IEEE Transactions on Systems Man Cybernetics-Systems最新文献

筛选
英文 中文
Link-Based Attributed Graph Clustering via Approximate Generative Bayesian Learning 基于近似生成贝叶斯学习的链接属性图聚类
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-05 DOI: 10.1109/TSMC.2025.3572738
Yue Yang;Lun Hu;Guodong Li;Dongxu Li;Pengwei Hu;Xin Luo
{"title":"Link-Based Attributed Graph Clustering via Approximate Generative Bayesian Learning","authors":"Yue Yang;Lun Hu;Guodong Li;Dongxu Li;Pengwei Hu;Xin Luo","doi":"10.1109/TSMC.2025.3572738","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3572738","url":null,"abstract":"To understand the mechanisms of complex systems, attributed graphs (AGs) are recognized as a valuable model by their capability of describing nontrivial topological structures and rich node contents, and their emergence raises new challenges on the task of graph clustering. Although a variety of computational algorithms have been proposed to perform accurate clustering analysis on AGs, most of them are incapable of inferring the cluster labels of nodes through links, thus falling short of explaining node behaviors on how to formulate overlapping clusters. Moreover, the vast amount of links considerably decreases the computation efficiency if they are explicitly taken into account for AG clustering. To overcome this problem, we present a novel variational Bayesian learning model, which avoids generating a complete AG by only simulating the generative process of its skeleton with the prior knowledge on the cluster labels of links. When addressing the inference problem, we develop an efficient algorithm, namely, LCAAG, for determining the optimal cluster labels of nodes by estimating local community structures of links. The convergence of LCAAG has been proved theoretically. Compared with several state-of-the-art algorithms, LCAAG has demonstrated its promising performance in terms of both accuracy and scalability on five different scaled benchmark datasets. The source code and datasets are available at <uri>https://github.com/shallowdreamoon/LCAAG.git</uri>.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5730-5743"},"PeriodicalIF":8.6,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144663704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Predictive Control for Multiagent Systems With Communication Delays via a Hybrid Data-Driven and Model-Based Approach 基于数据驱动和模型混合方法的通信延迟多智能体系统分布式预测控制
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-05 DOI: 10.1109/TSMC.2025.3571743
Yi Huang;Guo-Ping Liu;Yi Yu;Wenshan Hu
{"title":"Distributed Predictive Control for Multiagent Systems With Communication Delays via a Hybrid Data-Driven and Model-Based Approach","authors":"Yi Huang;Guo-Ping Liu;Yi Yu;Wenshan Hu","doi":"10.1109/TSMC.2025.3571743","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3571743","url":null,"abstract":"This article focuses on the consensus and tracking problem of multiagent systems under communication delays, and proposes an observer-based distributed predictive control scheme to actively compensate for communication delays. First, an auxiliary variable and its corresponding estimator are innovatively designed to provide an observation of a globally consensus value that converges faster than the actual system output. Then, a cost function is formulated for this observer, and the gain of the correction term is optimized in a data-driven way to enhance the accuracy of the estimation. Based on the auxiliary variables, a distributed predictive controller is presented. Unlike existing control schemes, the proposed controller compensates for the delayed data in an active way, and the rolling prediction process is carried out in a distributed manner, facilitated by the designed auxiliary variables. Case studies conducted in both numerical and industrial scenarios demonstrate the effectiveness of the proposed method.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5682-5695"},"PeriodicalIF":8.6,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Object Detection Considering Dynamic Neighborhood Feature Multiplexing 考虑动态邻域特征复用的视频目标检测
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-05 DOI: 10.1109/TSMC.2025.3572123
Jiahui Yu;Yifan Chen;Xuna Wang;Long Chen;Hang Chen;Dalin Zhou;Yingke Xu;Zhaojie Ju
