首页 > 最新文献

Wireless Networks最新文献

英文 中文
Symbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system 基于新型离散和谐搜索算法的 MIMO-FBMC/OQAM 系统中的符号检测
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-17 DOI: 10.1007/s11276-024-03708-2

Abstract

Due to its high spectral efficiency and various other advantages, filter bank multicarrier/offset quadrate amplitude modulation (FBMC/OQAM) has long been considered as a candidate waveform for the fifth generation (5G) and beyond telecommunication technologies. On the other hand, it is possible to both increase the data rate and alleviate the channel fading effects by using the multiple-input multiple-output (MIMO) antenna structure in the FBMC/OQAM transceiver. However, since the symbol detection is an indispensable task to be fulfilled in wireless communication, it is crucial to employ an efficient symbol detector at the MIMO-FBMC/OQAM receiver. Maximum likelihood (ML) detector, which always finds the optimal symbols by trying all of the possible symbol combinations likely to be transmitted, is known for its extremely high computational complexity making it impractical to be used in any system. On the other hand, it is possible to both considerably reduce the ML complexity and achieve the near-ML performance by optimizing the symbol vectors instead of implementing an exhaustive search. Since searching for the optimal symbol combination in discrete space is a combinatorial optimization problem, we developed a novel discrete harmony search (disHS) algorithm to perform this operation. According to the simulation results, the newly developed disHS algorithm not only achieves near-ML performance with lower computational complexity, but also clearly leaves behind the other symbol detectors considered in this paper.

摘要 滤波器组多载波/偏移四倍振幅调制(FBMC/OQAM)具有高频谱效率和其他各种优势,长期以来一直被认为是第五代(5G)及以后电信技术的候选波形。另一方面,通过在 FBMC/OQAM 收发器中使用多输入多输出(MIMO)天线结构,可以提高数据传输速率并减轻信道衰落效应。然而,由于符号检测是无线通信中不可或缺的任务,因此在 MIMO-FBMC/OQAM 接收器中采用高效的符号检测器至关重要。最大似然(ML)检测器总是通过尝试所有可能传输的符号组合来找到最佳符号,但众所周知,它的计算复杂度极高,因此在任何系统中使用都不切实际。另一方面,通过优化符号向量而不是执行穷举搜索,可以大大降低 ML 复杂性,并实现接近 ML 的性能。由于在离散空间中搜索最优符号组合是一个组合优化问题,我们开发了一种新型离散和谐搜索(disHS)算法来执行这一操作。根据仿真结果,新开发的 disHS 算法不仅以较低的计算复杂度实现了接近 ML 的性能,而且明显落后于本文所考虑的其他符号检测器。
{"title":"Symbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system","authors":"","doi":"10.1007/s11276-024-03708-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03708-2","url":null,"abstract":"<h3>Abstract</h3> <p>Due to its high spectral efficiency and various other advantages, filter bank multicarrier/offset quadrate amplitude modulation (FBMC/OQAM) has long been considered as a candidate waveform for the fifth generation (5G) and beyond telecommunication technologies. On the other hand, it is possible to both increase the data rate and alleviate the channel fading effects by using the multiple-input multiple-output (MIMO) antenna structure in the FBMC/OQAM transceiver. However, since the symbol detection is an indispensable task to be fulfilled in wireless communication, it is crucial to employ an efficient symbol detector at the MIMO-FBMC/OQAM receiver. Maximum likelihood (ML) detector, which always finds the optimal symbols by trying all of the possible symbol combinations likely to be transmitted, is known for its extremely high computational complexity making it impractical to be used in any system. On the other hand, it is possible to both considerably reduce the ML complexity and achieve the near-ML performance by optimizing the symbol vectors instead of implementing an exhaustive search. Since searching for the optimal symbol combination in discrete space is a combinatorial optimization problem, we developed a novel discrete harmony search (disHS) algorithm to perform this operation. According to the simulation results, the newly developed disHS algorithm not only achieves near-ML performance with lower computational complexity, but also clearly leaves behind the other symbol detectors considered in this paper.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"39 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NLOS error mitigation in TOA systems TOA 系统中的 NLOS 误差缓解
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-15 DOI: 10.1007/s11276-024-03702-8

Abstract

To address the problem of low indoor positioning accuracy in time-of-arrival systems in the non-line-of-sight (NLOS) environments, we proposed an optimized positioning algorithm based on semidefinite programming (SDP). This algorithm reduces the NLOS error through a novelty method. Compared with the original SDP algorithm, we optimized the algorithm’s objective function by avoiding its dependence on the prior information, thereby decreasing infeasibility problems. The experiment showed that the proposed algorithm’s accuracy is superior to that of the traditional SDP algorithm in the same indoor environment.

