首页 > 最新文献

Telecommunication Systems最新文献

英文 中文
Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices 基于车辆移动性的 LSTM 下一小区预测,用于 5G mc-IoT 切片
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-16 DOI: 10.1007/s11235-024-01214-6
Asma Belhadj, Karim Akilal, Siham Bouchelaghem, Mawloud Omar, Sofiane Aissani

Network slicing is one 5G network enabler that may be used to enhance the requirements of mission-critical Machine Type Communications (mcMTC) in critical IoT applications. But, in applications with high mobility support, the network slicing will also be influenced by users’ movement, which is necessary to handle the dynamicity of the system, especially for critical slices that require fast and reliable delivery from End to End (E2E). To fulfill the desired service quality (QoS) of critical slices due to their users’ movement. This paper presents mobility awareness for such types of applications through mobility prediction, in which the network can determine which cell the user is in near real-time. Furthermore, the proposed next-cell mobility prediction framework is developed as a multi-classification task, where we exploited Long Short-Term Memory (LSTM) and the collected historical mobility profiles of moving users to allow more accurate short- and long-term predictions of the candidate next-cell. Then, within the scope of high mobility mission-critical use cases, we evaluate the effectiveness of the proposed LSTM classifier in vehicular networks. We have used a real vehicle mobility dataset that is obtained from SUMO deployed in Bejaia, Algeria urban environment. Ultimately, we conducted a set of experiments on the classifier using datasets with various history lengths, and the results have validated the effectiveness of the performed predictions on short-term mobility prediction. Our experiments show that the proposed classifier performs better on longer history datasets. While compared to traditional Machine Learning (ML) algorithms used for classification, the proposed LSTM model outperformed ML methods with the best accurate prediction results.

网络切片是一种 5G 网络使能手段,可用于提高关键物联网应用中关键任务机器型通信(mcMTC)的要求。但是,在支持高移动性的应用中,网络切片也会受到用户移动的影响,这就需要处理系统的动态性,特别是对于需要从端到端(E2E)快速可靠传输的关键切片。为了满足关键切片因用户移动而产生的预期服务质量(QoS)。本文通过移动预测为此类应用提出了移动感知技术,在这种技术中,网络可以近乎实时地确定用户所处的小区。此外,本文提出的下一小区移动性预测框架是作为多分类任务开发的,我们利用长短期记忆(LSTM)和收集的移动用户历史移动性概况,对候选下一小区进行更准确的短期和长期预测。然后,在高移动性关键任务用例的范围内,我们评估了所提出的 LSTM 分类器在车辆网络中的有效性。我们使用了从部署在阿尔及利亚贝贾亚城市环境中的 SUMO 获得的真实车辆移动性数据集。最终,我们使用具有不同历史长度的数据集对分类器进行了一系列实验,结果验证了在短期移动性预测方面所做预测的有效性。我们的实验表明,所提出的分类器在历史较长的数据集上表现更好。与用于分类的传统机器学习(ML)算法相比,所提出的 LSTM 模型的准确预测结果优于 ML 方法。
{"title":"Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices","authors":"Asma Belhadj, Karim Akilal, Siham Bouchelaghem, Mawloud Omar, Sofiane Aissani","doi":"10.1007/s11235-024-01214-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01214-6","url":null,"abstract":"<p>Network slicing is one 5G network enabler that may be used to enhance the requirements of mission-critical Machine Type Communications (mcMTC) in critical IoT applications. But, in applications with high mobility support, the network slicing will also be influenced by users’ movement, which is necessary to handle the dynamicity of the system, especially for critical slices that require fast and reliable delivery from End to End (E2E). To fulfill the desired service quality (QoS) of critical slices due to their users’ movement. This paper presents mobility awareness for such types of applications through mobility prediction, in which the network can determine which cell the user is in near real-time. Furthermore, the proposed next-cell mobility prediction framework is developed as a multi-classification task, where we exploited Long Short-Term Memory (LSTM) and the collected historical mobility profiles of moving users to allow more accurate short- and long-term predictions of the candidate next-cell. Then, within the scope of high mobility mission-critical use cases, we evaluate the effectiveness of the proposed LSTM classifier in vehicular networks. We have used a real vehicle mobility dataset that is obtained from SUMO deployed in Bejaia, Algeria urban environment. Ultimately, we conducted a set of experiments on the classifier using datasets with various history lengths, and the results have validated the effectiveness of the performed predictions on short-term mobility prediction. Our experiments show that the proposed classifier performs better on longer history datasets. While compared to traditional Machine Learning (ML) algorithms used for classification, the proposed LSTM model outperformed ML methods with the best accurate prediction results.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"20 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142266679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure positioning of wireless sensor networks against wormhole attacks 针对虫洞攻击的无线传感器网络安全定位
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-16 DOI: 10.1007/s11235-024-01213-7
Xiuwu Yu, Xun Wang, Yong Liu

