Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Enhanced Cooperative Compressive Spectrum Sensing in Cognitive Radio Networks 认知无线电网络中的增强型合作压缩频谱传感
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-21 DOI: 10.1002/ett.70000
Hadj Abdelkader Benzater, Djamal Teguig, Nacerredine Lassami
{"title":"Enhanced Cooperative Compressive Spectrum Sensing in Cognitive Radio Networks","authors":"Hadj Abdelkader Benzater,&nbsp;Djamal Teguig,&nbsp;Nacerredine Lassami","doi":"10.1002/ett.70000","DOIUrl":"https://doi.org/10.1002/ett.70000","url":null,"abstract":"<div>\u0000 \u0000 <p>The demand for bandwidth in cognitive radio networks (CRNs) is growing as applications become increasingly data intensive. Techniques such as compressed spectrum sensing (CSS) and cooperative spectrum sensing (C-SS) are employed to address this challenge. C-SS enhances overall detection accuracy and reliability by enabling multiple nodes to share and combine their local sensing data. Conversely, CSS effectively reduces the required information for spectrum usage decision making, thereby improving bandwidth utilization. Integrating these two methods allows CRNs to utilize the spectrum reliably and efficiently, leading to increased spectral efficiency. To further improve reconstruction performance, we leverage the sparsity concept to transcend hardware constraints and merge restrictions from both real and synthesized channels. This approach involves the virtual synthesis of channels, which linearly enhances the signal-to-noise ratio (SNR) within the network's size range. Simulation results demonstrate that our proposed method offers significant advantages over single-node recovery, as validated by simulations and software defined radio (SDR) Implementation. The integration of spectral estimations from various local CR detectors enhances spatial diversity gain and sensing quality, particularly in fading channels. Compared to traditional approaches, our method achieves superior performance, evidenced by an increase in <span></span><math></math> (from 93.97% to 96.52%) with almost the same <span></span><math></math>.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “Optimized LightGBM Model for Security and Privacy Issues in Cyber-Physical Systems” 对 "针对网络物理系统安全和隐私问题的优化 LightGBM 模型 "的更正
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-21 DOI: 10.1002/ett.5059
{"title":"Correction to “Optimized LightGBM Model for Security and Privacy Issues in Cyber-Physical Systems”","authors":"","doi":"10.1002/ett.5059","DOIUrl":"https://doi.org/10.1002/ett.5059","url":null,"abstract":"<p> <span>Dalal, S</span>, <span>Poongodi, M</span>, <span>Lilhore, UK</span>, et al. <span>Optimized LightGBM model for security and privacy issues in cyber-physical systems</span>. <i>Trans Emerging Tel Tech</i>. <span>2023</span>; <span>34</span>(<span>6</span>):e4771. https://doi.org/10.1002/ett.4771.</p><p>The affiliation of Sultan Mesfer Aldossary is not correct. The correct affiliation is below.</p><p>Department of Computer Sciences, College of Arts and Sciences, Prince Sattam Bin Abdulaziz University, Wadi Aldawaser 18 411, Saudi Arabia.</p><p>We apologize for this error.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Free Space Optical System Over Inverse Gaussian Gamma Turbulence Channel 反高斯伽马湍流信道上的自由空间光学系统性能分析
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-21 DOI: 10.1002/ett.70009
Rekha Rani, N. Jayanthi, Anup K. Mandpura
{"title":"Performance Analysis of Free Space Optical System Over Inverse Gaussian Gamma Turbulence Channel","authors":"Rekha Rani,&nbsp;N. Jayanthi,&nbsp;Anup K. Mandpura","doi":"10.1002/ett.70009","DOIUrl":"https://doi.org/10.1002/ett.70009","url":null,"abstract":"<div>\u0000 \u0000 <p>Free space optical (FSO) communication is a proficient technology with potential applications in the next generation of wireless communication. This article evaluates the performance of the FSO system under inverse Gaussian gamma (IGG) fading. A novel closed-form equation for the cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) is presented by employing an intensity modulation/direct detection (IM/DD) scheme. The analytical expressions for various performance metrics such as outage probability (OP), amount of fading (AOF), and average bit error probability (ABEP) are derived for various digital modulation schemes based on the system's probability density function (PDF) and CDF. Additionally, this article presents an upper bound on OP and asymptotic analysis for the performance metrics to gain deeper insights. It is revealed that the small-scale eddy turbulence parameter can affect the diversity order by a factor of <i>β</i>/2. The results demonstrate that atmospheric turbulence considerably reduces the system's performance. Finally, Monte-Carlo simulation is performed to ascertain the correctness of the derived mathematical expressions.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies 揭开僵尸网络的面纱:关于不断演变的威胁和防御策略的全面调查
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-20 DOI: 10.1002/ett.5056
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, Nima Jafari Navimipour
