IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
Detecting covert channel attacks on cyber-physical systems 检测对网络物理系统的隐蔽通道攻击
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-09-20 DOI: 10.1049/cps2.12078
Hongwei Li, Danai Chasaki
{"title":"Detecting covert channel attacks on cyber-physical systems","authors":"Hongwei Li,&nbsp;Danai Chasaki","doi":"10.1049/cps2.12078","DOIUrl":"10.1049/cps2.12078","url":null,"abstract":"<p>Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"228-237"},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136308695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature selection algorithm for substation main equipment defect text mining based on natural language processing 基于自然语言处理的变电站主设备缺陷文本挖掘特征选择算法
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-09-20 DOI: 10.1049/cps2.12079
Xiaoqing Mai, Tianhu Zhang, Changwu Hu, Yan Zhang
{"title":"Feature selection algorithm for substation main equipment defect text mining based on natural language processing","authors":"Xiaoqing Mai,&nbsp;Tianhu Zhang,&nbsp;Changwu Hu,&nbsp;Yan Zhang","doi":"10.1049/cps2.12079","DOIUrl":"10.1049/cps2.12079","url":null,"abstract":"<p>The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"238-246"},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12079","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers 基于无人机图像的配电和杆塔鸟巢检测方法
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-09-19 DOI: 10.1049/cps2.12073
Yue Meng, Yu Song, Yuquan Chen, Xin Zhang, Mei Wu, Biao Du
{"title":"A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers","authors":"Yue Meng,&nbsp;Yu Song,&nbsp;Yuquan Chen,&nbsp;Xin Zhang,&nbsp;Mei Wu,&nbsp;Biao Du","doi":"10.1049/cps2.12073","DOIUrl":"10.1049/cps2.12073","url":null,"abstract":"<p>The authors propose a novel object detection algorithm for identifying bird nests in medium voltage power line aerial images, which is crucial for ensuring the safe operation of the power grid. The algorithm utilises an improved Swin Transformer as the main feature extraction network of Fast R-CNN, further enhanced with a channel attention and modified binary self-attention mechanism to improve the feature representation ability. The proposed algorithm is evaluated on a newly constructed image dataset of medium voltage transmission lines containing bird nests, which are annotated and classified. Experimental results show that the proposed algorithm achieves satisfied accuracy and robustness in recognising bird nests compared to traditional algorithms.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"184-193"},"PeriodicalIF":1.5,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135107852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multilevel segmentation method of asymmetric semantics based on deep learning 基于深度学习的非对称语义多级分割方法
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-09-15 DOI: 10.1049/cps2.12075
Angxin Liu, Yongbiao Yang
{"title":"A multilevel segmentation method of asymmetric semantics based on deep learning","authors":"Angxin Liu,&nbsp;Yongbiao Yang","doi":"10.1049/cps2.12075","DOIUrl":"10.1049/cps2.12075","url":null,"abstract":"<p>An asymmetric semantic multi-level segmentation method based on depth learning is proposed in order to improve the precision and effect of semantic segmentation. A ‘content tree’ structure and an adjacency matrix are constructed to represent the parent-child relationship between each image sub region in a complete image. Through multiple combinations of spatial attention mechanism and channel attention mechanism, the similarity semantic features of the target object can be selectively aggregated, so as to enhance its feature expression and avoid the impact of significant objects. The asymmetric semantic segmentation model asymmetric pyramid feature convolutional network (APFCN) is constructed, and the path feature extraction and parameter adjustment are realised through APFCN. On the basis of APFCN network, a full convolution network is introduced for end-to-end image semantic segmentation. Combining the advantages of convolution network in extracting image features and the advantages of short-term and short-term memory network in solving long-term dependence, an end-to-end hybrid depth network is constructed for image semantic multi-level segmentation. The experimental results show that the mean intersection over Union value and mean pixel accuracy value are higher than that of the literature method, both of which are increased by more than 3%, and the segmentation effect is good.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"194-205"},"PeriodicalIF":1.5,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135437827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsafe behaviour detection with the improved YOLOv5 model 使用改进的 YOLOv5 模型检测不安全行为
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-09-15 DOI: 10.1049/cps2.12070
Li Ying, Zhao Lei, Geng Junwei, Hu Jinhui, Ma Lei, Zhao Zilong
