Transactions on Networks and Communications最新文献

筛选
英文 中文
Moment Generating Function Approach in Diversity Combiner with M-PSK over Hoyt Fading Channel Hoyt衰落信道上分集组合M-PSK的矩生成函数方法
Transactions on Networks and Communications Pub Date : 2019-03-08 DOI: 10.14738/TNC.71.5972
Adeyemo Z.K, A. Ajadi, Semire F.A, S. I. Ojo
{"title":"Moment Generating Function Approach in Diversity Combiner with M-PSK over Hoyt Fading Channel","authors":"Adeyemo Z.K, A. Ajadi, Semire F.A, S. I. Ojo","doi":"10.14738/TNC.71.5972","DOIUrl":"https://doi.org/10.14738/TNC.71.5972","url":null,"abstract":"Wireless communication system is the processing, transmitting and receiving signals over an open space. This system suffers from time varying environment disturbance due to propagation of signals through different paths which prompt the signals to have different statistical distributions. The existing modified diversity combiners diversity such as Maximal Ratio Combiner (MRC), Equal Gain Combiner (EGC) with one Match Filter (MF) and one Radio Frequency (RF) chain, lack closed form expression. Therefore, in this paper, Moment Generating Function (MGF) approach is used to analyse the performance of the modified MRC over Hoyt fading distribution through the closed form expression. A closed formed expression is developed using the existing modified MRC with one Radio Frequency (RF) chain and one Matched Filter (MF) at the RF stage. Binary data of ten thousand bits are generated randomly as source data and modulated with M-ary Phase Shift Keying (M-PSK). The modulated signal is passed through the Hoyt fading channel which is then modeled using Moment Generating Function (MGF) approach in order to generate the resultant signals. The resultant signals at varying paths ‘L’ (2, 3 and 4) and Hoyt fading factors’q’ (0.2, 0.4 and 0.6) are combined using the modified MRC. The output signal is passed through a comparator which compares the output signal with 9.5 dB set as threshold value. The outage probability of the modified MRC using M-PSK (2-PSK and 4-PSK) at varying ‘L’ and ‘q’ is evaluated, while processing time is used to compare the performance of the conventional MRC with the modified MRC. The results obtained with the modified MRC using closed form expression give lower Outage Probability (OP) and processing time. The research can be used by satellite communication system designers to improve the quality of service.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125350152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Fusion in Wireless Communication Network Node Positioning 无线通信网络节点定位中的数据融合
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5833
Ya Luo, Xiaoyang Liu, Chao Liu
{"title":"Data Fusion in Wireless Communication Network Node Positioning","authors":"Ya Luo, Xiaoyang Liu, Chao Liu","doi":"10.14738/TNC.66.5833","DOIUrl":"https://doi.org/10.14738/TNC.66.5833","url":null,"abstract":"Aiming at the problems of low localization accuracy, high energy consumption and delay of transmission in wireless sensor networks, a wireless sensor network data fusion method is proposed. Combined with the theory of D-S argument, the wireless sensor network system model is first constructed. Then based on the analysis of ACO (Ant Colony Optimization) and MST (Minimum Spanning Tree) methods, a wireless sensor network data fusion method is proposed. The simulation results show that the larger the number of nodes in WSN is, the larger the energy consumption and delay are. As the moving speed of Sink node increases, the average transmission delay decreases and the useful data rate increases. The average energy The consumption is also gradually increasing; the performance of proposed WSN data fusion method is better than that of ACO and MST.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123206503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forwarding with Prediction over Machine Learning based Nodes in Wireless Mesh Networks 基于机器学习的无线网状网络节点预测转发
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5653
Jianjun Yang, Ju Shen, Mengyi Ying
