2021 IEEE International Conference on Communications Workshops (ICC Workshops)最新文献

筛选
英文 中文
Fractionally Spaced Equalizer for Next Generation Terahertz Wireless Communication Systems 新一代太赫兹无线通信系统的分数间隔均衡器
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473698
Qiaoyang Ye, Joonyoung Cho, Jeongho Jeon, S. Abu-Surra, Kitaek Bae, Jianzhong Zhang
{"title":"Fractionally Spaced Equalizer for Next Generation Terahertz Wireless Communication Systems","authors":"Qiaoyang Ye, Joonyoung Cho, Jeongho Jeon, S. Abu-Surra, Kitaek Bae, Jianzhong Zhang","doi":"10.1109/ICCWorkshops50388.2021.9473698","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473698","url":null,"abstract":"Higher data rates are required to support exponential growth in wireless traffic, motivating an expansion of the transmission bandwidth for sixth generation (6G) communications. The available bandwidth in the terahertz (THz) band significantly exceeds the available bandwidth in the mmWave band that has been adopted in fifth generation (5G) systems; thus, the THz band is envisioned as a pillar for 6G systems that can support data rates on the order of terabits per second (Tb/s). However, wireless communications in the THz band poses several new challenges. One of these challenges involves the practical constraint of employing a limited oversampling factor to process wideband THz signals, even while leveraging state-of-the-art analog/digital converter techniques. This limited oversampling factor – which can lead to an increased sampling timing offset – degrades the demodulation performance when it is employed in conjunction with a conventional symbol-spaced equalizer. Thus, we employ a fractionally spaced equalizer (FSE) in a THz communication system to overcome the impact of the increased sampling timing offset for a practical system that utilizes a limited sampling rate. Analysis and simulations demonstrate that the FSE can perfectly compensate the timing offset by optimally combining the available samples. Also, an approximation to the noise covariance matrix is proposed to reduce the computational complexity of the frequency-domain FSE.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Passive WiFi CSI Sensing Based Machine Learning Framework for COVID-Safe Occupancy Monitoring 基于被动WiFi CSI传感的新冠病毒安全占用监测机器学习框架
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473673
Aryan Sharma, Junye Li, Deepak Mishra, G. Batista, Aruna Seneviratne
{"title":"Passive WiFi CSI Sensing Based Machine Learning Framework for COVID-Safe Occupancy Monitoring","authors":"Aryan Sharma, Junye Li, Deepak Mishra, G. Batista, Aruna Seneviratne","doi":"10.1109/ICCWorkshops50388.2021.9473673","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473673","url":null,"abstract":"The COVID-19 pandemic requires social distancing to prevent transmission of the virus. Monitoring social distancing is difficult and expensive, especially in \"travel corridors\" such as elevators and commercial spaces. This paper describes a low-cost and non-intrusive method to monitor social distancing within a given space, using Channel State Information (CSI) from passive WiFi sensing. By exploiting the frequency selective behaviour of CSI with a cubic SVM classifier, we count the number of people in an elevator with an accuracy of 92%, and count the occupancy of an office to 97%. As opposed to using a multi-class counting approach, this paper aggregates CSI for the occupancies below and above a COVID-Safe limit. We show that this binary classification approach to the COVID safe decision problem has similar or better accuracy outcomes with much lower computational complexity, allowing for real-world implementation on IoT embedded devices. Robustness and scalability is demonstrated through experimental validation in practical scenarios with varying occupants, different environment settings and interference from other WiFi devices.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Block-D2D: Blockchain-enabled Cooperative D2D-assisted Fog Computing Scheme under Imperfect CSI Block-D2D:不完全CSI下的区块链协同d2d辅助雾计算方案
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473524
Rajesh Gupta, Tejal Rathod, S. Tanwar
{"title":"Block-D2D: Blockchain-enabled Cooperative D2D-assisted Fog Computing Scheme under Imperfect CSI","authors":"Rajesh Gupta, Tejal Rathod, S. Tanwar","doi":"10.1109/ICCWorkshops50388.2021.9473524","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473524","url":null,"abstract":"Fog computing (FC) supports cloud computing services at the edge of the device for more secure and reliable access and processing of the stored data. However, it is beneficial for time-sensitive applications, where the required delay is minimum, but not well suited for mission-critical applications, where the required delay is negligible. To fulfill this requirement, the authors worldwide started integrating FC with device-to-device (D2D) communication. But it was potentially affected by massive interference, which does not improve the total sum rate and secrecy capacity of the wireless channel. Motivated from these gaps, in this paper, we propose a blockchain-enabled cooperative D2D-assisted FC scheme under imperfect CSI in the presence of an eavesdropper called Block-D2D to enhance the total sum rate and secrecy capacity. We used non-orthogonal multiple access (NOMA) scheme for D2D pairs to improve the aforementioned characteristics. Still, the data on the device is not fully secure, which can be modified by any malicious user. This can be protected using blockchain technology, which is immutable, secure, and trusted. To improve the secrecy capacity of the network and spectral efficiency, we used a cooperative game theory. Simulation results show that the elevated performance of the NOMA-based Block-D2D scheme compared to the conventional OFDMA scheme in terms of sum rate, secrecy capacity, and system throughput.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125900771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-Sensitive Overlay Routing via Segment Routing with Failure Correction 通过带故障校正的分段路由实现时间敏感的叠加路由
