首页 > 最新文献

Applied Sciences-Basel最新文献

英文 中文
Dynamic Modeling of Motorized Spindle System with Unbalanced Mass and Spindle Inclination 含不平衡质量和主轴倾角的电主轴系统动力学建模
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810053
Dan Gu, Yufeng Xie, Shulin Liu, Yuan Wei, Jiayi Shen
The high-speed motorized spindle has been wildly used in the field of aerospace processing, due to its advantages such as high speed, high precision, and high efficiency. CNC machine tools used for processing aerospace products require high machining accuracy, and once the spindle fails, it will seriously affect the quality of product processing. Thus, it is important to study the faults of the spindle, especially the faults caused by subtle errors. In this work, a dynamic model of a spindle with unbalanced mass fault and spindle inclination fault is established, and the natural frequencies and mode shapes of the motorized spindle are calculated by using the whole transfer matrix method (WTMM). The deflections of the spindle initial end in the different situations are discussed when the two faults happen independently. The results show that the spindle end deflection of the same fault has different sensitivity at different speeds. At the third order of natural frequencies, the deflection of a motorized spindle is greatest regardless of the fault that occurs. Although the motorized spindle rotates at the same speed, different faults could cause different mode shapes. At the lower speed, when the unbalanced mass fault happens, the mode shape is in an arched shape, and while the spindle inclination fault happens, the mode shape is in a concave shape.
高速电主轴以其速度快、精度高、效率高等优点,在航空航天加工领域得到了广泛的应用。用于加工航空航天产品的数控机床对加工精度要求很高,一旦主轴出现故障,将严重影响产品加工质量。因此,研究主轴的故障,特别是由细微误差引起的故障具有重要意义。本文建立了具有不平衡质量故障和主轴倾斜故障的主轴的动力学模型,并利用整体传递矩阵法(WTMM)计算了电主轴的固有频率和振型。讨论了两种故障独立发生时,不同情况下主轴起始端的挠度。结果表明,同一故障的主轴端部挠度在不同转速下具有不同的灵敏度。在三阶固有频率下,无论发生什么故障,电主轴的偏转都是最大的。尽管电主轴以相同的速度旋转,但不同的故障可能会导致不同的模式形状。在较低转速下,当发生不平衡质量故障时,振型呈拱形,而当发生主轴倾斜故障时,其振型呈凹形。
{"title":"Dynamic Modeling of Motorized Spindle System with Unbalanced Mass and Spindle Inclination","authors":"Dan Gu, Yufeng Xie, Shulin Liu, Yuan Wei, Jiayi Shen","doi":"10.3390/app131810053","DOIUrl":"https://doi.org/10.3390/app131810053","url":null,"abstract":"The high-speed motorized spindle has been wildly used in the field of aerospace processing, due to its advantages such as high speed, high precision, and high efficiency. CNC machine tools used for processing aerospace products require high machining accuracy, and once the spindle fails, it will seriously affect the quality of product processing. Thus, it is important to study the faults of the spindle, especially the faults caused by subtle errors. In this work, a dynamic model of a spindle with unbalanced mass fault and spindle inclination fault is established, and the natural frequencies and mode shapes of the motorized spindle are calculated by using the whole transfer matrix method (WTMM). The deflections of the spindle initial end in the different situations are discussed when the two faults happen independently. The results show that the spindle end deflection of the same fault has different sensitivity at different speeds. At the third order of natural frequencies, the deflection of a motorized spindle is greatest regardless of the fault that occurs. Although the motorized spindle rotates at the same speed, different faults could cause different mode shapes. At the lower speed, when the unbalanced mass fault happens, the mode shape is in an arched shape, and while the spindle inclination fault happens, the mode shape is in a concave shape.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48618488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experiments and Design of an Anti-Disaster Support System for Apple Orchards 苹果园防灾支持系统的实验与设计
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810033
Hee-Du Lee, Swoo-Heon Lee, K. Shin, Jun-seop Lee
A number of apple trees have collapsed in South Korea due to strong winds caused by typhoons. In fact, apple trees are protected by various types of support systems. However, despite this, they have still been damaged. The reason why the trees collapsed is that the installation of a support system is based not on scientific facts but on empirical facts. The purpose of this study was to evaluate the structural safety of the anti-disaster support system of apple trees. Equivalent static tests of the support systems, i.e., fences and matrix supports, were carried out. The result of the equivalent static tests indicated that the bearing capacity of the foundation is considered an important factor for the performance of the fence support, and the elements played a major role in the case of the matrix support due to the connection of the strut wire and the mat wire. Based on this test result, design criteria and standard specifications of the apple tree support system in response to local wind speed are proposed.
