IET Communications最新文献

筛选
英文 中文
A deep learning-based approach for pseudo-satellite positioning 基于深度学习的伪卫星定位方法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-22 DOI: 10.1049/cmu2.12821
Shuang Li, Jiacheng Wang, Baoguo Yu, Hantong Xing, Shuang Wang
{"title":"A deep learning-based approach for pseudo-satellite positioning","authors":"Shuang Li,&nbsp;Jiacheng Wang,&nbsp;Baoguo Yu,&nbsp;Hantong Xing,&nbsp;Shuang Wang","doi":"10.1049/cmu2.12821","DOIUrl":"https://doi.org/10.1049/cmu2.12821","url":null,"abstract":"<p>Traditional pseudo-satellite-based indoor positioning techniques are greatly affected by the presence of multipath effects, leading to a notable reduction in the positioning precision. In order to tackle this challenge, a pseudo-satellite indoor positioning method based on deep learning is proposed. The method grids the localization region, thus transforming positioning from a regression problem to a classification problem in the gridded areas. 1D-convolutional neural network is employed to extract the correlation between pseudo-satellite data and the positioning of indoor areas. Data are collected and the method is validated in three types of areas of the experimental field, namely unobstructed area, semi-unobstructed area and obstructed area. The experimental results demonstrate that the method exhibits superior positioning accuracy compared to traditional methods, enabling effective localization even in obstructed area.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1140-1150"},"PeriodicalIF":1.5,"publicationDate":"2024-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12821","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of interference effect in VL-NOMA network considering signal power parameters performance 考虑信号功率参数性能的 VL-NOMA 网络干扰效应分析
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-20 DOI: 10.1049/cmu2.12812
Chidi Emmanuel Ngene, Prabhat Thakur, Ghanshyam Singh
{"title":"Analysis of interference effect in VL-NOMA network considering signal power parameters performance","authors":"Chidi Emmanuel Ngene,&nbsp;Prabhat Thakur,&nbsp;Ghanshyam Singh","doi":"10.1049/cmu2.12812","DOIUrl":"https://doi.org/10.1049/cmu2.12812","url":null,"abstract":"<p>This study analyses the interference effect in a visible light-non-orthogonal multiple access (VL-NOMA) network that considers the signal power parameters performance for near and far users. The light-emitting diode (LED) as a carrier transmits signals, and we investigate the interference effect. The interference effect challenge is a result of unaligned signal power parameters, thereby producing noise or echo during the signal transmission. The signal power parameters are successfully aligned, and NOMA techniques are deployed, which improves the signal performance in terms of bit-error rate (BER), achieved data rate, and signal-to-interference plus noise ratio (SINR). Furthermore, the deployed NOMA techniques, such as power allocations (PA) to assign the signals appropriately, then superposition coding (SC) encodes the entire signal, and successive interference cancellation (SIC) cancels the interference within the signals. The signal behavior of the aligned and the unaligned signal power parameters performance are used to investigate the interference effect. We observed that unaligned signal power parameters reduce the signal performance of achieved data rate, BER, and SINR. Further, the aligned signal power parameter with NOMA techniques improves the signal performance. Moreover, in the aligned signal power scenario of NOMA, the near user performed better than the far user.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1062-1070"},"PeriodicalIF":1.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12812","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An innovative model for an enhanced dual intrusion detection system using LZ-JC-DBSCAN, EPRC-RPOA and EG-GELU-GRU 使用 LZ-JC-DBSCAN、EPRC-RPOA 和 EG-GELU-GRU 的增强型双重入侵检测系统的创新模型
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-12 DOI: 10.1049/cmu2.12831
Jeyavim Sherin R. C., Parkavi K.
