首页 > 最新文献

Eurasian Journal of Analytical Chemistry最新文献

英文 中文
Services without Network Traffic 没有网络流量的业务
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018255
K. Sivaraman, G. Kavitha
{"title":"Services without Network Traffic","authors":"K. Sivaraman, G. Kavitha","doi":"10.29333/EJAC/2018255","DOIUrl":"https://doi.org/10.29333/EJAC/2018255","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"86 1","pages":"947-951"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82069633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Secure Campus Network 安全校园网的设计与实现
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018238
Thota Shiva Sai Krishna, N. Priya, C. Dr.Rajabhushanam
: Security has been an essential issue within the style in readying of an enterprise network. A campus network is a very important part of campus life and network security is crucial for a campus network. Secured network protects an establishment from security attacks related to network. A university network includes a range of uses like teaching, learning, research, management, e-library, result publication. Network security can stop the university network from differing kinds of threats and attacks. The theoretical contribution of this study may be a reference model design of the university campus network that may be pre-designed or custom-made to make strong, however versatile network that the successive generation needs.
安全性已经成为企业网络准备中的一个基本问题。校园网是校园生活的重要组成部分,网络安全对校园网至关重要。安全的网络保护企业免受与网络相关的安全攻击。大学网络包括教学、学习、研究、管理、电子图书馆、成果发布等一系列用途。网络安全可以防止高校网络受到各种威胁和攻击。本研究的理论贡献可能是大学校园网的参考模型设计,可以预先设计或定制,以构建下一代需要的强大而多功能的网络。
{"title":"Design and Implementation of a Secure Campus Network","authors":"Thota Shiva Sai Krishna, N. Priya, C. Dr.Rajabhushanam","doi":"10.29333/EJAC/2018238","DOIUrl":"https://doi.org/10.29333/EJAC/2018238","url":null,"abstract":": Security has been an essential issue within the style in readying of an enterprise network. A campus network is a very important part of campus life and network security is crucial for a campus network. Secured network protects an establishment from security attacks related to network. A university network includes a range of uses like teaching, learning, research, management, e-library, result publication. Network security can stop the university network from differing kinds of threats and attacks. The theoretical contribution of this study may be a reference model design of the university campus network that may be pre-designed or custom-made to make strong, however versatile network that the successive generation needs.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"61 1","pages":"845-852"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75024388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Methodology for the Understanding of Semaphores 一种理解信号量的方法
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018235
C. Geetha, S. Amudha
{"title":"A Methodology for the Understanding of Semaphores","authors":"C. Geetha, S. Amudha","doi":"10.29333/EJAC/2018235","DOIUrl":"https://doi.org/10.29333/EJAC/2018235","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"29 1","pages":"822-828"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82290646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hand Loop Enforcement in Security Using Sensor 使用传感器的安全手环执行
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018246
D. Jeyapriya, S. Theivasigamani
Unique—Hadoop is an open Source programming stack for preparing unstructured and semi-organized information over the group of Commodity equipment. It is a dependable, adaptable and minimal effort answer for putting away and preparing immense measures of information in a conveyed frame. It is intended for preparing and taking care of extensive records and faces execution punishment while managing expansive number of little documents.
Unique-Hadoop是一个开源编程堆栈,用于在一组商品设备上准备非结构化和半组织的信息。它是一种可靠的、适应性强的、最小工作量的解决方案,可以在传递的框架中存储和准备大量的信息。它的目的是准备和管理大量的记录,并面临执行惩罚,同时管理大量的小文件。
{"title":"Hand Loop Enforcement in Security Using Sensor","authors":"D. Jeyapriya, S. Theivasigamani","doi":"10.29333/EJAC/2018246","DOIUrl":"https://doi.org/10.29333/EJAC/2018246","url":null,"abstract":"Unique—Hadoop is an open Source programming stack for preparing unstructured and semi-organized information over the group of Commodity equipment. It is a dependable, adaptable and minimal effort answer for putting away and preparing immense measures of information in a conveyed frame. It is intended for preparing and taking care of extensive records and faces execution punishment while managing expansive number of little documents.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"3 1","pages":"903-907"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79141771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of Biometric Recognition Frameworks is Enhanced by Image Quality Assessment 利用图像质量评估提高生物特征识别框架的安全性
