ICC 2020 - 2020 IEEE International Conference on Communications (ICC)最新文献

筛选
英文 中文
Energy-efficient clustering and routing algorithm for large-scale SDN-based IoT monitoring 基于sdn的大规模物联网监控节能聚类和路由算法
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148659
Abdallah Ouhab, Thiago Abreu, Hachem Slimani, A. Mellouk
{"title":"Energy-efficient clustering and routing algorithm for large-scale SDN-based IoT monitoring","authors":"Abdallah Ouhab, Thiago Abreu, Hachem Slimani, A. Mellouk","doi":"10.1109/ICC40277.2020.9148659","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148659","url":null,"abstract":"In the context of large-scale Internet of Things (IoT), one of the main issues comes from the lack of an efficient routing protocol that could handle thousands of devices and provide a low-power forwarding mechanism for huge amounts of data. Furthermore, this routing protocol should cope with the intrinsic device-to-device communications paradigm of IoT, where nodes no longer need an intermediate station for communication and synchronizing, in order to exploit all options to deliver a better quality of service (QoS) for the network. Although many solutions have been proposed to meet QoS requirements for various applications based on IoT, they usually do not provide significant increase on a network performance when the number of nodes becomes too large. Therefore, in this work, we provide a new modelling paradigm, organized on a two-level control mechanism, to overcome this problem. For the first level, we propose a new Routing Protocol for Low-Power and Lossy Networks (RPL) approach based on multi-hop clustering technique (MHC-RPL). It is used as a local control to organize nodes in clusters, in order to reduce energy consumption in the IoT. The second level uses Software Defined Networking (SDN) with Q-routing algorithm for intelligent management of the global network. Our results show that the proposed model provides significant better results in terms of end-to-end delay, packet delivery ratio and energy-consumption than current state-of-the-art.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Component-Dependent Independent Component Analysis for Time-Sensitive Applications 时间敏感应用的组件依赖独立组件分析
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149432
Huanzhuo Wu, Yunbin Shen, Jiajing Zhang, I. Tsokalo, H. Salah, F. Fitzek
{"title":"Component-Dependent Independent Component Analysis for Time-Sensitive Applications","authors":"Huanzhuo Wu, Yunbin Shen, Jiajing Zhang, I. Tsokalo, H. Salah, F. Fitzek","doi":"10.1109/ICC40277.2020.9149432","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149432","url":null,"abstract":"In time-sensitive applications within industry 4.0, e.g. anomaly detection and human-in-the-loop, the data generated by multiple sources should be quickly separated to give the applications more time to make decisions and ultimately improve production performance. In this paper, we propose a Component-dependent Independent Component Analysis (CdICA) method that can separate multiple randomly mixed signals into independent source signals faster, for further data analysis in time-sensitive applications. Based on the Independent Component Analysis (ICA) algorithm, we first generate an initial separation matrix relying on the known mixture components, so that the separation speed of the traditional ICA can be increased. Our simulative results show that the CdICA method reduces the separation time by 55% to 83% compared to the most notable related work called FastICA and meanwhile it does not diminish the accuracy of the separation.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Data-Aided Channel Estimation for Poisson Channels With Inter-Symbol Interference 符号间干扰泊松信道的数据辅助信道估计
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148723
Beiyuan Liu, Chen Gong, Julian Cheng, Zhengyuan Xu
{"title":"Data-Aided Channel Estimation for Poisson Channels With Inter-Symbol Interference","authors":"Beiyuan Liu, Chen Gong, Julian Cheng, Zhengyuan Xu","doi":"10.1109/ICC40277.2020.9148723","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148723","url":null,"abstract":"It has been shown that long pilots should be employed in a Poisson channel with inter-symbol interference to obtain accurate channel estimate, which may reduce the transmission efficiency. In this paper, an iterative data-aided channel estimation and signal detection algorithm is proposed with significant shortened overhead but can approach the bit-error rate performance under perfect channel state information. In this algorithm, periodic pilots are not required and only one short pilot sequence is utilized to obtain a rough initial channel estimate, which will be strengthened and updated by iteratively employing the blockwise data symbols as additional pilots. It is proved that treating the detected data symbols as pilots is a biased estimation, where the bias is proportional to the bit-error rate. Numerical results show that the proposed approach employing only 20 initial pilots can approach the optimal bound. The same bound needs to be achieved by assigning at least 500 pilots using periodic pilot based channel estimation.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Group Fault Tolerance for Multi-tier Services in Cloud Environments 云环境下多层服务的高效组容错
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/icc40277.2020.9149253
Chieh-Yu Yu, Che-Rung Lee, Po-Jui Tsao, Yu-Shiang Lin, T. Chiueh
