Information (Switzerland)最新文献

筛选
英文 中文
RTAD: A Real-Time Animal Object Detection Model Based on a Large Selective Kernel and Channel Pruning RTAD:基于大选择核和通道修剪的实时动物目标检测模型
Information (Switzerland) Pub Date : 2023-09-30 DOI: 10.3390/info14100535
Sicong Liu, Qingcheng Fan, Chunjiang Zhao, Shuqin Li
{"title":"RTAD: A Real-Time Animal Object Detection Model Based on a Large Selective Kernel and Channel Pruning","authors":"Sicong Liu, Qingcheng Fan, Chunjiang Zhao, Shuqin Li","doi":"10.3390/info14100535","DOIUrl":"https://doi.org/10.3390/info14100535","url":null,"abstract":"Animal resources are significant to human survival and development and the ecosystem balance. Automated multi-animal object detection is critical in animal research and conservation and ecosystem monitoring. The objective is to design a model that mitigates the challenges posed by the large number of parameters and computations in existing animal object detection methods. We developed a backbone network with enhanced representative capabilities to pursue this goal. This network combines the foundational structure of the Transformer model with the Large Selective Kernel (LSK) module, known for its wide receptive field. To further reduce the number of parameters and computations, we incorporated a channel pruning technique based on Fisher information to eliminate channels of lower importance. With the help of the advantages of the above designs, a real-time animal object detection model based on a Large Selective Kernel and channel pruning (RTAD) was built. The model was evaluated using a public animal dataset, AP-10K, which included 50 annotated categories. The results demonstrated that our model has almost half the parameters of YOLOv8-s yet surpasses it by 6.2 AP. Our model provides a new solution for real-time animal object detection.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136344697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sound Event Detection in Domestic Environment Using Frequency-Dynamic Convolution and Local Attention 基于频率动态卷积和局部注意的环境声事件检测
Information (Switzerland) Pub Date : 2023-09-30 DOI: 10.3390/info14100534
Grigorios-Aris Cheimariotis, Nikolaos Mitianoudis
{"title":"Sound Event Detection in Domestic Environment Using Frequency-Dynamic Convolution and Local Attention","authors":"Grigorios-Aris Cheimariotis, Nikolaos Mitianoudis","doi":"10.3390/info14100534","DOIUrl":"https://doi.org/10.3390/info14100534","url":null,"abstract":"This work describes a methodology for sound event detection in domestic environments. Efficient solutions in this task can support the autonomous living of the elderly. The methodology deals with the “Challenge on Detection and Classification of Acoustic Scenes and Events (DCASE)” 2023, and more specifically with Task 4a “Sound event detection of domestic activities”. This task involves the detection of 10 common events in domestic environments in 10 s sound clips. The events may have arbitrary duration in the 10 s clip. The main components of the methodology are data augmentation on mel-spectrograms that represent the sound clips, feature extraction by passing spectrograms through a frequency-dynamic convolution network with an extra attention module in sequence with each convolution, concatenation of these features with BEATs embeddings, and use of BiGRU for sequence modeling. Also, a mean teacher model is employed for leveraging unlabeled data. This research focuses on the effect of data augmentation techniques, of the feature extraction models, and on self-supervised learning. The main contribution is the proposed feature extraction model, which uses weighted attention on frequency in each convolution, combined in sequence with a local attention module adopted by computer vision. The proposed system features promising and robust performance.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136344282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective 智能合约漏洞分析工具的评估:特定领域视角
Information (Switzerland) Pub Date : 2023-09-29 DOI: 10.3390/info14100533
Bahareh Lashkari, Petr Musilek
{"title":"Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective","authors":"Bahareh Lashkari, Petr Musilek","doi":"10.3390/info14100533","DOIUrl":"https://doi.org/10.3390/info14100533","url":null,"abstract":"With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract’s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods results in unforeseen effects caused by overlooked classes of vulnerabilities. Current methods have difficulty dealing with multifaceted intrusions, which calls for more robust approaches. Therefore, overdependence on environment-defined parameters in the contract execution logic binds the contract to the manipulation of such parameters and is perceived as a security vulnerability. Several vulnerability analysis tools have been identified as insufficient to effectively identify certain types of vulnerability. In this paper, we perform a domain-specific evaluation of state-of-the-art vulnerability detection tools on smart contracts. A domain can be defined as a particular area of knowledge, expertise, or industry. We use a perspective