2019 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

筛选
英文 中文
Hop-2 IEEE 802.15.5 Optimization framework for Resource Allocation with Service Differentiation Hop-2 IEEE 802.15.5业务差异化资源分配优化框架
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909172
Samar Sindian, A. Samhat, Ayman Khalil, M. Crussiére, J. Hélard, S. Sindian
{"title":"Hop-2 IEEE 802.15.5 Optimization framework for Resource Allocation with Service Differentiation","authors":"Samar Sindian, A. Samhat, Ayman Khalil, M. Crussiére, J. Hélard, S. Sindian","doi":"10.1109/ISNCC.2019.8909172","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909172","url":null,"abstract":"The shared superframe multihop nature of wireless personal area networks (WPAN s) encounters fundamental challenges to the design of effective and optimal resource allocation algorithms with respect to resource utilization and fairness across different network devices. In this paper, we propose a distributed optimization framework for resource allocation scheme for IEEE 802.15.5 hop-2 for fairly sharing the channel time resources granted by the reference Mesh Piconet Coordinator (MPNC) to the hop-1 MNPC among hop-2 devices. A NUM based optimization approach is proposed for optimal resource allocation with differentiation between real-time (RT) and non-real time (NRT) devices. Simulation results for studying satisfaction and fairness indexes are conducted.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115485091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Base Station Selection for Cache-enabled Wireless Networks 启用缓存的无线网络的基站选择
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909184
Yucheng Liao, Ruimeng Gan, Yue Xiao, Ping Yang, Bin Fu
{"title":"Base Station Selection for Cache-enabled Wireless Networks","authors":"Yucheng Liao, Ruimeng Gan, Yue Xiao, Ping Yang, Bin Fu","doi":"10.1109/ISNCC.2019.8909184","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909184","url":null,"abstract":"Caching contents in the small base station (SBS) is expected as a class of promising techniques in an effort to mitigate the congestion problem for future cellular networks. In this paper, we consider a heterogeneous cellular network with storage capable SBSs, and focus our attention on the SBS selection problem, in order to achieve balanced cost including incurred serving cost and users' experienced delay. The numerical results show that the location of SBS has an impact on the delay and servicing cost, which should be carefully decided in system design.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key-based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms 用于商业智能医疗保健分析平台的基于密钥的可逆数据屏蔽
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909125
Osama Ali-Ozkan, Abdelkader H. Ouda
{"title":"Key-based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms","authors":"Osama Ali-Ozkan, Abdelkader H. Ouda","doi":"10.1109/ISNCC.2019.8909125","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909125","url":null,"abstract":"Business Intelligence (BI) is quickly becoming a very important tool for all aspects of data analytics. An area that lacks a strong implementation for BI is the healthcare field. BI healthcare analytics platforms facilitate the clinical analysis, financial analysis, supply chain analysis, as well as, fraud and HR analysis. The reason behind the lack of adoption in healthcare arises from the need to meet the legislated and perceived requirements of security and privacy when dealing with clinical information. A strong data masking module is developed based on the key-based reversible approach to protect patients' data privacy, while maintaining the data utility to meet the need for data analytics within BI platforms of the healthcare environment. To ensure the performance of the proposed module, a TPC-H Benchmark analysis is performed which verifies that the analytics results of the masked data are appropriate when compared to the existing masking and encryption methods. The developed module is shown to be secure against the common security threats such as linkage attacks and replay attacks. It uses minimal computational overhead when compared to its counterpart methods and meets the legal requirements to be used safely in the healthcare industry.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123336748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preliminary Study of Improving Position in North of Algeria Using GPS and EGNOS Corrections 利用GPS和EGNOS校正改进阿尔及利亚北部位置的初步研究
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909096
Tabti Lahouaria, S. Kahlouche, Benadda Belkacem
{"title":"Preliminary Study of Improving Position in North of Algeria Using GPS and EGNOS Corrections","authors":"Tabti Lahouaria, S. Kahlouche, Benadda Belkacem","doi":"10.1109/ISNCC.2019.8909096","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909096","url":null,"abstract":"The European Geostationary Navigation Overlay Service (EGNOS) offers an augmentation signal to the Global Positioning System (GPS). Presently, EGNOS augments GPS performance using the L1 (1575.42 MHz) by providing correction data and integrity information for improving positioning and navigation services over Europe. The corrections transmitted by EGNOS contribute to reduce error sources related to satellite clocks, satellite position and ionospheric effects. Others errors sources (tropospheric effects, multipath and user receiver contributions) are local effects those cannot be corrected by this system. This research presents the preliminary analysis to investigate the improvement positioning of the EGNOS system in North of Algeria without RIMS station, this area until considered as covered by EGNOS. The raw GPS data were collected by a geodetic receiver (Trimble Net R9), which was installed at four sites in different date of the year 2018, and over a time interval from 6 to 24 hours. Analysis of the parameters characterizing