International Journal of Computer Networks and Applications最新文献

筛选
英文 中文
Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN) 基于Clibat算法的无线传感器网络攻防模型最小误差研究
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217700
K. Abdul Basith, T. Shankar
{"title":"Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN)","authors":"K. Abdul Basith, T. Shankar","doi":"10.22247/ijcna/2022/217700","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217700","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43563715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm 利用机器学习算法分析和批准物联网边缘计算设备的新型信任协商协议
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217704
V. Maruthi Prasad, B. Bharathi
{"title":"A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm","authors":"V. Maruthi Prasad, B. Bharathi","doi":"10.22247/ijcna/2022/217704","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217704","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45024389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks 一种新的基于agent的多路径路由协议以延长集群无线传感器网络的生存期并提高其可靠性
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217702
Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra
{"title":"A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks","authors":"Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra","doi":"10.22247/ijcna/2022/217702","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217702","url":null,"abstract":"– Over the clustered wireless network systems, development in wireless technology has had a more substantial influence. Entities need to communicate with one another in order to create a sustainable ecosystem. Clustering methods help connect and organise the sensor nodes by load balancing and extending the network lifetime. Only now, various techniques have been developed for solving routing problems but have yet to focus on routing reliability with avoidance of data collision in real scenarios. This research is carried out for the reliability of routing by multi-objective optimization in static and dynamic environments through agent-based analysis with avoidance of data collision and depletion of energy. This study introduces a fuzzy-based multipath clustering technique that exhibits both static and dynamic clustering formation properties. The designated region starts the clustering process once the sensor nodes are ready to begin the data transmission procedure. The proposed technique works in two steps: a) fuzzy cluster head selection; and b) multi-objective agent-based multipath routing protocols for shortest route path discovery. The enhancement made in cluster creation and selection is the critical feature. A well-organized sensor ecosystem has lessened the negative impacts of network collision and energy exhaustion. The packet delivery ratio, communication overhead, and energy consumption are the performance metrics examined when simulating the specified protocol using the computer language NS2. The devised fuzzy-based multi-path routing (FC-MRP) clustering technique outperforms the AODV (Ad-hoc on-demand distance vector routing) protocol, according to the results. The average percentage of improvement concerning PDR, Throughput, end-to-end latency, Overhead, Energy utilised, Energy efficiency, Network lifetime, and PLR is found to be +2.53, +2.23, -18.58, -22.46, -17.95, +23.00, +4.11, -18.09 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data 基于HADAES (Advanced Encryption Standard)算法的云数据虚拟化环境攻击检测
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215916
R. Mangalagowri, R. Venkataraman
{"title":"Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data","authors":"R. Mangalagowri, R. Venkataraman","doi":"10.22247/ijcna/2022/215916","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215916","url":null,"abstract":"– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47496294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network 基于Deft粒子群优化的移动Ad Hoc网络能耗最小化路由协议(DPSORP)
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215922
S. Preema, M. Thilagu
{"title":"Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network","authors":"S. Preema, M. Thilagu","doi":"10.22247/ijcna/2022/215922","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215922","url":null,"abstract":"– Rapid technological development in the wireless communication sector has improved mobile ad hoc networks (MANETs) to serve a variety of domains, such as military activities, emergency operations, civilian settings, and disaster management. Self-organizing mobile nodes in MANET work together to create a dynamic network architecture to make connections. Before reaching its destination node in a MANET, data must pass through several intermediate nodes. For the creation and maintenance of routes, local link connection is crucial. This paper proposes the Deft Particle Swarm Optimization-based Routing Protocol (DPSORP) to reduce delay, which minimizes energy consumption. DPSORP gives precedence for local and global optimal routes. Before using a route for data transmission, DPSORP assesses its quality using two distinct kinds of rules. DPSORP uses a multi-path for data transmission rather than relying on a single path. Using the NS3 simulator and common network performance metrics and parameters, DPSORP is evaluated. The findings demonstrate unequivocally that the proposed routing protocol, DPSORP, outperforms existing routing protocols in terms of reducing delay and energy consumption .","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43560344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks 基于信任的移动自组织网络安全与服务质量路由设计
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215913
