IET Networks最新文献

筛选
英文 中文
Leveraging InGaN solar cells for visible light communication reception 利用 InGaN 太阳能电池接收可见光通信
IF 1.4
IET Networks Pub Date : 2024-02-06 DOI: 10.1049/ntw2.12115
H. Manzoor, S. Manzoor, M. Jamshed, T. Manzoor
{"title":"Leveraging InGaN solar cells for visible light communication reception","authors":"H. Manzoor, S. Manzoor, M. Jamshed, T. Manzoor","doi":"10.1049/ntw2.12115","DOIUrl":"https://doi.org/10.1049/ntw2.12115","url":null,"abstract":"Solar cells are increasingly being utilised for both energy harvesting and reception in free‐space optical (FSO) communication networks. The authors focus on the implementation of a mid‐band p‐In0.01Ga0.99 N/p‐In0.5Ga0.5 N/n‐In0.5Ga0.5 N (PPN) solar cell, boasting an impressive 26.36% conversion efficiency (under 1.5AM conditions) as a receiver within an indoor FSO communication network. Employing a solar cell with dimensions of 1 mm in length and width, the FSO system underwent simulation using Optisystm software, while the solar cell's behaviour was simulated using SCAPS‐1D. The received power from the solar cell was then compared to that of four commercially available avalanche photodiode (APD) receivers. Exploring incident wavelengths spanning 400–700 nm within the visible spectrum, across transmission distances of 5, 10, 15, and 20 m, the study presented current‐voltage (IV) and power‐voltage curves. Notably, the InGaN solar cell exhibited superior electrical power output compared to all commercial APDs. In conclusion, the findings underscore that augmenting received power has the potential to enhance FSO network quality and support extended transmission distances.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139799876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging InGaN solar cells for visible light communication reception 利用 InGaN 太阳能电池接收可见光通信
IF 1.3
IET Networks Pub Date : 2024-02-06 DOI: 10.1049/ntw2.12115
Habib Ullah Manzoor, Sanaullah Manzoor, Muhammad Ali Jamshed, Tareq Manzoor
{"title":"Leveraging InGaN solar cells for visible light communication reception","authors":"Habib Ullah Manzoor,&nbsp;Sanaullah Manzoor,&nbsp;Muhammad Ali Jamshed,&nbsp;Tareq Manzoor","doi":"10.1049/ntw2.12115","DOIUrl":"10.1049/ntw2.12115","url":null,"abstract":"<p>Solar cells are increasingly being utilised for both energy harvesting and reception in free-space optical (FSO) communication networks. The authors focus on the implementation of a mid-band p-In<sub>0.01</sub>Ga<sub>0.99</sub> N/p-In<sub>0.5</sub>Ga<sub>0.5</sub> N/n-In<sub>0.5</sub>Ga<sub>0.5</sub> N (PPN) solar cell, boasting an impressive 26.36% conversion efficiency (under 1.5AM conditions) as a receiver within an indoor FSO communication network. Employing a solar cell with dimensions of 1 mm in length and width, the FSO system underwent simulation using Optisystm software, while the solar cell's behaviour was simulated using SCAPS-1D. The received power from the solar cell was then compared to that of four commercially available avalanche photodiode (APD) receivers. Exploring incident wavelengths spanning 400–700 nm within the visible spectrum, across transmission distances of 5, 10, 15, and 20 m, the study presented current-voltage (IV) and power-voltage curves. Notably, the InGaN solar cell exhibited superior electrical power output compared to all commercial APDs. In conclusion, the findings underscore that augmenting received power has the potential to enhance FSO network quality and support extended transmission distances.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12115","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139859431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies 开放式最短路径优先扩展,支持任意拓扑结构的多区域网络
IF 1.4
IET Networks Pub Date : 2024-01-23 DOI: 10.1049/ntw2.12112
Xavier Gomes, João Fonseca, Rui Valadas
{"title":"Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies","authors":"Xavier Gomes,&nbsp;João Fonseca,&nbsp;Rui Valadas","doi":"10.1049/ntw2.12112","DOIUrl":"10.1049/ntw2.12112","url":null,"abstract":"<p>Open Shortest Path First (OSPF) currently supports multiarea networking with two severe limitations: the multiarea topology is restricted to a two-level hierarchy, and globally optimal routing may not be achieved. An OSPF extension that overcomes these limitations is proposed by introducing a routing overlay for the dissemination of multiarea routing information. It applies to both OSPFv2 (IPv4) and OSPFv3 (IPv6) and is transparent to area-internal routers. The extension was fully implemented and tested, and the results show that the added functionality is completely achieved, at the cost of a small penalty in terms of convergence times for small networks.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139603818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware nanosecond-precision timestamping for line-rate packet capture 用于线速数据包捕获的纳秒级精度硬件时间戳
IF 1.4
