Journal of Parallel and Distributed Computing最新文献

筛选
英文 中文
Reload: Deep reinforcement learning-based workload distribution for collaborative edges 重载:基于深度强化学习的协同边缘工作负载分配
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-03-01 Epub Date: 2025-11-05 DOI: 10.1016/j.jpdc.2025.105191
Yu Liang , Jidong Ge , Jie Wu , Sheng Zhang , Shiwu Wen , Bin Luo
{"title":"Reload: Deep reinforcement learning-based workload distribution for collaborative edges","authors":"Yu Liang ,&nbsp;Jidong Ge ,&nbsp;Jie Wu ,&nbsp;Sheng Zhang ,&nbsp;Shiwu Wen ,&nbsp;Bin Luo","doi":"10.1016/j.jpdc.2025.105191","DOIUrl":"10.1016/j.jpdc.2025.105191","url":null,"abstract":"<div><div>Edge computing is one of the promising technologies that aim to enable timely computation at the network edge. Major service providers started to deploy geographically-distributed edge servers several years ago. A major challenge in geographically distributed edges is task scheduling, i.e., how to assign various tasks submitted by mobile users to distributed edges so as to optimize some metric. However, it is not easy to perform task scheduling in geographically-distributed edges. We observed that there are three major challenges in designing an efficient task scheduling solution in dynamic edge environments: heterogeneous tasks, dynamic edge networks, and heterogeneous edge servers. In this paper, we pursue a black-box solution for task scheduling in the collaborative edge environment while not relying on detailed analytical performance modeling. We propose Reload, an intelligent deep reinforcement learning-based task scheduler. Reload learns a policy purely based on the known information, without foreseeing the future. Reload depicts its policy as a neural network that maps “raw” observations to scheduling actions. During training, Reload starts out knowing nothing and gradually learns to make better scheduling decisions through reinforcement, in the form of reward signals for past decisions. Reload leverages Advantage Actor Critic to train the policy network. We evaluate Reload using extensive simulations.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105191"},"PeriodicalIF":4.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145571881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new switch buffer architecture for dragonfly networks 蜻蜓网络的一种新的交换缓冲架构
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-03-01 Epub Date: 2025-11-15 DOI: 10.1016/j.jpdc.2025.105199
Alejandro Cano , Cristóbal Camarero , Carmen Martínez , Ramón Beivide
{"title":"A new switch buffer architecture for dragonfly networks","authors":"Alejandro Cano ,&nbsp;Cristóbal Camarero ,&nbsp;Carmen Martínez ,&nbsp;Ramón Beivide","doi":"10.1016/j.jpdc.2025.105199","DOIUrl":"10.1016/j.jpdc.2025.105199","url":null,"abstract":"<div><div>Dragonfly networks offer a viable solution for large-scale supercomputers and datacenters. However, developing efficient routing mechanisms for these networks presents significant challenges. Current solutions often lead to unstable network behavior due to congestion and fairness issues, exacerbating performance variability and the tail-latency problem. An analysis of the topology and its standard deadlock avoidance mechanisms reveals that server access to global network links varies based on their location in the network, resulting in throughput unfairness. To address this issue, this paper introduces a novel switch buffer architecture which reduces head-of-line blocking and enhances fairness, to significantly improve overall network performance. Despite offering comparable cost to existing solutions, the proposed buffer architecture proves superior performance. Real-world synthetic simulations scenarios further confirm these findings, showing performance improvements between 10 % and 47 % against conventional solutions in medium sized Dragonflies.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105199"},"PeriodicalIF":4.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAARD: Proximity-aware all-reduce communication for dragonfly networks 蜻蜓网络的接近感知全缩减通信
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-03-01 Epub Date: 2025-11-19 DOI: 10.1016/j.jpdc.2025.105201
Junchao Ma, Dezun Dong, Fei Lei, Liquan Xiao