摘要 针对到达时间系统在非视距(NLOS)环境下室内定位精度低的问题,我们提出了一种基于半定量编程(SDP)的优化定位算法。该算法通过一种新颖的方法减少了 NLOS 误差。与原来的 SDP 算法相比,我们通过避免对先验信息的依赖,优化了算法的目标函数,从而减少了不可行性问题。实验表明,在相同的室内环境下,所提出算法的精确度优于传统的 SDP 算法。
{"title":"NLOS error mitigation in TOA systems","authors":"","doi":"10.1007/s11276-024-03702-8","DOIUrl":"https://doi.org/10.1007/s11276-024-03702-8","url":null,"abstract":"<h3>Abstract</h3> <p>To address the problem of low indoor positioning accuracy in time-of-arrival systems in the non-line-of-sight (NLOS) environments, we proposed an optimized positioning algorithm based on semidefinite programming (SDP). This algorithm reduces the NLOS error through a novelty method. Compared with the original SDP algorithm, we optimized the algorithm’s objective function by avoiding its dependence on the prior information, thereby decreasing infeasibility problems. The experiment showed that the proposed algorithm’s accuracy is superior to that of the traditional SDP algorithm in the same indoor environment.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"21 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed relay selection using a fuzzy-BCM based decision making strategy for multi-hop data dissemination in VANETs 使用基于模糊-BCM 决策策略的分布式中继选择,用于 VANET 中的多跳数据传播
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-15 DOI: 10.1007/s11276-024-03705-5

Abstract

In urban Vehicular Ad-hoc Networks (VANETs), disseminating traffic data efficiently is challenging due to the dynamic and complex nature of the network. Multi-hop-based broadcasting approaches are commonly used to address this issue. However, selecting the optimal relay nodes poses a challenge and directly impacts network performance. Existing relay selection strategies, such as beacon-based methods, have limitations in scaling under different traffic conditions. This paper proposes a multi-attribute relay selection strategy for urban multi-hop VANETs to overcome these challenges. The strategy evaluates the rebroadcast capability of each receiving node based on its real-time status. It utilizes a fuzzy-BCM-based weight estimation strategy to determine the contribution of each attribute to the node’s capability. The node with the highest broadcasting capability is given priority to access the channel and broadcast the data packet. The proposed scheme is evaluated through simulation tests in VANET simulation environments, considering various traffic flow and speed variations. Performance comparison with four benchmark methods is conducted. The results show that the proposed scheme improves the overall dissemination efficiency by 51.1% compared to the benchmarked methods.

摘要 在城市车载 Ad-hoc 网络(VANET)中,由于网络的动态性和复杂性,有效传播交通数据具有挑战性。通常采用基于多跳的广播方法来解决这一问题。然而,选择最佳中继节点是一项挑战,会直接影响网络性能。现有的中继选择策略,如基于信标的方法,在不同流量条件下的扩展性受到限制。本文针对城市多跳 VANET 提出了一种多属性中继选择策略,以克服这些挑战。该策略根据每个接收节点的实时状态评估其转播能力。它利用基于模糊-BCM 的权重估计策略来确定每个属性对节点能力的贡献。广播能力最强的节点将优先访问信道并广播数据包。考虑到各种交通流量和速度变化,在 VANET 模拟环境中通过模拟测试对所提出的方案进行了评估。与四种基准方法进行了性能比较。结果表明,与基准方法相比,拟议方案的整体传播效率提高了 51.1%。
{"title":"A distributed relay selection using a fuzzy-BCM based decision making strategy for multi-hop data dissemination in VANETs","authors":"","doi":"10.1007/s11276-024-03705-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03705-5","url":null,"abstract":"<h3>Abstract</h3> <p>In urban Vehicular Ad-hoc Networks (VANETs), disseminating traffic data efficiently is challenging due to the dynamic and complex nature of the network. Multi-hop-based broadcasting approaches are commonly used to address this issue. However, selecting the optimal relay nodes poses a challenge and directly impacts network performance. Existing relay selection strategies, such as beacon-based methods, have limitations in scaling under different traffic conditions. This paper proposes a multi-attribute relay selection strategy for urban multi-hop VANETs to overcome these challenges. The strategy evaluates the rebroadcast capability of each receiving node based on its real-time status. It utilizes a fuzzy-BCM-based weight estimation strategy to determine the contribution of each attribute to the node’s capability. The node with the highest broadcasting capability is given priority to access the channel and broadcast the data packet. The proposed scheme is evaluated through simulation tests in VANET simulation environments, considering various traffic flow and speed variations. Performance comparison with four benchmark methods is conducted. The results show that the proposed scheme improves the overall dissemination efficiency by 51.1% compared to the benchmarked methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"56 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-component signal separation based on ALSAE 基于 ALSAE 的多分量信号分离技术
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s11276-024-03698-1

