. However, further study of [6] founds that redundant high frequency components exist in the output of phase detector (PD). In this paper, a new structure of PD of the PLL is proposed which is based on a multiplier circuit. The mathematical analysis of this circuit shows that there is only one high frequency component in the PD output. The simulation result also confirms well with the theoretical analysis which is found that the proposed PD can reduce roughly 29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114384406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Dynamic Time Warping Distance Measure as Q U BO Formulation 基于qubo公式的动态时间翘曲距离测度
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118469
Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien
{"title":"The Dynamic Time Warping Distance Measure as Q U BO Formulation","authors":"Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien","doi":"10.1109/ICCCS49078.2020.9118469","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118469","url":null,"abstract":"Dynamic Time Warping (DTW) is a representative of a distance measure that is able to calculate the distance between two time series. It is often used for the recognition of handwriting or spoken language. The metaheuristic Quantum Annealing (QA) can be used to solve combinatorial optimization problems. Similar to Simulated Annealing it seeks to find a global minimum of a target function. In order to use specialized QA hardware, the problem to be optimized needs to be translated into a Quadratic Unconstrained Binary Optimization (QUBO) problem. With this paper we investigate whether it is possible to transfer the DTW distance measure into a QUBO formulation. The motivation behind is the hope on an accelerated execution once the QA hardware scales up and the aspiration of gaining benefits due to quantum effects that are not given in the classical calculation. In principle, we find that it is possible to transform DTW into a QUBO formulation suitable for executing on QA hardware. Also, the algorithm returns not only the minimum total distance between two sequences, but also the corresponding warping path. However, there are several difficulties that make a manual intervention necessary.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121690928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia 基于迁移学习的卷积神经网络在内蒙古沙尘暴预报中的应用
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118553
Qing-dao-er-ji Ren, Ying Qiu, Tiancheng Li
{"title":"Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia","authors":"Qing-dao-er-ji Ren, Ying Qiu, Tiancheng Li","doi":"10.1109/ICCCS49078.2020.9118553","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118553","url":null,"abstract":"There are six deserts and sandy lands in the central and western part of Inner Mongolia, which is one of the main sources of sandstorms in China. In most areas, the surface is dry, the precipitation is low and the wind is strong in winter and spring. The analysis and study of sandstorms in this area is of great significance to the study and prediction of sandstorms in China. Based on the comprehensive analysis of the research status of sandstorms at home and abroad, the application of convolution neural network to classify satellite cloud images and establish prediction models of sandstorms are relatively few. The convolution neural network algorithm based on transfer learning is used to classify infrared satellite cloud images to establish Sand-dust Storm Prediction model, and the prediction accuracy of sand-dust storm prediction model established under different learning strategies is compared in the paper. The results show that the model training speed is fast and the accuracy and generalization ability of the model are improved by using the parameter migration initialization network in transfer learning. The Sand-dust Storm Prediction Model Based on the convolution neural network algorithm of transfer learning has a higher accuracy in predicting the occurrence of sand-dust storm and the change of learning strategies has an important influence on the prediction accuracy of sandstorm prediction model.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Batch Target Recognition Count under Complex Conditions Based on Att-Unet 基于at - unet的复杂条件下批量目标识别计数
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118519
PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu
{"title":"Batch Target Recognition Count under Complex Conditions Based on Att-Unet","authors":"PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu","doi":"10.1109/ICCCS49078.2020.9118519","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118519","url":null,"abstract":"As we all know, the large number of counts is a challenging and time consuming task subject because of oversized number and complex conditions. However, the development of deep learning makes deep learning models very competitive in image segmentation. In this paper, we take cigarette filter rods as the research object. we first evaluate the standard Unet for the filter rod target recognition to separate target and background. Secondly, we use the focal loss function instead of the traditional cross-entropy function to solve the problem of imbalance between target and background area. Thirdly, we add a self-attention module in the traditional Unet convolutional layer to enhance the convolution effect. Fourth, we propose structural element detection criteria and round tangency matching strategy based on HMM (Hidden Markov Model) for the geometric relationship of filter rod position, which further improves the accuracy of the algorithm. We used Qu's [1], Mask-R-CNN [2], FCN [3], Deep-lab-V1 [4] and this paper’s algorithm to test the performance of 30000 images from the industrial site. The performance of this paper’s algorithm is completely better than the performance of the above algorithm.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption 使用同态加密的Sm9私钥和数字签名的协作代
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118464
Yihong Long, Feng Xiong
