IEEE Transactions on Cybernetics最新文献

筛选
英文 中文
Saturated Adaptive Fuzzy Fixed-Time Nonsingular Integral Terminal Sliding-Mode Control of AUVs
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-18 DOI: 10.1109/TCYB.2025.3535689
Haihui Long;Pengyu Zhang;Tianli Guo;Jiankang Zhao
{"title":"Saturated Adaptive Fuzzy Fixed-Time Nonsingular Integral Terminal Sliding-Mode Control of AUVs","authors":"Haihui Long;Pengyu Zhang;Tianli Guo;Jiankang Zhao","doi":"10.1109/TCYB.2025.3535689","DOIUrl":"10.1109/TCYB.2025.3535689","url":null,"abstract":"This article investigates the trajectory tracking control issue of autonomous underwater vehicles (AUVs) subject to dynamic uncertainties, external disturbances, and input amplitude and rate saturations. Initially, two new stable systems with fixed-time convergence are developed, and their upper bounds of settling time and convergence regions are thoroughly analyzed. Building on these systems, an enhanced fast nonsingular integral terminal sliding-mode (NITSM) surface and a new virtual control law are designed, respectively. Next, a novel saturated adaptive fuzzy fixed-time NITSM controller is proposed, circumventing the restrictions on uncertainties and input saturation in the existing results. The proposed controller ensures that the tracking error converges to a small neighborhood of the origin within a fixed time. Furthermore, to facilitate the adaptive fixed-time stability analysis, two new inequalities are established and rigorously proved. Using the two inequalities, the fixed-time stability of closed-loop systems is demonstrated by the Lyapunov’s theory. Finally, representative numerical simulations validate the effectiveness of the proposed control scheme.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1634-1647"},"PeriodicalIF":9.4,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Stabilization Controller for Nonlinear Systems With Two Piecewise Controllers and Its Application to Underactuated Ships
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-18 DOI: 10.1109/TCYB.2025.3535768
Zhong-Cai Zhang;Guang-Ren Duan;Yu-Qiang Wu
{"title":"Continuous Stabilization Controller for Nonlinear Systems With Two Piecewise Controllers and Its Application to Underactuated Ships","authors":"Zhong-Cai Zhang;Guang-Ren Duan;Yu-Qiang Wu","doi":"10.1109/TCYB.2025.3535768","DOIUrl":"10.1109/TCYB.2025.3535768","url":null,"abstract":"It is well-known that the stabilizing control of nonholonomic systems is usually divided into two independent steps. This incurs a discontinuous switching control problem when system states start from certain regions. In light of this, we study the continuous and smooth stabilization control issues for nonlinear systems with two piecewise continuous or even smooth stabilization controllers. First, the sufficient conditions for the existence of these controllers are provided. Then, we use the controller extension method to construct some intermediate auxiliary controllers that can link the piecewise controllers given in advance continuously or even smoothly. In addition, by combining model transformation, including the cascade and fully actuated ones, with the extended state observer, we successfully employ the proposed controller extension method to solve the stabilization control of an underactuated surface ship subject to external disturbance.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1594-1605"},"PeriodicalIF":9.4,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Representative Point-Based Clustering With Neighborhood Information for Complex Data Structures
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-14 DOI: 10.1109/TCYB.2025.3536087
Zhongju Shang;Yaoguo Dang;Haowei Wang;Sifeng Liu
{"title":"Representative Point-Based Clustering With Neighborhood Information for Complex Data Structures","authors":"Zhongju Shang;Yaoguo Dang;Haowei Wang;Sifeng Liu","doi":"10.1109/TCYB.2025.3536087","DOIUrl":"10.1109/TCYB.2025.3536087","url":null,"abstract":"Discovering clusters remains challenging when dealing with complex data structures, including those with varying densities, arbitrary shapes, weak separability, or the presence of noise. In this article, we propose a novel clustering algorithm called representative point-based clustering with neighborhood information (RPC-NI), which highlights the significance of neighborhood information often overlooked by existing clustering methods. The proposed algorithm first introduces a new local centrality metric that integrates both neighborhood density and topological convergence to identify core representative points, effectively capturing the structural characteristics of the data. Subsequently, a density-adaptive distance is defined to evaluate dissimilarities between these core representative points, and such distance is used to construct a minimum spanning tree (MST) over these points. Finally, an MST-based clustering algorithm is employed to yield the desired clusters. Incorporating neighborhood information enables RPC-NI to comprehensively determine representative points, and having multiple representative points per cluster allows RPC-NI to adapt to clusters of arbitrary shapes, varying densities, and different sizes. Extensive experiments on widely used datasets demonstrate that RPC-NI outperforms baseline algorithms in terms of clustering accuracy and robustness. These results provide further evidence for the importance of incorporating neighborhood information discovering clusters with complex structures.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1620-1633"},"PeriodicalIF":9.4,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shifting Attack Stabilization and Estimation of Hidden Markov Boolean Networks