{"title":"Efficient Group Fault Tolerance for Multi-tier Services in Cloud Environments","authors":"Chieh-Yu Yu, Che-Rung Lee, Po-Jui Tsao, Yu-Shiang Lin, T. Chiueh","doi":"10.1109/icc40277.2020.9149253","DOIUrl":"https://doi.org/10.1109/icc40277.2020.9149253","url":null,"abstract":"Fault tolerance is the key technology to achieve high availability for non-stop and long-lasting services, which is usually carried out by the virtualization technology in the era of cloud computing. However, most virtualization-based fault tolerance methods only focus on the resilience of a single server (Individual FT), which can cause great performance degradation for the services that have heavy communication among multiple nodes. One of the solutions is the Group Fault Tolerance (Group FT) technique, which synchronizes a group of VMs within single fault tolerance states to avoid the latency accumulation problem. In this paper, we present an efficient implementation of Group FT, as well as the methods to enhance the performance of Group FT’s failover process. Experiments show that Group FT can reduce 88% system latency of the Individual FT when running the OLTP workload in SysBench. Similar results are also shown for a more complicated synthetic multi-tier architecture. Moreover, the performance of the failover process for Group FT is also optimized so that it is comparable to the performance of Individual FT.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121650708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cloud-native Service Function Chaining for 5G based on Network Service Mesh 基于Network Service Mesh的5G云原生业务功能链
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149045
Boutheina Dab, Ilhem Fajjari, Mathieu Rohon, Cyril Auboin, Arnaud Diquélou
{"title":"Cloud-native Service Function Chaining for 5G based on Network Service Mesh","authors":"Boutheina Dab, Ilhem Fajjari, Mathieu Rohon, Cyril Auboin, Arnaud Diquélou","doi":"10.1109/ICC40277.2020.9149045","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149045","url":null,"abstract":"5G will provide a flexible and programmable infrastructure, allowing different networks to share the same access network. A way to respond to the diverse service requirements of 5G while reducing both CAPEX and OPEX is to adopt cloud-native architectures. In this context, micro-services software design, the corner stone of cloud-native architecture, seems to be ideal for 5G. However, despite its several advantages, micro-services raise new challenges which slow its adoption down in the NFV ecosystem. Indeed, steering the expected 5G traffic between cloud-native network function is extremely challenging and is still under-investigated. In this paper, we address the service function chaining (SFC) in micro-service based network function virtualization (NFV) ecosystem from the view of the traffic steering. Specifically, we design and implement a cloud-native SFC framework offering efficient traffic steering mechanisms while considering the network state of the underlying NFV infrastructure. In this context, an optimized network-aware load balancing strategy is proposed. Based on extensive experiments, the results obtained show that our strategy achieved good results in terms of i) end-to-end latency and ii) deployment time.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Subspace Marginalized Belief Propagation for mmWave Overloaded MIMO Signal Detection 毫米波过载MIMO信号检测的子空间边缘信念传播
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148674
Takumi Takahashi, S. Ibi, Antti Tölli, S. Sampei
{"title":"Subspace Marginalized Belief Propagation for mmWave Overloaded MIMO Signal Detection","authors":"Takumi Takahashi, S. Ibi, Antti Tölli, S. Sampei","doi":"10.1109/ICC40277.2020.9148674","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148674","url":null,"abstract":"This paper deals with mmWave overloaded multiuser multi-input multi-output (MU-MIMO) detection, where the number of receive antennas is less than that of transmitted streams. Belief propagation (BP) is well known strategy for achieving large-scale MU detection (MUD) with low-complexity and high-accuracy. However, in mmWave massive MUD, the BP-based signal detector is subject to ill convergence behavior of iterative detection due to under-determined problem induced by spatial overloading and strong correlation among user channels induced by narrow angular spread of receive signal and line-of-sight (LOS) environments. To alleviate these impairments, we propose a novel iterative MUD approach based on beam-domain subspace marginalized BP (SMBP). Exploiting the approximate sparsity of beam-domain channels, the maximum likelihood (ML) principle is used to combine the strongly correlated signal subspace with reduced dimension while the BP-based detection is used for the remaining complementary subspace. The space partitioning criterion is adaptively determined based on channel state information (CSI) so that the two subspaces are as orthogonal as possible. Numerical results show that the proposed method is able to serve a massive number of wireless connections with low computational complexity even in the LOS environment, while providing excellent BER performance.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121436763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NOMA-Based Cell-Free Massive MIMO Over Spatially Correlated Rician Fading Channels 空间相关衰落信道上基于noma的无单元大规模MIMO
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148861
Jiayi Zhang, Jingyi Fan, B. Ai, D. W. K. Ng
{"title":"NOMA-Based Cell-Free Massive MIMO Over Spatially Correlated Rician Fading Channels","authors":"Jiayi Zhang, Jingyi Fan, B. Ai, D. W. K. Ng","doi":"10.1109/ICC40277.2020.9148861","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148861","url":null,"abstract":"This paper considers non-orthogonal multiple access (NOMA) based cell-free massive multiple-input multiple-output (mMIMO) systems over spatially correlated Rician fading channels. Closed-form downlink achievable sum-rate expression is derived by taking into account spatial correlation among multi-antenna access points, inter-cluster interference, intra-cluster pilot contamination, and imperfect successive interference cancellation (SIC). In particular, we propose an intra-cluster power allocation design for improving the system performance. Furthermore, we investigate the downlink performance with both minimum mean-squared error (MMSE) and element-wise MMSE channel estimation. It is interesting to find out that the correlation magnitude has a negligible effect on the system sum-rate in spatially correlated Rician fading channels. The numerical results validate the correctness of the presented results and confirm the effectiveness of the proposed power allocation.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT 公平感知子载波分配以对抗物联网中全双工窃听和干扰攻击
