Frontiers of Information Technology & Electronic Engineering最新文献

筛选
英文 中文
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system 在以用户为中心的无小区大规模多输入多输出系统中防止串通窃听的安全资源分配
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200599
Na Li, Yuanyuan Gao, Kui Xu, Xiaochen Xia, Huazhi Hu, Yang Li, Yueyue Zhang
{"title":"Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system","authors":"Na Li, Yuanyuan Gao, Kui Xu, Xiaochen Xia, Huazhi Hu, Yang Li, Yueyue Zhang","doi":"10.1631/fitee.2200599","DOIUrl":"https://doi.org/10.1631/fitee.2200599","url":null,"abstract":"<p>We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers. To address the problem of limited pilot resources, a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation. Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers, based on the local partial zero-forcing precoding scheme, a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency. Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"154 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel design of a compact tunable dual band wireless power transfer (TDB-WPT) system for multiple WPT applications 用于多种 WPT 应用的紧凑型可调双频无线功率传输 (TDB-WPT) 系统的新颖设计
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200664
Hany A. Atallah, Rasha Hussein Ahmed, Adel B. Abdel-Rahman
{"title":"Novel design of a compact tunable dual band wireless power transfer (TDB-WPT) system for multiple WPT applications","authors":"Hany A. Atallah, Rasha Hussein Ahmed, Adel B. Abdel-Rahman","doi":"10.1631/fitee.2200664","DOIUrl":"https://doi.org/10.1631/fitee.2200664","url":null,"abstract":"<p>In this study we present the design and realization of a tunable dual band wireless power transfer (TDB-WPT) coupled resonator system. The frequency response of the tunable band can be controlled using a surface-mounted varactor. The transmitter (Tx) and the receiver (Rx) circuits are symmetric. The top layer contains a feed line with an impedance of 50 Ω. Two identical half rings defected ground structures (HR-DGSs) are loaded on the bottom using a varactor diode. We propose a solution for restricted WPT systems working at a single band application according to the operating frequency. The effects of geometry, orientation, relative distance, and misalignments on the coupling coefficients were studied. To validate the simulation results, the proposed TDB-WPT system was fabricated and tested. The system occupied a space of 40 mm×40 mm. It can deliver power to the receiver with an average coupling efficiency of 98% at the tuned band from 817 to 1018 MHz and an efficiency of 95% at a fixed band of 1.6 GHz at a significant transmission distance of 22 mm. The results of the measurements accorded well with those of an equivalent model and the simulation.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"100 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A spaceborne advanced storage system for remote sensing microsatellites 遥感微型卫星的星载高级存储系统
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200445
Shilei Tu, Huiquan Wang, Yue Huang, Zhonghe Jin
{"title":"A spaceborne advanced storage system for remote sensing microsatellites","authors":"Shilei Tu, Huiquan Wang, Yue Huang, Zhonghe Jin","doi":"10.1631/fitee.2200445","DOIUrl":"https://doi.org/10.1631/fitee.2200445","url":null,"abstract":"<p>With the development of satellite miniaturization and remote sensing, the establishment of microsatellite constellations is an inevitable trend. Due to their limited size, weight, and power, spaceborne storage systems with excellent scalability, performance, and reliability are still one of the technical bottlenecks of remote sensing microsatellites. Based on the commercial off-the-shelf field-programmable gate array and memory devices, a spaceborne advanced storage system (SASS) is proposed in this paper. This work provides a dynamic programming, queue scheduling multiple-input multiple-output cache technique and a high-speed, high-reliability NAND flash controller for multiple microsatellite payload data. Experimental results show that SASS has outstanding scalability with a maximum write rate of 2429 Mb/s and preserves at least 78.53% of the performance when a single NAND flash fails. The scheduling technique effectively shortens the data scheduling time, and the data remapping method of the NAND flash controller can reduce the retention error by at least 50.73% and the program disturbance error by at least 37.80%.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"21 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability evaluation of controller area networks under the influence of intermittent connection faults 间歇性连接故障影响下的控制器区域网络可用性评估
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200592
Longkai Wang, Leiming Zhang, Yong Lei