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-13 DOI: 10.1109/TCYB.2025.3535929
Liqing Wang;Zheng-Guang Wu
{"title":"Shifting Attack Stabilization and Estimation of Hidden Markov Boolean Networks","authors":"Liqing Wang;Zheng-Guang Wu","doi":"10.1109/TCYB.2025.3535929","DOIUrl":"10.1109/TCYB.2025.3535929","url":null,"abstract":"In this article, a network attack, named shifting attack, is considered for hidden Markov Boolean control networks (HMBCNs). Using semi-tensor product of matrices, the considered network and the network attack are presented in algebraic form. State feedback control (SFC) is then applied to stabilize the considered network to a desired state. A necessary and sufficient condition based on the probability matrix is presented for the stochastic stabilization of the HMBCN, based on which, the design of the SFC is given. Then shifting attack is further studied for HMBCNs. The control strategy will be shifted to another when the HMBCN is under attack. Shifting attack is also modeled in a hidden Markov process, under which, a necessary and sufficient condition for the security of the attacked HMBCN is also presented. Propositions are obtained for the security and insecurity of the attacked HMBCN. Using the change of the probability measurement approach, estimations of the states expectation and the attacked signals expectation for the attacked HMBCN are solved. At last, examples show the effectiveness of the obtained results.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1930-1940"},"PeriodicalIF":9.4,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Synchronization of High-Dimensional Heterogeneous Kuramoto Oscillator Networks: Pinning Impulsive Approach
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-13 DOI: 10.1109/TCYB.2025.3531105
Shanshan Peng;Jianquan Lu;Tingwen Huang;Jürgen Kurths
{"title":"Global Synchronization of High-Dimensional Heterogeneous Kuramoto Oscillator Networks: Pinning Impulsive Approach","authors":"Shanshan Peng;Jianquan Lu;Tingwen Huang;Jürgen Kurths","doi":"10.1109/TCYB.2025.3531105","DOIUrl":"10.1109/TCYB.2025.3531105","url":null,"abstract":"For high-dimensional heterogeneous Kuramoto oscillator networks (HDHKONs) evolving in continuous time, achieving global synchronization can be exceedingly challenging, and in many cases, it may even appear impossible for various network configurations, including Platonic solids and Archimedean solids, or large-scale networks. Herein, a pinning impulsive control approach for HDHKONs is developed to attain global synchronization on the unit sphere without imposing constraints on initial phase distributions. With this approach, the entire network is globally stabilized onto an objective trajectory by impulsively controlling only a small fraction of oscillators. Furthermore, several synchronization criteria are provided to ensure that the global synchronization procedure is successful. These criteria are easily verified and shed light on the interplay among network parameters, the percentage of controlled oscillators, impulsive intensity, and impulsive frequency. Finally, two examples are implemented to validate the theoretical results.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1873-1883"},"PeriodicalIF":9.4,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalizing Vision-Language Models With Hybrid Prompts for Zero-Shot Anomaly Detection
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-13 DOI: 10.1109/TCYB.2025.3536165
Yunkang Cao;Xiaohao Xu;Yuqi Cheng;Chen Sun;Zongwei Du;Liang Gao;Weiming Shen