the accuracy of positioning was performed in two calculation modes; firstly, with measurement data of GPS only in mode SPP (single positioning point) and secondly, with differential correction of EGNOS in mode SBAS. The characterization of the receiver's position error using the horizontal and vertical position error (HPE and VPE) is obtained from the position error in three dimensions (X, Y and Z). The errors are computed based on the difference between measured positions and the precise positions. The results reveal that the use of EGNOS correction improves the positioning accuracy in comparison with the standalone GPS point positioning. Further, results show that there is an improvement in the three dimensional positioning accuracy. It is also shown that the use of full EGNOS correction demonstrated horizontal and vertical positioning are better than 2 meters and better than 6 meters (95%), respectively. While in GPS only, it is around 4 meters in horizontal and 8 meters in vertical.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH Clustering 基于动态RRH聚类的毫米波异构云无线接入网干扰抑制方案
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909135
Z. Fakhri, Firas A. Sabir, H. Al-Raweshidy
{"title":"An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH Clustering","authors":"Z. Fakhri, Firas A. Sabir, H. Al-Raweshidy","doi":"10.1109/ISNCC.2019.8909135","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909135","url":null,"abstract":"In its early deployment, 5G is expected to be integrated with conventional micro wave (µw) base stations (BSs) in small cells using millimetre wave (mmw) band for access to enhance the traditional system. The main goal of 5G is universal coverage and at a higher rate. In this paper, a scheme for increasing the rate coverage of the conventional macro cell by exploiting the wide mmw band spectrum is proposed. This scheme is inspired by the Soft Frequency Reuse (SFR) technique. Since the cell edge area has a lower coverage rate due to high interference and less received power, it is served by a mmw band. Small mmw Remote Radio Heads (RRHs) are overlaid onto conventional macro cell on cells edges in a Heterogeneous Cloud Radio Access Network (HC-RAN) architecture. The neighbouring RRHs are clustered together based on the suggested clustering algorithm. The RRH clustering problem formulated as a bin packing problem Simulation results show that the HC-RAN system adopting the suggested scheme has significantly higher coverage and rate compared to an HC-RAN system with small cells only deployed in hot spots. Specifically, a gain of 20%-40% is achieved in coverage and rate when compared to the systems applying the SFR technique and HC-RAN architecture with randomly deployed mmw RRHs. This enhancement in rate and coverage is due to a significant reduction in the interference level resulting from the adopting the suggested scheme, which benefits from high path loss, blockage and wide band properties of an mmw channel. Furthermore, the impact of the mmw cell size and density on the system performance is investigated.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116622894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks 面向安全攻击的无线传感器网络可靠传输方案
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909123
N. Siasi, A. Aldalbahi, M. Jasim
{"title":"Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks","authors":"N. Siasi, A. Aldalbahi, M. Jasim","doi":"10.1109/ISNCC.2019.8909123","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909123","url":null,"abstract":"Routing protocols in wireless sensor network are vulnerable to various malicious security attacks that can degrade network performance and lifetime. This becomes more important in cluster routing protocols that is composed of multiple node and cluster head, such as low energy adaptive clustering hierarchy (LEACH) protocol. Namely, if an attack succeeds in failing the cluster head, then the entire set of nodes fail. Therefore, it is necessary to develop robust recovery schemes to overcome security attacks and recover packets at short times. Hence this paper proposes a detection and recovery scheme for selective forwarding attacks in wireless sensor networks using LEACH protocol. The proposed solution features near-instantaneous recovery times, without the requirement for feedback or retransmissions once an attack occurs.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Side Channel Analysis Using EM Radiation of RSA Algorithm Implemented on Raspberry Pi 在树莓派上实现的RSA算法的EM辐射侧信道分析
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909185
Ersin Hatun, Gokhan Kaya, Elif Buyukkaya, S. Yalcin
{"title":"Side Channel Analysis Using EM Radiation of RSA Algorithm Implemented on Raspberry Pi","authors":"Ersin Hatun, Gokhan Kaya, Elif Buyukkaya, S. Yalcin","doi":"10.1109/ISNCC.2019.8909185","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909185","url":null,"abstract":"The side-channel information (power consumption, electromagnetic radiation, etc.) leaked unintentionally from a cryptographic system during a cryptographic process can be used by attackers to reveal secret data using side-channel analysis. Some of the most common side-channel analysis are SPA (Simple Power Analysis), DPA (Differential Power Analysis), SEMA (Simple Electromagnetic Analysis) and DEMA (Differential Electromagnetic Analysis). Although it is relatively easy to analyze the side-channel information obtained from the ASIC or FPGA implementations, the analysis of a side channel information of cryptographic operations running in an operating system (OS) has different difficulties - for example, alignment of measurements and extracting crypto process signal through noises of other OS operations. In this study, side-channel attacks are performed against two different realizations of the RSA Algorithm by using electromagnetic radiation related with power consumption of a cryptographic operation implemented on Raspberry Pi platform. The first realization of the RSA Algorithm is implemented using unprotected binary algorithm and then private key bits of the RSA Algorithm are get individually by using SEMA attack. For the second realization, the RSA Algorithm is implemented by using a protected binary algorithm in order to resist against to SEMA attack. In presented work, the first bit of the private key has been found using 1800 measurements with the distance of mean test and correlation analysis.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131781187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Finding better learning algorithms for self-driving cars: An overview of the LAOP platform 为自动驾驶汽车寻找更好的学习算法:LAOP平台概述
