Journal of Combinatorial Optimization最新文献

筛选
英文 中文
On some path-critical Ramsey numbers 在一些路径关键的拉姆齐数上
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01312-4
Ye Wang, Yanyan Song
{"title":"On some path-critical Ramsey numbers","authors":"Ye Wang, Yanyan Song","doi":"10.1007/s10878-025-01312-4","DOIUrl":"https://doi.org/10.1007/s10878-025-01312-4","url":null,"abstract":"<p>For graphs <i>G</i> and <i>H</i>, the Ramsey number <i>R</i>(<i>G</i>, <i>H</i>) is the smallest <i>r</i> such that any red-blue edge coloring of <span>(K_r)</span> contains a red <i>G</i> or a blue <i>H</i>. The path-critical Ramsey number <span>(R_{pi }(G,H))</span> is the largest <i>n</i> such that any red-blue edge coloring of <span>(K_r setminus P_{n})</span> contains a red <i>G</i> or a blue <i>H</i>, where <span>(r=R(G,H))</span> and <span>(P_{n})</span> is a path of order <i>n</i>. In this note, we show a general upper bound for <span>(R_{pi }(G,H))</span>, and determine the exact values for some cases of <span>(R_{pi }(G,H))</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT 基于深度kronecker网络的智能健康系统,用于物联网中隐私感知聚合认证和访问控制
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01303-5
M. Sathya, V. Mareeswari, M. Jeyaselvi, A. Solairaj
{"title":"Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT","authors":"M. Sathya, V. Mareeswari, M. Jeyaselvi, A. Solairaj","doi":"10.1007/s10878-025-01303-5","DOIUrl":"https://doi.org/10.1007/s10878-025-01303-5","url":null,"abstract":"<p>The Internet of Things (IoT) application is an application and service that incorporates both the physical and information world. Similarly, it is difficult for existing health systems to provide privacy-aware aggregate authentication and fine-grained access control. To bridge the concern, a smart health system (SHS) with Deep Kronecker Network_key generation (DKN_keyGen) for privacy-aware aggregate authentication and access control in IoT is implemented. Here, entities employed for this model such as data owner (DO), registration center (RC), data user (DU) and cloud service provider (CSP). The method follows four steps, such as system initialization, user registration, Health data outsourcing and Health data access. Initially, the RC needs to initialize the security parameters, random parameters and public keys. After that, DO and DU must be registered in RC. Moreover, the smart health care data of DO generates the secret parameter and also obtains the secret parameter from the RC. The cloud storage stores and manages health care data in the health data outsourcing step. Finally, for health data access, the user gives appropriate parameters and access to the data which is implemented in the data access phase. The model is established considering different security functionalities including Encryption, ECC, XoR and hashing function. Here, the key is generated using DKN. The proposed model obtained a minimum computation time of 6.857 s, memory usage of 30 MB, and communication cost of 20.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"48 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved approximation algorithms for multiprocessor indivisible coflow scheduling 多处理机不可分共流调度的改进逼近算法
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01325-z
Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su
{"title":"Improved approximation algorithms for multiprocessor indivisible coflow scheduling","authors":"Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su","doi":"10.1007/s10878-025-01325-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01325-z","url":null,"abstract":"<p>Coflow scheduling is a challenging optimization problem that underlies many data transmission and parallel computing applications. In this paper, we study the <i>indivisible</i> coflow scheduling problem on parallel identical machines with the objective to minimize the makespan, i.e., the completion time of the last flow. In our problem setting, the number of the input/output ports in each machine is a fixed constant, each port has a unit capacity, and all the flows inside a coflow should be scheduled on the same machine. We present a <span>((2 + epsilon ))</span>-approximation algorithm for the problem, for any <span>(epsilon &gt; 0)</span>, in which the number of machines can be either a fixed constant or part of the input.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"133 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration ZeSAI:基于零射击混合网络和威胁情报集成的电子邮件安全AI警惕恶意软件检测
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01306-2
Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil
{"title":"ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration","authors":"Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil","doi":"10.1007/s10878-025-01306-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01306-2","url":null,"abstract":"<p>In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"47 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence of carbon sink trading on carbon emission reduction in agricultural supply chains 碳汇交易对农业供应链碳减排的影响
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01316-0
Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li