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018241
V. Singh, K. Subbulakshmi.
To ensure the actual presence of a real legitimate trait in contrast to a fake selfmanufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding likeness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-ofthe-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
在生物识别认证中,如何确保真实合法特征的存在,而不是伪造的自制合成或重建样本,是一个重要的问题,这需要开发新的有效的保护措施。在本文中,我们提出了一种新的基于软件的虚假检测方法,该方法可用于多个生物识别系统,以检测不同类型的欺诈性访问尝试。该系统的目标是通过使用图像质量评估,以快速、用户友好和非侵入性的方式增加相似性评估,从而提高生物识别框架的安全性。所提出的方法呈现出非常低的复杂性,这使得它适合于实时应用,使用从一张图像中提取的25个一般图像质量特征(即为认证目的而获得的相同特征)来区分合法和冒名顶替的样本。在公开可用的指纹、虹膜和二维人脸数据集上获得的实验结果表明,与其他最先进的方法相比,所提出的方法具有很强的竞争力,并且对真实生物特征样本的一般图像质量的分析揭示了非常有价值的信息,这些信息可以非常有效地用于区分它们与虚假特征。
{"title":"Security of Biometric Recognition Frameworks is Enhanced by Image Quality Assessment","authors":"V. Singh, K. Subbulakshmi.","doi":"10.29333/EJAC/2018241","DOIUrl":"https://doi.org/10.29333/EJAC/2018241","url":null,"abstract":"To ensure the actual presence of a real legitimate trait in contrast to a fake selfmanufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding likeness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-ofthe-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"97 1","pages":"863-870"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76668312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualization in Solaris with Shared Storage for High Availability Solaris中的虚拟化与共享存储,实现高可用性
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018144
Dr.Khanna, R. Dr.Udayakumar
{"title":"Virtualization in Solaris with Shared Storage for High Availability","authors":"Dr.Khanna, R. Dr.Udayakumar","doi":"10.29333/EJAC/2018144","DOIUrl":"https://doi.org/10.29333/EJAC/2018144","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"31 1","pages":"771-778"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73344196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on the Security: Internet of Things 安全分析:物联网
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018154
M. Ramamoorthy, N. Ayyanathan, M. PadmaUsha
IOT (Internet of Things) is the network of physical gadgets, vehicles, buildings and different things implanted with hardware, software, sensors, and system network that empowers these objects to gather and exchange information. The internet of things enables items to be detected and controlled remotely crosswise over existing system framework. As per the Gartner, 260 million objects will be connected by year 2020. Several organizations and governments have attempted to make references with IoT in beginning circumstances, however these days in manufacturing, retail and SOC (Social Overhead Capital) enterprises, fruitful accepted procedures are built recently. In this paper we have discussed the security and privacy concerns of IOT. Security level at different layers of IOT architecture as well as importance of security in IOT is discussed. Challenges in obtaining secure IOT and the solution to them is also discussed.
IOT(物联网)是由物理设备、车辆、建筑物和其他植入硬件、软件、传感器和系统网络的东西组成的网络,使这些物体能够收集和交换信息。物联网使物品能够在现有系统框架上进行远程检测和控制。根据Gartner的数据,到2020年,2.6亿个物体将被连接起来。一些组织和政府已经尝试在最初的情况下参考物联网,但是这些天在制造业,零售业和SOC(社会间接资本)企业中,最近建立了富有成效的公认程序。在本文中,我们讨论了物联网的安全和隐私问题。讨论了物联网架构不同层的安全级别以及物联网安全的重要性。还讨论了获得安全物联网的挑战及其解决方案。
{"title":"Analysis on the Security: Internet of Things","authors":"M. Ramamoorthy, N. Ayyanathan, M. PadmaUsha","doi":"10.29333/EJAC/2018154","DOIUrl":"https://doi.org/10.29333/EJAC/2018154","url":null,"abstract":"IOT (Internet of Things) is the network of physical gadgets, vehicles, buildings and different things implanted with hardware, software, sensors, and system network that empowers these objects to gather and exchange information. The internet of things enables items to be detected and controlled remotely crosswise over existing system framework. As per the Gartner, 260 million objects will be connected by year 2020. Several organizations and governments have attempted to make references with IoT in beginning circumstances, however these days in manufacturing, retail and SOC (Social Overhead Capital) enterprises, fruitful accepted procedures are built recently. In this paper we have discussed the security and privacy concerns of IOT. Security level at different layers of IOT architecture as well as importance of security in IOT is discussed. Challenges in obtaining secure IOT and the solution to them is also discussed.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"14 1","pages":"861-869"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75379759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Localization Method based Search for Wireless Sensor Network 一种新的基于搜索的无线传感器网络定位方法
