2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)最新文献

筛选
英文 中文
On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO 关于人工智能优化的空中无蜂窝大规模多输入多输出分析
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454699
M. Alamgir, Brian Kelley
{"title":"On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO","authors":"M. Alamgir, Brian Kelley","doi":"10.1109/CCNC51664.2024.10454699","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454699","url":null,"abstract":"This study examines a cell-free massive MIMO architecture for unmanned aerial vehicles (UAVs), It evaluates aerial access points (APs) coverage, performance, and data rate of the aerial cell-free network. It proposes deploying an aerial cell-free massive MIMO architecture to mitigate the effects of path loss and interference in aerial cellular networks. The analysis includes a 2-dimensional multi-armed bandit (MAB) model for beam selection optimized with machine learning and using millimeter-wave technology to analyze an aerial cell-free network that connects a HAPS (CPU/data network) with ground vehicles through UAV-based APs. The multi-armed bandit model incorporates 3GPP blockage stochastics, water-filling power allocation, and optimization of multi-user capacity. The results include the aerial cell-free model's comprehensive geometric and radio link simulation analysis. The simulation outcomes demonstrate that the suggested cell-free network outperforms aerial cellular networks and NLOS terrestrial cell-free networks. Finally, we present a comparative study between our MAB model-based AI technique and a conventional non-AI technique, highlighting the significant performance improvements achieved by our approach.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 11","pages":"784-791"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opportunistic Protocols for People Counting in Dynamic Networks 动态网络中人员计数的机会协议
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454785
Alexander Jung, Helge Parzyjegla, Peter Danielis
{"title":"Opportunistic Protocols for People Counting in Dynamic Networks","authors":"Alexander Jung, Helge Parzyjegla, Peter Danielis","doi":"10.1109/CCNC51664.2024.10454785","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454785","url":null,"abstract":"In the modern world, accurate crowd counting is integral to a multitude of applications, including urban planning, transportation management, and crowd control. The advent of opportunistic communication networks, which enable devices to sporadically exchange data in a decentralized fashion, has introduced a new set of challenges in crowd estimation. This paper delves into two opportunistic people counting protocols: UrbanCount and HeartBeatCount. UrbanCount, while a robust protocol in its own right, comes with certain limitations that hinder its real-world applicability. In response to these limitations, this paper introduces refinements to UrbanCount, making it more practical and effective. Additionally, a novel protocol called HeartBeatCount is presented, which significantly enhances crowd size estimation accuracy, particularly in sparse scenarios. Through an evaluation, we compare the performance of these protocols and conclude that HeartBeatCount offers a more resilient solution for opportunistic people counting in various real-world scenarios.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"66 9","pages":"198-201"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN 评估超高速太赫兹无线局域网回程系统中的 RoCE 协议
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454796
Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano
{"title":"Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN","authors":"Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano","doi":"10.1109/CCNC51664.2024.10454796","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454796","url":null,"abstract":"In advancing society, large-capacity and high-speed communication network, to handle rich contents like ultra-high-definition video and large-capacity sensing information, is becoming important. Accomplishing these demands needs an ultrawide bandwidth wireless Local Area Network (LAN). Improvements in wireless transmission speeds are expected with the development of ultra-high-speed wireless technology such as terahertz (THz) communication. However, the rapid growth of ultra-high-speed wireless network technology places a considerable strain on the backhaul network. Therefore, improvements in wired network technology are indispensable to achieve higher speeds. We investigated RDMA technology used in data centers to speed up in THz wireless LAN. This paper presents the construction of a backhaul system to connect a network coordinator and interconnected access points. It also reports evaluation results of the proposed system, including a comparative analysis concerning RoCE, TCP, and UDP. Furthermore, the effect of switching processing on the overall throughput.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"26 1","pages":"811-814"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks 广域网上实时应用的分布式处理通信方案
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454684
Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata
{"title":"A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks","authors":"Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata","doi":"10.1109/CCNC51664.2024.10454684","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454684","url":null,"abstract":"Low-delay networking and edge computing will enable mission-critical applications to be delivered over wide-area networks. We consider this trend to be the realization that all users can share an application space without feeling any distance difference. We propose a distributed processing scheme that keeps the order of event occurrence regardless of the distance between users and an application server. The proposed scheme can be applied to both optimistic synchronization algorithms (OSA) and conservative synchronization algorithms (CSA). In the proposed scheme, arrival events with a delay within a predefined set time (correction time) are sorted in order of occurrence before application processing. We formulate the proposed scheme as an integer linear programming (ILP) problem. The objective function of ILP consists of the number of users excluded from the delay quality, the amount of memory consumed for a rollback in OSA, and the maximum end-to-end delay. The three parts of the objective function are set weight and the sum of parts with weight is minimized. We evaluate the proposed scheme for 1000 users distributed in two types of network models. Numerical results indicate that the proposed scheme reduces memory consumption compared to that of the conventional OSA scheme. The proposed scheme works as CSA in which all events are sorted in the occurrence order if the correction time is set above the delay for the slowest event to arrive at the server.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"108 5","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks 可扩展无蜂窝网络的开环发射功率控制研究
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454839
Keita Fukushima, Keiichi Mizutani, H. Harada
{"title":"A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks","authors":"Keita Fukushima, Keiichi Mizutani, H. Harada","doi":"10.1109/CCNC51664.2024.10454839","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454839","url":null,"abstract":"Toward 6G, cell-free networks (CFN) are attracting attention as a solution to the problem of poor communication quality at the cell edge. In CFN, many access points are densely deployed and cooperatively operated as distributed MIMO systems. In uplink communication in CFN, transmit power control (TPC) is required to mitigate interference and ensure fairness between users. In this paper, we propose an open-loop TPC algorithm for CFN and evaluate its performance by computer simulation. As a result, an improvement of 55.0% in the fifth percentile spectral efficiency is achieved compared to the case without TPC while maintaining a higher average spectral efficiency.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"87 2","pages":"1074-1075"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network ACADEME: 6G 无线网络中的空中蜂窝辅助设备边缘硬币选取模式(Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454698
T. Vrind, Chandar Kumar, Debabrata Das
{"title":"ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network","authors":"T. Vrind, Chandar Kumar, Debabrata Das","doi":"10.1109/CCNC51664.2024.10454698","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454698","url":null,"abstract":"In the 6G wireless network, there may be a communication architecture with three levels of systems: user equipment (UE), non-terrestrial aerial low altitude platform (LAP), and terrestrial base station with mobile edge computing (MEC). Co-inference is the intelligent sharing of the multiple computing layers in the AI/ML model amongst the UE, LAP, and MEC. Computing, storage, and power shared between the above systems for co-inference will bring several system-level advantages. Furthermore, it optimizes the required data traffic bandwidth, energy consumption, and end-to-end latency. The available literature has analyzed the optimal split point of the AI/ML model between UE and MEC (one wireless link). However, to the best of our knowledge, there is no study on the AI/ML split model in the case of UE, LAP, and MEC architectures with two wireless links (UE to LAP and LAP to MEC). In this paper, for the first time, we propose a novel device-edge co-inference with a LAP-based aerial cell having computing power. We present a novel Aerial Cell-Assisted Device-Edge co-inference ModEl (ACADEME) algorithm that optimally assigns layers to compute to UE, LAP, and MEC according to two wireless link characteristics to minimize power consumption and latency of inference. Through mathematical modelling and simulations, we show that the proposed coinference substantially reduces latency, i.e., by 47% through the selection of the two optimal split points of the AI/ML model, one each at the UE and the LAP-based aerial cell, respectively.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 3","pages":"1006-1009"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection 通过动态链接检测 OT 网络中异常入侵的图自动编码器
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454841
Alex Howe, Dale Peasley, Mauricio Papa
{"title":"Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection","authors":"Alex Howe, Dale Peasley, Mauricio Papa","doi":"10.1109/CCNC51664.2024.10454841","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454841","url":null,"abstract":"This paper evaluates the use of graph neural network (GNN) based autoencoders for detecting network intrusions or anomalous traffic in Operational Technology (OT) networks. Traditional intrusion detection methods often struggle to capture the complex relationships and interdependencies found in OT network communications. These spatial relationships can provide information vital for identifying harder to detect attacks (i.e. Advanced Persistent Threats). GNNs are a machine learning technique which operate on graph-structured data and can be used to identify underlying patterns and relationships between