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473766
Zengwei Zheng, Chenwei Zhao, Jianwei Zhang
{"title":"Time-Sensitive Overlay Routing via Segment Routing with Failure Correction","authors":"Zengwei Zheng, Chenwei Zhao, Jianwei Zhang","doi":"10.1109/ICCWorkshops50388.2021.9473766","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473766","url":null,"abstract":"Due to the overlay technologies, service providers have a logical view of the underlay network and can optimize quality of experience without modifying the physical network. However, the cross-layer interaction inevitably causes network fluctuation due to their inconsistent optimization objectives. Besides, network failures that occur in the underlay not only cause network performance degradation, but also significantly increase the frequency of cross-layer interaction. These problems make the network fluctuate for a long time, reduce the network performance and influence the user experience, especially for time-sensitive applications. In this paper, we propose a failure correction method based on segment routing to deal with the control plane failures and the data plane failures that occur in the underlay. We propose a cross-layer structure with failure correction mechanism, investigate the cross-layer interaction and design two strategies to eliminate fluctuations and make the network converge quickly.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Scalable Authentication Protocol for Access Network Communications using ECC 基于ECC的接入网通信安全可扩展认证协议
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473557
S. Patel, Amit Dua, Neeraj Kumar
{"title":"A Secure Scalable Authentication Protocol for Access Network Communications using ECC","authors":"S. Patel, Amit Dua, Neeraj Kumar","doi":"10.1109/ICCWorkshops50388.2021.9473557","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473557","url":null,"abstract":"The secure message exchange is instrumental in the success of device-to-device communication. Any malicious activity has the potential to compromise the confidentiality or integrity of the messages exchanged between different user equipment. To address the aforementioned issue, this study proposes a novel elliptic curve cryptography based key-exchange protocol for authentication of two user equipment in network-assisted D2D communication. The proposed protocol is based on standard elliptic curve Diffie-Hellman key exchange and hash-based message authentication code. Subsequently, elaborate threat analysis of the proposed protocol against several adversarial attacks is presented to prove its resilience. The observed low computational time and communication overhead associated with this protocol and its resilience against known attacks advance its strong candidature for implementation of D2D communication in 5G cellular networks.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety 面向拥挤空域安全的自主无人机交通管理系统研究
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473838
Lanier A Watkins, Nick Sarfaraz, S. Zanlongo, Joshua Silbermann, T. Young, Randall Sleight
{"title":"An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety","authors":"Lanier A Watkins, Nick Sarfaraz, S. Zanlongo, Joshua Silbermann, T. Young, Randall Sleight","doi":"10.1109/ICCWorkshops50388.2021.9473838","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473838","url":null,"abstract":"Currently, Unmanned Aircraft System (UAS) Traffic Management (UTM) is the Federal Aviation Administration’s (FAA) vision for air traffic management below 400 feet. Production UTM systems tend to reside only at specialized test sites and operational centers. UTM has been articulated as a concept of operation (ConOps) by the FAA. The UTM ConOps describes a complex interaction between UAS, UAS Operators, and the UTM system itself. These interactions may involve human operators, or be fully automated. Currently, most UTM studies and experimental prototypes do not look at the UTM concept from end-to-end; instead, they focus on specific aspects of UTM and thus cannot explore and test the holistic performance of a UTM ecosystem. Equally important is ensuring that production UTM can scale to meet the demands of future airspace, which is estimated to be 65,000 UAS operations (takeoffs and landings) per hour by 2035. The busiest US airports currently handle 300 operations per hour.In this paper, we evaluate a portion of the UTM system using a set of autonomous algorithms for flight plan de-confliction. Preliminary results suggest that the autonomy algorithms used for path planning, strategic de-confliction, and detect and avoid (DAA) are capable of scaling to high-congestion scenarios while drastically reducing collisions between UAS, even with almost all UAS deviating from de-conflicted plans (i.e., rogue UAS). We also observed that de-confliction algorithms represent a dominating safety layer in the separation hierarchy, since the strategic de-confliction algorithms manage airspace density, albeit at the cost of longer mission completion times. Our testing was done using a MATLAB simulator, which used the RRT* algorithm for flight planning, two different schedulers (Genetic Algorithm and the NASA Stratway Strategic Conflict Resolution algorithm) for strategic de-confliction, and the Airborne Collision Avoidance System for small unmanned aircraft systems (ACAS sXu) for DAA.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Edge Federated MARL Approach for Timeliness Maintenance in MEC Collaboration MEC协作中时效性维护的边缘联合MARL方法
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473729
Zheqi Zhu, Shuo Wan, Pingyi Fan, K. Letaief
