首页 > 最新文献

Proceedings of the International Conference on Wireless Information Networks and Systems最新文献

英文 中文
Deployment of a wireless sensor network in a vineyard 在葡萄园中部署无线传感器网络
J. A. Gay-Fernández, I. Cuiñas
A complete analysis for the deployment of a wireless sensor network in a vineyard is presented in this paper. First, due to the lack of propagation models for peer to peer networks in plantations, propagation experiments have been carried out to determine the propagation equations. This model was then used for planning and deploying an actual wireless sensor network. Afterwards, some sensor data are presented and finally, some general conclusions are extracted from the experiments and presented in the paper.
本文对葡萄园中无线传感器网络的部署进行了全面的分析。首先,由于缺乏人工林中点对点网络的传播模型,因此进行了传播实验来确定传播方程。然后将该模型用于规划和部署实际的无线传感器网络。然后,给出了一些传感器数据,最后,从实验中提取了一些一般性的结论,并在本文中提出。
{"title":"Deployment of a wireless sensor network in a vineyard","authors":"J. A. Gay-Fernández, I. Cuiñas","doi":"10.5220/0003453100350040","DOIUrl":"https://doi.org/10.5220/0003453100350040","url":null,"abstract":"A complete analysis for the deployment of a wireless sensor network in a vineyard is presented in this paper. First, due to the lack of propagation models for peer to peer networks in plantations, propagation experiments have been carried out to determine the propagation equations. This model was then used for planning and deploying an actual wireless sensor network. Afterwards, some sensor data are presented and finally, some general conclusions are extracted from the experiments and presented in the paper.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123317989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An intelligent maintenance based on machine learning approach for wireless and mobile systems 一种基于机器学习的无线和移动系统智能维护方法
A. Chohra, F. Giandomenico, S. Porcarelli, A. Bondavalli
To enhance wireless and mobile system dependability, audit operations are necessary, to periodically check the database consistency and recover in case of data corruption. Consequently, how to tune the database audit parameters and which operation order and frequency to apply becomes important aspects, to optimize performance and satisfy a certain degree of Quality of Service, over system life-cycle. The aim of this work is then to suggest an intelligent maintenance system based on reinforcement Q-Learning approach, built of a given audit operation set and an audit manager, in order to maximize the performance (performability and unreliability). For this purpose, a methodology, based on deterministic and stochastic Petri nets, to model and analyze the dependability attributes of different scheduled audit strategies is first developed. Afterwards, an intelligent (reinforcement Q-Learning) software agent approach is developed for planning and learning to derive optimal maintenance policies adaptively dealing with the highly dynamic evolution of the environmental conditions. This intelligent approach, is then implemented with feedforward artificial neural networks under the supervised gradient back-propagation learning to guarantee the success even with large state spaces, exploits intelligent behaviors traits (learning, adaptation, generalization, and robustness) to derive optimal actions in different system states in order to achieve an intelligent maintenance system.
