Telecommunication Systems最新文献

筛选
英文 中文
Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices 基于车辆移动性的 LSTM 下一小区预测,用于 5G mc-IoT 切片
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-09-16 DOI: 10.1007/s11235-024-01214-6
Asma Belhadj, Karim Akilal, Siham Bouchelaghem, Mawloud Omar, Sofiane Aissani
{"title":"Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices","authors":"Asma Belhadj, Karim Akilal, Siham Bouchelaghem, Mawloud Omar, Sofiane Aissani","doi":"10.1007/s11235-024-01214-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01214-6","url":null,"abstract":"<p>Network slicing is one 5G network enabler that may be used to enhance the requirements of mission-critical Machine Type Communications (mcMTC) in critical IoT applications. But, in applications with high mobility support, the network slicing will also be influenced by users’ movement, which is necessary to handle the dynamicity of the system, especially for critical slices that require fast and reliable delivery from End to End (E2E). To fulfill the desired service quality (QoS) of critical slices due to their users’ movement. This paper presents mobility awareness for such types of applications through mobility prediction, in which the network can determine which cell the user is in near real-time. Furthermore, the proposed next-cell mobility prediction framework is developed as a multi-classification task, where we exploited Long Short-Term Memory (LSTM) and the collected historical mobility profiles of moving users to allow more accurate short- and long-term predictions of the candidate next-cell. Then, within the scope of high mobility mission-critical use cases, we evaluate the effectiveness of the proposed LSTM classifier in vehicular networks. We have used a real vehicle mobility dataset that is obtained from SUMO deployed in Bejaia, Algeria urban environment. Ultimately, we conducted a set of experiments on the classifier using datasets with various history lengths, and the results have validated the effectiveness of the performed predictions on short-term mobility prediction. Our experiments show that the proposed classifier performs better on longer history datasets. While compared to traditional Machine Learning (ML) algorithms used for classification, the proposed LSTM model outperformed ML methods with the best accurate prediction results.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142266679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure positioning of wireless sensor networks against wormhole attacks 针对虫洞攻击的无线传感器网络安全定位
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-09-16 DOI: 10.1007/s11235-024-01213-7
Xiuwu Yu, Xun Wang, Yong Liu
{"title":"Secure positioning of wireless sensor networks against wormhole attacks","authors":"Xiuwu Yu, Xun Wang, Yong Liu","doi":"10.1007/s11235-024-01213-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01213-7","url":null,"abstract":"<p>In wireless sensor networks, the location of nodes is closely related to all tasks, so the accuracy and security of node localization are highly required. The core of the DV-HOP algorithm is based on the number of hops between nodes for localization, but wormhole attacks replay information through wormholes, and this attack greatly affects the parameter hop count. To address this security flaw, the DV-HOP algorithm is improved by first detecting the presence of wormhole attacks based on the communication characteristics between nodes, then the affected beacon nodes use a correction formula to fix the incorrect hop count information and transmit the correct information again, and finally the sensor nodes further evaluate and determine the location of the wormhole connection to prevent it in subsequent applications. Through experimental simulations, the proposed method improves the average localization accuracy by about 51.3 and 12.7<span>(%)</span>, respectively, compared with the DV-HOP and LBDV algorithms without security improvements, which confirms that the proposed method is robust to wormhole attacks and reduces the localization errors affected by wormhole attacks.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142266680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution 保护健康物联网:进步、挑战和基于信任的解决方案
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-09-11 DOI: 10.1007/s11235-024-01211-9
Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain, Mantisha Gupta, Zeenat Zahra