specific to the area of energy contracts to draw logical and language-dependent features to advance the structural and procedural comprehension of these contracts. The goal is to reach a greater degree of abstraction and navigate the complexities of decentralized applications by determining their domains. In particular, we analyze code embedding of energy smart contracts and characterize their vulnerabilities in transactive energy systems. We conclude that energy contracts can be affected by a relatively large number of defects. It also appears that the detection accuracy of the tools varies depending on the domain. This suggests that security flaws may be domain-specific. As a result, in some domains, many vulnerabilities can be overlooked by existing analytical tools. Additionally, the overall impact of a specific vulnerability can differ significantly between domains, making its mitigation a priority subject to business logic. As a result, more effort should be directed towards the reliable and accurate detection of existing and new types of vulnerability from a domain-specific point of view.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135199873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing a User Extensible Service-Enabled Multi-Fidelity Hybrid Cloud-Deployable SoS Test and Evaluation (T&E) Infrastructure: Application of Modeling and Simulation (M&S) as a Service (MSaaS) 提供用户可扩展的支持服务的多保真混合云部署SoS测试和评估(T&E)基础设施:建模和仿真(M&S)作为服务(MSaaS)的应用
Information (Switzerland) Pub Date : 2023-09-28 DOI: 10.3390/info14100528
Saurabh Mittal, Robert L. Wittman, John Gibson, Josh Huffman, Hans Miller
{"title":"Providing a User Extensible Service-Enabled Multi-Fidelity Hybrid Cloud-Deployable SoS Test and Evaluation (T&E) Infrastructure: Application of Modeling and Simulation (M&S) as a Service (MSaaS)","authors":"Saurabh Mittal, Robert L. Wittman, John Gibson, Josh Huffman, Hans Miller","doi":"10.3390/info14100528","DOIUrl":"https://doi.org/10.3390/info14100528","url":null,"abstract":"Autonomous and AI-enabled systems present a challenge for integration within the System of Sys-tems (SoS) paradigm. A full system of systems (SoS) testbed is necessary to verify the integrity of a given system and preserve the modularization and accountability of its constituent systems. This integrated system needs to support iterative, continuous testing and development. This need war-rants the development of a virtual environment that provides the ground truth in a simulated sce-nario, interfaces with real-world data, and uses various domain-specific and domain-agnostic simulation systems for development, testing, and evaluation. These required features present a non-trivial challenge wherein constructive models and systems at different levels of fidelity need to interoperate to advance the testing, evaluation, and integration of complex systems. Such a virtual and constructive SoS architecture should be independent of the underlying computational infra-structure but must be cloud-enabled for wider integration of AI-enabled software components. This paper will present a modular Simulation, Experimentation, Analytics, and Test (SEAT) Lay-ered Architecture Framework, a 10-step methodology. This paper will also demonstrate a case study of a hybrid cloud-enabled simulation SoS that allows extensibility, composability, and de-ployability in different target environments.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Deep Learning Architectures and Vision Transformers for Musical Key Estimation 深度学习架构与视觉变换在音乐键估计中的比较分析
Information (Switzerland) Pub Date : 2023-09-28 DOI: 10.3390/info14100527
Manav Garg, Pranshav Gajjar, Pooja Shah, Madhu Shukla, Biswaranjan Acharya, Vassilis C. Gerogiannis, Andreas Kanavos
{"title":"Comparative Analysis of Deep Learning Architectures and Vision Transformers for Musical Key Estimation","authors":"Manav Garg, Pranshav Gajjar, Pooja Shah, Madhu Shukla, Biswaranjan Acharya, Vassilis C. Gerogiannis, Andreas Kanavos","doi":"10.3390/info14100527","DOIUrl":"https://doi.org/10.3390/info14100527","url":null,"abstract":"The musical key serves as a crucial element in a piece, offering vital insights into the tonal center, harmonic structure, and chord progressions while enabling tasks such as transposition and arrangement. Moreover, accurate key estimation finds practical applications in music recommendation systems and automatic music transcription, making it relevant across academic and industrial domains. This paper presents a comprehensive comparison between standard deep learning architectures and emerging vision transformers, leveraging their success in various domains. We evaluate their performance on a specific subset of the GTZAN dataset, analyzing six different deep learning models. Our results demonstrate that DenseNet, a conventional deep learning architecture, achieves remarkable accuracy of 91.64%, outperforming vision transformers. However, we delve deeper into the analysis to shed light on the temporal characteristics of each deep learning model. Notably, the vision transformer and SWIN transformer exhibit a slight decrease in overall performance (1.82% and 2.29%, respectively), yet they demonstrate superior performance in temporal metrics compared to the DenseNet architecture. The significance of our findings lies in their contribution to the field of musical key estimation, where accurate and efficient algorithms play a pivotal role. By examining the strengths and weaknesses of deep learning architectures and vision transformers, we can gain valuable insights for practical implementations, particularly in music recommendation systems and automatic music transcription. Our research provides a foundation for future advancements and encourages further exploration in this area.