Mobile Networks and Applications最新文献

筛选
英文 中文
Radio Frequency Fingerprint Identification of WiFi Signals Based on Federated Learning for Different Data Distribution Scenarios 基于联合学习的 WiFi 信号射频指纹识别,适用于不同数据分布场景
Mobile Networks and Applications Pub Date : 2024-05-17 DOI: 10.1007/s11036-023-02229-0
Jibo Shi, Bin Ge, Qiong Wu, Ruichang Yang, Yan Sun
{"title":"Radio Frequency Fingerprint Identification of WiFi Signals Based on Federated Learning for Different Data Distribution Scenarios","authors":"Jibo Shi, Bin Ge, Qiong Wu, Ruichang Yang, Yan Sun","doi":"10.1007/s11036-023-02229-0","DOIUrl":"https://doi.org/10.1007/s11036-023-02229-0","url":null,"abstract":"<p>The number of terminal devices has skyrocketed along with the quick growth of cognitive radio networks. Massive equipment produce a lot of data that should not be shared, often WiFi signals. The radio frequency (RF) fingerprint identification approach for WiFi signals proposed in this research is based on federated learning and trains a collaborative model to complete RF fingerprint without transferring privacy-sensitive data. Aiming at the lack of labeled data and heterogeneous distribution of labeled data in actual situations, a federated transfer learning mechanism is designed. The technique suggested in this paper increases the accuracy of RF fingerprint at various sizes and assures that data privacy is not compromised, according to experimental results on real-world datasets.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141063119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Localization Strategy Based on Node Selection and Power Allocation in Resource-Constrained Environments 资源受限环境中基于节点选择和功率分配的协作定位策略
Mobile Networks and Applications Pub Date : 2024-05-14 DOI: 10.1007/s11036-024-02345-5
Geng Chen, Qingbin Wang, Xiaoxian Kong, Qingtian Zeng
{"title":"Collaborative Localization Strategy Based on Node Selection and Power Allocation in Resource-Constrained Environments","authors":"Geng Chen, Qingbin Wang, Xiaoxian Kong, Qingtian Zeng","doi":"10.1007/s11036-024-02345-5","DOIUrl":"https://doi.org/10.1007/s11036-024-02345-5","url":null,"abstract":"<p>Accurate positioning in the constrained environment of Global Navigation satellite Systems (GNSS) is a challenging problem, especially in resource-constrained urban canyon environments. In order to incentivize collaborative agency, this paper, grounded in an economic framework, proposes the utilization of auction mechanisms to address issues pertaining to collaboration and power allocation among agents. For different types of agents, different auction methods are designed according to their own resources for collaborative positioning. Firstly, an Iterative Bidirectional Auction (IBA) cooperative localization algorithm is proposed to solve the problem of cooperation and power allocation among agents in resource-constrained environments. Secondly, in order to ensure the fairness of power distribution, the auction reserve price is introduced, and the relationship between the auction reserve price and power distribution is deduced. Then, considering that there are different types of agents in the actual scenario, One-Shot Auction (OSA) algorithm is proposed to realize the cooperation between user agents and vehicle agents. Finally, analysis and numerical results demonstrate that under the proposed collaborative strategy, agents with better network conditions are more likely to participate in cooperation. Compared to non-cooperative positioning (NC), each agent experiences an improvement in position accuracy of over 60%. The performance of the proposed algorithm is approximately 43% better than uniform power allocation (UPA), and the position accuracy approaches that of the full power allocation (FPA) algorithm. Our algorithm outperforms OSA, PAR and BACL in positioning accuracy with the same agent nodes, and is the most power-efficient. This is pivotal for collaborative positioning under resource constraints.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sentiment Analysis Method for Big Social Online Multimodal Comments Based on Pre-trained Models 基于预训练模型的大型社交网络多模态评论情感分析方法
Mobile Networks and Applications Pub Date : 2024-05-13 DOI: 10.1007/s11036-024-02303-1
Jun Wan, Marcin Woźniak
{"title":"A Sentiment Analysis Method for Big Social Online Multimodal Comments Based on Pre-trained Models","authors":"Jun Wan, Marcin Woźniak","doi":"10.1007/s11036-024-02303-1","DOIUrl":"https://doi.org/10.1007/s11036-024-02303-1","url":null,"abstract":"<p>In addition to a large amount of text, there are also many emoticons in the comment data on social media platforms. The multimodal nature of online comment data increases the difficulty of sentiment analysis. A big data sentiment analysis technology for social online multimodal (SOM) comments has been proposed. This technology uses web scraping technology to obtain SOM comment big data from the internet, including text data and emoji data, and then extracts and segments the text big data, preprocess part of speech tagging. Using the attention mechanism-based feature extraction method for big SOM comment data and the correlation based expression feature extraction method for