In wireless sensor networks, the location of nodes is closely related to all tasks, so the accuracy and security of node localization are highly required. The core of the DV-HOP algorithm is based on the number of hops between nodes for localization, but wormhole attacks replay information through wormholes, and this attack greatly affects the parameter hop count. To address this security flaw, the DV-HOP algorithm is improved by first detecting the presence of wormhole attacks based on the communication characteristics between nodes, then the affected beacon nodes use a correction formula to fix the incorrect hop count information and transmit the correct information again, and finally the sensor nodes further evaluate and determine the location of the wormhole connection to prevent it in subsequent applications. Through experimental simulations, the proposed method improves the average localization accuracy by about 51.3 and 12.7(%), respectively, compared with the DV-HOP and LBDV algorithms without security improvements, which confirms that the proposed method is robust to wormhole attacks and reduces the localization errors affected by wormhole attacks.

在无线传感器网络中,节点的位置与所有任务密切相关,因此对节点定位的准确性和安全性要求很高。DV-HOP 算法的核心是基于节点间的跳数进行定位,但虫洞攻击会通过虫洞重放信息,这种攻击会极大地影响参数跳数。针对这一安全缺陷,对 DV-HOP 算法进行了改进,首先根据节点间的通信特征检测是否存在虫洞攻击,然后受影响的信标节点使用修正公式修正错误的跳数信息,并重新传输正确的信息,最后传感器节点进一步评估并确定虫洞连接的位置,以防止在后续应用中出现虫洞。通过实验仿真,与未做安全改进的DV-HOP和LBDV算法相比,所提出的方法分别提高了约51.3和12.7%的平均定位精度,证实了所提出的方法对虫洞攻击具有鲁棒性,减少了受虫洞攻击影响的定位误差。
{"title":"Secure positioning of wireless sensor networks against wormhole attacks","authors":"Xiuwu Yu, Xun Wang, Yong Liu","doi":"10.1007/s11235-024-01213-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01213-7","url":null,"abstract":"<p>In wireless sensor networks, the location of nodes is closely related to all tasks, so the accuracy and security of node localization are highly required. The core of the DV-HOP algorithm is based on the number of hops between nodes for localization, but wormhole attacks replay information through wormholes, and this attack greatly affects the parameter hop count. To address this security flaw, the DV-HOP algorithm is improved by first detecting the presence of wormhole attacks based on the communication characteristics between nodes, then the affected beacon nodes use a correction formula to fix the incorrect hop count information and transmit the correct information again, and finally the sensor nodes further evaluate and determine the location of the wormhole connection to prevent it in subsequent applications. Through experimental simulations, the proposed method improves the average localization accuracy by about 51.3 and 12.7<span>(%)</span>, respectively, compared with the DV-HOP and LBDV algorithms without security improvements, which confirms that the proposed method is robust to wormhole attacks and reduces the localization errors affected by wormhole attacks.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"9 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142266680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution 保护健康物联网:进步、挑战和基于信任的解决方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-11 DOI: 10.1007/s11235-024-01211-9
Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain, Mantisha Gupta, Zeenat Zahra

The applications of IoHT have adapted a lot of contemplation as a result of recent IoT (Internet of Things) advancements. Irrespective of several fields in IoHT such as remote medical professional assistance, history of health-charting, integrated care management, decreased cost, disease management, disability management, home care management, individual healthcare assistance, health tracking, drug availability management, healthcare tracking management, and telesurgery. The evolvement in the field of the IoHT network has shown a drastic advancement in the standard of living. Despite the numerous fields of application in the IoHT network, the balance of security and privacy is one of the most pressing problems as far as life-critical solutions are concerned. There are several solutions to maintain security in the IoHT network. The most recent security enhancement schemes in the IoHT have been addressed in this paper. Furthermore, the latest possible challenges in the IoHT network are discussed. Moreover, an extensive survey on future research directions in the field of IoHT network security is illustrated. Additionally, we have proposed a security architecture based on trust assessment for IoHT systems to ameliorate the security of the network. The trust assessment is based on the artificial intelligence mechanism such that the security of the IoHT network is enhanced adaptively. This paper presents a novel IoHT security framework that integrates trust evaluation to dynamically address security challenges. It offers practical solutions for applications like telesurgery by adjusting measures based on real-time trust assessments, setting a new standard in IoHT security and guiding future research.