{"title":"Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption","authors":"Yihong Long, Feng Xiong","doi":"10.1109/ICCCS49078.2020.9118464","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118464","url":null,"abstract":"SM9 is a class of identity based cryptography (IBC) schemes released by the State Cryptography Administration of China. With SM9, a user’s private key is generated by a central system called private key generator (PKG) using a master key. To prevent the disastrous damage caused by the master key leakage and to meet the corporate customers’ requirement of involving in the key generation process, two collaborative SM9 private key generation schemes are proposed, in which a user’s SM9 private key is collaboratively generated by two separate PKGs sharing the master key. The two PKGs are deployed in an SM9 private key service provider’s site or one of the PKGs is deployed in the private key service provider’s site while the other is deployed in a corporate customer’s site. To alleviate the possible loss caused by the leakage of a user’s private key in the end device that has no dedicated cryptographic hardware, an SM9 signature collaborative generation scheme is proposed, in which the secret of a user’s SM9 private key is shared between the user’s end device and a dedicated cryptographic device, and the devices collaborate to generate the signature to a message with their respective secret shares when signing a message with the SM9 private key is required. The approach for the proposed schemes is secret sharing and homomorphic encryption. The proposed schemes effectively address the private key leakage issues mentioned above.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131592474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Multiple-Antenna Emitters Using Power Amplifier Nonlinearity 利用功率放大器非线性辨识多天线发射体
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118489
Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei
{"title":"Identification of Multiple-Antenna Emitters Using Power Amplifier Nonlinearity","authors":"Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei","doi":"10.1109/ICCCS49078.2020.9118489","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118489","url":null,"abstract":"Power amplifier (PA) nonlinearity typically plays a crucial role in the application of specific emitter identification (SEI), due to its uniqueness at the radio frequency (RF) frontend for particular emitter. For a multiple-antenna emitter with multiple PAs inside, this paper first presents a PA parameter estimator based on a two-stage linear least square (LLS) method in the MIMO multipath communication scenario. Treated as the RF fingerprint, the extracted nonlinear coefficients are then used to classify the individual multipleantenna emitters based on the minimum error probability (MEP) criterion. In addition, we analyze the impacts of mismatch of PA model and rank-deficient condition of the LLS problem in depth. Finally, the proposed approach is validated to be effective through extensive numerical simulations.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard CCSDS近地标准中QC-LDPC码的编解码器实现
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118542
Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang
{"title":"Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard","authors":"Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang","doi":"10.1109/ICCCS49078.2020.9118542","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118542","url":null,"abstract":"Recently, type-II quasi-cyclic (QC) low-density parity-check (LDPC) codes have attracted increasing attention due to their compact structures and promising decoding performance. In this paper, the type-II QC-LDPC code standardized for use in near-earth application is implemented by FPGA. On the basis of analysis for the generator matrix and parity-check matrix of the code, the codec for the type-II LDPC code is designed. By using an XC4VLX200-FPGA, the maximum clock frequency of the encoder is 287MHz at the cost of 810 slices and 15 Blockrams, while the maximum clock frequency of the decoder is 244 MHz at the cost of 10481 slices and 74 Blockrams. The testing result for the codec performance shows that such a code can completely satisfy the requirement for on-board channel coding application. The codec developed in this paper has been successfully employed in many remote-sensing satellite missions in China.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation 基于残差补偿的增强下/上采样视频编码
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118561
Hangpu Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei
{"title":"Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation","authors":"Hangpu Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei","doi":"10.1109/ICCCS49078.2020.9118561","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118561","url":null,"abstract":"Down/up-sampling-based video coding is an effective strategy to cope with limited bandwidth for transmission. In recent years, CNN-based super-resolution methods have also been integrated into the above coding strategy. However, it raises a problem of how to balance the calculation and reconstruction quality. In order to alleviate this problem, we propose an enhanced down/up-sampling-based video coding scheme, in which residual data is used to compensate the unrecovered details of the reconstructed video. We first down-sample the video prior to encoding at the encoder and then obtain the residual data by subtracting the super-resolution reconstructed video frame from the original video frame. The residual data is encoded and transmitted together with the low-resolution video sequence. The decoder first reconstructs the encoded low-resolution video with CNN-based super resolution method, and then uses residual data to compensate the missing details of the reconstructed video. To further enhance the perceived quality, we use a quality enhancement network to enhance the quality-compensated video. The experimental results show that the proposed scheme achieves superior quality improvement compared with HEVC anchor and the general down/up-sampling schemes.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信