首页 > 最新文献

2009 International Conference on Information and Communication Technologies最新文献

英文 中文
Networks-on-Chip: Challenges, trends and mechanisms for enhancements 片上网络:增强的挑战、趋势和机制
Pub Date : 2009-09-25 DOI: 10.1109/ICICT.2009.5267214
Omar Tayan
The rate of increase of silicon capacity in Integrated Circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future System-on-Chip (SoC) systems must therefore integrate upto several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.
集成电路(IC)中硅容量的增长速度将在不久的将来使数十亿个晶体管的系统集成驻留在单个芯片上。因此,未来的片上系统(SoC)系统必须在单个芯片内集成多达数百个内核,因此SoC设计将采用片上通信网络(noc)。本文讨论了许多当前SoC系统存在的问题,调查了未来SoC设计面临的挑战和趋势,并提出了一种通过增强内存管理和利用技术来增强未来SoC策略的机制。
{"title":"Networks-on-Chip: Challenges, trends and mechanisms for enhancements","authors":"Omar Tayan","doi":"10.1109/ICICT.2009.5267214","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267214","url":null,"abstract":"The rate of increase of silicon capacity in Integrated Circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future System-on-Chip (SoC) systems must therefore integrate upto several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Robust audio steganography via genetic algorithm 基于遗传算法的稳健音频隐写
Pub Date : 2009-09-25 DOI: 10.1109/ICICT.2009.5267197
M. Zamani, Hamed Taherdoost, A. Manaf, R. Ahmad, A. Zeki
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
隐写术是一种通过以难以察觉的方式修改音频信号来传输隐藏信息的技术。尽管修改后的信号随后受到难以察觉的改变(攻击),但传输必须是可能的。提出了一种新的音频隐写替代技术。使用遗传算法,消息位被嵌入到多个模糊和更高的LSB层中,从而提高了鲁棒性。特别是对于那些试图揭示隐藏信息的故意攻击和一些无意的攻击(如噪声添加),鲁棒性会得到提高。
{"title":"Robust audio steganography via genetic algorithm","authors":"M. Zamani, Hamed Taherdoost, A. Manaf, R. Ahmad, A. Zeki","doi":"10.1109/ICICT.2009.5267197","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267197","url":null,"abstract":"Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A pattern for the effective use of object oriented databases 有效使用面向对象数据库的模式
Pub Date : 2009-09-25 DOI: 10.1109/ICICT.2009.5267187
Muhammad Ubaid, Nauman Atique, Saira Begum
In object oriented scenario, inheritance is a process to make new classes by using classes that have already been defined. Inheritance helps to reuse existing code, by adding together of properties will enhance all new child objects without interfering with their existing ties. In object-oriented programming, an object is instance of class that consists of data and the methods, allows binding for them and operate on that data, stored in the memory of a running application. This paper presents a methodology of class hierarchy with the normalization in object oriented databases. CHNF (Class Hierarchy Normal Form) is good concept for implementing the normalization in class schema. The dilemma is that CHNF has not defined the levels for depth of inheritance; it is possible that CHNF base architecture invalidate the depth of Inheritance and other metrics, which is defined by CK Metrics1. As the database expends, heavy objects become complicated to handle. Although the more deep hierarchy tree implies that we have good reuse of code but it sound awful effects on memory and performance. For avoiding the heavy objects we have discovered a pattern CHNFP (Class Hierarchy Normal Form Pattern). It follows the concept of CHNF as well as it validates the CK Metrics.
在面向对象的场景中,继承是通过使用已经定义的类来生成新类的过程。继承有助于重用现有代码,通过将属性添加在一起将增强所有新的子对象,而不会干扰它们现有的联系。在面向对象编程中,对象是由数据和方法组成的类的实例,允许对这些数据进行绑定并对这些数据进行操作,这些数据存储在运行中的应用程序的内存中。提出了一种面向对象数据库中类层次结构的规范化方法。CHNF (Class Hierarchy Normal Form)是实现类模式规范化的一个很好的概念。困境在于CHNF没有定义继承深度的级别;CHNF基础架构有可能使继承深度和其他指标无效,这些指标是由CK metrics定义的。随着数据库的扩展,沉重的对象变得难以处理。虽然更深层次的树意味着我们可以很好地重用代码,但它对内存和性能的影响听起来很糟糕。为了避免沉重的对象,我们发现了一个模式CHNFP(类层次范式模式)。它遵循CHNF的概念,并验证了CK指标。
{"title":"A pattern for the effective use of object oriented databases","authors":"Muhammad Ubaid, Nauman Atique, Saira Begum","doi":"10.1109/ICICT.2009.5267187","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267187","url":null,"abstract":"In object oriented scenario, inheritance is a process to make new classes by using classes that have already been defined. Inheritance helps to reuse existing code, by adding together of properties will enhance all new child objects without interfering with their existing ties. In object-oriented programming, an object is instance of class that consists of data and the methods, allows binding for them and operate on that data, stored in the memory of a running application. This paper presents a methodology of class hierarchy with the normalization in object oriented databases. CHNF (Class Hierarchy Normal Form) is good concept for implementing the normalization in class schema. The dilemma is that CHNF has not defined the levels for depth of inheritance; it is possible that CHNF base architecture invalidate the depth of Inheritance and other metrics, which is defined by CK Metrics1. As the database expends, heavy objects become complicated to handle. Although the more deep hierarchy tree implies that we have good reuse of code but it sound awful effects on memory and performance. For avoiding the heavy objects we have discovered a pattern CHNFP (Class Hierarchy Normal Form Pattern). It follows the concept of CHNF as well as it validates the CK Metrics.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An instantiation of Way Point Routing for Mobile ad hoc Networks 移动自组织网络的路径点路由实例
Pub Date : 2009-09-25 DOI: 10.1109/ICICT.2009.5267213
Waseem Arain, S. Ghani
Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged to design protocols that can potentially scale to anything from thousand to tens of thousands of nodes and to reduce the route discovery latency. In this paper a different instantiation of Way Point Routing (WPR) model is proposed, where a route is divided into sub-routes to decrease route-latency in frequently occurring subsequent-route-discoveries and to adapt varying topologies in MANET, and future simulations are suggested to evaluate the performance of the proposed routing protocol.
