Telecommunication Systems最新文献

筛选
英文 中文
Adaptive thresholds for improved load balancing in mobile edge computing using K-means clustering 利用 K-means 聚类改进移动边缘计算负载平衡的自适应阈值
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-12 DOI: 10.1007/s11235-024-01134-5
Tahir Maqsood, Sardar Khaliq uz Zaman, Arslan Qayyum, Faisal Rehman, Saad Mustafa, Junaid Shuja
{"title":"Adaptive thresholds for improved load balancing in mobile edge computing using K-means clustering","authors":"Tahir Maqsood, Sardar Khaliq uz Zaman, Arslan Qayyum, Faisal Rehman, Saad Mustafa, Junaid Shuja","doi":"10.1007/s11235-024-01134-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01134-5","url":null,"abstract":"<p>Mobile edge computing (MEC) has emerged as a promising technology that can revolutionize the future of mobile networks. MEC brings compute and storage capabilities to the edge of the network closer to end-users. This enables faster data processing and improved user experience by reducing latency. MEC has the potential to decrease the burden on the core network by transferring computational and storage responsibilities to the edge, thereby reducing overall network congestion. Load balancing is critical for effectively utilizing the resources of the MEC. This ensures that the workload is distributed uniformly across all of the available resources. Load balancing is a complex task and there are various algorithms that can be used to achieve it, such as round-robin, least connection, and IP hash. To differentiate between heavily loaded and lightly loaded servers, current load balancing methods use an average response time to gauge the load on the edge server. Nevertheless, this approach has lower precision and may result in an unequal distribution of the workload. Our study introduces a dynamic threshold calculation technique that relies on a response-time threshold of the edge servers using K-means clustering. K-means based proposed algorithm classifies the servers in two sets (here K = 2), i.e., overloaded and lightly loaded edge servers. Consequently, workload is migrated from overloaded to lightly loaded servers to evenly distribute the workload. Experimental results show that the proposed technique reduces latency and improves resource utilization.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"175 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140559895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subchannel selection methods for 3GPP C-V2X networks by considering vehicular mobility 考虑车辆移动性的 3GPP C-V2X 网络子信道选择方法
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-12 DOI: 10.1007/s11235-024-01138-1
Meng-Shiuan Pan, Shao-Wei Kao
{"title":"Subchannel selection methods for 3GPP C-V2X networks by considering vehicular mobility","authors":"Meng-Shiuan Pan, Shao-Wei Kao","doi":"10.1007/s11235-024-01138-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01138-1","url":null,"abstract":"<p>The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are allowed to communicate with each other without the help of cellular networks and can select subchannels (i.e. radio resources) by themselves. However, this design will induce subchannel collisions because of the mobility of vehicles. This work aims to relieve the aforementioned problem. We propose a cooperative subchannel selection (CoSS) scheme and a localized subchannel selection (LoSS) scheme, which consider vehicular mobility to prevent subchannel collisions. Based on the collected information, CoSS predicts possible subchannel collisions due to vehicles’ location changes. On the other hand, LoSS avoids subchannel collisions by organizing the usage of subchannels based on vehicles’ relative moving speeds. The simulation results indicate that the proposed schemes can effectively reduce subchannel collision ratio and increase packet delivery ratio for the network.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"94 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient design for green indoor OWC-IoT systems using passive reflective filters and machine learning-assisted quality prediction 利用无源反射滤波器和机器学习辅助质量预测,为绿色室内 OWC-IoT 系统提供节能设计
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-12 DOI: 10.1007/s11235-024-01139-0
C. Jenila, R. K. Jeyachitra
{"title":"Energy-efficient design for green indoor OWC-IoT systems using passive reflective filters and machine learning-assisted quality prediction","authors":"C. Jenila, R. K. Jeyachitra","doi":"10.1007/s11235-024-01139-0","DOIUrl":"https://doi.org/10.1007/s11235-024-01139-0","url":null,"abstract":"<p>This paper presents an energy-efficient design of optical wireless communication (OWC) system for the indoor Internet of Things (IoT) with the assistance of machine learning (ML). A central coordinator (CC) has been proposed to interrogate the IoT devices and control the uplink formations with the prediction of transmission quality using ML classifiers. The passive reflective reflectors (PRF) are utilized in the IoT devices, which replaced the power-consuming active transmitters, formulate the zero-power consuming transmission links. The communication performance of the passive link establishments from the IoT devices have been investigated in terms of quality factor (Q-factor), bit error rate (BER), and signal-to-noise ratio (SNR) under different optical wireless channel conditions and link lengths. The ML classifiers have been evaluated on the prediction of transmission quality, and the results suggested the Euclidean K-nearest neighbor (KNN) with ten number of neighbors for the implementation. The IoT devices located within 1.2 m from the CC require a transmission power of 0.5 mW for links carrying 10 Gbps data, which increases the energy efficiency to 20 Gbps/mW with transmission energy consumption of 0.05 pJ/bit. This significant improvement in energy efficiency and passive communication ensures reliable, and green IoT links suitable for data-intensive indoor applications.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"53 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VMRF: revolutionizing military border surveillance with extensive coverage and connectivity VMRF:以广泛的覆盖范围和连接性彻底改变军事边境监控