{"title":"Availability evaluation of controller area networks under the influence of intermittent connection faults","authors":"Longkai Wang, Leiming Zhang, Yong Lei","doi":"10.1631/fitee.2200592","DOIUrl":"https://doi.org/10.1631/fitee.2200592","url":null,"abstract":"<p>Controller area networks (CANs), as one of the widely used fieldbuses in the industry, have been extended to the automation field with strict standards for safety and reliability. In practice, factors such as fatigue and insulation wear of the cables can cause intermittent connection (IC) faults to occur frequently in the CAN, which will affect the dynamic behavior and the safety of the system. Hence, quantitatively evaluating the performance of the CAN under the influence of IC faults is crucial to real-time health monitoring of the system. In this paper, a novel methodology is proposed for real-time quantitative evaluation of CAN availability when considering IC faults, with the system availability parameter being calculated based on the network state transition model. First, the causal relationship between IC fault and network error response is constructed, based on which the IC fault arrival rate is estimated. Second, the states of the network considering IC faults are analyzed, and the deterministic and stochastic Petri net (DSPN) model is applied to describe the transition relationship of the states. Then, the parameters of the DSPN model are determined and the availability of the system is calculated based on the probability distribution and physical meaning of markings in the DSPN model. A testbed is constructed and case studies are conducted to verify the proposed methodology under various experimental setups. Experimental results show that the estimation results obtained using the proposed method agree well with the actual values.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"20 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission 缓解以信息为中心的卫星网络突发流量的最佳复制策略:聚焦遥感图像传输
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-04-18 DOI: 10.1631/fitee.2400025
Ziyang Xing, Xiaoqiang Di, Hui Qi, Jing Chen, Jinhui Cao, Jinyao Liu, Xusheng Li, Zichu Zhang, Yuchen Zhu, Lei Chen, Kai Huang, Xinghan Huo
{"title":"Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission","authors":"Ziyang Xing, Xiaoqiang Di, Hui Qi, Jing Chen, Jinhui Cao, Jinyao Liu, Xusheng Li, Zichu Zhang, Yuchen Zhu, Lei Chen, Kai Huang, Xinghan Huo","doi":"10.1631/fitee.2400025","DOIUrl":"https://doi.org/10.1631/fitee.2400025","url":null,"abstract":"<p>Information-centric satellite networks play a crucial role in remote sensing applications, particularly in the transmission of remote sensing images. However, the occurrence of burst traffic poses significant challenges in meeting the increased bandwidth demands. Traditional content delivery networks are ill-equipped to handle such bursts due to their pre-deployed content. In this paper, we propose an optimal replication strategy for mitigating burst traffic in information-centric satellite networks, specifically focusing on the transmission of remote sensing images. Our strategy involves selecting the most optimal replication delivery satellite node when multiple users subscribe to the same remote sensing content within a short time, effectively reducing network transmission data and preventing throughput degradation caused by burst traffic expansion. We formulate the content delivery process as a multi-objective optimization problem and apply Markov decision processes to determine the optimal value for burst traffic reduction. To address these challenges, we leverage federated reinforcement learning techniques. Additionally, we use bloom filters with subdivision and data identification methods to enable rapid retrieval and encoding of remote sensing images. Through software-based simulations using a low Earth orbit satellite constellation, we validate the effectiveness of our proposed strategy, achieving a significant 17% reduction in the average delivery delay. This paper offers valuable insights into efficient content delivery in satellite networks, specifically targeting the transmission of remote sensing images, and presents a promising approach to mitigate burst traffic challenges in information-centric environments.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"41 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140629464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust tensor watermarking algorithm for diffusion-tensor images 扩散张量图像的鲁棒张量水印算法
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-03-23 DOI: 10.1631/fitee.2200628
Chengmeng Liu, Zhi Li, Guomei Wang, Long Zheng
