首页 > 最新文献

2020 16th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
Reliable Routing Design in Predictable Wireless Networks with Unreliable Links 具有不可靠链路的可预测无线网络中的可靠路由设计
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00020
Mengmeng Xu, Hai Zhu, Hengzhou Xu, Jiongjiong Song, Zhen Luo
In this paper, the reliable routing design problem is investigated in predictable wireless networks over unreliable links. The predictable wireless networks are described as a sequence of static graphs, and then modeled as a space-time graph. The reliable routing design problem on the space-time graph is defined as a bi-objective optimization problem. The aim of the new routing design problem is to find a routing path with the maximum routing reliability and the minimum routing cost. Next, a hierarchical shortest routing algorithm is proposed to find the feasible routing path. Simulation results validate the effectiveness of the proposed routing algorithm.
研究了基于不可靠链路的可预测无线网络中的可靠路由设计问题。将可预测无线网络描述为一系列静态图,然后将其建模为一个时空图。将空时图上的可靠路径设计问题定义为双目标优化问题。新路由设计问题的目标是寻找具有最大路由可靠性和最小路由开销的路由路径。其次,提出了一种分层最短路由算法来寻找可行的路由路径。仿真结果验证了所提路由算法的有效性。
{"title":"Reliable Routing Design in Predictable Wireless Networks with Unreliable Links","authors":"Mengmeng Xu, Hai Zhu, Hengzhou Xu, Jiongjiong Song, Zhen Luo","doi":"10.1109/CIS52066.2020.00020","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00020","url":null,"abstract":"In this paper, the reliable routing design problem is investigated in predictable wireless networks over unreliable links. The predictable wireless networks are described as a sequence of static graphs, and then modeled as a space-time graph. The reliable routing design problem on the space-time graph is defined as a bi-objective optimization problem. The aim of the new routing design problem is to find a routing path with the maximum routing reliability and the minimum routing cost. Next, a hierarchical shortest routing algorithm is proposed to find the feasible routing path. Simulation results validate the effectiveness of the proposed routing algorithm.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Transformation and Development Strategy of Guangdong Independent College Based on SWOT-AHP 基于SWOT-AHP的广东独立学院转型发展战略研究
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00043
Hai-Dong Li, Lan Zhang
Under the background of educational reform in the new era, the transformation and development of Guangdong independent colleges is urgent and necessary. The connotation of the transformation and development of independent colleges includes two aspects: the internal transformation of connotation promotion and the external transformation of school running organizational form. The transformation and development of Guangdong independent college has strengths and weaknesses, and it is faced with opportunities and threats. According to AHP weight analysis, it is concluded that the first choice of transformation of Guangdong independent college is ST strategy which is to give full play to its strengths and overcome the threat.
在新时期教育改革的大背景下,广东独立学院的转型与发展是迫切而必要的。独立学院转型发展的内涵包括内涵提升的内部转型和办学组织形式的外部转型两个方面。广东独立学院转型发展既有优势也有不足,面临着机遇与威胁。通过AHP权重分析,得出广东独立学院转型的首选策略是发挥自身优势,克服威胁的ST战略。
{"title":"Research on the Transformation and Development Strategy of Guangdong Independent College Based on SWOT-AHP","authors":"Hai-Dong Li, Lan Zhang","doi":"10.1109/CIS52066.2020.00043","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00043","url":null,"abstract":"Under the background of educational reform in the new era, the transformation and development of Guangdong independent colleges is urgent and necessary. The connotation of the transformation and development of independent colleges includes two aspects: the internal transformation of connotation promotion and the external transformation of school running organizational form. The transformation and development of Guangdong independent college has strengths and weaknesses, and it is faced with opportunities and threats. According to AHP weight analysis, it is concluded that the first choice of transformation of Guangdong independent college is ST strategy which is to give full play to its strengths and overcome the threat.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125229938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Full Coverage Detection of Immune Detector for Public Data Set 公共数据集免疫检测器的全覆盖检测
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00072
Caiming Liu, Yan Zhang, Qin Li, Luxin Xiao
The immune mechanism plays an unique role in improving the performance of network intrusion detection. However, the traditional immune method fails to give full play to the detection performance of the immune mechanism. In order to solve the above problems, this paper uses KDD CUP'99 as the detection object, and a network anomaly detection method with full coverage of immune detectors is proposed. Based on the immune principle, the intrusion detection process for the data set to be detected is constructed, the expression method of network connection is defined, the immune element data set under the intrusion detection environment are simulated, the classification detection mechanism of memory detector is defined, and the full coverage detection of the detected antigen is realized. A network connection similarity computing method based on the characteristics of the data set to be detected is proposed. The experimental scheme was constructed and the experiment was carried out. The experimental results show that the detection method proposed in this paper can detect all antigens with full coverage and has high performance of intrusion detection.