为了增强无线和移动系统的可靠性,审计操作是必要的,以便定期检查数据库一致性并在数据损坏时进行恢复。因此,在整个系统生命周期中,如何调优数据库审计参数以及应用哪些操作顺序和频率成为优化性能和满足一定程度的服务质量的重要方面。这项工作的目的是提出一个基于强化Q-Learning方法的智能维护系统,该系统由给定的审计操作集和审计管理器构建,以最大限度地提高性能(可执行性和不可靠性)。为此,首先提出了一种基于确定性和随机Petri网的方法,对不同计划审计策略的可靠性属性进行建模和分析。然后,开发了一种智能(强化Q-Learning)软件代理方法,用于规划和学习,以自适应地处理高度动态变化的环境条件,得出最优维护策略。利用智能行为特征(学习性、适应性、泛化和鲁棒性)在不同的系统状态下推导出最优行为,从而实现智能维护系统,在有监督梯度反向传播学习下的前馈人工神经网络实现这种智能方法,以保证在大状态空间下也能成功。
{"title":"An intelligent maintenance based on machine learning approach for wireless and mobile systems","authors":"A. Chohra, F. Giandomenico, S. Porcarelli, A. Bondavalli","doi":"10.5220/0003611001150118","DOIUrl":"https://doi.org/10.5220/0003611001150118","url":null,"abstract":"To enhance wireless and mobile system dependability, audit operations are necessary, to periodically check the database consistency and recover in case of data corruption. Consequently, how to tune the database audit parameters and which operation order and frequency to apply becomes important aspects, to optimize performance and satisfy a certain degree of Quality of Service, over system life-cycle. The aim of this work is then to suggest an intelligent maintenance system based on reinforcement Q-Learning approach, built of a given audit operation set and an audit manager, in order to maximize the performance (performability and unreliability). For this purpose, a methodology, based on deterministic and stochastic Petri nets, to model and analyze the dependability attributes of different scheduled audit strategies is first developed. Afterwards, an intelligent (reinforcement Q-Learning) software agent approach is developed for planning and learning to derive optimal maintenance policies adaptively dealing with the highly dynamic evolution of the environmental conditions. This intelligent approach, is then implemented with feedforward artificial neural networks under the supervised gradient back-propagation learning to guarantee the success even with large state spaces, exploits intelligent behaviors traits (learning, adaptation, generalization, and robustness) to derive optimal actions in different system states in order to achieve an intelligent maintenance system.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection against Byzantine attacks on Wireless Sensor Networks 对无线传感器网络拜占庭式攻击的防护
Björn Stelte
Wireless Sensor Networks are vulnerable to many different kind of attacks. Especially insider attacks known as Byzantine attacks are very harmful and is not easy to defend a wireless sensor network against such attacks. The problem is that insider attacks are much easier to perform in sensor networks than in classical computer networks. The presented concept of a cluster-based sensor network is based on cluster heads equipped with data diodes and can be used to prevent Byzantine attacks. To reduce the impact of cluster head tampering a security mechanism based on the Byzantine Generals's Problem will be introduced. Finally, details concerning our implementation of cluster nodes on low-power FPGA are given.
无线传感器网络容易受到许多不同类型的攻击。特别是被称为拜占庭攻击的内部攻击是非常有害的,并且不容易保护无线传感器网络免受此类攻击。问题是,在传感器网络中进行内部攻击比在传统的计算机网络中容易得多。提出的基于簇的传感器网络概念是基于配备数据二极管的簇头,可用于防止拜占庭攻击。为了减少簇头篡改的影响,将引入一种基于拜占庭将军问题的安全机制。最后,给出了在低功耗FPGA上实现集群节点的具体方法。
{"title":"Protection against Byzantine attacks on Wireless Sensor Networks","authors":"Björn Stelte","doi":"10.5220/0003525000530058","DOIUrl":"https://doi.org/10.5220/0003525000530058","url":null,"abstract":"Wireless Sensor Networks are vulnerable to many different kind of attacks. Especially insider attacks known as Byzantine attacks are very harmful and is not easy to defend a wireless sensor network against such attacks. The problem is that insider attacks are much easier to perform in sensor networks than in classical computer networks. The presented concept of a cluster-based sensor network is based on cluster heads equipped with data diodes and can be used to prevent Byzantine attacks. To reduce the impact of cluster head tampering a security mechanism based on the Byzantine Generals's Problem will be introduced. Finally, details concerning our implementation of cluster nodes on low-power FPGA are given.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A load-balanced topology maintenance with partial reconstruction of connected dominating sets 一种具有连接控制集部分重构的负载平衡拓扑维护方法
Youn-Sik Hong, Hwa-Seok Lim, Cheol-Ho Lee
Node failure in a connected dominating set (CDS) is an event of non-negligible probability. For applications where fault tolerance is critical, a traditional dominating-set based routing may not be a desirable form of clustering. For a typical localized algorithm to construct CDS, it has the time complexity ofO(Δ3), where Δ is the maximum degree of an input graph. In this paper we inspect the problem of load balancing in a dominating-set based routing. The motivation of load balancing is to prolong the network lifetime, while minimize the partitions of the network due to node failure, where they cause interruptions in communication among nodes. The idea is that by finding alternative nodes within a restricted range and locally reconstructing a CDS to include them, instead of totally reconstructing a new CDS. The number of nodes which should be awaken during partial reconstruction is less than 2(Δ−1)×ρ, where ρ is the number of nodes from CDS and the number of neighbour of the faulty node.
