Annals of Telecommunications最新文献

筛选
英文 中文
Towards greener digital infrastructures for ICT and vertical markets 为信息通信技术和垂直市场打造更环保的数字基础设施
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-06-13 DOI: 10.1007/s12243-023-00961-y
Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel
{"title":"Towards greener digital infrastructures for ICT and vertical markets","authors":"Dominique Chiaroni,&nbsp;Raffaele Luca Amalfi,&nbsp;Jos George,&nbsp;Maximilian Riegel","doi":"10.1007/s12243-023-00961-y","DOIUrl":"10.1007/s12243-023-00961-y","url":null,"abstract":"<div><p>One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO<sub>2</sub> reduction since energy consumption and emission of CO<sub>2</sub> are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO<sub>2</sub>. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"255 - 275"},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50477759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust adaptive beamforming algorithm for coherent signals based on virtual array 基于虚拟阵列的相干信号鲁棒自适应波束形成算法
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-06-12 DOI: 10.1007/s12243-023-00966-7
Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba
{"title":"Robust adaptive beamforming algorithm for coherent signals based on virtual array","authors":"Yuxi Du,&nbsp;Weijia Cui,&nbsp;Fengtong Mei,&nbsp;Chunxiao Jian,&nbsp;Bin Ba","doi":"10.1007/s12243-023-00966-7","DOIUrl":"10.1007/s12243-023-00966-7","url":null,"abstract":"<div><p>Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"641 - 651"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50475666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact 特刊简介:5+G网络能耗、能效与环境影响
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-06-12 DOI: 10.1007/s12243-023-00967-6
Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki
{"title":"Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact","authors":"Cédric Ware,&nbsp;Marceau Coupechoux,&nbsp;Ekram Hossain,&nbsp;Carmen Mas-Machuca,&nbsp;Vinod Sharma,&nbsp;Anna Tzanakaki","doi":"10.1007/s12243-023-00967-6","DOIUrl":"10.1007/s12243-023-00967-6","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"249 - 251"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50474537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telephony speech system performance based on the codec effect 基于编解码器效应的电话语音系统性能
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-05-31 DOI: 10.1007/s12243-023-00968-5
Mohamed Hamidi, Ouissam Zealouk, Hassan Satori
{"title":"Telephony speech system performance based on the codec effect","authors":"Mohamed Hamidi,&nbsp;Ouissam Zealouk,&nbsp;Hassan Satori","doi":"10.1007/s12243-023-00968-5","DOIUrl":"10.1007/s12243-023-00968-5","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"617 - 625"},"PeriodicalIF":1.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50529706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system 基于 SHAKE-ESDRL 的高能效入侵检测和散列系统
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-05-31 DOI: 10.1007/s12243-023-00963-w
Geo Francis E, S. Sheeja
{"title":"SHAKE-ESDRL-based energy efficient intrusion detection and hashing system","authors":"Geo Francis E,&nbsp;S. Sheeja","doi":"10.1007/s12243-023-00963-w","DOIUrl":"10.1007/s12243-023-00963-w","url":null,"abstract":"<div><p>Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"381 - 396"},"PeriodicalIF":1.8,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72509855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain 基于联盟区块链的LSSS访问结构的属性加密
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-05-18 DOI: 10.1007/s12243-023-00949-8
Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li
{"title":"Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain","authors":"Shengzhou Hu,&nbsp;Tingting Zhong,&nbsp;Hua He,&nbsp;Wenhao Li","doi":"10.1007/s12243-023-00949-8","DOIUrl":"10.1007/s12243-023-00949-8","url":null,"abstract":"<div><p>Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can effectively solve the one-to-many encryption and decryption problem in open cloud application. Linear secret sharing scheme (LSSS) is the common access structure with a matrix on the attributes in ABE schemes, which may depict AND, OR, threshold operations, etc. However, LSSS access structure does not depict the complex and dynamic access policy of attributes, such as the complicated relationship of different attributes and the generation of dynamic attributes. It severely restricts the expansion of the practical application of ABE. Besides, there exists another problem; attribute authority (AA) in traditional ABE has a concentration of power and easily suffers from single-point failure or privacy leakage for being attacked or corrupted. Blockchain is a decentralized, tamper-free, traceable, and multi-party distributed database technology. Consortium blockchain (CB) is a partially centralized blockchain, whose openness is