ACM Transactions on Internet of Things最新文献

筛选
英文 中文
Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses 基于物联网的公交车队预测性维护的无监督动态传感器选择
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-20 DOI: 10.1145/3530991
P. Killeen, I. Kiringa, T. Yeap
{"title":"Unsupervised Dynamic Sensor Selection for IoT-Based Predictive Maintenance of a Fleet of Public Transport Buses","authors":"P. Killeen, I. Kiringa, T. Yeap","doi":"10.1145/3530991","DOIUrl":"https://doi.org/10.1145/3530991","url":null,"abstract":"In recent years, big data produced by the Internet of Things has enabled new kinds of useful applications. One such application is monitoring a fleet of vehicles in real time to predict their remaining useful life. The consensus self-organized models (COSMO) approach is an example of a predictive maintenance system. The present work proposes a novel Internet of Things based architecture for predictive maintenance that consists of three primary nodes: the vehicle node, the server leader node, and the root node, which enable on-board vehicle data processing, heavy-duty data processing, and fleet administration, respectively. A minimally viable prototype of the proposed architecture was implemented and deployed to a local bus garage in Gatineau, Canada. The present work proposes improved consensus self-organized models (ICOSMO), a fleet-wide unsupervised dynamic sensor selection algorithm. To analyze the performance of ICOSMO, a fleet simulation was implemented. The J1939 data gathered from a hybrid bus was used to generate synthetic data in the simulations. Simulation results that compared the performance of the COSMO and ICOSMO approaches revealed that in general ICOSMO improves the average area under the curve of COSMO by approximately 1.5% when using the Cosine distance and 0.6% when using Hellinger distance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"45 1","pages":"1 - 36"},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85588113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things LA-MQTT:物联网的位置感知发布-订阅通信
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-20 DOI: 10.1145/3529978
Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice
{"title":"LA-MQTT: Location-aware Publish-subscribe Communications for the Internet of Things","authors":"Federico Montori, Lorenzo Gigli, L. Sciullo, M. D. Felice","doi":"10.1145/3529978","DOIUrl":"https://doi.org/10.1145/3529978","url":null,"abstract":"Nowadays, several Internet of Things (IoT) deployments use publish-subscribe paradigms to disseminate IoT data to a pool of interested consumers. At the moment, the most widespread standard for such scenarios is MQTT. We also register an increasing interest in IoT-enabled Location-Based Services, where data must be disseminated over a target area and its spatial relevance and the current positions of the consumers must be taken into account. Unfortunately, the MQTT protocol does not support location awareness, and hence it may result in notifying consumers that are geographically far from the data source, causing increased network overhead and poor Quality of Service (QoS). We address the issue by proposing LA-MQTT, an extension to standard MQTT supporting spatial-aware publish-subscribe communications on IoT scenarios. LA-MQTT is broker-agnostic and fully backward compatible with standard MQTT. As monitoring the position of subscribers over time may cause privacy concerns, LA-MQTT carefully supports location privacy preservation, for which the optimal tradeoff with the QoS of the spatial notifications is addressed via a learning-based algorithm. We demonstrate the effectiveness of LA-MQTT by experimentally evaluating its features via large-scale hybrid simulations, including real and virtual components. Finally, we provide a Proof of Concept real implementation of an LA-MQTT scenario.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"33 1","pages":"1 - 28"},"PeriodicalIF":2.7,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77596971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors 鬼屋:存在受损传感器的物理智能家居事件验证
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-11 DOI: 10.1145/3506859
S. Birnbach, Simon Eberz, I. Martinovic
{"title":"Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors","authors":"S. Birnbach, Simon Eberz, I. Martinovic","doi":"10.1145/3506859","DOIUrl":"https://doi.org/10.1145/3506859","url":null,"abstract":"In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks. We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"42 1","pages":"1 - 28"},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74137814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures 面向雾计算基础设施的运行时资源管理和供应中间件
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-04-11 DOI: 10.1145/3506718
A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz
{"title":"A Runtime Resource Management and Provisioning Middleware for Fog Computing Infrastructures","authors":"A. Miele, Henry Zárate, Luca Cassano, C. Bolchini, Jorge E. Ortiz","doi":"10.1145/3506718","DOIUrl":"https://doi.org/10.1145/3506718","url":null,"abstract":"The pervasiveness and growing processing capabilities of mobile and embedded systems have enabled the widespread diffusion of the Fog Computing paradigm in the Internet of Things scenario, where computing is directly performed at the edges of the networked infrastructure in distributed cyber-physical systems. This scenario is characterized by a highly dynamic workload and architecture in which applications enter and leave the system, as well as nodes and connections. This article proposes a runtime resource management and provisioning middleware for the dynamic distribution of the applications on the processing resources. The proposed middleware consists of a two-level hierarchy: (i) a global Fog Orchestrator monitoring the architecture status and (ii) a Local Agent on each node, performing a fine-grain tuning of its resources. The co-operation between these components allows one to dynamically adapt and exploit the fine-grain nodes view for fulfilling the defined system-level goals, for example, minimizing power consumption while meeting Quality of Service requirements such as application throughput. This hierarchical architecture and the adopted policies offer a unified optimization strategy that is unique with regard to existing approaches that typically focus on a single aspect of resource management at runtime. A middleware prototype is presented and experimentally evaluated in a Smart Building case study.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"73 1","pages":"1 - 29"},"PeriodicalIF":2.7,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88500311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things 面向物联网安全群组通信的群组OSCORE性能评价
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-03-26 DOI: 10.1145/3523064
M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca
{"title":"Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things","authors":"M. Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca","doi":"10.1145/3523064","DOIUrl":"https://doi.org/10.1145/3523064","url":null,"abstract":"The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices. This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"97 1","pages":"1 - 31"},"PeriodicalIF":2.7,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85206956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring Runtime Metrics of Fog Manufacturing via a Qualitative and Quantitative (QQ) Control Chart 通过定性和定量(QQ)控制图监控雾制造的运行时间指标
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-03-17 DOI: 10.1145/3501262
Yifu Li, Lening Wang, Dongyoon Lee, R. Jin
{"title":"Monitoring Runtime Metrics of Fog Manufacturing via a Qualitative and Quantitative (QQ) Control Chart","authors":"Yifu Li, Lening Wang, Dongyoon Lee, R. Jin","doi":"10.1145/3501262","DOIUrl":"https://doi.org/10.1145/3501262","url":null,"abstract":"Fog manufacturing combines Fog and Cloud computing in a manufacturing network to provide efficient data analytics and support real-time decision-making. Detecting anomalies, including imbalanced computational workloads and cyber-attacks, is critical to ensure reliable and responsive computation services. However, such anomalies often concur with dynamic offloading events where computation tasks are migrated from well-occupied Fog nodes to less-occupied ones to reduce the overall computation time latency and improve the throughput. Such concurrences jointly affect the system behaviors, which makes anomaly detection inaccurate. We propose a qualitative and quantitative (QQ) control chart to monitor system anomalies through identifying the changes of monitored runtime metric relationship (quantitative variables) under the presence of dynamic offloading (qualitative variable) using a risk-adjusted monitoring framework. Both the simulation and Fog manufacturing case studies show the advantage of the proposed method compared with the existing literature under the dynamic offloading influence.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"77 1","pages":"1 - 19"},"PeriodicalIF":2.7,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80086891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System QID:基于多线圈qi无线充电系统的稳健移动设备识别
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-03-17 DOI: 10.1145/3498904
Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang
{"title":"QID: Robust Mobile Device Recognition via a Multi-Coil Qi-Wireless Charging System","authors":"Deliang Yang, Guoliang Xing, Jun Huang, Xiangmao Chang, Xiaofan Jiang","doi":"10.1145/3498904","DOIUrl":"https://doi.org/10.1145/3498904","url":null,"abstract":"Recent years have witnessed the increasing penetration of wireless charging base stations in the workplace and public areas, such as airports and cafeterias. Such an emerging wireless charging infrastructure has presented opportunities for new indoor localization and identification services for mobile users. In this paper, we present QID, the first system that can identify a Qi-compliant mobile device during wireless charging in real-time. QID extracts features from the clock oscillator and control scheme of the power receiver and employs light-weight algorithms to classify the device. QID adopts a 2-dimensional motion unit to emulate a variety of multi-coil designs of Qi, which allows for fine-grained device fingerprinting. Our results show that QID achieves high recognition accuracy. With the prevalence of public wireless charging stations, our results also have important implications for mobile user privacy.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"7 1","pages":"1 - 27"},"PeriodicalIF":2.7,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90193759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease MAIDE:增强现实(AR)便利的移动系统,用于轻松登录物联网(IoT)设备