{"title":"The influence of carbon sink trading on carbon emission reduction in agricultural supply chains","authors":"Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li","doi":"10.1007/s10878-025-01316-0","DOIUrl":"https://doi.org/10.1007/s10878-025-01316-0","url":null,"abstract":"<p>As global climate change intensifies, the agricultural sector, responsible for over 30% of global greenhouse gas emissions, faces an urgent imperative to mitigate emissions and align with international climate commitments. Carbon sink trading, a market-based mechanism that incentivizes emission reductions through sequestration credits, has emerged as an important tool for accelerating carbon peaking and neutrality goals. This study investigates the influence of carbon sink trading on the strategic interactions between farmers and retailers in agricultural supply chains. Employing differential game theory, we construct three cooperative models: decentralized, Stackelberg leader-follower, and centralized, and derive equilibrium strategies for each using the Hamilton-Jacobi-Bellman framework. Through numerical simulations, we evaluate the influence of carbon sink trading on the emission reduction efforts of farmers and retailers, the extent of emission reductions in the supply chain, and the overall profits. Comparative analysis against baseline scenarios without carbon trading reveals that the integration of carbon sink markets enhances profit margins across all models and improves the level of emission reduction in the agricultural supply chain. In addition, our results show that the centralized model outperforms other configurations, followed by the Stackelberg model, with the decentralized model exhibiting the least effectiveness. These findings provide actionable insights for policymakers and supply chain managers to design carbon trading frameworks that harmonize economic incentives with ecological sustainability.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"40 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming 0-1分式规划的指数锥整数规划及分段线性逼近方法
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01318-y
Hoang Giang Pham, Thuy Anh Ta, Tien Mai
{"title":"An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming","authors":"Hoang Giang Pham, Thuy Anh Ta, Tien Mai","doi":"10.1007/s10878-025-01318-y","DOIUrl":"https://doi.org/10.1007/s10878-025-01318-y","url":null,"abstract":"<p>We study a class of binary fractional programs commonly encountered in important application domains such as assortment optimization and facility location. These problems are known to be NP-hard to approximate within any constant factor, and existing solution approaches typically rely on mixed-integer linear programming or second-order cone programming reformulations. These methods often utilize linearization techniques (e.g., big-M or McCormick inequalities), which can result in weak continuous relaxations. In this work, we propose a novel approach based on an exponential cone reformulation combined with piecewise linear approximation. This allows the problem to be solved efficiently using standard cutting-plane or branch-and-cut procedures. We further provide a theoretical analysis of the approximation quality yielded by our reformulation and discuss strategies for optimizing the problem size of the exponential cone formulation. Experiments on instances of various sizes demonstrate that our approach delivers competitive performance on small and medium instances while offering superior performance on large instances compared to state-of-the-art baselines.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"19 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithms for the partition set cover problem with penalties 带惩罚的分区集覆盖问题的近似算法
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01317-z
Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu
{"title":"Approximation algorithms for the partition set cover problem with penalties","authors":"Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu","doi":"10.1007/s10878-025-01317-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01317-z","url":null,"abstract":"<p>In this paper, we consider the partition set cover problem with penalties. In this problem, we have a universe <i>U</i>, a partition <span>(mathscr {P}={P_{1},ldots ,P_{r}})</span> of <i>U</i>, and a collection <span>(mathscr {S}={S_{1},ldots ,S_{m}})</span> of nonempty subsets of <i>U</i> satisfying <span>(bigcup _{S_iin mathscr {S}} S_i=U)</span>. In addition, each <span>(P_t)</span> <span>((tin [r]))</span> is associated with a covering requirement <span>(k_t)</span> as well as a penalty <span>(pi _t)</span>, and each <span>(S_i)</span> <span>((iin [m]))</span> is associated with a cost. A class <span>(P_t)</span> attains its covering requirement by a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> if at least <span>(k_t)</span> elements in <span>(P_t)</span> are contained in <span>(bigcup _{S_iin mathscr {A}} S_i)</span>. Each <span>(P_t)</span> is either attaining its covering requirement or paid with its penalty. The objective is to find a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> such that the sum of the cost of <span>(mathscr {A})</span> and the penalties of classes not attaining covering requirements by <span>(mathscr {A})</span> is minimized. We present two approximation algorithms for this problem. The first is based on the LP-rounding technique with approximation ratio <span>(K+O(beta +ln r))</span>, where <span>(K=max _{tin [r]}k_t)</span>, and <span>(beta )</span> denotes the approximation guarantee for a related set cover instance obtained by rounding the standard LP. The second is based on the primal-dual method with approximation ratio <i>lf</i>, where <span>(f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|)</span> and <span>(l=max _{tin [r]}|P_t|)</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"32 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating combinatorial contracts with a cardinality constraint 用基数约束逼近组合契约