between the public blockchain and the private blockchain. In this paper, an ABE scheme on LSSS access structure with expressive dynamic attributes (EDA) based on CB (LSSS-EDA-ABE-CB) was proposed to resolve the above issues. EDA can construct the comprehensive attribute calculation expressions by conducting various operations, such as arithmetic operations, relational operations, and string operations. In virtue of the application of EDA, the proposed scheme can reconstruct new composite attributes to realize the dynamic adjustment of attributes. A partitioning method of EDA avoids one attribute appearing in two different EDA expressions. The CB technology enhanced the authority and trustworthiness of AA by openly recording AA’s attribute key distributions in CB transactions. The scheme in the paper was proven CPA-secure under the decision q-PBDHE assumption in standard model in the CB application environment. The scheme provides a more general data access policy and maintains the fine-grained character of ABE simultaneously. Finally, the security and performance analysis shows that the proposed scheme is secure and highly efficient.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"509 - 524"},"PeriodicalIF":1.9,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50494392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backscatter communication system efficiency with diffusing surfaces 具有散射表面的后向散射通信系统效率
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-05-11 DOI: 10.1007/s12243-023-00955-w
Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak, Orange Innovation/Networks
{"title":"Backscatter communication system efficiency with diffusing surfaces","authors":"Jean-Marc Kelif,&nbsp;Dinh-Thuy Phan-Huy,&nbsp;Philippe Ratajczak,&nbsp;Orange Innovation/Networks","doi":"10.1007/s12243-023-00955-w","DOIUrl":"10.1007/s12243-023-00955-w","url":null,"abstract":"<div><p>In an ambient backscatter communication system, the waves generated by a source are reflected by a tag, in a variable manner in time. Therefore, the tag can transmit a message to a reader, without generating any radio wave and without battery. As a consequence, such a communication system is a promising technology for ultra-low energy wireless communications. In the simplest implementation of such a system, the tag sends a binary message by oscillating between two states and the reader detects the bits by comparing the two distinct received powers. In this paper, for the first time, we propose to analyze the impact of the shape of diffusing flat panel surfaces that diffuse in all directions, on an ambient backscatter communication system. We establish the analytical closed form expression of the power contrast in the presence of flat panels, by considering a rectangular surface and a disk-shaped surface, and we show that diffusing surfaces improve the power contrast. Moreover, our approach allows us to express the contrast to noise ratio, and therefore to establish the BER performance. Furthermore, we show that it makes it possible to improve the energetic performance, thanks to diffusing surfaces. For any configuration characterized by a fixed source, tag and reader, we moreover determine the precise locations of diffusing surfaces, which induce a maximum efficiency of the surfaces, whatever the wavelength. Furthermore, we show that it becomes possible to easily determine an optimal frequency which maximizes the contrast power, thanks to the expression of the contrast power.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"561 - 576"},"PeriodicalIF":1.9,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50472317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social network malicious insider detection using time-based trust evaluation 基于时间信任评估的社交网络内部恶意检测
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-04-24 DOI: 10.1007/s12243-023-00959-6
T. Nathezhtha, D. Sangeetha, V. Vaidehi
{"title":"Social network malicious insider detection using time-based trust evaluation","authors":"T. Nathezhtha,&nbsp;D. Sangeetha,&nbsp;V. Vaidehi","doi":"10.1007/s12243-023-00959-6","DOIUrl":"10.1007/s12243-023-00959-6","url":null,"abstract":"<div><p>In recent years, malicious insider attacks have become a common fraudulent activity in which an attacker is often perceived as a trusted entity in Social Networks (SNs). At present, machine learning (ML) approaches are widely used to identify the behavior of users in the network. From this perspective, this paper presents an integrated approach, namely, Social network malicious insider detection (SID), which consists of long short-term memory (LSTM) and time-based trust evaluation (TBTE). The proposed SID aims to identify deviations in SN user behavior by monitoring their data. The proposed SID uses LSTM, an advanced version of the recurrent neural network (RNN), which precisely predicts the behavior of users and identifies the anomaly pattern in SNs. A time-based trust evaluation method is integrated with LSTM, which not only differentiates the abnormal behavior of SN users but also precisely categorizes an anomaly node as a malicious node, a new user or a broken node. Moreover, the proposed SID detects insiders accurately and reduces false alarms by providing a novel quantitative analysis for computing the balancing factor according to time, which avoids the misinterpretation of normal user patterns as anomalies. The performance of the proposed SID is evaluated in real time, which demonstrates that the detection accuracy for attacks is 96% for normal users and 98% for new users with a smaller time span.