首页 > 最新文献

2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)最新文献

英文 中文
Automatic Network Application System Based on Selenium 基于Selenium的自动网络应用系统
Xiangdong You, Yiran Wang
This paper adopts the principle and operation methods of the automated testing tool Selenium and designs a web system which can automatically fill in the application website for studying abroad. This system adopts the B/S structure. When the Excel file which contains the personal information is Uploaded to this system, the back-end will convert the Excel file into JSON format data. Then, uses Selenium to login the university's application website, and uses the positioning methods of the webpage elements provided by Selenium to put the data from JSON into the Corresponding web form, thus automatically completes the application.
本文采用自动化测试工具Selenium的原理和操作方法,设计了一个能够自动填写留学申请网站的web系统。本系统采用B/S结构。当包含个人信息的Excel文件上传至本系统时,后端会将Excel文件转换为JSON格式的数据。然后,使用Selenium登录学校的申请网站,利用Selenium提供的网页元素的定位方法,将JSON中的数据放入相应的web表单中,从而自动完成申请。
{"title":"Automatic Network Application System Based on Selenium","authors":"Xiangdong You, Yiran Wang","doi":"10.1109/CCET48361.2019.8989411","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989411","url":null,"abstract":"This paper adopts the principle and operation methods of the automated testing tool Selenium and designs a web system which can automatically fill in the application website for studying abroad. This system adopts the B/S structure. When the Excel file which contains the personal information is Uploaded to this system, the back-end will convert the Excel file into JSON format data. Then, uses Selenium to login the university's application website, and uses the positioning methods of the webpage elements provided by Selenium to put the data from JSON into the Corresponding web form, thus automatically completes the application.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Method of DDoS Attack Detection for Controller of SDN 一种改进的SDN控制器DDoS攻击检测方法
Wenwen Sun, Yi Li, Shaopeng Guan
For controllers of Software Defined Network (SDN), Distributed Denial of Service (DDoS) attacks are still the simplest and most effective way to attack. Aiming at this problem, a real-time DDoS detection attack method for SDN controller is proposed. The method first uses the entropy to detect whether the flow is abnormal. After the abnormal warning is issued, the flow entry of the OpenFlow switch is obtained, and the DDoS attack feature in the SDN environment is analyzed to extract important features related to the attack. The BiLSTM-RNN neural network algorithm is used to train the data set, and the BiLSTM model is generated to classify the real-time traffic to realize the DDoS attack detection. Experiments show that, compared with other methods, this method can efficiently implement DDoS attack traffic detection and reduce controller overhead in SDN environment.
对于软件定义网络(SDN)的控制器来说,分布式拒绝服务(DDoS)攻击仍然是最简单、最有效的攻击方式。针对这一问题,提出了一种针对SDN控制器的实时DDoS检测攻击方法。该方法首先利用熵来检测流量是否异常。发出异常告警后,获取OpenFlow交换机的流量表项,分析SDN环境下的DDoS攻击特征,提取与攻击相关的重要特征。采用BiLSTM- rnn神经网络算法对数据集进行训练,生成BiLSTM模型对实时流量进行分类,实现DDoS攻击检测。实验表明,与其他方法相比,该方法可以有效地实现SDN环境下的DDoS攻击流量检测,降低了控制器开销。
{"title":"An Improved Method of DDoS Attack Detection for Controller of SDN","authors":"Wenwen Sun, Yi Li, Shaopeng Guan","doi":"10.1109/CCET48361.2019.8989356","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989356","url":null,"abstract":"For controllers of Software Defined Network (SDN), Distributed Denial of Service (DDoS) attacks are still the simplest and most effective way to attack. Aiming at this problem, a real-time DDoS detection attack method for SDN controller is proposed. The method first uses the entropy to detect whether the flow is abnormal. After the abnormal warning is issued, the flow entry of the OpenFlow switch is obtained, and the DDoS attack feature in the SDN environment is analyzed to extract important features related to the attack. The BiLSTM-RNN neural network algorithm is used to train the data set, and the BiLSTM model is generated to classify the real-time traffic to realize the DDoS attack detection. Experiments show that, compared with other methods, this method can efficiently implement DDoS attack traffic detection and reduce controller overhead in SDN environment.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Fixed Power Allocation Algorithm for Uplink Massive MIMO 上行海量MIMO的固定功率分配算法