{"title":"Video Object Detection Considering Dynamic Neighborhood Feature Multiplexing","authors":"Jiahui Yu;Yifan Chen;Xuna Wang;Long Chen;Hang Chen;Dalin Zhou;Yingke Xu;Zhaojie Ju","doi":"10.1109/TSMC.2025.3572123","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3572123","url":null,"abstract":"Video object detection is essential for human-interaction applications, including bimanual manipulation sensing (BMS). The effects of video detection in practical applications still need to be improved, as they are restricted by long-range spatiotemporal dependency analysis. How do humans sense bimanual manipulation in videos, especially for deteriorated clips? We argue that humans analyze the current clips based on earlier memory, namely, long-term spatial and temporal dependencies (LTSTD). However, most existing methods have yet to report significant results, as the limited exploration of these dependencies limits them. Developing an easy-to-integrate module is generally preferred for future applications rather than designing a complex end-to-end framework. Therefore, we propose a dynamic neighborhood feature multiplexing mechanism for online video object detection in this article, which is better at learning LTSTD in flexible and robust ways, boosting existing detection results, called DNFM. Specifically, we develop dynamic memory enhancement neural networks for better long-term feature aggregation with negligible additional computation costs. We multiplex each frame feature to aggregate key enhanced representations under the guidance of dynamic memory recall. The DNFM contributes to various famous detectors in BMS and other challenging detection tasks, and particular attention has been devoted to “low-quality” frame detection. Experimental results show that, while achieving state-of-the-art detection performance, DNFM clearly illustrates the easy-to-integrate operation for boosting the video object detection results.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5451-5463"},"PeriodicalIF":8.6,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workload Balancing for Photolithography Machines in Semiconductor Manufacturing via Estimation of Distribution Algorithm Integrating Kmeans Clustering 基于Kmeans聚类估计分布算法的半导体制造光刻机工作负载均衡
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-04 DOI: 10.1109/TSMC.2025.3572370
LiangChao Chen;Yan Qiao;NaiQi Wu;Mohammadhossein Ghahramani;YongHua Shao;SiJun Zhan
{"title":"Workload Balancing for Photolithography Machines in Semiconductor Manufacturing via Estimation of Distribution Algorithm Integrating Kmeans Clustering","authors":"LiangChao Chen;Yan Qiao;NaiQi Wu;Mohammadhossein Ghahramani;YongHua Shao;SiJun Zhan","doi":"10.1109/TSMC.2025.3572370","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3572370","url":null,"abstract":"This work focuses on the scheduling of a photolithography area with multiple machine groups and each one consists of a predetermined number of photolithography machines (PMs). PMs belonging to the same machine group should have identical processing capacities. Additionally, all PMs are designated with downward processing compatibility. This means that the wafers requiring relatively low pattern precision can be processed by the PMs used to deal with high pattern precision. After executing a photolithography process, a circuit pattern is transferred from an auxiliary resource called a reticle onto the wafer surface. Moreover, when processing wafers with different reticle and processing environment requirements, the machine setup is necessary. With those complex processing requirements, the objective is to minimize the difference between the longest and shortest working time of PMs so as to balance the workloads among all PMs. To do so, a mixed-integer linear programming model is built and then solved by using CPLEX for the small-sized problem. For medium- and large-sized problems, a designed estimation of distribution algorithm integrating a Kmeans clustering is constructed to improve the productivity of the photolithography area. Comparison results show that the proposed method outperforms the compared algorithms regardless of problem sizes.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5565-5580"},"PeriodicalIF":8.6,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deadlock Resolution in Networked Automated Manufacturing Systems With Communication Delays and Losses Using Petri Nets 基于Petri网的具有通信延迟和损耗的网络化自动化制造系统死锁解决
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-04 DOI: 10.1109/TSMC.2025.3571500
Zijian Zhang;Hesuan Hu
