首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Multi-task learning for PBFT optimisation in permissioned blockchains 允许区块链中 PBFT 优化的多任务学习
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100206
Finance, supply chains, healthcare, and energy have an increasing demand for secure transactions and data exchange. Permissioned blockchains fulfilled this need thanks to the consensus protocol that ensures that participants agree on a common value. One of the most widely used protocols in private blockchains is the Practical Byzantine Fault Tolerance (PBFT), which tolerates up to one-third of Byzantine nodes, performs within partially synchronous systems, and has superior throughput compared to other protocols. It has, however, an important bandwidth consumption: 2N(N1) messages are exchanged in a system composed of N nodes to validate only one block.
It is possible to reduce the number of consensus participants by restricting the validation process to nodes that have demonstrated high levels of security, rapidity, and availability. In this paper, we propose the first database that traces the behavior of nodes within a system that performs PBFT consensus. It reflects their level of security, rapidity, and availability throughout the consensus. We first investigate different Single-Task Learning (STL) techniques to classify the nodes within our dataset. Then, using Multi-Task Learning (MTL) techniques, the results are much more interesting, with classification accuracies over 98%. Integrating node classification as a preliminary step to the PBFT protocol optimizes the consensus. In the best cases, it is able to reduce the latency by up to 94% and the communication traffic by up to 99%.
金融、供应链、医疗保健和能源行业对安全交易和数据交换的需求与日俱增。由于共识协议可确保参与者就共同的价值达成一致,许可区块链满足了这一需求。在私有区块链中使用最广泛的协议之一是实用拜占庭容错协议(PBFT),该协议可容忍多达三分之一的拜占庭节点,在部分同步系统中执行,与其他协议相比具有更高的吞吐量。不过,它也有一个重要的带宽消耗问题:在一个由 N 个节点组成的系统中,仅验证一个区块就要交换 2N(N-1)条信息。在本文中,我们提出了首个可追溯执行 PBFT 共识的系统内节点行为的数据库。它反映了整个共识过程中节点的安全性、快速性和可用性水平。我们首先研究了不同的单任务学习(STL)技术,以对数据集中的节点进行分类。然后,使用多任务学习(MTL)技术,结果更加有趣,分类准确率超过 98%。将节点分类作为 PBFT 协议的第一步,可以优化共识。在最佳情况下,它能将延迟时间减少 94%,通信流量减少 99%。
{"title":"Multi-task learning for PBFT optimisation in permissioned blockchains","authors":"","doi":"10.1016/j.bcra.2024.100206","DOIUrl":"10.1016/j.bcra.2024.100206","url":null,"abstract":"<div><div>Finance, supply chains, healthcare, and energy have an increasing demand for secure transactions and data exchange. Permissioned blockchains fulfilled this need thanks to the consensus protocol that ensures that participants agree on a common value. One of the most widely used protocols in private blockchains is the Practical Byzantine Fault Tolerance (PBFT), which tolerates up to one-third of Byzantine nodes, performs within partially synchronous systems, and has superior throughput compared to other protocols. It has, however, an important bandwidth consumption: <span><math><mn>2</mn><mi>N</mi><mo>(</mo><mi>N</mi><mo>−</mo><mn>1</mn><mo>)</mo></math></span> messages are exchanged in a system composed of <em>N</em> nodes to validate only one block.</div><div>It is possible to reduce the number of consensus participants by restricting the validation process to nodes that have demonstrated high levels of security, rapidity, and availability. In this paper, we propose the first database that traces the behavior of nodes within a system that performs PBFT consensus. It reflects their level of security, rapidity, and availability throughout the consensus. We first investigate different Single-Task Learning (STL) techniques to classify the nodes within our dataset. Then, using Multi-Task Learning (MTL) techniques, the results are much more interesting, with classification accuracies over 98%. Integrating node classification as a preliminary step to the PBFT protocol optimizes the consensus. In the best cases, it is able to reduce the latency by up to 94% and the communication traffic by up to 99%.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100206"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000198/pdfft?md5=e11c2d536c1985f173948098606e4b4b&pid=1-s2.0-S2096720924000198-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141051117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-preserving data aggregation system based on blockchain in VANET 基于区块链的 VANET 隐私保护数据聚合系统
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100210
Ruicheng Yang , Guofang Dong , Zhengnan Xu , Juangui Ning , Jianming Du
In the realm of vehicular ad hoc networks (VANETs), data aggregation plays a pivotal role in bringing together data from multiple vehicles for further processing and sharing. Erroneous data feedback can significantly impact vehicle operations, control, and overall safety, necessitating the assurance of security in vehicular data aggregation. Addressing the security risks and challenges inherent in data aggregation within VANETs, this paper introduces a blockchain-based scheme for secure and anonymous data aggregation. The proposed scheme integrates cloud computing with blockchain technology, presenting a novel blockchain-based data aggregation system that robustly supports efficient and secure data collection in VANETs. Leveraging key escrow resilience mechanisms, the solution ensures the security of system keys, preventing the security problems caused by keys generated by third parties alone in the past. Furthermore, through secondary data aggregation, fine-grained data aggregation is achieved, providing effective support for cloud services in VANETs. The effectiveness of the proposed scheme is confirmed through security analysis and performance evaluations, demonstrating superior computational and communication efficiency compared existing alternatives.
在车辆特设网络(VANET)领域,数据聚合在汇集来自多辆车辆的数据以供进一步处理和共享方面发挥着关键作用。错误的数据反馈会严重影响车辆的运行、控制和整体安全,因此必须确保车辆数据聚合的安全性。针对 VANET 数据聚合中固有的安全风险和挑战,本文介绍了一种基于区块链的安全匿名数据聚合方案。该方案将云计算与区块链技术相结合,提出了一种新颖的基于区块链的数据聚合系统,可为 VANET 中高效、安全的数据收集提供有力支持。该方案利用密钥托管弹性机制,确保了系统密钥的安全性,避免了以往由第三方单独生成密钥所带来的安全问题。此外,通过二次数据聚合,实现了细粒度数据聚合,为 VANET 中的云服务提供了有效支持。通过安全分析和性能评估证实了所提方案的有效性,与现有方案相比,该方案具有更高的计算和通信效率。
{"title":"A privacy-preserving data aggregation system based on blockchain in VANET","authors":"Ruicheng Yang ,&nbsp;Guofang Dong ,&nbsp;Zhengnan Xu ,&nbsp;Juangui Ning ,&nbsp;Jianming Du","doi":"10.1016/j.bcra.2024.100210","DOIUrl":"10.1016/j.bcra.2024.100210","url":null,"abstract":"<div><div>In the realm of vehicular ad hoc networks (VANETs), data aggregation plays a pivotal role in bringing together data from multiple vehicles for further processing and sharing. Erroneous data feedback can significantly impact vehicle operations, control, and overall safety, necessitating the assurance of security in vehicular data aggregation. Addressing the security risks and challenges inherent in data aggregation within VANETs, this paper introduces a blockchain-based scheme for secure and anonymous data aggregation. The proposed scheme integrates cloud computing with blockchain technology, presenting a novel blockchain-based data aggregation system that robustly supports efficient and secure data collection in VANETs. Leveraging key escrow resilience mechanisms, the solution ensures the security of system keys, preventing the security problems caused by keys generated by third parties alone in the past. Furthermore, through secondary data aggregation, fine-grained data aggregation is achieved, providing effective support for cloud services in VANETs. The effectiveness of the proposed scheme is confirmed through security analysis and performance evaluations, demonstrating superior computational and communication efficiency compared existing alternatives.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100210"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic diversity, virulence profiles, and antimicrobial resistance of Salmonella enterica serovar Typhi isolated from typhoid fever patients in Baghdad, Iraq 从伊拉克巴格达伤寒患者中分离出的肠炎血清型伤寒沙门氏菌的遗传多样性、毒力特征和抗菌药耐药性
Q1 Social Sciences Pub Date : 2024-08-17 DOI: 10.1016/j.jobb.2024.08.001
Muna Sabah Dawood, Nadheema Hammood Hussein, Khetam Habeeb Rasool