SOM comment, the emotional features of SOM comment text and expression package data were obtained, respectively. Using the extracted two emotional features as inputs and the ELMO pre-training model as the basis, a GE-Bi LSTM model for SOM comment sentiment analysis is established. This model combines the ELMO pre training model with the Glove model to obtain the emotional factors of social multimodal big data. After recombining them, the GE-Bi LSTM model output layer is used to output the sentiment analysis of big SOM comment data. The experiment shows that this technology has strong extraction and segmentation capabilities for SOM comment text data, which can effectively extract emotional features contained in text data and emoji packet data, and obtain accurate emotional analysis results for big SOM comment data.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"201 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pruning Method Combined with Resilient Training to Improve the Adversarial Robustness of Automatic Modulation Classification Models 剪枝法与弹性训练相结合,提高自动调制分类模型的对抗鲁棒性
Mobile Networks and Applications Pub Date : 2024-05-13 DOI: 10.1007/s11036-024-02333-9
Chao Han, Linyuan Wang, Dongyang Li, Weijia Cui, Bin Yan
{"title":"A Pruning Method Combined with Resilient Training to Improve the Adversarial Robustness of Automatic Modulation Classification Models","authors":"Chao Han, Linyuan Wang, Dongyang Li, Weijia Cui, Bin Yan","doi":"10.1007/s11036-024-02333-9","DOIUrl":"https://doi.org/10.1007/s11036-024-02333-9","url":null,"abstract":"<p>In the rapidly evolving landscape of wireless communication systems, the vulnerability of automatic modulation classification (AMC) models to adversarial attacks presents a significant security challenge. This study introduces a pruning and training methodology tailored to address the nuances of signal processing within these systems. Leveraging a pruning method based on channel activation contributions, our approach optimizes adversarial training potential, enhancing the model’s capacity to improve robustness against attacks. Additionally, the approach constructs a resilient training method based on a composite strategy, integrating balanced adversarial training, soft target regularization, and gradient masking. This combination effectively broadens the model’s uncertainty space and obfuscates gradients, thereby enhancing the model’s defenses against a wide spectrum of adversarial tactics. The training regimen is carefully adjusted to retain sensitivity to adversarial inputs while maintaining accuracy on original data. Comprehensive evaluations conducted on the RML2016.10A dataset demonstrate the effectiveness of our method in defending against both gradient-based and optimization-based attacks within the realm of wireless communication. This research offers insightful and practical approaches to improving the security and performance of AMC models against the complex and evolving threats present in modern wireless communication environments.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DGNet: A Handwritten Mathematical Formula Recognition Network Based on Deformable Convolution and Global Context Attention DGNet:基于可变形卷积和全局上下文关注的手写数学公式识别网络
Mobile Networks and Applications Pub Date : 2024-05-10 DOI: 10.1007/s11036-024-02315-x
Cuihong Wen, Lemin Yin, Shuai Liu
{"title":"DGNet: A Handwritten Mathematical Formula Recognition Network Based on Deformable Convolution and Global Context Attention","authors":"Cuihong Wen, Lemin Yin, Shuai Liu","doi":"10.1007/s11036-024-02315-x","DOIUrl":"https://doi.org/10.1007/s11036-024-02315-x","url":null,"abstract":"<p>The Handwritten Mathematical Expression Recognition (HMER) task aims to generate corresponding LATEX sequences from images of handwritten mathematical expressions. Currently, the encoder-decoder architecture has made significant progress in this task. However, the architecture based on the DenseNet encoder fails to adequately consider the unique features of handwritten mathematical expressions (HME) and the similarity between different characters. Additionally, the decoder, with its small receptive field during the decoding process, fails to effectively capture the spatial positional information of the targets, resulting in a lack of global contextual information during decoding. To address these issues, this paper proposes a neural network called DGNet based on deformable convolution and global contextual attention. Our network takes into full consideration the sparse nature of handwritten mathematical formulas and utilizes the properties of deformable convolution, allowing the convolution kernel to deform based on the content of the neighborhood. This enables our model to better adapt to geometric changes and other deformations in handwritten mathematical expressions. Simultaneously, we introduce GCAttention in optimizing the feature part to fully aggregate global contextual features of both position and channel. In experiments, our model achieved accuracies of 58.51%, 56.32%, and 56.1% on the CROHME 2014, 2016, and 2019 datasets, respectively.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributionally Robust Federated Learning for Mobile Edge Networks 移动边缘网络的分布式稳健联合学习
