Wireless Networks最新文献

筛选
英文 中文
Generative channel estimation for intelligent reflecting surface-aided wireless communication 智能反射面辅助无线通信的生成信道估计
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-03-07 DOI: 10.1007/s11276-024-03688-3
{"title":"Generative channel estimation for intelligent reflecting surface-aided wireless communication","authors":"","doi":"10.1007/s11276-024-03688-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03688-3","url":null,"abstract":"<h3>Abstract</h3> <p>Intelligent reflecting surface (IRS) has emerged as a viable technology to enhance the spectral efficiency of wireless communication systems by intelligently controlling wireless signal propagation. In wireless communication governed by the IRS, the acquisition of channel state information (CSI) is essential for designing the optimal beamforming. However, acquiring the CSI is difficult as the IRS does not have radio frequency chains to transmit/receive signals and the capability to process the signals is also limited. The cascaded channel linking the base station (BS) and a user through the IRS does not necessarily adhere to a specific channel distribution. Conventional and deep learning-based techniques for channel estimation face challenges: the pilot overhead and compromised estimation accuracy due to assumptions of prior channel distribution and noisy signal. To overcome these issues a novel generative cascaded channel estimation (GCCE) model based on a generative adversarial network (GAN) is proposed to estimate the cascaded channel. The GGCE model reduces the reliance on pilot signals, effectively minimizing pilot overhead, by deriving CSI from received signal data. To enhance the estimation accuracy, the channel correlation information is provided as a conditioning factor for the GCCE model. Additionally, a denoising network is integrated into the GCCE framework to effectively remove noise from the received signal. These integrations collectively enhance the estimation accuracy of the GCCE model compared to the initial GAN setup. Experimental results illustrate the superiority of the proposed GCCE model over conventional and deep learning techniques when provided with the same pilot count.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"62 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140057510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous mutual authentication and key agreement scheme in WMSN using physiological data 使用生理数据的 WMSN 匿名相互认证和密钥协议方案
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-03-06 DOI: 10.1007/s11276-024-03690-9
Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher
{"title":"An anonymous mutual authentication and key agreement scheme in WMSN using physiological data","authors":"Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher","doi":"10.1007/s11276-024-03690-9","DOIUrl":"https://doi.org/10.1007/s11276-024-03690-9","url":null,"abstract":"<p>Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"31 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of malicious URLs using machine learning 利用机器学习检测恶意 URL
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-03-06 DOI: 10.1007/s11276-024-03700-w
{"title":"Detection of malicious URLs using machine learning","authors":"","doi":"10.1007/s11276-024-03700-w","DOIUrl":"https://doi.org/10.1007/s11276-024-03700-w","url":null,"abstract":"<p>The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant, because they usually have access to the Internet, although in many cases they are vulnerable to these phishing attacks. This paper offers an overview of the most relevant techniques for the accurate detection of fraudulent URLs, from the most widely used machine learning and deep learning algorithms, to the application, as a proof of concept, of classification models based on quantum machine learning. Starting from an essential data preparation phase, special attention is paid to the initial comparison of several traditional machine learning models, evaluating them with different datasets and obtaining interesting results that achieve true positive rates greater than 90%. After that first approach, the study moves on to the application of quantum machine learning, analysing the specificities of this recent field and assessing the possibilities it offers for the detection of malicious URLs. Given the limited available literature specifically on the detection of malicious URLs and other cybersecurity issues through quantum machine learning, the research presented here represents a relevant novelty on the combination of both concepts in the form of quantum machine learning algorithms for cybersecurity. Indeed, after the analysis of several algorithms, encouraging results have been obtained that open the door to further research on the application of quantum computing in the field of cybersecurity.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks 基于混合优化算法的无线传感器网络多目标优化多路径和多跳路由选择
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-03-05 DOI: 10.1007/s11276-024-03686-5
Madhav Singh, Laxmi Shrivastava