{"title":"Unsafe behaviour detection with the improved YOLOv5 model","authors":"Li Ying,&nbsp;Zhao Lei,&nbsp;Geng Junwei,&nbsp;Hu Jinhui,&nbsp;Ma Lei,&nbsp;Zhao Zilong","doi":"10.1049/cps2.12070","DOIUrl":"10.1049/cps2.12070","url":null,"abstract":"<p>In industrial environments, workers should wear workwear for safety considerations. For the same reason, smoking is also prohibited. Due to the supervision of monitoring devices, workers have reduced smoking behaviours and started wearing workwear. To meet the requirements for detecting these behaviours in real-time monitoring videos with high speed and accuracy, the authors proposed an improved YOLOv5 model with the Triplet Attention mechanism. This mechanism strengthens the connection between channel and spatial dimensions, focuses the network on important parts, and improves feature extraction. Compared to the original YOLOv5 model, the addition of the mechanism increases the parameters by only 0.04%. The recall rate of the YOLOv5 model is enhanced while its prediction speed is maintained with only a minimal increase in parameters. Experiment results show that, compared to the original model, the improved YOLOv5 has a recall rate of 78.8%, 91%, and 89.3% for detecting smoking behaviour, not wearing helmets, and inappropriate workwear, respectively.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"87-98"},"PeriodicalIF":1.5,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135438294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5 从工业 4 到工业 5 的人-网络-物理系统设计框架综述
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-09-14 DOI: 10.1049/cps2.12077
Katherine van-Lopik, Steven Hayward, Rebecca Grant, Laura McGirr, Paul Goodall, Yan Jin, Mark Price, Andrew A. West, Paul P. Conway
{"title":"A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5","authors":"Katherine van-Lopik,&nbsp;Steven Hayward,&nbsp;Rebecca Grant,&nbsp;Laura McGirr,&nbsp;Paul Goodall,&nbsp;Yan Jin,&nbsp;Mark Price,&nbsp;Andrew A. West,&nbsp;Paul P. Conway","doi":"10.1049/cps2.12077","DOIUrl":"10.1049/cps2.12077","url":null,"abstract":"<p>Within the Industry 4.0 landscape, humans collaborate with cyber and physical elements to form human-cyber-physical systems (HCPS). These environments are increasingly complex and challenging workspaces due to increasing levels of automation and data availability. An effective system design requires suitable frameworks that consider human activities and needs whilst supporting overall system efficacy. Although several reviews of frameworks for technology were identified, none of these focused on the human in the system (moving towards Industry 5). The critical literature review presented provides a summary of HCPS frameworks, maps the considerations for a human in HCPS, and provides insight for future framework and system development. The challenges, recommendations, and areas for further research are discussed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"169-183"},"PeriodicalIF":1.5,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12077","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134971012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SwarmAd: A decentralised content management system SwarmAd:分散式内容管理系统
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-08-09 DOI: 10.1049/cps2.12071
Tommaso Baldo, Mauro Migliardi
{"title":"SwarmAd: A decentralised content management system","authors":"Tommaso Baldo,&nbsp;Mauro Migliardi","doi":"10.1049/cps2.12071","DOIUrl":"10.1049/cps2.12071","url":null,"abstract":"<p>Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the elderlies. Nevertheless, many may struggle to be online due to a lack of expertise, and a decentralised architecture may provide a solution by removing intermediaries, such as a webmaster, while not requiring expensive cloud solutions. However, issues concerning accessibility, security, and user experience have to be tackled. The paper focuses mainly on three issues: providing a human-readable domain, moderating content, and creating a reward system based on user reputation. An architecture is proposed based on Ethereum and Swarm. Smart contracts provide an automated set of rules to handle enterprise registration, content creation, and decision-making process, while Swarm serves both as distributed storage and the web host. Besides, in combination with Ethereum Name Service, Swarm provides a secure, distributed, and human-readable point of access to the web interface. The paper also describes an innovative two-token system where one token is meant to be a trustworthy reputation metre and the other is a spendable coin to get rewards. The final result is a fully decentralised, authenticated and moderated platform where users can aggregate and share their content presentations on the Internet.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"102-114"},"PeriodicalIF":1.5,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81441781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decomposition analysis on factors affecting electricity substitution in Guangdong province, China 中国广东省电能替代影响因素分解分析
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-07-17 DOI: 10.1049/cps2.12069
Haobo Chen, Shangyu Liu, Yaoqiu Kuang, Tonghe Wang, Jie Shu, Zetao Ma
{"title":"Decomposition analysis on factors affecting electricity substitution in Guangdong province, China","authors":"Haobo Chen,&nbsp;Shangyu Liu,&nbsp;Yaoqiu Kuang,&nbsp;Tonghe Wang,&nbsp;Jie Shu,&nbsp;Zetao Ma","doi":"10.1049/cps2.12069","DOIUrl":"10.1049/cps2.12069","url":null,"abstract":"<p>Electricity substitution is an effective measure for reducing pollutant emissions and promoting the consumption of renewable energy. The current research lacks a quantitative analysis method for the factors affecting regional electricity substitution. This article proposes a decomposition model of the factors affecting electricity substitution based on Logarithmic Mean Divisia Index method to expand the depth and breadth of electricity substitution. Results show that: (1) Macro-level electricity substitution in Guangdong province develops steadily, with 1694.93 × 10<sup>8</sup> kWh of total electricity substitution quantity during the period 2006–2020. The electricity substitution quantity in production sector accounts for 83.92% of the total, which is much larger than that in household