首页 > 最新文献

ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY最新文献

英文 中文
Leaf Diseases Detection System Using Machine Learning 基于机器学习的叶片病害检测系统
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.002
Swati Tiwari, Pranjal Patle, Pranshu Patle, Kuldeep Sonkusare, Pranali Mungate
—Our country's main business is agriculture. The majority of people reside in rural regions and rely solely on agricultural products for their livelihood. The quality and yield of agricultural goods will decline in any plant that has the disease. Research and illness detection are therefore crucial. For disease to be successfully controlled and inhibited for practical cultivation and food preservation, genuine crop disease exposure and identification are essential. For farmers to succeed, early illness detection and diagnosis are essential.
我们国家的主要产业是农业。大多数人居住在农村地区,完全依靠农产品为生。任何患病植物的农产品质量和产量都会下降。因此,研究和疾病检测至关重要。为了在实际种植和食品保存中成功地控制和抑制病害,真正的作物病害暴露和鉴定是必不可少的。农民要想取得成功,早期疾病检测和诊断至关重要。
{"title":"Leaf Diseases Detection System Using Machine Learning","authors":"Swati Tiwari, Pranjal Patle, Pranshu Patle, Kuldeep Sonkusare, Pranali Mungate","doi":"10.33130/ajct.2023v09i01.002","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.002","url":null,"abstract":"—Our country's main business is agriculture. The majority of people reside in rural regions and rely solely on agricultural products for their livelihood. The quality and yield of agricultural goods will decline in any plant that has the disease. Research and illness detection are therefore crucial. For disease to be successfully controlled and inhibited for practical cultivation and food preservation, genuine crop disease exposure and identification are essential. For farmers to succeed, early illness detection and diagnosis are essential.","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135667926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an IOT Based Industrial Fault Detection and Diagnosis System 基于物联网的工业故障检测与诊断系统的开发
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.005
Md. Nazrul Islam, Mohamad Saiful Haffiz Rahman, Kazi Muhammad Asif Ashrafi, Toufiq Ahmed
{"title":"Development of an IOT Based Industrial Fault Detection and Diagnosis System","authors":"Md. Nazrul Islam, Mohamad Saiful Haffiz Rahman, Kazi Muhammad Asif Ashrafi, Toufiq Ahmed","doi":"10.33130/ajct.2023v09i01.005","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.005","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Diagnosis of a Transformer using Fuzzy Model and Unsupervised Learning 基于模糊模型和无监督学习的变压器故障诊断
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.011
Akshita Dhiman, Rajesh Kumar
{"title":"Fault Diagnosis of a Transformer using Fuzzy Model and Unsupervised Learning","authors":"Akshita Dhiman, Rajesh Kumar","doi":"10.33130/ajct.2023v09i01.011","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.011","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FE Analysis of Cornering Fatigue Test for Wheel Rim of Light Commercial Vehicle 轻型商用车轮辋转弯疲劳试验的有限元分析
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.013
Chaudhari Dhananjay D, Bhagwat Randhavan
{"title":"FE Analysis of Cornering Fatigue Test for Wheel Rim of Light Commercial Vehicle","authors":"Chaudhari Dhananjay D, Bhagwat Randhavan","doi":"10.33130/ajct.2023v09i01.013","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.013","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influencing users for paper recycling using an E-commerce website 利用电子商务网站影响用户回收纸张
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.004
Abhinav Kaushal, Harshit Rawat, Rohit Joshi, Jyotsna Seth
{"title":"Influencing users for paper recycling using an E-commerce website","authors":"Abhinav Kaushal, Harshit Rawat, Rohit Joshi, Jyotsna Seth","doi":"10.33130/ajct.2023v09i01.004","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.004","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Machine Learning Applications for Speech Impaired People 使用机器学习应用程序的语言障碍人士
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.012
Rajeshri Pravin Shinkar
{"title":"Use of Machine Learning Applications for Speech Impaired People","authors":"Rajeshri Pravin Shinkar","doi":"10.33130/ajct.2023v09i01.012","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.012","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Network Layer Attacks in Wireless Sensor Network 无线传感器网络中的网络层攻击检测
Pub Date : 2023-04-30 DOI: 10.33130/ajct.2023v09i01.009
V.Gowtami Annapurna, K. Anusha, Chhamunya Varsha, M. Deepthi, G. Keerthi
— The Wireless Sensor Network (WSN) technology is being used in a huge number of monitoring applications. It consists of a large number of sensor nodes with limited battery life. These sensor devices are deployed randomly in a sensor zone to collect the data. But these are threatened and attacked by several malicious behaviors caused by some nodes, which result in security attacks. Several security attacks occur in different layers of the wireless sensor network. Due to these attacks, confidential information can be stolen by attackers or unauthorized users, which can cause several problems for authorized users. Cyber-attacks by sending large data packets that deplete computer network service resources by using multiple computers when attacking are called wormhole and Sybil attacks. It is important to identify these attacks to prevent further damage. To overcome these problems, we use a prediction module that consists of various machine learning algorithms to find the best-performing algorithm. we use XGBoost, Adaboost, Random Forest, and KNN algorithms. To train these algorithms, we have used the WHASA dataset which contains 10 different attacks of the VANET environment and benign (normal) class. By using these algorithms classification of attacks can be done which occur on the computer network service that is " normal " access or access under " attack " by Wormhole and Sybil attack as an output.
