International Journal of Distributed Sensor Networks最新文献

筛选
英文 中文
Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things 物联网环境下多域协同通信网络的演化建模与鲁棒性分析
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-11-01 DOI: 10.1177/15501329221135160
Jianrong Wang, P. Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang
{"title":"Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things","authors":"Jianrong Wang, P. Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang","doi":"10.1177/15501329221135160","DOIUrl":"https://doi.org/10.1177/15501329221135160","url":null,"abstract":"In the future, the Internet of things will reduce the cell radius and increase the number of low-power nodes to support thousands of times of traffic growth under 5G. As a virtual multiple input multiple output technology, cooperative communication technology can solve these problems effectively. According to the evolution characteristics of cooperative communication networks, a multi-domain cooperative communication network evolution model with preferential attachment and random attachment is constructed in this article. And then, the network properties and robustness are analyzed using the mean-field method and different attacks. Aiming at the resource constraints and resource allocation problems of communication nodes, a relay selection strategy based on the combination of maximum degree and minimum clustering coefficient is proposed. The simulation results show that the relay node selection strategy based on the combination of maximum degree and minimum clustering coefficient has significant advantages in selection steps and selection time, which greatly enhanced the performance of relay selection in multi-domain cooperative communication networks. Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41601399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-domain entity identity association analysis and prediction based on representation learning 基于表示学习的跨领域实体身份关联分析与预测
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-11-01 DOI: 10.1177/15501329221135060
Mingcheng Gao, Ruiheng Wang, Lu Wang, Yang Xin, Hongliang Zhu
{"title":"Cross-domain entity identity association analysis and prediction based on representation learning","authors":"Mingcheng Gao, Ruiheng Wang, Lu Wang, Yang Xin, Hongliang Zhu","doi":"10.1177/15501329221135060","DOIUrl":"https://doi.org/10.1177/15501329221135060","url":null,"abstract":"Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying mapping, threat tracking, and intelligent recommendation. This task usually adds additional difficulty to the research in practical applications due to the need to link across multiple platforms. The existing entity identity association methods in cross-domain networks mainly use the attribute information, generated content, and network structure information of network user entities but do not fully use the inherent strong positioning characteristics of active nodes in the network. In this article, we analyzed the structural characteristics of existing relational networks. We found that the hub node has the role of identity association positioning, and the importance of identity association reflected by different nodes is different. Moreover, we creatively designed a network representation learning method. We proposed a supervised learning identity association model combined with a representation learning method. Experiments on the public data set show that using the identity association method proposed in this article, the ranking accuracy of user entity association similarity is about 30% and 25% higher than the existing two typical methods.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47701323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges 异构网络中的上行非正交多址:最新进展和开放研究挑战综述
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-10-01 DOI: 10.1177/15501329221132496
B. Rehman, M. I. Babar, Arbab Waheed Ahmad, Mohammad Amir, Wasim Habib, Muhammad Farooq, Gamil Abdel Azim
{"title":"Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges","authors":"B. Rehman, M. I. Babar, Arbab Waheed Ahmad, Mohammad Amir, Wasim Habib, Muhammad Farooq, Gamil Abdel Azim","doi":"10.1177/15501329221132496","DOIUrl":"https://doi.org/10.1177/15501329221132496","url":null,"abstract":"Fifth-generation wireless communications provide several benefits, including high throughput, lower latency, massive connectivity, considerable improvement in the number of users, higher base station capacity, and achieved quality of service. Non-orthogonal multiple access, an effective approach for sharing the same radio resources, has been highlighted as a viable technology in the fifth-generation wireless networks to achieve the demands of available bandwidth, user connectivity, and application latency. Non-orthogonal multiple access and heterogeneous networks have recently emerged as promising network infrastructures for enhancing the spectrum capacity and accommodating more users by sharing the same resources with high throughput. This potential capability has made the non-orthogonal multiple access–enabled heterogeneous networks a new research topic in the modern era. In this survey, the concept of non-orthogonal multiple access and its significance in different emerging technologies has been well explored. Furthermore, this survey covers a systematic overview of the state-of the-art techniques based on non-orthogonal multiple access–enabled heterogeneous networks and devising taxonomy for uplink non-orthogonal multiple access–enabled heterogeneous networks. In addition, this survey provides critical insights and identifies several open research challenges considering the uplink non-orthogonal multiple access–enabled heterogeneous networks.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":"18 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65535455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine learning for Internet of things anomaly detection under low-quality data 低质量数据下物联网异常检测的机器学习
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-10-01 DOI: 10.1177/15501329221133765