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-02-15 DOI: 10.1145/3506667
Huanle Zhang, M. Uddin, F. Hao, S. Mukherjee, P. Mohapatra
{"title":"MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease","authors":"Huanle Zhang, M. Uddin, F. Hao, S. Mukherjee, P. Mohapatra","doi":"10.1145/3506667","DOIUrl":"https://doi.org/10.1145/3506667","url":null,"abstract":"Having an efficient onboarding process is a pivotal step to utilize and provision the IoT devices for accessing the network infrastructure. However, the current process to onboard IoT devices is time-consuming and labor-intensive, which makes the process vulnerable to human errors and security risks. In order to have a streamlined onboarding process, we need a mechanism to reliably associate each digital identity with each physical device. We design an onboarding mechanism called MAIDE to fill this technical gap. MAIDE is an Augmented Reality (AR)-facilitated app that systematically selects multiple measurement locations, calculates measurement time for each location and guides the user through the measurement process. The app also uses an optimized voting-based algorithm to derive the device-to-ID mapping based on measurement data. This method does not require any modification to existing IoT devices or the infrastructure and can be applied to all major wireless protocols such as BLE, and WiFi. Our extensive experiments show that MAIDE achieves high device-to-ID mapping accuracy. For example, to distinguish two devices on a ceiling in a typical enterprise environment, MAIDE achieves ~95% accuracy by measuring 5 seconds of Received Signal Strength (RSS) data for each measurement location when the devices are 4 feet apart.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"70 1","pages":"1 - 21"},"PeriodicalIF":2.7,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74096679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Systematic Review on Osmotic Computing 渗透计算的系统综述
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-02-15 DOI: 10.1145/3488247
Benazir Neha, S. K. Panda, P. Sahu, Kshira Sagar Sahoo, A. Gandomi
{"title":"A Systematic Review on Osmotic Computing","authors":"Benazir Neha, S. K. Panda, P. Sahu, Kshira Sagar Sahoo, A. Gandomi","doi":"10.1145/3488247","DOIUrl":"https://doi.org/10.1145/3488247","url":null,"abstract":"Osmotic computing in association with related computing paradigms (cloud, fog, and edge) emerges as a promising solution for handling bulk of security-critical as well as latency-sensitive data generated by the digital devices. It is a growing research domain that studies deployment, migration, and optimization of applications in the form of microservices across cloud/edge infrastructure. It presents dynamically tailored microservices in technology-centric environments by exploiting edge and cloud platforms. Osmotic computing promotes digital transformation and furnishes benefits to transportation, smart cities, education, and healthcare. In this article, we present a comprehensive analysis of osmotic computing through a systematic literature review approach. To ensure high-quality review, we conduct an advanced search on numerous digital libraries to extracting related studies. The advanced search strategy identifies 99 studies, from which 29 relevant studies are selected for a thorough review. We present a summary of applications in osmotic computing build on their key features. On the basis of the observations, we outline the research challenges for the applications in this research field. Finally, we discuss the security issues resolved and unresolved in osmotic computing.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"16 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75887380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Computer Science Perspective on Digital Transformation in Production 从计算机科学的角度看生产中的数字化转型
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-02-15 DOI: 10.1145/3502265
P. Brauner, M. Dalibor, M. Jarke, Ike Kunze, I. Koren, G. Lakemeyer, M. Liebenberg, Judith Michael, J. Pennekamp, C. Quix, Bernhard Rumpe, Wil M.P. van der Aalst, Klaus Wehrle, A. Wortmann, M. Ziefle
{"title":"A Computer Science Perspective on Digital Transformation in Production","authors":"P. Brauner, M. Dalibor, M. Jarke, Ike Kunze, I. Koren, G. Lakemeyer, M. Liebenberg, Judith Michael, J. Pennekamp, C. Quix, Bernhard Rumpe, Wil M.P. van der Aalst, Klaus Wehrle, A. Wortmann, M. Ziefle","doi":"10.1145/3502265","DOIUrl":"https://doi.org/10.1145/3502265","url":null,"abstract":"The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"14 1","pages":"1 - 32"},"PeriodicalIF":2.7,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81046170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信