IEEE Transactions on Information Theory最新文献

筛选
英文 中文
Improved Approximation Algorithms for Index Coding 索引编码的改进逼近算法
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3446000
Dror Chawin;Ishay Haviv
{"title":"Improved Approximation Algorithms for Index Coding","authors":"Dror Chawin;Ishay Haviv","doi":"10.1109/TIT.2024.3446000","DOIUrl":"10.1109/TIT.2024.3446000","url":null,"abstract":"The index coding problem is concerned with broadcasting encoded information to a collection of receivers in a way that enables each receiver to discover its required data based on its side information, which comprises the data required by some of the others. Given the side information map, represented by a graph in the symmetric case and by a digraph otherwise, the goal is to devise a coding scheme of minimum broadcast length. We present a general method for developing efficient algorithms for approximating the index coding rate for prescribed families of instances. As applications, we obtain polynomial-time algorithms that approximate the index coding rate of graphs and digraphs on n vertices to within factors of \u0000<inline-formula> <tex-math>$O(n/log ^{2} n)$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$O(n/log n)$ </tex-math></inline-formula>\u0000 respectively. This improves on the approximation factors of \u0000<inline-formula> <tex-math>$O(n/log n)$ </tex-math></inline-formula>\u0000 for graphs and \u0000<inline-formula> <tex-math>$O(n cdot log log n/log n)$ </tex-math></inline-formula>\u0000 for digraphs achieved by Blasiak, Kleinberg, and Lubetzky. For the family of quasi-line graphs, we exhibit a polynomial-time algorithm that approximates the index coding rate to within a factor of 2. This improves on the approximation factor of \u0000<inline-formula> <tex-math>$O(n^{2/3})$ </tex-math></inline-formula>\u0000 achieved by Arbabjolfaei and Kim for graphs on n vertices taken from certain sub-families of quasi-line graphs. Our approach is applicable for approximating a variety of additional graph and digraph quantities to within the same approximation factors. Specifically, it captures every graph quantity sandwiched between the independence number and the clique cover number and every digraph quantity sandwiched between the maximum size of an acyclic induced sub-digraph and the directed clique cover number.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8266-8275"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary Codes for Correcting Two Edits 纠正两次编辑的二进制代码
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3445929
Yubo Sun;Gennian Ge
{"title":"Binary Codes for Correcting Two Edits","authors":"Yubo Sun;Gennian Ge","doi":"10.1109/TIT.2024.3445929","DOIUrl":"10.1109/TIT.2024.3445929","url":null,"abstract":"An edit refers to a single insertion, deletion, or substitution. This paper aims to construct binary codes that can correct two edits. To do this, a necessary and sufficient condition for a code to be two-edit correctable is provided, showing that a code is a two-edit correcting code if and only if it can correct two deletions, up to two substitutions, and one deletion and up to one substitution, separately. This criterion allows for the construction of two-edit correcting codes leveraging these three types of error correcting codes. In the field of constructing codes for correcting two deletions, we present a construction with \u0000<inline-formula> <tex-math>$4log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits that can be viewed as a subcode proposed by Guruswami and Håstad, and provide an alternative proof. Moreover, our two-deletion correcting codes can also correct up to two substitutions after making a slight modification. In the field of constructing codes for correcting one deletion and up to one substitution, we present a construction with \u0000<inline-formula> <tex-math>$4 log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits, which outperforms the best previously known results \u0000<inline-formula> <tex-math>$6 log n+O(1)$ </tex-math></inline-formula>\u0000. Leveraging these codes, we obtain a construction of two-edit correcting codes with \u0000<inline-formula> <tex-math>$6 log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits. This outperforms the best previously known result, which requires at least \u0000<inline-formula> <tex-math>$8log n$ </tex-math></inline-formula>\u0000 redundant bits. Moreover, we also consider the list-decoding problem under the two-edit channel and construct a two-edit list-decodable code with a list size of two employing \u0000<inline-formula> <tex-math>$4 log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"6877-6898"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
