IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system 电网频率调节中网络攻击不确定性的反主动控制
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-11-24 DOI: 10.1049/iet-cps.2019.0097
Sheetla Prasad
{"title":"Counteractive control against cyber-attack uncertainties on frequency regulation in the power system","authors":"Sheetla Prasad","doi":"10.1049/iet-cps.2019.0097","DOIUrl":"10.1049/iet-cps.2019.0097","url":null,"abstract":"<div>\u0000 <p>In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack vulnerabilities and paid less attention on design of counteractive robust control scheme for LFC problem. Thus, observer based control scheme is designed here and provides robust performance against unknown input attack uncertainty and communication time-delay attack uncertainty. The generalized extended state observer (GESO) is used not only for state and disturbance estimation but also for disturbance rejection of the system. The said observer ensures accurate estimation of the actual states leading to convergence of estimation error to zero. So, the observer based linear quadratic regulator (LQR) is used to regulate the closed-loop damping ratio against cyber-attack uncertainty. In addition to fast response in terms of settling time and reduced over/undershoots, the proposed control scheme satisfactorily compensates the cyber-attack uncertainties in power system cyber physical networks and also compared with existing traditional PI and PID controllers. The simulation results demonstrate the robustness in terms of stability and effectiveness in terms of system security with proposed controller when subjected to cyber-attack uncertainties and load disturbances.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"394-408"},"PeriodicalIF":1.5,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126359742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Formal verification of ontology transformation for distribution network information model based on meta-model theory 基于元模型理论的配电网信息模型本体转换形式化验证
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-11-10 DOI: 10.1049/iet-cps.2020.0018
Boya Qin, Dong Liu, Yiming Lu
{"title":"Formal verification of ontology transformation for distribution network information model based on meta-model theory","authors":"Boya Qin,&nbsp;Dong Liu,&nbsp;Yiming Lu","doi":"10.1049/iet-cps.2020.0018","DOIUrl":"10.1049/iet-cps.2020.0018","url":null,"abstract":"<div>\u0000 <p>This study presents a formal description and verification method of the ontology transformation process of the distribution network information model based on the meta-model theory. By defining the dynamic change structures and model mapping constraints of the ontology transformation process of distribution network, a formalised specification for describing the key attributes of model updating and model mapping processes was constructed. The model updating and model mapping instances were specified using model checking verification tool SPIN. The method fundamentally guarantees the standardisation and reliability of the model ontology transformation process achieved by the meta-model.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"388-393"},"PeriodicalIF":1.5,"publicationDate":"2020-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126191633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wyner wiretap-like encoding scheme for cyber-physical systems 用于网络物理系统的Wyner窃听式编码方案
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-30 DOI: 10.1049/iet-cps.2020.0012
Walter Lucia, Amr Youssef
{"title":"Wyner wiretap-like encoding scheme for cyber-physical systems","authors":"Walter Lucia,&nbsp;Amr Youssef","doi":"10.1049/iet-cps.2020.0012","DOIUrl":"10.1049/iet-cps.2020.0012","url":null,"abstract":"<div>\u0000 <p>In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop operations typical of feedback control systems. Specifically, by resorting to the control concept of one-step reachable sets, they first show that a wiretap-like encoding scheme exists whenever there is an asymmetry in the plant model knowledge available to control system (the defender) and to the eavesdropper. The effectiveness of the proposed scheme is confirmed by means of a numerical example. Finally, they conclude the study by presenting open design challenges that can be addressed by the research community to improve, in different directions, the secrete message exchange problem in CPSs.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"359-365"},"PeriodicalIF":1.5,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127539766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unified Smith predictor-based loop-shaping H ∞ damping controller for mitigating inter-area oscillations in power system 基于统一Smith预测器的环整形H∞阻尼控制器缓解电力系统区域间振荡
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-21 DOI: 10.1049/iet-cps.2020.0030
Mithu Sarkar, Bidyadhar Subudhi
{"title":"Unified Smith predictor-based loop-shaping H ∞ damping controller for mitigating inter-area oscillations in power system","authors":"Mithu Sarkar,&nbsp;Bidyadhar Subudhi","doi":"10.1049/iet-cps.2020.0030","DOIUrl":"10.1049/iet-cps.2020.0030","url":null,"abstract":"<div>\u0000 <p>Low-frequency inter-area oscillation is one of the major problems to transfer the bulk power from one area to another area in an interconnected large power system. A wide-area signal-based controller is more effective to improve the damping of the inter-area oscillation than a local area signal-based controller. A wide-area measurement system makes it easier to transmit the wide-area signal through the communication system from the remote location to the controller site. However, the involvement of the unavoidable time delay in the wide-area signal transmission from a remote area to a controller site is to possess a great deal of challenge to design a damping controller. In this study, a unified Smith predictor (USP)-based loop shaping controller is designed to handle the negative effect of the delay using the wide-area signal. The robust stabilization normalised co-prime factor problem is converted into a generalised <i>H</i> <sub>∞</sub> optimisation problem for additional pole placement constraints. The performances of the USP-based loop-shaping <i>H</i> <sub>∞</sub> controller are compared with the USP-based <i>H</i> <sub>∞</sub> controller. From the obtained results, it is verified that the proposed controller gives an excellent damping performance and handles the effect of time delay.