{"title":"Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks","authors":"Madhav Singh, Laxmi Shrivastava","doi":"10.1007/s11276-024-03686-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03686-5","url":null,"abstract":"<p>Multi-path and multi-hop routing are multi-objective optimization problems involving multiple constraints that need to be addressed in the current scenario in wireless sensor networks. The routing process is challenging due to the constrained energy resources and transmission bandwidth. The conventional strategies possess shortcomings, like, as high computing complexity, extensive problem-solving time, complexity in achieving optimal values, and ease of falling into local solutions. Hence, the aim is to propose a hybrid metaheuristic algorithm, known as a multi-objective optimized multi-path and multi-hop routing algorithm (MMMRA). It incorporates the chimp optimization algorithm (COA) for determining the optimal multi-path route based on multi-objective function and ant colony optimization for determining the optimal multi-hop routing. The proposed MMMRA is implemented using NS-2 and to evaluate the performance, nine various scenarios are considered. The MMMRA is validated using different performance measures and compared with other benchmark algorithms. The simulation results indicate that the MMMRA exhibits percentage improvement in terms of residual energy by 1.63%, 4.96%, 6.89%, 7.51%, and 9.67% over IPSMT, BIM2RT, SCP, PSOBS, and RDICMR algorithms respectively. Moreover, the HND and FND of the MMMRA algorithm perform better in all three scenarios (center, corner, and outside positions of sink node), especially when the sink node is placed at the center position, the HND of MMRA shows a percentage improvement by 24% and 12.73% over IPSO–GWO, and COA–HGS algorithms respectively. Similarly, the FND of MMRA shows percentage improvement by 21.05% and 9.5% over IPSO–GWO, and COA–HGS algorithms respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"30 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140035535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection 高效的代理辅助田口萨尔普群算法及其在入侵检测中的应用
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-03-01 DOI: 10.1007/s11276-024-03677-6
Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan
{"title":"An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection","authors":"Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan","doi":"10.1007/s11276-024-03677-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03677-6","url":null,"abstract":"<p>The meta-heuristic algorithms require a lot of fitness calculations to get good enough solutions, which constitutes an obstacle to solving computationally complex practical problems. Recently, it has been found that surrogate-assisted meta-heuristic algorithms show potential in solving expensive complex optimization problems. This paper proposes an efficient surrogate-assisted Taguchi salp swarm algorithm (SATSSA) to solve expensive complex optimization problems. The SATSSA uses a combination of the local surrogate-assisted model (LSAM), global surrogate-assisted model (GSAM), and k-means clustering surrogate-assisted model (KCSAM) to fit the fitness function. To enhance the prediction ability of the model, an improved salp swarm algorithm with the Taguchi method (TSSA) is proposed to update and predict the model. GSAM is mainly used to capture the entire landscape of the search space. KCSAM is designed to capture part of the search space to improve the exploration capability of the algorithm. LSAM is used to capture the contours around the optimal individual. The proposed SATSSA is compared with other four excellent algorithms on 30D, 50D, and 100D benchmark functions. In addition, SATSSA is also applied to intrusion detection. Simulation results show that SATSSA is effective in improving detection rate and reducing false alarm rate.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140020087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation 通过事件驱动和状态等级激活实现分布式高能效无线传感和信息融合
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-03-01 DOI: 10.1007/s11276-024-03691-8
Juteng Fu, Xiang Ma, Hang Yu, Keren Dai
{"title":"Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation","authors":"Juteng Fu, Xiang Ma, Hang Yu, Keren Dai","doi":"10.1007/s11276-024-03691-8","DOIUrl":"https://doi.org/10.1007/s11276-024-03691-8","url":null,"abstract":"<p>The dynamic management of sensor nodes and advanced information fusion are necessary technologies to enhance the comprehensive performance of sensor networks. This paper presents a cascaded sensor dynamic activation and information fusion algorithm to simultaneously optimize the energy and sensing performance of wireless sensing networks. The proposed algorithm dynamically activates nodes that are most suitable for the current sensing task through a joint event-driven and state ranking activation algorithm that achieves a better sensing performance with lower energy costs. In addition, it further utilizes the sensing information of all the activated nodes with maximum efficiency, through an improved distributed Kalman information fusion, which achieves an extra improvement in sensing accuracy as measured by the minimum variance. Finally, the superiority of the proposed cascaded algorithm is verified by a simulation comparison, achieving almost zero dead nodes in terms of energy, and a 62.1% decrease in average error in terms of sensing.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system MH-SIA:利用蜂群智能算法实现未来无线通信系统的多目标切换
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-02-29 DOI: 10.1007/s11276-024-03661-0
{"title":"MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system","authors":"","doi":"10.1007/s11276-024-03661-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03661-0","url":null,"abstract":"<h3>Abstract</h3> <p>Heterogeneous networks are needed to meet user demands as wireless network demand rises. Network mobility management is crucial. Mobility management challenges are related to handover solutions to decrease call/packet losses in such networks. The handover is one of the most critical parts of mobility management in the Long-Term Evolution of Advanced (LTE-A) system, which relies on handover procedures to improve quality, coverage, and service in the existing network. The LTE-A future wireless communication networks consist of various femtocells, microcells, and macrocells. Therefore, designing the appropriate mechanism to perform handovers among different cells is a challenging research problem. We propose a novel handover mechanism called multi-objective handover using swarm intelligence algorithm (MH-SIA) for the future wireless communication system. MH-SIA is made of two novel features