Abstract

Most research in the field of radar signal processing focuses on the use of time-frequency images (TFIs) to distinguish between different signal types. However, most studies have only examined the TFIs of a single signal, making it challenging to analyze and process the simultaneous reception of multiple signal components. This study proposes the use of adversarial latent separation auto encoder to separate and recognize multi-component signals, and innovatively propose a multi-network structure of feature extraction sub-network and signal separation sub-network. Thus, the problem of multi-component signal recognition is solved. Following separation, each component retains its time-frequency data while removing the influence of other components, and the separated TFIs are then subjected to parameter estimation and structural similarity (SSIM) measurements. The experimental findings demonstrate that the parameters retrieved from the separated signal have a low error with respect to the original signal, especially at low signal-to-noise ratios. The excellent SSIM and parameter estimation metrics between the separation results and the time-frequency image of the target tag imply that the separated single-component signal can be successfully reconstructed.

摘要 雷达信号处理领域的大多数研究都侧重于利用时频图像(TFI)来区分不同的信号类型。然而,大多数研究只考察了单个信号的时频图像,因此分析和处理同时接收的多个信号成分具有挑战性。本研究提出使用对抗式潜隐分离自动编码器来分离和识别多分量信号,并创新性地提出了特征提取子网络和信号分离子网络的多网络结构。从而解决了多分量信号的识别问题。分离后,每个分量都保留了自己的时频数据,同时消除了其他分量的影响,然后对分离后的 TFI 进行参数估计和结构相似性(SSIM)测量。实验结果表明,从分离信号中获取的参数与原始信号的误差很小,特别是在信噪比较低的情况下。分离结果与目标标签时频图像之间出色的 SSIM 和参数估计度量意味着分离的单分量信号可以成功重建。
{"title":"Multi-component signal separation based on ALSAE","authors":"","doi":"10.1007/s11276-024-03698-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03698-1","url":null,"abstract":"<h3>Abstract</h3> <p>Most research in the field of radar signal processing focuses on the use of time-frequency images (TFIs) to distinguish between different signal types. However, most studies have only examined the TFIs of a single signal, making it challenging to analyze and process the simultaneous reception of multiple signal components. This study proposes the use of adversarial latent separation auto encoder to separate and recognize multi-component signals, and innovatively propose a multi-network structure of feature extraction sub-network and signal separation sub-network. Thus, the problem of multi-component signal recognition is solved. Following separation, each component retains its time-frequency data while removing the influence of other components, and the separated TFIs are then subjected to parameter estimation and structural similarity (SSIM) measurements. The experimental findings demonstrate that the parameters retrieved from the separated signal have a low error with respect to the original signal, especially at low signal-to-noise ratios. The excellent SSIM and parameter estimation metrics between the separation results and the time-frequency image of the target tag imply that the separated single-component signal can be successfully reconstructed.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"120 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140115952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Longitudinal tear detection method for conveyor belt based on multi-mode fusion 基于多模式融合的传送带纵向撕裂检测方法
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s11276-024-03693-6
Yimin Wang, Yuhong Du, Changyun Miao, Di Miao, Yao Zheng, Dengjie Yang

The longitudinal tear of conveyor belts is the most common accident occurring at the workplace. Given the limitations on accuracy and stability of current single-modal approaches to detecting the longitudinal tear of conveyor belts, a solution is proposed in this paper through Audio-Visual Fusion. According to this method, a linear CCD camera is used to capture the images of the conveyor belt and a microphone array for the acquisition of sound signals from the operating belt conveyor. Then, the visual data is inputted into an improved Shufflenet_V2 network for classification, while the preprocessed sound signals are subjected to feature extraction and classification using a CNN-LSTM network. Finally, decision fusion is performed in line with Dempster-Shafer theory for image and sound classification. Experimental results show that the method proposed in this paper achieves an accuracy of 97% in tear detection, which is 1.2% and 2.8% higher compared to using images or sound alone, respectively. Apparently, the method proposed in this paper is effective in enhancing the performance of the existing detection methods.