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"366-375"},"PeriodicalIF":1.5,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data privacy-based coordinated placement method of workflows and data 基于数据隐私的工作流和数据协调放置方法
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-21 DOI: 10.1049/iet-cps.2020.0007
Tao Huang, Shengjun Xue, Yumei Hu, Yiran Shi, Wei Jin
{"title":"Data privacy-based coordinated placement method of workflows and data","authors":"Tao Huang,&nbsp;Shengjun Xue,&nbsp;Yumei Hu,&nbsp;Yiran Shi,&nbsp;Wei Jin","doi":"10.1049/iet-cps.2020.0007","DOIUrl":"10.1049/iet-cps.2020.0007","url":null,"abstract":"<div>\u0000 <p>With the rapid development of data acquisition technology, many industries data already have the characteristics of big data and cloud technology has provided strong support for the storage and complex calculations of these massive data. The meteorological department established the cloud data centre based on the existing storage and computing resources and re-arranged the historical data to reduce the historical data access time of applications. However, the placement of each workflow and input data also affects the average data access time, which in turn affects the computing efficiency of the cloud data centre. At the same time, because of the collaborative processing of multiple nodes, the resource utilisation of cloud data centre has also been paid more and more attention. In addition, with the increase of data security requirements, some privacy conflict data should avoid being placed on the same or neighbouring nodes. In response to this challenge, based on the fat-tree network topology, this study proposes a data privacy protection-based collaborative placement strategy of workflow and data to jointly optimise the average data access time, the average resource utilisation, and the data conflict degree. Finally, a large number of experimental evaluations and comparative analyses verify the efficiency of the proposed method.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"342-350"},"PeriodicalIF":1.5,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber–physical systems 基于多智能体的机动网络物理系统机队被动维护支持规划
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-21 DOI: 10.1049/iet-cps.2019.0063
John Mbuli, Tarik Chargui, Damien Trentesaux, Abdelghani Bekrar, Thierry Dailly
{"title":"Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber–physical systems","authors":"John Mbuli,&nbsp;Tarik Chargui,&nbsp;Damien Trentesaux,&nbsp;Abdelghani Bekrar,&nbsp;Thierry Dailly","doi":"10.1049/iet-cps.2019.0063","DOIUrl":"10.1049/iet-cps.2019.0063","url":null,"abstract":"<div>\u0000 <p>Improving the availability and reliability of a fleet of mobile cyber–physical systems as well as the ability to adapt the maintenance planning decisions when facing unexpected events at the fleet level is a major stake faced by the manufacturers and the operators. In the context of this study, the authors propose a reactive multi-agent system model for the fleet maintenance planning of mobile cyber–physical systems. For that purpose, the ANEMONA multi-agent design methodology is used. In this methodology, the agents are modelled and then their organisational and interaction views are described. Numerical experiments are carried out in static and dynamic contexts. In a static context, the proposed multi-agent system is compared with a mathematical programming model to validate the effectiveness of the former in satisfying the fleet's availability and reliability expectations. In a dynamic context, simulated perturbations are used to illustrate the reactivity of the proposed multi-agent system. Lastly, an application to rail transport for the maintenance of a fleet of trains at Bombardier Transportation France is proposed. For that purpose, the proposed multi-agent system is integrated in the model layer of a decision support system named ‘MainFleet’ which is currently under development.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"376-387"},"PeriodicalIF":1.5,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid 智能电网自动发电控制隐身网络攻击检测算法研究
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-15 DOI: 10.1049/iet-cps.2019.0074
Fatemeh Akbarian, Amin Ramezani, Mohammad-Taghi Hamidi-Beheshti, Vahid Haghighat