{"title":"Personalizing Vision-Language Models With Hybrid Prompts for Zero-Shot Anomaly Detection","authors":"Yunkang Cao;Xiaohao Xu;Yuqi Cheng;Chen Sun;Zongwei Du;Liang Gao;Weiming Shen","doi":"10.1109/TCYB.2025.3536165","DOIUrl":"10.1109/TCYB.2025.3536165","url":null,"abstract":"Zero-shot anomaly detection (ZSAD) aims to develop a foundational model capable of detecting anomalies across arbitrary categories without relying on reference images. However, since “abnormality” is inherently defined in relation to “normality” within specific categories, detecting anomalies without reference images describing the corresponding normal context remains a significant challenge. As an alternative to reference images, this study explores the use of widely available product standards to characterize normal contexts and potential abnormal states. Specifically, this study introduces AnomalyVLM, which leverages generalized pretrained vision-language models (VLMs) to interpret these standards and detect anomalies. Given the current limitations of VLMs in comprehending complex textual information, AnomalyVLM generates hybrid prompts—comprising prompts for abnormal regions, symbolic rules, and region numbers—from the standards to facilitate more effective understanding. These hybrid prompts are incorporated into various stages of the anomaly detection process within the selected VLMs, including an anomaly region generator and an anomaly region refiner. By utilizing hybrid prompts, VLMs are personalized as anomaly detectors for specific categories, offering users flexibility and control in detecting anomalies across novel categories without the need for training data. Experimental results on four public industrial anomaly detection datasets, as well as a practical automotive part inspection task, highlight the superior performance and enhanced generalization capability of AnomalyVLM, especially in texture categories. An online demo of AnomalyVLM is available at <uri>https://github.com/caoyunkang/Segment-Any-Anomaly</uri>.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1917-1929"},"PeriodicalIF":9.4,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Self-Adaptive Correlation-Based Multiview Multilabel Learning
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-11 DOI: 10.1109/TCYB.2025.3534231
Changming Zhu;Yimin Yan;Duoqian Miao;Yilin Dong;Witold Pedrycz
{"title":"Multiple Self-Adaptive Correlation-Based Multiview Multilabel Learning","authors":"Changming Zhu;Yimin Yan;Duoqian Miao;Yilin Dong;Witold Pedrycz","doi":"10.1109/TCYB.2025.3534231","DOIUrl":"10.1109/TCYB.2025.3534231","url":null,"abstract":"In order to process multiview multilabel, multilabel, and multiview data, current learning algorithms are designed on the basis of data characteristics, correlations, etc. While these algorithms cannot express correlations among different features, instances, labels in within-view, cross-view, and consensus-view representations self-adaptively and relative accurately. To this end, this study takes the classical multiple correlations-based model as the basis and explores some laws of self-adaptive change for those correlations in multiple representations. The proposed algorithm is called multiple self-adaptive correlation-based multiview multilabel learning (MuSC-MVML). Extensive experiments on 38 datasets demonstrate the superiority of MuSC-MVML and some conclusions are addressed. 1) MuSC-MVML outperforms most compared algorithms in statistical in terms of AUC and its performance is also stable; 2) the computational cost of MuSC-MVML is moderate and on most datasets, MuSC-MVML has a relatively fast convergence; and 3) introducing some laws of self-adaptive change for those correlations can improve the ability of MuSC-MVML to process multiview multilabel datasets effectively and express correlations in multiple representations better. Furthermore, this study explains the reason that why we use alternating optimization strategy to optimize the model of MuSC-MVML and provides some suggestions that how to modify the model of MuSC-MVML to process incomplete multiview multilabel datasets with noise.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1580-1593"},"PeriodicalIF":9.4,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation of Granular-Balls for Clustering Based on the Principle of Justifiable Granularity
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-11 DOI: 10.1109/TCYB.2025.3534195
Zihang Jia;Zhen Zhang;Witold Pedrycz
{"title":"Generation of Granular-Balls for Clustering Based on the Principle of Justifiable Granularity","authors":"Zihang Jia;Zhen Zhang;Witold Pedrycz","doi":"10.1109/TCYB.2025.3534195","DOIUrl":"10.1109/TCYB.2025.3534195","url":null,"abstract":"Efficient and robust data clustering remains a challenging task in data analysis. Recent efforts have explored the integration of granular-ball (GB) computing with clustering algorithms to address this challenge, yielding promising results. However, existing methods for generating GBs often rely on single indicators to measure GB quality and employ threshold-based or greedy strategies, potentially leading to GBs that do not accurately capture the underlying data distribution. To address these limitations, this article leverages the principle of justifiable granularity (POJG) to measure the quality of a GB for clustering tasks and introduces a novel GB generation method, termed GB-POJG. Specifically, a comprehensive metric integrating the coverage and specificity of a GB is introduced to assess GB quality. Utilizing this quality metric, GB-POJG incorporates a strategy of maximizing overall quality and an anomaly detection method to determine the generated GBs and identify abnormal GBs, respectively. Compared to previous GB generation methods, GB-POJG maximizes the overall quality of generated GBs while ensuring alignment with the data distribution, thereby enhancing the rationality of the generated GBs. Experimental results obtained from both synthetic and publicly available datasets underscore the effectiveness of GB-POJG, showcasing improvements in clustering accuracy and normalized mutual information. All codes have been released at <uri>https://zenodo.org/records/13643332</uri>.