传送带纵向撕裂是工作场所最常见的事故。鉴于目前检测输送带纵向撕裂的单一模式方法在准确性和稳定性方面的局限性,本文提出了一种音视频融合的解决方案。根据该方法,使用线性 CCD 相机捕捉传送带的图像,并使用麦克风阵列采集运行中的传送带发出的声音信号。然后,将视觉数据输入改进的 Shufflenet_V2 网络进行分类,同时使用 CNN-LSTM 网络对预处理后的声音信号进行特征提取和分类。最后,根据 Dempster-Shafer 理论对图像和声音分类进行决策融合。实验结果表明,本文提出的方法在眼泪检测方面达到了 97% 的准确率,与单独使用图像或声音相比,准确率分别提高了 1.2% 和 2.8%。显然,本文提出的方法能有效提高现有检测方法的性能。
{"title":"Longitudinal tear detection method for conveyor belt based on multi-mode fusion","authors":"Yimin Wang, Yuhong Du, Changyun Miao, Di Miao, Yao Zheng, Dengjie Yang","doi":"10.1007/s11276-024-03693-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03693-6","url":null,"abstract":"<p>The longitudinal tear of conveyor belts is the most common accident occurring at the workplace. Given the limitations on accuracy and stability of current single-modal approaches to detecting the longitudinal tear of conveyor belts, a solution is proposed in this paper through Audio-Visual Fusion. According to this method, a linear CCD camera is used to capture the images of the conveyor belt and a microphone array for the acquisition of sound signals from the operating belt conveyor. Then, the visual data is inputted into an improved Shufflenet_V2 network for classification, while the preprocessed sound signals are subjected to feature extraction and classification using a CNN-LSTM network. Finally, decision fusion is performed in line with Dempster-Shafer theory for image and sound classification. Experimental results show that the method proposed in this paper achieves an accuracy of 97% in tear detection, which is 1.2% and 2.8% higher compared to using images or sound alone, respectively. Apparently, the method proposed in this paper is effective in enhancing the performance of the existing detection methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"297 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140117501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection M-EOS:基于修正平衡优化的堆叠式 CNN,用于内部威胁检测
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1007/s11276-024-03678-5
A. Anju, M. Krishnamurthy

Insider threats remain a serious anxiety for organizations, government agencies, and businesses. Normally, the most hazardous cyber attacks are formed by trusted insiders and not by malicious outsiders. The malicious behaviors resulting from unplanned or planned mishandling of resources, data, networks, and systems of an organization constitute an insider threat. The unsupervised behavioral anomaly detection methods are mostly developed by the traditional machine learning methods for identifying unusual or anomalous variations in user behavior. The insider threat mainly originates from an individual inside the organization who is a current or former employee who has access to sensitive information about the organization. For achieving an improvement over traditional methods, the Stacked Convolutional Neural Network- Attentional Bi-directional Gated Recurrent Unit model is proposed in this paper to detect insider threats. The CNN-Attentional BiGRU model utilizes the user activity logs and user information for time-series classification. Using the log files, the temporal data representations, and weekly and daily numerical features from various sub-models of CNN are learned by the stacked generalization. Based on the chosen feature vectors, a model is trained on the CERT insider threat dataset. The stacked CNN is combined with the Attentional BiGRU model to incorporate more complex features of the user activity logs and user data during each convolution operation without raising network parameters. Thus the classification performance is improved with less complexity. The non-linear time control, chaos-based strategy, update rules, and opposite-based learning strategies are evaluated for generating the Modified-Equilibrium Optimization. The simulation outputs obtained by the model are 92.52% accuracy, 98% Precision, 95% Recall, and 96% F1-score. Thus, the proposed model has reached higher detection performance.

对于组织、政府机构和企业来说,内部威胁仍然是一个严重的隐患。通常情况下,最危险的网络攻击是由可信的内部人员而非恶意的外部人员形成的。由于对组织的资源、数据、网络和系统进行无计划或有计划的不当处理而产生的恶意行为构成了内部威胁。无监督行为异常检测方法主要由传统的机器学习方法开发,用于识别用户行为中的异常或反常变化。内部威胁主要来自于组织内部的个人,他们是可以接触到组织敏感信息的现任或前任员工。为了改进传统方法,本文提出了堆叠卷积神经网络-注意力双向门控递归单元模型来检测内部威胁。CNN-Attentional BiGRU 模型利用用户活动日志和用户信息进行时间序列分类。利用日志文件,通过堆叠泛化学习 CNN 不同子模型的时间数据表示以及每周和每天的数字特征。根据所选特征向量,在 CERT 内部威胁数据集上训练模型。堆叠 CNN 与注意力 BiGRU 模型相结合,可在每次卷积操作中纳入用户活动日志和用户数据中更复杂的特征,而无需提高网络参数。因此,在降低复杂度的同时提高了分类性能。对非线性时间控制、基于混沌的策略、更新规则和基于相反的学习策略进行了评估,以生成修正平衡优化。该模型的模拟输出结果为:准确率 92.52%、精确率 98%、召回率 95% 和 F1 分数 96%。因此,所提出的模型达到了更高的检测性能。
{"title":"M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection","authors":"A. Anju, M. Krishnamurthy","doi":"10.1007/s11276-024-03678-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03678-5","url":null,"abstract":"<p>Insider threats remain a serious anxiety for organizations, government agencies, and businesses. Normally, the most hazardous cyber attacks are formed by trusted insiders and not by malicious outsiders. The malicious behaviors resulting from unplanned or planned mishandling of resources, data, networks, and systems of an organization constitute an insider threat. The unsupervised behavioral anomaly detection methods are mostly developed by the traditional machine learning methods for identifying unusual or anomalous variations in user behavior. The insider threat mainly originates from an individual inside the organization who is a current or former employee who has access to sensitive information about the organization. For achieving an improvement over traditional methods, the Stacked Convolutional Neural Network- Attentional Bi-directional Gated Recurrent Unit model is proposed in this paper to detect insider threats. The CNN-Attentional BiGRU model utilizes the user activity logs and user information for time-series classification. Using the log files, the temporal data representations, and weekly and daily numerical features from various sub-models of CNN are learned by the stacked generalization. Based on the chosen feature vectors, a model is trained on the CERT insider threat dataset. The stacked CNN is combined with the Attentional BiGRU model to incorporate more complex features of the user activity logs and user data during each convolution operation without raising network parameters. Thus the classification performance is improved with less complexity. The non-linear time control, chaos-based strategy, update rules, and opposite-based learning strategies are evaluated for generating the Modified-Equilibrium Optimization. The simulation outputs obtained by the model are 92.52% accuracy, 98% Precision, 95% Recall, and 96% F1-score. Thus, the proposed model has reached higher detection performance.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"77 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile anchor node assisted node collaborative localization based on light reflection in WSN 基于光反射的 WSN 中移动锚节点辅助节点协作定位
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-09 DOI: 10.1007/s11276-024-03701-9
Minghua Wang, Chang Huang

