首页 > 最新文献

Open Computer Science最新文献

英文 中文
Machine learning-based processing of unbalanced data sets for computer algorithms 基于机器学习的不平衡数据集处理的计算机算法
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0273
Qingwei Zhou, Yongjun Qi, Hailing Tang, Peng Wu
Abstract The rapid development of technology allows people to obtain a large amount of data, which contains important information and various noises. How to obtain useful knowledge from data is the most important thing at this stage of machine learning (ML). The problem of unbalanced classification is currently an important topic in the field of data mining and ML. At present, this problem has attracted more and more attention and is a relatively new challenge for academia and industry. The problem of unbalanced classification involves classifying data when there is insufficient data or severe category distribution deviations. Due to the inherent complexity of unbalanced data sets, more new algorithms and tools are needed to effectively convert a large amount of raw data into useful information and knowledge. Unbalanced data set is a special case of classification problem, in which the distribution between classes is uneven, and it is difficult to classify data accurately. This article mainly introduces the research on the processing method of computer algorithms based on the processing method of unbalanced data sets based on ML, aiming to provide some ideas and directions for the processing of computer algorithms based on unbalanced data sets based on ML. This article proposes a research strategy for processing unbalanced data sets based on ML, including data preprocessing, decision tree data classification algorithm, and C4.5 algorithm, which are used to conduct research experiments on processing methods for unbalanced data sets based on ML. The experimental results in this article show that the accuracy rate of the decision tree C4.5 algorithm based on ML is 94.80%, which can be better used for processing unbalanced data sets based on ML.
科技的飞速发展使人们获得了大量的数据,这些数据中包含着重要的信息和各种各样的噪声。如何从数据中获取有用的知识是机器学习这个阶段最重要的事情。不平衡分类问题是当前数据挖掘和机器学习领域的一个重要课题,目前该问题越来越受到关注,是学术界和工业界面临的一个比较新的挑战。不平衡分类问题涉及在数据不足或类别分布偏差严重的情况下对数据进行分类。由于不平衡数据集固有的复杂性,需要更多新的算法和工具将大量的原始数据有效地转化为有用的信息和知识。不平衡数据集是分类问题的一种特殊情况,类之间的分布是不均匀的,很难对数据进行准确的分类。本文主要介绍了基于ML的非平衡数据集处理方法的计算机算法处理方法的研究,旨在为基于ML的非平衡数据集计算机算法的处理提供一些思路和方向。本文提出了基于ML的非平衡数据集处理的研究策略,包括数据预处理、决策树数据分类算法、C4.5算法等。进行了基于ML的非平衡数据集处理方法的研究实验。本文的实验结果表明,基于ML的决策树C4.5算法准确率为94.80%,可以更好地用于基于ML的非平衡数据集处理。
{"title":"Machine learning-based processing of unbalanced data sets for computer algorithms","authors":"Qingwei Zhou, Yongjun Qi, Hailing Tang, Peng Wu","doi":"10.1515/comp-2022-0273","DOIUrl":"https://doi.org/10.1515/comp-2022-0273","url":null,"abstract":"Abstract The rapid development of technology allows people to obtain a large amount of data, which contains important information and various noises. How to obtain useful knowledge from data is the most important thing at this stage of machine learning (ML). The problem of unbalanced classification is currently an important topic in the field of data mining and ML. At present, this problem has attracted more and more attention and is a relatively new challenge for academia and industry. The problem of unbalanced classification involves classifying data when there is insufficient data or severe category distribution deviations. Due to the inherent complexity of unbalanced data sets, more new algorithms and tools are needed to effectively convert a large amount of raw data into useful information and knowledge. Unbalanced data set is a special case of classification problem, in which the distribution between classes is uneven, and it is difficult to classify data accurately. This article mainly introduces the research on the processing method of computer algorithms based on the processing method of unbalanced data sets based on ML, aiming to provide some ideas and directions for the processing of computer algorithms based on unbalanced data sets based on ML. This article proposes a research strategy for processing unbalanced data sets based on ML, including data preprocessing, decision tree data classification algorithm, and C4.5 algorithm, which are used to conduct research experiments on processing methods for unbalanced data sets based on ML. The experimental results in this article show that the accuracy rate of the decision tree C4.5 algorithm based on ML is 94.80%, which can be better used for processing unbalanced data sets based on ML.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48169670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID supply chain data deconstruction method based on artificial intelligence technology 基于人工智能技术的RFID供应链数据解构方法
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0265
Huiying Zhang, Ze Li
Abstract Radio frequency identification (RFID) is a broad rapidly evolving skill in the past few years. It is characterized by non-contact identification, fast read and write speed, small label size, large data storage capacity, and other technical advantages. RFID technology for goods movement has completely changed the traditional supply chain management, greatly improved the operational efficiency of enterprises, and has become an important method for the development of supply chain logistics. This work mainly studies and analyzes the RFID supply chain, introduces the development and application of RFID supply chain sector technology, and discusses the operation of the supply chain in detail. Then, according to the existing RFID supply chain, a RFID supply chain artificial intelligence (AI) based approach to technology is proposed, and the data analysis of RFID supply chain is introduced in detail. In this work, through the research experiment of AI technology RFID supply chain data analysis, the experimental data show that there are several time-consuming links in the supply chain system. The time consumed in the AI RFID system is 9.9, 3.4, 3.5, and 29.9 min, respectively, while each link in the original system takes 13.4, 4.9, 4.9, and 34.9 min. It can be seen from the above data that the amount of time in each system link of the AI RFID supply chain system is less than that of the original supply chain system, which shortens the entire product passing cycle and greatly improves work efficiency.