{"title":"Deadlock Resolution in Networked Automated Manufacturing Systems With Communication Delays and Losses Using Petri Nets","authors":"Zijian Zhang;Hesuan Hu","doi":"10.1109/TSMC.2025.3571500","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3571500","url":null,"abstract":"This study tackles the issue of deadlock resolution in networked automated manufacturing systems (AMSs) with communication delays and losses in the framework of Petri nets (PNs). First, we refer to the transitions in which communication losses may occur as loss transitions and mathematically model the communication delays and losses. Second, we derive a necessary and sufficient condition for determining whether deadlock can be resolved in networked PNs, referred to as the networked deadlock resolution controllability theorem (NDRCT), within the framework of the observed reachability graph (ORG). Through the ORG, the networked supervisor can intuitively obtain the estimated marking set for a specific observation in the presence of communication delays and losses. Based on NDRCT, one can determine whether deadlock can be resolved and how to design the controller to avoid deadlock in networked PNs with communication delays and losses.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5655-5669"},"PeriodicalIF":8.6,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
False Data Injection Attack Detection Under Uncertain Parameters in Cyber-Physical Systems 网络物理系统参数不确定条件下的虚假数据注入攻击检测
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-04 DOI: 10.1109/TSMC.2025.3572634
Yu Shi;Lingli Cheng;Xisheng Zhan;Huaicheng Yan
{"title":"False Data Injection Attack Detection Under Uncertain Parameters in Cyber-Physical Systems","authors":"Yu Shi;Lingli Cheng;Xisheng Zhan;Huaicheng Yan","doi":"10.1109/TSMC.2025.3572634","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3572634","url":null,"abstract":"The problem of detecting false data injection (FDI) attacks in a class of cyber-physical systems with discrete-time information under uncertain parameters is investigated in this article. In practical scenarios, it is noteworthy that accurately modeling the system matrix is often challenging, and traditional detection methods frequently result in false positives and missed detections. Therefore, this article introduces a novel approach for accurately detecting FDI attacks in the presence of parameter uncertainties. Assuming that system parameters reside within a convex polytope, three distinct FDI attack detection estimators with varying performance levels are proposed. Subsequently, a convex optimization problem is established to obtain the necessary gains for the detectors. The results demonstrate that the proposed detection method achieves higher accuracy under uncertain parameters. Furthermore, the method allows for flexible selection based on application-specific requirements, whether prioritizing accuracy or efficiency. Finally, the effectiveness and applicability of the proposed techniques are demonstrated through simulation examples using the F-404 aerospace engine system model.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5696-5704"},"PeriodicalIF":8.6,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Fuzzy Secure Collision-Free Formation Control for Nonlinear MASs With DoS Attacks 具有DoS攻击的非线性质量的自适应模糊安全无碰撞编队控制
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-04 DOI: 10.1109/TSMC.2025.3572377
Jun Zhang;Jun Ning;Shaocheng Tong
{"title":"Adaptive Fuzzy Secure Collision-Free Formation Control for Nonlinear MASs With DoS Attacks","authors":"Jun Zhang;Jun Ning;Shaocheng Tong","doi":"10.1109/TSMC.2025.3572377","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3572377","url":null,"abstract":"In this article, the collision-free adaptive fuzzy secure formation control problem is investigated for uncertain nonlinear multiagent systems (MASs) under denial-of-service (DoS) attacks. Since the DoS attacks block the signal transmission between agents, the leader’s states and output are inaccessible to the followers, a distributed command governor is designed to estimate them. To avoid the collisions among the agents or between the agents and the dynamics obstacles, the integral-type barrier Lyapunov function (BLF) is employed to develop a secure collision-free adaptive fuzzy formation controller based on the designed governor. It is shown that the developed secure collision-free formation control approach can not only achieve the formation objective, but also avoid the collisions under DoS attacks. Finally, we apply the developed secure collision free formation control method to multiple Euler-Lagrangian (EL) systems, the simulation and comparison results verify its effectiveness.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5705-5716"},"PeriodicalIF":8.6,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Criteria on Input-to-State Stability for Stochastic Nonlinear Delayed Systems With Multiple Impulses 多脉冲随机非线性时滞系统输入-状态稳定性新准则
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-03 DOI: 10.1109/TSMC.2025.3572289
Haofeng Xu;Quanxin Zhu;Wei Xing Zheng