由于台风带来的强风,韩国已有多棵苹果树倒塌。事实上,苹果树受到各种类型的支撑系统的保护。然而,尽管如此,它们仍然受到了破坏。树木倒塌的原因是支撑系统的安装不是基于科学事实,而是基于经验事实。本研究的目的是评估苹果树防灾支撑系统的结构安全性。对支撑系统(即围栏和矩阵支撑)进行了等效静态测试。等效静力试验结果表明,基础的承载力被认为是影响围栏支撑性能的一个重要因素,而在矩阵支撑的情况下,由于支柱钢丝和垫钢丝的连接,构件发挥了主要作用。基于该试验结果,提出了苹果树支撑系统响应当地风速的设计准则和标准规范。
{"title":"Experiments and Design of an Anti-Disaster Support System for Apple Orchards","authors":"Hee-Du Lee, Swoo-Heon Lee, K. Shin, Jun-seop Lee","doi":"10.3390/app131810033","DOIUrl":"https://doi.org/10.3390/app131810033","url":null,"abstract":"A number of apple trees have collapsed in South Korea due to strong winds caused by typhoons. In fact, apple trees are protected by various types of support systems. However, despite this, they have still been damaged. The reason why the trees collapsed is that the installation of a support system is based not on scientific facts but on empirical facts. The purpose of this study was to evaluate the structural safety of the anti-disaster support system of apple trees. Equivalent static tests of the support systems, i.e., fences and matrix supports, were carried out. The result of the equivalent static tests indicated that the bearing capacity of the foundation is considered an important factor for the performance of the fence support, and the elements played a major role in the case of the matrix support due to the connection of the strut wire and the mat wire. Based on this test result, design criteria and standard specifications of the apple tree support system in response to local wind speed are proposed.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46713630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Intersection Waiting Time: Proposal of a Queue Network Model Using Kendall’s Notation in Panama City 最小化交叉口等待时间:巴拿马城使用肯德尔符号的队列网络模型的建议
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810030
Carlos A. Rovetto, Edmanuel Cruz, Ivonne Nuñez, Keyla Santana, Andrzej Smolarz, José Rangel, E. Cano
The paper presents a proposed queuing model based on Kendall’s notation for the intersection of two streets in Panama City (53 East and 56 East). The proposed model is based on a set of traffic lights that controls the flow of vehicles at the intersection according to a predetermined schedule. The model analyzes the stability of the system and simulations are performed to evaluate its performance. The main objective of the paper is to optimize the vehicle flow by minimizing the waiting time for passage. In the study, it was observed that the current traffic light system on Calle 50 (50th Street) is unstable and oversaturated during weekdays, which generates large vehicle queues with no estimated exit times. It was proposed to increase the system capacity to 1300 vehicles per hour to achieve reasonable stability and provide a solution to improve traffic signal timing on 50th Street. The need to increase the system capacity has been demonstrated and an optimal value has been suggested. The evaluation of other models and the use of AI can further strengthen the system and improve the prediction accuracy in different traffic scenarios.