移动自组织网络越来越多地发现它们在市场上的存在,朝着普适计算的新范式前进。然而,该领域仍有许多有待研究的领域。由于节点的移动性导致网络拓扑结构不断变化,传统的路由方法不能应用于MANETS。因此,这是研究的核心领域之一。研究人员面临的挑战是设计可以扩展到数千到数万个节点的协议,并减少路由发现延迟。本文提出了一种不同的路径点路由(WPR)模型实例,其中将路由划分为子路由以减少频繁发生的后续路由发现中的路由延迟,并适应MANET中不同的拓扑结构,并建议未来的仿真来评估所提出的路由协议的性能。
{"title":"An instantiation of Way Point Routing for Mobile ad hoc Networks","authors":"Waseem Arain, S. Ghani","doi":"10.1109/ICICT.2009.5267213","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267213","url":null,"abstract":"Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged to design protocols that can potentially scale to anything from thousand to tens of thousands of nodes and to reduce the route discovery latency. In this paper a different instantiation of Way Point Routing (WPR) model is proposed, where a route is divided into sub-routes to decrease route-latency in frequently occurring subsequent-route-discoveries and to adapt varying topologies in MANET, and future simulations are suggested to evaluate the performance of the proposed routing protocol.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124664494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An experimental investigation of the effect of discrete attributes on the precision of classification methods 离散属性对分类方法精度影响的实验研究
Pub Date : 2009-09-25 DOI: 10.1109/ICICT.2009.5267189
Reza Entezari-Maleki, Seyyed Mehdi Iranmanesh, B. Minaei-Bidgoli
In this paper, the precisions of the logistic regression, Naïve-Bayes and linear data classification methods, with regard to the Area Under Curve (AUC) metric have been compared. The effect of parameters including size of the dataset, kind of the independent attributes, number of the discrete attributes, and their values have been investigated. From the results, it can be concluded that in datasets consisting of both discrete and continuous attributes, the AUC of the three mentioned classifiers is the same. With increasing the number of the discrete attributes, the AUC of the logistic regression is increased and the precision related to this classifier become more than the other two classifiers. Also considering impact of the discrete attributes it can be seen that with increasing the number of values in discrete attributes the AUC related to the logistic regression classifier increases and linear regressions' AUC decreases, but the AUC of the Naïve-Bayes classifier remains constant. The results of this research can help data miners in selecting the more efficient classifiers based on the conditions of feature that exist in their datasets.