{"title":"PAARD: Proximity-aware all-reduce communication for dragonfly networks","authors":"Junchao Ma,&nbsp;Dezun Dong,&nbsp;Fei Lei,&nbsp;Liquan Xiao","doi":"10.1016/j.jpdc.2025.105201","DOIUrl":"10.1016/j.jpdc.2025.105201","url":null,"abstract":"<div><div>The All-Reduce operation is one of the most widely used collective communication operations, and it is widely used in the research and engineering fields of high-performance computing(HPC) and distributed machine learning(DML). Previous optimization work for All-Reduce operation is to design new algorithms only for different message size and different number of processors, and ignores the optimization that can be achieved by considering the topology. Dragonfly is a popular topology for current and future high-speed interconnection networks. The hierarchical characteristics of dragonfly network can be utilized to effectively reduce hardware overhead while ensuring low end-to-end transmission latency. This paper offers a first attempt to design an efficient All-Reduce algorithm on dragonfly networks, referenced as PAARD. Based on the hierarchical characteristics of dragonfly network, PAARD first proposes an end-to-end solution to alleviate congestion that could remarkably boost performance. We carefully design the algorithm of PAARD to ensure desirable performance with acceptable overhead and guarantee the generality when met marginal cases. Then, to illustrate the effectiveness of PAARD, we analyze the performance of PAARD with the state-of-the-art algorithm, Halving-doubling(HD) algorithm and Ring algorithm. The simulation results demonstrate that in our design the execution time can be improved by 3X for HD and 4.19x for Ring on 256 nodes of a 342-node dragonfly with minimal routing.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105201"},"PeriodicalIF":4.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145685145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues) 封面1 -完整的扉页(每期)/特刊扉页(每期)
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-03-01 Epub Date: 2026-01-10 DOI: 10.1016/S0743-7315(25)00186-8
{"title":"Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues)","authors":"","doi":"10.1016/S0743-7315(25)00186-8","DOIUrl":"10.1016/S0743-7315(25)00186-8","url":null,"abstract":"","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105219"},"PeriodicalIF":4.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145977042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy and performance efficient NAND flash translation layer architecture for low-latency edge applications 低延迟边缘应用的高能效NAND闪存转换层架构
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-03-01 Epub Date: 2025-11-17 DOI: 10.1016/j.jpdc.2025.105200
Ranjeeth Sekhar CB , Diksha Shekhawat , Jugal Gandhi , M. Santosh , Jai Gopal Pandey
{"title":"Energy and performance efficient NAND flash translation layer architecture for low-latency edge applications","authors":"Ranjeeth Sekhar CB ,&nbsp;Diksha Shekhawat ,&nbsp;Jugal Gandhi ,&nbsp;M. Santosh ,&nbsp;Jai Gopal Pandey","doi":"10.1016/j.jpdc.2025.105200","DOIUrl":"10.1016/j.jpdc.2025.105200","url":null,"abstract":"<div><div>This paper presents a hardware architecture, design, and implementation of a flash translation layer (FTL) for NAND flash memory devices. The proposed FTL system incorporates a hybrid logical-to-physical mapping scheme, wear leveling, garbage collection, bad block management, and error correcting codes (ECC). This architecture is designed to optimize the NAND flash memory management process, enhancing the overall performance and reliability. In this, hybrid logical-to-physical mapping and wear leveling schemes efficiently manage data placement, mitigating the inherent challenges of NAND flash memory, such as limited write endurance and page-based programming constraints. To validate the proposed hardware FTL, experimental evaluations have been performed, demonstrating its efficiency in terms of latency, dynamic power, and throughput. Hardware implementation is carried out on the Xilinx Zynq UltraScale+ ZCU102 platform containing the xczu9eg-2ffvb1156-2-e FPGA device. The proposed work has comparable resource utilization and improved datapath delay, throughput, and dynamic power, with practical implications for edge computing applications.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105200"},"PeriodicalIF":4.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BMSES: Blockchain and mobile edge computing-based secure and energy-efficient system for healthcare data management BMSES:区块链和基于移动边缘计算的医疗保健数据管理安全和节能系统
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-02-01 Epub Date: 2025-11-13 DOI: 10.1016/j.jpdc.2025.105198
Md Nurul Hasan, Suyel Namasudra