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-11 DOI: 10.1007/s11235-024-01125-6
S. P. Subotha, L. Femila
{"title":"VMRF: revolutionizing military border surveillance with extensive coverage and connectivity","authors":"S. P. Subotha, L. Femila","doi":"10.1007/s11235-024-01125-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01125-6","url":null,"abstract":"<p>Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path selection and coverage. In this paper, a Voronoi Modified Red Fox (VMRF) algorithm is proposed as a solution to these problems. Initially, secure cluster head (CH) selection and clustering is performed using Secure Spatial Intelligence-Enhanced Voronoi Clustering (SIEVC) to boost energy efficiency, security, and extend network coverage and connectivity. The SIEVC algorithm dynamically selects CHs based on past and present trust, identity trust, and energy trust to identify malicious nodes and form optimal clusters for improved network coverage and connectivity. It also employs dynamic cluster size adjustment to maintain proximity between CHs and cluster members and utilizes node alternation to ensure equitable cluster sizes. This approach minimizes energy depletion, enhances network longevity, and improves load balancing. The algorithm introduces a node alternation mechanism to balance cluster sizes and prevent energy holes. This approach ensures secure and efficient CH selection and promotes even energy distribution. Then the proposed modified red fox (MRF) optimization method, based on the fitness metric, computes the energy-efficient and safe path for data transmission. Trust, energy, distance, link quality and traffic intensity are the factors that the fitness function takes into account. Finally, the data is transmitted to the base station (BS) through CH along the path with the highest fitness value. Then the proposed VMRF algorithm is evaluated using the NS-2 platform, and the outcomes are compared with existing protocols. Based on the evaluations, the VMRF algorithm performs better than existing ones in terms of delay, energy consumption, throughput, packet delivery ratio (PDR), malicious node detection ratio, and residual energy.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"9 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GTIACO: energy efficient clustering algorithm based on game theory and improved ant colony optimization GTIACO:基于博弈论和改进蚁群优化的节能聚类算法
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-04 DOI: 10.1007/s11235-024-01132-7
Hang Wan, Zhizhuo Qiu, Rui Quan, Michael David, William Derigent
{"title":"GTIACO: energy efficient clustering algorithm based on game theory and improved ant colony optimization","authors":"Hang Wan, Zhizhuo Qiu, Rui Quan, Michael David, William Derigent","doi":"10.1007/s11235-024-01132-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01132-7","url":null,"abstract":"<p>Recently, wireless sensor networks have been widely used for environmental and structural safety monitoring. However, node batteries cannot be replaced or easily recharged in harsh environments. Maximizing network lifetime remains a challenging issue in designing WSN routing. This paper introduces GTIACO, a novel metaheuristic clustering protocol. It employs an optimal cluster head function to determine cluster number and utilizes game theory for selecting optimal cluster heads. To optimize inter-cluster routing, improved ant colony optimization (ACO) is introduced to construct gathering paths from clusters to the base station. Both blind pathways, pheromone concentration, and angle factors are considered to improve path exploration and transmission efficiency in ant colonies. To assess network performance, various scenarios involving different base station placements and network densities are examined. Experimental results demonstrate GTIACO's superiority over LEACH, ACO, SEP, and PRESPE protocols in network lifetime, stability, energy, and throughput. The proposed GTIACO shows an improvement of at least 4.3% in network lifetime and 32.8% in network throughout. It exhibits superior stability and transmission efficiency across diverse network densities.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"300 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction of the received signal strength variation with distance using averaging over multiple heights and frequencies 通过对多个高度和频率进行平均,减少接收信号强度随距离的变化
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-03 DOI: 10.1007/s11235-024-01120-x
Huthaifa Obeidat, Mohammed Al-Sadoon, Chemseddine Zebiri, Omar Obeidat, Issa Elfergani, Raed Abd-Alhameed
{"title":"Reduction of the received signal strength variation with distance using averaging over multiple heights and frequencies","authors":"Huthaifa Obeidat, Mohammed Al-Sadoon, Chemseddine Zebiri, Omar Obeidat, Issa Elfergani, Raed Abd-Alhameed","doi":"10.1007/s11235-024-01120-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01120-x","url":null,"abstract":"<p>As a simple and inexpensive channel characteristic, received signal strength (RSS) finds extensive usage in localization applications. However, the quick changes in signal strength impact the localization precision. By averaging over access points (APs) with multiple frequencies and/or heights, this article suggests a novel approach to lowering RSS fluctuation. Initially focused on the plane-earth loss model, the study was later extended to include a multipath indoor propagation scenario that was simulated. We used ray-tracing software to model the indoor propagation situation. This research takes into account the results of three distinct methods for averaging RSS: height averaging, frequency averaging, and hybrid frequency and height (FH) averaging, which combines the two. We discovered that the Height-only strategy considerably decreased the RSS variation with distance for both settings we looked at. Using the frequency-only method even further reduced the variation. Using the Hybrid FH technique greatly enhances the results. Root mean square error values of 4.427 dB, 3.70 dB, and 3.5 dB, respectively, are provided for the averaging approaches and the ideal scenario in which no variance occurs. Another finding is that averaging with APs that have double the height or frequency will not improve the RSS distance variation.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"72 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparsity-aware distributed adaptive filtering with robustness against impulsive noise and low SNR 稀疏感知分布式自适应滤波,对脉冲噪声和低信噪比具有鲁棒性
