首页 > 最新文献

Proceedings of the 1st International Conference on Innovation in Computer and Information Science最新文献

英文 中文
Review on the Application of Machine Learning Methods in Landslide Susceptibility Mapping 机器学习方法在滑坡易感性制图中的应用综述
D. S. Mwakapesa, Ye Li, Xiangtai Wang, Binbin Guo, Mao Yimin
: Machine learning is a very important in computer science field which has gained attention in numerous applications. This paper reviewed various machine learning methods including supervised and unsupervised learning and highlighted their applications, advantages and disadvantages in landslide susceptibility mapping. The review has also mentioned the challenges of machine learning algorithms for achieving higher performance accuracy from the supervised and unsupervised learning algorithms during landslide susceptibility. Moreover, highlights on the application of deep learning methods as the current research in landslide susceptibility mapping has also been reported. Finally, this paper argued the necessity of thorough preparation of relevant and enough data being significant important to obtain high performance results from the review methods.
机器学习是计算机科学中一个非常重要的领域,在许多应用中得到了关注。本文综述了各种机器学习方法,包括监督学习和无监督学习,并重点介绍了它们在滑坡易感性制图中的应用和优缺点。该评论还提到了机器学习算法在滑坡易感性期间从监督和无监督学习算法中获得更高性能准确性的挑战。此外,还报道了深度学习方法在滑坡易感性制图中的应用。最后,本文认为充分准备相关和足够的数据对于从综述方法中获得高性能结果非常重要。
{"title":"Review on the Application of Machine Learning Methods in Landslide Susceptibility Mapping","authors":"D. S. Mwakapesa, Ye Li, Xiangtai Wang, Binbin Guo, Mao Yimin","doi":"10.5220/0010790400003167","DOIUrl":"https://doi.org/10.5220/0010790400003167","url":null,"abstract":": Machine learning is a very important in computer science field which has gained attention in numerous applications. This paper reviewed various machine learning methods including supervised and unsupervised learning and highlighted their applications, advantages and disadvantages in landslide susceptibility mapping. The review has also mentioned the challenges of machine learning algorithms for achieving higher performance accuracy from the supervised and unsupervised learning algorithms during landslide susceptibility. Moreover, highlights on the application of deep learning methods as the current research in landslide susceptibility mapping has also been reported. Finally, this paper argued the necessity of thorough preparation of relevant and enough data being significant important to obtain high performance results from the review methods.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114508394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms 机器学习和大数据分析范式在网络安全和云计算平台中的性能
G. Kabanda
The purpose of the research is to evaluate Machine Learning and Big Data Analytics 7 paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, 8 processes and operations that are framed to protect information systems, computers, devices, 9 programs, data and networks from internal or external threats, harm, damage, attacks or 10 unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data 11 analysis of large data sets and production of models for the general relationships found among 12 data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, 13 unsupervised, semi-supervised, and reinforcement learning algorithms. collected of opportunity 30 for cyber crimes and other forms cybersecurity risks, especially among interconnected devices now at household 31 level. 32 The research paper is focused on the Performance of Machine Learning and Big Data Analytics paradigms in 33 Cybersecurity and Cloud Computing platforms. The purpose of the research is to evaluate Machine Learning 34 and Big Data Analytics paradigms for use in Cybersecurity. This is relevant due to the rapid advances in 35 machine learning (ML) and deep learning (DL) as we explore the potency of efficient and cost-effective cloud 36 computing platforms and services. Evaluation of the attacks and defenses using ML and Big Data paradigms 37 is the key subject of this research paper. However, ML and DL techniques are resource intensive and require 38 huge volumes of training data with excellent performance, as is often provided by computational resources such 39 as high-performance graphics processing units (GPUs) and tensor processing units. Security issues related to 40 virtualisation, containerization, network monitoring, data protection and attack detection are interrogated whilst 41 strengthening AI/ML/DL security solutions that involve encryption, access control, firewall, authentication and 42 intrusion detection and prevention systems at the appropriate Fog/Cloud level. 43 Cybersecurity consolidates the confidentiality, integrity, and availability of computing resources, networks, 44 software programs, and data into a coherent collection of policies, technologies, processes, and techniques 45