{"title":"Forwarding with Prediction over Machine Learning based Nodes in Wireless Mesh Networks","authors":"Jianjun Yang, Ju Shen, Mengyi Ying","doi":"10.14738/TNC.66.5653","DOIUrl":"https://doi.org/10.14738/TNC.66.5653","url":null,"abstract":"As part of the next generation Internet, Wireless Mesh Networks have emerged as a key technology  to deliver Internet broadband access, wireless local area network coverage and network connectivity at low costs. The capacity of a wireless mesh network is improved by equipping mesh nodes with multi-radios tuned to non-overlapping channels. Hence the data forwarding between two nodes has multiple selections of links and the bandwidth between the pair of nodes varies dynamically. The new technology makes mesh nodes cognitive, thus a mesh node is able to adopt machine learning mechanisms to choose the possible best next hop which has maximum bandwidth when it intends to forward data. In this paper, we present a new forwarding algorithm by which a forwarding node dynamically select its next hop with highest potential bandwidth capacity to resume communication based on learning algorithm.  The efficiency of this approach is that a node only maintains three past status, and then it is able to learn and predict the potential bandwidth capacities of its links. Then, the node selects the next hop with potential maximal link bandwidth. Additionally, a geometrical based algorithm is developed to let the forwarding node figure out the best forwarding region in order to avoid flooding. Simulations demonstrate that our approach significantly outperforms peer algorithms.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research and Implementation of Bluetooth Indoor Auto-tracking System 蓝牙室内自动跟踪系统的研究与实现
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5808
Yen-Jen Chen, Kai Zheng
{"title":"Research and Implementation of Bluetooth Indoor Auto-tracking System","authors":"Yen-Jen Chen, Kai Zheng","doi":"10.14738/TNC.66.5808","DOIUrl":"https://doi.org/10.14738/TNC.66.5808","url":null,"abstract":"In recent years, outdoor positioning technology has been widely used and indoor positioning technology has gradually matured.  Relevant applications such as: Indoor Location Based Service, Ambient Assistant Living, Indoor Navigation, Location Based Advertising, and the like have begun to show up in daily life and bring people with diversity and rich service content. The proposed study focuses on the research of real-time indoor dynamic positioning and dynamic tracking related mechanisms and algorithms, and uses the “microcontroller module” and “Bluetooth communication module” to actually detect the operational mechanism of the Bluetooth dynamic positioning system. This prototype system uses the smart phone as the locator of the traced person, named tracee (a new word created in this paper). The three-wheeled carrier acts as the tracer's body. On the locator, the processor is used to dynamically calculate the dynamic positioning of the tracee, and the calculated positioning result is transmitted to the tracer through the Bluetooth. The tracer calculates the distance and orientation, and then controls the axle motor so that the three-wheeled carrier closely follows the smart phone. Although many self-propelled vehicles have been sold on the market at present, and most of the follow-up signal uses infrared rays, ultrasonic waves, or Wi-Fi to complete the tracking action. However, the first two signals often require the tracee to carry an additional signal transmission device so as to assist in tracking. Due to the current popularity of mobile phones, although Wi-Fi and Bluetooth chips are already installed on the phone, yet the power consumption of Wi-Fi is still much higher than that of the Bluetooth. Therefore, in this study, Bluetooth was used to complete the indoor positioning system.  Bluetooth belongs to 2.4GHz wireless technology; when using the Bluetooth signal for tracking, the signal strength is likely to cause many noises due to shielding, signal diffraction, or reflection, resulting in a deviation between the calculated transmission distance and the actual distance. The purpose of this study is to design a prototype of an Indoor Automatic Tracking System (hereafter named IATS) and explorer how to reduce the Bluetooth signal strength deviation so as to improve the accuracy of positioning is the main object of this study.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116809288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quality Analysis of Streaming Audio over Mobile Networks 移动网络上流音频的质量分析
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5526
A. Mishra, S. Bagui, John Compo, Debarghya Nandi, S. Bagui
{"title":"Quality Analysis of Streaming Audio over Mobile Networks","authors":"A. Mishra, S. Bagui, John Compo, Debarghya Nandi, S. Bagui","doi":"10.14738/TNC.66.5526","DOIUrl":"https://doi.org/10.14738/TNC.66.5526","url":null,"abstract":"This paper utilizes open source software to analyze the quality of audio streamed over mobile cellular networks. Industry conventions have been developed to assess audio quality such as the Mean Opinion Score or MOS scale described in the International Telecommunications Union ITU P.800.1 document.  The MOS scale is a subjective assessment based on the listener’s experience. To eliminate the use of a trained audio listener we automate an estimated MOS calculation by measuring the packet loss, average latency and jitter over the network transport path. The network under test is a pilot network to replace the dedicated analog circuit from the broadcast center to a radio transmitter. We intend to automate the logging of an objective quality assessment using MOS, cellular router and decoder measurements with confirmation using automatically generated visual representations of sample audio received. These visual representations will aid in manual confirmation of poor MOS scores with audio samples available for more in-depth review.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation on Collective Panic Behavior Based on PI 基于PI的集体恐慌行为模拟