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01307-1
Qinqin Gong, Ling Gai, Yanjun Jiang, Yang Lv, Ruiqi Yang
{"title":"Approximating combinatorial contracts with a cardinality constraint","authors":"Qinqin Gong, Ling Gai, Yanjun Jiang, Yang Lv, Ruiqi Yang","doi":"10.1007/s10878-025-01307-1","DOIUrl":"https://doi.org/10.1007/s10878-025-01307-1","url":null,"abstract":"<p>We explore the problem of combinatorial contract design, a subject introduced and studied by Dütting et al. (2023). Previous research has focused on the challenge of selecting an unconstrained subset of agents, particularly when the principal’s utility function exhibits XOS or submodular characteristics related to the subset of agents that exert effort. Our study extends this existing line of research by examining scenarios in which the principal aims to select a subset of agents with a specific <i>k</i>-cardinality constraint. In these scenarios, the actions that each agent can take are binary values: effort or no effort. We focus on linear contracts, where the expected reward function is XOS or submodular. Our contribution is an approximation of 0.0197 for the problem of designing multi-agent hidden-action principal-agent contracts with the <i>k</i>-cardinality constraint. This result stands in contrast to the unconstrained setting, where Dütting et al. (2023) achieved an approximation of nearly 0.0039.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"44 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithms for the W-prize-collecting scheduling problem on a single machine with submodular rejection penalties 具有次模拒绝处罚的单机w奖回收调度问题的近似算法
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01314-2
Tianjiao Guo, Wen Liu, Gengsheng Zhang, Bo Hou
{"title":"Approximation algorithms for the W-prize-collecting scheduling problem on a single machine with submodular rejection penalties","authors":"Tianjiao Guo, Wen Liu, Gengsheng Zhang, Bo Hou","doi":"10.1007/s10878-025-01314-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01314-2","url":null,"abstract":"<p>In this paper, we consider the <i>W</i>-prize-collecting scheduling problem on a single machine with submodular rejection penalties. In this problem, we are given one machine, <i>n</i> jobs and a value <i>W</i>. Every job has a processing time and a profit. Each job is either accepted and processed on the machine, or rejected and a rejection penalty is paid. The objective is to minimize the sum of the makespan of the accepted jobs and the rejection penalties of the rejected jobs which is determined by a submodular function, provided that the total profit of the accepted jobs is at least <i>W</i>. Under the assumption that the submodular penalty function is polymatriod, we design a 2-approximation algorithm based on the primal-dual framework.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"35 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism Design with Predictions for Facility Location Games with Candidate Locations 具有候选地点的设施位置博弈的预测机制设计
IF 1 4区 数学
Journal of Combinatorial Optimization Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01310-6
Jiazhu Fang, Qizhi Fang, Wenjing Liu, Qingqin Nong, Alexandros A. Voudouris
{"title":"Mechanism Design with Predictions for Facility Location Games with Candidate Locations","authors":"Jiazhu Fang, Qizhi Fang, Wenjing Liu, Qingqin Nong, Alexandros A. Voudouris","doi":"10.1007/s10878-025-01310-6","DOIUrl":"https://doi.org/10.1007/s10878-025-01310-6","url":null,"abstract":"<p>We study mechanism design with predictions in the single (obnoxious) facility location games with candidate locations on the real line, which complements the existing literature on mechanism design with predictions. We first consider the single facility location games with candidate locations, where each agent prefers the facility (e.g., a school) to be located as close to her as possible. We study two social objectives: minimizing the maximum cost and the social cost, and provide deterministic, anonymous, and group strategy-proof mechanisms with predictions that achieve the best possible trade-offs between consistency and robustness, respectively. Additionally, we represent the approximation ratio as a function of the prediction error, indicating that mechanisms can achieve better performance even when predictions are not fully accurate. We also consider the single obnoxious facility location games with candidate locations, where each agent prefers the facility (e.g., a garbage transfer station) to be located as far away from her as possible. For the objective of maximizing the minimum utility, we prove that any strategy-proof mechanism with predictions is unbounded robust. For the objective of maximizing the social utility, we provide a deterministic, anonymous, and group strategy-proof mechanism with prediction that achieves the best possible trade-off between consistency and robustness.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"135 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信