International Journal of Computer Networks and Applications最新文献

筛选
英文 中文
Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network 基于混合优化的移动无线传感器网络节能高效路由协议
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215919
V. Veerakumaran, A. Rajini
{"title":"Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network","authors":"V. Veerakumaran, A. Rajini","doi":"10.22247/ijcna/2022/215919","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215919","url":null,"abstract":"– Mobile Wireless Sensor Network (MWSN) is a dispersed network having autonomous sensor nodes which monitors physical occurrences or environmental variables in real-time. Most MWSNs have limited energy, so energy efficiency is critical. A node’s data will be routed by one of two standard methods: single-long-hop or short-multi-hop routing paths. The quantity of energy required to deliver a packet grows directly proportional to the packet’s travel distance in MWSN. Single-hop communication in MWSN, on the other hand, is typically relatively energy-intensive. The nodes located nearer to the sink are considerably perform well than the rest of the nodes in MWSN because of the multi-hop connection, resulting in a shorter lifespan for the MWSN. In this paper, Hybrid Optimization-based Efficient Routing Protocol (HOERP) is proposed to minimize the energy consumption in MWSN. HOERP involves grey wolf optimization and particle swarm optimization, where local search is done by grey wolf optimization and the global search optimization is done by particle swarm optimization. Utilizing the nonlinear parameters in HOERP assist in identifying the optimized cum successful route leading to consume less energy. HOERP is evaluated in NS3 using the metrics standardly used in network-oriented researches. Result highlights that HOERP consumes less energy to deliver data packets than the current routing protocols.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49245642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers 基于多准则优化的虚拟机布局策略缓解数据中心异地风险
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215912
N. Chandrakala, Vamsidhar Enireddy
{"title":"Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers","authors":"N. Chandrakala, Vamsidhar Enireddy","doi":"10.22247/ijcna/2022/215912","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215912","url":null,"abstract":"– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46228020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks 6G网络中基于深度人工学习的高效设备间数据传输
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215917
V. Sridhar, S. Roslin
{"title":"Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks","authors":"V. Sridhar, S. Roslin","doi":"10.22247/ijcna/2022/215917","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215917","url":null,"abstract":"– The rising wireless service constraints and user compactness have to lead the progress of 6G communication in the modern days. The benefit of 6G over the presented technologies is a huge support for mixed applications and mobility maintenance. Device to Device (D2D) data transmission in 6G has great attention since it gives a better data delivery rate (DDR). Recently, several methods were established for D2D data transmission. However, energy consumption was not considered to improve the network throughput. To handle such problems, an artificial intelligence technique called Deep Neural Regressive Tangent Transfer Classifier (DNRTTC) model is introduced in this research for D2D data transmission in a 6G system. The designed method includes several layers to attain energy-efficient D2D data transmission. The primary layer is the input layer and it includes several mobile nodes as input. Nodes are transmitted to the hidden layer one. For each node, energy, received signal strength, and connection speed of each mobile node is calculated. Then the similarity analysis is done in the following layer where each node is analyzed with its threshold value. The result is sent to the output layer where the better resource mobile nodes are identified by using the activation function. This leads to attaining energy-efficient D2D data transmission in 6G. Results illustrate that the DNRTTC outperformed compared to conventional methods with better energy efficiency, packet delivery ratio, throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44378330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Region Based Secured Data Transmission Protocol for Wireless Sensor Network 基于区域的无线传感器网络安全数据传输协议
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215914
Ajay Kumar
{"title":"Region Based Secured Data Transmission Protocol for Wireless Sensor Network","authors":"Ajay Kumar","doi":"10.22247/ijcna/2022/215914","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215914","url":null,"abstract":"– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49041794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm 利用混沌黑寡妇优化算法提高云网络性能
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215923
A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa
{"title":"Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm","authors":"A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa","doi":"10.22247/ijcna/2022/215923","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215923","url":null,"abstract":"– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49127578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Network: techniques to Increase Quality of Service and Quality of Experience 5G网络:提高服务质量和体验质量的技术
International Journal of Computer Networks and Applications Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214508
N. Khan
{"title":"5G Network: techniques to Increase Quality of Service and Quality of Experience","authors":"N. Khan","doi":"10.22247/ijcna/2022/214508","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214508","url":null,"abstract":"– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47552561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment 云环境下数据安全的混合优化和同态加密设计
International Journal of Computer Networks and Applications Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214502
Mercy Joseph, Gobi Mohan
{"title":"Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment","authors":"Mercy Joseph, Gobi Mohan","doi":"10.22247/ijcna/2022/214502","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214502","url":null,"abstract":"– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49537086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing 云计算下科学工作流调度的多目标容错模型
International Journal of Computer Networks and Applications Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214505
S. Anuradha, P. Kanmani
{"title":"Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing","authors":"S. Anuradha, P. Kanmani","doi":"10.22247/ijcna/2022/214505","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214505","url":null,"abstract":"– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45009594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks 适用于移动社交云网络的孤立自适应用户配置文件匹配
International Journal of Computer Networks and Applications Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214506
M. Gobi
{"title":"Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks","authors":"M. Gobi","doi":"10.22247/ijcna/2022/214506","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214506","url":null,"abstract":"– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41390809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Model for Smart Home Network Security 基于区块链的智能家庭网络安全模型
International Journal of Computer Networks and Applications Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214509
Abdualrahman Johari, R. Alsaqour
{"title":"Blockchain-Based Model for Smart Home Network Security","authors":"Abdualrahman Johari, R. Alsaqour","doi":"10.22247/ijcna/2022/214509","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214509","url":null,"abstract":"– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信