在连通控制集中,节点故障是一个不可忽略的概率事件。对于容错性至关重要的应用程序,传统的基于支配集的路由可能不是理想的集群形式。对于构造CDS的典型局部化算法,其时间复杂度为0 (Δ3),其中Δ为输入图的最大程度。本文研究了基于支配集的路由中的负载均衡问题。负载平衡的动机是延长网络生命周期,同时最小化由于节点故障而导致的网络分区,节点故障会导致节点之间的通信中断。其思想是,通过在有限范围内找到可选节点,并在局部重建一个包含它们的CDS,而不是完全重建一个新的CDS。在局部重构过程中需要唤醒的节点数小于2(Δ−1)×ρ,其中ρ为来自CDS的节点数和故障节点的邻居数。
{"title":"A load-balanced topology maintenance with partial reconstruction of connected dominating sets","authors":"Youn-Sik Hong, Hwa-Seok Lim, Cheol-Ho Lee","doi":"10.5220/0003484400650068","DOIUrl":"https://doi.org/10.5220/0003484400650068","url":null,"abstract":"Node failure in a connected dominating set (CDS) is an event of non-negligible probability. For applications where fault tolerance is critical, a traditional dominating-set based routing may not be a desirable form of clustering. For a typical localized algorithm to construct CDS, it has the time complexity ofO(Δ3), where Δ is the maximum degree of an input graph. In this paper we inspect the problem of load balancing in a dominating-set based routing. The motivation of load balancing is to prolong the network lifetime, while minimize the partitions of the network due to node failure, where they cause interruptions in communication among nodes. The idea is that by finding alternative nodes within a restricted range and locally reconstructing a CDS to include them, instead of totally reconstructing a new CDS. The number of nodes which should be awaken during partial reconstruction is less than 2(Δ−1)×ρ, where ρ is the number of nodes from CDS and the number of neighbour of the faulty node.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient delegation-based authentication protocol with strong mobile privacy 高效的基于委托的认证协议,具有强大的移动隐私性
Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou
In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose information about the mobile privacy of a sender, and that the aliases of a user fail to achieve the unlinkability in Tan-Wu's scheme. We remedy this situation by suggesting an enhanced protocol that utilizes a pseudorandom function. Compared to Youn-Lim's protocol, our design is more efficient than theirs.
2008年,Tang和Wu设计了一种一次性别名机制来保护用户的移动隐私。最近,Youn和Lim提出了一种改进的基于委托的认证协议,以提供私人漫游服务。在本文中,我们展示了请求之间的链接可能会泄露发件人的移动隐私信息,并且用户的别名无法实现Tan-Wu方案中的不可链接性。我们通过提出一种利用伪随机函数的增强协议来纠正这种情况。与young - lim的协议相比,我们的设计比他们的更有效。
{"title":"Efficient delegation-based authentication protocol with strong mobile privacy","authors":"Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou","doi":"10.5220/0003606901230127","DOIUrl":"https://doi.org/10.5220/0003606901230127","url":null,"abstract":"In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose information about the mobile privacy of a sender, and that the aliases of a user fail to achieve the unlinkability in Tan-Wu's scheme. We remedy this situation by suggesting an enhanced protocol that utilizes a pseudorandom function. Compared to Youn-Lim's protocol, our design is more efficient than theirs.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131063496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity analysis of a hybrid threshold-based ZF-MMSE equalizer for sic-based MIMO-OFDM receivers 基于sic的MIMO-OFDM接收机ZF-MMSE混合阈值均衡器的复杂性分析
N. I. Miridakis, D. Vergados
In this paper, we propose a new reception scheme for MIMO-OFDM systems, which can switch between two different equalization methodologies, accordingly, on a subcarrier basis. In fact, the proposed receiver is based on the ordered successive interference cancellation (SIC) technique and uses jointly zero forcing SIC (ZF-SIC) and minimum mean squared error SIC (MMSE-SIC) according to a defined threshold value. The modulation scheme considered in this study is QPSK. Our main objective, here, is the provision of the computational complexity efficiency. Hence, a complexity analysis is provided and upper and lower complexity bounds for the proposed scheme are also derived.