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5740
W. Zheng, Daqiau Zhu
{"title":"Simulation on Collective Panic Behavior Based on PI","authors":"W. Zheng, Daqiau Zhu","doi":"10.14738/TNC.66.5740","DOIUrl":"https://doi.org/10.14738/TNC.66.5740","url":null,"abstract":"The collective panic behavior, which is caused by PI (Propagation Intensity), influences the welfare of citizens and the stability of the society (business). A well-known challenge is to understand the spreading mechanism of the panic behavior. In this work, the PI is classified as  and , defined in the coefficient  (Promotion Intensity) and  (Inhibition Intensity) in the probability. MAS (multi-agent-simulation) model/tool is used to construct the systematic structure composed of four types of the participants (the individuals, the mass media, the social leaders, and the supervisors).This tool stimulates the collective panic behavior from the initial coefficient and , showing the different results in the condition of the population size and the conformity. Through setting up the rules and the strategies in an emergency, the framework stimulates the interaction between the agents (e.g. between the individuals, between the individuals and the mass media, between the individuals and the social leaders, between the individuals and the supervisors). The results advocate that the current simulator might be an appropriate first step towards the simulation and analysis of the combination of rules and strategies in panic behavior.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Terrain Effects using Beamforming Antennas in Ad Hoc Networks Ad Hoc网络中波束形成天线对地形影响的缓解
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5481
V. Ramakrishnaiah, R. Kubichek, S. Muknahallipatna
{"title":"Mitigation of Terrain Effects using Beamforming Antennas in Ad Hoc Networks","authors":"V. Ramakrishnaiah, R. Kubichek, S. Muknahallipatna","doi":"10.14738/TNC.66.5481","DOIUrl":"https://doi.org/10.14738/TNC.66.5481","url":null,"abstract":"Wireless communication is sensitive to ambient noise as well as interference due to the use of a shared medium. The link quality is significantly affected by the surrounding terrain including buildings, hills, foliage, etc. Terrain changes also pose a problem for communication and localization in mobile ad-hoc networks and in the deployment of Internet of Things (IoT). Many of these problems can be addressed through careful antenna design, but these can be challenging as they require complex hardware and software. We propose a new approach called virtual terrain leveling (VTL), which acts as a trade-off between the complex antenna design approaches and the simple omni-directional antennas. VTL virtually nullifies the effects of the terrain using phased array antennas to compensate for the path losses. Convex optimization and the Nelder-Mead simplex method are used to compute the antenna array weights that minimize the error between the ideal and achieved beam patterns. Simulations are performed in the presence of different terrains and the received power at varying distances from the transmitter is analyzed. The results show improved received power up to a specified distance from the transmitter and then power decays rapidly with increasing distance, indicating interference reduction.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128044164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN/NFV Based Internet of Things for Multi-Tenant Networks 基于SDN/NFV的多租户网络物联网
Transactions on Networks and Communications Pub Date : 2018-12-31 DOI: 10.14738/TNC.66.5695
Sinh Do, Luong-Vy Le, B. Lin, Li-Ping Tung