本文提出了一个基于Kendall符号的巴拿马城(53 East和56 East)两条街道交叉口排队模型。所提出的模型基于一组红绿灯,该红绿灯根据预定的时间表控制十字路口的车辆流量。该模型分析了系统的稳定性,并进行了仿真以评估其性能。本文的主要目的是通过最小化通行等待时间来优化车辆流量。在这项研究中,观察到Calle 50(50街)目前的红绿灯系统在工作日不稳定且过饱和,这导致车辆排起了长队,预计没有下车时间。建议将系统容量提高到每小时1300辆车,以实现合理的稳定性,并为改善50街的交通信号配时提供解决方案。已经证明了增加系统容量的必要性,并提出了最佳值。对其他模型的评估和人工智能的使用可以进一步加强系统,提高不同交通场景下的预测准确性。
{"title":"Minimizing Intersection Waiting Time: Proposal of a Queue Network Model Using Kendall’s Notation in Panama City","authors":"Carlos A. Rovetto, Edmanuel Cruz, Ivonne Nuñez, Keyla Santana, Andrzej Smolarz, José Rangel, E. Cano","doi":"10.3390/app131810030","DOIUrl":"https://doi.org/10.3390/app131810030","url":null,"abstract":"The paper presents a proposed queuing model based on Kendall’s notation for the intersection of two streets in Panama City (53 East and 56 East). The proposed model is based on a set of traffic lights that controls the flow of vehicles at the intersection according to a predetermined schedule. The model analyzes the stability of the system and simulations are performed to evaluate its performance. The main objective of the paper is to optimize the vehicle flow by minimizing the waiting time for passage. In the study, it was observed that the current traffic light system on Calle 50 (50th Street) is unstable and oversaturated during weekdays, which generates large vehicle queues with no estimated exit times. It was proposed to increase the system capacity to 1300 vehicles per hour to achieve reasonable stability and provide a solution to improve traffic signal timing on 50th Street. The need to increase the system capacity has been demonstrated and an optimal value has been suggested. The evaluation of other models and the use of AI can further strengthen the system and improve the prediction accuracy in different traffic scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42490079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Scenario-Based Heuristics for Stochastic Shift Design Problem with Task-Based Demand 基于任务需求的随机轮班设计问题的两种基于场景的启发式算法
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810070
Zhiying Wu, Qing-xin Chen, Ning Mao, Guoning Xu
In this paper, we propose a deterministic shift design model with task-based demand and give the corresponding stochastic version with a probability constraint such that the shift plan designed is staffed with the workforce with a certain probability of performing all given tasks. Since we currently find no suitable methods for solving this stochastic model from the literature related to solving stochastic shift design models, we developed a single-stage heuristic method based on statistics, whose main idea is to reduce the occurrence of manpower shortage by prolonging the resource occupation time of a task, but this leads to a serious waste of resources, which is common in solving resource allocation problems with uncertain durations. To reduce the cost of wastage, we also propose a two-stage heuristic approach that is a two-stage heuristic with an evolutionary strategy. The two heuristics show their effectiveness in solving the proposed stochastic model in numerical experiments, and the two-stage heuristic significantly outperforms the one-stage heuristic in cost optimization and solution time stability.
在本文中,我们提出了一个具有基于任务的需求的确定性轮班设计模型,并给出了相应的具有概率约束的随机版本,使得所设计的轮班计划由具有一定概率执行所有给定任务的劳动力组成。由于我们目前在解决随机轮班设计模型的相关文献中没有找到合适的方法来解决这个随机模型,我们开发了一种基于统计学的单阶段启发式方法,其主要思想是通过延长任务的资源占用时间来减少人力短缺的发生,但这导致了资源的严重浪费,这在解决具有不确定持续时间的资源分配问题中是常见的。为了降低浪费成本,我们还提出了一种两阶段启发式方法,即具有进化策略的两阶段启发式。这两种启发式算法在数值实验中显示了它们在求解所提出的随机模型方面的有效性,并且两阶段启发式算法在成本优化和求解时间稳定性方面显著优于一阶段启发式算法。
{"title":"Two Scenario-Based Heuristics for Stochastic Shift Design Problem with Task-Based Demand","authors":"Zhiying Wu, Qing-xin Chen, Ning Mao, Guoning Xu","doi":"10.3390/app131810070","DOIUrl":"https://doi.org/10.3390/app131810070","url":null,"abstract":"In this paper, we propose a deterministic shift design model with task-based demand and give the corresponding stochastic version with a probability constraint such that the shift plan designed is staffed with the workforce with a certain probability of performing all given tasks. Since we currently find no suitable methods for solving this stochastic model from the literature related to solving stochastic shift design models, we developed a single-stage heuristic method based on statistics, whose main idea is to reduce the occurrence of manpower shortage by prolonging the resource occupation time of a task, but this leads to a serious waste of resources, which is common in solving resource allocation problems with uncertain durations. To reduce the cost of wastage, we also propose a two-stage heuristic approach that is a two-stage heuristic with an evolutionary strategy. The two heuristics show their effectiveness in solving the proposed stochastic model in numerical experiments, and the two-stage heuristic significantly outperforms the one-stage heuristic in cost optimization and solution time stability.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44746541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Drive Architectures for Industrial Hydraulic Axes: Energy-Efficiency-Based Comparative Analysis 工业液压轴的动力传动结构:基于能效的比较分析
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810066
M. Tiboni