{"title":"BMSES: Blockchain and mobile edge computing-based secure and energy-efficient system for healthcare data management","authors":"Md Nurul Hasan,&nbsp;Suyel Namasudra","doi":"10.1016/j.jpdc.2025.105198","DOIUrl":"10.1016/j.jpdc.2025.105198","url":null,"abstract":"<div><div>Blockchain technology is rapidly being adopted across various sectors, including healthcare, finance, and agriculture, due to its key features like decentralization, immutability, and consensus mechanisms. These features ensure security, privacy, transparency, and accountability. On the other hand, Mobile Edge Computing (MEC) extends cloud computing capabilities to mobile devices through a distributed system. However, existing studies, which combine blockchain with MEC, often overlook the impact of data offloading on system performance. This paper proposes a Blockchain and MEC-based Secure and Energy-efficient System (BMSES) for sharing Internet of Medical Things (IoMT) data securely among patients and doctors, while optimizing energy consumption through task offloading to MEC servers. Here, the Non-Orthogonal Multiple Access (NOMA) protocol is utilized for efficient channel sharing among multiple users, which offers low cost, reduced latency, and low power consumption. The proposed scheme optimizes energy consumption by efficiently managing task delegation and resource allocation in MEC. Additionally, smart contracts automate blockchain operations, enhancing efficiency and security. The proposed scheme is evaluated in terms of energy consumption, transmission rate, latency, and offloading delay. The results of the experiments show the effectiveness of the proposed scheme compared to state-of-the-art offloading approaches in terms of improving energy efficiency, transmission rate, offloading delay, and latency of the system.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105198"},"PeriodicalIF":4.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145571798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues) 封面1 -完整的扉页(每期)/特刊扉页(每期)
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-02-01 Epub Date: 2025-12-07 DOI: 10.1016/S0743-7315(25)00174-1
{"title":"Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues)","authors":"","doi":"10.1016/S0743-7315(25)00174-1","DOIUrl":"10.1016/S0743-7315(25)00174-1","url":null,"abstract":"","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105207"},"PeriodicalIF":4.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145736744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diverse attack detection in IoT using hybrid deep convolutional with capsule auto encoder for intrusion detection model 利用混合深度卷积和胶囊自动编码器的入侵检测模型进行物联网中的多种攻击检测
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-02-01 Epub Date: 2025-10-28 DOI: 10.1016/j.jpdc.2025.105190
M. Dharmalingam , Kamalraj Subramaniam , Ashwin M , N. Nandhagopal
{"title":"Diverse attack detection in IoT using hybrid deep convolutional with capsule auto encoder for intrusion detection model","authors":"M. Dharmalingam ,&nbsp;Kamalraj Subramaniam ,&nbsp;Ashwin M ,&nbsp;N. Nandhagopal","doi":"10.1016/j.jpdc.2025.105190","DOIUrl":"10.1016/j.jpdc.2025.105190","url":null,"abstract":"<div><div>One rapidly expanding technology that is effectively employed in many different applications is the Internet of Things (IoT) network. There are daily communication issues in an Internet of Things network because of the enormous number of connecting nodes. A cloud service is used as a backend by the IoT platform to process data and manage remote control. A successful intrusion detection system (IDS) that can track computer sources and generate data on suspicious or unusual activity is essential for managing the growing complexity of cyberattacks. The security of the IoT network may increasingly become a major issue as IoT technology becomes widely used. Due to the large number and diversity of IoT devices, protecting IoT systems with conventional IDS is difficult. This proposed approach can mitigate the problems of existing studies and achieve better results in the process of detection IoT attacks. Initially, min-max normalization is used to pre-process the inputs to speed up training and improve the efficiency of the proposed model. From the normalized data, a new Adaptive Eagle Cat Optimization (AECO) with unique hunting and search functions is used to select features. Finally, based on the selected features, a Hybrid Deep Convolutional with Capsule Auto Encoder (Hybrid_DCAE) is proposed to classify various intruders, and an Enhanced Gannet Optimization Algorithm (EGOA) is used to fine-tune the parameters for improved system performance. The results analysis shows that the proposed model achieved 96.8 % accuracy in the BoT-IoT dataset, 97.21 % in CICIDS-2017, 97.55 % in UNSW-NB15, and 97.4 % in the DS2OS dataset.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105190"},"PeriodicalIF":4.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-modal model partition strategy for end-edge collaborative inference 端缘协同推理的多模态模型划分策略