该研究的目的是评估机器学习和大数据分析7范式在网络安全中的应用。网络安全是指旨在保护信息系统、计算机、设备、程序、数据和网络免受内部或外部威胁、伤害、破坏、攻击或未经授权访问的技术、流程和操作的组合。机器学习(ML)的主要特点是对大型数据集进行自动数据分析,并为12个数据之间的一般关系建立模型。机器学习算法作为人工智能的一部分,可以分为监督学习算法、无监督学习算法、半监督学习算法和强化学习算法。收集了网络犯罪和其他形式的网络安全风险的机会,特别是在家庭级的互联设备中。该研究论文主要关注机器学习和大数据分析范式在33个网络安全和云计算平台中的性能。该研究的目的是评估机器学习和大数据分析范式在网络安全中的应用。这与机器学习(ML)和深度学习(DL)的快速发展有关,因为我们正在探索高效且具有成本效益的云计算平台和服务的潜力。利用机器学习和大数据范式评估攻击和防御是本研究论文的关键主题。然而,ML和DL技术是资源密集型的,需要大量性能优异的训练数据,这通常是由高性能图形处理单元(gpu)和张量处理单元等计算资源提供的。与40个虚拟化、容器化、网络监控、数据保护和攻击检测相关的安全问题被询问,同时41个加强AI/ML/DL安全解决方案涉及加密、访问控制、防火墙、身份验证和42个适当雾/云级别的入侵检测和预防系统。网络安全将计算资源、网络、软件程序和数据的机密性、完整性和可用性整合为一系列连贯的策略、技术、流程和技巧
{"title":"Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms","authors":"G. Kabanda","doi":"10.5220/0010789900003167","DOIUrl":"https://doi.org/10.5220/0010789900003167","url":null,"abstract":"The purpose of the research is to evaluate Machine Learning and Big Data Analytics 7 paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, 8 processes and operations that are framed to protect information systems, computers, devices, 9 programs, data and networks from internal or external threats, harm, damage, attacks or 10 unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data 11 analysis of large data sets and production of models for the general relationships found among 12 data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, 13 unsupervised, semi-supervised, and reinforcement learning algorithms. collected of opportunity 30 for cyber crimes and other forms cybersecurity risks, especially among interconnected devices now at household 31 level. 32 The research paper is focused on the Performance of Machine Learning and Big Data Analytics paradigms in 33 Cybersecurity and Cloud Computing platforms. The purpose of the research is to evaluate Machine Learning 34 and Big Data Analytics paradigms for use in Cybersecurity. This is relevant due to the rapid advances in 35 machine learning (ML) and deep learning (DL) as we explore the potency of efficient and cost-effective cloud 36 computing platforms and services. Evaluation of the attacks and defenses using ML and Big Data paradigms 37 is the key subject of this research paper. However, ML and DL techniques are resource intensive and require 38 huge volumes of training data with excellent performance, as is often provided by computational resources such 39 as high-performance graphics processing units (GPUs) and tensor processing units. Security issues related to 40 virtualisation, containerization, network monitoring, data protection and attack detection are interrogated whilst 41 strengthening AI/ML/DL security solutions that involve encryption, access control, firewall, authentication and 42 intrusion detection and prevention systems at the appropriate Fog/Cloud level. 43 Cybersecurity consolidates the confidentiality, integrity, and availability of computing resources, networks, 44 software programs, and data into a coherent collection of policies, technologies, processes, and techniques 45","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Unmanned Aerial Vehicle Attack Detection using Snort 使用Snort进行无人机攻击检测
Shahzad Mujeeb, S. Chowdhary, Abhishek Srivastava, R. Majumdar, M. Kumar
: In recent times, security issues relating to unmanned aerial vehicles (UAVs) and drones have anticipated a staid attention from research communities in various domains in the form of networking, communication, and civilian as well as in defence zone. It has its widespread functionality in the area of agriculture, commerce, and transportation, the use of unmanned aerial vehicles (UAVs)/ drones, is increasing. The ground control systems (GCS) are used to remotely monitor UAVs over the network. Since UAVs are vulnerable to security risk, they become the targets of various attacks such as GPS spoofing, jamming attack, network attacks and many other forms so to tackle with such issues the prime concern will be to identify these attacks followed by to prevent the UAVs or drones from UAV attacks. On contrary network-controlled UAVs however are equally vulnerable to threats like DOS attacks, GPS spoofing etc. In this work a network surveillance approach is projected for UAV attack detection system by means of Snort. Snort uses a set of guidelines and rules set by the user itself to help in identifying the malicious network behaviour and to locate packets that fit them and create user warnings with those rules. It is an open-source tool that records traffic analysis and packets in real time.