In hydraulic systems, energy dissipation can be significant. The pressure losses that can occur in the hydraulic circuit, which are influenced by the adopted drive architecture, result in power consumption that is often significantly higher than that required by the mechanical system. This paper presents a comparative study of the energy efficiency of five common drive architectures in industrial hydraulic axes. The analysis is applied to a variable speed and force hydraulic blanking press, a fairly common industrial system, e.g., in the manufacture of semi-finished brass products. Standard, regenerative, high–low, variable-displacement pumps and variable speed drive configurations for a fixed-displacement pump were analyzed and compared. In each case, an appropriate and optimized sizing of the different components of the system was performed, and then the energy consumption was estimated for a load cycle common to all the considered cases. The results show that the choice of the power generation architecture of the hydraulic system has a very significant impact on the energy efficiency and consequently on the operating costs and the carbon footprint. The performed quantification of the potential energy efficiency of the considered drive architectures can be very useful in helping to make energy-conscious decisions.
在液压系统中,能量耗散可能非常重要。液压回路中可能出现的压力损失受到所采用的驱动结构的影响,导致功耗通常显著高于机械系统所需的功耗。本文对工业液压轴中五种常见驱动结构的能效进行了比较研究。该分析应用于变速加力液压冲裁机,这是一种相当常见的工业系统,例如黄铜半成品的制造。对固定排量泵的标准、再生、高-低、可变排量泵和变速驱动配置进行了分析和比较。在每种情况下,对系统的不同组件进行适当和优化的尺寸确定,然后对所有考虑的情况下常见的负载循环的能耗进行估计。结果表明,液压系统发电结构的选择对能源效率有着非常显著的影响,从而影响了运营成本和碳足迹。对所考虑的驱动架构的潜在能量效率进行量化在帮助做出有能量意识的决策方面非常有用。
{"title":"Power Drive Architectures for Industrial Hydraulic Axes: Energy-Efficiency-Based Comparative Analysis","authors":"M. Tiboni","doi":"10.3390/app131810066","DOIUrl":"https://doi.org/10.3390/app131810066","url":null,"abstract":"In hydraulic systems, energy dissipation can be significant. The pressure losses that can occur in the hydraulic circuit, which are influenced by the adopted drive architecture, result in power consumption that is often significantly higher than that required by the mechanical system. This paper presents a comparative study of the energy efficiency of five common drive architectures in industrial hydraulic axes. The analysis is applied to a variable speed and force hydraulic blanking press, a fairly common industrial system, e.g., in the manufacture of semi-finished brass products. Standard, regenerative, high–low, variable-displacement pumps and variable speed drive configurations for a fixed-displacement pump were analyzed and compared. In each case, an appropriate and optimized sizing of the different components of the system was performed, and then the energy consumption was estimated for a load cycle common to all the considered cases. The results show that the choice of the power generation architecture of the hydraulic system has a very significant impact on the energy efficiency and consequently on the operating costs and the carbon footprint. The performed quantification of the potential energy efficiency of the considered drive architectures can be very useful in helping to make energy-conscious decisions.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46682358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Peer-to-Peer PV Trading Strategies under the Influence of Network Constraints with Prosumer Sensitivity towards Network Coefficients 具有网络系数敏感性的网络约束下对等光伏交易策略的比较分析
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810044
Sheroze Liaquat, Tanveer Hussain, Fadi Agha Kassab, B. Celik, Robert S. Fourney, T. Hansen
With the increase in rooftop photovoltaic (PV) systems at the residential level, customers owning such renewable resources can act as a source of generation for other consumers in the same network. Peer-to-peer (P2P) energy trading refers to a local trading platform where the residential customers having excess PV power (prosumers) can interact with their neighbors without PV resources (customers) to improve the social welfare of society. However, the performance of a P2P market depends on the power system network constraints and trading strategy adopted for local energy trading. In this paper, we compare different trading strategies, i.e., the rule-based zero intelligent (ZI) strategy and the preference-based game theory (GT) approaches, for a constrained P2P platform. Quadratic trading loss and impedance-based network utilization fee models are suggested to define the network constraints for the P2P system. Additionally, a reluctance-based prosumer-sensitive model is developed to adjust the trading behavior of the participants under the heavy distribution losses/network fee. The presented results show that the suggested trading strategies enhanced the average welfare of the participants by approximately 17%. On average, the customers saved about $33.77 monthly, whereas the average monthly earnings of the prosumers were around $28.3. The ZI strategy enhanced the average monetary advantages of all the market participants by an average of 7% for a system having small distribution losses and a network fee as compared to the GT approach. Contrarily, for a system having high losses/a utilization fee, the GT approach improved the average welfare of the prosumers by around 75% compared to the ZI strategy. However, both trading strategies yielded competitive results compared to the traditional market under the standard values of network coefficients.