multi-objective handover and SIA for handover process optimization. The multi-objective trust parameters of each User's Equipment are computed to perform the handover decision-making and target cell selection using the SIA. The computed trust parameters are utilized as the modified fitness function in Differential Evolution (DE) optimization technique. Due to the fast convergence of DE, it performs computationally efficient handover operations. The multi-objective trust parameters are utilized in handover decision-making and target cell selection to improve network performances with minimum handover latency. The experimental result of MH-SIA reveals the efficient performance compared to underlying methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"25 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure shortest distance queries over encrypted graph in cloud computing 云计算中加密图的安全最短距离查询
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-02-29 DOI: 10.1007/s11276-024-03692-7
{"title":"Secure shortest distance queries over encrypted graph in cloud computing","authors":"","doi":"10.1007/s11276-024-03692-7","DOIUrl":"https://doi.org/10.1007/s11276-024-03692-7","url":null,"abstract":"<h3>Abstract</h3> <p>Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the fundamental operations and have been studied for recent years. To ensure the data and query privacy, researchers have introduced some secure graph encryption schemes which support the shortest distance queries on a large-scale graph database. Unfortunately, most of them only provide an approximate result by pre-computing and storing a distance oracle. To provide the exact shortest path, our solution employs a distributed two-trapdoor public-key crypto-system to perform addition and comparison operations over ciphertexts. The detailed security analysis indicates that our scheme achieves semantically secure under DDH assumption and the experiments are performed on various real-world database and random database. The experimental result shows the feasibility of our scheme.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review 探索克服基于物联网的无线传感器网络路由挑战的机器学习解决方案:综述
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-02-29 DOI: 10.1007/s11276-024-03697-2
{"title":"Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review","authors":"","doi":"10.1007/s11276-024-03697-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03697-2","url":null,"abstract":"<h3>Abstract</h3> <p>An industry-wide paradigm change has been sparked by the growth of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective routing methods necessary. This thorough analysis looks at how Machine Learning (ML) techniques may be used to solve the problems that come with WSN routing. A summary of standard routing algorithms and an examination of their shortcomings comprise the first portion of the paper. The integration of ML approaches, such as reinforcement learning and supervised and unsupervised learning, is then explored in order to improve WSN routing efficiency. The article examines the difficulties and factors related to ML-based routing, including data quality, energy efficiency, scalability, and security. Applications and case studies show how ML is really used in WSN routing, offering insights into effective tactics and lessons discovered. Evaluation metrics and performance assessments are included in a separate section that uses simulation and experimental data to compare ML-based and conventional techniques. Looking forward, the study describes new breakthroughs in ML for WSNs and points out unresolved issues, providing a guide for future research paths. The important results and their consequences are outlined in the conclusion, which also highlights how ML has the potential to revolutionize WSN routing in the future.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"232 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive trust system for misbehavior detection in wireless sensor networks 用于无线传感器网络不当行为检测的自适应信任系统
IF 3 4区 计算机科学
Wireless Networks Pub Date : 2024-02-28 DOI: 10.1007/s11276-024-03687-4
{"title":"An adaptive trust system for misbehavior detection in wireless sensor networks","authors":"","doi":"10.1007/s11276-024-03687-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03687-4","url":null,"abstract":"<h3>Abstract</h3> <p>Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especially in the case of collaborative attacks. They employ fixed trust metrics derived from expert opinion rather than the objective method based on the network’s current security level. Furthermore, they are complex trust systems designed for a specific application with a high attack probability. Thus, even with a low attack rate, they consume a lot of energy. This paper proposes an adaptive trust system that considers both the network’s risk level and the trust values of sensor nodes at the same time. To match the situation in the network, the proposed system employs various trust policies. In risky situations where the WSN environment remains untrustworthy, the proposed system adjusts its trust metrics based on the network attack intensity. When the attacks are eliminated and the misbehavior rate is low, the system switches to an energy efficient policy and adjusts its trust metrics to conserve sensor node energy. Simulation results show that a zero-tolerance policy achieves 95% of the detection rate and conserves 50% of nodes’ energy under the presence of 35% of malicious nodes in the network. Energy efficient policy achieves 90% of detection rate and conserves 95% of nodes’ energy under the existence of 10% of malicious nodes in the network. Normal policy achieves up to 90% of detection rate between 15 and 25% of malicious nodes while conserving 70% and 80% of energy under these percentages.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"8 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信