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018156
R. MuthuVenkataKrishnan, R. Dr.Karthikeyan
{"title":"A Novel Localization Method based Search for Wireless Sensor Network","authors":"R. MuthuVenkataKrishnan, R. Dr.Karthikeyan","doi":"10.29333/EJAC/2018156","DOIUrl":"https://doi.org/10.29333/EJAC/2018156","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"7 1","pages":"884-892"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81930819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Most Prominent Technique for Privacy Preservation in Mining Micro Data (NCCC-13) 微数据挖掘中最突出的隐私保护技术(ncc -13)
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018148
Dr.Khanna, R. Dr.Udayakumar
{"title":"The Most Prominent Technique for Privacy Preservation in Mining Micro Data (NCCC-13)","authors":"Dr.Khanna, R. Dr.Udayakumar","doi":"10.29333/EJAC/2018148","DOIUrl":"https://doi.org/10.29333/EJAC/2018148","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"39 1","pages":"807-815"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78305321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study and Analysis on Sky Yoga and Its Impact on Blood Sugar and Blood Pressure 天空瑜伽及其对血糖和血压影响的研究与分析
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018195
C. Nalini, Kanchana
Yoga is essentially a spiritual discipline based on an extremely subtle science, which focuses on bringing harmony between mind and body. It is an art and science of healthy living. It includes a group of physical, mental and spiritual practices which originated in ancient India. As per Yogic scriptures, the practice of Yoga leads to the union of individual consciousness with that of the Universal Consciousness, indicating a perfect harmony between the mind and body, Man & Nature. In this paper we focused the two disorders in our human body blood pressure and blood sugar are commonly prevalent world over. We studied and analysis of vedathiri maharishi exercises and mediation. And how, the yoga exercises and meditation are reducing the disorders. For that, we are taken 25 persons for experimented with Simplified physical activity, Nadi suddhi pranayama, and full meditation on breathing. It is shown conclusive evidence of improvement in blood pressure and blood sugar conditions.
瑜伽本质上是一门精神学科,它基于一门极其微妙的科学,专注于实现身心和谐。它是一门健康生活的艺术和科学。它包括一组起源于古印度的身体、心理和精神实践。根据瑜伽经典,瑜伽的练习导致个人意识与宇宙意识的结合,表明心灵与身体,人与自然之间的完美和谐。在本文中,我们重点介绍了我们人体的两种疾病,血压和血糖在世界范围内普遍存在。我们研究和分析了吠陀实里maharishi的练习和冥想。以及瑜伽练习和冥想是如何减少疾病的。为此,我们选取了25个人进行简单的身体活动、Nadi suddhi pranayama和呼吸冥想的实验。这是改善血压和血糖状况的确凿证据。
{"title":"A Study and Analysis on Sky Yoga and Its Impact on Blood Sugar and Blood Pressure","authors":"C. Nalini, Kanchana","doi":"10.29333/EJAC/2018195","DOIUrl":"https://doi.org/10.29333/EJAC/2018195","url":null,"abstract":"Yoga is essentially a spiritual discipline based on an extremely subtle science, which focuses on bringing harmony between mind and body. It is an art and science of healthy living. It includes a group of physical, mental and spiritual practices which originated in ancient India. As per Yogic scriptures, the practice of Yoga leads to the union of individual consciousness with that of the Universal Consciousness, indicating a perfect harmony between the mind and body, Man & Nature. In this paper we focused the two disorders in our human body blood pressure and blood sugar are commonly prevalent world over. We studied and analysis of vedathiri maharishi exercises and mediation. And how, the yoga exercises and meditation are reducing the disorders. For that, we are taken 25 persons for experimented with Simplified physical activity, Nadi suddhi pranayama, and full meditation on breathing. It is shown conclusive evidence of improvement in blood pressure and blood sugar conditions.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"152 1","pages":"1178-1188"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86244874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Eurasian Journal of Analytical Chemistry
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1