Typhoid fever is an important health issue in developing countries, and the pathogenicity of Salmonella enterica serovar Typhi (S. ser. Typhi) depends on the presence of different virulence factors. Therefore, this study aimed to investigate the spread of virulence genes among S. Typhi isolates from patients with typhoid fever in Baghdad, Iraq. Sixty S. Typhi isolates were collected from several hospitals in Baghdad and identified using VITEK-II and confirmed by polymerase chain reaction (PCR) to detect the 16S rRNA gene. After testing their susceptibility to different antimicrobials (via the disk diffusion method), we found the highest resistance rates (100 %) were to ampicillin, piperacillin, cefotaxime, and ceftriaxone. The highest sensitivity rates (100 %) were to ertapenem, imipenem, meropenem, and sulfamethoxazole/trimethoprim. The presence of genes encoding for virulence in S. Typhi isolates was tested by conventional PCR. The results showed that out of 60 isolates, 59 (98.3 %), 59 (98.3 %), 58 (96.7 %), and 60 (100 %) were positive for viaB, staA, cdtB, and orfL genes, respectively. The sequencing of PCR products (viaB, staA, cdtB, and orfL genes) was carried out at the Macrogen Company (Seoul, Korea). The sequences were compared with nucleotide sequences in the BLAST GenBank database, and data obtained from the sequencing of these virulence genes were submitted to GenBank under different accession numbers. A phylogenetic analysis of the 16S rRNA gene sequence found a high similarity between local sequences and the closely related sequences of genes in GenBank. The presence of the viaB, staA, cdtB, and orfL virulence genes in nearly all of the isolates under examination suggests that they play an important role in the pathogenicity of local isolates.