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135344943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enriching a Traditional Learning Activity in Preschool through Augmented Reality: Children’s and Teachers’ Views 用增强现实丰富幼儿传统学习活动:儿童和教师的观点
Information (Switzerland) Pub Date : 2023-09-28 DOI: 10.3390/info14100530
Sophia Rapti, Theodosios Sapounidis, Sokratis Tselegkaridis
{"title":"Enriching a Traditional Learning Activity in Preschool through Augmented Reality: Children’s and Teachers’ Views","authors":"Sophia Rapti, Theodosios Sapounidis, Sokratis Tselegkaridis","doi":"10.3390/info14100530","DOIUrl":"https://doi.org/10.3390/info14100530","url":null,"abstract":"Nowadays, Augmented Reality flourishes in educational settings. Yet, little is known about teachers’ and children’s views of Augmented Reality applications in Preschool. This paper explores 71 preschoolers’ opinions of Augmented Reality teaching integrated into a traditional learning activity. Additionally, five educators’ views of Augmented Reality applications in Preschool are captured. Mixed methods with questionnaires and semi-structured interviews were used. The questionnaires record children’s preferences regarding their favorite learning activity between traditional and the Augmented Reality one. Additionally, they explore the activity preschoolers would like to repeat and found most enjoyable: playful. Regarding quantitative data analysis, independent/paired samples t-tests and chi-square test along with bootstrapping with 1000 samples were used. As for the qualitative data collection, educators’ semi-structured interviews focused on three axes: (a) children’s motivation and engagement in Augmented Reality activities, (b) Augmented Reality’s potential to promote skills, and (c) Augmented Reality as a teaching tool in preschool. The emerging results are: Preschoolers prefer more Augmented Reality activities than traditional ones. There are no statistically significant gender differences in preferences for Augmented Reality activities. Educators regard Augmented Reality technology as an innovative, beneficial teaching approach in preschool. However, they express concern regarding the promotion of collaboration among preschoolers via Augmented Reality.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135343568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Spherical Retractable Bubble Space: An Egocentric Graph Visualization throughout a Retractable Visualization Space 球形可伸缩气泡空间:一个贯穿可伸缩可视化空间的自我中心图形可视化
Information (Switzerland) Pub Date : 2023-09-28 DOI: 10.3390/info14100531
Piriziwè Kobina, Thierry Duval, Laurent Brisson
{"title":"The Spherical Retractable Bubble Space: An Egocentric Graph Visualization throughout a Retractable Visualization Space","authors":"Piriziwè Kobina, Thierry Duval, Laurent Brisson","doi":"10.3390/info14100531","DOIUrl":"https://doi.org/10.3390/info14100531","url":null,"abstract":"In this paper, we present a new egocentric metaphor for graph visualization that consists in positioning a graph between two concentric spheres of different radii. It improves the expansion of nodes in space, contrary to 3D spatialization algorithms. The edge drawing is optimized by pushing all the edges into the area delimited by our two concentric spheres so that a user can move freely without being encumbered by edges. Our new metaphor also makes it possible to reduce the display angles in order to have a global view of the graph without leaving the egocentricity.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135424845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Agent-Based Simulation Platform for a Safe Election: From Design to Simulation 基于agent的安全选举仿真平台:从设计到仿真
Information (Switzerland) Pub Date : 2023-09-28 DOI: 10.3390/info14100529
Ali V. Barenji, Benoit Montreuil, Sevda Babalou, Dima Nazzal, Frederick Benaben, Richard DeMillo
