首页 > 最新文献

2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)最新文献

英文 中文
Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption 硬件实现的一个强伪随机数生成器,用于图像加密
M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa
This paper suggests a high-performance FPGA implementation of a strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing the Lorenz chaotic map is propounded. Then, using the Xilinx System Generator software of Xilinx society an FPGA architecture of the DPRNG is developed. Next, the hardware DPRNG is implemented on an FPGA-Zynq resulting in low resource utilization, a good frequency of 194.714 MHz, and high throughput of 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that the suggested hardware DPRNG allows for generating high-quality random numbers. It provides a strong key with a high space. In addition, an application of the hardware DPRNG for image encryption is presented. The experimental results show better results when compared to other recent works.
本文提出了一种高性能FPGA实现的强伪随机数生成器,主要用于安全领域的几种应用。提出了一种利用洛伦兹混沌映射的改进PRNG算法。然后,利用Xilinx公司的Xilinx System Generator软件开发了DPRNG的FPGA架构。接下来,硬件DPRNG在FPGA-Zynq上实现,导致低资源利用率,194.714 MHz的良好频率和25702 Mbps的高吞吐量。NIST 800-22 SP测试套件结果表明,建议的硬件DPRNG允许生成高质量的随机数。它提供了一个高空间的坚固钥匙。此外,还介绍了硬件DPRNG在图像加密中的应用。实验结果与近年来的研究成果相比较,取得了较好的效果。
{"title":"Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption","authors":"M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa","doi":"10.1109/SETIT54465.2022.9875453","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875453","url":null,"abstract":"This paper suggests a high-performance FPGA implementation of a strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing the Lorenz chaotic map is propounded. Then, using the Xilinx System Generator software of Xilinx society an FPGA architecture of the DPRNG is developed. Next, the hardware DPRNG is implemented on an FPGA-Zynq resulting in low resource utilization, a good frequency of 194.714 MHz, and high throughput of 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that the suggested hardware DPRNG allows for generating high-quality random numbers. It provides a strong key with a high space. In addition, an application of the hardware DPRNG for image encryption is presented. The experimental results show better results when compared to other recent works.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes 分析实现智能警务的信息通信技术举措,以协助非洲执法部门打击网络犯罪
Naftali Nakasole, Mercy Chitauro, Suama Hamunyela
The Information and Communication Technology (ICT) revolution has become a critical component of every law enforcement when combating crimes. With the surge of cybercrimes, it has increasing pressure on law enforcement to guarantee that cybercrimes are successfully combated. To combat cybercrimes, there are initiatives such as Social Media, Open Data, Geographic Information System Crime Mapping, Science of Security (SoS), Electronic Safe for Kid, Cybersecurity Competition, Cybercrime Reporting Portals, and Artificial Intelligence solutions which are vital to law enforcement in deterring more cybercrimes. This study employed a systematic literature review to look at relevant ICT initiative at the disposal to African law enforcement and they can be of assist in combating cybercrimes.
信息和通信技术(ICT)革命已成为打击犯罪的每个执法部门的关键组成部分。随着网络犯罪的激增,确保成功打击网络犯罪的执法压力越来越大。为了打击网络犯罪,我们采取了一系列措施,如社交媒体、开放数据、地理信息系统犯罪地图、安全科学、儿童电子保险箱、网络安全竞赛、网络犯罪举报门户网站和人工智能解决方案,这些措施对执法部门遏制更多的网络犯罪至关重要。本研究采用了系统的文献综述来研究非洲执法部门可以使用的相关信息通信技术倡议,以及它们可以帮助打击网络犯罪。
{"title":"Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes","authors":"Naftali Nakasole, Mercy Chitauro, Suama Hamunyela","doi":"10.1109/SETIT54465.2022.9875510","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875510","url":null,"abstract":"The Information and Communication Technology (ICT) revolution has become a critical component of every law enforcement when combating crimes. With the surge of cybercrimes, it has increasing pressure on law enforcement to guarantee that cybercrimes are successfully combated. To combat cybercrimes, there are initiatives such as Social Media, Open Data, Geographic Information System Crime Mapping, Science of Security (SoS), Electronic Safe for Kid, Cybersecurity Competition, Cybercrime Reporting Portals, and Artificial Intelligence solutions which are vital to law enforcement in deterring more cybercrimes. This study employed a systematic literature review to look at relevant ICT initiative at the disposal to African law enforcement and they can be of assist in combating cybercrimes.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114446281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of a Secure ECC-based RFID Authentication Protocol 采用一种安全的基于ecc的RFID认证协议
Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem
A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.
