IET Communications最新文献

筛选
英文 中文
Automatic cinematography for body movement involved virtual communication 涉及虚拟通信的肢体运动自动摄影技术
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-20 DOI: 10.1049/cmu2.12748
Zixiao Yu, Honghong Wang, Kim Un
{"title":"Automatic cinematography for body movement involved virtual communication","authors":"Zixiao Yu,&nbsp;Honghong Wang,&nbsp;Kim Un","doi":"10.1049/cmu2.12748","DOIUrl":"10.1049/cmu2.12748","url":null,"abstract":"<p>The emergence of novel AI technologies and increasingly portable wearable devices have introduced a wider range of more liberated avenues for communication and interaction between human and virtual environments. In this context, the expression of distinct emotions and movements by users may convey a variety of meanings. Consequently, an emerging challenge is how to automatically enhance the visual representation of such interactions. Here, a novel Generative Adversarial Network (GAN) based model, AACOGAN, is introduced to tackle this challenge effectively. AACOGAN model establishes a relationship between player interactions, object locations, and camera movements, subsequently generating camera shots that augment player immersion. Experimental results demonstrate that AACOGAN enhances the correlation between player interactions and camera trajectories by an average of 73%, and improves multi-focus scene quality up to 32.9%. Consequently, AACOGAN is established as an efficient and economical solution for generating camera shots appropriate for a wide range of interactive motions. Exemplary video footage can be found at https://youtu.be/Syrwbnpzgx8.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"344-352"},"PeriodicalIF":1.6,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12748","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140224080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems 动态可重构智能表面部署,增强毫米波系统物理层安全性
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-15 DOI: 10.1049/cmu2.12751
Qingqing Tu, Zheng Dong, Xianbing Zou, Ning Wei, Ya Li, Fei Xu
{"title":"Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems","authors":"Qingqing Tu,&nbsp;Zheng Dong,&nbsp;Xianbing Zou,&nbsp;Ning Wei,&nbsp;Ya Li,&nbsp;Fei Xu","doi":"10.1049/cmu2.12751","DOIUrl":"10.1049/cmu2.12751","url":null,"abstract":"<p>In next-generation wireless communications, reconfigurable intelligent surface (RIS) has emerged as a cost-effective technique for enhancing physical layer security (PLS) in millimeter-wave (mmWave) communications, especially under challenging scenarios with adversarial entities and obstructions. However, the primary studies for RIS incorporation in mmWave communication systems utilized static deployments, lacking adaptability and efficiency in complex environments. To address this problem, a dynamic RIS deployment design framework is introduced for PLS enhancement in mmWave systems against jamming and eavesdropping attacks. For the design, it is aimed to maximize the secrecy rate by jointly optimizing the RIS selection with the beamforming design. The resulting optimization problem is challenging to solve due to the coupling of the RIS control factor, joint beamforming design, and non-convex constraints. To tackle these issues, an efficient multi-RIS-aided PLS enhancement algorithm is proposed. It transforms the objective into a series of subproblems and employs the fractional programming technique and prox-linear block coordinate descent updating method to solve them alternatively and obtain the optimal solution. The simulations demonstrate the advantage of the dynamic deployment, which exhibits enhanced security performance with reduced complexity compared with benchmarks. Further examinations also provide insight into optimal RIS activation configurations, achieving optimal balance for securing mmWave communications against emerging threats while maintaining system efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"365-374"},"PeriodicalIF":1.6,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12751","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140239640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved seeds scheme in K-means clustering algorithm for the UAVs control system application 无人机控制系统应用 K 均值聚类算法中的改进种子方案
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-11 DOI: 10.1049/cmu2.12746
Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang
{"title":"An improved seeds scheme in K-means clustering algorithm for the UAVs control system application","authors":"Qian Bi,&nbsp;Huadong Sun,&nbsp;Cheng Qian,&nbsp;Ke Zhang","doi":"10.1049/cmu2.12746","DOIUrl":"10.1049/cmu2.12746","url":null,"abstract":"<p>Clustering algorithm is the primary technology used in target clustering and group status analysis which are key features of the Unmanned Aerial Vehicles (UAVs) control system. Due to variable application environment, the stability of the algorithm in the UAVs control system needs to be considered. K-means clustering is a widely used method in intelligent systems. However, K-means algorithm is susceptible to the local optimum due to the influence of the initial centroid. For this problem, the predecessors have proposed various effective solutions. These algorithms perform better on real and large-scale datasets, but they are unable to achieve optimum results with unbalanced datasets. Herein, a simpler and more effective algorithm for seed initialization is proposed, it has a better accuracy rate than the alternative algorithms.Moreover, after running tests multiple times with each algorithm independently, it has the highest stability and the lowest overall volatility. With unbalanced datasets, the proposed algorithm performs significantly better than several other algorithms and therefore can solve the problems that other algorithms have with unbalanced datasets.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"437-449"},"PeriodicalIF":1.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12746","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140251480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved reputation evaluation for reliable federated learning on blockchain 改进声誉评估,促进区块链上的可靠联合学习
