Journal of Sensor and Actuator Networks最新文献

筛选
英文 中文
VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management 支持vnf的5G网络编排框架,用于切片创建、隔离和管理
Journal of Sensor and Actuator Networks Pub Date : 2023-09-13 DOI: 10.3390/jsan12050065
Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo, In-Ho Ra
{"title":"VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management","authors":"Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo, In-Ho Ra","doi":"10.3390/jsan12050065","DOIUrl":"https://doi.org/10.3390/jsan12050065","url":null,"abstract":"Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135742074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations 事件触发实现下双馈风力发电机组输出反馈镇定
Journal of Sensor and Actuator Networks Pub Date : 2023-09-12 DOI: 10.3390/jsan12050064
Mahmoud Abdelrahim, Dhafer Almakhles
{"title":"Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations","authors":"Mahmoud Abdelrahim, Dhafer Almakhles","doi":"10.3390/jsan12050064","DOIUrl":"https://doi.org/10.3390/jsan12050064","url":null,"abstract":"The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over a network. To generate the sampling times, three different triggering schemes were developed: time-triggering, static event-triggering, and dynamic event-triggering mechanisms; moreover, performance comparisons were conducted between such approaches. The design methodology is based on emulation, such that the plant is first stabilized in continuous-time where a robust feedback law is constructed based on the linear quadratic Gaussian regulator (LQG) approach. Then, the impact of the network is taken into account, and an event-triggering mechanism is built so that closed-loop stability is maintained and the Zeno phenomenon is avoided by using temporal regularization. The necessary stability constraints are framed as a linear matrix inequality, and the whole system is modeled as a hybrid dynamical system. A numerical simulation is used to demonstrate the effectiveness of the control strategy. The results show that the event-triggering mechanisms achieve a significant reduction of around 50% in transmissions compared to periodic sampling. Moreover, numerical comparisons with existing approaches show that the proposed approach provides better performance in terms of the stability guarantee and number of transmissions.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135827675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Binaural System (RBS) for Noise Acoustic Monitoring 用于噪声监测的远程双耳系统(RBS)
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-08-14 DOI: 10.3390/jsan12040063
Oscar Acosta, L. Hermida, Marcelo Herrera, Carlos Montenegro, E. Gaona, Mateo Bejarano, K. Gordillo, I. Pavón, C. Asensio
{"title":"Remote Binaural System (RBS) for Noise Acoustic Monitoring","authors":"Oscar Acosta, L. Hermida, Marcelo Herrera, Carlos Montenegro, E. Gaona, Mateo Bejarano, K. Gordillo, I. Pavón, C. Asensio","doi":"10.3390/jsan12040063","DOIUrl":"https://doi.org/10.3390/jsan12040063","url":null,"abstract":"The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47940198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of Hidden Authentication Factors from Possessive Information 从占有信息中提取隐藏的认证因素
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-08-11 DOI: 10.3390/jsan12040062
Nilobon Nanglae, B. M. Yakubu, P. Bhattarakosol
{"title":"Extraction of Hidden Authentication Factors from Possessive Information","authors":"Nilobon Nanglae, B. M. Yakubu, P. Bhattarakosol","doi":"10.3390/jsan12040062","DOIUrl":"https://doi.org/10.3390/jsan12040062","url":null,"abstract":"Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47708758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation of the Effectiveness of Deepfake Models and Tools 深度造假模型和工具的有效性研究
Journal of Sensor and Actuator Networks Pub Date : 2023-08-04 DOI: 10.3390/jsan12040061
Md. Saddam Hossain Mukta, Jubaer Ahmad, Mohaimenul Azam Khan Raiaan, Salekul Islam, Sami Azam, Mohammed Eunus Ali, Mirjam Jonkman
{"title":"An Investigation of the Effectiveness of Deepfake Models and Tools","authors":"Md. Saddam Hossain Mukta, Jubaer Ahmad, Mohaimenul Azam Khan Raiaan, Salekul Islam, Sami Azam, Mohammed Eunus Ali, Mirjam Jonkman","doi":"10.3390/jsan12040061","DOIUrl":"https://doi.org/10.3390/jsan12040061","url":null,"abstract":"With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration can be performed both in videos and pictures with extreme realism using deepfake innovation. Deepfake recordings, the majority of them targeting politicians or celebrity personalities, have been widely disseminated online. On the other hand, different strategies have been outlined in the research to combat the issues brought up by deepfake. In this paper, we carry out a review by analyzing and comparing (1) the notable research contributions in the field of deepfake models and (2) widely used deepfake tools. We have also built two separate taxonomies for deepfake models and tools. These models and tools are also compared in terms of underlying algorithms, datasets they have used and their accuracy. A number of challenges and open issues have also been identified.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136119404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks 车辆网络中使用机器学习的安全数据驱动变道决策
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-08-01 DOI: 10.3390/jsan12040059
R. Naja
{"title":"Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks","authors":"R. Naja","doi":"10.3390/jsan12040059","DOIUrl":"https://doi.org/10.3390/jsan12040059","url":null,"abstract":"This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky lanes. In order to analyze and mine the massive amounts of data, our platform uses effective Machine Learning (ML) techniques to forecast collisions and advise the driver to safely change lanes. From the unprocessed large data generated by the car sensors, kinematic information is retrieved, cleaned, and evaluated. Machine learning algorithms analyze this kinematic data and provide an action: either stay in lane or change lanes to the left or right. The model is trained using the ML techniques K-Nearest Neighbor, Artificial Neural Network, and Deep Reinforcement Learning based on a set of training data and focus on predicting driver actions. The proposed solution is validated via extensive simulations using a microscopic car-following mobility model, coupled with an accurate mathematical modelling. Performance analysis show that KNN yields up to best performance parameters. Finally, we draw conclusions for road safety stakeholders to adopt the safer technique to lane change maneuver.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43627196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4 IEEE 802.15.4上定时隐蔽信道的性能评估和缓解
