首页 > 最新文献

IET Communications最新文献

英文 中文
A novel quasi-FM demodulator as AM demodulator for amplitude limited signals 一种新型准调频解调器,可用作振幅受限信号的调幅解调器
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-07 DOI: 10.1049/cmu2.12804
Roza Banitalebi Dehkordi, Mohsen Mivehchy, Mohammad Farzan Sabahi

This paper investigates the changes in the waveform of a sinusoidal carrier resulting from amplitude modulation (AM) process. Based on this analysis, a novel method for extracting amplitude information is proposed. The proposed method uses the behaviour of the amplitude limitation which does not significantly affect the slope of the sinusoidal signal near zero crossing points. A simple comparator is used to convert the changes in sinusoidal slope near zero crossing points into pulse width changes. A simple circuit is proposed which keeps the output pulse width of the comparator constant by a simple control loop. The accuracy of the method is evaluated through simulation and is experimentally tested. If the modulation index is high and the amplitude of the input signal to the detector is limited, the proposed method can yield up at least 9 dB improvement in relative error power. However, if the modulation index is small, the improvement in relative error power can be at least 35 dB compared to other conventional types of AM demodulators.

本文研究了振幅调制(AM)过程导致的正弦载波波形变化。在此分析基础上,提出了一种提取振幅信息的新方法。所提出的方法利用了振幅限制的特性,这种特性在过零点附近不会明显影响正弦信号的斜率。使用一个简单的比较器将零交叉点附近正弦斜率的变化转换为脉冲宽度的变化。我们提出了一个简单的电路,通过一个简单的控制回路保持比较器的输出脉冲宽度不变。通过模拟和实验测试评估了该方法的准确性。如果调制指数较高,并且检测器的输入信号振幅有限,那么所提出的方法至少可以提高 9 dB 的相对误差功率。然而,如果调制指数较小,与其他传统类型的调幅解调器相比,相对误差功率至少可提高 35 dB。
{"title":"A novel quasi-FM demodulator as AM demodulator for amplitude limited signals","authors":"Roza Banitalebi Dehkordi,&nbsp;Mohsen Mivehchy,&nbsp;Mohammad Farzan Sabahi","doi":"10.1049/cmu2.12804","DOIUrl":"https://doi.org/10.1049/cmu2.12804","url":null,"abstract":"<p>This paper investigates the changes in the waveform of a sinusoidal carrier resulting from amplitude modulation (AM) process. Based on this analysis, a novel method for extracting amplitude information is proposed. The proposed method uses the behaviour of the amplitude limitation which does not significantly affect the slope of the sinusoidal signal near zero crossing points. A simple comparator is used to convert the changes in sinusoidal slope near zero crossing points into pulse width changes. A simple circuit is proposed which keeps the output pulse width of the comparator constant by a simple control loop. The accuracy of the method is evaluated through simulation and is experimentally tested. If the modulation index is high and the amplitude of the input signal to the detector is limited, the proposed method can yield up at least 9 dB improvement in relative error power. However, if the modulation index is small, the improvement in relative error power can be at least 35 dB compared to other conventional types of AM demodulators.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12804","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever-evolving relationships 根据相似性、互动性和信任度对 Twitter 好友进行动态分组,以考虑不断发展的关系
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-26 DOI: 10.1049/cmu2.12807
Nisha P. Shetty, Balachandra Muniyal, Leander Melroy Maben, Rithika Jayaraj, Sameer Saxena

Online social networks have become ubiquitous, allowing users to share opinions on various topics. However, oversharing can compromise privacy, leading to potential blackmail or fraud. Current platforms lack friend categorization based on trust levels. This study proposes simulating real-world friendships by grouping users into three categories: acquaintances, friends, and close friends, based on trust and engagement. It also introduces a dynamic method to adjust relationship status over time, considering users' past and present offenses against peers. The proposed system automatically updates friend lists, eliminating manual grouping. It calculates relationship strength by considering all components of online social networks and trust variations caused by user attacks. This method can be integrated with clustering algorithms on popular platforms like Facebook, Twitter, and Instagram to enable constrained sharing. By implementing this system, users can better control their information sharing based on trust levels, reducing privacy risks. The dynamic nature of the relationship status adjustment ensures that the system remains relevant as user interactions evolve over time. This approach offers a more nuanced and secure social networking experience, reflecting real-world relationship dynamics in the digital sphere.