由于最近物联网(IoT)的发展,IoHT 的应用引起了人们的广泛关注。IoHT涉及多个领域,如远程医疗专业援助、健康图表历史、综合护理管理、降低成本、疾病管理、残疾管理、家庭护理管理、个人医疗援助、健康跟踪、药品供应管理、医疗跟踪管理和远程手术。IoHT 网络领域的发展极大地提高了人们的生活水平。尽管 IoHT 网络的应用领域众多,但就生命攸关的解决方案而言,安全与隐私的平衡是最紧迫的问题之一。有几种解决方案可以维护 IoHT 网络的安全性。本文讨论了 IoHT 最新的安全增强方案。此外,还讨论了 IoHT 网络可能面临的最新挑战。此外,还对 IoHT 网络安全领域未来的研究方向进行了广泛的调查。此外,我们还为 IoHT 系统提出了一种基于信任评估的安全架构,以改善网络的安全性。信任评估基于人工智能机制,从而自适应地增强 IoHT 网络的安全性。本文介绍了一种新颖的 IoHT 安全框架,该框架整合了信任评估,可动态应对安全挑战。它根据实时信任评估调整措施,为远程手术等应用提供了实用的解决方案,为 IoHT 安全设定了新标准,并为未来研究提供了指导。
{"title":"Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution","authors":"Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain, Mantisha Gupta, Zeenat Zahra","doi":"10.1007/s11235-024-01211-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01211-9","url":null,"abstract":"<p>The applications of IoHT have adapted a lot of contemplation as a result of recent IoT (Internet of Things) advancements. Irrespective of several fields in IoHT such as remote medical professional assistance, history of health-charting, integrated care management, decreased cost, disease management, disability management, home care management, individual healthcare assistance, health tracking, drug availability management, healthcare tracking management, and telesurgery. The evolvement in the field of the IoHT network has shown a drastic advancement in the standard of living. Despite the numerous fields of application in the IoHT network, the balance of security and privacy is one of the most pressing problems as far as life-critical solutions are concerned. There are several solutions to maintain security in the IoHT network. The most recent security enhancement schemes in the IoHT have been addressed in this paper. Furthermore, the latest possible challenges in the IoHT network are discussed. Moreover, an extensive survey on future research directions in the field of IoHT network security is illustrated. Additionally, we have proposed a security architecture based on trust assessment for IoHT systems to ameliorate the security of the network. The trust assessment is based on the artificial intelligence mechanism such that the security of the IoHT network is enhanced adaptively. This paper presents a novel IoHT security framework that integrates trust evaluation to dynamically address security challenges. It offers practical solutions for applications like telesurgery by adjusting measures based on real-time trust assessments, setting a new standard in IoHT security and guiding future research.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized task offloading for federated learning based on β-skeleton graph in edge computing 基于边缘计算中的β骨架图,优化联合学习的任务卸载
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-09 DOI: 10.1007/s11235-024-01216-4
Mahdi Fallah, Pedram Salehpour

Edge computing is gaining prominence as a solution for IoT data management and processing. Task offloading, which distributes the processing load across edge devices, is a key strategy to enhance the efficiency of edge computing. However, traditional methods often overlook the dynamic nature of the edge environment and the interactions between devices. While reinforcement learning-based task offloading shows promise, it can sometimes lead to an imbalance by favoring weaker servers. To address these issues, this paper presents a novel task offloading method for federated learning that leverages the β-skeleton graph in edge computing. This model takes into account spatial and temporal dynamics, optimizing task assignments based on both the processing and communication capabilities of the edge devices. The proposed method significantly outperforms five state-of-the-art methods, showcasing substantial improvements in both initial and long-term performance. Specifically, this method demonstrates a 63.46% improvement over the Binary-SPF-EC method in the initial rounds and achieves an average improvement of 76.518% after 400 rounds. Moreover, it excels in sub-rewards and total latency reduction, underscoring its effectiveness in optimizing edge computing communication and processing tasks. These results underscore the superiority of the proposed method, highlighting its potential to enhance the efficiency and scalability of edge computing systems. This approach, by effectively addressing the dynamic nature of the edge environment and optimizing task offloading, contributes to the development of more robust and efficient edge computing frameworks. This work paves the way for future advancements in federated learning and edge computing integration, promising better management and utilization of IoT data.