{"title":"A robust tensor watermarking algorithm for diffusion-tensor images","authors":"Chengmeng Liu, Zhi Li, Guomei Wang, Long Zheng","doi":"10.1631/fitee.2200628","DOIUrl":"https://doi.org/10.1631/fitee.2200628","url":null,"abstract":"<p>Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks. However, after embedding watermark signals by convolution, the feature fusion efficiency of convolution is relatively low; this can easily lead to distortion in the embedded image. When distortion occurs in medical images, especially in diffusion tensor images (DTIs), the clinical value of the DTI is lost. To address this issue, a robust watermarking algorithm for DTIs implemented by fusing convolution with a Transformer is proposed to ensure the robustness of the watermark and the consistency of sampling distance, which enhances the quality of the reconstructed image of the watermarked DTIs after embedding the watermark signals. In the watermark-embedding network, T1-weighted (T1w) images are used as prior knowledge. The correlation between T1w images and the original DTI is proposed to calculate the most significant features from the T1w images by using the Transformer mechanism. The maximum of the correlation is used as the most significant feature weight to improve the quality of the reconstructed DTI. In the watermark extraction network, the most significant watermark features from the watermarked DTI are adequately learned by the Transformer to robustly extract the watermark signals from the watermark features. Experimental results show that the average peak signal-to-noise ratio of the watermarked DTI reaches 50.47 dB, the diffusion characteristics such as mean diffusivity and fractional anisotropy remain unchanged, and the main axis deflection angle <i>α</i><sub>AC</sub> is close to 1. Our proposed algorithm can effectively protect the copyright of the DTI and barely affects the clinical diagnosis.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"364 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system 基于身份的网格可搜索属性签名加密,用于基于区块链的医疗系统
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-03-23 DOI: 10.1631/fitee.-2300248
Huifang Yu, Xiaoping Bai
{"title":"Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system","authors":"Huifang Yu, Xiaoping Bai","doi":"10.1631/fitee.-2300248","DOIUrl":"https://doi.org/10.1631/fitee.-2300248","url":null,"abstract":"<p>Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an identity-based searchable attribute signcryption in lattice for a blockchain-based medical system (BCMS-LIDSASC). BCMS-LIDSASC achieves decentralization and anti-quantum security in the blockchain environment, and provides fine-grained access control and searchability. Furthermore, smart contracts are used to replace traditional trusted third parties, and the interplanetary file system (IPFS) is used for ciphertext storage to alleviate storage pressure on the blockchain. Compared to other schemes, BCMS-LIDSASC requires smaller key size and less storage, and has lower computation cost. It contributes to secure and efficient management of medical data and can protect patient privacy and ensure the integrity of electronic healthcare systems.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"72 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive and augmented active anomaly detection on dynamic network traffic streams 动态网络流量流的自适应和增强型主动异常检测
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-03-23 DOI: 10.1631/fitee.2300244
Bin Li, Yijie Wang, Li Cheng
{"title":"Adaptive and augmented active anomaly detection on dynamic network traffic streams","authors":"Bin Li, Yijie Wang, Li Cheng","doi":"10.1631/fitee.2300244","DOIUrl":"https://doi.org/10.1631/fitee.2300244","url":null,"abstract":"<p>Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model, and has been widely adopted in detecting network attacks. However, existing methods cannot achieve desirable performance on dynamic network traffic streams because (1) their query strategies cannot sample informative instances to make the detection model adapt to the evolving stream and (2) their model updating relies on limited query instances only and fails to leverage the enormous unlabeled instances on streams. To address these issues, we propose an active tree based model, adaptive and augmented active prior-knowledge forest (A<sup>3</sup>PF), for anomaly detection on network traffic streams. A prior-knowledge forest is constructed using prior knowledge of network attacks to find feature subspaces that better distinguish network anomalies from normal traffic. On one hand, to make the model adapt to the evolving stream, a novel adaptive query strategy is designed to sample informative instances from two aspects: the changes in dynamic data distribution and the uncertainty of anomalies. On the other hand, based on the similarity of instances in the neighborhood, we devise an augmented update method to generate pseudo labels for the unlabeled neighbors of query instances, which enables usage of the enormous unlabeled instances during model updating. Extensive experiments on two benchmarks, CIC-IDS2017 and UNSW-NB15, demonstrate that A<sup>3</sup>PF achieves significant improvements over previous active methods in terms of the area under the receiver operating characteristic curve (AUC-ROC) (20.9% and 21.5%) and the area under the precision-recall curve (AUC-PR) (44.6% and 64.1%).