{"title":"SDN/NFV Based Internet of Things for Multi-Tenant Networks","authors":"Sinh Do, Luong-Vy Le, B. Lin, Li-Ping Tung","doi":"10.14738/TNC.66.5695","DOIUrl":"https://doi.org/10.14738/TNC.66.5695","url":null,"abstract":"The Internet of Things (IoT) refers to variety of smart devices such as smartphones, tablets, and sensors that can interact and exchange of data among devices through the Internet. The diversity of IoT devices and their services have posed a larger range requirements of availability, throughput, latency, and performance in heterogeneous connectivity environments. Meanwhile, the existing networks often struggle with such of limitations in complex control protocols and difficulty in internetworking with billions of smart devices with different requirements such as latency and bandwidth allocations. These obstacles become substantial barriers to deploy services, as well as isolate between multiple co-existing tenants on the same physical network, deploy simultaneous protocols in the network, be stable to maintain the bandwidth and latency according to predefined QoS demands. These obstacles have recently been facilitated by Software Defined Network (SDN) and Network Function Virtualization (NFV) technologies that enable the programming and monitoring in data plane. In this study, firstly, the authors investigate and propose a SDN/NFV based architecture for multi-tenant networks with plenty of network slices working in a shared physical infrastructure. Secondly, P4 and ONOS Controller are used to implement a deep programming in BMv2 devices to efficiently maintain the network motoring in order to guarantee the E2E latency of communicating channels. Finally, the VXLAN technologies are exploited to for network slicing with different purposes and applications, and Inband Network Telemetry (INT) is used to monitor network latency.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Improvement Of OOFDM Systems Based On Advanced Logarithmic Companding Technique 基于先进对数压缩技术的OOFDM系统性能改进
Transactions on Networks and Communications Pub Date : 2018-10-31 DOI: 10.14738/TNC.65.5065
A. N. Kareem, Sinan M. Abdul Satar, M. A. Husein, Liqaa A. Al-Hashime, G. Al-Suhail
{"title":"Performance Improvement Of OOFDM Systems Based On Advanced Logarithmic Companding Technique","authors":"A. N. Kareem, Sinan M. Abdul Satar, M. A. Husein, Liqaa A. Al-Hashime, G. Al-Suhail","doi":"10.14738/TNC.65.5065","DOIUrl":"https://doi.org/10.14738/TNC.65.5065","url":null,"abstract":"High peak-to-average power ratio (PAPR) is a common problem in Orthogonal Frequency Division Multiplexing (OFDM) transmissions. In this paper, an advanced logarithmic companding technique is interested to reduce this factor due to their flexibility and low complexity. We evaluate the performance of the proposed advanced logarithmic technique comparing with typical logarithmic and un-companded schemes via simulations in Intensity Modulation/Direct Detection Optical Orthogonal Frequency Division Multiplexing (IM/DD OOFDM) system. The proposed advanced logarithmic Companding technique guarantees the improved performance in terms of Bit Error Rate (BER) and Quality Factor (QF) while reducing PAPR effectively and efficiently by modifying the amplitude of the transmitted signals. Our results confirm that the suggested scheme exhibits a good ability to reduce PAPR and a good BER performance based on the use the both of (k and y) factors to be chosen in relation to acceptable or desired PAPR, BER, and QF requirements. At the complementary cumulative distribution function (CCDF) of 10 -3 , the PAPR value of our proposed scheme is about 6.4 dB lower than those of un-companded signal at best control factor used of y=0.1, accordingly the QF is 11.8 dBm and the BER is 4.9×10 -5 .","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129288067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk-Based Information System Security 一个分层的网络安全警戒模型:基于风险的信息系统安全的增强
Transactions on Networks and Communications Pub Date : 2018-10-31 DOI: 10.14738/TNC.65.5166
Paul Abuonji, A. Rodrigues, George. Raburu
{"title":"A Stratified Cyber Security Vigilance Model: An Augmentation of Risk-Based Information System Security","authors":"Paul Abuonji, A. Rodrigues, George. Raburu","doi":"10.14738/TNC.65.5166","DOIUrl":"https://doi.org/10.14738/TNC.65.5166","url":null,"abstract":"Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both naive and sophisticated- all grapple with one big problem: how to decide on what level of security is enough for their information system since the amount of security controls applied must be commensurate with the IS assets being protected. In that regard, many organizations adopt risk-based security, in the hope that it would answer the elusive IS security question, but to no avail. Unfortunately, many such organizations still experience numerous breaches to their Information systems and some even realize they have fallen victims to cyber criminals, long after the actual compromise. It is for this reason that this paper presents a novel security model called Stratified Cyber Security Vigilance (SCSV) model that augments the standard risk-based security approach and demonstrates its ability to improve IS security.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信