L1 Estimation: On the Optimality of Linear Estimators L 1 估算:论线性估计器的最优性
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3440929
Leighton P. Barnes;Alex Dytso;Jingbo Liu;H. Vincent Poor
{"title":"L1 Estimation: On the Optimality of Linear Estimators","authors":"Leighton P. Barnes;Alex Dytso;Jingbo Liu;H. Vincent Poor","doi":"10.1109/TIT.2024.3440929","DOIUrl":"10.1109/TIT.2024.3440929","url":null,"abstract":"Consider the problem of estimating a random variable X from noisy observations \u0000<inline-formula> <tex-math>$Y = X+ Z$ </tex-math></inline-formula>\u0000, where Z is standard normal, under the \u0000<inline-formula> <tex-math>$L^{1}$ </tex-math></inline-formula>\u0000 fidelity criterion. It is well known that the optimal Bayesian estimator in this setting is the conditional median. This work shows that the only prior distribution on X that induces linearity in the conditional median is Gaussian. Along the way, several other results are presented. In particular, it is demonstrated that if the conditional distribution \u0000<inline-formula> <tex-math>$P_{X|Y=y}$ </tex-math></inline-formula>\u0000 is symmetric for all y, then X must follow a Gaussian distribution. Additionally, we consider other \u0000<inline-formula> <tex-math>$L^{p}$ </tex-math></inline-formula>\u0000 losses and observe the following phenomenon: for \u0000<inline-formula> <tex-math>$p in [{1,2}]$ </tex-math></inline-formula>\u0000, Gaussian is the only prior distribution that induces a linear optimal Bayesian estimator, and for \u0000<inline-formula> <tex-math>$p in (2,infty)$ </tex-math></inline-formula>\u0000, infinitely many prior distributions on X can induce linearity. Finally, extensions are provided to encompass noise models leading to conditional distributions from certain exponential families.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8026-8039"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Constructive Counterexamples to Additivity of Minimum Output Rényi p-Entropy of Quantum Channels 量子通道最小输出雷尼p熵可加性的新建设性反例
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3446191
Krzysztof Szczygielski;Michał Studziński
{"title":"New Constructive Counterexamples to Additivity of Minimum Output Rényi p-Entropy of Quantum Channels","authors":"Krzysztof Szczygielski;Michał Studziński","doi":"10.1109/TIT.2024.3446191","DOIUrl":"10.1109/TIT.2024.3446191","url":null,"abstract":"In this paper, we present new families of quantum channels for which corresponding minimum output Rényi p-entropy is not additive. Our manuscript is motivated by the results of Grudka et al. and we focus on channels characterized by both extensions and subspaces of the antisymmetric subspace in \u0000<inline-formula> <tex-math>$mathbb {C}^{d} otimes mathbb {C} ^{d}$ </tex-math></inline-formula>\u0000, which exhibit additivity breaking for \u0000<inline-formula> <tex-math>$pgt 2$ </tex-math></inline-formula>\u0000.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7023-7035"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Correlation Distribution of Niho-Type Decimation d = 3(pm - 1) + 1 关于 Niho-type decimation d = 3(pm -1)+1 的相关分布
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-16 DOI: 10.1109/TIT.2024.3444892
Maosheng Xiong;Haode Yan
{"title":"On Correlation Distribution of Niho-Type Decimation d = 3(pm - 1) + 1","authors":"Maosheng Xiong;Haode Yan","doi":"10.1109/TIT.2024.3444892","DOIUrl":"10.1109/TIT.2024.3444892","url":null,"abstract":"The cross-correlation problem is a classic problem in sequence design. In this paper we compute the cross-correlation distribution of the Niho-type decimation \u0000<inline-formula> <tex-math>$d=3(p^{m}-1)+1$ </tex-math></inline-formula>\u0000 over \u0000<inline-formula> <tex-math>${mathrm {GF}}(p^{2m})$ </tex-math></inline-formula>\u0000 for any prime \u0000<inline-formula> <tex-math>$p ge 5$ </tex-math></inline-formula>\u0000. Previously this problem was solved by Xia et al. only for \u0000<inline-formula> <tex-math>$p=2$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$p=3$ </tex-math></inline-formula>\u0000 in a series of papers. The main difficulty of this problem for \u0000<inline-formula> <tex-math>$p ge 5$ </tex-math></inline-formula>\u0000, as pointed out by Xia et al., is to count the number of codewords of “pure weight” 5 in p-ary Zetterberg codes. It turns out this counting problem can be transformed by the MacWilliams identity into counting codewords of weight at most 5 in p-ary Melas codes, the most difficult of which is related to a K3 surface well studied in the literature and can be computed. When \u0000<inline-formula> <tex-math>$p ge 7$ </tex-math></inline-formula>\u0000, the theory of elliptic curves over finite fields also plays an important role in the resolution of this problem.