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-04-01 DOI: 10.1007/s11235-024-01124-7
{"title":"Sparsity-aware distributed adaptive filtering with robustness against impulsive noise and low SNR","authors":"","doi":"10.1007/s11235-024-01124-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01124-7","url":null,"abstract":"<h3>Abstract</h3> <p>Distributed inference tasks could be performed by adaptive filtering techniques. Several enhancement strategies for such techniques were proposed, such as sparsity-aware algorithms, coefficients reuse and correntropy-based cost functions in the case of impulsive noise. In this paper, a general framework based on Lagrange multipliers for the derivation of sophisticated algorithms that incorporate most of these improvements is described. A new general identification algorithm is derived as an example of the proposed approach and its performance is assessed in a distributed setting. </p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6G for intelligent transportation systems: standards, technologies, and challenges 用于智能交通系统的 6G:标准、技术和挑战
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-03-25 DOI: 10.1007/s11235-024-01126-5
Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib
{"title":"6G for intelligent transportation systems: standards, technologies, and challenges","authors":"Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib","doi":"10.1007/s11235-024-01126-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01126-5","url":null,"abstract":"<p>The advent of the sixth-generation (6G) wireless communication technology brings forth immense opportunities for enhancing Intelligent Transportation Systems (ITS). We investigate the potential of 6G in revolutionizing transportation systems by analyzing the standards, technologies, and challenges associated with its implementation. Building upon the advancements of 5G, 6G introduces unprecedented capabilities, including ultra-high data rates, ultra-low latency, massive connectivity, and intelligent network orchestration. Leveraging these capabilities, 6G can facilitate seamless connectivity among vehicles, infrastructure, and pedestrians, enabling novel applications such as autonomous driving, smart traffic management, and cooperative collision avoidance. However, realizing the full potential of 6G for ITS entails addressing several challenges, including spectrum allocation, network security, resource management, and interoperability with existing infrastructures. We present a comprehensive overview of the latest developments in 6G standards and technologies, including mmWave communications, terahertz spectrum, visible light communication, Artificial Intelligence, and edge computing, emphasizing their relevance to ITS. We also describe these technologies in the context of ITS. Furthermore, we explore the potential benefits and impacts of 6G on transportation systems, highlighting the opportunities for improved safety, efficiency, and sustainability. Finally, we conclude by discussing the key challenges and research directions that must be addressed to effectively deploy 6G for ITS, thereby paving the way for the next generation of intelligent and connected transportation systems.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"26 4 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140298088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability 具有多陷阱门不可区分性的可持续无证书认证可搜索加密技术
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-03-20 DOI: 10.1007/s11235-024-01121-w
{"title":"A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability","authors":"","doi":"10.1007/s11235-024-01121-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01121-w","url":null,"abstract":"<h3>Abstract</h3> <p>Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"25 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140200793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A composite channel hopping algorithm for blind rendezvous in heterogeneous cognitive radio networks 异构认知无线电网络中用于盲会合的复合信道跳频算法
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-03-20 DOI: 10.1007/s11235-024-01123-8
Sangeeta Sa, Arunanshu Mahapatro
{"title":"A composite channel hopping algorithm for blind rendezvous in heterogeneous cognitive radio networks","authors":"Sangeeta Sa, Arunanshu Mahapatro","doi":"10.1007/s11235-024-01123-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01123-8","url":null,"abstract":"<p>In cognitive radio networks (CRNs), rendezvous is the vital step prior to the communication between two unlicensed secondary users (SUs), where the SUs hop on the same channel at the same time to establish a link. With the dramatic fall in the cost and size of wireless transceivers, it becomes more reasonable to apply multiple radios to achieve significant improvement in the rendezvous performance. However, most of the existing multiradio rendezvous algorithms are proposed for homogeneous CRNs where all the SUs are equipped with an equal number of radios and do not possess backward compatibility to SU with a single radio. In reality, the CRNs are heterogeneous in nature as SUs may have different numbers of radios. In this paper, a composite CH algorithm is proposed for an asynchronous and heterogeneous network to achieve blind rendezvous with full rendezvous diversity. An SU with <i>m</i> number radios are categorized into three groups those follow different channel hopping (CH) algorithms. The upper bound of the rendezvous latency is being evaluated with a brief theoretical and mathematical analysis. Extensive simulations have conducted for different performance metrics, and the results are compared with the state-of-art algorithms. Overall, the proposed algorithm shows better performance in heterogeneous CRNs.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"30 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信