-无线传感器网络(WSN)技术正在大量的监控应用中得到应用。它由大量的传感器节点和有限的电池寿命组成。这些传感器设备随机部署在传感器区域以收集数据。但是,这些节点受到某些节点引起的几种恶意行为的威胁和攻击,从而导致安全攻击。多种安全攻击发生在无线传感器网络的不同层。由于这些攻击,机密信息可能被攻击者或未经授权的用户窃取,这可能会给授权用户带来一些问题。网络攻击是指利用多台计算机进行攻击时,发送大量数据包,耗尽计算机网络服务资源的网络攻击,称为虫洞攻击和Sybil攻击。识别这些攻击以防止进一步损害是很重要的。为了克服这些问题,我们使用了一个由各种机器学习算法组成的预测模块来找到性能最好的算法。我们使用XGBoost、Adaboost、Random Forest和KNN算法。为了训练这些算法,我们使用了WHASA数据集,其中包含10种不同的VANET环境和良性(正常)类攻击。通过使用这些算法,可以对发生在计算机网络服务上的攻击进行分类,这些攻击是“正常”访问或访问受到虫洞和Sybil攻击作为输出的“攻击”。
{"title":"Detection of Network Layer Attacks in Wireless Sensor Network","authors":"V.Gowtami Annapurna, K. Anusha, Chhamunya Varsha, M. Deepthi, G. Keerthi","doi":"10.33130/ajct.2023v09i01.009","DOIUrl":"https://doi.org/10.33130/ajct.2023v09i01.009","url":null,"abstract":"— The Wireless Sensor Network (WSN) technology is being used in a huge number of monitoring applications. It consists of a large number of sensor nodes with limited battery life. These sensor devices are deployed randomly in a sensor zone to collect the data. But these are threatened and attacked by several malicious behaviors caused by some nodes, which result in security attacks. Several security attacks occur in different layers of the wireless sensor network. Due to these attacks, confidential information can be stolen by attackers or unauthorized users, which can cause several problems for authorized users. Cyber-attacks by sending large data packets that deplete computer network service resources by using multiple computers when attacking are called wormhole and Sybil attacks. It is important to identify these attacks to prevent further damage. To overcome these problems, we use a prediction module that consists of various machine learning algorithms to find the best-performing algorithm. we use XGBoost, Adaboost, Random Forest, and KNN algorithms. To train these algorithms, we have used the WHASA dataset which contains 10 different attacks of the VANET environment and benign (normal) class. By using these algorithms classification of attacks can be done which occur on the computer network service that is \" normal \" access or access under \" attack \" by Wormhole and Sybil attack as an output.","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121098996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing the Internet of Things, Monitoring and Protecting System for Automated Teller Machines 利用物联网的自动柜员机监控与保护系统
Pub Date : 2022-12-31 DOI: 10.33130/ajct.2022v08i03.004
Mohammad Naveed Hossain, Md. Shaba Sayeed, Sheikh Fahim Uz Zaman
—For the vast majority of people in modern society, ATMs are the preferred method of cash withdrawal. ATM robberies have happened even in locations where CCTV cameras are installed at the ATM facility. The security mechanism will need to be tweaked. To combat these types of robberies, we developed a theft protection system for ATMs that makes use of cutting-edge technology. This system also looks at various physical assaults using ATMs. The device we propose to utilize to take an image of the individual entering the system is a Face Recognizing Camera. Anomaly behavior at an ATM can be detected using sensors that measure tilt and vibration. Any strange conduct will be detected by the LED light and buzzer, which will alert security personnel, the ATM machine will act like money withdrawing. Our system’s main goal is to send out a warning via email or other social media. IoT and GSM networks are used by both Facebook and Instagram. An alert will sent to the security force and a fake transaction process will be set to confuse the suspect. To avoid the unwanted incident after a certain time some anesthetic gas will be released, to make the suspect unconscious. Monitoring and control are now become easier because to this technology.