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8289-8302"},"PeriodicalIF":2.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nested Perfect Arrays 嵌套完美数组
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-16 DOI: 10.1109/TIT.2024.3445122
Verónica Becher;Olivier Carton
{"title":"Nested Perfect Arrays","authors":"Verónica Becher;Olivier Carton","doi":"10.1109/TIT.2024.3445122","DOIUrl":"10.1109/TIT.2024.3445122","url":null,"abstract":"We introduce two-dimensional periodic arrays that are a variant of the de Bruijn tori. We call them nested perfect arrays. Instead of asking that every array of a given size has exactly one occurrence, we partition the positions in congruence classes and we ask exactly one occurrence in each congruence class. We also ask that this property applies recursively to each of the subarrays. We give a method to construct nested perfect arrays based on Pascal triangle matrix modulo 2. For the two-symbol alphabet, and for n being a power of 2, we partition the positions of the arrays in \u0000<inline-formula> <tex-math>$n^{2}$ </tex-math></inline-formula>\u0000 many congruence classes by taking the row number modulo n and the column number modulo n. We construct arrays where each possible \u0000<inline-formula> <tex-math>$ntimes n$ </tex-math></inline-formula>\u0000 array occurs \u0000<inline-formula> <tex-math>$n^{2}$ </tex-math></inline-formula>\u0000 times, once in each congruence class. Our method yields exponentially many (in \u0000<inline-formula> <tex-math>$n^{2}$ </tex-math></inline-formula>\u0000) different nested perfect arrays.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7463-7471"},"PeriodicalIF":2.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The First Achievement of a Given Level by a Random Process 通过随机过程首次达到给定水平
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-15 DOI: 10.1109/TIT.2024.3444043
Sergei L. Semakov
{"title":"The First Achievement of a Given Level by a Random Process","authors":"Sergei L. Semakov","doi":"10.1109/TIT.2024.3444043","DOIUrl":"10.1109/TIT.2024.3444043","url":null,"abstract":"We propose a scheme for finding the probabilities of events related to crossings of a level by a random process. Using this scheme, we estimate the probability that the first achievement of a given level by the component \u0000<inline-formula> <tex-math>$y_{1}(x)$ </tex-math></inline-formula>\u0000 of an n-dimensional continuous process \u0000<inline-formula> <tex-math>${mathbf { y}}(x)!=!{y_{1}(x),ldots,y_{n}(x)}$ </tex-math></inline-formula>\u0000 occurs at some moment \u0000<inline-formula> <tex-math>$x^{*}$ </tex-math></inline-formula>\u0000 from a given interval \u0000<inline-formula> <tex-math>$(x',x'')$ </tex-math></inline-formula>\u0000 and, at this moment \u0000<inline-formula> <tex-math>$x^{*}$ </tex-math></inline-formula>\u0000, the other components \u0000<inline-formula> <tex-math>$y_{2}(x^{*}),ldots,y_{n}(x^{*})$ </tex-math></inline-formula>\u0000 satisfy given constraints. The need for estimating the above-mentioned probability arises, in particular, in the problems of ensuring the safety of an aircraft landing.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7162-7178"},"PeriodicalIF":2.2,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse Information Projections and Optimal E-Statistics 反向信息预测和最佳电子统计
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-15 DOI: 10.1109/TIT.2024.3444458
Tyron Lardy;Peter Grünwald;Peter Harremoës