免疫机制在提高网络入侵检测性能方面发挥着独特的作用。然而,传统的免疫方法未能充分发挥免疫机制的检测性能。为了解决上述问题,本文以KDD CUP’99为检测对象,提出了一种免疫检测器全覆盖的网络异常检测方法。基于免疫原理,构建了待检测数据集的入侵检测流程,定义了网络连接的表达方法,模拟了入侵检测环境下的免疫元素数据集,定义了记忆检测器的分类检测机制,实现了被检测抗原的全覆盖检测。提出了一种基于待检测数据集特征的网络连接相似度计算方法。建立了实验方案,并进行了实验。实验结果表明,本文提出的检测方法能够全覆盖检测出所有抗原,具有较高的入侵检测性能。
{"title":"Full Coverage Detection of Immune Detector for Public Data Set","authors":"Caiming Liu, Yan Zhang, Qin Li, Luxin Xiao","doi":"10.1109/CIS52066.2020.00072","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00072","url":null,"abstract":"The immune mechanism plays an unique role in improving the performance of network intrusion detection. However, the traditional immune method fails to give full play to the detection performance of the immune mechanism. In order to solve the above problems, this paper uses KDD CUP'99 as the detection object, and a network anomaly detection method with full coverage of immune detectors is proposed. Based on the immune principle, the intrusion detection process for the data set to be detected is constructed, the expression method of network connection is defined, the immune element data set under the intrusion detection environment are simulated, the classification detection mechanism of memory detector is defined, and the full coverage detection of the detected antigen is realized. A network connection similarity computing method based on the characteristics of the data set to be detected is proposed. The experimental scheme was constructed and the experiment was carried out. The experimental results show that the detection method proposed in this paper can detect all antigens with full coverage and has high performance of intrusion detection.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127805362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-critic deep deterministic policy gradient UAV path planning 多评判深度确定性策略梯度无人机路径规划
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00010
Runjia Wu, Fangqing Gu, Jie Huang
Deep Deterministic Policy Gradient is a reinforcement learning method, which is widely used in unmanned aerial vehicle (UAV) for path planning. In order to solve the environmental sensitivity in path planning, we present an improved deep deterministic policy gradient for UAV path planning. Simulation results demonstrate that the algorithm improves the convergence speed, convergence effect and stability. The UAV can learn more knowledge from the complex environment.