随着住宅级屋顶光伏(PV)系统的增加,拥有这些可再生资源的客户可以作为同一网络中其他消费者的发电来源。P2P (Peer-to-peer)能源交易是指拥有过剩光伏电量的住宅用户(产消者)与没有光伏资源的邻居(客户)进行互动,以提高社会福利的本地交易平台。然而,P2P市场的绩效取决于本地能源交易所采用的电力系统、网络约束和交易策略。在本文中,我们比较了不同的交易策略,即基于规则的零智能(ZI)策略和基于偏好的博弈论(GT)方法,用于约束P2P平台。提出了二次交易损失模型和基于阻抗的网络使用费模型来定义P2P系统的网络约束。此外,本文还建立了一个基于不情愿的产消敏感模型来调整参与者在高分配损失/网络费用下的交易行为。研究结果表明,建议的交易策略使参与者的平均福利提高了约17%。消费者每月平均节省约33.77元,而产消者每月平均收入约28.3元。与GT方法相比,对于具有较小分配损失和网络费用的系统,ZI策略使所有市场参与者的平均货币优势平均提高了7%。相反,对于具有高损失/使用费的系统,与ZI策略相比,GT方法使产消者的平均福利提高了约75%。然而,在网络系数标准值下,两种交易策略与传统市场相比都产生了竞争结果。
{"title":"Comparative Analysis of Peer-to-Peer PV Trading Strategies under the Influence of Network Constraints with Prosumer Sensitivity towards Network Coefficients","authors":"Sheroze Liaquat, Tanveer Hussain, Fadi Agha Kassab, B. Celik, Robert S. Fourney, T. Hansen","doi":"10.3390/app131810044","DOIUrl":"https://doi.org/10.3390/app131810044","url":null,"abstract":"With the increase in rooftop photovoltaic (PV) systems at the residential level, customers owning such renewable resources can act as a source of generation for other consumers in the same network. Peer-to-peer (P2P) energy trading refers to a local trading platform where the residential customers having excess PV power (prosumers) can interact with their neighbors without PV resources (customers) to improve the social welfare of society. However, the performance of a P2P market depends on the power system network constraints and trading strategy adopted for local energy trading. In this paper, we compare different trading strategies, i.e., the rule-based zero intelligent (ZI) strategy and the preference-based game theory (GT) approaches, for a constrained P2P platform. Quadratic trading loss and impedance-based network utilization fee models are suggested to define the network constraints for the P2P system. Additionally, a reluctance-based prosumer-sensitive model is developed to adjust the trading behavior of the participants under the heavy distribution losses/network fee. The presented results show that the suggested trading strategies enhanced the average welfare of the participants by approximately 17%. On average, the customers saved about $33.77 monthly, whereas the average monthly earnings of the prosumers were around $28.3. The ZI strategy enhanced the average monetary advantages of all the market participants by an average of 7% for a system having small distribution losses and a network fee as compared to the GT approach. Contrarily, for a system having high losses/a utilization fee, the GT approach improved the average welfare of the prosumers by around 75% compared to the ZI strategy. However, both trading strategies yielded competitive results compared to the traditional market under the standard values of network coefficients.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48197996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication 网络安全和医学成像:基于模拟的DICOM通信方法
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810072
Stylianos Karagiannis, E. Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theo Fotis
Medical imaging plays a crucial role in modern healthcare, providing essential information for accurate diagnosis and treatment planning. The Digital Imaging and Communications in Medicine (DICOM) standard has revolutionized the storage, transmission, and sharing of medical images and related data. Despite its advantages, implementation and deployment of the DICOM protocol often suffers from incomplete understanding, leading to vulnerabilities within the healthcare ecosystem. This research paper presents an implementation of DICOM communication and the development of a practical demonstration for simulation purposes The simulation can be used for conducting cybersecurity tests in the context of DICOM communication. Overall, the simulation provides a digital environment that can help in retrieving valuable insights into the practical aspects of DICOM communication and PACS integration, serving as a valuable resource for medical imaging professionals, researchers, and developers. These research results provide practical insights, and the DICOM simulation can be used in realistic contexts to showcase a variety of security scenarios.