{"title":"An innovative model for an enhanced dual intrusion detection system using LZ-JC-DBSCAN, EPRC-RPOA and EG-GELU-GRU","authors":"Jeyavim Sherin R. C.,&nbsp;Parkavi K.","doi":"10.1049/cmu2.12831","DOIUrl":"https://doi.org/10.1049/cmu2.12831","url":null,"abstract":"<p>The rise of suspicious activities in network communication, driven by increased internet accessibility, necessitates the development of advanced intrusion detection systems (IDS). Existing IDS solutions often exhibit poor performance in detecting suspicious activity and fail to identify various attack types within packet capture (PCAP) files, which monitor network traffic. This paper proposes a deep learning-based dual IDS model designed to address these issues. The process begins with utilizing the CSE-CIC-IDS2019 dataset to extract features from PCAP files. Suspicious activities are detected using the Exponential Geometric-Gaussian Error Linear Units-Gated Recurrent Unit (EG-GELU-GRU) method. Normal data undergoes further feature extraction and preprocessing through Log ZScore-Jacosine Density-Based Spatial Clustering of Applications with Noise (LZ-JC-DBSCAN). Feature selection is optimized using the Entropy Pearson R Correlation-Red Panda optimization algorithm. Suspicious files are flagged, while load balancing is performed on normal data. Attack detection is achieved through word embedding with the Glorot Kaufman-bidirectional encoder representations from transformers technique and classification via the EG-GELU-GRU model. Attacked packets are blocked, and the method is reapplied for attack-type classification. Experimental results using Python demonstrate the model’s superior performance, achieving 98.18% accuracy and 98.73% precision, surpassing existing approaches and significantly enhancing intrusion detection capabilities.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 18","pages":"1300-1318"},"PeriodicalIF":1.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12831","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high-precision timing and frequency synchronization algorithm for multi-h CPM signals 多小时 CPM 信号的高精度定时和频率同步算法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-10 DOI: 10.1049/cmu2.12809
Yukai Liu, Rongke Liu, Qizhi Chen, Ling Zhao
{"title":"A high-precision timing and frequency synchronization algorithm for multi-h CPM signals","authors":"Yukai Liu,&nbsp;Rongke Liu,&nbsp;Qizhi Chen,&nbsp;Ling Zhao","doi":"10.1049/cmu2.12809","DOIUrl":"https://doi.org/10.1049/cmu2.12809","url":null,"abstract":"<p>In the context of certain specific digital communication systems, where there are limitations such as spectral resources and energy availability, continuous phase modulation (CPM) emerges as an appealing choice among various modulation methods. Among CPM signals, multi-h CPM is particularly noteworthy for its ability to address these constraints within the realm of single-carrier and constant-envelope waveforms. At the physical layer, the design of a multi-h CPM receiver necessitates the efficient implementation of timing and frequency synchronization algorithm within a high dynamic environment. So this paper presents an innovative approach for achieving timing and frequency synchronization. To rectify timing offset and mitigate the adverse effects of noise in received signals, a re-configurable local filter generation method is integrated into the timing synchronization algorithm. Simultaneously, an enhanced least mean square adaptive filter algorithm is applied to address frequency synchronization. A comprehensive series of simulations rigorously evaluates the outcomes of proposed novel synchronization methodology. These analyses demonstrate a notable proximity between the synchronization errors of proposed algorithm in this paper and the performance benchmark set by the modified Cramer–Rao bound. The proposed synchronization technology also exhibits the capability to substantially reduce the bit error rate, thereby effectively enhancing demodulation performance in multi-h CPM receivers.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1049-1061"},"PeriodicalIF":1.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12809","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-user joint sensing and communications with time-divisioned bi-static radar 采用时分双静态雷达的双用户联合传感与通信技术
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-08 DOI: 10.1049/cmu2.12820
Enhao Wang, Yunfei Chen, Aissa Ikhlef, Hongjian Sun
{"title":"Dual-user joint sensing and communications with time-divisioned bi-static radar","authors":"Enhao Wang,&nbsp;Yunfei Chen,&nbsp;Aissa Ikhlef,&nbsp;Hongjian Sun","doi":"10.1049/cmu2.12820","DOIUrl":"https://doi.org/10.1049/cmu2.12820","url":null,"abstract":"<p>Joint sensing and communications systems have gained significant research interest by merging sensing capabilities with communication functionalities. However, few works have examined the case of multiple users. This work investigates a dual-user joint sensing and communications system, focusing on the interference between the users that explores the optimal performance trade-offs through a time-division approach. Bi-static radar setting is considered. Two typical strategies under this approach are studied: one in which both users follow the same order of communications and then sensing, and the other in which the tasks are performed in opposite order at two users. In each strategy, the sum rate and the detection probability are evaluated and optimized. The results show that the opposite order strategy offers superior performance to the same order strategy, and they also quantify their performance difference. This research highlights the potential benefits of time-division strategies and multiple users in joint sensing and communications systems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1126-1139"},"PeriodicalIF":1.5,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12820","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation scheduling scheme for task migration and offloading in 6G Cybertwin internet of vehicles based on DRL 基于 DRL 的 6G 车联网中任务迁移和卸载的资源分配调度方案