{"title":"Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution","authors":"Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain, Mantisha Gupta, Zeenat Zahra","doi":"10.1007/s11235-024-01211-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01211-9","url":null,"abstract":"<p>The applications of IoHT have adapted a lot of contemplation as a result of recent IoT (Internet of Things) advancements. Irrespective of several fields in IoHT such as remote medical professional assistance, history of health-charting, integrated care management, decreased cost, disease management, disability management, home care management, individual healthcare assistance, health tracking, drug availability management, healthcare tracking management, and telesurgery. The evolvement in the field of the IoHT network has shown a drastic advancement in the standard of living. Despite the numerous fields of application in the IoHT network, the balance of security and privacy is one of the most pressing problems as far as life-critical solutions are concerned. There are several solutions to maintain security in the IoHT network. The most recent security enhancement schemes in the IoHT have been addressed in this paper. Furthermore, the latest possible challenges in the IoHT network are discussed. Moreover, an extensive survey on future research directions in the field of IoHT network security is illustrated. Additionally, we have proposed a security architecture based on trust assessment for IoHT systems to ameliorate the security of the network. The trust assessment is based on the artificial intelligence mechanism such that the security of the IoHT network is enhanced adaptively. This paper presents a novel IoHT security framework that integrates trust evaluation to dynamically address security challenges. It offers practical solutions for applications like telesurgery by adjusting measures based on real-time trust assessments, setting a new standard in IoHT security and guiding future research.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized task offloading for federated learning based on β-skeleton graph in edge computing 基于边缘计算中的β骨架图,优化联合学习的任务卸载
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-09-09 DOI: 10.1007/s11235-024-01216-4
Mahdi Fallah, Pedram Salehpour
{"title":"Optimized task offloading for federated learning based on β-skeleton graph in edge computing","authors":"Mahdi Fallah, Pedram Salehpour","doi":"10.1007/s11235-024-01216-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01216-4","url":null,"abstract":"<p>Edge computing is gaining prominence as a solution for IoT data management and processing. Task offloading, which distributes the processing load across edge devices, is a key strategy to enhance the efficiency of edge computing. However, traditional methods often overlook the dynamic nature of the edge environment and the interactions between devices. While reinforcement learning-based task offloading shows promise, it can sometimes lead to an imbalance by favoring weaker servers. To address these issues, this paper presents a novel task offloading method for federated learning that leverages the β-skeleton graph in edge computing. This model takes into account spatial and temporal dynamics, optimizing task assignments based on both the processing and communication capabilities of the edge devices. The proposed method significantly outperforms five state-of-the-art methods, showcasing substantial improvements in both initial and long-term performance. Specifically, this method demonstrates a 63.46% improvement over the Binary-SPF-EC method in the initial rounds and achieves an average improvement of 76.518% after 400 rounds. Moreover, it excels in sub-rewards and total latency reduction, underscoring its effectiveness in optimizing edge computing communication and processing tasks. These results underscore the superiority of the proposed method, highlighting its potential to enhance the efficiency and scalability of edge computing systems. This approach, by effectively addressing the dynamic nature of the edge environment and optimizing task offloading, contributes to the development of more robust and efficient edge computing frameworks. This work paves the way for future advancements in federated learning and edge computing integration, promising better management and utilization of IoT data.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise robust automatic speaker verification systems: review and analysis 噪声稳健型自动语音验证系统:回顾与分析
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-09-06 DOI: 10.1007/s11235-024-01212-8
Sanil Joshi, Mohit Dua
{"title":"Noise robust automatic speaker verification systems: review and analysis","authors":"Sanil Joshi, Mohit Dua","doi":"10.1007/s11235-024-01212-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01212-8","url":null,"abstract":"<p>Like any other biometric systems, Automatic Speaker Verification (ASV) systems are also vulnerable to the spoofing attacks. Hence, it is important to develop the countermeasures in order to handle these attacks. In spoofing mainly two types of attacks are considered, logical access attacks and presentation attacks. In the last few decades, several systems have been proposed by various researchers for handling these kinds of attacks. However, noise handling capability of ASV systems is of major concern, as the presence of noise may make an ASV system to falsely evaluate the original human voice as the spoofed audio. Hence, the main objective of this paper is to review and analyze the various noise robust ASV systems proposed by different researchers in recent years. The paper discusses the various front end and back-end approaches that have been used to develop these systems with putting emphasis on the noise handling