作为物联网数据管理和处理的一种解决方案,边缘计算的地位日益突出。任务卸载(将处理负载分配给边缘设备)是提高边缘计算效率的关键策略。然而,传统方法往往忽视了边缘环境的动态性质和设备之间的交互。虽然基于强化学习的任务卸载很有前景,但它有时会偏向较弱的服务器,从而导致不平衡。为解决这些问题,本文提出了一种用于联合学习的新型任务卸载方法,该方法利用了边缘计算中的β骨架图。该模型考虑了空间和时间动态,根据边缘设备的处理和通信能力优化任务分配。所提出的方法明显优于五种最先进的方法,在初始性能和长期性能方面都有大幅提高。具体来说,该方法在初始轮次比二进制-SPF-EC 方法提高了 63.46%,在 400 轮次后平均提高了 76.518%。此外,该方法在减少子奖励和总延迟方面表现出色,突出了其在优化边缘计算通信和处理任务方面的有效性。这些结果凸显了所提方法的优越性,彰显了它在提高边缘计算系统的效率和可扩展性方面的潜力。这种方法能有效解决边缘环境的动态特性并优化任务卸载,有助于开发更强大、更高效的边缘计算框架。这项工作为联合学习和边缘计算集成的未来发展铺平了道路,有望更好地管理和利用物联网数据。
{"title":"Optimized task offloading for federated learning based on β-skeleton graph in edge computing","authors":"Mahdi Fallah, Pedram Salehpour","doi":"10.1007/s11235-024-01216-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01216-4","url":null,"abstract":"<p>Edge computing is gaining prominence as a solution for IoT data management and processing. Task offloading, which distributes the processing load across edge devices, is a key strategy to enhance the efficiency of edge computing. However, traditional methods often overlook the dynamic nature of the edge environment and the interactions between devices. While reinforcement learning-based task offloading shows promise, it can sometimes lead to an imbalance by favoring weaker servers. To address these issues, this paper presents a novel task offloading method for federated learning that leverages the β-skeleton graph in edge computing. This model takes into account spatial and temporal dynamics, optimizing task assignments based on both the processing and communication capabilities of the edge devices. The proposed method significantly outperforms five state-of-the-art methods, showcasing substantial improvements in both initial and long-term performance. Specifically, this method demonstrates a 63.46% improvement over the Binary-SPF-EC method in the initial rounds and achieves an average improvement of 76.518% after 400 rounds. Moreover, it excels in sub-rewards and total latency reduction, underscoring its effectiveness in optimizing edge computing communication and processing tasks. These results underscore the superiority of the proposed method, highlighting its potential to enhance the efficiency and scalability of edge computing systems. This approach, by effectively addressing the dynamic nature of the edge environment and optimizing task offloading, contributes to the development of more robust and efficient edge computing frameworks. This work paves the way for future advancements in federated learning and edge computing integration, promising better management and utilization of IoT data.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"6 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise robust automatic speaker verification systems: review and analysis 噪声稳健型自动语音验证系统:回顾与分析
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-06 DOI: 10.1007/s11235-024-01212-8
Sanil Joshi, Mohit Dua

Like any other biometric systems, Automatic Speaker Verification (ASV) systems are also vulnerable to the spoofing attacks. Hence, it is important to develop the countermeasures in order to handle these attacks. In spoofing mainly two types of attacks are considered, logical access attacks and presentation attacks. In the last few decades, several systems have been proposed by various researchers for handling these kinds of attacks. However, noise handling capability of ASV systems is of major concern, as the presence of noise may make an ASV system to falsely evaluate the original human voice as the spoofed audio. Hence, the main objective of this paper is to review and analyze the various noise robust ASV systems proposed by different researchers in recent years. The paper discusses the various front end and back-end approaches that have been used to develop these systems with putting emphasis on the noise handling techniques. Various kinds of noises such as babble, white, background noises, pop noise, channel noises etc. affect the development of an ASV system. This survey starts with discussion about the various components of ASV system. Then, the paper classifies and discusses various enhanced front end feature extraction techniques like phase based, deep learning based, magnitude-based feature extraction techniques etc., which have been proven to be robust in handling noise. Secondly, the survey highlights the various deep learning and other baseline models that are used in backend, for classification of the audio correctly. Finally, it highlights the challenges and issues that still exist in noise handling and detection, while developing noise robust ASV systems. Therefore, on the basis of the proposed survey it can be interpreted that the noise robustness of ASV system is the challenging issue. Hence the researchers should consider the robustness of ASV against noise along with spoofing attacks.