在本文中,我们提出了一种新的MIMO-OFDM系统接收方案,它可以在两种不同的均衡方法之间切换,相应地,在子载波的基础上。实际上,所提出的接收机基于有序连续干扰消除(SIC)技术,并根据定义的阈值联合使用零强迫SIC (ZF-SIC)和最小均方误差SIC (MMSE-SIC)。本研究考虑的调制方案是QPSK。在这里,我们的主要目标是提供计算复杂度效率。在此基础上,对该方案进行了复杂度分析,并推导了该方案的复杂度上限和下限。
{"title":"Complexity analysis of a hybrid threshold-based ZF-MMSE equalizer for sic-based MIMO-OFDM receivers","authors":"N. I. Miridakis, D. Vergados","doi":"10.5220/0003614101090112","DOIUrl":"https://doi.org/10.5220/0003614101090112","url":null,"abstract":"In this paper, we propose a new reception scheme for MIMO-OFDM systems, which can switch between two different equalization methodologies, accordingly, on a subcarrier basis. In fact, the proposed receiver is based on the ordered successive interference cancellation (SIC) technique and uses jointly zero forcing SIC (ZF-SIC) and minimum mean squared error SIC (MMSE-SIC) according to a defined threshold value. The modulation scheme considered in this study is QPSK. Our main objective, here, is the provision of the computational complexity efficiency. Hence, a complexity analysis is provided and upper and lower complexity bounds for the proposed scheme are also derived.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development tools for pervasive computing in embedded systems (PECES) middleware 用于嵌入式系统(PECES)中间件中普及计算的开发工具
Ran Zhao, K. Selvarajah, N. Speirs
The main objective of the PECES project is the development of system software to enable the communication among heterogeneous devices across multiple smart spaces, breaking the traditional barrier of “smart islands” where only the services offered in a nearby spatial area can be used easily. PECES development tools help the application developer to build and test the PECES middleware based applications. This paper presents a set of tools, namely Peces Project, Peces Device Definition, Peces Ontology Instantiation, Peces Service Definition and Peces Role Specification Definition which enable application developers to build the PECES middleware based application using the novel concepts such as role assignment context ontologies and heterogeneous communication technologies. Furthermore, this paper proposes new tools which enable to model and simulate the smart space applications.
PECES项目的主要目标是开发系统软件,以实现跨多个智能空间的异构设备之间的通信,打破传统的“智能岛屿”障碍,即只有在附近空间区域提供的服务才能轻松使用。PECES开发工具帮助应用程序开发人员构建和测试基于PECES中间件的应用程序。本文提出了Peces项目、Peces设备定义、Peces本体实例化、Peces服务定义和Peces角色规范定义等工具,使应用开发者能够利用角色分配上下文本体和异构通信技术等新概念构建基于Peces中间件的应用。此外,本文还提出了能够对智能空间应用进行建模和仿真的新工具。
{"title":"Development tools for pervasive computing in embedded systems (PECES) middleware","authors":"Ran Zhao, K. Selvarajah, N. Speirs","doi":"10.5220/0003406900210026","DOIUrl":"https://doi.org/10.5220/0003406900210026","url":null,"abstract":"The main objective of the PECES project is the development of system software to enable the communication among heterogeneous devices across multiple smart spaces, breaking the traditional barrier of “smart islands” where only the services offered in a nearby spatial area can be used easily. PECES development tools help the application developer to build and test the PECES middleware based applications. This paper presents a set of tools, namely Peces Project, Peces Device Definition, Peces Ontology Instantiation, Peces Service Definition and Peces Role Specification Definition which enable application developers to build the PECES middleware based application using the novel concepts such as role assignment context ontologies and heterogeneous communication technologies. Furthermore, this paper proposes new tools which enable to model and simulate the smart space applications.","PeriodicalId":292305,"journal":{"name":"Proceedings of the International Conference on Wireless Information Networks and Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the International Conference on Wireless Information Networks and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1