医学影像在现代医疗保健中发挥着至关重要的作用,为准确的诊断和治疗计划提供必要的信息。医学数字成像和通信(DICOM)标准彻底改变了医学图像和相关数据的存储、传输和共享。尽管DICOM协议有很多优点,但它的实现和部署往往没有得到充分的理解,从而导致医疗保健生态系统存在漏洞。本文提出了DICOM通信的实现方法,并为仿真目的开发了一个实际演示,该仿真可用于在DICOM通信环境下进行网络安全测试。总的来说,模拟提供了一个数字环境,可以帮助检索DICOM通信和PACS集成的实际方面的有价值的见解,作为医学成像专业人员、研究人员和开发人员的宝贵资源。这些研究结果提供了实用的见解,DICOM模拟可以在现实环境中使用,以展示各种安全场景。
{"title":"Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication","authors":"Stylianos Karagiannis, E. Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theo Fotis","doi":"10.3390/app131810072","DOIUrl":"https://doi.org/10.3390/app131810072","url":null,"abstract":"Medical imaging plays a crucial role in modern healthcare, providing essential information for accurate diagnosis and treatment planning. The Digital Imaging and Communications in Medicine (DICOM) standard has revolutionized the storage, transmission, and sharing of medical images and related data. Despite its advantages, implementation and deployment of the DICOM protocol often suffers from incomplete understanding, leading to vulnerabilities within the healthcare ecosystem. This research paper presents an implementation of DICOM communication and the development of a practical demonstration for simulation purposes The simulation can be used for conducting cybersecurity tests in the context of DICOM communication. Overall, the simulation provides a digital environment that can help in retrieving valuable insights into the practical aspects of DICOM communication and PACS integration, serving as a valuable resource for medical imaging professionals, researchers, and developers. These research results provide practical insights, and the DICOM simulation can be used in realistic contexts to showcase a variety of security scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43053940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining 增强零售交易:一种基于改进RFM分析和关联规则挖掘的数据驱动建议
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810057
Angela Hsiang-Ling Chen, Sebastian Gunawan
Retail transactions have become an integral part of the economic cycle of every country and even on a global scale. Retail transactions are a trade sector that has the potential to be developed continuously in the future. This research focused on building a specified and data-driven recommendation system based on customer-purchasing and product-selling behavior. Modified RFM analysis was used by adding two variables, namely periodicity and customer engagement index; clustering algorithm such as K-means clustering and Ward’s method; and association rules to determine the pattern of the cause–effect relationship on each transaction and four types of classifiers to apply and to validate the recommendation system. The results showed that based on customer behavior, it should be split into two groups: loyal and potential customers. In contrast, for product behavior, it also comprised three groups: bestseller, profitable, and VIP product groups. Based on the result, K-nearest neighbor is the most suitable classifier with a low chance of overfitting and a higher performance index.