{"title":"New Criteria on Input-to-State Stability for Stochastic Nonlinear Delayed Systems With Multiple Impulses","authors":"Haofeng Xu;Quanxin Zhu;Wei Xing Zheng","doi":"10.1109/TSMC.2025.3572289","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3572289","url":null,"abstract":"This article is committed to investigate the pth moment input-to-state stability for stochastic nonlinear delayed systems involving multiple impulses. Via a series of auxiliary equations, Razumikhin method and stochastic analysis approach, we derive some new stability results under the combination of impulsive control and impulsive disturbance. For all we know, this article is the first attempt to study such a stability issue for the suggested systems. Additionally, the concepts of stabilizing impulse average dwell time (SIADT) and destabilizing impulse average dwell time (DIADT) are proposed, respectively, owing to the presence of multiple impulses. It should also be pointed out that the obtained criteria can loose some restrictions of the existing results and have wider applications. Particularly, we allow the cumulative strength of multiple impulses over a period to be greater than 1, which is more applicable to some extent compared with most of the existing literatures. Finally, the effectiveness and validity of the theory are supported by two examples.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5619-5627"},"PeriodicalIF":8.6,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural-Network-Based Distributed State Estimation Under Encoding-Decoding Schemes: Probabilistic-Constrained Cases 编解码方案下基于神经网络的分布式状态估计:概率约束情况
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-03 DOI: 10.1109/TSMC.2025.3571783
Yamei Ju;Yangkai Chen;Derui Ding;Guoliang Wei;Ying Sun
{"title":"Neural-Network-Based Distributed State Estimation Under Encoding-Decoding Schemes: Probabilistic-Constrained Cases","authors":"Yamei Ju;Yangkai Chen;Derui Ding;Guoliang Wei;Ying Sun","doi":"10.1109/TSMC.2025.3571783","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3571783","url":null,"abstract":"In this article, a neural-network (NN)-based approach of distributed state estimation with probabilistic constraints is proposed for a class of nonlinear systems over sensor networks. For the discussed plant, the unknown nonlinear dynamics are approximated by resorting to NNs and the communication among estimators and sensors is scheduled by encoding-decoding schemes. The goal of the addressed problem is to design a distributed estimator such that, in the presence of the bounded noises, all possible errors are confined to some certain region in a predetermined probability while achieving the exponentially bounded performance in a finite time domain. In light of the matrix operation, some sufficient conditions are obtained to ensure the existence of the desired gains of estimators, which are computed by dealing with the corresponding matrix inequalities in an iterative way. The effectiveness of the proposed distributed state estimation method is verified by presenting an example of a one-track model.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5332-5344"},"PeriodicalIF":8.6,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Privacy-Preserving Economic Dispatch of Isolated Microgrid Based on Event-Triggered Mechanism 基于事件触发机制的隔离微电网分布式隐私保护经济调度
IF 8.6 1区 计算机科学
IEEE Transactions on Systems Man Cybernetics-Systems Pub Date : 2025-06-03 DOI: 10.1109/TSMC.2025.3570718
Hongfei Bai;Shengxuan Weng;Dong Yue;Chunxia Dou
{"title":"Distributed Privacy-Preserving Economic Dispatch of Isolated Microgrid Based on Event-Triggered Mechanism","authors":"Hongfei Bai;Shengxuan Weng;Dong Yue;Chunxia Dou","doi":"10.1109/TSMC.2025.3570718","DOIUrl":"https://doi.org/10.1109/TSMC.2025.3570718","url":null,"abstract":"This article introduces a distributed privacy-preserving economic dispatch (ED) algorithm for islanded microgrid (MG), addressing the challenge of balancing power generation and demand with minimal system cost while ensuring data privacy. The proposed algorithm utilizes homomorphic encryption to establish a confidential interaction protocol (CIP), safeguarding sensitive information during the ED process. To mitigate the computational and communication overheads of the CIP, the CIP-compatible static and dynamic event-triggered mechanisms (ETMs) are, respectively, developed, whose implementations only rely on the information obtained through the proposed CIP. The ETMs reduce the frequency of CIP execution and make the algorithm suitable for resource-constrained environments. The convergence and privacy preservation of algorithms are theoretically proved, and the simulation results validate the algorithm’s effectiveness, highlighting its advantages in privacy protection and resource efficiency.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 8","pages":"5477-5490"},"PeriodicalIF":8.6,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信