Mobile Networks and Applications Pub Date : 2024-05-03 DOI: 10.1007/s11036-024-02316-w
Long Tan Le, Tung-Anh Nguyen, Tuan-Dung Nguyen, Nguyen H. Tran, Nguyen Binh Truong, Phuong L. Vo, Bui Thanh Hung, Tuan Anh Le
{"title":"Distributionally Robust Federated Learning for Mobile Edge Networks","authors":"Long Tan Le, Tung-Anh Nguyen, Tuan-Dung Nguyen, Nguyen H. Tran, Nguyen Binh Truong, Phuong L. Vo, Bui Thanh Hung, Tuan Anh Le","doi":"10.1007/s11036-024-02316-w","DOIUrl":"https://doi.org/10.1007/s11036-024-02316-w","url":null,"abstract":"<p>Federated Learning (FL) revolutionizes data processing in mobile networks by enabling collaborative learning without data exchange. This not only reduces latency and enhances computational efficiency but also enables the system to adapt, learn and optimize the performance from the user’s context in real-time. Nevertheless, FL faces challenges in training and generalization due to statistical heterogeneity, stemming from the diverse data nature across varying user contexts. To address these challenges, we propose <span>(textsf {WAFL})</span>, a robust FL framework grounded in Wasserstein distributionally robust optimization, aimed at enhancing model generalization against all adversarial distributions within a predefined Wasserstein ambiguity set. We approach <span>(textsf {WAFL})</span> by formulating it as an empirical surrogate risk minimization problem, which is then solved using a novel federated algorithm. Experimental results demonstrate that <span>(textsf {WAFL})</span> outperforms other robust FL baselines in non-i.i.d settings, showcasing superior generalization and robustness to significant distribution shifts.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140881356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic SAX: A Cognitively-Inspired Method for Time Series Classification in Cognitive IoT Sensor Network 概率 SAX:认知物联网传感器网络时间序列分类的认知启发方法
Mobile Networks and Applications Pub Date : 2024-05-01 DOI: 10.1007/s11036-024-02322-y
Vidyapati Jha, Priyanka Tripathi
{"title":"Probabilistic SAX: A Cognitively-Inspired Method for Time Series Classification in Cognitive IoT Sensor Network","authors":"Vidyapati Jha, Priyanka Tripathi","doi":"10.1007/s11036-024-02322-y","DOIUrl":"https://doi.org/10.1007/s11036-024-02322-y","url":null,"abstract":"<p>Cognitive Internet of Things (CIoT) is a new subfield of the Internet of Things (IoT) that aims to integrate cognition into the IoT's architecture and design. Various CIoT applications require techniques to inevitably extract machine-understandable concepts from unprocessed sensory data to provide value-added insights about CIoT devices and their users. The time series classification, which is used for the concept's extraction poses challenges to many applications across various domains, i.e., dimensionality reduction strategies have been suggested as an effective method to decrease the dimensionality of time series. The most common approach for time-series classification is the symbolic aggregate approximation (SAX). However, its main drawback is that it does not select the most significant point from the segment during the piecewise aggregate approximation (PAA) stage. The situation is cumbersome when data is heterogeneous and massive. Therefore, this research presents a novel technique for the selection of the most significant point from a segment during the PAA stage in SAX. The proposed technique chooses the maximum informative point as the most significant point using the probabilistic interpretation of sensory data with an appropriate copula design. The appropriate copula is selected using the minimum akaike information criteria (AIC) value. Subsequently, the modified SAX considers the maximum informative points instead of a selection of mean/max/extreme data points on a given segment during the PAA stage. The experimental evaluation of the environmental dataset reveals that the proposed method is more accurate and computationally efficient than classic SAX. Also, for cross-validation it computes the entropy of the information point (<i>i</i>-value) from each dataset to verify the successful transformation of normal data points to information points.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140842031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Aided MmWave Hybrid Relay Network Based on Multi-Agent Deep Reinforcement Learning 基于多代理深度强化学习的 RIS 辅助毫米波混合中继网络
Mobile Networks and Applications Pub Date : 2024-04-26 DOI: 10.1007/s11036-024-02323-x
Yifeng Zhao, Xuanhui Liu, Haoran Liu, Xiaoqi Wang, Lianfen Huang