零售交易已成为每个国家乃至全球经济周期中不可或缺的一部分。零售交易是一个在未来具有持续发展潜力的贸易部门。本研究的重点是建立一个基于客户购买和产品销售行为的指定和数据驱动的推荐系统。采用改进的RFM分析方法,加入周期和客户参与指数两个变量;聚类算法,如K-means聚类和Ward方法;关联规则用于确定每笔交易的因果关系模式,四种分类器用于应用和验证推荐系统。结果表明,根据顾客的行为,应将其分为两组:忠诚顾客和潜在顾客。相比之下,在产品行为方面,它也分为三组:畅销产品组、盈利产品组和VIP产品组。基于结果,k近邻是最合适的分类器,过拟合几率低,性能指标更高。
{"title":"Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining","authors":"Angela Hsiang-Ling Chen, Sebastian Gunawan","doi":"10.3390/app131810057","DOIUrl":"https://doi.org/10.3390/app131810057","url":null,"abstract":"Retail transactions have become an integral part of the economic cycle of every country and even on a global scale. Retail transactions are a trade sector that has the potential to be developed continuously in the future. This research focused on building a specified and data-driven recommendation system based on customer-purchasing and product-selling behavior. Modified RFM analysis was used by adding two variables, namely periodicity and customer engagement index; clustering algorithm such as K-means clustering and Ward’s method; and association rules to determine the pattern of the cause–effect relationship on each transaction and four types of classifiers to apply and to validate the recommendation system. The results showed that based on customer behavior, it should be split into two groups: loyal and potential customers. In contrast, for product behavior, it also comprised three groups: bestseller, profitable, and VIP product groups. Based on the result, K-nearest neighbor is the most suitable classifier with a low chance of overfitting and a higher performance index.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45662579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Path Planning for Autonomous Vehicles in Unknown Dynamic Environment Based on Deep Reinforcement Learning 基于深度强化学习的未知动态环境下自动驾驶汽车路径规划
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810056
Hui Hu, Yuge Wang, Wenjie Tong, Jiao Zhao, Yulei Gu
Autonomous vehicles can reduce labor power during cargo transportation, and then improve transportation efficiency, for example, the automated guided vehicle (AGV) in the warehouse can improve the operation efficiency. To overcome the limitations of traditional path planning algorithms in unknown environments, such as reliance on high-precision maps, lack of generalization ability, and obstacle avoidance capability, this study focuses on investigating the Deep Q-Network and its derivative algorithm to enhance network and algorithm structures. A new algorithm named APF-D3QNPER is proposed, which combines the action output method of artificial potential field (APF) with the Dueling Double Deep Q Network algorithm, and experience sample rewards are considered in the experience playback portion of the traditional Deep Reinforcement Learning (DRL) algorithm, which enhances the convergence ability of the traditional DRL algorithm. A long short-term memory (LSTM) network is added to the state feature extraction network part to improve its adaptability in unknown environments and enhance its spatiotemporal sensitivity to the environment. The APF-D3QNPER algorithm is compared with mainstream deep reinforcement learning algorithms and traditional path planning algorithms using a robot operating system and the Gazebo simulation platform by conducting experiments. The results demonstrate that the APF-D3QNPER algorithm exhibits excellent generalization abilities in the simulation environment, and the convergence speed, the loss value, the path planning time, and the path planning length of the APF-D3QNPER algorithm are all less than for other algorithms in diverse scenarios.
自动驾驶汽车可以减少货物运输过程中的劳动力,从而提高运输效率,例如仓库中的自动导引车(AGV)可以提高运营效率。为了克服传统路径规划算法在未知环境中依赖高精度地图、缺乏泛化能力和避障能力等局限性,本研究重点研究了深度Q网络及其衍生算法,以增强网络和算法结构。提出了一种新的算法APF-D3QNPER,它将人工势场的动作输出方法与决斗双深度Q网络算法相结合,并在传统的深度强化学习算法的经验回放部分考虑了经验样本奖励,增强了传统DRL算法的收敛能力。在状态特征提取网络部分增加了长短期记忆(LSTM)网络,以提高其在未知环境中的适应性,增强其对环境的时空敏感性。利用机器人操作系统和Gazebo仿真平台,通过实验将APF-D3QNPER算法与主流的深度强化学习算法和传统的路径规划算法进行了比较。结果表明,APF-D3QNPER算法在仿真环境中表现出良好的泛化能力,在不同场景下,其收敛速度、损失值、路径规划时间和路径规划长度都小于其他算法。