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-08-01 DOI: 10.3390/jsan12040060
Ricardo Severino, João Rodrigues, João Alves, Luis Lino Ferreira
{"title":"Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4","authors":"Ricardo Severino, João Rodrigues, João Alves, Luis Lino Ferreira","doi":"10.3390/jsan12040060","DOIUrl":"https://doi.org/10.3390/jsan12040060","url":null,"abstract":"The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe cyber-security vulnerabilities, becoming potential targets and entry points for further attacks. As these nodes become compromised, attackers aim to set up stealthy communication behaviours, to exfiltrate data or to orchestrate nodes in a cloaked fashion, and network timing covert channels are increasingly being used with such malicious intents. The IEEE 802.15.4 is one of the most pervasive protocols in IoT and a fundamental part of many communication infrastructures. Despite this fact, the possibility of setting up such covert communication techniques on this medium has received very little attention. We aim to analyse the performance and feasibility of such covert-channel implementations upon the IEEE 802.15.4 protocol, particularly upon the DSME behaviour, one of the most promising for large-scale time critical communications. This enables us to better understand the involved risk of such threats and help support the development of active cyber-security mechanisms to mitigate these threats, which, for now, we provide in the form of practical network setup recommendations.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"70 ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41271876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Echo State Learning for User Trajectory Prediction to Minimize Online Game Breaks in 6G Terahertz Networks 回声状态学习用于6G太赫兹网络中用户轨迹预测以减少在线游戏中断
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-07-25 DOI: 10.3390/jsan12040058
Benedetta Picano, Leonardo Scommegna, E. Vicario, R. Fantacci
{"title":"Echo State Learning for User Trajectory Prediction to Minimize Online Game Breaks in 6G Terahertz Networks","authors":"Benedetta Picano, Leonardo Scommegna, E. Vicario, R. Fantacci","doi":"10.3390/jsan12040058","DOIUrl":"https://doi.org/10.3390/jsan12040058","url":null,"abstract":"Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for service continuity in the presence of user mobility. In this regard, this paper proposes a machine learning strategy to forecast user channel conditions, aiming at guaranteeing a seamless service whenever a user is involved in a handover, i.e., moving from the coverage area of one base station towards another. In particular, the proposed channel condition prediction approach involves the exploitation of an echo state network, an efficient class of recurrent neural network, that is empowered with a genetic algorithm to perform parameter optimization. The echo state network is applied to improve user decisions regarding the selection of the serving base station, avoiding game breaks as much as possible to lower game lag time. The validity of the proposed framework is confirmed by simulations in comparison to the long short-term memory approach and another alternative method, aimed at thoroughly testing the accuracy of the learning module in forecasting user trajectories and in reducing game breaks or lag time, with a focus on a sixth generation network application scenario.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46890697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Ledger as a Service: A Web 3.0-Oriented Architecture 分布式账本即服务:面向Web 3.0的体系结构
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-07-20 DOI: 10.3390/jsan12040057
F. Chiti, Giorgio Gandini
{"title":"Distributed Ledger as a Service: A Web 3.0-Oriented Architecture","authors":"F. Chiti, Giorgio Gandini","doi":"10.3390/jsan12040057","DOIUrl":"https://doi.org/10.3390/jsan12040057","url":null,"abstract":"This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic functional modules have been characterized and integrated into a comprehensive framework relying on an IOTA approach. Furthermore, a general protocol that is built upon an underlying publish-and-subscribe framework is proposed to support all the application phases. The proposed approach has been validated by a simulation campaign targeting the achievable latency and throughput and, further, by a qualitative analysis of high-level metrics, both pointing out several advantages in terms of interoperability, scalability, and mobility support, together with addressing some constraints affecting service availability and security.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48923243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management STARC:用于自主交叉管理的低功耗物联网设备的分散协调原语
IF 3.5
Journal of Sensor and Actuator Networks Pub Date : 2023-07-11 DOI: 10.3390/jsan12040056
Patrick Rathje, Valentin Poirot, O. Landsiedel
{"title":"STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management","authors":"Patrick Rathje, Valentin Poirot, O. Landsiedel","doi":"10.3390/jsan12040056","DOIUrl":"https://doi.org/10.3390/jsan12040056","url":null,"abstract":"Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants, even in the presence of radio failures. This work introduces STARC, a coordination primitive for safe, decentralized resource coordination. Using STARC, traffic participants can safely coordinate at intersections despite unreliable radio environments and without a central entity or infrastructure. Unlike other methods that require costly and energy-consuming platforms, STARC utilizes affordable and efficient Internet of Things devices that connect cars, bicycles, electric scooters, pedestrians, and cyclists. For communication, STARC utilizes low-power IEEE 802.15.4 radios and Synchronous Transmissions for multi-hop communication. In addition, the protocol provides distributed transaction, election, and handover mechanisms for decentralized, thus cost-efficient, deployments. While STARC’s coordination remains resource-agnostic, this work presents and evaluates STARC in a roadside scenario. Our simulations have shown that using STARC at intersections leads to safer and more efficient vehicle coordination. We found that average waiting times can be reduced by up to 50% compared to using a fixed traffic light schedule in situations with fewer than 1000 vehicles per hour. Additionally, we design platooning on top of STARC, improving scalability and outperforming static traffic lights even at traffic loads exceeding 1000 vehicles per hour.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48049986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信