Future Internet最新文献

筛选
英文 中文
Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing 利用混合模拟退火法进行连续空间无线通信塔选址
Future Internet Pub Date : 2024-03-29 DOI: 10.3390/fi16040117
Maolin Tang, Wei Li
{"title":"Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing","authors":"Maolin Tang, Wei Li","doi":"10.3390/fi16040117","DOIUrl":"https://doi.org/10.3390/fi16040117","url":null,"abstract":"Wireless communication tower placement arises in many real-world applications. This paper investigates a new emerging wireless communication tower placement problem, namely, continuous space wireless communication tower placement. Unlike existing wireless communication tower placement problems, which are discrete computational problems, this new wireless communication tower placement problem is a continuous space computational problem. In this paper, we formulate the new wireless communication tower placement problem and propose a hybrid simulated annealing algorithm that can take advantage of the powerful exploration capacity of simulated annealing and the strong exploitation capacity of a local optimization procedure. We also demonstrate through experiments the effectiveness of this hybridization technique and the good performance and scalability of the hybrid simulated annulling in this paper.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140367975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking NeXtFusion:基于注意力的摄像头-雷达融合网络,用于改进三维物体检测和跟踪
Future Internet Pub Date : 2024-03-28 DOI: 10.3390/fi16040114
Priyank Kalgaonkar, Mohamed El-Sharkawy
{"title":"NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking","authors":"Priyank Kalgaonkar, Mohamed El-Sharkawy","doi":"10.3390/fi16040114","DOIUrl":"https://doi.org/10.3390/fi16040114","url":null,"abstract":"Accurate perception is crucial for autonomous vehicles (AVs) to navigate safely, especially in adverse weather and lighting conditions where single-sensor networks (e.g., cameras or radar) struggle with reduced maneuverability and unrecognizable targets. Deep Camera-Radar fusion neural networks offer a promising solution for reliable AV perception under any weather and lighting conditions. Cameras provide rich semantic information, while radars act like an X-ray vision, piercing through fog and darkness. This work proposes a novel, efficient Camera-Radar fusion network called NeXtFusion for robust AV perception with an improvement in object detection accuracy and tracking. Our proposed approach of utilizing an attention module enhances crucial feature representation for object detection while minimizing information loss from multi-modal data. Extensive experiments on the challenging nuScenes dataset demonstrate NeXtFusion’s superior performance in detecting small and distant objects compared to other methods. Notably, NeXtFusion achieves the highest mAP score (0.473) on the nuScenes validation set, outperforming competitors like OFT (35.1% improvement) and MonoDIS (9.5% improvement). Additionally, NeXtFusion demonstrates strong performance in other metrics like mATE (0.449) and mAOE (0.534), highlighting its overall effectiveness in 3D object detection. Furthermore, visualizations of nuScenes data processed by NeXtFusion further demonstrate its capability to handle diverse real-world scenarios. These results suggest that NeXtFusion is a promising deep fusion network for improving AV perception and safety for autonomous driving.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140372148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning 基于深度学习的区块链交易隐私保护方法研究
Future Internet Pub Date : 2024-03-28 DOI: 10.3390/fi16040113
Jun Li, Chenyang Zhang, Jianyi Zhang, Yanhua Shao
{"title":"Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning","authors":"Jun Li, Chenyang Zhang, Jianyi Zhang, Yanhua Shao","doi":"10.3390/fi16040113","DOIUrl":"https://doi.org/10.3390/fi16040113","url":null,"abstract":"To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction information, but also achieves regulatory capabilities at both macro and micro levels, ensuring the verification of the legality of transactions. By adopting an identity-based encryption system, regulatory bodies can conduct personalized supervision of blockchain transactions without storing users’ actual identities and key data, significantly reducing storage computation and key management burdens. Our scheme is independent of any particular consensus mechanism and can be applied to current blockchain technologies. Simulation experiments and complexity analysis demonstrate the practicality of the scheme.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140369467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning 探索用于 6G 最后一米连接的通用滤波多载波波形:一种以路灯为驱动力的方法,带有用于物联网应用尺寸确定的增强型模拟器