在线社交网络已变得无处不在,允许用户就各种话题分享观点。然而,过度分享可能会泄露隐私,导致潜在的勒索或欺诈。目前的平台缺乏基于信任度的好友分类。本研究建议模拟现实世界中的朋友关系,根据信任度和参与度将用户分为三类:熟人、朋友和密友。它还引入了一种动态方法,考虑到用户过去和现在对同伴的冒犯行为,随着时间的推移调整关系状态。建议的系统会自动更新好友列表,无需人工分组。它通过考虑在线社交网络的所有组成部分和用户攻击造成的信任变化来计算关系强度。这种方法可与 Facebook、Twitter 和 Instagram 等流行平台上的聚类算法相结合,实现有限制的共享。通过实施该系统,用户可以根据信任度更好地控制自己的信息共享,从而降低隐私风险。关系状态调整的动态性质确保了系统在用户互动随时间演变的过程中始终保持相关性。这种方法提供了一种更细致入微、更安全的社交网络体验,反映了数字领域中真实世界的关系动态。
{"title":"Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever-evolving relationships","authors":"Nisha P. Shetty,&nbsp;Balachandra Muniyal,&nbsp;Leander Melroy Maben,&nbsp;Rithika Jayaraj,&nbsp;Sameer Saxena","doi":"10.1049/cmu2.12807","DOIUrl":"10.1049/cmu2.12807","url":null,"abstract":"<p>Online social networks have become ubiquitous, allowing users to share opinions on various topics. However, oversharing can compromise privacy, leading to potential blackmail or fraud. Current platforms lack friend categorization based on trust levels. This study proposes simulating real-world friendships by grouping users into three categories: acquaintances, friends, and close friends, based on trust and engagement. It also introduces a dynamic method to adjust relationship status over time, considering users' past and present offenses against peers. The proposed system automatically updates friend lists, eliminating manual grouping. It calculates relationship strength by considering all components of online social networks and trust variations caused by user attacks. This method can be integrated with clustering algorithms on popular platforms like Facebook, Twitter, and Instagram to enable constrained sharing. By implementing this system, users can better control their information sharing based on trust levels, reducing privacy risks. The dynamic nature of the relationship status adjustment ensures that the system remains relevant as user interactions evolve over time. This approach offers a more nuanced and secure social networking experience, reflecting real-world relationship dynamics in the digital sphere.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12807","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141799854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained spectrum map inference: A novel approach based on deep residual network 细粒度频谱图推断:基于深度残差网络的新方法
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-19 DOI: 10.1049/cmu2.12786
Shoushuai He, Lei Zhu, Lei Wang, Weijun Zeng, Zhen Qin

Spectrum map is a database that stores multidimensional representations of spectrum situation information. It provides support for spectrum sensing and endows wireless communication networks with intelligence. However, the ubiquitous deployment of monitoring devices leads to huge costs of operation and maintenance. It indicates that an approach is needed to reduce the number of monitoring devices, but prevent the degradation of data granularity. Therefore, this paper focuses on the accurate construction of the spectrum map. It aims to infer the fine-grained spectrum situation of the target region based on coarse-grained observation. In order to solve this problem, an inference framework based on deep residual network is developed in this paper. In the case of rule deployment for sensing nodes, it adopts the idea of super resolution to improve the accuracy of the spectrum map. The framework is composed of two major parts: an inference network, which generates fine-grained spectrum maps from coarse-grained counterparts by using feature extraction module and upsampling construction module; and a fusion network, which considers the influence of environmental factors to further improve the performance. A large number of experiments on simulated datasets verify the effectiveness of the proposed method.

频谱图是一种存储频谱情况信息多维表示法的数据库。它为频谱感知提供支持,并赋予无线通信网络以智能。然而,无处不在的监控设备导致了巨大的运行和维护成本。这表明需要一种既能减少监测设备数量,又能防止数据粒度下降的方法。因此,本文重点关注频谱图的精确构建。其目的是在粗粒度观测的基础上推断目标区域的细粒度频谱情况。为了解决这一问题,本文开发了基于深度残差网络的推理框架。在传感节点规则部署的情况下,它采用了超分辨率的思想来提高频谱图的精度。该框架由两大部分组成:一是推理网络,通过使用特征提取模块和上采样构建模块,从粗粒度对应模块生成细粒度频谱图;二是融合网络,考虑环境因素的影响,进一步提高性能。在模拟数据集上进行的大量实验验证了所提方法的有效性。
{"title":"Fine-grained spectrum map inference: A novel approach based on deep residual network","authors":"Shoushuai He,&nbsp;Lei Zhu,&nbsp;Lei Wang,&nbsp;Weijun Zeng,&nbsp;Zhen Qin","doi":"10.1049/cmu2.12786","DOIUrl":"10.1049/cmu2.12786","url":null,"abstract":"<p>Spectrum map is a database that stores multidimensional representations of spectrum situation information. It provides support for spectrum sensing and endows wireless communication networks with intelligence. However, the ubiquitous deployment of monitoring devices leads to huge costs of operation and maintenance. It indicates that an approach is needed to reduce the number of monitoring devices, but prevent the degradation of data granularity. Therefore, this paper focuses on the accurate construction of the spectrum map. It aims to infer the fine-grained spectrum situation of the target region based on coarse-grained observation. In order to solve this problem, an inference framework based on deep residual network is developed in this paper. In the case of rule deployment for sensing nodes, it adopts the idea of super resolution to improve the accuracy of the spectrum map. The framework is composed of two major parts: an inference network, which generates fine-grained spectrum maps from coarse-grained counterparts by using feature extraction module and upsampling construction module; and a fusion network, which considers the influence of environmental factors to further improve the performance. A large number of experiments on simulated datasets verify the effectiveness of the proposed method.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12786","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141823442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new hybrid genetic algorithm with tabu search for solving the temporal coverage problem using rotating directional sensors 利用旋转定向传感器解决时间覆盖问题的新型混合遗传算法与塔布搜索
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-16 DOI: 10.1049/cmu2.12796
Mahboobeh Eshaghi, Ali Nodehi, Hosein Mohamadi