单射频识别(RFID)是一种远程识别物体或人的技术。它集成了一个读取器,该读取器通过RFID认证协议接收RFID标签中包含的信息。RFID提供了几种安全服务来保护标签和阅读器之间传输的数据。然而,这些优点并不能阻止攻击者访问这些通信,并且在这些系统中仍然存在各种安全和隐私问题。此外,随着物联网的快速发展,对安全认证和机密数据保护的需求也越来越迫切。基于椭圆曲线加密(ECC)的身份验证协议得到了广泛的研究和实现,以保证RFID系统免受各种攻击。在本文中,我们将重点对已经发布的最有效的基于ecc的RFID认证协议进行比较研究,并研究它们对不同无线攻击的安全性。
{"title":"Adoption of a Secure ECC-based RFID Authentication Protocol","authors":"Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem","doi":"10.1109/SETIT54465.2022.9875855","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875855","url":null,"abstract":"A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of ADAS Fatigue Control System using Pynq z1 and Jetson Xavier NX 基于pynqz1和jetsonxavier NX的ADAS疲劳控制系统设计
Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi
In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate of passenger deaths, injuries and property losses. In this paper, we developed a monitoring system for vehicle drivers that detects and warns of the presence of fatigue and drowsiness through computer vision or machine vision. Our developed system consists of four steps: training of the classifier to perform the detection module, image acquisition and processing, detection and alarm activation. Firstly, training of classifier was performed using Haar technique to locate face features. Secondly, a Jetson Xavier NX or Pynq Z1 development board was used to perform real-time video using a 4K camera, thirdly, we use the training classifier to detect the face image and facial landmark algorithm proposed by Kazemi & Sullivan to detect face features. Finally, our system analyses the state characteristics of the eyes; once the processing is completed, the detection of drowsiness and fatigue is carried out.
近年来,驾驶员疲劳和嗜睡已成为道路交通事故的主要因素,造成乘客伤亡和财产损失的比例很高。在本文中,我们为车辆驾驶员开发了一个监测系统,该系统通过计算机视觉或机器视觉检测并警告疲劳和困倦的存在。我们开发的系统包括四个步骤:训练分类器执行检测模块,图像采集和处理,检测和报警激活。首先,利用Haar技术对分类器进行训练,定位人脸特征;其次,使用Jetson Xavier NX或Pynq Z1开发板使用4K摄像机进行实时视频,第三,使用训练分类器检测人脸图像,使用Kazemi & Sullivan提出的人脸地标算法检测人脸特征。最后,系统分析了人眼的状态特征;一旦处理完成,就进行困倦和疲劳的检测。
{"title":"Design of ADAS Fatigue Control System using Pynq z1 and Jetson Xavier NX","authors":"Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi","doi":"10.1109/SETIT54465.2022.9875823","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875823","url":null,"abstract":"In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate of passenger deaths, injuries and property losses. In this paper, we developed a monitoring system for vehicle drivers that detects and warns of the presence of fatigue and drowsiness through computer vision or machine vision. Our developed system consists of four steps: training of the classifier to perform the detection module, image acquisition and processing, detection and alarm activation. Firstly, training of classifier was performed using Haar technique to locate face features. Secondly, a Jetson Xavier NX or Pynq Z1 development board was used to perform real-time video using a 4K camera, thirdly, we use the training classifier to detect the face image and facial landmark algorithm proposed by Kazemi & Sullivan to detect face features. Finally, our system analyses the state characteristics of the eyes; once the processing is completed, the detection of drowsiness and fatigue is carried out.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Left ventricular assist device: CFD Simulation of Flow HeartWare 左心室辅助装置:Flow HeartWare的CFD模拟
Houneida Sakly, Mourad Said, M. Tagina
The development of further treatment techniques in the prognosis of terminal heart failure has recently been influenced by innovative mechanical circulatory systems in the medical profession. The need for cardiac intervention may be determined by the patient's condition. Implantable left ventricular assist devices may be used to replace it in some circumstances left ventricular assist devices. Mechanical assistance of the failing left ventricle enables optimal hemodynamic stability and recovery of secondary organ failure for patients suffering from heart failure. These devices can help the expert until a suitable cardiac allograft becomes available, but they are also used as a last resort for individuals who are not transplant candidates. Furthermore, left ventricular assist devices implantation, requires a second heart procedure, which comes with its own set of dangers and perioperative difficulties during the waiting period. The surgical problem arises when a left ventricular assist devices is already installed after a heart transplant at home. Implementation of the HeartWare System When compared to pulsatile devices, tracking is thought to be more versatile and long-lasting. Our key contribution in this regard is to use of computational fluid dynamics modules to assess the velocity behavior as well as the flow heart rate while taking into account the physical features of blood flow.