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149023
Bhawna Ahuja, Deepak Mishra, R. Bose
{"title":"Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT","authors":"Bhawna Ahuja, Deepak Mishra, R. Bose","doi":"10.1109/ICC40277.2020.9149023","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149023","url":null,"abstract":"To address the growing concern of security in advance communication networks like Internet of things (IoT), this work aims to propose an optimisation framework for fair subcarrier allocation to encounter a full duplex (FD) attacker. We first analyse the performance of secure communication in a multi-user IoT system against an FD hybrid attacker possessing the capability of concurrent eavesdropping and jamming. Specifically, a novel analytical expression has been derived for the exact intercept probability considering incomplete information of all ungoverned communication links that include self-interference link along with eavesdropping and jamming ones. The optimisation problem of subcarrier allocation is then formulated as an integer linear program. Finally, a low-complexity suboptimal solution is proposed to circumvent the need for high computational resources for finding the optimal solution to the problem in practice. Numerical results, validating the analytical framework, report the average improvement of more than 25% in secrecy performance over relevant benchmarks. This establishes that the proposed scheme has a potential to mitigate the secrecy outage efficiently for secure and reliable communication in IoT networks.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115869038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RouteStitch: Control Traffic Minimization in SDN by Stitching Routes routestich:通过缝合路由控制SDN中的流量最小化
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148929
An Xie, Huawei Huang, Xiaoliang Wang, Zhuzhong Qian, Sanglu Lu
{"title":"RouteStitch: Control Traffic Minimization in SDN by Stitching Routes","authors":"An Xie, Huawei Huang, Xiaoliang Wang, Zhuzhong Qian, Sanglu Lu","doi":"10.1109/ICC40277.2020.9148929","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148929","url":null,"abstract":"Software Defined Networking (SDN) is beneficial to many applications, such as intra-datacenter communication, inter-datacenter transportation, etc., due to its centralized control. However, this centralized control frequently makes the controller a bottleneck, due to the large amount of interactions between the controller and switches. In this paper, we characterize such interactions as control traffic, and propose RouteStitch to minimize such kind of traffic. RouteStitch exploits existing route entries in switches to build new paths. To this end, RouteStitch first builds a graph model to describe existing route entries. Then, on such a model, a novel minimum color-alternation routing problem is defined to minimize control traffic, after which an optimal algorithm is proposed on a fixed routing path. For general paths, an $O(log_{2}L)$-competitive online algorithm is designed to build new paths in an online manner that preserves fundamental property of switch Ternary Content Addressable Memory (TCAM) capacity and allowed maximum hop length L. Extensive simulation results based on realistic topology show that RouteStitch has good performance in terms of reducing control traffic, by 40%.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Receiver Orientation on Full-Duplex Relay Aided NOMA Underwater Optical Wireless Systems 接收机方向对全双工中继辅助NOMA水下光学无线系统的影响
ICC 2020 - 2020 IEEE International Conference on Communications (ICC) Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148810
Kapila W. S. Palitharathna, H. Suraweera, R. Godaliyadda, V. R. Herath, Z. Ding
{"title":"Impact of Receiver Orientation on Full-Duplex Relay Aided NOMA Underwater Optical Wireless Systems","authors":"Kapila W. S. Palitharathna, H. Suraweera, R. Godaliyadda, V. R. Herath, Z. Ding","doi":"10.1109/ICC40277.2020.9148810","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148810","url":null,"abstract":"In this paper, we consider a non-orthogonal multiple access (NOMA) underwater optical wireless communication system in which a full-duplex decode-and-forward relay is used to assist the far user with weak channel conditions. Full-duplex operation introduces interference to the near user with strong channel conditions and our model covers several practical assumptions such as imperfect interference cancellation and random receiver orientation at the near/far user. In particular, we derive the exact outage probability at the near user and far user valid for log-normal weak turbulence conditions. An accurate outage approximation for the near user is also derived in closed-form. The correctness of the analysis has been verified through simulation results where they both match closely. Moreover, the derived expressions are useful to investigate the impact of various system and channel parameters such as the access point/relay transmit power, node locations, strength of the residual interference and random receiver orientation at the near and far user. Our results reveal that the outage probability of the near user is more sensitive to receiver orientation errors as compared to the far user.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131379034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信