One of the most important problems in directional sensor networks is coverage problem. The coverage can be measured in two ways: positional or temporal. In temporal coverage, the directional sensors rotate periodically round themselves in a repetitive process. Thus, in each time slot, those targets that are positioned within the sensor nodes radius receive their desired coverage. In this model, if a target is left uncovered, it is said that the target has remained in darkness. The main task defined for the temporal coverage model is the minimization of the total dark time for all the targets in the network. This problem has been solved by greedy-based algorithms in last studies. Greedy-based algorithms are able to solve the temporal coverage problem in real time. Remember that the performance of greedy algorithms is extremely dependent on the closeness of optimal solution and initial candidates. For this reason, greedy algorithms may obtain local minima due to heuristic search. As far as we know meta-heuristic algorithms have not been used in past researches to solve such problems. For solving this problem, in this paper two algorithms were developed, GA-based and hybridized model comprising genetic algorithms and tabu search. A new model was suggested for the chromosome in genetic algorithm. To evaluate the performance of the developed algorithms, they were compared with randomized scenario and greedy-based algorithm presented in last studies. For better comparison, several parameters, including total dark time, number of sensors, number of targets, sector angle, sensing range were taken into account. The results obtained from the comparison of the algorithms indicated that the developed algorithms are effective in solving the temporal coverage problem in terms of minimizing the total dark time of the targets.

定向传感器网络中最重要的问题之一是覆盖问题。覆盖范围有两种测量方法:位置覆盖和时间覆盖。在时间覆盖中,定向传感器在重复的过程中周期性地自转一圈。因此,在每个时隙内,那些位于传感器节点半径内的目标都能获得所需的覆盖范围。在这种模式下,如果目标没有被覆盖,则表示该目标一直处于黑暗中。时间覆盖模型的主要任务是最小化网络中所有目标的总黑暗时间。在过去的研究中,这个问题一直由基于贪婪的算法来解决。基于贪婪的算法能够实时解决时间覆盖问题。请记住,贪婪算法的性能极其依赖于最优解和初始候选解的接近程度。因此,贪婪算法可能会因启发式搜索而获得局部最小值。据我们所知,在过去的研究中还没有使用元启发式算法来解决此类问题。为了解决这个问题,本文开发了两种算法,一种是基于遗传算法的 GA 算法,另一种是由遗传算法和塔布搜索组成的混合模型。为遗传算法中的染色体提出了一个新模型。为了评估所开发算法的性能,将它们与以往研究中提出的随机方案和基于贪婪的算法进行了比较。为了更好地进行比较,考虑了几个参数,包括总黑暗时间、传感器数量、目标数量、扇形角和感应范围。算法比较得出的结果表明,所开发的算法能有效解决时间覆盖问题,最大限度地减少目标的总黑暗时间。
{"title":"A new hybrid genetic algorithm with tabu search for solving the temporal coverage problem using rotating directional sensors","authors":"Mahboobeh Eshaghi,&nbsp;Ali Nodehi,&nbsp;Hosein Mohamadi","doi":"10.1049/cmu2.12796","DOIUrl":"10.1049/cmu2.12796","url":null,"abstract":"<p>One of the most important problems in directional sensor networks is coverage problem. The coverage can be measured in two ways: positional or temporal. In temporal coverage, the directional sensors rotate periodically round themselves in a repetitive process. Thus, in each time slot, those targets that are positioned within the sensor nodes radius receive their desired coverage. In this model, if a target is left uncovered, it is said that the target has remained in darkness. The main task defined for the temporal coverage model is the minimization of the total dark time for all the targets in the network. This problem has been solved by greedy-based algorithms in last studies. Greedy-based algorithms are able to solve the temporal coverage problem in real time. Remember that the performance of greedy algorithms is extremely dependent on the closeness of optimal solution and initial candidates. For this reason, greedy algorithms may obtain local minima due to heuristic search. As far as we know meta-heuristic algorithms have not been used in past researches to solve such problems. For solving this problem, in this paper two algorithms were developed, GA-based and hybridized model comprising genetic algorithms and tabu search. A new model was suggested for the chromosome in genetic algorithm. To evaluate the performance of the developed algorithms, they were compared with randomized scenario and greedy-based algorithm presented in last studies. For better comparison, several parameters, including total dark time, number of sensors, number of targets, sector angle, sensing range were taken into account. The results obtained from the comparison of the algorithms indicated that the developed algorithms are effective in solving the temporal coverage problem in terms of minimizing the total dark time of the targets.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12796","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141640631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BFT-Net: A transformer-based boundary feedback network for kidney tumour segmentation BFT-Net:用于肾脏肿瘤分割的基于变压器的边界反馈网络
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-12 DOI: 10.1049/cmu2.12802
Tianyu Zheng, Chao Xu, Zhengping Li, Chao Nie, Rubin Xu, Minpeng Jiang, Leilei Li