Real-time and accurate location detection is a key link to ensure the safety of operating machines and workers in production and life. Compared with traditional static multi-anchor nodes, mobile anchor node assisted localization is greener and more energy-saving. In this paper, we first propose a static trajectory based on a light reflection model. Compared with other static models, this model has fewer times in the field, overcomes the collinearity problem and uniform beacon distribution, and ensures that all sensor nodes can receive good enough beacon quality for localization. Secondly, an RSSI-based improved weighted centroid localization algorithm and an RSSI-based improved weighted centroid collaborative localization algorithm are proposed. The two-strategy optimal location beacon set screening method is used to reduce location misjudgment. In order to improve the accuracy of centroid localization, a weighted centroid localization algorithm based on distance and hop number is designed. Moreover, a collaborative localization strategy is aiming at improving beacon density. Experimental results show that both the algorithm and static trajectory can guarantee better beacon coverage rate and localization success rate under different experimental conditions, and at the same time have higher accuracy.

在生产和生活中,实时、准确的位置检测是确保操作机器和工人安全的关键环节。与传统的静态多锚节点相比,移动锚节点辅助定位更加绿色节能。本文首先提出了一种基于光反射模型的静态轨迹。与其他静态模型相比,该模型的现场次数更少,克服了共线性问题和信标均匀分布问题,确保所有传感器节点都能接收到足够好的信标质量,从而实现定位。其次,提出了基于 RSSI 的改进加权向心定位算法和基于 RSSI 的改进加权向心协作定位算法。采用双策略优化定位信标集筛选方法来减少定位误判。为了提高中心点定位的准确性,设计了一种基于距离和跳数的加权中心点定位算法。此外,一种协作定位策略旨在提高信标密度。实验结果表明,在不同的实验条件下,该算法和静态轨迹都能保证较好的信标覆盖率和定位成功率,同时具有较高的定位精度。
{"title":"Mobile anchor node assisted node collaborative localization based on light reflection in WSN","authors":"Minghua Wang, Chang Huang","doi":"10.1007/s11276-024-03701-9","DOIUrl":"https://doi.org/10.1007/s11276-024-03701-9","url":null,"abstract":"<p>Real-time and accurate location detection is a key link to ensure the safety of operating machines and workers in production and life. Compared with traditional static multi-anchor nodes, mobile anchor node assisted localization is greener and more energy-saving. In this paper, we first propose a static trajectory based on a light reflection model. Compared with other static models, this model has fewer times in the field, overcomes the collinearity problem and uniform beacon distribution, and ensures that all sensor nodes can receive good enough beacon quality for localization. Secondly, an RSSI-based improved weighted centroid localization algorithm and an RSSI-based improved weighted centroid collaborative localization algorithm are proposed. The two-strategy optimal location beacon set screening method is used to reduce location misjudgment. In order to improve the accuracy of centroid localization, a weighted centroid localization algorithm based on distance and hop number is designed. Moreover, a collaborative localization strategy is aiming at improving beacon density. Experimental results show that both the algorithm and static trajectory can guarantee better beacon coverage rate and localization success rate under different experimental conditions, and at the same time have higher accuracy.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"50 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications SEACDSC:基于离散沙猫群优化的安全和能量感知聚类,适用于物联网 WSN 应用
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-09 DOI: 10.1007/s11276-024-03682-9
Walid Osamy, Ahmed M. Khedr, Ahmed A. Elsawy, P. V. Pravija Raj, Ahmed Aziz