与其他生物识别系统一样,自动语音验证(ASV)系统也容易受到欺骗攻击。因此,开发应对这些攻击的措施非常重要。在欺骗攻击中,主要有两类攻击,即逻辑访问攻击和呈现攻击。在过去的几十年里,不同的研究人员已经提出了几种系统来处理这类攻击。然而,ASV 系统的噪声处理能力是一个主要问题,因为噪声的存在可能会使 ASV 系统错误地将原始人声评估为欺骗音频。因此,本文的主要目的是回顾和分析近年来不同研究人员提出的各种抗噪声 ASV 系统。本文讨论了用于开发这些系统的各种前端和后端方法,并重点讨论了噪声处理技术。各种噪声,如嗡嗡声、白噪声、背景噪声、流行噪声、信道噪声等,都会影响 ASV 系统的开发。本研究首先讨论了 ASV 系统的各个组成部分。然后,本文对各种增强型前端特征提取技术进行了分类和讨论,如基于相位的特征提取技术、基于深度学习的特征提取技术、基于幅度的特征提取技术等,这些技术已被证明在处理噪声方面具有鲁棒性。其次,调查重点介绍了后端使用的各种深度学习和其他基线模型,以便对音频进行正确分类。最后,它强调了在开发噪声稳健型 ASV 系统时,噪声处理和检测方面仍然存在的挑战和问题。因此,根据所提议的调查,可以认为 ASV 系统的噪声鲁棒性是一个具有挑战性的问题。因此,研究人员应考虑 ASV 对噪声和欺骗攻击的鲁棒性。
{"title":"Noise robust automatic speaker verification systems: review and analysis","authors":"Sanil Joshi, Mohit Dua","doi":"10.1007/s11235-024-01212-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01212-8","url":null,"abstract":"<p>Like any other biometric systems, Automatic Speaker Verification (ASV) systems are also vulnerable to the spoofing attacks. Hence, it is important to develop the countermeasures in order to handle these attacks. In spoofing mainly two types of attacks are considered, logical access attacks and presentation attacks. In the last few decades, several systems have been proposed by various researchers for handling these kinds of attacks. However, noise handling capability of ASV systems is of major concern, as the presence of noise may make an ASV system to falsely evaluate the original human voice as the spoofed audio. Hence, the main objective of this paper is to review and analyze the various noise robust ASV systems proposed by different researchers in recent years. The paper discusses the various front end and back-end approaches that have been used to develop these systems with putting emphasis on the noise handling techniques. Various kinds of noises such as babble, white, background noises, pop noise, channel noises etc. affect the development of an ASV system. This survey starts with discussion about the various components of ASV system. Then, the paper classifies and discusses various enhanced front end feature extraction techniques like phase based, deep learning based, magnitude-based feature extraction techniques etc., which have been proven to be robust in handling noise. Secondly, the survey highlights the various deep learning and other baseline models that are used in backend, for classification of the audio correctly. Finally, it highlights the challenges and issues that still exist in noise handling and detection, while developing noise robust ASV systems. Therefore, on the basis of the proposed survey it can be interpreted that the noise robustness of ASV system is the challenging issue. Hence the researchers should consider the robustness of ASV against noise along with spoofing attacks.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"12 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying data loss, nonlinearity, and modulation effects in drone swarm channels with artificial intelligence 利用人工智能研究无人机群信道中的数据丢失、非线性和调制效应
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-22 DOI: 10.1007/s11235-024-01210-w
Volodymyr Kharchenko, Andrii Grekhov, Vasyl Kondratiuk

Drones can be used to create wireless communication networks in swarms using Artificial intelligence (AI). Their mobility and line-of-sight capability have made them key solutions for civil and military applications. AI is also developing rapidly nowadays and is being successfully applied due to the huge amount of data available. This has led to the integration of AI into networks and its application to solve problems associated with drone swarms. Since AI systems have to process huge amounts of information in real time, this leads to increased data packet loss and possible loss of communication with the control center. This article is devoted to the calculation of packet losses and the impact of traffic parameters on the data exchange in swarms. Original swarm models were created with the help of MATLAB and NetCracker packages. Dependences of data packet losses on the transaction size are calculated for different drone number in a swarm using NetCracker software. Data traffic with different parameters and statistical distribution laws was considered. The effect of different distances to drones on the base station workload has been simulated. Data transmission in a swarm was studied using MATLAB software depending on the signal-to-noise ratio, nonlinearity levels of base station amplifier, signal modulation types, base station antenna diameters, and signal phase offsets. The data obtained allows foresee the operation of drone communication channels in swarms.