深度确定性策略梯度是一种强化学习方法,广泛应用于无人机的路径规划。为了解决无人机路径规划中的环境敏感性问题,提出了一种改进的深度确定性策略梯度算法。仿真结果表明,该算法提高了收敛速度、收敛效果和稳定性。无人机可以从复杂的环境中学习到更多的知识。
{"title":"A multi-critic deep deterministic policy gradient UAV path planning","authors":"Runjia Wu, Fangqing Gu, Jie Huang","doi":"10.1109/CIS52066.2020.00010","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00010","url":null,"abstract":"Deep Deterministic Policy Gradient is a reinforcement learning method, which is widely used in unmanned aerial vehicle (UAV) for path planning. In order to solve the environmental sensitivity in path planning, we present an improved deep deterministic policy gradient for UAV path planning. Simulation results demonstrate that the algorithm improves the convergence speed, convergence effect and stability. The UAV can learn more knowledge from the complex environment.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzy C-means clustering algorithm for automatically determining the number of clusters 采用模糊c均值聚类算法自动确定聚类的数量
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00055
Zhihe Wang, Shuyan Wang, Hui Du, Hao Guo
Traditional fuzzy C-means (FCM) clustering algorithm is sensitive to initial clustering center, and the number of clusters need to be set artificially in advance. For these reasons, we propose an improved FCM algorithm (AMMF) that can determine the number of clusters automatically. Firstly, the proposed algorithm uses the affinity propagation clustering algorithm to obtain coarse number of clusters, which are taken as the upper limit of searching the best number of clusters. Secondly, by the improved maximum and minimum distance algorithm obtains some representative sample points as the initial clustering centers of the FCM algorithm. Lastly, we use Silhouette Coefficient to analyze the quality of clustering to determine the optimal number of clusters automatically. Experimental results show that the AMMF algorithm has significantly better clustering performance than other improved FCM based algorithms, and improves the stability of the clustering results.
传统的模糊c均值(FCM)聚类算法对初始聚类中心比较敏感,需要提前人为设置聚类个数。基于这些原因,我们提出了一种改进的FCM算法(AMMF),可以自动确定聚类的数量。该算法首先采用亲和传播聚类算法获得粗聚类数,并以此作为搜索最佳聚类数的上限;其次,通过改进的最大和最小距离算法获得一些具有代表性的样本点作为FCM算法的初始聚类中心;最后利用剪影系数对聚类质量进行分析,自动确定最优聚类数量。实验结果表明,AMMF算法的聚类性能明显优于其他基于改进FCM的算法,提高了聚类结果的稳定性。
{"title":"Fuzzy C-means clustering algorithm for automatically determining the number of clusters","authors":"Zhihe Wang, Shuyan Wang, Hui Du, Hao Guo","doi":"10.1109/CIS52066.2020.00055","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00055","url":null,"abstract":"Traditional fuzzy C-means (FCM) clustering algorithm is sensitive to initial clustering center, and the number of clusters need to be set artificially in advance. For these reasons, we propose an improved FCM algorithm (AMMF) that can determine the number of clusters automatically. Firstly, the proposed algorithm uses the affinity propagation clustering algorithm to obtain coarse number of clusters, which are taken as the upper limit of searching the best number of clusters. Secondly, by the improved maximum and minimum distance algorithm obtains some representative sample points as the initial clustering centers of the FCM algorithm. Lastly, we use Silhouette Coefficient to analyze the quality of clustering to determine the optimal number of clusters automatically. Experimental results show that the AMMF algorithm has significantly better clustering performance than other improved FCM based algorithms, and improves the stability of the clustering results.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123380467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Neural Network-Based Intelligent Decision-Making in the Air-Offensive Campaign with Simulation 基于神经网络的空袭作战智能决策仿真
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00079
G. Hu, Chuhan Zhou, Xiaojie Zhang, Han Zhang, Zhihua Song, Zhongliang Zhou
Combat units in joint operations have huge decision space and many uncertain factors. Generally speaking, most of the traditional decision-making methods are based on rules, and it is impossible to establish a reliable mapping relationship between decision space and combat results. To promote the research of intelligent decision making in joint operations, the Equipment Development Department of the Central Military Commission held a challenge called ‘strategic plans on the computer, joint intelligent win’. In this challenge, the forces and the performance equipment are fixed at both the sides of the attack and defense. This setup helps the intelligent deci-sion-making agents to identify the scenarios which score high and have good learning scope in decision making. In the study, we propose an air offensive operations decision-making agent based on a neural network. To perform testing and analysis, we have used the neural network dataset available at a decision space. The decision space comprises of different decision-making rules and rando disturbances. The proposed model shows better results as compared to traditional rule-based operations and military expert decision-based operations in the test set.