伤寒是发展中国家的一个重要健康问题,而肠炎沙门氏菌(S. ser. Typhi)的致病性取决于不同毒力因子的存在。因此,本研究旨在调查伊拉克巴格达伤寒患者中分离出的伤寒沙门氏菌毒力基因的传播情况。研究人员从巴格达的几家医院收集了 60 株伤寒杆菌分离株,使用 VITEK-II 进行鉴定,并通过聚合酶链式反应(PCR)检测 16S rRNA 基因进行确认。在检测了它们对不同抗菌药物的敏感性(通过磁盘扩散法)后,我们发现对氨苄西林、哌拉西林、头孢他啶和头孢曲松的耐药率最高(100%)。对厄他培南、亚胺培南、美罗培南和磺胺甲噁唑/曲安奈德的敏感率最高(100%)。通过传统的聚合酶链式反应(PCR)检测了伤寒杆菌分离物中是否存在编码毒力的基因。结果显示,在 60 个分离株中,分别有 59 个(98.3%)、59 个(98.3%)、58 个(96.7%)和 60 个(100%)的 viaB、staA、cdtB 和 orfL 基因呈阳性。PCR产物(viaB、staA、cttB和orfL基因)的测序在Macrogen公司(韩国首尔)进行。测序结果与 BLAST GenBank 数据库中的核苷酸序列进行了比较,这些毒力基因的测序数据以不同的登录号提交给了 GenBank。对 16S rRNA 基因序列进行的系统进化分析发现,本地序列与 GenBank 中密切相关的基因序列具有很高的相似性。几乎所有被检测的分离株中都含有 viaB、staA、cttB 和 orfL 致病基因,这表明它们在本地分离株的致病性中起着重要作用。
{"title":"Genetic diversity, virulence profiles, and antimicrobial resistance of Salmonella enterica serovar Typhi isolated from typhoid fever patients in Baghdad, Iraq","authors":"Muna Sabah Dawood,&nbsp;Nadheema Hammood Hussein,&nbsp;Khetam Habeeb Rasool","doi":"10.1016/j.jobb.2024.08.001","DOIUrl":"10.1016/j.jobb.2024.08.001","url":null,"abstract":"<div><p>Typhoid fever is an important health issue in developing countries, and the pathogenicity of <em>Salmonella enterica</em> serovar Typhi (<em>S.</em> ser. Typhi) depends on the presence of different virulence factors. Therefore, this study aimed to investigate the spread of virulence genes among <em>S.</em> Typhi isolates from patients with typhoid fever in Baghdad, Iraq. Sixty <em>S.</em> Typhi isolates were collected from several hospitals in Baghdad and identified using VITEK-II and confirmed by polymerase chain reaction <strong>(</strong>PCR) to detect the <em>16S rRNA</em> gene. After testing their susceptibility to different antimicrobials (via the disk diffusion method), we found the highest resistance rates (100 %) were to ampicillin, piperacillin, cefotaxime, and ceftriaxone. The highest sensitivity rates (100 %) were to ertapenem, imipenem, meropenem, and sulfamethoxazole/trimethoprim. The presence of genes encoding for virulence in <em>S.</em> Typhi isolates was tested by conventional PCR. The results showed that out of 60 isolates, 59 (98.3 %), 59 (98.3 %), 58 (96.7 %), and 60 (100 %) were positive for <em>viaB, staA, cdtB,</em> and <em>orfL</em> genes, respectively. The sequencing of PCR products (<em>viaB, staA, cdtB,</em> and <em>orfL</em> genes) was carried out at the Macrogen Company (Seoul, Korea). The sequences were compared with nucleotide sequences in the BLAST GenBank database, and data obtained from the sequencing of these virulence genes were submitted to GenBank under different accession numbers. A phylogenetic analysis of the <em>16S rRNA</em> gene sequence found a high similarity between local sequences and the closely related sequences of genes in GenBank. The presence of the <em>viaB, staA, cdtB,</em> and <em>orfL</em> virulence genes in nearly all of the isolates under examination suggests that they play an important role in the pathogenicity of local isolates.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 4","pages":"Pages 225-233"},"PeriodicalIF":0.0,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000396/pdfft?md5=29e047c9e195776b3f4303349920534c&pid=1-s2.0-S2588933824000396-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142083192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competing with autonomous model vehicles: a software stack for driving in smart city environments 与自动驾驶模型车竞争:智能城市环境中的驾驶软件堆栈
Pub Date : 2024-08-14 DOI: 10.1007/s43684-024-00074-w
Julius Bächle, Jakob Häringer, Noah Köhler, Kadir-Kaan Özer, Markus Enzweiler, Reiner Marchthaler