近年来,与无人驾驶飞行器(uav)和无人机相关的安全问题引起了网络、通信、民用和防御区等各个领域研究团体的高度关注。它在农业,商业和运输领域具有广泛的功能,无人驾驶飞行器(uav)/无人机的使用正在增加。地面控制系统(GCS)用于通过网络远程监控无人机。由于无人机易受安全风险的影响,它们成为各种攻击的目标,如GPS欺骗、干扰攻击、网络攻击和许多其他形式的攻击,因此要解决这些问题,首要关注的是识别这些攻击,然后防止无人机或无人机受到无人机攻击。相反,网络控制的无人机同样容易受到DOS攻击、GPS欺骗等威胁。本文提出了一种基于Snort的无人机攻击检测系统的网络监控方法。Snort使用用户自己设置的一组指导方针和规则来帮助识别恶意网络行为,定位符合这些行为的数据包,并使用这些规则创建用户警告。它是一个实时记录流量分析和数据包的开源工具。
{"title":"Unmanned Aerial Vehicle Attack Detection using Snort","authors":"Shahzad Mujeeb, S. Chowdhary, Abhishek Srivastava, R. Majumdar, M. Kumar","doi":"10.5220/0010789700003167","DOIUrl":"https://doi.org/10.5220/0010789700003167","url":null,"abstract":": In recent times, security issues relating to unmanned aerial vehicles (UAVs) and drones have anticipated a staid attention from research communities in various domains in the form of networking, communication, and civilian as well as in defence zone. It has its widespread functionality in the area of agriculture, commerce, and transportation, the use of unmanned aerial vehicles (UAVs)/ drones, is increasing. The ground control systems (GCS) are used to remotely monitor UAVs over the network. Since UAVs are vulnerable to security risk, they become the targets of various attacks such as GPS spoofing, jamming attack, network attacks and many other forms so to tackle with such issues the prime concern will be to identify these attacks followed by to prevent the UAVs or drones from UAV attacks. On contrary network-controlled UAVs however are equally vulnerable to threats like DOS attacks, GPS spoofing etc. In this work a network surveillance approach is projected for UAV attack detection system by means of Snort. Snort uses a set of guidelines and rules set by the user itself to help in identifying the malicious network behaviour and to locate packets that fit them and create user warnings with those rules. It is an open-source tool that records traffic analysis and packets in real time.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient Cool Roof System to Reduce Carbon Footprint 节能冷却屋顶系统,减少碳足迹
Ritik Sharma, Gulzar Miglani, Nitin Sharma, Shivam Pundir, S. Chowdhary, Abhishek Srivastava, M. Kumar
{"title":"Energy Efficient Cool Roof System to Reduce Carbon Footprint","authors":"Ritik Sharma, Gulzar Miglani, Nitin Sharma, Shivam Pundir, S. Chowdhary, Abhishek Srivastava, M. Kumar","doi":"10.5220/0010790100003167","DOIUrl":"https://doi.org/10.5220/0010790100003167","url":null,"abstract":"","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post COVID 19 Pandemic Impacts on Socio-economic Development COVID - 19大流行对社会经济发展的影响
Himani Kohli, Manoj Kumar, Anuj Rani
{"title":"Post COVID 19 Pandemic Impacts on Socio-economic Development","authors":"Himani Kohli, Manoj Kumar, Anuj Rani","doi":"10.5220/0010789500003167","DOIUrl":"https://doi.org/10.5220/0010789500003167","url":null,"abstract":"","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android TV App for Video Conferencing 安卓电视视频会议应用程序
Arvind Garg, Rahul Saini, S. Rawat, S. Chowdhary, M. Kumar
: Abstract: During the coronavirus (COVID-19) pandemic, many people work from home and hold meetings online from the past decade video conferencing become more popular. It is very efficient, distance learning and very effective now a days. We have lots of channels for video conferencing like Zoom, Ms teams, hangouts and Jitsi meet. This can be operated over the mobile phones our personal laptops. But we do not have any application by which we can use the video conferencing over the Android Tv directly. There are many steps by which we can broadcast our mobile or laptop screen over the Android Tv but there is no such application by which we can directly use the application directly on the Android Tv screen. In this Research paper, by using the API integration of the Jitsi meet or connectivity, Android Tv application can be created. From the last year, IT sector becomes more powerful because of the Work from Home Policies due to Pandemic Situation. All the work is going online, which is called distance video conferencing. For the effective learning we need a big screen, which would be very effective for distance learning. With the help of The Android Tv video conferencing application USER can learn the things quickly and without any trouble over the big screen. It will be very helpful for the students at Schools, Universities and for the employees of corporate world.