Wireless sensor networks (WSNs) hold the promise of delivering new intelligent, cost-effective, and collaborative applications with the potential to have a great impact on our daily life. WSNs are often employed for detecting and tracking a wide range of entities involved in realistic scenarios where security is of vital importance. While selecting energy-efficient Cluster Heads (CHs) is the primary focus of the majority of clustering approaches currently in use in WSNs, researchers have not given adequate consideration to the security aspects of CHs when developing a CH selection strategy. Estimating the trust between the nodes not only makes the WSN secure, but also improves communication between nodes and makes the WSN more reliable. In this paper, we develop a secure and energy-aware clustering approach (SEACDSC) for WSNs by adapting sand cat swarm optimization algorithm (SCSO). SEACDSC incorporates a novel mechanism for determining secure and energy-efficient CHs among the WSN nodes. In particular, we propose a Discrete SCSO method, a variant of the traditional SCSO, to facilitate the secure and efficacious selection of CHs. The fitness function is designed by considering nodes’ remaining energy and trust values for choosing CH efficiently. Furthermore, the exponential weighted moving average (EWMA) is used for dynamically updating the predefined threshold values following the network state. As demonstrated by the simulation results, SEACDSC outperforms the existing BAT-Based, MG-LEACH, Enhanced-LEACH, Improved-Leach, and RCH-LEACH techniques in terms of network stability, number of alive nodes, energy efficiency, reliability, average trust value of CHs and network lifetime.

无线传感器网络(WSN)有望提供新的智能、经济和协作应用,并有可能对我们的日常生活产生巨大影响。WSN 通常用于检测和跟踪现实场景中涉及的各种实体,其安全性至关重要。虽然选择高能效的簇头(CH)是目前 WSN 中使用的大多数聚类方法的主要重点,但研究人员在制定 CH 选择策略时并未充分考虑到 CH 的安全性问题。估计节点之间的信任度不仅能确保 WSN 的安全,还能改善节点之间的通信,使 WSN 更加可靠。本文通过调整沙猫群优化算法(SCSO),为 WSN 开发了一种安全且能量感知的聚类方法(SEACDSC)。SEACDSC 采用了一种新型机制,用于在 WSN 节点中确定安全且节能的 CH。特别是,我们提出了一种离散 SCSO 方法(传统 SCSO 的一种变体),以促进安全高效地选择 CH。为了高效地选择 CH,我们设计了适合度函数,该函数考虑了节点的剩余能量和信任值。此外,指数加权移动平均法(EWMA)用于根据网络状态动态更新预定义的阈值。仿真结果表明,在网络稳定性、存活节点数、能效、可靠性、CH 的平均信任值和网络寿命方面,SEACDSC 优于现有的 BAT-Based、MG-LEACH、Enhanced-LEACH、Improved-Leach 和 RCH-LEACH 技术。
{"title":"SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications","authors":"Walid Osamy, Ahmed M. Khedr, Ahmed A. Elsawy, P. V. Pravija Raj, Ahmed Aziz","doi":"10.1007/s11276-024-03682-9","DOIUrl":"https://doi.org/10.1007/s11276-024-03682-9","url":null,"abstract":"<p>Wireless sensor networks (WSNs) hold the promise of delivering new intelligent, cost-effective, and collaborative applications with the potential to have a great impact on our daily life. WSNs are often employed for detecting and tracking a wide range of entities involved in realistic scenarios where security is of vital importance. While selecting energy-efficient Cluster Heads (CHs) is the primary focus of the majority of clustering approaches currently in use in WSNs, researchers have not given adequate consideration to the security aspects of CHs when developing a CH selection strategy. Estimating the trust between the nodes not only makes the WSN secure, but also improves communication between nodes and makes the WSN more reliable. In this paper, we develop a secure and energy-aware clustering approach (SEACDSC) for WSNs by adapting sand cat swarm optimization algorithm (SCSO). SEACDSC incorporates a novel mechanism for determining secure and energy-efficient CHs among the WSN nodes. In particular, we propose a Discrete SCSO method, a variant of the traditional SCSO, to facilitate the secure and efficacious selection of CHs. The fitness function is designed by considering nodes’ remaining energy and trust values for choosing CH efficiently. Furthermore, the exponential weighted moving average (EWMA) is used for dynamically updating the predefined threshold values following the network state. As demonstrated by the simulation results, SEACDSC outperforms the existing BAT-Based, MG-LEACH, Enhanced-LEACH, Improved-Leach, and RCH-LEACH techniques in terms of network stability, number of alive nodes, energy efficiency, reliability, average trust value of CHs and network lifetime.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of miniaturized ultra-wide stopband lowpass-bandpass diplexer using hexagon-shaped resonators 利用六角形谐振器设计微型超宽截止带低通-带通双工器
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-08 DOI: 10.1007/s11276-024-03684-7
Ali-Reza Zarghami, Mohsen Hayati, Sepehr Zarghami