Shangbin Han, Qianhong Wu, Yang Yang
{"title":"Machine learning for Internet of things anomaly detection under low-quality data","authors":"Shangbin Han, Qianhong Wu, Yang Yang","doi":"10.1177/15501329221133765","DOIUrl":"https://doi.org/10.1177/15501329221133765","url":null,"abstract":"With the popularization of Internet of things, its network security has aroused widespread concern. Anomaly detection is one of the important technologies to protect network security. To meet the needs of automatic and intelligent detection, supervised machine learning is widely used in anomaly detection. However, the existing schemes ignore the problem of data quality, which leads to the unsatisfactory detection effect in practice. Therefore, practitioners may not know which algorithm to choose due to the lack of review and evaluation of anomaly detection methods under low-quality data. To address this problem, we give a detailed review and evaluation of six supervised anomaly detection methods, as well as release the core code of feature extractor for pcap format traffic traces and anomaly detection methods for reuse. We evaluate the methods on two public datasets (one is a simulated network dataset and the other is a real Internet of things dataset). We believe that our work and insights will help practitioners quickly understand and develop anomaly detection schemes for Internet of things and can provide reference for future research.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41793024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey on authentication and security protocols and schemes over 5G networks 5G网络认证与安全协议与方案研究
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-10-01 DOI: 10.1177/15501329221126609
Yahya M. Tashtoush, Dirar A. Darweesh, Ola Karajeh, Omar M. Darwish, Majdi Maabreh, Safa Swedat, Rawan Koraysh, O. Almousa, Nasser Alsaedi
{"title":"Survey on authentication and security protocols and schemes over 5G networks","authors":"Yahya M. Tashtoush, Dirar A. Darweesh, Ola Karajeh, Omar M. Darwish, Majdi Maabreh, Safa Swedat, Rawan Koraysh, O. Almousa, Nasser Alsaedi","doi":"10.1177/15501329221126609","DOIUrl":"https://doi.org/10.1177/15501329221126609","url":null,"abstract":"The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47705245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network 一种改进的双宿架构,具有改进的媒体访问控制协议、能量感知和服务质量保证的无线体域网络路由算法
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-10-01 DOI: 10.1177/15501329221102372
A. Ibrahim
{"title":"An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network","authors":"A. Ibrahim","doi":"10.1177/15501329221102372","DOIUrl":"https://doi.org/10.1177/15501329221102372","url":null,"abstract":"To reduce frequent sensor recharging and replacement due to resource constraint, it becomes imperative to increase the management of energy and network’s quality of service. To this end, this article provides a new wireless body sensor network architecture with two sink nodes and multiple energy management and quality-of-service algorithms. The first algorithm is the normal data avoidance algorithm that is responsible for decreasing the energy usage by avoiding the transmission of normal data. Duplicate data avoidance algorithm avoid transmitting duplicate data thus saving the bandwidth and battery life. Past knowledge-based weighted routing algorithm oversees taking the ideal direction to transmit information, hence improving quality of service. Furthermore, sleep scheduling is integrated to further improve the battery life. In addition, in our proposed model, linear programming which is based on mathematical models was used to model the network lifetime maximization and continuous data transmission minimization. Through simulation in Castalia-based OMNeT++ demonstrates that our proposed work outperforms the works of quasi-sleep-preempt-supported with regard to network lifetime and delay with 50% and 30% improvement, respectively, moreover, it improves the work of critical data with respect to packet drop and throughput with 30% and 75% improvement, respectively.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42986107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing 移动众测中基于任务属性的意愿感知用户招募策略
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-09-01 DOI: 10.1177/15501329221123531
Yang Liu, Yong Li, Wei Cheng, Weiguang Wang, Junhua Yang
{"title":"A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing","authors":"Yang Liu, Yong Li, Wei Cheng, Weiguang Wang, Junhua Yang","doi":"10.1177/15501329221123531","DOIUrl":"https://doi.org/10.1177/15501329221123531","url":null,"abstract":"With the powerful sensing, computing capabilities of mobile devices, large-scale users with smart devices throughout the city would be the perfect carrier for the people-centric scheme, namely, mobile crowdsensing. Mobile crowdsensing has become a versatile platform for many Internet of things applications in urban scenarios. So how to select the appropriate users to complete the tasks and ensure the quality of the tasks has been a huge challenge for mobile crowdsensing. In this article, we propose a willingness-aware user recruitment strategy based on the task attributes to solve this problem. First, we divide the whole sensing region based on task attributes by a weighted Voronoi diagram and conduct the assessment about the sub-regions according to several parameters, and then categorize sub-regions as hot regions and blank regions. Moreover, we analyze the influence of user willingness on user recruitment and the task completion rate and assess the coverage ability of the users. Finally, we use the greedy method to optimize the user recruitment for each task to select the most suitable users for the tasks. Simulation results show that the willingness-aware user recruitment approach can significantly improve the task completion rate and achieve higher task coverage quality compared with other algorithms.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44512970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSD characteristics for the random vibration signals used in bridge structural health monitoring in Vietnam based on a multi-sensor system 基于多传感器系统的越南桥梁结构健康监测中随机振动信号的PSD特性