本文比较了logistic回归、Naïve-Bayes和线性数据分类方法对曲线下面积(AUC)度量的精度。研究了数据集的大小、独立属性的种类、离散属性的数量及其值等参数的影响。从结果可以看出,在离散属性和连续属性组成的数据集上,上述三种分类器的AUC是相同的。随着离散属性数量的增加,逻辑回归的AUC增加,与该分类器相关的精度也高于其他两种分类器。同时考虑离散属性的影响,可以看出随着离散属性中值的增加,逻辑回归分类器的AUC增加,线性回归的AUC减小,但Naïve-Bayes分类器的AUC保持不变。研究结果可以帮助数据挖掘者根据数据集中存在的特征条件选择更有效的分类器。
{"title":"An experimental investigation of the effect of discrete attributes on the precision of classification methods","authors":"Reza Entezari-Maleki, Seyyed Mehdi Iranmanesh, B. Minaei-Bidgoli","doi":"10.1109/ICICT.2009.5267189","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267189","url":null,"abstract":"In this paper, the precisions of the logistic regression, Naïve-Bayes and linear data classification methods, with regard to the Area Under Curve (AUC) metric have been compared. The effect of parameters including size of the dataset, kind of the independent attributes, number of the discrete attributes, and their values have been investigated. From the results, it can be concluded that in datasets consisting of both discrete and continuous attributes, the AUC of the three mentioned classifiers is the same. With increasing the number of the discrete attributes, the AUC of the logistic regression is increased and the precision related to this classifier become more than the other two classifiers. Also considering impact of the discrete attributes it can be seen that with increasing the number of values in discrete attributes the AUC related to the logistic regression classifier increases and linear regressions' AUC decreases, but the AUC of the Naïve-Bayes classifier remains constant. The results of this research can help data miners in selecting the more efficient classifiers based on the conditions of feature that exist in their datasets.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127895677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Development of symmetric cryptosystem using matrices with less overhead on communication channel 通信信道开销小的矩阵对称密码系统的开发
Pub Date : 2009-08-01 DOI: 10.1109/ICICT.2009.5267208
J. Al-Muhtadi, A. Basit, M. Mahmud
Many systems have been developed by mathematicians using symmetric and Asymmetric Cryptography e.g. Ceaser Cipher, Stream Ciphers, RSA, DES, IDEA, RC-4, ElGamal signatures, LFSR, Ext. Euclidean Algorithm, Lamport Signatures, Merkle Hellman Knapsack. Etc [1]. Some of them are very strong to be broken by cryptanalysts. Some are very easy and even can be broken by the measuring the frequency of alphabets in a specific cipher text. All these system carries some overhead of key with which a plain text is encrypted, for the communication channel. I thought of an idea in which product component which will be 5*1 matrix will be carried on the communication channel rather than 5*5. This 5*5 will be obtained on the receiver side inversing and producting the received matrix with symmetric key which will be known to both sender and receiver. This idea is achieved by peeping into the systems of CDMA (Code Division Multiple Access) [6] in which Walsh tables are minimized by multiplying and less overhead is achieved by communication channel. I am applying that idea in the context of cryptosystems. My Cryptosystem is that much strong enough to be broken by cryptanalyst but fewer loads for communication channel especially for Wireless Networks, Ad-Hoc Networks and Sensor Networks in minimum energy and less memory usage is main goal. The name suggested for this cryptosystem is as BasitMaxCryptoSystem.
数学家使用对称和非对称密码学开发了许多系统,例如:Ceaser密码、流密码、RSA、DES、IDEA、RC-4、ElGamal签名、LFSR、Ext欧几里得算法、Lamport签名、Merkle Hellman背包。等[1]。其中一些密码非常强大,密码分析人员无法破解。有些密码非常简单,甚至可以通过测量特定密文中字母的频率来破解。所有这些系统都携带一些用于加密纯文本的密钥开销,用于通信通道。我想到了一个想法,产品组件将是5*1矩阵,将在通信通道上进行,而不是5*5。这个5*5将在接收端得到,并产生具有对称密钥的接收矩阵,发送方和接收方都知道。这个想法是通过窥视CDMA(码分多址)系统来实现的[6],其中沃尔什表通过乘法最小化,并且通过通信信道实现更少的开销。我把这个想法应用到密码系统中。我的密码系统足够强大,可以被密码分析师破解,但通信通道的负载更少,特别是无线网络,Ad-Hoc网络和传感器网络,以最小的能量和更少的内存使用是主要目标。这个密码系统的建议名称是BasitMaxCryptoSystem。
{"title":"Development of symmetric cryptosystem using matrices with less overhead on communication channel","authors":"J. Al-Muhtadi, A. Basit, M. Mahmud","doi":"10.1109/ICICT.2009.5267208","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267208","url":null,"abstract":"Many systems have been developed by mathematicians using symmetric and Asymmetric Cryptography e.g. Ceaser Cipher, Stream Ciphers, RSA, DES, IDEA, RC-4, ElGamal signatures, LFSR, Ext. Euclidean Algorithm, Lamport Signatures, Merkle Hellman Knapsack. Etc [1]. Some of them are very strong to be broken by cryptanalysts. Some are very easy and even can be broken by the measuring the frequency of alphabets in a specific cipher text. All these system carries some overhead of key with which a plain text is encrypted, for the communication channel. I thought of an idea in which product component which will be 5*1 matrix will be carried on the communication channel rather than 5*5. This 5*5 will be obtained on the receiver side inversing and producting the received matrix with symmetric key which will be known to both sender and receiver. This idea is achieved by peeping into the systems of CDMA (Code Division Multiple Access) [6] in which Walsh tables are minimized by multiplying and less overhead is achieved by communication channel. I am applying that idea in the context of cryptosystems. My Cryptosystem is that much strong enough to be broken by cryptanalyst but fewer loads for communication channel especially for Wireless Networks, Ad-Hoc Networks and Sensor Networks in minimum energy and less memory usage is main goal. The name suggested for this cryptosystem is as BasitMaxCryptoSystem.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 International Conference on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1