Honggui Deng, Wenhui Wang, Chen Zhao, Gang Liu, Songshan Ma, Gang Liu
In massive multiple-input multiple-output(MIMO) systems, pilot contamination limits the improvement of system capacity seriously. This problem is usually solved by pilot allocation and precoding in recent years. However, the two methods have higher computational complexity, and they don ’ t consider pilot power allocation. So a fixed power allocation scheme is proposed in this paper, which can relieve pilot contamination of edge terminals effectively with low computational complexity. The process of this scheme was divided into two steps: first, re-deduced the expression of signal-to-interference-to-noise ratio (SINR) of terminals in massive MIMO cells. Second, the power allocation coefficient was calculated by solving the formula of equal-ratio series, and it was used for pilot power allocation. Finally, simulation results show that the proposed algorithm has a good effect on improving system capacity of edge terminals with low computational complexity.
在大规模多输入多输出(MIMO)系统中,导频污染严重限制了系统容量的提高。近年来,通常采用导频分配和预编码的方法来解决这个问题。然而,这两种方法的计算复杂度较高,且不考虑导频功率分配。因此,本文提出了一种固定功率分配方案,该方案可以有效地消除边缘终端的导频污染,且计算复杂度低。该方案分为两个步骤:首先,重新推导了大规模MIMO小区中终端信噪比(SINR)的表达式;其次,通过求解等比级数公式计算功率分配系数,并将其用于导频功率分配;最后,仿真结果表明,该算法对于提高边缘终端的系统容量具有较好的效果,且计算复杂度较低。
{"title":"The Fixed Power Allocation Algorithm for Uplink Massive MIMO","authors":"Honggui Deng, Wenhui Wang, Chen Zhao, Gang Liu, Songshan Ma, Gang Liu","doi":"10.1109/CCET48361.2019.8989206","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989206","url":null,"abstract":"In massive multiple-input multiple-output(MIMO) systems, pilot contamination limits the improvement of system capacity seriously. This problem is usually solved by pilot allocation and precoding in recent years. However, the two methods have higher computational complexity, and they don ’ t consider pilot power allocation. So a fixed power allocation scheme is proposed in this paper, which can relieve pilot contamination of edge terminals effectively with low computational complexity. The process of this scheme was divided into two steps: first, re-deduced the expression of signal-to-interference-to-noise ratio (SINR) of terminals in massive MIMO cells. Second, the power allocation coefficient was calculated by solving the formula of equal-ratio series, and it was used for pilot power allocation. Finally, simulation results show that the proposed algorithm has a good effect on improving system capacity of edge terminals with low computational complexity.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Radar-Embedded Communication Waveform Based on Singular Value Decomposition 一种基于奇异值分解的雷达嵌入式通信波形
Jianqiu Xu, Baoguo Li
As a new competitive technology, radar-embedded communication (REC) can achieve the covert communication while improving the spectrum utilization. The embedded communication waveform has always been the core of REC. Traditional waveform design methods use eigen-decomposition to construct REC waveforms after converting research targets. However, the constructed REC waveforms are not orthogonal, which would reduce the communication reliability. Besides, converting targets would affect the low probability of detection (LPD) performance of REC. To solve these problems, this paper proposes a new waveform design method based on singular value decomposition (SVD). We compare the proposed method with the traditional ones in terms of communication reliability, LPD performance and robustness. Analysis and simulation results show that the SVD waveform generated by the proposed method is better than the traditional REC waveforms. We also provide a method to measure the level of similarity between SVD waveform and radar waveform. Then we can adjust the similarity to control the trade-off between reliability and concealment.