{"title":"Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies","authors":"Mehdi Asadi,&nbsp;Mohammad Ali Jabraeil Jamali,&nbsp;Arash Heidari,&nbsp;Nima Jafari Navimipour","doi":"10.1002/ett.5056","DOIUrl":"https://doi.org/10.1002/ett.5056","url":null,"abstract":"<div>\u0000 \u0000 <p>Botnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&amp;C) servers. These malevolent entities enable a range of malicious activities, from denial of service (DoS) attacks to spam distribution and phishing. Each bot operates as a malicious binary code on vulnerable hosts, granting remote control to attackers who can harness the combined processing power of these compromised hosts for synchronized, highly destructive attacks while maintaining anonymity. This survey explores botnets and their evolution, covering aspects such as their life cycles, C&amp;C models, botnet communication protocols, detection methods, the unique environments botnets operate in, and strategies to evade detection tools. It analyzes research challenges and future directions related to botnets, with a particular focus on evasion and detection techniques, including methods like encryption and the use of covert channels for detection and the reinforcement of botnets. By reviewing existing research, the survey provides a comprehensive overview of botnets, from their origins to their evolving tactics, and evaluates how botnets evade detection and how to counteract their activities. Its primary goal is to inform the research community about the changing landscape of botnets and the challenges in combating these threats, offering guidance on addressing security concerns effectively through the highlighting of evasion and detection methods. The survey concludes by presenting future research directions, including using encryption and covert channels for detection and strategies to strengthen botnets. This aims to guide researchers in developing more robust security measures to combat botnets effectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip 返回:利用基于多优先级的迭代循环匹配和滑动设计与实现片上网络路由器
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-09 DOI: 10.1002/ett.5043
{"title":"RETRACTION: Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip","authors":"","doi":"10.1002/ett.5043","DOIUrl":"https://doi.org/10.1002/ett.5043","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>S. Singh</span>, <span>J. V. R. Ravindra</span>, and <span>B. R. Naik</span>, “ <span>Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip</span>,” <i>Transactions on Emerging Telecommunications Technologies</i> (Early View): doi:10.1002/ett.4514.</p><p>The above article, published online on 22 April 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes, and was found to be out of the scope of the special issue. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications RETRACTION:基于物联网的智能应用的轻量级访问管理方案
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-09 DOI: 10.1002/ett.5046
{"title":"RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications","authors":"","doi":"10.1002/ett.5046","DOIUrl":"https://doi.org/10.1002/ett.5046","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>A. Saad</span>, <span>A. Shalaby</span>, and <span>A. A. Mohamed</span>, “ <span>A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4600.</p><p>The above article, published online on 17 July 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Mohamed, on behalf of the authors, disagrees with this decision.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition RETRACTION:基于激活的递归学习方法,用于人类活动识别中的可穿戴传感器数据处理
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-09 DOI: 10.1002/ett.5053
{"title":"RETRACTION: Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition","authors":"","doi":"10.1002/ett.5053","DOIUrl":"https://doi.org/10.1002/ett.5053","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>C.-H. Hsu</span>, <span>H. Wu</span>, <span>W. Lin</span>, <span>A. Kobusinska</span>, and <span>F. Xia</span>, “ <span>Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4682.</p><p>The above article, published online on 11 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks 返回:稳定路由的数据定位集成:无线传感器网络中的稳定和优化数据传输
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-09 DOI: 10.1002/ett.5049
{"title":"RETRACTION: Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks","authors":"","doi":"10.1002/ett.5049","DOIUrl":"https://doi.org/10.1002/ett.5049","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>A. Gayathri</span>, <span>D. Ruby</span>, <span>N. Manikandan</span>, <span>T. Gopalakrishnan</span>, <span>K. Anusha</span>, and <span>P. Narayanasamy</span>, “ <span>Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4627.</p><p>The above article, published online on 22 August 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Ruby, on behalf of the authors, disagrees with this decision.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Improving Mobile Cloud Computing Service Efficiency Using Energy Competent and Federated Learning Process 返回:利用能源胜任能力和联合学习过程提高移动云计算服务效率
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-09 DOI: 10.1002/ett.5050
{"title":"RETRACTION: Improving Mobile Cloud Computing Service Efficiency Using Energy Competent and Federated Learning Process","authors":"","doi":"10.1002/ett.5050","DOIUrl":"https://doi.org/10.1002/ett.5050","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>M. Thirunavukkarasu</span>, and <span>P. Shanmugapriya</span>, “ <span>Improving Mobile Cloud Computing Service Efficiency Using Energy Competent And Federated Learning Process</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4643.</p><p>The above article, published online on 8 September 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems RETRACTION:基于多目标元启发式优化的聚类与网络切片技术,用于 5G 系统中的物联网无线传感器网络
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-10-09 DOI: 10.1002/ett.5048
{"title":"RETRACTION: Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems","authors":"","doi":"10.1002/ett.5048","DOIUrl":"https://doi.org/10.1002/ett.5048","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>B. G. Sheena</span>, and <span>N. Snehalatha</span>, “ <span>Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems</span>,” <i>Trans Emerg Telecommun Technol</i> <span>34</span>, no. <span>8</span> (<span>2023</span>): e4626, 10.1002/ett.4626.</p><p>The above article, published online on 22 August 2022 in Wiley Online Library (\u0000wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Finally, some scientific statements in this manuscript are not sufficiently supported by references to the literature. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信