This article introduces an open-source software stack designed for autonomous 1:10 scale model vehicles. Initially developed for the Bosch Future Mobility Challenge (BFMC) student competition, this versatile software stack is applicable to a variety of autonomous driving competitions. The stack comprises perception, planning, and control modules, each essential for precise and reliable scene understanding in complex environments such as a miniature smart city in the context of BFMC. Given the limited computing power of model vehicles and the necessity for low-latency real-time applications, the stack is implemented in C++, employs YOLO Version 5 s for environmental perception, and leverages the state-of-the-art Robot Operating System (ROS) for inter-process communication. We believe that this article and the accompanying open-source software will be a valuable resource for future teams participating in autonomous driving student competitions. Our work can serve as a foundational tool for novice teams and a reference for more experienced participants. The code and data are publicly available on GitHub.

本文介绍了专为 1:10 比例自动驾驶模型车设计的开源软件栈。这款多功能软件堆栈最初是为博世未来交通挑战赛(BFMC)学生竞赛开发的,适用于各种自动驾驶竞赛。该堆栈包括感知、规划和控制模块,每个模块对于在复杂环境(如 BFMC 中的微型智能城市)中精确可靠地理解场景都至关重要。鉴于模型车的计算能力有限以及低延迟实时应用的必要性,该堆栈采用 C++ 实现,使用 YOLO Version 5 s 进行环境感知,并利用最先进的机器人操作系统 (ROS) 进行进程间通信。我们相信,这篇文章和随附的开源软件将成为未来参加自动驾驶学生竞赛团队的宝贵资源。我们的工作可作为新手团队的基础工具和经验丰富的参赛者的参考资料。代码和数据可在 GitHub 上公开获取。
{"title":"Competing with autonomous model vehicles: a software stack for driving in smart city environments","authors":"Julius Bächle,&nbsp;Jakob Häringer,&nbsp;Noah Köhler,&nbsp;Kadir-Kaan Özer,&nbsp;Markus Enzweiler,&nbsp;Reiner Marchthaler","doi":"10.1007/s43684-024-00074-w","DOIUrl":"10.1007/s43684-024-00074-w","url":null,"abstract":"<div><p>This article introduces an open-source software stack designed for autonomous 1:10 scale model vehicles. Initially developed for the Bosch Future Mobility Challenge (BFMC) student competition, this versatile software stack is applicable to a variety of autonomous driving competitions. The stack comprises perception, planning, and control modules, each essential for precise and reliable scene understanding in complex environments such as a miniature smart city in the context of BFMC. Given the limited computing power of model vehicles and the necessity for low-latency real-time applications, the stack is implemented in C++, employs YOLO Version 5 s for environmental perception, and leverages the state-of-the-art Robot Operating System (ROS) for inter-process communication. We believe that this article and the accompanying open-source software will be a valuable resource for future teams participating in autonomous driving student competitions. Our work can serve as a foundational tool for novice teams and a reference for more experienced participants. The code and data are publicly available on GitHub.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00074-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142411651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudovirus technology in global health: A critical need for robust biosecurity measures 全球卫生领域的伪病毒技术:迫切需要强有力的生物安全措施
Q1 Social Sciences Pub Date : 2024-08-06 DOI: 10.1016/j.jobb.2024.07.002
Abhijit Poddar , S.R. Rao
{"title":"Pseudovirus technology in global health: A critical need for robust biosecurity measures","authors":"Abhijit Poddar ,&nbsp;S.R. Rao","doi":"10.1016/j.jobb.2024.07.002","DOIUrl":"10.1016/j.jobb.2024.07.002","url":null,"abstract":"","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 4","pages":"Pages 223-224"},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000384/pdfft?md5=e08b2d7d323a451bf516682ba068e063&pid=1-s2.0-S2588933824000384-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142050451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Narrow windows of opportunity: the limited utility of cyber operations in war 狭窄的机会之窗:网络行动在战争中的作用有限
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-08-05 DOI: 10.1093/cybsec/tyae014
Frederik A H Pedersen, Jeppe T Jacobsen