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-02-01 Epub Date: 2025-10-28 DOI: 10.1016/j.jpdc.2025.105189
Dongkun Huo , Yingting Zhou , Yixue Hao , Long Hu , Yijun Mo , Min Chen , Iztok Humar
{"title":"Multi-modal model partition strategy for end-edge collaborative inference","authors":"Dongkun Huo ,&nbsp;Yingting Zhou ,&nbsp;Yixue Hao ,&nbsp;Long Hu ,&nbsp;Yijun Mo ,&nbsp;Min Chen ,&nbsp;Iztok Humar","doi":"10.1016/j.jpdc.2025.105189","DOIUrl":"10.1016/j.jpdc.2025.105189","url":null,"abstract":"<div><div>Advances in artificial intelligence(AI) have significantly boosted the application of intelligent models, and deploying deep neural network models for device inference is increasingly common. However, it is difficult for resource-constrained devices to handle the huge computational load of neural networks. So partitioning models to co-compute at the edge cloud and terminals accelerates real-time inference at the edge. Existing research overlooks resource allocation and collaborative decision-making for dynamic edge networks, and high-dimensional features cause transmission delay. To address this, we propose a feature-sensitive compression algorithm that implements differentiated compression based on feature importance to reduce communication load while maintaining inference accuracy. Then, we design a reinforcement learning approach for resource allocation and an online model partition algorithm using contextual bandits, leveraging compressed features for adaptive decisions in dynamic environments. Finally, we conduct a large number of experiments on different types of networks, and the results show that our approach can reduce the inference delay by up to 65.4 % and save up to 77.6 % of energy consumption.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105189"},"PeriodicalIF":4.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145435477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the privacy preservation and secure communication in fog-based mobile crowdsensing 基于雾的移动众测隐私保护与安全通信研究
IF 4 3区 计算机科学
Journal of Parallel and Distributed Computing Pub Date : 2026-02-01 Epub Date: 2025-11-02 DOI: 10.1016/j.jpdc.2025.105184
Sunday Oyinlola Ogundoyin , Ismaila Adeniyi Kamil , Isaac Adewale Ojedokun , John Oluwaseun Babalola , Vincent Omollo Nyangaresi
{"title":"On the privacy preservation and secure communication in fog-based mobile crowdsensing","authors":"Sunday Oyinlola Ogundoyin ,&nbsp;Ismaila Adeniyi Kamil ,&nbsp;Isaac Adewale Ojedokun ,&nbsp;John Oluwaseun Babalola ,&nbsp;Vincent Omollo Nyangaresi","doi":"10.1016/j.jpdc.2025.105184","DOIUrl":"10.1016/j.jpdc.2025.105184","url":null,"abstract":"<div><div>The rapid growth of mobile crowdsensing (MCS) presents significant opportunities for large-scale data collection through the collaborative use of smart devices. However, the increasing volume of sensitive data generated by MCS services poses critical challenges in terms of privacy and security, particularly latency-sensitive applications. While some solutions exist, many still lack the scalability, robustness, efficiency, and privacy preservation required by MCS services. This paper proposes a privacy-preserving and secure fog-based MCS (FB-MCS) scheme, comprising a four-tier fog computing architecture that incorporates dynamic lower-tier fog (LTF) and static upper-tier fog (UTF) systems to enable efficient data aggregation, privacy protection, and secure communication. The proposed scheme utilizes secret sharing and homomorphic MAC techniques for efficient and verifiable data aggregation over multi-dimensional data, allowing a data requester to verify the accuracy and integrity of the aggregated results. The scheme employs a lightweight elliptic curve cryptography (ECC) to ensure secure authentication without overburdening resource-constrained devices. An adaptive fog node selection strategy, based on trust and mobility, is proposed for reliable real-time task allocation. Extensive security analysis demonstrates that the scheme not only guarantees privacy preservation, integrity of aggregation results, strong anonymity, un-linkability, traceability, and resistance to well-known attacks but also achieves data confidentiality and unforgeability in the random oracle model under Type I and Type II adversaries, assuming the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP) are intractable. Moreover, performance assessments indicate that the proposed scheme surpasses previous advanced solutions, achieving a 48 % – 280 % improvement in efficiency.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105184"},"PeriodicalIF":4.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书