无人机可利用人工智能(AI)创建成群的无线通信网络。无人机的机动性和视距能力使其成为民用和军事应用的关键解决方案。如今,人工智能也在迅速发展,并因海量数据而得到成功应用。这促使人工智能融入网络,并应用于解决与无人机群相关的问题。由于人工智能系统必须实时处理大量信息,这会导致数据包丢失增加,并可能导致与控制中心的通信中断。本文主要讨论数据包丢失的计算以及流量参数对蜂群数据交换的影响。在 MATLAB 和 NetCracker 软件包的帮助下,创建了最初的蜂群模型。使用 NetCracker 软件计算了蜂群中不同无人机数量下数据包损失与交易规模的关系。考虑了不同参数和统计分布规律的数据流量。模拟了无人机不同距离对基站工作量的影响。根据信噪比、基站放大器的非线性水平、信号调制类型、基站天线直径和信号相位偏移,使用 MATLAB 软件研究了蜂群中的数据传输。根据所获得的数据,可以预见无人机通信信道在蜂群中的运行情况。
{"title":"Studying data loss, nonlinearity, and modulation effects in drone swarm channels with artificial intelligence","authors":"Volodymyr Kharchenko, Andrii Grekhov, Vasyl Kondratiuk","doi":"10.1007/s11235-024-01210-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01210-w","url":null,"abstract":"<p>Drones can be used to create wireless communication networks in swarms using Artificial intelligence (AI). Their mobility and line-of-sight capability have made them key solutions for civil and military applications. AI is also developing rapidly nowadays and is being successfully applied due to the huge amount of data available. This has led to the integration of AI into networks and its application to solve problems associated with drone swarms. Since AI systems have to process huge amounts of information in real time, this leads to increased data packet loss and possible loss of communication with the control center. This article is devoted to the calculation of packet losses and the impact of traffic parameters on the data exchange in swarms. Original swarm models were created with the help of MATLAB and NetCracker packages. Dependences of data packet losses on the transaction size are calculated for different drone number in a swarm using NetCracker software. Data traffic with different parameters and statistical distribution laws was considered. The effect of different distances to drones on the base station workload has been simulated. Data transmission in a swarm was studied using MATLAB software depending on the signal-to-noise ratio, nonlinearity levels of base station amplifier, signal modulation types, base station antenna diameters, and signal phase offsets. The data obtained allows foresee the operation of drone communication channels in swarms.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"5 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing cell association in 5G and beyond networks: a modified load-aware biased technique 优化 5G 及其他网络中的小区关联:一种改进的负载感知偏置技术
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-18 DOI: 10.1007/s11235-024-01202-w
Mohammed Jaber Alam, Ritesh Chugh, Salahuddin Azad, Md Rahat Hossain

Cellular networks are moving towards increasing heterogeneity by deploying more small cells into macro base station (MBS) to meet rapidly growing traffic demands. To leverage the advantages of these small cells, mobile users should be offloaded onto small base stations (BSs), which will typically be lightly populated and can give a higher data rate by presenting the mobile users with many more channels than the MBS. Likewise, a more balanced cell association will lessen the pressure on the MBS, allowing it to serve its remaining users more effectively. This paper addresses the cell association challenge for Quality of Service (QoS) provisioning in terms of throughput and load-balancing for 5G and future generation networks. This problem is quite challenging because BSs have varying backhaul capacities and users have varying QoS needs. Most of the previous studies are based on reference signal received power (RSRP), signal to interference and noise ratio (SINR) or its variants and most importantly majority of them are not load-aware. Therefore, a modified load-aware biased cell association scheme based on distance is proposed to attain better QoS provisioning in terms of throughput and load-balancing. Simulation results depict that the proposed load-aware-based method outperforms conventional cell association schemes based on RSRP and its variants, and in terms of throughput and load-balancing. Furthermore, the algorithm’s complexity has been assessed through a comparison and analysis of computational time, demonstrating better performance compared to state-of-the-art techniques.

蜂窝网络正在通过在宏基站(MBS)中部署更多小基站来提高异构性,以满足快速增长的流量需求。为充分利用这些小基站的优势,应将移动用户卸载到小基站(BS)上,这些小基站通常人口较少,可向移动用户提供比宏基站更多的信道,从而提供更高的数据传输速率。同样,更均衡的小区关联将减轻 MBS 的压力,使其能更有效地为剩余用户提供服务。本文从吞吐量和负载平衡的角度探讨了 5G 和未来网络的小区关联对服务质量(QoS)提供的挑战。这个问题相当具有挑战性,因为基站的回程能力各不相同,用户的 QoS 需求也各不相同。以前的研究大多基于参考信号接收功率(RSRP)、信号干扰和噪声比(SINR)或其变体,最重要的是,其中大多数都没有负载感知功能。因此,我们提出了一种基于距离的改进型负载感知偏置小区关联方案,以便在吞吐量和负载平衡方面提供更好的服务质量。仿真结果表明,所提出的基于负载感知的方法在吞吐量和负载平衡方面优于基于 RSRP 及其变体的传统小区关联方案。此外,通过对计算时间的比较和分析,对算法的复杂性进行了评估,结果表明该算法的性能优于最先进的技术。
{"title":"Optimizing cell association in 5G and beyond networks: a modified load-aware biased technique","authors":"Mohammed Jaber Alam, Ritesh Chugh, Salahuddin Azad, Md Rahat Hossain","doi":"10.1007/s11235-024-01202-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01202-w","url":null,"abstract":"<p>Cellular networks are moving towards increasing heterogeneity by deploying more small cells into macro base station (MBS) to meet rapidly growing traffic demands. To leverage the advantages of these small cells, mobile users should be offloaded onto small base stations (BSs), which will typically be lightly populated and can give a higher data rate by presenting the mobile users with many more channels than the MBS. Likewise, a more balanced cell association will lessen the pressure on the MBS, allowing it to serve its remaining users more effectively. This paper addresses the cell association challenge for Quality of Service (QoS) provisioning in terms of throughput and load-balancing for 5G and future generation networks. This problem is quite challenging because BSs have varying backhaul capacities and users have varying QoS needs. Most of the previous studies are based on reference signal received power (RSRP), signal to interference and noise ratio (SINR) or its variants and most importantly majority of them are not load-aware. Therefore, a modified load-aware biased cell association scheme based on distance is proposed to attain better QoS provisioning in terms of throughput and load-balancing. Simulation results depict that the proposed load-aware-based method outperforms conventional cell association schemes based on RSRP and its variants, and in terms of throughput and load-balancing. Furthermore, the algorithm’s complexity has been assessed through a comparison and analysis of computational time, demonstrating better performance compared to state-of-the-art techniques.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"8 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight omnidirectional visual-inertial odometry for MAVs based on improved keyframe tracking and marginalization 基于改进的关键帧跟踪和边缘化技术的轻量级全向视觉惯性飞行器测距仪
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-12 DOI: 10.1007/s11235-024-01208-4
Bo Gao, Baowang Lian, Chengkai Tang

