Chinese Journal of Electronics最新文献

筛选
英文 中文
Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System 队列服务推荐系统可靠公平的可信度评价协议
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.012
Hongyuan Cheng;Yining Liu;Fei Zhou;Zhiyuan Tan;Xianchao Zhang
{"title":"Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System","authors":"Hongyuan Cheng;Yining Liu;Fei Zhou;Zhiyuan Tan;Xianchao Zhang","doi":"10.23919/cje.2023.00.012","DOIUrl":"https://doi.org/10.23919/cje.2023.00.012","url":null,"abstract":"Aiming at the problems of the communication inefficiency and high energy consumption in vehicular networks, the platoon service recommendation systems (PSRS) are presented. Many schemes for evaluating the reputation of platoon head vehicles have been proposed to obtain and recommend reliable platoon head vehicles. These trustworthiness evaluation protocols for PSRS fail to achieve both reliability and fairness. We first provide a reliable trustworthiness evaluation method to ensure that the reputation level of platoon head vehicle can be calculated by cloud service provider (CSP) with the help of key agreement mechanism and truth discovery technology. The semi-trusted entity CSP may maliciously tamper with the reputation level of the platoon head vehicle. We also provide a reputation level confirmation method to ensure the fairness of trustworthiness evaluation. Formal security proof and security analysis are provided to show that our trustworthiness evaluation protocol can achieve the goals of privacy protection, reliability, fairness and resistance to several security attacks. Experiments demonstrate that this protocol can save execution time and achieve reliable and fair trustworthiness evaluation for PSRS.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"563-575"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Magnetic Shutter Mechanical Antenna for Cross-Media Communication 用于跨媒体通信的磁闸机械天线
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.132
Na Li;Yuyu Shan;Jianqiang Bao;Hongzhang Feng;Yiqun Zhang;Guo Liu
{"title":"Magnetic Shutter Mechanical Antenna for Cross-Media Communication","authors":"Na Li;Yuyu Shan;Jianqiang Bao;Hongzhang Feng;Yiqun Zhang;Guo Liu","doi":"10.23919/cje.2023.00.132","DOIUrl":"https://doi.org/10.23919/cje.2023.00.132","url":null,"abstract":"In low-frequency cross-media communication systems, traditional mechanical antennas have problems such as limiting the upper limit of operating frequency due to motor speed, waveform distortion, and limiting transmission rate due to modulation methods. Thus, we have designed a new magnetic shutter type mechanical antenna. It is designed based on the radiation equation of a rotating magnetic dipole, combined with the principle of relative motion between the magnetic dipole and the high permeability shutter material. Relying upon the rotation of the shutter structure, the magnetic field of the spherical permanent magnet array is intermittently shielded, generating a low-frequency magnetic induction signal that is multiplied by the motor speed. The entire antenna system uses a cross array of spherical permanent magnets with two evenly distributed magnetic poles and a two-dimensional signal modulation method that combines frequency modulation and amplitude modulation, so it has high radiation intensity and transmission rate in the ultra-low frequency band. Experimental results show that when the motor speed is <tex>$n$</tex> r/s (rad per second), the operating frequency of the mechanical antenna can reach 4n Hz, and the signal amplitude measured at 5 m is 50 mV, which is about 3.5 nT. Compared with the current mechanical antenna of the same volume, its signal radiation intensity is stronger.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"464-474"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unintended Interference Suppression Based on Decision Feedback Adaptive Cancellation for DSSS Satellite Communication 基于决策反馈自适应对消的DSSS卫星通信意外干扰抑制
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.398
Jiancheng Liu;Jingtao Zhang;Tian Li;Yu Zhou;Yanpeng Wang
{"title":"Unintended Interference Suppression Based on Decision Feedback Adaptive Cancellation for DSSS Satellite Communication","authors":"Jiancheng Liu;Jingtao Zhang;Tian Li;Yu Zhou;Yanpeng Wang","doi":"10.23919/cje.2023.00.398","DOIUrl":"https://doi.org/10.23919/cje.2023.00.398","url":null,"abstract":"Considering the non-spread spectrum interference in overlapping frequency domain for direct-sequence spread spectrum (DSSS) satellite communication, the unintended strong interference suppression method based on adaptive cancellation with decision feedback is proposed. Firstly, the model of adaptive cancellation with decision feedback is built by making the best of interference modulation mode and bandwidth. Secondly, the adaptive cancellation based on polynomial nonlinear reconstruction model is analyzed in theory, and the mathematical expression of interference suppression ratio is derived. Finally, the proposed method is simulated under different parameters. The theory analysis and simulation results both show that this method can achieve more than 4.5 dB transmission link processing gain to efficiently suppress the overlapping unintended interference.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"673-682"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Z-Buffer Accelerated PO Method for EM Scattering from Electrically Large Targets 一种改进的z -缓冲加速PO法用于电大目标的电磁散射
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2024.00.025
Jiangfei Bai;Shunchuan Yang;Donglin Su