This paper presents a lowpass-bandpass diplexer with ultra-wide stopband and low insertion loss using hexagon-shaped resonators. The proposed diplexer consists of a bandpass (BPF) and a lowpass filter (LPF), representing the core concept of the proposed design method that aims to concurrently design BPF and LPF. In this proposed design method, the influence of the LPF filter on the BPF's design has been identified through coupling matrix analysis for the first time. Initially, an LPF is designed based on three coupled hexagon-shaped elliptical resonators. Subsequently, a novel model for BPF design, utilizing coupled high-impedance lines, has been introduced. Following this, the BPF model is developed using coupling matrix analysis while considering the impact of LPF resonators. The LPF have a 1.32 GHz cut-off frequency and ultra-wide stopband up to 17.42 GHz. The BPF consisted of four resonators and the hexagon-shaped structure is used instead of low impedance lines. The utilization of hexagon-shaped resonators serves the purpose of enhancing the precision of the coupling effect, aligning with the proposed coupling matrix analysis. Additionally, hexagon-shaped resonators exhibit a greater capacitive effect, leading to a reduction in insertion loss within the passband when compared to rectangular-shaped resonators. The BPF has narrow passband with center frequency of is 2.25 GHz and 0.31 GHz bandwidth. The measured insertion losses of LPF and BPF are < 0.75 dB and 0.81 dB, respectively in 60% of passbands.

本文利用六角形谐振器提出了一种具有超宽截止带和低插入损耗的低通带通双工器。所提出的双工器由一个带通(BPF)和一个低通滤波器(LPF)组成,代表了所提出的设计方法的核心理念,即同时设计 BPF 和 LPF。在这种设计方法中,首次通过耦合矩阵分析确定了 LPF 滤波器对 BPF 设计的影响。首先,基于三个耦合六角形椭圆谐振器设计 LPF。随后,引入了一种利用耦合高阻抗线的新型 BPF 设计模型。随后,在考虑 LPF 谐振器影响的同时,利用耦合矩阵分析开发了 BPF 模型。LPF 具有 1.32 GHz 的截止频率和高达 17.42 GHz 的超宽阻带。BPF 由四个谐振器组成,采用六角形结构代替低阻抗线。使用六角形谐振器的目的是提高耦合效应的精度,这与提出的耦合矩阵分析相一致。此外,与矩形谐振器相比,六角形谐振器表现出更大的电容效应,从而降低了通带内的插入损耗。BPF 具有中心频率为 2.25 GHz、带宽为 0.31 GHz 的窄通带。在 60% 的通带内,LPF 和 BPF 的测量插入损耗分别为 0.75 dB 和 0.81 dB。
{"title":"Design of miniaturized ultra-wide stopband lowpass-bandpass diplexer using hexagon-shaped resonators","authors":"Ali-Reza Zarghami, Mohsen Hayati, Sepehr Zarghami","doi":"10.1007/s11276-024-03684-7","DOIUrl":"https://doi.org/10.1007/s11276-024-03684-7","url":null,"abstract":"<p>This paper presents a lowpass-bandpass diplexer with ultra-wide stopband and low insertion loss using hexagon-shaped resonators. The proposed diplexer consists of a bandpass (BPF) and a lowpass filter (LPF), representing the core concept of the proposed design method that aims to concurrently design BPF and LPF. In this proposed design method, the influence of the LPF filter on the BPF's design has been identified through coupling matrix analysis for the first time. Initially, an LPF is designed based on three coupled hexagon-shaped elliptical resonators. Subsequently, a novel model for BPF design, utilizing coupled high-impedance lines, has been introduced. Following this, the BPF model is developed using coupling matrix analysis while considering the impact of LPF resonators. The LPF have a 1.32 GHz cut-off frequency and ultra-wide stopband up to 17.42 GHz. The BPF consisted of four resonators and the hexagon-shaped structure is used instead of low impedance lines. The utilization of hexagon-shaped resonators serves the purpose of enhancing the precision of the coupling effect, aligning with the proposed coupling matrix analysis. Additionally, hexagon-shaped resonators exhibit a greater capacitive effect, leading to a reduction in insertion loss within the passband when compared to rectangular-shaped resonators. The BPF has narrow passband with center frequency of is 2.25 GHz and 0.31 GHz bandwidth. The measured insertion losses of LPF and BPF are &lt; 0.75 dB and 0.81 dB, respectively in 60% of passbands.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"35 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function 利用具有物理不可克隆功能的 ECC 实现保护隐私的 V2I 通信和安全认证
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-08 DOI: 10.1007/s11276-024-03651-2
Iqra Nawaz, Munam Ali Shah, Abid Khan, Seunggil Jeon