IET Networks Pub Date : 2024-01-19 DOI: 10.1049/ntw2.12114
Xiaoying Huang
{"title":"Hardware nanosecond-precision timestamping for line-rate packet capture","authors":"Xiaoying Huang","doi":"10.1049/ntw2.12114","DOIUrl":"10.1049/ntw2.12114","url":null,"abstract":"<p>Cybersecurity events occur frequently. When it comes to investigating security threats, it is essential to offer a 100 percent accurate and packet-level network history, which depends on packet capture with high precision packet timestamping. Many packet capture applications are developed based on data plane development kit (DPDK)—a set of libraries and drivers for fast packet processing. However, DPDK cannot give an accurate timestamp for every packet, and it is unable to truly reflect the order in which packets arrive at the network interface card. In addition, DPDK-based applications cannot achieve zero packet loss when the packet is small such as 64 B for beyond 10 Gigabit Ethernet. Therefore, the authors proposed a new method based on Field-Programmable Gate Array (FPGA) to solve this problem. The authors also develop a DPDK driver for FPGA devices to make the design compatible with all DPDK-based applications. The proposed method performs timestamping at line-rate for 10 Gigabit Ethernet traffic at 4 ns precision and 1 ns precision for 25 Gigabit, which greatly improves the accuracy of security incident retrospective analysis. Furthermore, the design can capture full-size packets for any protocol with zero packet loss and can be applied to 40/100 Gigabit systems as well.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139525261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoWi-Fi security threats: Address resolution protocol attack and countermeasures VoWi-Fi 安全威胁:地址解析协议攻击与对策
IF 1.4
IET Networks Pub Date : 2024-01-17 DOI: 10.1049/ntw2.12113
Kuan-Chu Lu, I.-Hsien Liu, Keng-Hao Chang, Jung-Shian Li
{"title":"VoWi-Fi security threats: Address resolution protocol attack and countermeasures","authors":"Kuan-Chu Lu,&nbsp;I.-Hsien Liu,&nbsp;Keng-Hao Chang,&nbsp;Jung-Shian Li","doi":"10.1049/ntw2.12113","DOIUrl":"10.1049/ntw2.12113","url":null,"abstract":"<p>B5G/6G networks are facing challenges in the deployment of additional base stations. However, Taiwan's four major operators have launched VoWi-Fi calling services to maintain signal quality and coverage for customers. These services pose potential threats when users connect to untrusted Wi-Fi networks. Therefore, the authors utilised commercial equipment to study the security of VoWi-Fi calling services offered by Taiwan's four major telecom companies. The authors employed address resolution protocol attack methods to develop two verification attacks that bypass existing security measures: one for dropping session initiation protocol packets and the other for dropping voice call packets, both capable of circumventing current security defences. Through real-world experiments, the authors confirmed their feasibility and assessed their potential harm. Consequently, two defence methods are proposed. The first is an anti-attack algorithm for app and device manufacturers to detect the security of the user's calling environment. The second is a recommendation for telecom operators to implement new detection mechanisms to safeguard user rights.</p><p>The cover image is based on the Case Study <i>VoWi-Fi security threats: Address resolution protocol attack and countermeasures</i> by Kuan-Chu Lu et al., https://doi.org/10.1049/ntw2.12113</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139617777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced trust management for building trustworthy social internet of things network 加强信任管理,构建可信的社交物联网网络
IF 1.4
IET Networks Pub Date : 2024-01-04 DOI: 10.1049/ntw2.12111
Swati Sucharita Roy, B. Sahu, Shatarupa Dash
{"title":"Enhanced trust management for building trustworthy social internet of things network","authors":"Swati Sucharita Roy, B. Sahu, Shatarupa Dash","doi":"10.1049/ntw2.12111","DOIUrl":"https://doi.org/10.1049/ntw2.12111","url":null,"abstract":"Internet of Things (IoT) and wireless communication technologies are evolving rapidly and changing the way we live and work. IoT devices may need to share personal information over the public network taking the help of nearby devices. Thus, the trustworthiness of nearby devices shall play an essential role in providing security and privacy assurance. The authors proposed an autonomous decentralised trust management model for selecting a trustworthy device for a requested service transaction. The proposed scheme uses the Social Internet of Things for trust management. The proposed model uses social relationships to find the level of trust among related devices, estimate the overall trust of the unknown devices, periodically update the observed trust values, and isolate the malicious nodes in the network. The evaluated trust values are updated in the network frequently so that other devices can utilise the information later. The periodic update can increase performance and detect trust‐related malicious attacks. The simulation result shows that the performance of the proposed model is better as compared to existing trust management models. The proposed model can detect malicious objects at an early stage and can handle malicious attacks by isolating malicious devices.