{"title":"Path Planning for Autonomous Vehicles in Unknown Dynamic Environment Based on Deep Reinforcement Learning","authors":"Hui Hu, Yuge Wang, Wenjie Tong, Jiao Zhao, Yulei Gu","doi":"10.3390/app131810056","DOIUrl":"https://doi.org/10.3390/app131810056","url":null,"abstract":"Autonomous vehicles can reduce labor power during cargo transportation, and then improve transportation efficiency, for example, the automated guided vehicle (AGV) in the warehouse can improve the operation efficiency. To overcome the limitations of traditional path planning algorithms in unknown environments, such as reliance on high-precision maps, lack of generalization ability, and obstacle avoidance capability, this study focuses on investigating the Deep Q-Network and its derivative algorithm to enhance network and algorithm structures. A new algorithm named APF-D3QNPER is proposed, which combines the action output method of artificial potential field (APF) with the Dueling Double Deep Q Network algorithm, and experience sample rewards are considered in the experience playback portion of the traditional Deep Reinforcement Learning (DRL) algorithm, which enhances the convergence ability of the traditional DRL algorithm. A long short-term memory (LSTM) network is added to the state feature extraction network part to improve its adaptability in unknown environments and enhance its spatiotemporal sensitivity to the environment. The APF-D3QNPER algorithm is compared with mainstream deep reinforcement learning algorithms and traditional path planning algorithms using a robot operating system and the Gazebo simulation platform by conducting experiments. The results demonstrate that the APF-D3QNPER algorithm exhibits excellent generalization abilities in the simulation environment, and the convergence speed, the loss value, the path planning time, and the path planning length of the APF-D3QNPER algorithm are all less than for other algorithms in diverse scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48441487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks 基于识别的认证方法抗肩部冲浪攻击的系统文献综述
IF 2.7 4区 综合性期刊 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-06 DOI: 10.3390/app131810040
L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por
The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the ef
信息技术的飞速发展带来了一个高效快捷的通信和交易的新时代。然而,对信息技术的日益采用和依赖导致个人和敏感信息在网上暴露。保护这些资料不受未经授权的查阅,仍是一项长期的挑战,因此必须实施更完善的电脑保安措施。计算机安全的核心目标是确保数据和服务的机密性、可用性和完整性。在为应对安全威胁而开发的机制中,身份验证作为一种关键的防御策略脱颖而出。图形密码已经成为一种流行的身份验证方法,但它们面临着肩冲浪攻击的脆弱性,攻击者可以秘密地观察受害者的行为。肩冲浪攻击在图形密码身份验证领域提出了重大的安全挑战。当未经授权的个人暗中观察合法用户的身份验证过程时,就会发生这些攻击,方法是通过肩部浏览用户或通过视频记录捕获交互。为了应对这一挑战,人们提出了各种方法来阻止肩部冲浪攻击,每种方法都有不同的优点和局限性。因此,本研究的重点是通过对现有的基于识别的图形密码技术的优点、优点和缺点进行全面的检查和评估,来审查其抗肩冲浪攻击的弹性。评估过程需要通过著名的搜索引擎访问相关的学术资源,包括Web of Science、Science Direct、IEEE Xplore、ProQuest、Scopus、施普林格、Wiley Online Library和EBSCO。选择标准经过精心设计,以优先考虑基于识别的图形密码方法的研究。通过这种严格的方法,确定了28项研究并对其进行了彻底审查。结果表明,其中14个采用注册对象作为通过对象,通过对象识别增强了安全性。另外,两种方法采用诱饵对象作为传递对象,增强了混淆。值得注意的是,有一种技术同时利用了注册对象和诱饵对象,从而放大了安全性范例。研究结果还表明,基于识别的图形密码技术在抵御不同类型的肩冲浪攻击方面存在差异。一些方法在防止直接观察攻击方面是有效的,而另一些方法则容易受到视频记录和多重观察攻击。此漏洞的出现是由于攻击者可能通过分析每个挑战集中的用户交互模式来提取关键信息。值得注意的是,有一种方法作为例外脱颖而出,展示了对所有三种类型的肩部冲浪攻击的弹性。总之,本研究通过分析这些方法采用的不同策略并揭示其优缺点,有助于全面了解基于识别的图形密码方法在对抗肩部冲浪攻击中的功效。
{"title":"Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks","authors":"L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por","doi":"10.3390/app131810040","DOIUrl":"https://doi.org/10.3390/app131810040","url":null,"abstract":"The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the ef","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47735022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Sciences-Basel
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1