techniques. Various kinds of noises such as babble, white, background noises, pop noise, channel noises etc. affect the development of an ASV system. This survey starts with discussion about the various components of ASV system. Then, the paper classifies and discusses various enhanced front end feature extraction techniques like phase based, deep learning based, magnitude-based feature extraction techniques etc., which have been proven to be robust in handling noise. Secondly, the survey highlights the various deep learning and other baseline models that are used in backend, for classification of the audio correctly. Finally, it highlights the challenges and issues that still exist in noise handling and detection, while developing noise robust ASV systems. Therefore, on the basis of the proposed survey it can be interpreted that the noise robustness of ASV system is the challenging issue. Hence the researchers should consider the robustness of ASV against noise along with spoofing attacks.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying data loss, nonlinearity, and modulation effects in drone swarm channels with artificial intelligence 利用人工智能研究无人机群信道中的数据丢失、非线性和调制效应
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-08-22 DOI: 10.1007/s11235-024-01210-w
Volodymyr Kharchenko, Andrii Grekhov, Vasyl Kondratiuk
{"title":"Studying data loss, nonlinearity, and modulation effects in drone swarm channels with artificial intelligence","authors":"Volodymyr Kharchenko, Andrii Grekhov, Vasyl Kondratiuk","doi":"10.1007/s11235-024-01210-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01210-w","url":null,"abstract":"<p>Drones can be used to create wireless communication networks in swarms using Artificial intelligence (AI). Their mobility and line-of-sight capability have made them key solutions for civil and military applications. AI is also developing rapidly nowadays and is being successfully applied due to the huge amount of data available. This has led to the integration of AI into networks and its application to solve problems associated with drone swarms. Since AI systems have to process huge amounts of information in real time, this leads to increased data packet loss and possible loss of communication with the control center. This article is devoted to the calculation of packet losses and the impact of traffic parameters on the data exchange in swarms. Original swarm models were created with the help of MATLAB and NetCracker packages. Dependences of data packet losses on the transaction size are calculated for different drone number in a swarm using NetCracker software. Data traffic with different parameters and statistical distribution laws was considered. The effect of different distances to drones on the base station workload has been simulated. Data transmission in a swarm was studied using MATLAB software depending on the signal-to-noise ratio, nonlinearity levels of base station amplifier, signal modulation types, base station antenna diameters, and signal phase offsets. The data obtained allows foresee the operation of drone communication channels in swarms.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing cell association in 5G and beyond networks: a modified load-aware biased technique 优化 5G 及其他网络中的小区关联:一种改进的负载感知偏置技术
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-08-18 DOI: 10.1007/s11235-024-01202-w
Mohammed Jaber Alam, Ritesh Chugh, Salahuddin Azad, Md Rahat Hossain
{"title":"Optimizing cell association in 5G and beyond networks: a modified load-aware biased technique","authors":"Mohammed Jaber Alam, Ritesh Chugh, Salahuddin Azad, Md Rahat Hossain","doi":"10.1007/s11235-024-01202-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01202-w","url":null,"abstract":"<p>Cellular networks are moving towards increasing heterogeneity by deploying more small cells into macro base station (MBS) to meet rapidly growing traffic demands. To leverage the advantages of these small cells, mobile users should be offloaded onto small base stations (BSs), which will typically be lightly populated and can give a higher data rate by presenting the mobile users with many more channels than the MBS. Likewise, a more balanced cell association will lessen the pressure on the MBS, allowing it to serve its remaining users more effectively. This paper addresses the cell association challenge for Quality of Service (QoS) provisioning in terms of throughput and load-balancing for 5G and future generation networks. This problem is quite challenging because BSs have varying backhaul capacities and users have varying QoS needs. Most of the previous studies are based on reference signal received power (RSRP), signal to interference and noise ratio (SINR) or its variants and most importantly majority of them are not load-aware. Therefore, a modified load-aware biased cell association scheme based on distance is proposed to attain better QoS provisioning in terms of throughput and load-balancing. Simulation results depict that the proposed load-aware-based method outperforms conventional cell association schemes based on RSRP and its variants, and in terms of throughput and load-balancing. Furthermore, the algorithm’s complexity has been assessed through a comparison and analysis of computational time, demonstrating better performance compared to state-of-the-art techniques.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight omnidirectional visual-inertial odometry for MAVs based on improved keyframe tracking and marginalization 基于改进的关键帧跟踪和边缘化技术的轻量级全向视觉惯性飞行器测距仪