摘要:在新型冠状病毒(COVID-19)大流行期间,许多人在家办公并在线召开会议,从过去十年开始,视频会议越来越受欢迎。这是非常有效的,远程学习,现在非常有效。我们有很多视频会议频道,比如Zoom、Ms teams、hangouts和Jitsi meet。这可以通过手机或个人笔记本电脑操作。但是我们没有任何应用程序可以通过Android Tv直接使用视频会议。有很多步骤,我们可以广播我们的手机或笔记本电脑屏幕上的Android电视,但没有这样的应用程序,我们可以直接使用应用程序直接在Android电视屏幕上。在本研究中,通过使用Jitsi接口的API集成或连接,可以创建Android Tv应用程序。从去年开始,信息技术(IT)行业因疫情出台在家办公政策而变得更加强大。所有的工作都在网上进行,这被称为远程视频会议。为了有效的学习,我们需要一个大屏幕,这将是非常有效的远程学习。在Android Tv视频会议应用程序的帮助下,用户可以在大屏幕上快速学习,没有任何麻烦。这将是非常有帮助的学生在学校,大学和企业界的员工。
{"title":"Android TV App for Video Conferencing","authors":"Arvind Garg, Rahul Saini, S. Rawat, S. Chowdhary, M. Kumar","doi":"10.5220/0010789800003167","DOIUrl":"https://doi.org/10.5220/0010789800003167","url":null,"abstract":": Abstract: During the coronavirus (COVID-19) pandemic, many people work from home and hold meetings online from the past decade video conferencing become more popular. It is very efficient, distance learning and very effective now a days. We have lots of channels for video conferencing like Zoom, Ms teams, hangouts and Jitsi meet. This can be operated over the mobile phones our personal laptops. But we do not have any application by which we can use the video conferencing over the Android Tv directly. There are many steps by which we can broadcast our mobile or laptop screen over the Android Tv but there is no such application by which we can directly use the application directly on the Android Tv screen. In this Research paper, by using the API integration of the Jitsi meet or connectivity, Android Tv application can be created. From the last year, IT sector becomes more powerful because of the Work from Home Policies due to Pandemic Situation. All the work is going online, which is called distance video conferencing. For the effective learning we need a big screen, which would be very effective for distance learning. With the help of The Android Tv video conferencing application USER can learn the things quickly and without any trouble over the big screen. It will be very helpful for the students at Schools, Universities and for the employees of corporate world.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125780329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Mobile Banking and e-Wallet Usage and its Security Concerns 流动银行及电子钱包的使用情况及其保安问题调查
Anubhav Bose, Chetna Choudhary, S. Chowdhary, M. Kumar
{"title":"Survey on Mobile Banking and e-Wallet Usage and its Security Concerns","authors":"Anubhav Bose, Chetna Choudhary, S. Chowdhary, M. Kumar","doi":"10.5220/0010789600003167","DOIUrl":"https://doi.org/10.5220/0010789600003167","url":null,"abstract":"","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 1st International Conference on Innovation in Computer and Information Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1