sector. (2) Sustained improvement of labour productivity gives the largest contribution (3592.32 × 10<sup>8</sup> kWh) to the increase of electricity substitution in production sector during the period 2006–2020. Living standard effect has the largest contribution (452.21 × 10<sup>8</sup> kWh) to the increase of electricity substitution in household sector during the period 2006–2020. Electrification level effect and population effect have significant impact on electricity substitution development, while industrial structure has little impact on electricity substitution. (3) Energy intensity effect and energy consumption growth effect negatively influence electricity substitution in Guangdong province. The decline of energy intensity in the production sector has driven the decrease of electricity substitution quantity, contributing −2540.36 × 10<sup>8</sup> kWh to electricity substitution during the period 2006–2020. Policy implications like continuously promoting breakthroughs in electricity substitution technologies, improvement of electrification rate in the sectors with potential for substitution, and improvement the price mechanism for fossil fuels and electricity can promote the deepening development of electricity substitution and the realisation of the carbon neutrality goal.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"307-326"},"PeriodicalIF":1.5,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84541975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed consensus-based estimation for non-linear systems subject to missing measurements and Denial of Service attacks 基于分布式共识的非线性系统估算,受测量缺失和拒绝服务攻击的影响
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-07-12 DOI: 10.1049/cps2.12066
Yongzhen Guo, Li Li, Yuanqing Xia, Yanxin Wen, Jingjing Guo
{"title":"Distributed consensus-based estimation for non-linear systems subject to missing measurements and Denial of Service attacks","authors":"Yongzhen Guo,&nbsp;Li Li,&nbsp;Yuanqing Xia,&nbsp;Yanxin Wen,&nbsp;Jingjing Guo","doi":"10.1049/cps2.12066","DOIUrl":"10.1049/cps2.12066","url":null,"abstract":"<p>This article studies a distributed consensus-based estimation problem for discrete time-varying non-linear systems with missing measurements and Denial of Service (DoS) attacks. The probability of missing measurements is independent for each sensor. The communication link between sensor nodes is unreliable and subjected to DoS attacks. To achieve accurate state estimation against missing measurements, a local estimator with compensation mechanism is designed for each sensor node. A stochastic event-triggered mechanism is used to lessen additional information transfer. Based on this, a distributed consensus-based estimator is constructed by continually fusing local neighbours information matrixs and vectors. Moreover, the analysis of the designed estimator boundedness is presented. Finally, the effectiveness of the proposed algorithm is verified by three numerical examples.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"50-62"},"PeriodicalIF":1.5,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80258111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the closed loop industrial internet of things (IIoT)-based control system in enhancing the oil recovery factor and the oil production 基于工业物联网 (IIoT) 的闭环控制系统在提高采油率和石油产量中的应用
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-07-08 DOI: 10.1049/cps2.12068
Hossein Malekpour Naghneh, Maryamparisa Amani, Alireza Farhadi, Mohammad Taghi Isaai
{"title":"Application of the closed loop industrial internet of things (IIoT)-based control system in enhancing the oil recovery factor and the oil production","authors":"Hossein Malekpour Naghneh,&nbsp;Maryamparisa Amani,&nbsp;Alireza Farhadi,&nbsp;Mohammad Taghi Isaai","doi":"10.1049/cps2.12068","DOIUrl":"10.1049/cps2.12068","url":null,"abstract":"<p>A non-linear large scale stochastic optimisation model for enhancing the oil production and the recovery factor of the offshore oil reservoirs is proposed. The model aims at minimising the miss-match between mathematical model and the actual dynamic behaviour of the reservoir and the exploitation time, while maximising the oil production and the recovery factor. The model involves the three dimension (3D) oil reservoirs equipped with a few vertical injection and production wells. The limited number of wells is one of the major features of the common oil reservoirs in the middle-east region. The proposed model consists of the primarily mathematical model of the 3D reservoir, a model update algorithm and a large scale constrained non-linear optimisation algorithm. The input to this model is the daily production rate of the oil, natural gas and water produced from the oil reservoir and the output is the optimal injection rate to be injected to the injection wells in order to maximise the oil production and the recovery factor. In order to evaluate the performance of this model, the authors apply this model on part of one of the Iran's offshore oil reservoirs and study the performance improvement due to the proposed model and compare its performance with the performance of the available Improved Oil Recovery (IOR) technique. It is illustrated that the proposed model can increase the oil production from the reservoir up to 47.96% and reduce the exploitation period up to 66.66% compared with those of the available technique.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"72-86"},"PeriodicalIF":1.5,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12068","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84301099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信