The use of offensive cyber operations in war is no longer theoretical conjecture. Still, as we witness their use, important questions remain. How are offensive cyber operations employed in conventional warfighting, and what is their utility for the warfighting? This article answers these questions by analyzing new empirical evidence from the Russo–Ukrainian War, drawing on the novel TECI-model built for systematically analyzing and understanding offensive cyber operations in war through the model’s four constituent variables: target, effect, complexity, and integration. The article finds the utility of cyber operations in war is limited owing to an unsuitability for physical destruction, high risks of failure, high costs of complex operations that are more likely to attain successful and destructive effects, and a dichotomy between the tempi of conventional and cyber operations leading to cross-domain integration difficulties. Still, two narrow windows for achieving utility exist. Cumulative strategic utility is achievable by targeting critical infrastructure and governments in a persistent barrage of less complex cyber operations. Operational and tactical utility is achievable in the beginning of warfighting where the temporal dichotomy is less pronounced because cross-domain integration can be planned before warfighting commences. Filling a gap in the literature, TECI provides a common and operationalized model for future research systematically analyzing cyber operations, allowing for comparisons on the evolving role of cyberspace in war.
在战争中使用进攻性网络行动已不再是理论上的猜想。尽管如此,在我们目睹其使用的同时,重要的问题依然存在。在常规战争中如何使用进攻性网络作战?本文通过分析俄乌战争中新的实证证据,借鉴新颖的 TECI 模型来回答这些问题,该模型通过目标、效果、复杂性和整合四个组成变量来系统分析和理解战争中的进攻性网络行动。文章认为,由于不适合物理破坏、失败风险高、复杂行动成本高且更有可能取得成功和破坏性效果,以及常规行动和网络行动的二元对立导致跨域整合困难,网络行动在战争中的作用有限。尽管如此,仍存在两个实现效用的狭窄窗口。在不太复杂的网络行动中,以关键基础设施和政府为目标,可以实现累积战略效用。作战和战术效用可在作战初期实现,因为跨域整合可在作战开始前进行规划,所以时间上的二分法不那么明显。TECI 填补了文献中的空白,为未来系统分析网络作战的研究提供了一个通用和可操作的模型,从而可以对网络空间在战争中不断演变的作用进行比较。
{"title":"Narrow windows of opportunity: the limited utility of cyber operations in war","authors":"Frederik A H Pedersen, Jeppe T Jacobsen","doi":"10.1093/cybsec/tyae014","DOIUrl":"https://doi.org/10.1093/cybsec/tyae014","url":null,"abstract":"The use of offensive cyber operations in war is no longer theoretical conjecture. Still, as we witness their use, important questions remain. How are offensive cyber operations employed in conventional warfighting, and what is their utility for the warfighting? This article answers these questions by analyzing new empirical evidence from the Russo–Ukrainian War, drawing on the novel TECI-model built for systematically analyzing and understanding offensive cyber operations in war through the model’s four constituent variables: target, effect, complexity, and integration. The article finds the utility of cyber operations in war is limited owing to an unsuitability for physical destruction, high risks of failure, high costs of complex operations that are more likely to attain successful and destructive effects, and a dichotomy between the tempi of conventional and cyber operations leading to cross-domain integration difficulties. Still, two narrow windows for achieving utility exist. Cumulative strategic utility is achievable by targeting critical infrastructure and governments in a persistent barrage of less complex cyber operations. Operational and tactical utility is achievable in the beginning of warfighting where the temporal dichotomy is less pronounced because cross-domain integration can be planned before warfighting commences. Filling a gap in the literature, TECI provides a common and operationalized model for future research systematically analyzing cyber operations, allowing for comparisons on the evolving role of cyberspace in war.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"78 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational modeling and inhibition of SARS-COV-2 Papain-like protease enzyme: A potential therapeutic approach for COVID-19 计算建模和抑制 SARS-COV-2 Papain 样蛋白酶:COVID-19 的潜在治疗方法
Q1 Social Sciences Pub Date : 2024-08-03 DOI: 10.1016/j.jobb.2024.07.001
Auwal Rabiu Auwal , Isa Abdullahi Baba , Evren Hincal , Fathalla A. Rihan

This study aims to investigate the potential impact of inhibitors targeting the papain-like protease (PLpro) of SARS-CoV-2 on viral replication and the host immune response. A mathematical model was developed to simulate the interaction among susceptible cells, infected cells, PLpro, and immune cells, incorporating data on PLpro inhibition. Through numerical simulations using MATLAB, the model parameters were estimated based on available statistical data. The results indicate that strategically positioned inhibitors could impede the virus’s access to host cellular machinery, thereby enhancing the immune response and gradually reducing susceptible and infected cells over time. The dynamics of the viral enzyme PLpro showed reduced activity with the introduction of the inhibitor, leading to a decline in viral replication. Moreover, the immune cell population exhibited functional recovery as the inhibitor suppressed PLpro activity. These findings suggest that inhibitors targeting PLpro may serve as therapeutic interventions against SARS-CoV-2 by inhibiting viral replication and bolstering the immune response.