雷达嵌入式通信作为一种新兴的竞争技术,在提高频谱利用率的同时可以实现隐蔽通信。嵌入式通信波形一直是REC的核心,传统的波形设计方法采用特征分解方法对研究对象进行转换后构建REC波形。然而,构建的REC波形不是正交的,这会降低通信的可靠性。针对目标变换会影响REC低概率检测性能的问题,本文提出了一种基于奇异值分解(SVD)的波形设计方法。在通信可靠性、LPD性能和鲁棒性方面与传统方法进行了比较。分析和仿真结果表明,该方法生成的奇异值分解波形优于传统的REC波形。我们还提供了一种测量奇异值分解波形与雷达波形相似程度的方法。然后我们可以调整相似度来控制可靠性和隐蔽性之间的权衡。
{"title":"A New Radar-Embedded Communication Waveform Based on Singular Value Decomposition","authors":"Jianqiu Xu, Baoguo Li","doi":"10.1109/CCET48361.2019.8989321","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989321","url":null,"abstract":"As a new competitive technology, radar-embedded communication (REC) can achieve the covert communication while improving the spectrum utilization. The embedded communication waveform has always been the core of REC. Traditional waveform design methods use eigen-decomposition to construct REC waveforms after converting research targets. However, the constructed REC waveforms are not orthogonal, which would reduce the communication reliability. Besides, converting targets would affect the low probability of detection (LPD) performance of REC. To solve these problems, this paper proposes a new waveform design method based on singular value decomposition (SVD). We compare the proposed method with the traditional ones in terms of communication reliability, LPD performance and robustness. Analysis and simulation results show that the SVD waveform generated by the proposed method is better than the traditional REC waveforms. We also provide a method to measure the level of similarity between SVD waveform and radar waveform. Then we can adjust the similarity to control the trade-off between reliability and concealment.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128678271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Research on the Farmland Soil Environmental Monitoring System Based on Agricultural Network 基于农业网络的农田土壤环境监测系统设计与研究
Xu Shipu, Wang Yunsheng, Liu Yong, Zhao Jingyin, Zhang Chenxi
Agricultural Internet of Things (IoT) is the use of a variety of instruments and sensors to participate in a variety of agricultural automation control of things. The main content is the use of Internet of Things (IOT) related technologies to develop a set of real-time soil environment monitoring system for farmland, including the system's technical route, system design, development and implementation. Through the combination of WSN and 4G network, the automatic acquisition and storage of soil environmental information such as soil temperature and humidity, salinity, pH value and so on were realized in the process of system realization.
农业物联网(IoT)是利用各种仪器和传感器参与各种农业自动化控制的物联网。主要内容是利用物联网(IOT)相关技术开发一套农田土壤环境实时监测系统,包括系统的技术路线、系统设计、开发与实现。通过WSN与4G网络的结合,在系统实现过程中实现了土壤温湿度、盐度、pH值等土壤环境信息的自动采集与存储。
{"title":"Design and Research on the Farmland Soil Environmental Monitoring System Based on Agricultural Network","authors":"Xu Shipu, Wang Yunsheng, Liu Yong, Zhao Jingyin, Zhang Chenxi","doi":"10.1109/CCET48361.2019.8989247","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989247","url":null,"abstract":"Agricultural Internet of Things (IoT) is the use of a variety of instruments and sensors to participate in a variety of agricultural automation control of things. The main content is the use of Internet of Things (IOT) related technologies to develop a set of real-time soil environment monitoring system for farmland, including the system's technical route, system design, development and implementation. Through the combination of WSN and 4G network, the automatic acquisition and storage of soil environmental information such as soil temperature and humidity, salinity, pH value and so on were realized in the process of system realization.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems 模拟防御系统的异构执行者调度算法
Zhao-qi Wu, Jin Wei
A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity and service quality. Combined with the historical information of the arbiter in the mimicry defense system, this paper proposed a random seed scheduling algorithm based on historical confidence for maximum heterogeneity and quality of service. First, the seed performer is randomly selected in the historical confidence executor that satisfies the threshold, and then the scheduling scheme is determined according to the maximum heterogeneity type and the quality of service indicator. The simulation results showed that the scheduling period of the algorithm is lower than the random scheduling algorithm. However, the scheduling effect is higher than the random scheduling algorithm, which achieved a good dynamic balance between dynamics, security, and quality of service.