{"title":"RIS-Aided MmWave Hybrid Relay Network Based on Multi-Agent Deep Reinforcement Learning","authors":"Yifeng Zhao, Xuanhui Liu, Haoran Liu, Xiaoqi Wang, Lianfen Huang","doi":"10.1007/s11036-024-02323-x","DOIUrl":"https://doi.org/10.1007/s11036-024-02323-x","url":null,"abstract":"<p>In millimeter wave (mmWave) communication, the utilization of multi-hop relay technology has been regarded as a promising approach to overcome the significant path loss encountered during signal transmission. However, the traditional active relay network suffers from low energy efficiency (EE) and uneven resource distribution. To address these challenges, we introduce Reconfigurable Intelligent Surface (RIS) as a passive relay to the mmWave communication system and create a hybrid relay system that combines passive and active relays, which aims to improve EE through the multi-hop relay. Additionally, with the development of Artificial Intelligence, deep Q-learning (DQN) is applied to optimize the hybrid relay system in this paper, where every transmitted signal of the base station (BS) is considered an agent. In this approach, the network is trained based on the interaction between the collected environment information and the users’ relay allocation strategy. Considering competition-cooperation relationships of multiple users, we propose a multi-agent DQN (MADQN) algorithm to allocate the relay resource where the primary goal is maximizing EE. Simulation results demonstrate that our proposed scheme can effectively converge to the optimal relay link, further improving EE and reducing energy consumption in comparison with conventional schemes.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140805931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalDMTP: A Multi-tier Pooling Method for Malware Detection based on Graph Classification MalDMTP:基于图分类的多层汇集恶意软件检测方法
Mobile Networks and Applications Pub Date : 2024-04-26 DOI: 10.1007/s11036-024-02318-8
Liang Kou, Cheng Qiu, Meiyu Wang, Hua Liu, Yan Du, Jilin Zhang
{"title":"MalDMTP: A Multi-tier Pooling Method for Malware Detection based on Graph Classification","authors":"Liang Kou, Cheng Qiu, Meiyu Wang, Hua Liu, Yan Du, Jilin Zhang","doi":"10.1007/s11036-024-02318-8","DOIUrl":"https://doi.org/10.1007/s11036-024-02318-8","url":null,"abstract":"<p>With the development and adoption of cloud platforms in various fields, malware attacks have become a serious threat to the Internet cloud ecosystem. However, the pooling process of existing graph classification techniques for malware variant detection uses only a serial and single strategy, resulting in localized malicious behaviors of malware that may be overlooked. In this paper, we propose MalDMTP, a malware detection framework based on multilevel graph classification learning, which implements the graph pooling process for malware classification in parallel and performs graph instance-based discrimination. In particular, MalDMTP first constructs an API call graph based on results obtained from dynamic execution of malware. Then it combines multiple graph neural network learning strategies through multi-level pooling to learn the global importance of nodes in the pooled graph and extract node representations from multiple perspectives for heterogeneous graphs. After that, MalDMTP is aggregated into graph representations by the graph-level pooling function GMT based on a multi-head attention mechanism, which goes through a classifier in order to obtain malware prediction labels. Experimental results show that the proposed MalDMTP can achieve 96.53% accuracy on the Alibaba cloud malware dataset, which improves 1.9% 7.6% over the previous single-graph pooling methods on the graph classification task of malware detection.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140806016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Mission Planning of USVs Based on Intention Recognition 基于意图识别的 USV 合作任务规划
Mobile Networks and Applications Pub Date : 2024-04-18 DOI: 10.1007/s11036-024-02324-w
Changting Shi, Yanqiang Wang, Jing Shen, Junhui Qi
{"title":"Cooperative Mission Planning of USVs Based on Intention Recognition","authors":"Changting Shi, Yanqiang Wang, Jing Shen, Junhui Qi","doi":"10.1007/s11036-024-02324-w","DOIUrl":"https://doi.org/10.1007/s11036-024-02324-w","url":null,"abstract":"<p>To enhance task completion efficiency and quality, the coordination of Unmanned Surface Vehicle (USV) formations in complex environmental situations often requires user intervention. This paper proposes a human-machine collaborative approach for USV mission planning and explores a method for identifying user intervention intentions. A method for recognizing user intention based on intervention style was proposed. The method utilizes the Improved Particle Swarm Optimization-Support Vector Machine (IPSO-SVM) model to recognize intervention style and emphasizes human intention recognition to enhance the ability of USV in complex environments. The method involves modeling continuous intervention operations and incorporating intervention style features to accurately identify user intent. The study proposes a fusion method that combines feature attention, self-attention, and Fusion of Long Short-Term Memory Networks (FLSTMS) to achieve its purpose. Furthermore, it suggests a cooperative mission planning method based on prospect theory, which integrates user risk propensity and identified intentions to optimize planning. Simulation experiments confirm the effectiveness of this approach, highlighting its advantages over traditional methods.</p>","PeriodicalId":501103,"journal":{"name":"Mobile Networks and Applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140627284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信