本研究旨在探讨针对 SARS-CoV-2 的木瓜蛋白酶(PLpro)的抑制剂对病毒复制和宿主免疫反应的潜在影响。研究建立了一个数学模型来模拟易感细胞、感染细胞、PLpro 和免疫细胞之间的相互作用,并结合了有关 PLpro 抑制的数据。通过使用 MATLAB 进行数值模拟,根据现有统计数据对模型参数进行了估计。结果表明,有策略地放置抑制剂可以阻碍病毒进入宿主细胞机制,从而增强免疫反应,并随着时间的推移逐渐减少易感细胞和受感染细胞。病毒酶 PLpro 的动态变化表明,抑制剂的引入会降低病毒酶 PLpro 的活性,从而导致病毒复制能力下降。此外,由于抑制剂抑制了 PLpro 的活性,免疫细胞群表现出功能恢复。这些研究结果表明,针对 PLpro 的抑制剂可以通过抑制病毒复制和增强免疫反应来干预 SARS-CoV-2 的治疗。
{"title":"Computational modeling and inhibition of SARS-COV-2 Papain-like protease enzyme: A potential therapeutic approach for COVID-19","authors":"Auwal Rabiu Auwal ,&nbsp;Isa Abdullahi Baba ,&nbsp;Evren Hincal ,&nbsp;Fathalla A. Rihan","doi":"10.1016/j.jobb.2024.07.001","DOIUrl":"10.1016/j.jobb.2024.07.001","url":null,"abstract":"<div><p>This study aims to investigate the potential impact of inhibitors targeting the papain-like protease (PLpro) of SARS-CoV-2 on viral replication and the host immune response. A mathematical model was developed to simulate the interaction among susceptible cells, infected cells, PLpro, and immune cells, incorporating data on PLpro inhibition. Through numerical simulations using MATLAB, the model parameters were estimated based on available statistical data. The results indicate that strategically positioned inhibitors could impede the virus’s access to host cellular machinery, thereby enhancing the immune response and gradually reducing susceptible and infected cells over time. The dynamics of the viral enzyme PLpro showed reduced activity with the introduction of the inhibitor, leading to a decline in viral replication. Moreover, the immune cell population exhibited functional recovery as the inhibitor suppressed PLpro activity. These findings suggest that inhibitors targeting PLpro may serve as therapeutic interventions against SARS-CoV-2 by inhibiting viral replication and bolstering the immune response.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 211-221"},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000372/pdfft?md5=fdbf876165b0e2e2b70466ae5d584222&pid=1-s2.0-S2588933824000372-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering MKEAH: 基于超平面嵌入的多模态知识提取和积累,用于基于知识的视觉问题解答
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.002
Heng Zhang , Zhihua Wei , Guanming Liu , Rui Wang , Ruibin Mu , Chuanbao Liu , Aiquan Yuan , Guodong Cao , Ning Hu

Background

External knowledge representations play an essential role in knowledge-based visual question and answering to better understand complex scenarios in the open world. Recent entity-relationship embedding approaches are deficient in representing some complex relations, resulting in a lack of topic-related knowledge and redundancy in topic-irrelevant information.

Methods

To this end, we propose MKEAH: Multimodal Knowledge Extraction and Accumulation on Hyperplanes. To ensure that the lengths of the feature vectors projected onto the hyperplane compare equally and to filter out sufficient topic-irrelevant information, two losses are proposed to learn the triplet representations from the complementary views: range loss and orthogonal loss. To interpret the capability of extracting topic-related knowledge, we present the Topic Similarity (TS) between topic and entity-relations.

Results

Experimental results demonstrate the effectiveness of hyperplane embedding for knowledge representation in knowledge-based visual question answering. Our model outperformed state-of-the-art methods by 2.12% and 3.24% on two challenging knowledge-request datasets: OK-VQA and KRVQA, respectively.

Conclusions

The obvious advantages of our model in TS show that using hyperplane embedding to represent multimodal knowledge can improve its ability to extract topic-related knowledge.