模拟防御系统的一个关键方面是异构执行的调度,以确保系统是动态的。为了满足异构性和服务质量的要求,现有的调度策略只能进行随机调度。结合模仿防御系统中仲裁机构的历史信息,提出了一种基于历史置信度的随机种子调度算法,以实现异构性和服务质量的最大化。首先在满足阈值的历史置信度执行器中随机选择种子执行者,然后根据最大异构类型和服务质量指标确定调度方案。仿真结果表明,该算法的调度周期小于随机调度算法。但调度效果优于随机调度算法,实现了动态、安全、服务质量的良好动态平衡。
{"title":"Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems","authors":"Zhao-qi Wu, Jin Wei","doi":"10.1109/CCET48361.2019.8989231","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989231","url":null,"abstract":"A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity and service quality. Combined with the historical information of the arbiter in the mimicry defense system, this paper proposed a random seed scheduling algorithm based on historical confidence for maximum heterogeneity and quality of service. First, the seed performer is randomly selected in the historical confidence executor that satisfies the threshold, and then the scheduling scheme is determined according to the maximum heterogeneity type and the quality of service indicator. The simulation results showed that the scheduling period of the algorithm is lower than the random scheduling algorithm. However, the scheduling effect is higher than the random scheduling algorithm, which achieved a good dynamic balance between dynamics, security, and quality of service.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126434475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Digital Copyright Management System Based on Blockchain 基于区块链的数字版权管理系统
Yuanjun Ding, Li Yang, Wen Shi, Xuliang Duan
The rapid development of the Internet provides a shortcut for the dissemination of digital content. A large amount of text, images, audio, and content are digitally placed on the Internet, how to optimize the traditional copyright transaction and rights protection methods to better protect the rights of content creators has become an urgent problem to be studied and solved. Blockchain as an emerging encryption technology in recent years.It has seen a new opportunity for the protection of digital rights. This study combines blockchain technology and digital copyright registration technology to design a complete copyright registration protection application system. Highlights the copyrighted data storage and the security and trustworthiness of blockchain technology. At the software level, the data is absolutely credible and has broad application prospects in the future.
互联网的快速发展为数字内容的传播提供了一条捷径。大量的文字、图像、音频、内容被数字化地放置在互联网上,如何优化传统的版权交易和维权方式,更好地保护内容创作者的权益,成为亟待研究和解决的问题。区块链作为近年来新兴的加密技术。它看到了保护数字权利的新机遇。本研究将区块链技术与数字版权登记技术相结合,设计一个完整的版权登记保护应用系统。突出了有版权的数据存储和区块链技术的安全性和可信度。在软件层面,数据绝对可信,未来具有广阔的应用前景。
{"title":"The Digital Copyright Management System Based on Blockchain","authors":"Yuanjun Ding, Li Yang, Wen Shi, Xuliang Duan","doi":"10.1109/CCET48361.2019.8989370","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989370","url":null,"abstract":"The rapid development of the Internet provides a shortcut for the dissemination of digital content. A large amount of text, images, audio, and content are digitally placed on the Internet, how to optimize the traditional copyright transaction and rights protection methods to better protect the rights of content creators has become an urgent problem to be studied and solved. Blockchain as an emerging encryption technology in recent years.It has seen a new opportunity for the protection of digital rights. This study combines blockchain technology and digital copyright registration technology to design a complete copyright registration protection application system. Highlights the copyrighted data storage and the security and trustworthiness of blockchain technology. At the software level, the data is absolutely credible and has broad application prospects in the future.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1