Kidney tumours are among the top ten most common tumours, the automatic segmentation of medical images can help locate tumour locations. However, the segmentation of kidney tumour images still faces several challenges: firstly, there is a lack of renal tumour endoscopic datasets and no segmentation techniques for renal tumour endoscopic images; secondly, the intra-class inconsistency of tumours caused by variations in size, location, and shape of renal tumours; thirdly, difficulty in semantic fusion during decoding; and finally, the issue of boundary blurring in the localization of lesions. To address the aforementioned issues, a new dataset called Re-TMRS is proposed, and for this dataset, the transformer-based boundary feedback network for kidney tumour segmentation (BFT-Net) is proposed. This network incorporates an adaptive context extract module (ACE) to emphasize local contextual information, reduces the semantic gap through the mixed feature capture module (MFC), and ultimately improves boundary extraction capability through end-to-end optimization learning in the boundary assist module (BA). Through numerous experiments, it is demonstrated that the proposed model exhibits excellent segmentation ability and generalization performance. The mDice and mIoU on the Re-TMRS dataset reach 91.1% and 91.8%, respectively.

肾脏肿瘤是十大常见肿瘤之一,医学图像的自动分割有助于定位肿瘤位置。然而,肾脏肿瘤图像的分割仍然面临几个挑战:首先,缺乏肾脏肿瘤内窥镜数据集,也没有针对肾脏肿瘤内窥镜图像的分割技术;其次,由于肾脏肿瘤的大小、位置和形状不同,导致肿瘤的类内不一致;第三,解码过程中语义融合困难;最后,病灶定位中的边界模糊问题。为了解决上述问题,我们提出了一个名为 Re-TMRS 的新数据集,并针对该数据集提出了基于变压器的肾脏肿瘤分割边界反馈网络(BFT-Net)。该网络包含一个自适应上下文提取模块(ACE)以强调局部上下文信息,通过混合特征捕捉模块(MFC)减少语义差距,最终通过边界辅助模块(BA)的端到端优化学习提高边界提取能力。通过大量实验证明,所提出的模型具有出色的分割能力和泛化性能。在 Re-TMRS 数据集上的 mDice 和 mIoU 分别达到了 91.1% 和 91.8%。
{"title":"BFT-Net: A transformer-based boundary feedback network for kidney tumour segmentation","authors":"Tianyu Zheng,&nbsp;Chao Xu,&nbsp;Zhengping Li,&nbsp;Chao Nie,&nbsp;Rubin Xu,&nbsp;Minpeng Jiang,&nbsp;Leilei Li","doi":"10.1049/cmu2.12802","DOIUrl":"10.1049/cmu2.12802","url":null,"abstract":"<p>Kidney tumours are among the top ten most common tumours, the automatic segmentation of medical images can help locate tumour locations. However, the segmentation of kidney tumour images still faces several challenges: firstly, there is a lack of renal tumour endoscopic datasets and no segmentation techniques for renal tumour endoscopic images; secondly, the intra-class inconsistency of tumours caused by variations in size, location, and shape of renal tumours; thirdly, difficulty in semantic fusion during decoding; and finally, the issue of boundary blurring in the localization of lesions. To address the aforementioned issues, a new dataset called Re-TMRS is proposed, and for this dataset, the transformer-based boundary feedback network for kidney tumour segmentation (BFT-Net) is proposed. This network incorporates an adaptive context extract module (ACE) to emphasize local contextual information, reduces the semantic gap through the mixed feature capture module (MFC), and ultimately improves boundary extraction capability through end-to-end optimization learning in the boundary assist module (BA). Through numerous experiments, it is demonstrated that the proposed model exhibits excellent segmentation ability and generalization performance. The mDice and mIoU on the Re-TMRS dataset reach 91.1% and 91.8%, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12802","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141653660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of construction of Golomb Costas arrays with ideal autocorrelation properties based on extension field 基于扩展场的具有理想自相关特性的戈隆-科斯塔斯阵列构造研究
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-06 DOI: 10.1049/cmu2.12803
Jianguo Yao, Ziwei Liu, Xiaoming Wang