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"585 - 597"},"PeriodicalIF":1.9,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00959-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50509323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modular pipeline for enforcement of security properties at runtime 用于在运行时强制执行安全属性的模块化管道
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-04-17 DOI: 10.1007/s12243-023-00952-z
Rania Taleb, Sylvain Hallé, Raphaël Khoury
{"title":"A modular pipeline for enforcement of security properties at runtime","authors":"Rania Taleb,&nbsp;Sylvain Hallé,&nbsp;Raphaël Khoury","doi":"10.1007/s12243-023-00952-z","DOIUrl":"10.1007/s12243-023-00952-z","url":null,"abstract":"<div><p>Runtime enforcement ensures the respect of a user-specified security policy by a program by providing a valid replacement for any misbehaving sequence of events that may occur during that program’s execution. However, depending on the capabilities of the enforcement mechanism, multiple possible replacement sequences may be available, and the current literature is silent on the question of how to choose the optimal one. Furthermore, the current design of runtime monitors imposes a substantial burden on the designer, since the entirety of the monitoring task is accomplished by a monolithic construct, usually an automata-based model. In this paper, we propose a new modular model of enforcement monitors, in which the tasks of altering the execution, ensuring compliance with the security policy, and selecting the optimal replacement are split into three separate modules, which simplifies the creation of runtime monitors. We implement this approach by using the event stream processor BeepBeep and a use case is presented. Experimental evaluation shows that our proposed framework can dynamically select an adequate enforcement actions at runtime, without the need to manually define an enforcement monitor.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"429 - 457"},"PeriodicalIF":1.9,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00952-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk 相干WDM接收系统中检测分量串扰QPSK信号的信噪比惩罚分析
IF 1.9 4区 计算机科学
Annals of Telecommunications Pub Date : 2023-04-03 DOI: 10.1007/s12243-023-00958-7
Pinakpani Mukherjee, Santu Sarkar, Nikhil R. Das
{"title":"Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk","authors":"Pinakpani Mukherjee,&nbsp;Santu Sarkar,&nbsp;Nikhil R. Das","doi":"10.1007/s12243-023-00958-7","DOIUrl":"10.1007/s12243-023-00958-7","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>We propose analytical modelling of component crosstalk on the performance of wavelength division multiplexed (WDM) receiver with generalized quadrature phase shift keying (QPSK) signal and coherent detection. A comprehensive study on the signal-to-noise ratio (SNR) penalty is conducted, which can be used to balance SNR values and the system's power budget in the presence of finite crosstalk sources. Results express that, in the presence of five crosstalk interferers, the crosstalk level leading to 1-dB of SNR penalty must be less than -23.8 to -26.5 dB for bit error rate (BER) from 10<sup>–7</sup> to 10<sup>–13</sup>. For the BER of 10<sup>–9</sup>, the QPSK signal has a component crosstalk tolerance of -21.7 dB for a 1 dB SNR penalty with a single interferer. Furthermore, the study of spectral efficiency reveals that crosstalk level, SNR, and the number of active interferers perform a vital role in determining the bandwidth efficiency of the system. The analysis exploits the characteristic function method and Maclaurin series expansion to compute a closed form expression of BER over additive white Gaussian noise (AWGN) channel. Following the analysis, the SNR and bandwidth expenses of the system are examined numerically through the estimated BER and binary entropy function. The estimated values of the BER using the proposed model are in close agreement with a similar theoretical investigation for a single interferer.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"577 - 584"},"PeriodicalIF":1.9,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50443612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信