Future Internet Pub Date : 2024-03-26 DOI: 10.3390/fi16040112
Véronique Georlette, Anne-Carole Honfoga, M. Dossou, V. Moeyaert
{"title":"Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning","authors":"Véronique Georlette, Anne-Carole Honfoga, M. Dossou, V. Moeyaert","doi":"10.3390/fi16040112","DOIUrl":"https://doi.org/10.3390/fi16040112","url":null,"abstract":"In the dynamic landscape of 6G and smart cities, visible light communication (VLC) assumes critical significance for Internet of Things (IoT) applications spanning diverse sectors. The escalating demand for bandwidth and data underscores the need for innovative solutions, positioning VLC as a complementary technology within the electromagnetic spectrum. This paper focuses on the relevance of VLC in the 6G paradigm, shedding light on its applicability across smart cities and industries. The paper highlights the growing efficiency of lighting LEDs in infrastructure, facilitating the seamless integration of VLC. The study then emphasizes VLC’s robustness in outdoor settings, demonstrating effective communication up to 10 m. This resilience positions VLC as a key player in addressing the very last meter of wireless communication, offering a seamless solution for IoT connectivity. By introducing a freely available open-source simulator combined with an alternative waveform, UFMC, the study empowers researchers to dimension applications effectively, showcasing VLC’s potential to improve wireless communication in the evolving landscape of 6G and smart cities.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140378712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions 将 V2X 通信要求映射到高度自动化和自主车辆功能的方法
Future Internet Pub Date : 2024-03-25 DOI: 10.3390/fi16040108
Árpád Takács, T. Haidegger
{"title":"A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions","authors":"Árpád Takács, T. Haidegger","doi":"10.3390/fi16040108","DOIUrl":"https://doi.org/10.3390/fi16040108","url":null,"abstract":"The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as a safety-redundant component in automated driving systems. This article aims to systematically assess the requirements towards V2X input data to highly automated and autonomous systems that can individually, or in combination with other sensors, enable certain levels of autonomy. It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments, and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity. The findings provide valuable insights for the development, deployment and regulation of V2X-enabled automated systems, ultimately contributing to enhanced road safety and efficient mobility.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140382887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud 新颖的边缘平台可简化现代边缘设备与云之间的连接
Future Internet Pub Date : 2024-03-25 DOI: 10.3390/fi16040111
A. Carvalho, Daniel Riordan, Joseph Walsh
{"title":"A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud","authors":"A. Carvalho, Daniel Riordan, Joseph Walsh","doi":"10.3390/fi16040111","DOIUrl":"https://doi.org/10.3390/fi16040111","url":null,"abstract":"This study presents a newly developed edge computing platform designed to enhance connectivity between edge devices and the cloud in the agricultural sector. Addressing the challenge of synchronizing a central database across 850 remote farm locations in various countries, the focus lies on maintaining data integrity and consistency for effective farm management. The incorporation of a new edge device into existing setups has significantly improved computational capabilities for tasks like data synchronization and machine learning. This research highlights the critical role of cloud computing in managing large data volumes, with Amazon Web Services hosting the databases. This paper showcases an integrated architecture combining edge devices, networks, and cloud computing, forming a seamless continuum of services from cloud to edge. This approach proves effective in managing the significant data volumes generated in remote agricultural areas. This paper also introduces the PAIR Mechanism, which is a solution developed in response to the unique challenges of agricultural data management, emphasizing resilience and simplicity in data synchronization between cloud and edge databases. The PAIR Mechanism’s potential for robust data management in IoT and cloud environments is explored, offering a novel perspective on synchronization challenges in edge computing.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140382367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Security Using Fine-Grained Efficient Information Flow Tracking 利用细粒度高效信息流跟踪实现云安全