背景外部知识表征在基于知识的可视化问答中发挥着至关重要的作用,可以更好地理解开放世界中的复杂场景。最近的实体关系嵌入方法在表示一些复杂关系方面存在缺陷,导致缺乏与主题相关的知识和与主题无关的冗余信息。为了确保投射到超平面上的特征向量长度相等,并过滤掉足够多的与主题无关的信息,我们提出了两种损失来学习互补视图的三元组表示:范围损失和正交损失。为了解释提取主题相关知识的能力,我们提出了主题和实体关系之间的主题相似度(TS)。 实验结果实验结果证明了超平面嵌入在基于知识的视觉问题解答中的知识表示的有效性。在两个具有挑战性的知识请求数据集上,我们的模型分别以 2.12% 和 3.24% 的优势超过了最先进的方法:结论我们的模型在 TS 中的明显优势表明,使用超平面嵌入来表示多模态知识可以提高提取主题相关知识的能力。
{"title":"MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering","authors":"Heng Zhang ,&nbsp;Zhihua Wei ,&nbsp;Guanming Liu ,&nbsp;Rui Wang ,&nbsp;Ruibin Mu ,&nbsp;Chuanbao Liu ,&nbsp;Aiquan Yuan ,&nbsp;Guodong Cao ,&nbsp;Ning Hu","doi":"10.1016/j.vrih.2023.06.002","DOIUrl":"10.1016/j.vrih.2023.06.002","url":null,"abstract":"<div><h3>Background</h3><p>External knowledge representations play an essential role in knowledge-based visual question and answering to better understand complex scenarios in the open world. Recent entity-relationship embedding approaches are deficient in representing some complex relations, resulting in a lack of topic-related knowledge and redundancy in topic-irrelevant information.</p></div><div><h3>Methods</h3><p>To this end, we propose MKEAH: Multimodal Knowledge Extraction and Accumulation on Hyperplanes. To ensure that the lengths of the feature vectors projected onto the hyperplane compare equally and to filter out sufficient topic-irrelevant information, two losses are proposed to learn the triplet representations from the complementary views: range loss and orthogonal loss. To interpret the capability of extracting topic-related knowledge, we present the Topic Similarity (TS) between topic and entity-relations.</p></div><div><h3>Results</h3><p>Experimental results demonstrate the effectiveness of hyperplane embedding for knowledge representation in knowledge-based visual question answering. Our model outperformed state-of-the-art methods by 2.12% and 3.24% on two challenging knowledge-request datasets: OK-VQA and KRVQA, respectively.</p></div><div><h3>Conclusions</h3><p>The obvious advantages of our model in TS show that using hyperplane embedding to represent multimodal knowledge can improve its ability to extract topic-related knowledge.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 280-291"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000268/pdfft?md5=74ea90656cf281de7a0e35aa5b55705b&pid=1-s2.0-S2096579623000268-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale context-aware network for continuous sign language recognition 用于连续手语识别的多尺度情境感知网络
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.011
Senhua XUE, Liqing GAO, Liang WAN, Wei FENG

The hands and face are the most important parts for expressing sign language morphemes in sign language videos. However, we find that existing Continuous Sign Language Recognition (CSLR) methods lack the mining of hand and face information in visual backbones or use expensive and time-consuming external extractors to explore this information. In addition, the signs have different lengths, whereas previous CSLR methods typically use a fixed-length window to segment the video to capture sequential features and then perform global temporal modeling, which disturbs the perception of complete signs. In this study, we propose a Multi-Scale Context-Aware network (MSCA-Net) to solve the aforementioned problems. Our MSCA-Net contains two main modules: (1) Multi-Scale Motion Attention (MSMA), which uses the differences among frames to perceive information of the hands and face in multiple spatial scales, replacing the heavy feature extractors; and (2) Multi-Scale Temporal Modeling (MSTM), which explores crucial temporal information in the sign language video from different temporal scales. We conduct extensive experiments using three widely used sign language datasets, i.e., RWTH-PHOENIX-Weather-2014, RWTH-PHOENIX-Weather-2014T, and CSL-Daily. The proposed MSCA-Net achieve state-of-the-art performance, demonstrating the effectiveness of our approach.