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-08 DOI: 10.1049/cmu2.12743
Jiacheng Sui, Yi Li, Hai Huang
{"title":"Improved reputation evaluation for reliable federated learning on blockchain","authors":"Jiacheng Sui,&nbsp;Yi Li,&nbsp;Hai Huang","doi":"10.1049/cmu2.12743","DOIUrl":"https://doi.org/10.1049/cmu2.12743","url":null,"abstract":"<p>Worker selection is critical to the success of federated learning, but issues such as inadequate incentives and poor-quality data can negatively impact the process. The existing studies have used the multi-weight subjective logic model, but it is vulnerable to malicious evaluation and unfair to newly added nodes. In this paper, the authors propose an improved reputation evaluation algorithm that allows evaluations from different sources to influence each other and reduce the impact of malicious comments. The authors’ approach effectively distinguishes between malicious and honest users and improves worker selection and collaboration in federated learning.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"421-428"},"PeriodicalIF":1.6,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12743","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140546757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing 基于雾计算和边缘计算的工业机器人系统中的隐私保护数据整合方案
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-07 DOI: 10.1049/cmu2.12749
Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen
{"title":"Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing","authors":"Song Han,&nbsp;Hui Ma,&nbsp;Amir Taherkordi,&nbsp;Dapeng Lan,&nbsp;Yange Chen","doi":"10.1049/cmu2.12749","DOIUrl":"10.1049/cmu2.12749","url":null,"abstract":"<p>To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a <i>k</i>-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"461-476"},"PeriodicalIF":1.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140077533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication 针对无人机辅助海上通信的动态集群和无线功率,优化轨迹以实现能源效率最大化
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-07 DOI: 10.1049/cmu2.12742
Xiaoxuan Wang, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian
{"title":"Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication","authors":"Xiaoxuan Wang,&nbsp;Hengyuan Jiao,&nbsp;Qinghe Gao,&nbsp;Yue Wu,&nbsp;Tao Jing,&nbsp;Jin Qian","doi":"10.1049/cmu2.12742","DOIUrl":"10.1049/cmu2.12742","url":null,"abstract":"<p>Nowadays, the digital development of marine ranching requires a communication system with wide coverage, high transmission rate and stable communication links. It is known that fixed-wing unmanned aerial vehicles (UAVs) have great advantages in long-range applications. They have the potential to serve as low-altitude communication platforms for maritime communication. In this study, with a developmental perspective, considering the intense growth of marine terminals in the future, a new clustering algorithm applied to cluster nonorthogonal multiple access (C-NOMA) is proposed and its advantages are investigated. In addition, considering the limited energy of marine terminals, combining the wireless power communication (WPC) technology for the UAV to charge terminals, the charging and communication time are optimized with the Lagrange multiplier method and the bisection search method. After completing the above optimization content of charging and communication, combined with the optimization results, it is found the trajectory that maximizes the energy efficiency of the UAV with the convex optimization technique. Experimental results show that the proposed clustering algorithm has good throughput performance, better fairness and lower algorithm complexity, and the proposed trajectory optimization scheme has better energy efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"409-420"},"PeriodicalIF":1.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12742","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140258493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious domain detection based on semi-supervised learning and parameter optimization 基于半监督学习和参数优化的恶意域检测
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-05 DOI: 10.1049/cmu2.12739
Renjie Liao, Shuo Wang
{"title":"Malicious domain detection based on semi-supervised learning and parameter optimization","authors":"Renjie Liao,&nbsp;Shuo Wang","doi":"10.1049/cmu2.12739","DOIUrl":"10.1049/cmu2.12739","url":null,"abstract":"<p>Malicious domains provide malware with covert communication channels which poses a severe threat to cybersecurity. Despite the continuous progress in detecting malicious domains with various machine learning algorithms, maintaining up-to-date various samples with fine-labeled data for training is difficult. To handle these issues and improve the detection accuracy, a novel malicious domain detection method named MDND-SS-PO is proposed that combines semi-supervised learning and parameter optimization. The contributions of the study are as follows. First, the method extracts the statistical features of the IP address, TTL value, the NXDomain record, and the domain name query characteristics to discriminate Domain-Flux and Fast-Flux domain names simultaneously. Second, an improved DBSCAN based on the neighborhood division is designed to cluster labeled data and unlabeled data with low time consumption. Then, based on the clustering hypothesis, unlabeled data is tagged with pseudo-label according to the cluster results, which aims to train a supervised classifier effectively. Finally, Gaussian process regression is used to optimize parameter settings of the algorithm. And the Silhouette index and F1 score are introduced to evaluate the optimization results. Experimental results show that the proposed method achieved a precise detection performance of 0.885 when the ratio of labeled data is 5%.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"386-397"},"PeriodicalIF":1.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-step attribute reduction for AIoT networks 针对人工智能物联网网络的两步属性缩减法