Future Internet Pub Date : 2024-03-25 DOI: 10.3390/fi16040110
Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon
{"title":"Cloud Security Using Fine-Grained Efficient Information Flow Tracking","authors":"Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon","doi":"10.3390/fi16040110","DOIUrl":"https://doi.org/10.3390/fi16040110","url":null,"abstract":"This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data t","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140384761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks MOLM:在低地轨道卫星网络中通过基于多目标模拟退火的负载平衡路由缓解拥塞问题
Future Internet Pub Date : 2024-03-25 DOI: 10.3390/fi16040109
Yihu Zhou, Haiming Chen, Zhibin Dou
{"title":"MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks","authors":"Yihu Zhou, Haiming Chen, Zhibin Dou","doi":"10.3390/fi16040109","DOIUrl":"https://doi.org/10.3390/fi16040109","url":null,"abstract":"In satellite networks, existing congestion resolution methods do not consider the predictability and stability of paths, leading to frequent path switches and high maintenance costs. In this regard, we propose a novel congestion resolution approach, named MOLM, which introduces a continuous neighbor set during path updates. This set includes nodes capable of establishing sustainable connections with the predecessors and successors of congested nodes. Combined with a multi-objective simulated annealing framework, MOLM iteratively derives an optimal selection from this set to replace congested nodes. Additionally, we employ a Fast Reroute mechanism based on backup paths (FRR-BP) to address node failures. The simulation results indicate that the optimal node endows the new path with optimal path stability and path latency.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140381498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC 优化混合 V2X 通信:使用 5G、C-V2X PC5 和 DSRC 的智能技术选择算法
Future Internet Pub Date : 2024-03-23 DOI: 10.3390/fi16040107
Ihtisham Khalid, Vasilis Maglogiannis, D. Naudts, A. Shahid, Ingrid Moerman
{"title":"Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC","authors":"Ihtisham Khalid, Vasilis Maglogiannis, D. Naudts, A. Shahid, Ingrid Moerman","doi":"10.3390/fi16040107","DOIUrl":"https://doi.org/10.3390/fi16040107","url":null,"abstract":"Cooperative communications advancements in Vehicular-to-Everything (V2X) are bolstering the autonomous driving paradigm. V2X nodes are connected through communication technology, such as a short-range communication mode (Dedicated Short Range Communication (DSRC) and Cellular-V2X) or a long-range communication mode (Uu). Conventional vehicular networks employ static wireless vehicular communication technology without considering the traffic load on any individual V2X communication technology and the traffic dynamics in the vicinity of the V2X node, and are hence inefficient. In this study, we investigate hybrid V2X communication and propose an autonomous and intelligent technology selection algorithm using a decision tree. The algorithm uses the information from the received Cooperative Intelligent Transport Systems (C-ITS) Cooperative Awareness Messages (CAMs) to collect statistics such as inter vehicular distance, one-way end-to-end latency and CAM density. These statistics are then used as input for the decision tree for selecting the appropriate technology (DSRC, C-V2X PC5 or 5G) for the subsequent scheduled C-ITS message transmission. The assessment of the intelligent hybrid V2X algorithm’s performance in our V2X test setup demonstrates enhancements in one-way end-to-end latency, reliability, and packet delivery rate when contrasted with the conventional utilization of static technology.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140386451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications 人工智能与物联网交汇带来的安全威胁和有前途的解决方案:IoMT 和 IoET 应用研究
Future Internet Pub Date : 2024-02-29 DOI: 10.3390/fi16030085
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, A. Abdelmoniem, Mona Jaber
{"title":"Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications","authors":"Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, A. Abdelmoniem, Mona Jaber","doi":"10.3390/fi16030085","DOIUrl":"https://doi.org/10.3390/fi16030085","url":null,"abstract":"The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140415851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信