{"title":"An Improved Z-Buffer Accelerated PO Method for EM Scattering from Electrically Large Targets","authors":"Jiangfei Bai;Shunchuan Yang;Donglin Su","doi":"10.23919/cje.2024.00.025","DOIUrl":"https://doi.org/10.23919/cje.2024.00.025","url":null,"abstract":"The physical optics (PO) method is widely used to solve the electromagnetic (EM) scattering problems involving electrically large structures, in which each surface element is required to determine whether it is blocked by others. It may suffer from the computational efficiency issue due to elementwise shadowing testing. In this paper, an efficient Z-buffer based shadowing testing method is proposed to accelerate this procedure. In this method, all triangular facets are first mapped to a grid plane using the Z-buffer method, and for each grid cell, all projected triangles that intersect it are recorded. Then, rigorous shadowing testing is made for all facets recorded in the grid where the centroid of each triangle is projected. It can avoid a large number of redundant operations for pairs of triangles with no occlusion relation, which leads to the same accuracy as the traditional rigorous shadowing testing method while significantly inproving efficiency. Four numerical examples are carried out to validate its accuracy and efficiency.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"475-482"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Evolution with Perturbation Estimation Strategy for Multiobjective Optimization 多目标优化的微扰估计差分进化
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.322
Shuai Wang;Aimin Zhou;Yi Zhang
{"title":"Differential Evolution with Perturbation Estimation Strategy for Multiobjective Optimization","authors":"Shuai Wang;Aimin Zhou;Yi Zhang","doi":"10.23919/cje.2023.00.322","DOIUrl":"https://doi.org/10.23919/cje.2023.00.322","url":null,"abstract":"In recent years, multiobjective differential evolution (DE) algorithms have gained significant attention due to their effective search capabilities for multiobjective optimization problems. The differential mutations of DE operators distinguish them from other generators. However, the efficiency of DE operators heavily relies on the selection of parents used to generate differential perturbation vectors. To address this challenge, this work proposes a novel algorithm, called perturbation estimation strategy based DE algorithm (PESDE), for multiobjective optimization. In PESDE, at each iteration, it utilizes a clustering approach to partition the population, and then constructs a probability model to estimate the distributions of differential perturbation vectors of the solutions within a cluster. Specifically, the differential perturbation vectors of solutions are regarded as trial points in building a probability model in the proposed approach. In this way, perturbation vectors are sampled from the built probability model, and then embedded in the solutions to generate new trial solutions. Empirical experimental studies are conducted to investigate the performance of PESDE by comparing it with five representative multiobjective evolutionary algorithms on several test instances with complicated Pareto set and front shapes. The results demonstrated the advantages of the proposed algorithm over other approaches.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"871-880"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saliency Map Construction for Adversarial Image Steganography 对抗图像隐写的显著性映射构造
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2024.00.090
Junfeng Zhao;Shen Wang;Fanghui Sun
{"title":"Saliency Map Construction for Adversarial Image Steganography","authors":"Junfeng Zhao;Shen Wang;Fanghui Sun","doi":"10.23919/cje.2024.00.090","DOIUrl":"https://doi.org/10.23919/cje.2024.00.090","url":null,"abstract":"Adversarial image steganography can fool the targeted convolutional neural network (CNN)-based steg-analyzers, thereby improving the security performance. Despite the fact that existing works have achieved great success, there are still some limitations that make it difficult to exploit their potentiality, including the issue that selecting a final stego from the candidate stegos cannot perfectly help them fool the targeted steganalyzers. Since the trade-off between gradient and embedding cost has not been thoroughly investigated, this may simplify the design of more effective methods. In this article, we design a new model to score each image element in a cover by utilizing this trade-off, and a saliency map is constructed to represent the scores of the image. Based on the above, a simple and efficient scheme called SAL is presented. It selects the elements from the map according to the amplitudes of the scores, and their costs are updated based on the signs of the corresponding gradients. Finally, data embedding is accomplished with the new costs to generate an adversarial stego. Extensive experiments illustrate that SAL can achieve better security performance than state-of-the-art methods under different targeted CNN-based steganalyzers in both spatial and JPEG domains.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"816-827"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing Efficiency and Personalization in Federated Learning via Blockwise Knowledge Distillation 基于块知识蒸馏的联邦学习效率与个性化的平衡
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.424
Ilyas Bayanbayev;Hongjian Shi;Ruhui Ma
{"title":"Balancing Efficiency and Personalization in Federated Learning via Blockwise Knowledge Distillation","authors":"Ilyas Bayanbayev;Hongjian Shi;Ruhui Ma","doi":"10.23919/cje.2023.00.424","DOIUrl":"https://doi.org/10.23919/cje.2023.00.424","url":null,"abstract":"Dear Editor, Federated learning (FL) has emerged as a pivotal approach in distributed machine learning, allowing models to be trained across decentralized data sources while maintaining privacy [1], [2]. However, FL faces significant challenges, particularly in balancing personalization, privacy, and computational efficiency, especially when deployed in heterogeneous environments with varied client capabilities [3]. To address these challenges, we introduce FedBW, a novel framework that integrates FL with blockwise knowledge distillation.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"1006-1008"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-Based Blind Signature Scheme with Message Recovery Over SM9 SM9上基于身份的消息恢复盲签名方案