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-09-01 DOI: 10.1177/15501329221125110
Thanh Q. Nguyen, Tuan-Anh Nguyen, Thuy T. Nguyen
{"title":"PSD characteristics for the random vibration signals used in bridge structural health monitoring in Vietnam based on a multi-sensor system","authors":"Thanh Q. Nguyen, Tuan-Anh Nguyen, Thuy T. Nguyen","doi":"10.1177/15501329221125110","DOIUrl":"https://doi.org/10.1177/15501329221125110","url":null,"abstract":"This study proposes two parameters, including the appearance frequency of harmonics (AFH) and the change in shape of the power spectral density (PSD), which are examined to assess the decline in stiffness of a bridge span. PSDs are obtained from the real vibration signals of the randomized traffic load model based on accelerometer multi-sensors that indicate the change in mechanical behavior of the structure over time. In addition, AFHs evaluate the workability of the structure. With these parameters in mind, actual vibrations in real beam structures are studied with the aim of using structural health monitoring to assess the bearing capacity reduction on Saigon Bridge’s spans. The results show that AFHs and the high-frequency regions relate to the decreased stiffness of the bridge’s spans over a given period of time. In the future, this research can be used to monitor structural health for various types of structure materials and many different bridge spans.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43298408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks 一种适用于水下无线传感器网络的深度控制节能路由协议
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-09-01 DOI: 10.1177/15501329221117118
U. Lilhore, O. Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, G. Abdulsahib, P. M., D. Kumar
{"title":"A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks","authors":"U. Lilhore, O. Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, G. Abdulsahib, P. M., D. Kumar","doi":"10.1177/15501329221117118","DOIUrl":"https://doi.org/10.1177/15501329221117118","url":null,"abstract":"Underwater wireless sensor network attracted massive attention from researchers. In underwater wireless sensor network, many sensor nodes are distributed at different depths in the sea. Due to its complex nature, updating their location or adding new devices is pretty challenging. Due to the constraints on energy storage of underwater wireless sensor network end devices and the complexity of repairing or recharging the device underwater, this is highly significant to strengthen the energy performance of underwater wireless sensor network. An imbalance in power consumption can cause poor performance and a limited network lifetime. To overcome these issues, we propose a depth controlled with energy-balanced routing protocol, which will be able to adjust the depth of lower energy nodes and be able to swap the lower energy nodes with higher energy nodes to ensure consistent energy utilization. The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. The proposed model also utilized an enhanced back propagation neural network for data fusion operation, which is based on multi-hop system and also operates a highly optimized momentum technique, which helps to choose only optimum energy nodes and avoid duplicate selections that help to improve the overall energy and further reduce the quantity of data transmission. In the proposed energy-efficient routing protocol, an enhanced cluster head node is used to select a strategy that can analyze the remaining energy and directions of each participating node. In the simulation, the proposed model achieves 86.7% packet delivery ratio, 12.6% energy consumption, and 10.5% packet drop ratio over existing depth-based routing and energy-efficient depth-based routing methods for underwater wireless sensor network.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44189373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Research on privacy protection of dummy location interference for Location-Based Service location 基于位置服务位置虚拟位置干扰的隐私保护研究
IF 2.3 4区 计算机科学
International Journal of Distributed Sensor Networks Pub Date : 2022-09-01 DOI: 10.1177/15501329221125111
Ai Zhang, Xiaohui Li
{"title":"Research on privacy protection of dummy location interference for Location-Based Service location","authors":"Ai Zhang, Xiaohui Li","doi":"10.1177/15501329221125111","DOIUrl":"https://doi.org/10.1177/15501329221125111","url":null,"abstract":"Location privacy refers to the individual private and sensitive location information involved in the user’s access to location services. Achieving location privacy protection has become a hot topic of research. However, existing location privacy protection schemes are susceptible to background knowledge attack, edge information attack, and homogeneity attack, on the one hand, and strict constraint on the number of neighbors, on the other hand. To address these deficiencies, a dummy location interference privacy protection algorithm for Location-Based Service location is proposed. To begin with, the dummy location candidate set is constructed based on using WordNet structure to guarantee semantic differentiation, randomly selecting offset location, and conforming to probability similarity; next, the dummy location set is filtered out by discretizing dummy locations based on the Heron formula; finally, the secure anonymity set is constructed according to the anonymity level. Experiments show that the algorithm enhances the privacy protection strength and improves the security of location privacy. Meanwhile, the communication volume and time overhead are reduced and the practicality is boosted by taking into account the sparse and dense environment of location points.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":"18 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65535226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信