首页 > 最新文献

Journal of Quantum Computing最新文献

英文 中文
IOTA-Based Data Encryption Storage and Retrieval Method 基于iota的数据加密存储与检索方法
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.016775
Hongmeng Ma, Yi Man, Xiao Xing, Zihan Zhuo, Mo Chen
{"title":"IOTA-Based Data Encryption Storage and Retrieval Method","authors":"Hongmeng Ma, Yi Man, Xiao Xing, Zihan Zhuo, Mo Chen","doi":"10.32604/jqc.2021.016775","DOIUrl":"https://doi.org/10.32604/jqc.2021.016775","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Quantum Private Comparison Using Hyperentangled GHZ State 基于超纠缠GHZ态的新型量子私有比较
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.019675
Jerrel Gianni, Zhiguo Qu
In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier. The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks. In addition, the new QPC protocol also can compare secret inputs securely and efficiently.
本文提出了一种新的量子私有比较(QPC)协议。该协议利用超纠缠作为量子资源,并引入半诚实第三方(TP)来实现目标。该协议的量子载体是2自由度(DOF)的超纠缠三光子GHZ状态,可以有64种组合。TP可以根据量子密钥分发(QKD)协议提供的共享密钥信息来决定使用哪种组合。这样可以进一步提高协议的安全性。诱饵光子技术也被用作另一种安全手段,在发送量子载波之前检查量子信道中的传输是否安全。实验证明,所提出的协议能够抵御各种窃听攻击。此外,新的QPC协议还可以安全有效地比较秘密输入。
{"title":"New Quantum Private Comparison Using Hyperentangled GHZ State","authors":"Jerrel Gianni, Zhiguo Qu","doi":"10.32604/jqc.2021.019675","DOIUrl":"https://doi.org/10.32604/jqc.2021.019675","url":null,"abstract":"In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier. The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks. In addition, the new QPC protocol also can compare secret inputs securely and efficiently.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a Novel Signed Binary Subtractor Using Quantum Gates 基于量子门的新型符号二进制减法器设计
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2022.034059
Arindam Banerjee, Aniruddha Ghosh, M. Das
{"title":"Design of a Novel Signed Binary Subtractor Using Quantum Gates","authors":"Arindam Banerjee, Aniruddha Ghosh, M. Das","doi":"10.32604/jqc.2022.034059","DOIUrl":"https://doi.org/10.32604/jqc.2022.034059","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Rainfall Estimation Based on Improved Kalman Filter Algorithm 基于改进卡尔曼滤波算法的降雨估计研究
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2022.026975
Wen Zhang, Wei Fang, Xu Jia, Victor S. Sheng
{"title":"Research on Rainfall Estimation Based on Improved Kalman Filter Algorithm","authors":"Wen Zhang, Wei Fang, Xu Jia, Victor S. Sheng","doi":"10.32604/jqc.2022.026975","DOIUrl":"https://doi.org/10.32604/jqc.2022.026975","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117146130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Cryptography–A Theoretical Overview 量子密码学——理论综述
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.019864
Pratik Roy, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu
Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography.
量子密钥分发似乎非常有前途,因为它提供了无条件的安全性,这就是为什么它正在被网络行业和政府的科技巨头实施。以量子现象为骨干,QKD协议变得难以破译。在这里,我们重点讨论了量子密钥分发的复杂性以及该技术如何为安全密钥通信做出贡献。本文给出了该技术的最新概述,可以作为熟悉量子密码学当前趋势的指南。
{"title":"Quantum Cryptography–A Theoretical Overview","authors":"Pratik Roy, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu","doi":"10.32604/jqc.2021.019864","DOIUrl":"https://doi.org/10.32604/jqc.2021.019864","url":null,"abstract":"Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incomplete Image Completion through GAN 通过GAN完成不完全图像补全
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.017250
Biying Deng, Desheng Zheng, Zhifeng Liu, Yanling Lai, Zhihong Zhang
There are two difficult in the existing image restoration methods. One is that the method is difficult to repair the image with a large damaged, the other is the result of image completion is not good and the speed is slow. With the development and application of deep learning, the image repair algorithm based on generative adversarial networks can repair images by simulating the distribution of data. In the process of image completion, the first step is trained the generator to simulate data distribution and generate samples. Then a large number of falsified images are quickly generated using the generative adversarial network and search for the code of the closest damaged image. Finally, the generator generates missing content by using this code. On this basis, this paper combines the semantic loss function and the perceptual loss function. Experimental result show that the method successfully predicts the information of large areas missing in the image, and realizes the photorealism, producing clearer and more consistent results than previous methods.