</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"157 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-rank matrix recovery with total generalized variation for defending adversarial examples 利用总广义变异恢复低等级矩阵以防御对抗性实例
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-03-23 DOI: 10.1631/fitee.2300017
Wen Li, Hengyou Wang, Lianzhi Huo, Qiang He, Linlin Chen, Zhiquan He, Wing W. Y. Ng
{"title":"Low-rank matrix recovery with total generalized variation for defending adversarial examples","authors":"Wen Li, Hengyou Wang, Lianzhi Huo, Qiang He, Linlin Chen, Zhiquan He, Wing W. Y. Ng","doi":"10.1631/fitee.2300017","DOIUrl":"https://doi.org/10.1631/fitee.2300017","url":null,"abstract":"<p>Low-rank matrix decomposition with first-order total variation (TV) regularization exhibits excellent performance in exploration of image structure. Taking advantage of its excellent performance in image denoising, we apply it to improve the robustness of deep neural networks. However, although TV regularization can improve the robustness of the model, it reduces the accuracy of normal samples due to its over-smoothing. In our work, we develop a new low-rank matrix recovery model, called LRTGV, which incorporates total generalized variation (TGV) regularization into the reweighted low-rank matrix recovery model. In the proposed model, TGV is used to better reconstruct texture information without over-smoothing. The reweighted nuclear norm and <i>L</i><sub>1</sub>-norm can enhance the global structure information. Thus, the proposed LRTGV can destroy the structure of adversarial noise while re-enhancing the global structure and local texture of the image. To solve the challenging optimal model issue, we propose an algorithm based on the alternating direction method of multipliers. Experimental results show that the proposed algorithm has a certain defense capability against black-box attacks, and outperforms state-of-the-art low-rank matrix recovery methods in image restoration.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"67 7 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards understanding bogus traffic service in online social networks 了解在线社交网络中的虚假流量服务
IF 3 3区 工程技术
Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-03-23 DOI: 10.1631/fitee.2300068
Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji
{"title":"Towards understanding bogus traffic service in online social networks","authors":"Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji","doi":"10.1631/fitee.2300068","DOIUrl":"https://doi.org/10.1631/fitee.2300068","url":null,"abstract":"<p>Critical functionality and huge influence of the hot trend/topic page (HTP) in microblogging sites have driven the creation of a new kind of underground service called the bogus traffic service (BTS). BTS provides a kind of illegal service which hijacks the HTP by pushing the controlled topics into it for malicious customers with the goal of guiding public opinions. To hijack HTP, the agents of BTS maintain an army of black-market accounts called bogus traffic accounts (BTAs) and control BTAs to generate a burst of fake traffic by massively retweeting the tweets containing the customer desired topic (hashtag). Although this service has been extensively exploited by malicious customers, little has been done to understand it. In this paper, we conduct a systematic measurement study of the BTS. We first investigate and collect 125 BTS agents from a variety of sources and set up a honey pot account to capture BTAs from these agents. We then build a BTA detector that detects 162 218 BTAs from Weibo, the largest Chinese microblogging site, with a precision of 94.5%. We further use them as a bridge to uncover 296 916 topics that might be involved in bogus traffic. Finally, we uncover the operating mechanism from the perspectives of the attack cycle and the attack entity. The highlights of our findings include the temporal attack patterns and intelligent evasion tactics of the BTAs. These findings bring BTS into the spotlight. Our work will help in understanding and ultimately eliminating this threat.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"164 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信