{"title":"Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid","authors":"Fatemeh Akbarian,&nbsp;Amin Ramezani,&nbsp;Mohammad-Taghi Hamidi-Beheshti,&nbsp;Vahid Haghighat","doi":"10.1049/iet-cps.2019.0074","DOIUrl":"10.1049/iet-cps.2019.0074","url":null,"abstract":"<div>\u0000 <p>One of the basic requirements of today's sophisticated world is the availability of electrical energy, and neglect of this matter may have irreparable damages such as an extensive blackout. The problems which were introduced about the traditional power grid, and also, the growing advances in smart technologies make the traditional power grid go towards smart power grid. Although widespread utilisation of telecommunication networks in smart power grid enhances the efficiency of the system, it will create a critical platform for cyber attacks and penetration into the system. Automatic generation control (AGC) is a fundamental control system in the power grid, and it is responsible for controlling the frequency of the grid. An attack on the data transmitted through the telecommunications link from the sensors to the AGC will cause frequency deviation, resulting in disconnection of the load, generators and ultimately global blackout. In this study, by using a Kalman filter and a proposed detector, a solution has been presented to detect the attack before it can affect the system. Contrary to existing methods, this method is able to detect attacks that are stealthy from the area control error signal and χ<sup>2</sup> -detector. Simulations confirm the effectiveness of this method.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"351-358"},"PeriodicalIF":1.5,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115587470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Private routing and ride-sharing using homomorphic encryption 使用同态加密的私有路由和乘车共享
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-13 DOI: 10.1049/iet-cps.2019.0042
Farhad Farokhi, Iman Shames, Karl H. Johansson
{"title":"Private routing and ride-sharing using homomorphic encryption","authors":"Farhad Farokhi,&nbsp;Iman Shames,&nbsp;Karl H. Johansson","doi":"10.1049/iet-cps.2019.0042","DOIUrl":"10.1049/iet-cps.2019.0042","url":null,"abstract":"<div>\u0000 <p>A framework for private and secure communication and interaction between agents interacting in transportation services is developed. An agent, i.e. a user, can ask questions or submit queries regarding whether the other agents, i.e. drivers, use the desired road at specific times of the day in an encrypted fashion. The authors developed the framework using semi-homomorphic encryption (namely, the Paillier's encryption method) to enable the algebraic manipulation of plain data without the need for decryption using appropriate computations over the encrypted data. Strong privacy and security guarantees are proved for the agents. Subsequently, the semi-homomorphic encryption method is utilised to develop privacy-aware ride-sharing and routing algorithms without the need for disclosing the origin and destination of the user.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"311-320"},"PeriodicalIF":1.5,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics 智能城市中高效固体废物管理的基于物联网云的网络物理系统:一种基于成本函数的新型路线优化技术,用于使用垃圾箱传感器和实时道路交通信息的废物收集车辆
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-12 DOI: 10.1049/iet-cps.2019.0110
Ayaskanta Mishra, Arun Kumar Ray
{"title":"IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics","authors":"Ayaskanta Mishra,&nbsp;Arun Kumar Ray","doi":"10.1049/iet-cps.2019.0110","DOIUrl":"10.1049/iet-cps.2019.0110","url":null,"abstract":"<div>\u0000 <p>IoT cloud-based connected smart dustbins (equipped with sensors) are imperative for efficient waste management in smart city. Municipal agencies can reduce the use of both man and machine by cutting down their overall waste collection route distance as well as number of waste collection vehicles (WCVs) by deploying this proposed cyber-physical system for route optimization of WCVs with capacitated vehicle-routing model. A novel cost function is mathematically modelled using data from dustbin-sensors and real-time road-traffic with modified Dijkstra's algorithm for optimisation of WCVs routes. Amount of solid waste in the dustbin (GC in %), rate of the filling (<i>ΔG</i>) and real-time/dynamic road traffic information from Google distance matrix advanced application programming interface (API) are used for estimation of the optimised route for WCVs. Optimisation goal of this work is to reduce both capital expense (CapEx) and operational expense (OpEx) of solid waste collection in the city by cutting the WCV fleet size and reducing overall distance covered by WCVs. The proposed route optimisation technique is analytically simulated for Bhubaneswar smart city and the result shows 30.28% saving in overall WCVs route distance and hence reducing OpEx around 29.07% and CapEx around 26.83% by reducing WCV fleet size.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"330-341"},"PeriodicalIF":1.5,"publicationDate":"2020-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations 智能电网中的网络攻击——动态影响、分析和建议
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2020-10-02 DOI: 10.1049/iet-cps.2019.0103
B.M. Ruhul Amin, Seyedfoad Taghizadeh, Md. Shihanur Rahman, Md. Jahangir Hossain, Vijay Varadharajan, Zhiyong Chen
{"title":"Cyber attacks in smart grid – dynamic impacts, analyses and recommendations","authors":"B.M. Ruhul Amin,&nbsp;Seyedfoad Taghizadeh,&nbsp;Md. Shihanur Rahman,&nbsp;Md. Jahangir Hossain,&nbsp;Vijay Varadharajan,&nbsp;Zhiyong Chen","doi":"10.1049/iet-cps.2019.0103","DOIUrl":"10.1049/iet-cps.2019.0103","url":null,"abstract":"<div>\u0000 <p>Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems. As a well-known practice, steady-state analysis is commonly used to identify cyber attacks and provide effective solutions. However, it cannot fully cover non-linear behaviours and cascaded blackouts of the system caused by dynamic perturbations, as well as provide a post-disturbance operating point. This study presents a novel approach based on dynamic analysis that excludes the limitations of the steady-state analysis and can be used in the events of various cyber attacks. Four types of common attacks are reviewed, and their dynamic impacts are shown on the IEEE benchmark model of the Western System Coordinating Council system implemented in MATLAB Simulink. Then, recommendations are provided to enhance the security of the future smart power grids from the possible cyber attacks.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"321-329"},"PeriodicalIF":1.5,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信