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909159
Jihene Rezgui, Clément Bisaillon, Léonard Oest O'Leary
{"title":"Finding better learning algorithms for self-driving cars: An overview of the LAOP platform","authors":"Jihene Rezgui, Clément Bisaillon, Léonard Oest O'Leary","doi":"10.1109/ISNCC.2019.8909159","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909159","url":null,"abstract":"Cars are becoming more and more intelligent, embedded with a range of sensors to give them local perception of their environment (LIDARs, cameras, etc.). Trendy companies like Google and Tesla are actively testing cars on American roads that can drive without any human interaction [1]. Neural networks are the modern approach for autonomous cars. However, an inefficient neural network algorithm will make the learning process slower and will result in a less reliable autonomous vehicle. In this paper, we will introduce a platform built in JAVA named LAOP (Learning Algorithm Optimization Platform) [2] while explaining the solutions we found to make it easy for researchers to test and compare their own algorithms. Then, we will show how we have integrated a natural selection algorithm with a neural network in order to improve them. Moreover, we will demonstrate how the Fully Connected Neural Network and the NeuroEvolution of Augmenting Topologies (NEAT) [3] algorithms are implemented in the context of vehicular learning on LAOP. Finally, we will display the different results extracted from LAOP by tuning several various parameters such as the weight mutation chance and the car density in the simulation.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features 基于pca特征降维的高效网络入侵检测
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909140
Razan Abdulhammed, M. Faezipour, Hassan Musafer, Abdel-shakour Abuzneid
{"title":"Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features","authors":"Razan Abdulhammed, M. Faezipour, Hassan Musafer, Abdel-shakour Abuzneid","doi":"10.1109/ISNCC.2019.8909140","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909140","url":null,"abstract":"Designing a machine learning based network intrusion detection system (IDS) with high-dimensional features can lead to prolonged classification processes. This is while low-dimensional features can reduce these processes. Moreover, classification of network traffic with imbalanced class distributions has posed a significant drawback on the performance attainable by most well-known classifiers. With the presence of imbalanced data, the known metrics may fail to provide adequate information about the performance of the classifier. This study first uses Principal Component Analysis (PCA) as a feature dimensionality reduction approach. The resulting low-dimensional features are then used to build various classifiers such as Random Forest (RF), Bayesian Network, Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) for designing an IDS. The experimental findings with low-dimensional features in binary and multi-class classification show better performance in terms of Detection Rate (DR), F-Measure, False Alarm Rate (FAR), and Accuracy. Furthermore, in this paper, we apply a Multi-Class Combined performance metric Combi ned Mc with respect to class distribution through incorporating FAR, DR, Accuracy, and class distribution parameters. In addition, we developed a uniform distribution based balancing approach to handle the imbalanced distribution of the minority class instances in the CICIDS2017 network intrusion dataset. We were able to reduce the CICIDS2017 dataset's feature dimensions from 81 to 10 using PCA, while maintaining a high accuracy of 99.6% in multi-class and binary classification.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133046864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Edge Computing based Smart Meeting Room Controller 基于边缘计算的智能会议室控制器
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909191
Kemal Cagri Serdaroglu, S. Baydere
{"title":"Edge Computing based Smart Meeting Room Controller","authors":"Kemal Cagri Serdaroglu, S. Baydere","doi":"10.1109/ISNCC.2019.8909191","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909191","url":null,"abstract":"In this study, we address the high latency challenge of classical centralized cloud based smart environments. To this end, we propose an edge computing solution for real time meeting room attendance control system in which user tracking and identification is required. In the layout of our architecture, Bluetooth devices associated with users publish their unique MAC addresses to a service agent operating at the edge layer. We established a scalable emulation test bed to understand the behavior of the proposed system and analyzed the performance of the functional components in two different scenarios; first scenario is built with the proposed edge solution and the second one is a classical cloud based approach. We present the early encouraging results obtained for data transmission overhead that reveal the relevance of the edge based design.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133378934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信