晚期心力衰竭预后的进一步治疗技术的发展最近受到医学专业创新机械循环系统的影响。是否需要心脏介入治疗取决于病人的病情。在某些情况下可采用植入式左心室辅助装置代替它。衰竭左心室的机械辅助使心力衰竭患者获得最佳的血流动力学稳定性和继发性器官衰竭的恢复。这些设备可以帮助专家,直到找到合适的同种异体心脏移植,但它们也被用作不适合移植的个体的最后手段。此外,左心室辅助装置植入需要第二次心脏手术,这在等待期间有其自身的一系列危险和围手术期困难。当心脏移植后在家中已经安装了左心室辅助装置时,手术问题就出现了。与搏动设备相比,跟踪被认为更通用,更持久。我们在这方面的主要贡献是使用计算流体动力学模块来评估速度行为以及血流心率,同时考虑到血流的物理特征。
{"title":"Left ventricular assist device: CFD Simulation of Flow HeartWare","authors":"Houneida Sakly, Mourad Said, M. Tagina","doi":"10.1109/SETIT54465.2022.9875700","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875700","url":null,"abstract":"The development of further treatment techniques in the prognosis of terminal heart failure has recently been influenced by innovative mechanical circulatory systems in the medical profession. The need for cardiac intervention may be determined by the patient's condition. Implantable left ventricular assist devices may be used to replace it in some circumstances left ventricular assist devices. Mechanical assistance of the failing left ventricle enables optimal hemodynamic stability and recovery of secondary organ failure for patients suffering from heart failure. These devices can help the expert until a suitable cardiac allograft becomes available, but they are also used as a last resort for individuals who are not transplant candidates. Furthermore, left ventricular assist devices implantation, requires a second heart procedure, which comes with its own set of dangers and perioperative difficulties during the waiting period. The surgical problem arises when a left ventricular assist devices is already installed after a heart transplant at home. Implementation of the HeartWare System When compared to pulsatile devices, tracking is thought to be more versatile and long-lasting. Our key contribution in this regard is to use of computational fluid dynamics modules to assess the velocity behavior as well as the flow heart rate while taking into account the physical features of blood flow.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning approach for groundwater modeling 地下水建模的机器学习方法
M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni
This paper introduces a novel method and tools for groundwater modeling. The purpose is to perform numerical approximations of a groundwater system, for unlocking and paving water management problems and supporting decision-making processes. In the last decade, Data-driven Models (DdMs) have attracted increasing attention for their efficient development made possible by modern remote and ground sensing and learning technologies. With respect to conventional Process-driven Models (PdMs), based on mathematical modeling of core physical processes into a system of equations, a DdM requires less human effort and process-specific knowledge. The paper covers the design and simulation of a deep learning modeling tool based on Convolutional Neural Networks, integrated with the design and simulation of the workflow based on the Business Process Model and Notation (BPMN). Experimental results clearly show the potential of the novel approach for scientists and policy makers.
本文介绍了一种新的地下水模拟方法和工具。目的是执行地下水系统的数值近似,以解锁和铺设水管理问题和支持决策过程。在过去十年中,数据驱动模型(DdMs)因其在现代遥感和地面传感及学习技术的有效开发而受到越来越多的关注。传统的过程驱动模型(Process-driven Models, pdm)基于将核心物理过程数学建模为方程系统,相对而言,DdM需要较少的人力和特定于过程的知识。本文介绍了一种基于卷积神经网络的深度学习建模工具的设计和仿真,并将其与基于业务流程模型和符号(BPMN)的工作流设计和仿真相结合。实验结果清楚地显示了这种新方法对科学家和决策者的潜力。
{"title":"A machine learning approach for groundwater modeling","authors":"M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni","doi":"10.1109/SETIT54465.2022.9875601","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875601","url":null,"abstract":"This paper introduces a novel method and tools for groundwater modeling. The purpose is to perform numerical approximations of a groundwater system, for unlocking and paving water management problems and supporting decision-making processes. In the last decade, Data-driven Models (DdMs) have attracted increasing attention for their efficient development made possible by modern remote and ground sensing and learning technologies. With respect to conventional Process-driven Models (PdMs), based on mathematical modeling of core physical processes into a system of equations, a DdM requires less human effort and process-specific knowledge. The paper covers the design and simulation of a deep learning modeling tool based on Convolutional Neural Networks, integrated with the design and simulation of the workflow based on the Business Process Model and Notation (BPMN). Experimental results clearly show the potential of the novel approach for scientists and policy makers.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1