This paper proposes a specific algebraic structure and demonstrates its nature as an extension field, enabling the construction of Golomb Costas (GC) arrays. It provides detailed instructions and examples for constructing GC arrays using this extension field, along with a corresponding flowchart. Additionally, the paper conducts a thorough analysis, incorporating calculations and comparisons, to evaluate the autocorrelation of a GC array derived from the extension field compared to that of a diagonal frequency hopping array. The analysis reveals the superior autocorrelation properties of GC arrays based on the extension field. Furthermore, the paper establishes a mathematical model for the signal coded by the frequency hopping array and subsequently simulates and compares the ambiguity function of the signal coded by a GC array with that of a signal coded by a diagonal frequency hopping array. This comparison underscores the thumbtack ambiguity function of frequency hopping signal coded by a GC array. Moreover, the paper thoroughly investigates the relationship between the correlation function of GC arrays and the roots of an algebraic equation in a finite field, and strictly proves the ideal autocorrelation properties of Golomb Costas arrays.

本文提出了一种特定的代数结构,并证明了它作为扩展域的性质,从而能够构建戈隆-科斯塔斯(GC)数组。本文提供了使用该扩展域构建 GC 阵列的详细说明和示例,以及相应的流程图。此外,论文还结合计算和比较进行了全面分析,以评估由扩展场导出的 GC 阵列与对角跳频阵列相比的自相关性。分析表明,基于扩展场的 GC 阵列具有更优越的自相关特性。此外,论文还建立了跳频阵列编码信号的数学模型,随后模拟并比较了 GC 阵列编码信号与对角跳频阵列编码信号的模糊函数。这种比较强调了用 GC 阵列编码的跳频信号的拇指槌模糊函数。此外,论文还深入研究了 GC 阵列的相关函数与有限场中代数方程根之间的关系,并严格证明了戈隆-科斯塔斯阵列的理想自相关特性。
{"title":"Study of construction of Golomb Costas arrays with ideal autocorrelation properties based on extension field","authors":"Jianguo Yao,&nbsp;Ziwei Liu,&nbsp;Xiaoming Wang","doi":"10.1049/cmu2.12803","DOIUrl":"10.1049/cmu2.12803","url":null,"abstract":"<p>This paper proposes a specific algebraic structure and demonstrates its nature as an extension field, enabling the construction of Golomb Costas (GC) arrays. It provides detailed instructions and examples for constructing GC arrays using this extension field, along with a corresponding flowchart. Additionally, the paper conducts a thorough analysis, incorporating calculations and comparisons, to evaluate the autocorrelation of a GC array derived from the extension field compared to that of a diagonal frequency hopping array. The analysis reveals the superior autocorrelation properties of GC arrays based on the extension field. Furthermore, the paper establishes a mathematical model for the signal coded by the frequency hopping array and subsequently simulates and compares the ambiguity function of the signal coded by a GC array with that of a signal coded by a diagonal frequency hopping array. This comparison underscores the thumbtack ambiguity function of frequency hopping signal coded by a GC array. Moreover, the paper thoroughly investigates the relationship between the correlation function of GC arrays and the roots of an algebraic equation in a finite field, and strictly proves the ideal autocorrelation properties of Golomb Costas arrays.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12803","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141671530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BPNN-based flow classification and admission control for software defined IIoT 基于 BPNN 的软件定义 IIoT 流量分类和准入控制
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-05 DOI: 10.1049/cmu2.12798
Cheng Wang, Hai Xue, Zhan Huan

Flow admission control (FAC) aims to efficiently manage the service requests while maximizing the network utilization. With multiple connection requests, access delay or even service interruption may occur. This paper proposes a novel FAC approach to reduce the contention between the end nodes and ensure high utilization of the networking resources for software defined IIoT. First, incoming flows are classified into different priorities using back propagation neural network based on selected features representing the current network status. Second, with the designed flow admission policies, bandwidth and buffer size are estimated with stochastic network calculus model. Finally, the thresholds of the proposed FAC scheme are dynamically decided based on the above two parameters. Various flows are admitted or rejected via the proposed FAC to maintain real time processing. Unlike traditional FAC schemes rely on static priority systems, the proposed scheme leverages machine learning technique for dynamic flow prioritization and the stochastic network calculus model for precise estimation. Computer simulation reveals that the proposed scheme accurately classifies the flows, and substantially decreases the transmission delay and improves the network utilization compared to the existing FAC schemes. This highlights the superiority of the proposed scheme meeting the demands of software defined IIoT.