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-05 DOI: 10.1049/cmu2.12747
Chao Ren, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun
{"title":"Two-step attribute reduction for AIoT networks","authors":"Chao Ren,&nbsp;Gaoxin Lyu,&nbsp;Xianmei Wang,&nbsp;Yao Huang,&nbsp;Wei Li,&nbsp;Lei Sun","doi":"10.1049/cmu2.12747","DOIUrl":"10.1049/cmu2.12747","url":null,"abstract":"<p>The evolution of Artificial Intelligence of Things (AIoT) pushes connectivity from human-to-things and things-to-things, to AI-to-things, has resulted in more complex physical networks and logical associations. This has driven the demand for Internet of Things (IoT) devices with powerful edge data processing capabilities, leading to exponential growth in device quantity and data generation. However, conventional data preprocessing methods, such as data compression and encoding, often require edge devices to allocate computational resources for decoding. Additionally, some lossy compression methods, like JPEG, may result in the loss of important information, which has negative impact on the AI training. To address these challenges, this paper proposes a two-step attribute reduction approach, targeting devices and dimensions, to reduce the massive amount of data in the AIoT network while avoiding unnecessary utilization of edge device resources for decoding. The device-oriented and dimension-oriented attribute reductions identify important devices and dimensions, respectively, to mitigate the multimodal interference caused by the large-scale devices in the AIoT network and the curse of dimensionality associated with high-dimensional AIoT data. Numerical results and analysis show that this approach effectively eliminates redundant devices and numerous dimensions in the AIoT network while maintaining the basic data correlation.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"450-460"},"PeriodicalIF":1.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12747","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140079545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning 通过基于深度学习的高效自动编码器分析用于 MU 大规模 MIMO 下行链路的一位 DAC
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-04 DOI: 10.1049/cmu2.12750
Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue
{"title":"Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning","authors":"Ahlem Arfaoui,&nbsp;Maha Cherif,&nbsp;Ridha Bouallegue","doi":"10.1049/cmu2.12750","DOIUrl":"10.1049/cmu2.12750","url":null,"abstract":"<p>Multi-user (MU) massive multiple input multiple output (mMIMO) is considered a potential technology for fifth generation (5G) and sixth-generation (6G) wireless systems. The presence of the antenna arrays at the base station level to communicate with the users or to serve tens of single antenna users leads to excessively high system costs and power consumption. The deployment 1-bit digital-to-analogue converters (DACs) in the base station can solve these problems. This paper starts by presenting an analytical study centered on the effects of 1-bit DACs on the system envisaged for a Rayleigh-type fading channel. Compact-form expressions are derived for the symbol error rate. Afterwards, an efficient end-to-end deep learning technique to compensate for the joint effect of 1-bit DAC and imperfect channel state information in downlink mMIMO systems. Moreover, to improve the performance of the considered system, a DAC mixed architecture is proposed, where a number of antennas use 1 bit DACs while the others do not. The simulations results showed the improvement in transmission quality of the downlink of the MU-mMIMO system in the presence of hardware imperfections using the considered end-to-end compensation technique.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"353-364"},"PeriodicalIF":1.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12750","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved resource allocation method for mapping service function chains based on A3C 基于 A3C 的用于映射服务功能链的改进型资源分配方法
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-03-04 DOI: 10.1049/cmu2.12740
Wanwei Huang, Haobin Tian, Xiaohui Zhang, Min Huang, Song Li, Yuhua Li
{"title":"An improved resource allocation method for mapping service function chains based on A3C","authors":"Wanwei Huang,&nbsp;Haobin Tian,&nbsp;Xiaohui Zhang,&nbsp;Min Huang,&nbsp;Song Li,&nbsp;Yuhua Li","doi":"10.1049/cmu2.12740","DOIUrl":"10.1049/cmu2.12740","url":null,"abstract":"<p>Network function virtualization (NFV) technology deploys network functions as software functions on a generalised hardware platform and provides customised network services in the form of service function chain (SFC), which improves the flexibility and scalability of network services and reduces network service costs. However, irrational resource allocation during service function chain mapping will cause problems such as low resource utilisation, long service request processing time and low mapping rate. To address the unreasonable problem of service mapping resource allocation, an improved service function chain mapping resource allocation method (SA3C) based on the Asynchronous advantageous action evaluation algorithm (A3C) is proposed. This study proposes an SFC mapping model and a mathematical model for joint allocation, which modeled the minimization of processing time as a Markov process. The main network was trained and multiple sub-networks were generated in parallel using the ternary and deep reinforcement learning algorithm A3C, with the goal of identifying the optimal resource allocation strategy. The experimental simulation results show that compared with the Actor-Critic (AC) and Policy Gradient (PG) methods, SA3C algorithm can improve the resource utilisation by 9.85%, reduce the total processing time by 10.72%, and improve the mapping rate by 6.72%, by reasonably allocating node computational resources and link bandwidth communication resources.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"333-343"},"PeriodicalIF":1.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12740","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信