the nodes. Graph autoencoders (GAEs) are an unsupervised GNN-based learning technique that incorporates an encoder-decoder architecture and can be used for anomaly detection in graph structured data. This work evaluates the use of graph autoencoders for detecting anomalous edges (extracted from packets) in OT network data. Additionally, we introduce a method for encoding raw network traffic into discrete temporal graphs which can be used to apply GAEs for real-time intrusion detection. The proposed network traffic encoding scheme incorporates multi-dimensional edge attributes in order to capture information for determining the relevance of a given network packet. The approach is evaluated using two OT network datasets each containing labeled examples of commonly encountered malicious attack traffic. Results are compared against baseline anomaly detection methods including K-Nearest Neighbors, Deep Autoencoders, and Isolation Forest. The proposed graph autoencoder outperforms the baseline cases in terms of detection accuracy achieving a 31.05% and 8.64% improvement in F1 scores over the baseline models on the two OT network datasets.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intuitive Robot Control with Data Gloves for Industrial Use Cases 利用数据手套实现直观的机器人控制,适用于工业应用案例
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454653
Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, F. Fitzek
{"title":"Intuitive Robot Control with Data Gloves for Industrial Use Cases","authors":"Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC51664.2024.10454653","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454653","url":null,"abstract":"Human-robot interaction is crucial in various industries and domains, such as manufacturing, healthcare, and entertainment. Natural and intuitive interactions between humans and robots are crucial. Legacy controllers were designed for two-dimensional visual display and, therefore, suboptimal for interaction in three-dimensional space. Hand gesture recognition with camera-based systems is often hindered by visual obstruction. We demonstrate a hand gesture system leveraging data gloves with inertial measurement units (IMU). This demonstration focuses on gesture recognition quality, enhancing robustness and responsiveness. Audiences can observe and directly participate using the data glove to maneuver a robotic dog remotely in real-time.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"95 11","pages":"1114-1115"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments TIM-MARL:智能环境中多代理强化学习的信息共享
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454813
A. Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink
{"title":"TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments","authors":"A. Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink","doi":"10.1109/CCNC51664.2024.10454813","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454813","url":null,"abstract":"Information sharing among agents to jointly solve problems is challenging for multi-agent reinforcement learning algorithms (MARL) in smart environments. In this paper, we present a novel information sharing approach for MARL, which introduces a Team Information Matrix (TIM) that integrates scenario-independent spatial and environmental information combined with the agent's local observations, augmenting both individual agent's performance and global awareness during the MARL learning. To evaluate this approach, we conducted experiments on three multi-agent scenarios of varying difficulty levels implemented in Unity ML-Agents Toolkit. Experimental results show that the agents utilizing our TIM-Shared variation outperformed those using decentralized MARL and achieved comparable performance to agents employing centralized MARL.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"107 4","pages":"1044-1045"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation 单个 GPS Spoofer 对多个接收器的影响:形式分析与实验评估
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454872
Wenxin Chen, Yingfei Dong, Zhenhai Duan
{"title":"Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation","authors":"Wenxin Chen, Yingfei Dong, Zhenhai Duan","doi":"10.1109/CCNC51664.2024.10454872","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454872","url":null,"abstract":"As many mobile devices use Global Navigation Satellite Systems (GNSSs) to determine their locations for control, compromising such systems can result in serious consequences, as shown by existing GPS spoofing attacks. However, most such spoofing attacks focus on the effect of a single spoofer attacking a single receiver. In this paper, we investigate the impacts of a single spoofer on multiple receivers, motivated by research on attacking drone swarms. Our analysis independently shows that, using a single spoofer, multiple receivers at different locations in a spoofing area will see the same location reading. We consider the base case of spoofing four satellites and also the generic case when more satellites are involved in the spoofing attack. More importantly, we conduct real-world experiments to validate our analysis and demonstrate the potential threats to many practical applications. We use off-the-shelf SDR cards for spoofing and consumer GPS receivers for obtaining spoofed location readings. While this method can enable various attacks on mobile devices depending on GPS, it is also applicable to all existing GNSSs, because they use similar principles to determine locations.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"106 2","pages":"127-134"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信