G. Sripriya, T. Santha
{"title":"A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks","authors":"G. Sripriya, T. Santha","doi":"10.22247/ijcna/2022/215913","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215913","url":null,"abstract":"– The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44729969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems 使用入侵检测系统的物联网网络安全框架的调查和测试
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215920
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara
{"title":"Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems","authors":"Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara","doi":"10.22247/ijcna/2022/215920","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215920","url":null,"abstract":"– The Internet of Things is a new paradigm that facilitates collecting business or personal data through smart devices with Internet connections. IoT devices are heterogeneous and have a limited computational capacity which represents a challenge for protecting data against cyber-attacks. This article surveys communication protocols, cybersecurity attacks and intrusion detection systems (IDSs). This study identifies the IoT protocols used for data transmission, and cybersecurity challenges and then presents a comparative analysis of IDSs. Next, the IoT cybersecurity framework, IoTCyFra, is surveyed by cybersecurity specialists. IoTCyFra is a validated IoT cybersecurity framework with an organizational structure that safeguards data and detects cybersecurity threats in an IoT infrastructure. It also explores how an IDS protects against cyberattacks through an IoT-controlled environment. Finally, the results and conclusions are reported.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46543574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments QSIH:一种新的基于QoS感知的侧链物联网设计,用于安全的医疗部署
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215921
Pooja Mishra, Sandeep Malik
{"title":"QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments","authors":"Pooja Mishra, Sandeep Malik","doi":"10.22247/ijcna/2022/215921","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215921","url":null,"abstract":"– Internet of Medical Things (IoMT) are networks which are targeted towards design of healthcare communication interfaces with low latency and high security. In order to design such interfaces, efficient models for data encryption, hashing, privacy, and quality of service (QoS) awareness are needed. A wide variety of standard medical interfaces are proposed by researchers, which assist in reducing network redundancies for high-throughput and low latency communications. These interfaces also implement security models that ensure data encryption & privacy. But due to incorporation of encryption methods, QoS performance of the IoMT devices reduces, which limits their real-time usability for in-patient monitoring & treatment. In order to improve IoMT QoS while maintaining high security, this text proposes design of QSIH, which is a QoS-aware sidechain model that can be used for securing IoMT networks. The proposed model describes design of a blockchain-based data storage & communication interface, which is capable of removing a wide variety of network attacks. The delay needed for communication in any blockchain-based interface increases exponentially w.r.t. number of blocks added to the system. In order to reduce this delay, a novel machine learning model based on Genetic Algorithm optimization is proposed. The proposed model splits the main blockchain into multiple shards in a QoS-aware manner, thereby ensuring low delay, and high communication throughput. The shards (or sidechains) are managed using an interactive Q-Learning (IQL), which is able to expand or contract these chains depending upon network’s QoS performance. Sidechains which are unused for large periods of time are combined together, and archived for future reference. The archived sidechains are formed from main blockchain, and are merged with other sidechains depending upon archival requirements of the network. Due to such a dynamic side chaining model, the proposed QSIH model is capable of reducing network communication delay by 18%, increase throughput by 14%, reduce storage cost by 5%, while maintaining high level of security & privacy in the network. The model was tested under different IoMT scenarios, and it was observed that it showcased consistent performance across different network emulations.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48831772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) 面向低功耗有损网络(RPL)的自适应路由协议,实现水下物联网(IoUT)的可靠节能通信
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215918
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
{"title":"Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT)","authors":"R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran","doi":"10.22247/ijcna/2022/215918","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215918","url":null,"abstract":"– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41580410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency 基于爬山马鹿算法的车辆自组织网络优化路径选择提高能源效率
International Journal of Computer Networks and Applications Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215915
K. Giridhar, C. Anbuananth, N. Krishnaraj
{"title":"Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency","authors":"K. Giridhar, C. Anbuananth, N. Krishnaraj","doi":"10.22247/ijcna/2022/215915","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215915","url":null,"abstract":"– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48580871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信