在现有的图像恢复方法中存在两个难点。一是该方法难以修复损坏较大的图像,二是图像补全效果不好,速度慢。随着深度学习的发展和应用,基于生成式对抗网络的图像修复算法可以通过模拟数据的分布来修复图像。在图像补全过程中,首先训练生成器模拟数据分布并生成样本。然后使用生成式对抗网络快速生成大量伪造图像,并搜索最接近的损坏图像的代码。最后,生成器使用这段代码生成缺失的内容。在此基础上,本文将语义损失函数与感知损失函数相结合。实验结果表明,该方法成功地预测了图像中大面积缺失的信息,实现了图像的真实感,结果比以往的方法更清晰、更一致。
{"title":"Incomplete Image Completion through GAN","authors":"Biying Deng, Desheng Zheng, Zhifeng Liu, Yanling Lai, Zhihong Zhang","doi":"10.32604/jqc.2021.017250","DOIUrl":"https://doi.org/10.32604/jqc.2021.017250","url":null,"abstract":"There are two difficult in the existing image restoration methods. One is that the method is difficult to repair the image with a large damaged, the other is the result of image completion is not good and the speed is slow. With the development and application of deep learning, the image repair algorithm based on generative adversarial networks can repair images by simulating the distribution of data. In the process of image completion, the first step is trained the generator to simulate data distribution and generate samples. Then a large number of falsified images are quickly generated using the generative adversarial network and search for the code of the closest damaged image. Finally, the generator generates missing content by using this code. On this basis, this paper combines the semantic loss function and the perceptual loss function. Experimental result show that the method successfully predicts the information of large areas missing in the image, and realizes the photorealism, producing clearer and more consistent results than previous methods.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120949121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm 基于传递函数和OS-ELM算法的复合材料冲击损伤识别
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2019.05788
Yajie Sun, Yanqing Yuan, Qi Wang, S. Ji, Lihua Wang, Shaoen Wu, Jie Chen, Qin Zhang
{"title":"Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm","authors":"Yajie Sun, Yanqing Yuan, Qi Wang, S. Ji, Lihua Wang, Shaoen Wu, Jie Chen, Qin Zhang","doi":"10.32604/jqc.2019.05788","DOIUrl":"https://doi.org/10.32604/jqc.2019.05788","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124393009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection 基于多GBDT特征降维和分层流量检测的物联网入侵检测方法
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.025373
Taifeng Pan
The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models to filter the features of multiple sub data sets, and comprehensively evaluates the filtered features to find out the best alternative features. Then, two neural networks are trained with the two data sets after dimensionality reduction, and the traffic will be detected with the trained neural network. In order to improve the efficiency of traffic detection, this paper proposes a hierarchical traffic detection model, which can reduce the computational cost and time cost of detection process. Experiments show that the multi GBDT dimensionality reduction method can obtain better features than the traditional PCA dimensionality reduction method. Besides, the use of dual data sets improves the comprehensiveness of the IoT intrusion detection system, which can detect more types of attacks, and the hierarchical traffic model improves the detection efficiency of the system.
物联网(IoT)技术的飞速发展给人们的生活带来了极大的便利。但物联网的安全防护能力较弱,易受攻击。因此,需要对物联网的安全做更多的保护。提出了一种基于多GBDT特征约简和分层流量检测模型的物联网入侵检测方法。首先,利用GBDT对IoT流量数据集BoT-IoT和UNSW-NB15进行特征滤波,降低流量特征维数;同时,为了提高特征过滤的可靠性,本文构建了多个GBDT模型对多个子数据集的特征进行过滤,并对过滤后的特征进行综合评价,找出最佳的备选特征。然后,用降维后的两个数据集训练两个神经网络,用训练好的神经网络进行流量检测。为了提高流量检测的效率,本文提出了一种分层流量检测模型,该模型可以降低检测过程的计算成本和时间成本。实验表明,与传统的PCA降维方法相比,多重GBDT降维方法可以获得更好的特征。此外,双数据集的使用提高了物联网入侵检测系统的全面性,可以检测到更多类型的攻击,分层流量模型提高了系统的检测效率。
{"title":"Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection","authors":"Taifeng Pan","doi":"10.32604/jqc.2021.025373","DOIUrl":"https://doi.org/10.32604/jqc.2021.025373","url":null,"abstract":"The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models to filter the features of multiple sub data sets, and comprehensively evaluates the filtered features to find out the best alternative features. Then, two neural networks are trained with the two data sets after dimensionality reduction, and the traffic will be detected with the trained neural network. In order to improve the efficiency of traffic detection, this paper proposes a hierarchical traffic detection model, which can reduce the computational cost and time cost of detection process. Experiments show that the multi GBDT dimensionality reduction method can obtain better features than the traditional PCA dimensionality reduction method. Besides, the use of dual data sets improves the comprehensiveness of the IoT intrusion detection system, which can detect more types of attacks, and the hierarchical traffic model improves the detection efficiency of the system.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Service Function Chain Orchestrating Algorithm Based on SDN and NFV 基于SDN和NFV的业务功能链编排算法研究
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2022.027560
Yuning Jia, Yu Gong, Yifei Wei
{"title":"Research on Service Function Chain Orchestrating Algorithm Based on SDN and NFV","authors":"Yuning Jia, Yu Gong, Yifei Wei","doi":"10.32604/jqc.2022.027560","DOIUrl":"https://doi.org/10.32604/jqc.2022.027560","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Police Equipment Knowledge Query System 警用装备知识查询系统的设计与实现
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2022.027715
Chenxi Yu, Xin Li
{"title":"Design and Implementation of Police Equipment Knowledge Query System","authors":"Chenxi Yu, Xin Li","doi":"10.32604/jqc.2022.027715","DOIUrl":"https://doi.org/10.32604/jqc.2022.027715","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133891701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Quantum Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1