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139385521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flexible open network operating system architecture for implementing higher scalability using disaggregated software-defined optical networking 灵活的开放式网络操作系统架构,利用分解式软件定义光网络实现更高的可扩展性
IF 1.4
IET Networks Pub Date : 2023-12-06 DOI: 10.1049/ntw2.12110
Kenneth Nsafoa-Yeboah, Eric Tutu Tchao, Benjamin Kommey, Andrew Selasi Agbemenu, Griffith Selorm Klogo, Nana Kwadwo Akrasi-Mensah
{"title":"Flexible open network operating system architecture for implementing higher scalability using disaggregated software-defined optical networking","authors":"Kenneth Nsafoa-Yeboah,&nbsp;Eric Tutu Tchao,&nbsp;Benjamin Kommey,&nbsp;Andrew Selasi Agbemenu,&nbsp;Griffith Selorm Klogo,&nbsp;Nana Kwadwo Akrasi-Mensah","doi":"10.1049/ntw2.12110","DOIUrl":"10.1049/ntw2.12110","url":null,"abstract":"<p>The enhanced capacity of optical networks is a significant advantage within the global telecommunications industry. Optical networks provides transmission of information over large distances with reduced latency. However, the growing intricacy of network topologies poses a significant challenge to network adaptability, network resilience, device compatibility, and service quality in the contemporary era of technology and 5G networks. In light of these challenges, recent studies leverages on disaggregation in the context of Software Defined Network (SDN) and network service orchestrators as a viable remedy. Disaggregated optical systems offer SDON (Software-Defined Optical Networking) enhanced control options and third-party dynamism streamlining upgrades and diminishing single vendor dependency. Although, the advancement of disaggregation improves network flexibility and vendor neutrality of Software Defined Optical Networking (SDON), this improvement comes at the cost of reduced scalability and network controllability performance. The current research paper posits two potential resolutions to the aforementioned challenge. The authors present recommendations and an enhanced architecture that leverages Open Network Operating System (ONOS) containers and Kubernetes orchestration to improve scalability inside the Software-Defined Optical Networking (SDON) architecture. The suggested architectural design has underlining novel flow charts and algorithms that enhances scalability performance by 33% while also preserving flexibility and controllability in comparison to pre-existing SDON architectures. This architecture also makes use of the Mininet-Optical physical-layer architecture to simulate a real-time scenario, as well as yang models from the Open Disaggregated Transport Network (ODTN) working group, the pioneers of SDONs. A detailed analysis of the rules and procedural processes involved in the implementation of the proposed architecture. In order to demonstrate the practical application of this architectural framework to a real-world Software-Defined Optical Network (SDON) system, the pre-existing SDON ONOS architecture within the Optical Transport Domain Networking (OTDN) working group was adjusted and refined. This adaptation aimed to illustrate the use of ONOS in conjunction with established optical network systems, highlighting the advantages it offers.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138595482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology 利用大数据和虚拟人工智能技术进行网络多媒体智能设计
IF 1.4
IET Networks Pub Date : 2023-12-04 DOI: 10.1049/ntw2.12109
Xin Zhang
{"title":"Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology","authors":"Xin Zhang","doi":"10.1049/ntw2.12109","DOIUrl":"https://doi.org/10.1049/ntw2.12109","url":null,"abstract":"In recent years, with the rapid development of the Internet of Things and communication technology, the application of network multimedia has become increasingly popular. At present, network multimedia has become a new type of mass media. Due to its interchangeability and extensive dissemination, it creates favourable conditions for information dissemination and acceptance in terms of vision, hearing, touch etc. However, at the same time, there are also some problems. The network multimedia does not have enough original information and the information retrieval is not intelligent, so this has caused great trouble to users. In order to solve these problems, the authors attempted to use the combination of Big Data (BD) and virtual Artificial Intelligence (AI) technology