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1687-1700"},"PeriodicalIF":9.4,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143392999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Ordered Weighted Averaging Operator and Monotone Takagi–Sugeno–Kang Fuzzy Inference Systems
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-11 DOI: 10.1109/TCYB.2025.3531013
Yi Wen Kerk;Kai Meng Tay;Chian Haur Jong;Chee Peng Lim
{"title":"On Ordered Weighted Averaging Operator and Monotone Takagi–Sugeno–Kang Fuzzy Inference Systems","authors":"Yi Wen Kerk;Kai Meng Tay;Chian Haur Jong;Chee Peng Lim","doi":"10.1109/TCYB.2025.3531013","DOIUrl":"10.1109/TCYB.2025.3531013","url":null,"abstract":"The necessary and/or sufficient conditions for a Takagi–Sugeno–Kang Fuzzy Inference System (TSK-FIS) to be monotone has been a key research direction in the last two decades. In this article, we first define fuzzy membership functions (FMFs) with single and continuous support; and consider TSK-FIS with a grid partition strategy for computing its firing strengths with product T-norm (here after denoted as TSK-FIS-product). We also define a more general joint necessary condition, whereby each constituent itself is a necessary condition for the TSK-FIS-product model. The first necessary condition indicates that the normalized firing strength must not be indeterminate (i.e., 0/0), i.e., susceptible to the tomato classification problem. The second necessary condition indicates that all restricted consequents of fuzzy if-then rules must be defined. Based on the principle of the ordered weighted averaging (OWA) operator as well as the concept of increasing orness in OWA and hyperboxes, a general joint sufficient condition for a TSK-FIS-product model to be monotone is derived. Three case studies of the developed methods for undertaking failure mode and effect analysis (FMEA) and image processing tasks are presented. The results are compared, analyzed, and discussed, demonstrating the usefulness of our developed methods.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1540-1553"},"PeriodicalIF":9.4,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency-Driven Adaptive Task Planning for Household Robot Based on Hierarchical Item-Environment Cognition
IF 9.4 1区 计算机科学
IEEE Transactions on Cybernetics Pub Date : 2025-02-11 DOI: 10.1109/TCYB.2025.3531433
Mengyang Zhang;Guohui Tian;Yongcheng Cui;Hong Liu;Lei Lyu
{"title":"Efficiency-Driven Adaptive Task Planning for Household Robot Based on Hierarchical Item-Environment Cognition","authors":"Mengyang Zhang;Guohui Tian;Yongcheng Cui;Hong Liu;Lei Lyu","doi":"10.1109/TCYB.2025.3531433","DOIUrl":"10.1109/TCYB.2025.3531433","url":null,"abstract":"Task planning focused on household robots represents a conventional yet complex research domain, necessitating the development of task plans that enable robots to execute unfamiliar household services. This area has garnered significant research interest due to its extensive applications in robotics, particularly concerning household robots. Nevertheless, the majority of task planning methodologies exhibit suboptimal performance regarding the success and efficiency of completing household tasks, primarily due to a lack of cognitive capacity of household items and home environments. To address these challenges, we propose an efficiency-driven adaptive task planning approach based on hierarchical item-environment cognition. Initially, we establish a multiple semantic attribute-based priori knowledge (MSAPK) framework to facilitate the attributive representation of household items. Utilizing MSAPK, we develop a long short-term memory (LSTM) based item cognition model that assigns relevant attributes and substitutes to specified household items, thereby enhancing the cognitive capabilities of household robots at the attribute level. Subsequently, we construct an environment cognition model that delineates the relationships between household items and room types, enabling household robots to locate target items more efficiently. Through hierarchical item-environment cognition, we introduce a strategy for adaptive task planning, empowering household robots to execute household tasks with both flexibility and efficiency. The generated plans are evaluated in both virtual and real-world experiments, with promising results affirming the effectiveness of our proposed methodology.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1772-1788"},"PeriodicalIF":9.4,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信