{"title":"An Agent-Based Simulation Platform for a Safe Election: From Design to Simulation","authors":"Ali V. Barenji, Benoit Montreuil, Sevda Babalou, Dima Nazzal, Frederick Benaben, Richard DeMillo","doi":"10.3390/info14100529","DOIUrl":"https://doi.org/10.3390/info14100529","url":null,"abstract":"Managing the logistics and safety of an election system, from delivering voting machines to the right locations at the right time to ensuring that voting lines remain reasonable in length is a complex problem due to the scarcity of resources, especially human poll workers, and the impact of human behavior and disrupting events on the performance of this critical system. These complexities grew with the need for physical distancing during the COVID-19 pandemic coinciding with multiple key national elections, including the 2020 general presidential election in the USA. In this paper, we propose a digital clone platform leveraging agent-based simulation to model and experiment with resource allocation decisions and voter turnout fluctuations and facilitate “what-if” scenario testing of any election. As a use case, we consider three different concurrent polling location problems, namely, resource allocation, polling layout, and management. The main aim is to reduce voter waiting time and provide visibility of different scenarios for polling and state-level managers. We explain the proposed simulation platform based on Fulton County for the 2020 presidential US election. Fulton County had 238 polling locations in 2020, which provided publicly available voter turnout data. The developed platform realistically models at the county level and at specific locations, suggesting the possible allocation of finite resources among locations in the county and the configuration of each location, accounting for physical, legal, and technical constraints. Multiple realistic scenarios were developed and embedded into the simulation platform to evaluate and verify the different systems. The system performance and key attributes of the election system, such as waiting time, resource utilization, and layout safety, were tested and validated.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Instance- and Label-Based Feature Selection Method in Classification Tasks 基于实例和标签的分类任务特征选择方法
Information (Switzerland) Pub Date : 2023-09-28 DOI: 10.3390/info14100532
Qingcheng Fan, Sicong Liu, Chunjiang Zhao, Shuqin Li
{"title":"An Instance- and Label-Based Feature Selection Method in Classification Tasks","authors":"Qingcheng Fan, Sicong Liu, Chunjiang Zhao, Shuqin Li","doi":"10.3390/info14100532","DOIUrl":"https://doi.org/10.3390/info14100532","url":null,"abstract":"Feature selection is crucial in classification tasks as it helps to extract relevant information while reducing redundancy. This paper presents a novel method that considers both instance and label correlation. By employing the least squares method, we calculate the linear relationship between each feature and the target variable, resulting in correlation coefficients. Features with high correlation coefficients are selected. Compared to traditional methods, our approach offers two advantages. Firstly, it effectively selects features highly correlated with the target variable from a large feature set, reducing data dimensionality and improving analysis and modeling efficiency. Secondly, our method considers label correlation between features, enhancing the accuracy of selected features and subsequent model performance. Experimental results on three datasets demonstrate the effectiveness of our method in selecting features with high correlation coefficients, leading to superior model performance. Notably, our approach achieves a minimum accuracy improvement of 3.2% for the advanced classifier, lightGBM, surpassing other feature selection methods. In summary, our proposed method, based on instance and label correlation, presents a suitable solution for classification problems.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135426909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy 使用蓝牙OBEX代理保护物联网设备免受蓝牙蠕虫攻击
Information (Switzerland) Pub Date : 2023-09-27 DOI: 10.3390/info14100525
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang, Yi-Wen Lai
{"title":"Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy","authors":"Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang, Yi-Wen Lai","doi":"10.3390/info14100525","DOIUrl":"https://doi.org/10.3390/info14100525","url":null,"abstract":"The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT), and big data from malware and data theft with BlueZ’s Bluetooth File Transfer Filter (BTF). It can use a configurable filter to block unauthorized Bluetooth file transfers. The BTF is available for various Linux distributions and can protect many Bluetooth-enabled devices, including smartphones, tablets, laptops, and the Internet of Things. However, the increased number and density of Bluetooth devices have also created a serious problem—the Bluetooth worm. It poses a severe threat to the security of Bluetooth devices. In this paper, we propose a Bluetooth OBEX Proxy (BOP) to filter malicious files transferred to devices via the OBEX system service in BlueZ. The method described in this article prevents illegal Bluetooth file transfers, defending big data, the Internet of Things (IoT), and electronic communications from malware and data theft. It also protects numerous Bluetooth devices, including smartphones, tablets, laptops, and the Internet of Things, with many Linux distributions. Overall, the detection findings were entirely accurate, with zero false positives and 2.29% misses.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135579599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信