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.397
Yatao Yang;Yanfeng Qiu;Jingpei Cao;Song Xiao
{"title":"Identity-Based Blind Signature Scheme with Message Recovery Over SM9","authors":"Yatao Yang;Yanfeng Qiu;Jingpei Cao;Song Xiao","doi":"10.23919/cje.2023.00.397","DOIUrl":"https://doi.org/10.23919/cje.2023.00.397","url":null,"abstract":"The current blind signature scheme over SM9 demands substantial resources for practical implementation. To address this issue, a novel identity-based blind signature scheme with message recovery over SM9 is proposed by combining message recovery technology, hiding the message in the signature to reduce the transmission band-width for the signature information. The security of this scheme is analyzed by using the provable security method. And it is proven that this scheme achieves existential unforgeability under chosen-message and identity attack (EUF-CMIA) security, and the blindness can be guaranteed. Through testing and analysis, at the clock frequency of 500 MHz, our scheme requires 6.128 ms for each signature after initialization, which is faster than existing identity-based message recovery blind signature algorithms. The scheme reduces the transmission bandwidth to 75.6% compared to the normal SM9 signature algorithm. Compared with other existing SM9 blind signature schemes, this scheme has lower data transmission volume, reduces bandwidth resource consumption, and offers promising applications in bandwidth-limited environments.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"510-519"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulation Research on Conducted Immunity of Function Module of the Digital Control Circuit Based on RFI 基于RFI的数字控制电路功能模块传导抗扰度建模与仿真研究
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.350
Yang Xiao;Zhongyuan Zhou;Haichun Wang;Shikuan Liu
{"title":"Modeling and Simulation Research on Conducted Immunity of Function Module of the Digital Control Circuit Based on RFI","authors":"Yang Xiao;Zhongyuan Zhou;Haichun Wang;Shikuan Liu","doi":"10.23919/cje.2023.00.350","DOIUrl":"https://doi.org/10.23919/cje.2023.00.350","url":null,"abstract":"The research status of the digital control circuit chip level and system level electromagnetic immunity is analyzed in this article firstly. Secondly, a set of device for the digital control circuit based on advanced reduced instruciton set computer (RISC) machine is developed. The impedance of the components on the coupling path of the modules is extracted and the equivalent circuit is established. Based on the integrated circuits immunity model-conducted immunity (ICIM-CI), the behavior level modeling and simulation of the power module and input/output (IO) module are carried out using the IC-EMC software. The direct power injection method based on radio frequency interference (RFI) is used to test the interference immunity of the modules, and the failure mode and sensitivity threshold of the digital control circuit is obtained. The RFI based immunity modeling and simulation models for the power module and IO module are validated through simulation and testing comparison using the “board level-chip level” modeling and simulation method. The immunity of the power module is not only related to the low-dropout regulator power chip, but also to the peripheral circuit of the power module. The simulation research of IO module immunity considers the actual working mode of IO chip pins and calculates the IO pin response under actual working conditions. The method has a certain value to study the coupling mechanism of the conducted interference.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"429-443"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imperceptible Audio Watermarking with Local Invariant Points and Adaptive Embedding Strength 基于局部不变量点和自适应嵌入强度的不可察觉音频水印
IF 1.6 4区 计算机科学
Chinese Journal of Electronics Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.356
Shiqiang Wu;Hu Guan;Jie Liu;Zhi Zeng;Ying Huang;Shuwu Zhang
{"title":"Imperceptible Audio Watermarking with Local Invariant Points and Adaptive Embedding Strength","authors":"Shiqiang Wu;Hu Guan;Jie Liu;Zhi Zeng;Ying Huang;Shuwu Zhang","doi":"10.23919/cje.2023.00.356","DOIUrl":"https://doi.org/10.23919/cje.2023.00.356","url":null,"abstract":"Audio watermarking is a promising technique for copyright protection of audio data. The existing audio watermarking algorithms cannot satisfy requirements on imperceptibility, embedding capacity, and robustness, especially against desynchronization attacks, such as cropping, jittering, and time-scale modification. This paper proposes a novel audio watermarking algorithm based on local invariant points and adaptive embedding strength (LIPAS). We consider one feature robust to desynchronization attacks, i.e., local invariant points, and use these invariant points as positional references for the embedding regions. An adaptive embedding strength strategy is proposed to enhance the imperceptibility of the watermark and ensure robustness. The watermarks are embedded into the audio vectors using a polarity adjustment method. The effectiveness, imperceptibility, and robustness of the LIPAS algorithm were demonstrated in the experiments.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"495-509"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信