流量准入控制(FAC)旨在有效管理服务请求,同时最大限度地提高网络利用率。在多个连接请求的情况下,可能会出现访问延迟甚至服务中断。本文提出了一种新颖的流量准入控制方法,以减少终端节点之间的争用,确保软件定义的物联网网络资源的高利用率。首先,根据代表当前网络状态的选定特征,使用反向传播神经网络将进入的流量分为不同的优先级。其次,根据设计的流量接纳策略,利用随机网络微积分模型估算带宽和缓冲区大小。最后,根据上述两个参数动态决定拟议 FAC 方案的阈值。各种流量通过拟议的 FAC 被接纳或拒绝,以保持实时处理。与依赖静态优先级系统的传统 FAC 方案不同,拟议方案利用机器学习技术进行动态流量优先级排序,并利用随机网络微积分模型进行精确估算。计算机仿真显示,与现有的 FAC 方案相比,拟议方案能准确地对流量进行分类,并大幅减少传输延迟,提高网络利用率。这凸显了拟议方案在满足软件定义的物联网需求方面的优越性。
{"title":"BPNN-based flow classification and admission control for software defined IIoT","authors":"Cheng Wang,&nbsp;Hai Xue,&nbsp;Zhan Huan","doi":"10.1049/cmu2.12798","DOIUrl":"10.1049/cmu2.12798","url":null,"abstract":"<p>Flow admission control (FAC) aims to efficiently manage the service requests while maximizing the network utilization. With multiple connection requests, access delay or even service interruption may occur. This paper proposes a novel FAC approach to reduce the contention between the end nodes and ensure high utilization of the networking resources for software defined IIoT. First, incoming flows are classified into different priorities using back propagation neural network based on selected features representing the current network status. Second, with the designed flow admission policies, bandwidth and buffer size are estimated with stochastic network calculus model. Finally, the thresholds of the proposed FAC scheme are dynamically decided based on the above two parameters. Various flows are admitted or rejected via the proposed FAC to maintain real time processing. Unlike traditional FAC schemes rely on static priority systems, the proposed scheme leverages machine learning technique for dynamic flow prioritization and the stochastic network calculus model for precise estimation. Computer simulation reveals that the proposed scheme accurately classifies the flows, and substantially decreases the transmission delay and improves the network utilization compared to the existing FAC schemes. This highlights the superiority of the proposed scheme meeting the demands of software defined IIoT.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12798","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing cloud security: A study on ensemble learning-based intrusion detection systems 加强云安全:基于集合学习的入侵检测系统研究
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-04 DOI: 10.1049/cmu2.12801
Maha Al-Sharif, Anas Bushnag

Cloud computing has become an essential technology for people and enterprises due to the simplicity and rapid availability of services on the internet. These services are usually delivered through a third party, which provides the required resources for users. Therefore, because of the distributed complexity and increased spread of this type of environment, many attackers are attempting to access sensitive data from users and organizations. One counter technique is the use of intrusion detection systems (IDSs), which detect attacks within the cloud environment by monitoring traffic activity. However, since the computing environment varies from the environments of most traditional systems, it is difficult for IDSs to identify attacks and continual changes in attack patterns. Therefore, a system that uses an ensemble learning algorithm is proposed. Ensemble learning is a machine learning technique that collects information from weak classifiers and creates one robust classifier with higher accuracy than the individual weak classifiers. The bagging technique is used with a random forest algorithm as a base classifier and compared to three boosting classifiers: Ensemble AdaBoost, Ensemble LPBoost, and Ensemble RUSBoost. The CICID2017 dataset is utilized to develop the proposed IDS to satisfy cloud computing requirements. Each classifier is also tested on various subdatasets individually to analyze the performance. The results show that Ensemble RUSBoost has the best average performance overall with 99.821% accuracy. Moreover, bagging achieves the best performance on the DS2 subdataset, with an accuracy of 99.997%. The proposed model is also compared to a model from the literature to show the differences and demonstrate its effectiveness.