to realise the intelligent design of network multimedia. Therefore, based on the theoretical analysis, the authors also verified the effect of BD and virtual AI technology on the intelligent design of network multimedia. It was found that the intelligent design method proposed by the authors had good application effect in network multimedia, and could effectively improve the information retrieval speed of network multimedia. The query time of this method was 1.87 s less than that of the traditional method when the amount of information was 1000 and 18.16 s less than that of the traditional method when the amount of information was 40,000. At the same time, this method could also improve the accuracy of network multimedia information recommendation, and make network multimedia have better sharing, so as to provide more services for users. In addition, the discussion of BD and virtual AI technology in network multimedia intelligent design could also broaden the application scope of the Internet of Things and promote its better development.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138603894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual network embedding method based on node delay perception 基于节点延迟感知的虚拟网络嵌入方法
IF 1.4
IET Networks Pub Date : 2023-11-29 DOI: 10.1049/ntw2.12105
Yaning Wang, Hui Zhi
{"title":"Virtual network embedding method based on node delay perception","authors":"Yaning Wang,&nbsp;Hui Zhi","doi":"10.1049/ntw2.12105","DOIUrl":"10.1049/ntw2.12105","url":null,"abstract":"<p>Wireless virtual network uses software defined network and network function virtualisation technologies to create multiple logically isolated virtual networks on a physical wireless network. Wireless virtual network can improve the utilisation of wireless resources to meet the requirements of different services. Delay is an important performance indicator, which has strict requirements for delay-sensitive services such as video conferencing and online games. In this study, a virtual network embedding method based on node delay perception (VNE-NDP) is proposed, which considers both the node and link resources as well as the embedding delay requirements of virtual networks. The virtual network embedding method based on node delay perception consists of two phases: virtual node embedding and virtual link embedding. In the virtual node embedding phase, a physical node sorting method based on node delay perception (PNS-NDP) is proposed. In PNS-NDP, the node deployment delay is introduced into the node sorting algorithm for the first time. The authors select candidate physical nodes for each virtual node according to their resource availability and delay performance, which can greatly reduce the VN embedding delay without sacrificing too much other performance. In the virtual link embedding phase, a shortest path algorithm with bandwidth and link deployment delay constraints to find feasible physical paths for each virtual link is used. In addition, the VN embedding (VNE) deployment time is set as a new evaluation index. Simulation results show that compared with other VNE methods, VNE-NDP can achieve higher success rate, revenue-to-expenditure ratio, and lower deployment delay.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139210995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low complexity resource allocation scheme for IRS-assisted downlink non-orthogonal multiple access systems IRS 辅助下行链路非正交多址系统的低复杂度资源分配方案
IF 1.4
IET Networks Pub Date : 2023-11-23 DOI: 10.1049/ntw2.12106
Ren Ming, Zhang Rong
{"title":"Low complexity resource allocation scheme for IRS-assisted downlink non-orthogonal multiple access systems","authors":"Ren Ming,&nbsp;Zhang Rong","doi":"10.1049/ntw2.12106","DOIUrl":"10.1049/ntw2.12106","url":null,"abstract":"<p>A low complexity resource allocation method is proposed for downlink non-orthogonal multiple access system assisted by intelligent reflecting surface (IRS). Firstly, an optimisation problem is formulated to minimise power consumption, with power allocation and IRS phase shifts as variables. Then, the joint optimisation problem of power allocation and IRS phase shifts is transformed into the optimisation of IRS phase shifts, which is further decomposed into multiple single variable sub-problems, the solutions to which can be obtained by using the function extremum method. Next, based on these sub-problems, one-level iterative algorithm is developed to optimise IRS phase shifts. Finally, the minimum power required by each user is calculated based on the IRS phase shifts obtained through iteration. Simulation results show that the proposed scheme is better than the existing schemes in the same scenario under the same rate requirement in terms of computational complexity and power consumption.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139242898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信