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-08-12 DOI: 10.1007/s11235-024-01208-4
Bo Gao, Baowang Lian, Chengkai Tang
{"title":"Lightweight omnidirectional visual-inertial odometry for MAVs based on improved keyframe tracking and marginalization","authors":"Bo Gao, Baowang Lian, Chengkai Tang","doi":"10.1007/s11235-024-01208-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01208-4","url":null,"abstract":"<p>Due to the limited onboard resources on Micro Aerial Vehicles (MAVs), the poor real-time performance has always been an urgent problem to be solved in the practical applications of visual inertial odometry (VIO). Therefore, a lightweight omnidirectional visual-inertial odometry (LOVIO) for MAVs based on improved keyframe tracking and marginalization was proposed. In the front-end processing of LOVIO, wide field-of-view (FOV) images are captured by an omnidirectional camera, frames are tracked by semi-direct method combining of direct method with rapidity and feature-based method with accuracy. In the back-end optimization, the Hessian matrix corresponding to the error optimization equation is stepwise marginalized, so the high-dimensional matrix is decomposed and the operating efficiency is improved. Experimental results on the dataset TUM-VI show that LOVIO can significantly reduce running time consumption without loss of precision and robustness, that means LOVIO has better real-time and practicability for MAVs.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight signal recognition based on hybrid model in wireless networks 基于混合模型的无线网络轻量级信号识别
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-08-06 DOI: 10.1007/s11235-024-01204-8
Mingjun Tang, Rui Gao, Lan Guo
{"title":"Lightweight signal recognition based on hybrid model in wireless networks","authors":"Mingjun Tang, Rui Gao, Lan Guo","doi":"10.1007/s11235-024-01204-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01204-8","url":null,"abstract":"<p>Signal recognition is a key technology in wireless networks, with broad applications in both military and civilian fields. Accurately recognizing the modulation scheme of an incoming unknown signal can significantly enhance the performance of communication systems. As global digitization and intelligence advance, the rapid development of wireless communication imposes higher standards for signal recognition: (1) Accurate and efficient recognition of various modulation modes, and (2) Lightweight recognition compatible with intelligent hardware. To meet these demands, we have designed a hybrid signal recognition model based on a convolutional neural network and a gated recurrent unit (CnGr). By integrating spatial and temporal modules, we enhance the multi-dimensional extraction of the original signal, significantly improving recognition accuracy. Additionally, we propose a lightweight signal recognition method that combines pruning and depthwise separable convolution. This approach effectively reduces the network size while maintaining recognition accuracy, facilitating deployment and implementation on edge devices. Extensive experiments demonstrate that our proposed method significantly improves recognition accuracy and reduces the model size without compromising performance.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141969443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-iterative sem-blind receiver for multi-way relay (MWR) systems 多路中继(MWR)系统的非迭代半盲目接收器
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-08-04 DOI: 10.1007/s11235-024-01209-3
Leandro R. Ximenes
{"title":"Non-iterative sem-blind receiver for multi-way relay (MWR) systems","authors":"Leandro R. Ximenes","doi":"10.1007/s11235-024-01209-3","DOIUrl":"https://doi.org/10.1007/s11235-024-01209-3","url":null,"abstract":"<p>The growing number of mobile stations requires relaying protocols that can efficiently transmit large volumes of data with minimal computational complexity. Systems that combine joint symbol and channel estimation with Amplify-and-Forward Multiway Relay (MWR) systems provide a highly effective solution to this problem. Thus, this study introduces a new Nested PARAFAC-based MWR system model as its primary contribution. Then, a non-iterative semi-blind receiver is designed to allow simultaneous estimation of symbols and channels. This computationally efficient approach is validated using Monte Carlo computational simulations, showing that the proposed receiver can achieve lower bit error rate values at lower computational complexity than some of its state-of-the-art competitors.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141945457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信