{"title":"Reverse Information Projections and Optimal E-Statistics","authors":"Tyron Lardy;Peter Grünwald;Peter Harremoës","doi":"10.1109/TIT.2024.3444458","DOIUrl":"10.1109/TIT.2024.3444458","url":null,"abstract":"Information projections have found important applications in probability theory, statistics, and related areas. In the field of hypothesis testing in particular, the reverse information projection (RIPr) has recently been shown to lead to growth-rate optimal (GRO) e-statistics for testing simple alternatives against composite null hypotheses. However, the RIPr as well as the GRO criterion are undefined whenever the infimum information divergence between the null and alternative is infinite. We show that in such scenarios, under some assumptions, there still exists a measure in the null that is closest to the alternative in a specific sense. Whenever the information divergence is finite, this measure coincides with the usual RIPr. It therefore gives a natural extension of the RIPr to certain cases where the latter was previously not defined. This extended notion of the RIPr is shown to lead to optimal e-statistics in a sense that is a novel, but natural, extension of the GRO criterion. We also give conditions under which the (extension of the) RIPr is a strict sub-probability measure, as well as conditions under which an approximation of the RIPr leads to approximate e-statistics. For this case we provide tight relations between the corresponding approximation rates.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7616-7631"},"PeriodicalIF":2.2,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Generalization for Transfer Learning: An Information-Theoretic Analysis 论迁移学习的泛化:信息理论分析
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-14 DOI: 10.1109/TIT.2024.3441574
Xuetong Wu;Jonathan H. Manton;Uwe Aickelin;Jingge Zhu
{"title":"On the Generalization for Transfer Learning: An Information-Theoretic Analysis","authors":"Xuetong Wu;Jonathan H. Manton;Uwe Aickelin;Jingge Zhu","doi":"10.1109/TIT.2024.3441574","DOIUrl":"10.1109/TIT.2024.3441574","url":null,"abstract":"Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different probability distributions. In this work, we give an information-theoretic analysis of the generalization error and excess risk of transfer learning algorithms. Our results suggest, perhaps as expected, that the Kullback-Leibler (KL) divergence \u0000<inline-formula> <tex-math>$D(mu |mu ')$ </tex-math></inline-formula>\u0000 plays an important role in the characterizations where \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$mu '$ </tex-math></inline-formula>\u0000 denote the distribution of the training data and the testing data, respectively. Specifically, we provide generalization error and excess risk upper bounds for learning algorithms where data from both distributions are available in the training phase. Recognizing that the bounds could be sub-optimal in general, we provide improved excess risk upper bounds for a certain class of algorithms, including the empirical risk minimization (ERM) algorithm, by making stronger assumptions through the central condition. To demonstrate the usefulness of the bounds, we further extend the analysis to the Gibbs algorithm and the noisy stochastic gradient descent method. We then generalize the mutual information bound with other divergences such as \u0000<inline-formula> <tex-math>$phi $ </tex-math></inline-formula>\u0000-divergence and Wasserstein distance, which may lead to tighter bounds and can handle the case when \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000 is not absolutely continuous with respect to \u0000<inline-formula> <tex-math>$mu '$ </tex-math></inline-formula>\u0000. Several numerical results are provided to demonstrate our theoretical findings. Lastly, to address the problem that the bounds are often not directly applicable in practice due to the absence of the distributional knowledge of the data, we develop an algorithm (called InfoBoost) that dynamically adjusts the importance weights for both source and target data based on certain information measures. The empirical results show the effectiveness of the proposed algorithm.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7089-7124"},"PeriodicalIF":2.2,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An open problem and a conjecture on binary linear complementary pairs of codes 关于二进制线性互补对码的一个未决问题和一个猜想
IF 2.5 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2024-08-13 DOI: 10.1109/tit.2024.3443090
Shitao Li, Minjia Shi, San Ling
{"title":"An open problem and a conjecture on binary linear complementary pairs of codes","authors":"Shitao Li, Minjia Shi, San Ling","doi":"10.1109/tit.2024.3443090","DOIUrl":"https://doi.org/10.1109/tit.2024.3443090","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"168 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信