由于互联网上的服务简单快捷,云计算已成为人们和企业必不可少的技术。这些服务通常通过第三方提供,第三方为用户提供所需的资源。因此,由于这种环境的分布式复杂性和传播范围的扩大,许多攻击者正试图访问用户和组织的敏感数据。一种应对技术是使用入侵检测系统(IDS),通过监控流量活动来检测云环境中的攻击。然而,由于计算环境与大多数传统系统的环境不同,IDS 很难识别攻击和攻击模式的持续变化。因此,我们提出了一种使用集合学习算法的系统。集合学习是一种机器学习技术,它收集来自弱分类器的信息,并创建一个比单个弱分类器准确度更高的稳健分类器。该系统使用袋式学习技术和随机森林算法作为基础分类器,并与三种提升分类器进行了比较:Ensemble AdaBoost、Ensemble LPBoost 和 Ensemble RUSBoost。利用 CICID2017 数据集开发了拟议的 IDS,以满足云计算的要求。每个分类器还分别在不同的子数据集上进行了测试,以分析其性能。结果表明,Ensemble RUSBoost 的平均准确率为 99.821%,总体性能最佳。此外,bagging 在 DS2 子数据集上表现最佳,准确率为 99.997%。我们还将提出的模型与文献中的模型进行了比较,以显示两者之间的差异并证明其有效性。
{"title":"Enhancing cloud security: A study on ensemble learning-based intrusion detection systems","authors":"Maha Al-Sharif,&nbsp;Anas Bushnag","doi":"10.1049/cmu2.12801","DOIUrl":"10.1049/cmu2.12801","url":null,"abstract":"<p>Cloud computing has become an essential technology for people and enterprises due to the simplicity and rapid availability of services on the internet. These services are usually delivered through a third party, which provides the required resources for users. Therefore, because of the distributed complexity and increased spread of this type of environment, many attackers are attempting to access sensitive data from users and organizations. One counter technique is the use of intrusion detection systems (IDSs), which detect attacks within the cloud environment by monitoring traffic activity. However, since the computing environment varies from the environments of most traditional systems, it is difficult for IDSs to identify attacks and continual changes in attack patterns. Therefore, a system that uses an ensemble learning algorithm is proposed. Ensemble learning is a machine learning technique that collects information from weak classifiers and creates one robust classifier with higher accuracy than the individual weak classifiers. The bagging technique is used with a random forest algorithm as a base classifier and compared to three boosting classifiers: Ensemble AdaBoost, Ensemble LPBoost, and Ensemble RUSBoost. The CICID2017 dataset is utilized to develop the proposed IDS to satisfy cloud computing requirements. Each classifier is also tested on various subdatasets individually to analyze the performance. The results show that Ensemble RUSBoost has the best average performance overall with 99.821% accuracy. Moreover, bagging achieves the best performance on the DS2 subdataset, with an accuracy of 99.997%. The proposed model is also compared to a model from the literature to show the differences and demonstrate its effectiveness.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141678558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimization scheme for vehicular edge computing based on Lyapunov function and deep reinforcement learning 基于 Lyapunov 函数和深度强化学习的车载边缘计算优化方案
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-02 DOI: 10.1049/cmu2.12800
Lin Zhu, Long Tan, Bingxian Li, Huizi Tian

Traditional vehicular edge computing research usually ignores the mobility of vehicles, the dynamic variability of the vehicular edge environment, the large amount of real-time data required for vehicular edge computing, the limited resources of edge servers, and collaboration issues. In response to these challenges, this article proposes a vehicular edge computing optimization scheme based on the Lyapunov function and Deep Reinforcement Learning. In this solution, this article uses Digital Twin technology (DT) to simulate the vehicular edge environment. The edge server DT is used to simulate the vehicular edge environment under the edge server, and the base station DT is used to simulate the entire vehicular edge system environment. Based on the real-time data obtained from DT simulation, this paper defines the Lyapunov function to simplify the migration cost of vehicle tasks between servers into a multi-objective dynamic optimization problem. It solves the problem by applying the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. Experimental results show that compared with other algorithms, this scheme can effectively optimize the allocation and collaboration of vehicular edge computing resources and reduce the delay and energy consumption caused by vehicle task processing.