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-06 DOI: 10.1049/cmu2.12826
Rui Wei, Tuanfa Qin, Jinbao Huang, Ying Yang, Junyu Ren, Lei Yang
{"title":"Resource allocation scheduling scheme for task migration and offloading in 6G Cybertwin internet of vehicles based on DRL","authors":"Rui Wei,&nbsp;Tuanfa Qin,&nbsp;Jinbao Huang,&nbsp;Ying Yang,&nbsp;Junyu Ren,&nbsp;Lei Yang","doi":"10.1049/cmu2.12826","DOIUrl":"https://doi.org/10.1049/cmu2.12826","url":null,"abstract":"<p>As vehicular technology advances, intelligent vehicles generate numerous computation-intensive tasks, challenging the computational resources of both the vehicles and the Internet of Vehicles (IoV). Traditional IoV struggles with fixed network structures and limited scalability, unable to meet the growing computational demands and next-generation mobile communication technologies. In congested areas, near-end Mobile Edge Computing (MEC) resources are often overtaxed, while far-end MEC servers are underused, resulting in poor service quality. A novel network framework utilizing sixth-generation mobile communication (6G) and digital twin technologies, combined with task migration, promises to alleviate these inefficiencies. To address these challenges, a task migration and re-offloading model based on task attribute classification is introduced, employing a hybrid deep reinforcement learning (DRL) algorithm—Dueling Double Q Network DDPG (QDPG). This algorithm merges the strengths of the Deep Deterministic Policy Gradient (DDPG) and the Dueling Double Deep Q-Network (D3QN), effectively handling continuous and discrete action domains to optimize task migration and re-offloading in IoV. The inclusion of the Mini Batch K-Means algorithm enhances learning efficiency and optimization in the DRL algorithm. Experimental results show that QDPG significantly boosts task efficiency and computational performance, providing a robust solution for resource allocation in IoV.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 18","pages":"1244-1265"},"PeriodicalIF":1.5,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12826","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight deep learning architecture for automatic modulation classification of wireless internet of things 用于无线物联网自动调制分类的轻量级深度学习架构
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-05 DOI: 10.1049/cmu2.12823
Jia Han, Zhiyong Yu, Jian Yang
{"title":"A lightweight deep learning architecture for automatic modulation classification of wireless internet of things","authors":"Jia Han,&nbsp;Zhiyong Yu,&nbsp;Jian Yang","doi":"10.1049/cmu2.12823","DOIUrl":"https://doi.org/10.1049/cmu2.12823","url":null,"abstract":"<p>The wireless Internet of Things (IoT) is widely used for data transmission in power systems. Wireless communication is an important part of the IoT. The existing modulation classification algorithms have low classification accuracy when facing strong electromagnetic interference, which causes decoding error link interruption and wastes wireless channel resources. Therefore, it is necessary to study signal modulation classification methods in a low signal-to-noise ratio (SNR) environment. In this paper, a lightweight Deep Neural Networks (DNNs) modulation classification method based on the Informer architecture classifier and two-dimensional (2-D) curves input of the spectral correlation function (SCF) is proposed, which uses in-phase and quadrature (I/Q) signals to generate 2-D cross-section SCF curve first and then feeds the feature curve into the Informer network to classify the modulation method. This model can better learn the robustness characteristics in a long sequence. Through testing, the classification accuracy of the modulation signal is not much lower than that of the current good classification method when the SNR is 10 dB, and this method can still show higher accuracy when hardware resources are limited. It is a compact design of a modulation classification model and easy to deploy on low-cost embedded platforms.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 18","pages":"1220-1230"},"PeriodicalIF":1.5,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12823","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A path splitting and pruning strategy on list decoder for PAC codes PAC 码列表解码器上的路径分割和剪枝策略
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-02 DOI: 10.1049/cmu2.12829
Lei Lan, Zhongpeng Wang, Lijuan Zhang