对现代社会的绝大多数人来说,自动取款机是提取现金的首选方式。甚至在自动取款机设备上安装了闭路电视的地方,也发生过自动取款机抢劫事件。安全机制需要调整。为了打击这类抢劫,我们为自动取款机开发了一种利用尖端技术的防盗系统。这个系统也会检查各种使用自动取款机的人身攻击。我们建议用来拍摄进入系统的个人图像的设备是人脸识别相机。ATM机的异常行为可以通过测量倾斜和振动的传感器来检测。任何奇怪的行为都会被LED灯和蜂鸣器检测到,它们会提醒安全人员,自动取款机就会像取款一样运作。我们系统的主要目标是通过电子邮件或其他社交媒体发出警告。Facebook和Instagram都使用物联网和GSM网络。警报将发送给安全部队,并设置一个虚假的交易流程来迷惑嫌疑人。为了避免意外发生,一定时间后会释放一些麻醉气体,使嫌疑人失去知觉。由于这项技术,监测和控制现在变得更加容易。
{"title":"Utilizing the Internet of Things, Monitoring and Protecting System for Automated Teller Machines","authors":"Mohammad Naveed Hossain, Md. Shaba Sayeed, Sheikh Fahim Uz Zaman","doi":"10.33130/ajct.2022v08i03.004","DOIUrl":"https://doi.org/10.33130/ajct.2022v08i03.004","url":null,"abstract":"—For the vast majority of people in modern society, ATMs are the preferred method of cash withdrawal. ATM robberies have happened even in locations where CCTV cameras are installed at the ATM facility. The security mechanism will need to be tweaked. To combat these types of robberies, we developed a theft protection system for ATMs that makes use of cutting-edge technology. This system also looks at various physical assaults using ATMs. The device we propose to utilize to take an image of the individual entering the system is a Face Recognizing Camera. Anomaly behavior at an ATM can be detected using sensors that measure tilt and vibration. Any strange conduct will be detected by the LED light and buzzer, which will alert security personnel, the ATM machine will act like money withdrawing. Our system’s main goal is to send out a warning via email or other social media. IoT and GSM networks are used by both Facebook and Instagram. An alert will sent to the security force and a fake transaction process will be set to confuse the suspect. To avoid the unwanted incident after a certain time some anesthetic gas will be released, to make the suspect unconscious. Monitoring and control are now become easier because to this technology.","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"43 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130641384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Classification Accuracy of Deep Learning and Machine Learning for Credit Card Fraud Detection 深度学习和机器学习在信用卡欺诈检测中的分类准确性分析
Pub Date : 2022-12-31 DOI: 10.33130/ajct.2022v08i03.006
Mohammad Naveed Hossain, M. Hassan, R. Monir
{"title":"Analyzing the Classification Accuracy of Deep Learning and Machine Learning for Credit Card Fraud Detection","authors":"Mohammad Naveed Hossain, M. Hassan, R. Monir","doi":"10.33130/ajct.2022v08i03.006","DOIUrl":"https://doi.org/10.33130/ajct.2022v08i03.006","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of IoT to solve Farming Problems 利用物联网解决农业问题
Pub Date : 2022-12-31 DOI: 10.33130/ajct.2022v08i03.008
Prashobh Karunakaran, S. Karunakaran, M. S. Osman, Sreeja Haridas, Prashanth Karunakaran, Arjun Karunakaran
{"title":"The use of IoT to solve Farming Problems","authors":"Prashobh Karunakaran, S. Karunakaran, M. S. Osman, Sreeja Haridas, Prashanth Karunakaran, Arjun Karunakaran","doi":"10.33130/ajct.2022v08i03.008","DOIUrl":"https://doi.org/10.33130/ajct.2022v08i03.008","url":null,"abstract":"","PeriodicalId":138101,"journal":{"name":"ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1