Due to the limited onboard resources on Micro Aerial Vehicles (MAVs), the poor real-time performance has always been an urgent problem to be solved in the practical applications of visual inertial odometry (VIO). Therefore, a lightweight omnidirectional visual-inertial odometry (LOVIO) for MAVs based on improved keyframe tracking and marginalization was proposed. In the front-end processing of LOVIO, wide field-of-view (FOV) images are captured by an omnidirectional camera, frames are tracked by semi-direct method combining of direct method with rapidity and feature-based method with accuracy. In the back-end optimization, the Hessian matrix corresponding to the error optimization equation is stepwise marginalized, so the high-dimensional matrix is decomposed and the operating efficiency is improved. Experimental results on the dataset TUM-VI show that LOVIO can significantly reduce running time consumption without loss of precision and robustness, that means LOVIO has better real-time and practicability for MAVs.

由于微型飞行器(MAVs)的机载资源有限,实时性差一直是视觉惯性测距(VIO)实际应用中亟待解决的问题。因此,有人提出了一种基于改进的关键帧跟踪和边际化的轻量级全向视觉惯性里程计(LOVIO)。在 LOVIO 的前端处理过程中,全向相机捕捉宽视场(FOV)图像,采用半直接方法跟踪帧,该方法结合了快速的直接方法和精确的基于特征的方法。在后端优化中,误差优化方程对应的 Hessian 矩阵被逐步边际化,从而分解了高维矩阵,提高了运行效率。在数据集 TUM-VI 上的实验结果表明,LOVIO 可以在不损失精度和鲁棒性的情况下显著减少运行时间消耗,这意味着 LOVIO 对无人飞行器具有更好的实时性和实用性。
{"title":"Lightweight omnidirectional visual-inertial odometry for MAVs based on improved keyframe tracking and marginalization","authors":"Bo Gao, Baowang Lian, Chengkai Tang","doi":"10.1007/s11235-024-01208-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01208-4","url":null,"abstract":"<p>Due to the limited onboard resources on Micro Aerial Vehicles (MAVs), the poor real-time performance has always been an urgent problem to be solved in the practical applications of visual inertial odometry (VIO). Therefore, a lightweight omnidirectional visual-inertial odometry (LOVIO) for MAVs based on improved keyframe tracking and marginalization was proposed. In the front-end processing of LOVIO, wide field-of-view (FOV) images are captured by an omnidirectional camera, frames are tracked by semi-direct method combining of direct method with rapidity and feature-based method with accuracy. In the back-end optimization, the Hessian matrix corresponding to the error optimization equation is stepwise marginalized, so the high-dimensional matrix is decomposed and the operating efficiency is improved. Experimental results on the dataset TUM-VI show that LOVIO can significantly reduce running time consumption without loss of precision and robustness, that means LOVIO has better real-time and practicability for MAVs.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"7 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142186381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight signal recognition based on hybrid model in wireless networks 基于混合模型的无线网络轻量级信号识别
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-06 DOI: 10.1007/s11235-024-01204-8
Mingjun Tang, Rui Gao, Lan Guo

Signal recognition is a key technology in wireless networks, with broad applications in both military and civilian fields. Accurately recognizing the modulation scheme of an incoming unknown signal can significantly enhance the performance of communication systems. As global digitization and intelligence advance, the rapid development of wireless communication imposes higher standards for signal recognition: (1) Accurate and efficient recognition of various modulation modes, and (2) Lightweight recognition compatible with intelligent hardware. To meet these demands, we have designed a hybrid signal recognition model based on a convolutional neural network and a gated recurrent unit (CnGr). By integrating spatial and temporal modules, we enhance the multi-dimensional extraction of the original signal, significantly improving recognition accuracy. Additionally, we propose a lightweight signal recognition method that combines pruning and depthwise separable convolution. This approach effectively reduces the network size while maintaining recognition accuracy, facilitating deployment and implementation on edge devices. Extensive experiments demonstrate that our proposed method significantly improves recognition accuracy and reduces the model size without compromising performance.