传统的车载边缘计算研究通常忽略了车辆的移动性、车载边缘环境的动态多变性、车载边缘计算所需的大量实时数据、边缘服务器的有限资源以及协作问题。针对这些挑战,本文提出了一种基于 Lyapunov 函数和深度强化学习的车载边缘计算优化方案。在该方案中,本文使用数字孪生技术(DT)来模拟车辆边缘环境。边缘服务器 DT 用于模拟边缘服务器下的车辆边缘环境,基站 DT 用于模拟整个车辆边缘系统环境。本文基于 DT 仿真获得的实时数据,定义了 Lyapunov 函数,将服务器之间的车辆任务迁移成本简化为多目标动态优化问题。本文采用双延迟深度确定性策略梯度(TD3)算法来解决该问题。实验结果表明,与其他算法相比,该方案能有效优化车载边缘计算资源的分配和协作,减少车载任务处理带来的延迟和能耗。
{"title":"An optimization scheme for vehicular edge computing based on Lyapunov function and deep reinforcement learning","authors":"Lin Zhu,&nbsp;Long Tan,&nbsp;Bingxian Li,&nbsp;Huizi Tian","doi":"10.1049/cmu2.12800","DOIUrl":"10.1049/cmu2.12800","url":null,"abstract":"<p>Traditional vehicular edge computing research usually ignores the mobility of vehicles, the dynamic variability of the vehicular edge environment, the large amount of real-time data required for vehicular edge computing, the limited resources of edge servers, and collaboration issues. In response to these challenges, this article proposes a vehicular edge computing optimization scheme based on the Lyapunov function and Deep Reinforcement Learning. In this solution, this article uses Digital Twin technology (DT) to simulate the vehicular edge environment. The edge server DT is used to simulate the vehicular edge environment under the edge server, and the base station DT is used to simulate the entire vehicular edge system environment. Based on the real-time data obtained from DT simulation, this paper defines the Lyapunov function to simplify the migration cost of vehicle tasks between servers into a multi-objective dynamic optimization problem. It solves the problem by applying the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. Experimental results show that compared with other algorithms, this scheme can effectively optimize the allocation and collaboration of vehicular edge computing resources and reduce the delay and energy consumption caused by vehicle task processing.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12800","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141685486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-complexity channel estimation for V2X systems using feed-forward neural networks 利用前馈神经网络为 V2X 系统进行低复杂度信道估计
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-29 DOI: 10.1049/cmu2.12788
Pooria Tabesh Mehr, Konstantinos Koufos, Karim El Haloui, Mehrdad Dianati

In vehicular communications, channel estimation is a complex problem due to the joint time–frequency selectivity of wireless propagation channels. To this end, several signal processing techniques as well as approaches based on neural networks have been proposed to address this issue. Due to the highly dynamic and random nature of vehicular communication environments, precise characterization of temporal correlation across a received data sequence can enable more accurate channel estimation. This paper proposes a new pilot constellation scheme in combination with a small feed-forward neural network to improve the accuracy of channel estimation in V2X systems while keeping low the implementation complexity. The performance is evaluated in typical vehicular channels using simulated BER curves, and it is found superior to traditional channel estimation methods and state-of-the-art neural-network-based implementations such as feed-forward and super-resolution. It is illustrated that the improvement becomes pronounced for small subcarrier spacings (or low 5G numerologies); hence, this paper contributes to the development of more reliable mobile services across rapidly varying vehicular communication channels with rich multi-path interference.

在车载通信中,由于无线传播信道的时频联合选择性,信道估计是一个复杂的问题。为此,人们提出了多种信号处理技术和基于神经网络的方法来解决这一问题。由于车辆通信环境的高度动态性和随机性,对整个接收到的数据序列的时间相关性进行精确表征可以实现更准确的信道估计。本文提出了一种结合小型前馈神经网络的新先导星座方案,以提高 V2X 系统中信道估计的准确性,同时降低实施复杂度。利用模拟误码率曲线评估了该方案在典型车辆信道中的性能,发现它优于传统的信道估计方法和最先进的基于神经网络的实现方法(如前馈和超分辨率)。结果表明,在子载波间隔较小(或 5G 数值较低)的情况下,该方法的改进效果非常明显;因此,本文有助于在具有丰富多路径干扰的快速变化车载通信信道中开发更可靠的移动服务。
{"title":"Low-complexity channel estimation for V2X systems using feed-forward neural networks","authors":"Pooria Tabesh Mehr,&nbsp;Konstantinos Koufos,&nbsp;Karim El Haloui,&nbsp;Mehrdad Dianati","doi":"10.1049/cmu2.12788","DOIUrl":"https://doi.org/10.1049/cmu2.12788","url":null,"abstract":"<p>In vehicular communications, channel estimation is a complex problem due to the joint time–frequency selectivity of wireless propagation channels. To this end, several signal processing techniques as well as approaches based on neural networks have been proposed to address this issue. Due to the highly dynamic and random nature of vehicular communication environments, precise characterization of temporal correlation across a received data sequence can enable more accurate channel estimation. This paper proposes a new pilot constellation scheme in combination with a small feed-forward neural network to improve the accuracy of channel estimation in V2X systems while keeping low the implementation complexity. The performance is evaluated in typical vehicular channels using simulated BER curves, and it is found superior to traditional channel estimation methods and state-of-the-art neural-network-based implementations such as feed-forward and super-resolution. It is illustrated that the improvement becomes pronounced for small subcarrier spacings (or low 5G numerologies); hence, this paper contributes to the development of more reliable mobile services across rapidly varying vehicular communication channels with rich multi-path interference.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12788","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1