{"title":"An Edge Federated MARL Approach for Timeliness Maintenance in MEC Collaboration","authors":"Zheqi Zhu, Shuo Wan, Pingyi Fan, K. Letaief","doi":"10.1109/ICCWorkshops50388.2021.9473729","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473729","url":null,"abstract":"Mobile edge computing (MEC) has been widely studied to provide new schemes for communication-computing systems such as industrial Internet of Things (IoTs), vehicular networks, smart city applications, etc. In this work, we mainly investigate on the timeliness maintenance of the MEC systems where the freshness of the data and computation tasks plays a significant role. We firstly formulate the average age of information (AoI) minimization problem of the UAV-assisted MEC systems. To maintain the system timeliness, we propose a novel multi-agent reinforcement learning (MARL) approach, called edge federated multi-agent actor-critic (MAAC), for joint trajectory planning, data scheduling and resource management in the investigated MEC systems. Through the proposed online learning method, edge devices and center controller learn the interactive policies through local observations and carry out the model-wise communication. We build up a simulation platform for time sensitive MEC systems as a gym environment module and implement the proposed algorithm. Furthermore, the comparisons with a popular MARL solution, MADDPG, show that the proposed approach achieves better performance in terms of data freshness and system stability.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reduced-Feedback Scheduling Policies for Energy-efficient MAC 节能MAC的减反馈调度策略
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473845
Priyadarshi Mukherjee, S. De
{"title":"Reduced-Feedback Scheduling Policies for Energy-efficient MAC","authors":"Priyadarshi Mukherjee, S. De","doi":"10.1109/ICCWorkshops50388.2021.9473845","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473845","url":null,"abstract":"Energy efficiency is a critical requirement in low-power wireless sensor networks. In this work, energy-efficient scheduling policies that exploit the temporal variation of wireless channel are presented. The proposed policies avoid regular feedback from the sensor nodes in order to decide on the channel access opportunity and the access duration. The policies cater to delay-tolerant as well as delay-constrained scenarios. The numerical results demonstrate that the proposed policies simultaneously offer a gain of about 20% in data throughput and about 58% in energy efficiency over the nearest competitive approaches. It is also shown that the performance of the scheduling policy corresponding to the delay-constrained scenario is bounded by the policy corresponding to the delay-unconstrained scenario.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-contact Blood Pressure Estimation with Pulse Wave employing Microwave Reflection 利用微波反射脉搏波的非接触式血压测量
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473654
Hinako Ochi, S. Shimamoto, Jiang Liu, Yukino Yamaoka
{"title":"Non-contact Blood Pressure Estimation with Pulse Wave employing Microwave Reflection","authors":"Hinako Ochi, S. Shimamoto, Jiang Liu, Yukino Yamaoka","doi":"10.1109/ICCWorkshops50388.2021.9473654","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473654","url":null,"abstract":"Nowadays it is recommended to do blood pressure measurements on a daily basis at home to prevent diseases caused by high blood pressure. Blood pressure measurements methods using a cuff is most commonly used. However, it is a burden for hypertensive patients and the elderly to put on a blood pressure cuff repeatedly for the multi-metering of blood pressure. Non-contact measurement will provide a comfortable and easy method to monitor blood pressure and pulse rates continuously. This paper proposes a non-contact method to measure both pulse rates and blood pressure simultaneously. In the experiment, microwave signals were transmitted to the body and the reception intensity was measured. The microwave frequencies used in this experiment were 2.4GHz and 5.6GHz. The pulse rates and the blood pressure can be estimated by processing the data obtained from microwave reflection. The experiment results show that the 2.4GHz microwave signals have better estimation accuracy. It indicates that our proposed system is practical and has great potential for the future smart health monitoring system.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low Complexity Rate Splitting Using Hierarchical User Grouping 使用分层用户分组的低复杂度率分割
2021 IEEE International Conference on Communications Workshops (ICC Workshops) Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473715
Elaheh Sadeghabadi, S. Blostein
{"title":"Low Complexity Rate Splitting Using Hierarchical User Grouping","authors":"Elaheh Sadeghabadi, S. Blostein","doi":"10.1109/ICCWorkshops50388.2021.9473715","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473715","url":null,"abstract":"Rate splitting multiple access (RSMA) is a powerful multiple access technique that exploits the advantages of both space-division multiple access (SDMA) and nonorthogonal multiple access (NOMA), making it suitable for heterogeneity of quality of service and high throughput requirements of future networks. RSMA is based on rate splitting at the transmitter and successive interference cancellation (SIC) at the receiver. The number of transmitted streams and the number of possible decoding orders grows exponentially with the number of users. In this paper, a low-complexity rate splitting approach is proposed that finds a subset of all possible common streams by hierarchical user grouping and assigning a common stream to each group. Since the hierarchical user grouping approach creates groups of users of the same size that do not have a user in common, this approach does not require user ordering. To implement this low-complexity RSMA, alternating max-min precoding design and power allocation is used. The beamforming vectors are designed to cancel the multiuser interference. As a result, the beamforming vectors can be designed in multiple levels. Simulation results show that the proposed scheme is able to achieve attractive performance vs. complexity tradeoffs compared to several others in the literature.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信