{"title":"A path splitting and pruning strategy on list decoder for PAC codes","authors":"Lei Lan,&nbsp;Zhongpeng Wang,&nbsp;Lijuan Zhang","doi":"10.1049/cmu2.12829","DOIUrl":"https://doi.org/10.1049/cmu2.12829","url":null,"abstract":"<p>Recently, Arıkan proposed a polarization-adjusted convolutional (PAC) codes, demonstrating their superior error correction performance over polar codes at short block lengths. It was confirmed that PAC codes approached the optimal performance achievable with limited code length. This paper proposes a novel low-complexity list decoding algorithm for PAC codes, incorporating path splitting and pruning strategies based on a set of highly reliable information bits. Simulation results reveal that the proposed algorithm significantly reduces sorting complexity and average list size, all while incurring negligible performance loss. Unlike previous pruning algorithms designed for polar codes, the proposed strategy eliminates the need to individually assess the reliability of decoding paths in each decoding process. Instead, the algorithm minimizes redundant decoding paths through a high-reliability information bit set, constructed using Monte Carlo experiments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 18","pages":"1292-1299"},"PeriodicalIF":1.5,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12829","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A heuristic approach to energy efficient user association in ultra-dense HetNets using intermittent scheduling strategies 利用间歇调度策略在超密集 HetNets 中实现高能效用户关联的启发式方法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-30 DOI: 10.1049/cmu2.12816
Jeta Dobruna, Zana L. Fazliu, Hena Maloku, Mojca Volk
{"title":"A heuristic approach to energy efficient user association in ultra-dense HetNets using intermittent scheduling strategies","authors":"Jeta Dobruna,&nbsp;Zana L. Fazliu,&nbsp;Hena Maloku,&nbsp;Mojca Volk","doi":"10.1049/cmu2.12816","DOIUrl":"https://doi.org/10.1049/cmu2.12816","url":null,"abstract":"<p>The ultra-dense deployment of pico cells in 5G heterogeneous networks (HetNets) has raised serious concerns regarding interference and energy consumption. Both industry and academia are focusing on enhancing network energy efficiency (EE) while maintaining satisfactory quality of service (QoS) levels. However, finding an optimal solution to NEE is very challenging, especially in ultra-dense HetNets. Here, a user association and power management algorithm is presented that follows a heuristic approach and aims to maximize EE while satisfying other network requirements. The proposed algorithm associates users based on criteria that consider the users’ EE and minimizes energy consumption by intermittently switching into sleep mode base stations with the highest impact on overall network EE. The performance of this solution is evaluated in a realistic multi-cell two-tier scenario considering both co-tier and cross-tier interference by comparing it with two other solutions: a heuristic approach based on standardized eICIC, and an optimization approach based on Lagrangian dual decomposition. The simulation results show that our solution outperforms benchmarking solutions in terms of EE, average user rate, and network throughput while minimizing energy consumption.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1079-1088"},"PeriodicalIF":1.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12816","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A D2D user pairing algorithm based on motion prediction and power control 基于运动预测和功率控制的 D2D 用户配对算法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-30 DOI: 10.1049/cmu2.12827
Zhifeng Huang, Feng Ke, Hui Song
{"title":"A D2D user pairing algorithm based on motion prediction and power control","authors":"Zhifeng Huang,&nbsp;Feng Ke,&nbsp;Hui Song","doi":"10.1049/cmu2.12827","DOIUrl":"https://doi.org/10.1049/cmu2.12827","url":null,"abstract":"<p>User pairing plays an important role in device-to-device (D2D) relay communication, contributing significantly to maintaining low energy consumption, high throughput, and overall energy efficiency in the communication system. To achieve these purposes, an attention-based long short-term memory motion prediction model (AT-LSTM) and propose a joint power control algorithm. Leveraging these techniques, we also propose a D2D user pairing algorithm, distance–power–SINR pairing algorithm (DPSPA), which comprehensively considers factors such as D2D communication distances, transmit power, and signal-to-interference-plus-noise ratio. Initially, the AT-LSTM model is utilized to predict the location of users. Subsequently, the distance between the user terminal device and each communication point and the base station, filtering cache points, and non-cache points within the D2D communication radius are calculated. Then, based on the distance, required transmission power, and signal-to-interference-plus-noise ratio of each point, the evaluation index (the best matching product) is obtained. Finally, the point with the maximum best matching product is selected for D2D direct communication mode, D2D relay communication mode, or cellular communication mode. Simulation results demonstrate that DPSPA effectively reduces system energy consumption, enhances system throughput, and improves overall energy efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 18","pages":"1266-1281"},"PeriodicalIF":1.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12827","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142574155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信