信号识别是无线网络的一项关键技术,在军事和民用领域都有广泛应用。准确识别传入的未知信号的调制方案可以显著提高通信系统的性能。随着全球数字化和智能化的发展,无线通信的快速发展对信号识别提出了更高的要求:(1)准确高效地识别各种调制模式;(2)与智能硬件兼容的轻量级识别。为了满足这些要求,我们设计了一种基于卷积神经网络和门控递归单元(CnGr)的混合信号识别模型。通过整合空间和时间模块,我们增强了对原始信号的多维提取,从而显著提高了识别准确率。此外,我们还提出了一种结合剪枝和深度可分离卷积的轻量级信号识别方法。这种方法在保持识别准确率的同时有效地缩小了网络规模,便于在边缘设备上部署和实施。大量实验证明,我们提出的方法显著提高了识别准确率,并在不影响性能的情况下缩小了模型大小。
{"title":"Lightweight signal recognition based on hybrid model in wireless networks","authors":"Mingjun Tang, Rui Gao, Lan Guo","doi":"10.1007/s11235-024-01204-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01204-8","url":null,"abstract":"<p>Signal recognition is a key technology in wireless networks, with broad applications in both military and civilian fields. Accurately recognizing the modulation scheme of an incoming unknown signal can significantly enhance the performance of communication systems. As global digitization and intelligence advance, the rapid development of wireless communication imposes higher standards for signal recognition: (1) Accurate and efficient recognition of various modulation modes, and (2) Lightweight recognition compatible with intelligent hardware. To meet these demands, we have designed a hybrid signal recognition model based on a convolutional neural network and a gated recurrent unit (CnGr). By integrating spatial and temporal modules, we enhance the multi-dimensional extraction of the original signal, significantly improving recognition accuracy. Additionally, we propose a lightweight signal recognition method that combines pruning and depthwise separable convolution. This approach effectively reduces the network size while maintaining recognition accuracy, facilitating deployment and implementation on edge devices. Extensive experiments demonstrate that our proposed method significantly improves recognition accuracy and reduces the model size without compromising performance.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"19 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141969443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-iterative sem-blind receiver for multi-way relay (MWR) systems 多路中继(MWR)系统的非迭代半盲目接收器
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-04 DOI: 10.1007/s11235-024-01209-3
Leandro R. Ximenes

The growing number of mobile stations requires relaying protocols that can efficiently transmit large volumes of data with minimal computational complexity. Systems that combine joint symbol and channel estimation with Amplify-and-Forward Multiway Relay (MWR) systems provide a highly effective solution to this problem. Thus, this study introduces a new Nested PARAFAC-based MWR system model as its primary contribution. Then, a non-iterative semi-blind receiver is designed to allow simultaneous estimation of symbols and channels. This computationally efficient approach is validated using Monte Carlo computational simulations, showing that the proposed receiver can achieve lower bit error rate values at lower computational complexity than some of its state-of-the-art competitors.

移动台数量的不断增加要求中继协议能以最小的计算复杂度高效传输大量数据。将联合符号和信道估计与放大-前向多路中继(MWR)系统相结合的系统为这一问题提供了高效的解决方案。因此,本研究引入了一种基于嵌套 PARAFAC 的新型 MWR 系统模型,作为其主要贡献。然后,设计了一种非迭代半盲接收器,允许同时估计符号和信道。通过蒙特卡罗计算仿真验证了这种计算效率高的方法,结果表明,与一些最先进的竞争对手相比,所提出的接收器能以更低的计算复杂度获得更低的误码率值。
{"title":"Non-iterative sem-blind receiver for multi-way relay (MWR) systems","authors":"Leandro R. Ximenes","doi":"10.1007/s11235-024-01209-3","DOIUrl":"https://doi.org/10.1007/s11235-024-01209-3","url":null,"abstract":"<p>The growing number of mobile stations requires relaying protocols that can efficiently transmit large volumes of data with minimal computational complexity. Systems that combine joint symbol and channel estimation with Amplify-and-Forward Multiway Relay (MWR) systems provide a highly effective solution to this problem. Thus, this study introduces a new Nested PARAFAC-based MWR system model as its primary contribution. Then, a non-iterative semi-blind receiver is designed to allow simultaneous estimation of symbols and channels. This computationally efficient approach is validated using Monte Carlo computational simulations, showing that the proposed receiver can achieve lower bit error rate values at lower computational complexity than some of its state-of-the-art competitors.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"6 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141945457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1