联合作战中的作战单位决策空间大,不确定因素多。一般来说,传统的决策方法大多基于规则,无法在决策空间和作战结果之间建立可靠的映射关系。为推进联合作战智能决策研究,中央军委装备发展部举办了“计算机上的战略规划,联合智能制胜”挑战赛。在这个挑战中,部队和表演设备固定在攻防两侧。这种设置有助于智能决策代理识别决策中得分高且具有良好学习范围的场景。在研究中,我们提出了一种基于神经网络的空中进攻作战决策代理。为了进行测试和分析,我们使用了决策空间中可用的神经网络数据集。决策空间由不同的决策规则和随机干扰组成。在测试集中,与传统的基于规则的作战和基于军事专家决策的作战相比,该模型取得了更好的效果。
{"title":"A Neural Network-Based Intelligent Decision-Making in the Air-Offensive Campaign with Simulation","authors":"G. Hu, Chuhan Zhou, Xiaojie Zhang, Han Zhang, Zhihua Song, Zhongliang Zhou","doi":"10.1109/CIS52066.2020.00079","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00079","url":null,"abstract":"Combat units in joint operations have huge decision space and many uncertain factors. Generally speaking, most of the traditional decision-making methods are based on rules, and it is impossible to establish a reliable mapping relationship between decision space and combat results. To promote the research of intelligent decision making in joint operations, the Equipment Development Department of the Central Military Commission held a challenge called ‘strategic plans on the computer, joint intelligent win’. In this challenge, the forces and the performance equipment are fixed at both the sides of the attack and defense. This setup helps the intelligent deci-sion-making agents to identify the scenarios which score high and have good learning scope in decision making. In the study, we propose an air offensive operations decision-making agent based on a neural network. To perform testing and analysis, we have used the neural network dataset available at a decision space. The decision space comprises of different decision-making rules and rando disturbances. The proposed model shows better results as compared to traditional rule-based operations and military expert decision-based operations in the test set.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Hashing Using N-pair Loss for Image Retrieval 基于n对损失的深度哈希图像检索
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00013
Liefa Liao, Zhiming Li
Deep hashing algorithm is one of the most effective techniques for the approximate nearest neighbor search for large-scale image retrieval. Existing deep hash algorithms are based on paired labels and triple ordering loss, they usually only interact with one negative class, and the convergence speed is too slow. In this paper, we propose a novel deep hashing algorithm called N-pair loss deep hashing (NPLDH), which optimization based on the N-pair loss function can help deep hash models to train more effectively. Experimental results show that our NPLDH algorithm achieves higher performance in image retrieval algorithms on the CIFAR-10 and NUS-WIDE datasets.
深度哈希算法是大规模图像检索中最有效的近似近邻搜索技术之一。现有的深度哈希算法基于成对标签和三次排序损失,通常只与一个负类交互,收敛速度太慢。在本文中,我们提出了一种新的深度哈希算法,称为n对损失深度哈希(NPLDH),该算法基于n对损失函数的优化可以帮助深度哈希模型更有效地训练。实验结果表明,我们的NPLDH算法在CIFAR-10和NUS-WIDE数据集上的图像检索算法中取得了更高的性能。
{"title":"Deep Hashing Using N-pair Loss for Image Retrieval","authors":"Liefa Liao, Zhiming Li","doi":"10.1109/CIS52066.2020.00013","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00013","url":null,"abstract":"Deep hashing algorithm is one of the most effective techniques for the approximate nearest neighbor search for large-scale image retrieval. Existing deep hash algorithms are based on paired labels and triple ordering loss, they usually only interact with one negative class, and the convergence speed is too slow. In this paper, we propose a novel deep hashing algorithm called N-pair loss deep hashing (NPLDH), which optimization based on the N-pair loss function can help deep hash models to train more effectively. Experimental results show that our NPLDH algorithm achieves higher performance in image retrieval algorithms on the CIFAR-10 and NUS-WIDE datasets.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125865978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 16th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1