In recent years, service provided based on the location has brought a tremendous change in our lives. However, one of the biggest challenges is to preserve users’ privacy which upon leakage could have disastrous consequences. Privacy preservation has gained remarkable consideration as a notable number of users have started being conscious about privacy protection. Most solutions that have been developed in such a distributed scenario need a third party for data anonymization. In a system of public data sharing, one of the most popular and useful anonymization techniques is local differential privacy (LDP). Without requiring a third party to perturb the data, LDP allows users to perturb their data locally and individually, resulting in stronger privacy guarantees. Based on this principle the proposed system provides anonymity and integrity during communication and independent key generation by using secure authentication mechanism i.e., Physical Unclonable Function (PUF) with elliptical curve cryptography and remove third party dependency for data anonymization by using LDP with Hadamard count mean sketch (HCMS) protocol. For scalability, and quantum secrecy IOTA ledger is used on top of LDP anonymization technique. Our experimental results show that using PUF with ECC for authentication can reduce the computational overhead and increase the secrecy of the communication, LDP with HCMS achieves high privacy while also showing the tradeoff between utility and privacy. Furthermore, the IOTA ledger provides more scalability than the existing technique. Hence, the privacy of an individual will be preserved without compromising accuracy while sharing information to the third party for using location-based services.

近年来,基于位置的服务给我们的生活带来了巨大的变化。然而,最大的挑战之一是如何保护用户的隐私,因为一旦泄露可能会带来灾难性的后果。随着越来越多的用户开始意识到隐私保护的重要性,隐私保护问题得到了越来越多的关注。在这种分布式场景下开发的大多数解决方案都需要第三方进行数据匿名化。在公共数据共享系统中,最流行、最有用的匿名技术之一是本地差分隐私(LDP)。LDP 不需要第三方来扰乱数据,允许用户在本地单独扰乱他们的数据,从而获得更强的隐私保证。基于这一原理,所提出的系统在通信和独立密钥生成过程中提供了匿名性和完整性,使用了安全认证机制,即椭圆曲线加密的物理不可克隆函数(PUF),并通过使用哈达玛计数均值草图(HCMS)协议的 LDP 消除了数据匿名化对第三方的依赖。为了提高可扩展性和量子保密性,我们在 LDP 匿名化技术的基础上使用了 IOTA 分类账。我们的实验结果表明,使用带有 ECC 的 PUF 进行身份验证可以减少计算开销,提高通信的保密性,而带有 HCMS 的 LDP 可以实现较高的保密性,同时还显示了实用性和保密性之间的权衡。此外,与现有技术相比,IOTA 总账具有更强的可扩展性。因此,在与第三方共享信息以使用基于位置的服务时,个人隐私将在不影响准确性的情况下得到保护。
{"title":"Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function","authors":"Iqra Nawaz, Munam Ali Shah, Abid Khan, Seunggil Jeon","doi":"10.1007/s11276-024-03651-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03651-2","url":null,"abstract":"<p>In recent years, service provided based on the location has brought a tremendous change in our lives. However, one of the biggest challenges is to preserve users’ privacy which upon leakage could have disastrous consequences. Privacy preservation has gained remarkable consideration as a notable number of users have started being conscious about privacy protection. Most solutions that have been developed in such a distributed scenario need a third party for data anonymization. In a system of public data sharing, one of the most popular and useful anonymization techniques is local differential privacy (LDP). Without requiring a third party to perturb the data, LDP allows users to perturb their data locally and individually, resulting in stronger privacy guarantees. Based on this principle the proposed system provides anonymity and integrity during communication and independent key generation by using secure authentication mechanism i.e., Physical Unclonable Function (PUF) with elliptical curve cryptography and remove third party dependency for data anonymization by using LDP with Hadamard count mean sketch (HCMS) protocol. For scalability, and quantum secrecy IOTA ledger is used on top of LDP anonymization technique. Our experimental results show that using PUF with ECC for authentication can reduce the computational overhead and increase the secrecy of the communication, LDP with HCMS achieves high privacy while also showing the tradeoff between utility and privacy. Furthermore, the IOTA ledger provides more scalability than the existing technique. Hence, the privacy of an individual will be preserved without compromising accuracy while sharing information to the third party for using location-based services.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"21 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1