手和脸是手语视频中表达手语语素的最重要部分。然而,我们发现现有的连续手语识别(CSLR)方法缺乏对视觉骨干中手和脸部信息的挖掘,或者使用昂贵耗时的外部提取器来挖掘这些信息。此外,手势的长度各不相同,而以往的 CSLR 方法通常使用固定长度的窗口分割视频以捕捉连续特征,然后进行全局时序建模,这干扰了对完整手势的感知。在本研究中,我们提出了一种多尺度上下文感知网络(MSCA-Net)来解决上述问题。我们的 MSCA-Net 包含两个主要模块:(1) 多尺度运动注意(MSMA),它利用帧间的差异来感知多个空间尺度上的手部和面部信息,取代了繁重的特征提取器;(2) 多尺度时间建模(MSTM),它从不同的时间尺度上探索手语视频中关键的时间信息。我们使用三个广泛使用的手语数据集(即 RWTH-PHOENIX-Weather-2014、RWTH-PHOENIX-Weather-2014T 和 CSL-Daily)进行了大量实验。所提出的 MSCA-Net 达到了最先进的性能,证明了我们方法的有效性。
{"title":"Multi-scale context-aware network for continuous sign language recognition","authors":"Senhua XUE,&nbsp;Liqing GAO,&nbsp;Liang WAN,&nbsp;Wei FENG","doi":"10.1016/j.vrih.2023.06.011","DOIUrl":"10.1016/j.vrih.2023.06.011","url":null,"abstract":"<div><p>The hands and face are the most important parts for expressing sign language morphemes in sign language videos. However, we find that existing Continuous Sign Language Recognition (CSLR) methods lack the mining of hand and face information in visual backbones or use expensive and time-consuming external extractors to explore this information. In addition, the signs have different lengths, whereas previous CSLR methods typically use a fixed-length window to segment the video to capture sequential features and then perform global temporal modeling, which disturbs the perception of complete signs. In this study, we propose a Multi-Scale Context-Aware network (MSCA-Net) to solve the aforementioned problems. Our MSCA-Net contains two main modules: <strong>(</strong>1) Multi-Scale Motion Attention (MSMA), which uses the differences among frames to perceive information of the hands and face in multiple spatial scales, replacing the heavy feature extractors; and <strong>(</strong>2) Multi-Scale Temporal Modeling (MSTM), which explores crucial temporal information in the sign language video from different temporal scales. We conduct extensive experiments using three widely used sign language datasets, i.e., RWTH-PHOENIX-Weather-2014, RWTH-PHOENIX-Weather-2014T, and CSL-Daily. The proposed MSCA-Net achieve state-of-the-art performance, demonstrating the effectiveness of our approach.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 323-337"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000414/pdfft?md5=d9cac344d105f6ddc495c1cb1e50a67a&pid=1-s2.0-S2096579623000414-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust blind image watermarking based on interest points 基于兴趣点的鲁棒盲图像水印技术
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.012
Zizhuo WANG, Kun HU, Chaoyangfan HUANG, Zixuan HU, Shuo YANG, Xingjun WANG

Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability. However, image watermarking algorithms are weak against hybrid attacks, especially geometric at-tacks, such as cropping attacks, rotation attacks, etc. We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further. First, to extract more sparse and stable interest points, we use the Superpoint algorithm for generation and design two steps to perform the screening procedure. We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability. The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework. Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks. We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks. Through extensive experimental results, we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image. Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.

数字水印技术在防伪和溯源工作中发挥着至关重要的作用。然而,图像水印算法对混合攻击的抵抗力较弱,尤其是几何攻击,如裁剪攻击、旋转攻击等。我们提出了一种结合稳定兴趣点和深度学习网络的鲁棒盲图像水印算法,以进一步提高水印算法的鲁棒性。首先,为了提取更多稀疏且稳定的兴趣点,我们使用超级点算法进行生成,并设计了两个步骤来执行筛选程序。我们首先保留给定区域内可能性最大的点,以确保点的稀疏性,然后通过混合攻击筛选出稳健的兴趣点,以确保高稳定性。利用基于深度学习的框架,将信息嵌入以稳定兴趣点为中心的子块中。在对抗训练中加入不同类型的攻击和模拟噪声,以保证嵌入块的鲁棒性。我们使用 ConvNext 网络提取水印,并根据未嵌入子块的解码值确定分割阈值。通过大量的实验结果,我们证明了我们提出的算法可以提高网络提取信息的准确性,同时确保嵌入图像与原始覆盖图像之间的高隐蔽性。与之前的 SOTA 工作相比,我们的算法可以在混合攻击和几何攻击中取得更好的视觉和数值结果。
{"title":"Robust blind image watermarking based on interest points","authors":"Zizhuo WANG,&nbsp;Kun HU,&nbsp;Chaoyangfan HUANG,&nbsp;Zixuan HU,&nbsp;Shuo YANG,&nbsp;Xingjun WANG","doi":"10.1016/j.vrih.2023.06.012","DOIUrl":"10.1016/j.vrih.2023.06.012","url":null,"abstract":"<div><p>Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability. However, image watermarking algorithms are weak against hybrid attacks, especially geometric at-tacks, such as cropping attacks, rotation attacks, etc. We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further. First, to extract more sparse and stable interest points, we use the Superpoint algorithm for generation and design two steps to perform the screening procedure. We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability. The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework. Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks. We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks. Through extensive experimental results, we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image. Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 308-322"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000426/pdfft?md5=0d46d851b07db92670b0c63431ec427e&pid=1-s2.0-S2096579623000426-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1