摘要射频识别(RFID)是近年来发展迅速的一项技术。具有非接触式识别、读写速度快、标签尺寸小、数据存储容量大等技术优势。RFID货物移动技术彻底改变了传统的供应链管理,大大提高了企业的运营效率,成为供应链物流发展的重要手段。本文主要对RFID供应链进行了研究和分析,介绍了RFID供应链领域技术的发展和应用,并对供应链的运作进行了详细的探讨。然后,根据现有的RFID供应链,提出了一种基于RFID供应链人工智能的技术方法,并详细介绍了RFID供应链的数据分析。在本工作中,通过对AI技术RFID供应链数据分析的研究实验,实验数据表明,供应链系统中存在几个耗时的环节。AI RFID系统耗时分别为9.9分钟、3.4分钟、3.5分钟、29.9分钟,而原系统各环节耗时分别为13.4分钟、4.9分钟、4.9分钟、34.9分钟。从以上数据可以看出,AI RFID供应链系统的各个系统环节的时间量比原来的供应链系统要少,缩短了整个产品的通过周期,大大提高了工作效率。
{"title":"RFID supply chain data deconstruction method based on artificial intelligence technology","authors":"Huiying Zhang, Ze Li","doi":"10.1515/comp-2022-0265","DOIUrl":"https://doi.org/10.1515/comp-2022-0265","url":null,"abstract":"Abstract Radio frequency identification (RFID) is a broad rapidly evolving skill in the past few years. It is characterized by non-contact identification, fast read and write speed, small label size, large data storage capacity, and other technical advantages. RFID technology for goods movement has completely changed the traditional supply chain management, greatly improved the operational efficiency of enterprises, and has become an important method for the development of supply chain logistics. This work mainly studies and analyzes the RFID supply chain, introduces the development and application of RFID supply chain sector technology, and discusses the operation of the supply chain in detail. Then, according to the existing RFID supply chain, a RFID supply chain artificial intelligence (AI) based approach to technology is proposed, and the data analysis of RFID supply chain is introduced in detail. In this work, through the research experiment of AI technology RFID supply chain data analysis, the experimental data show that there are several time-consuming links in the supply chain system. The time consumed in the AI RFID system is 9.9, 3.4, 3.5, and 29.9 min, respectively, while each link in the original system takes 13.4, 4.9, 4.9, and 34.9 min. It can be seen from the above data that the amount of time in each system link of the AI RFID supply chain system is less than that of the original supply chain system, which shortens the entire product passing cycle and greatly improves work efficiency.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42277628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data preprocessing impact on machine learning algorithm performance 数据预处理对机器学习算法性能的影响
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0278
A. Amato, V. Di Lecce
Abstract The popularity of artificial intelligence applications is on the rise, and they are producing better outcomes in numerous fields of research. However, the effectiveness of these applications relies heavily on the quantity and quality of data used. While the volume of data available has increased significantly in recent years, this does not always lead to better results, as the information content of the data is also important. This study aims to evaluate a new data preprocessing technique called semi-pivoted QR (SPQR) approximation for machine learning. This technique is designed for approximating sparse matrices and acts as a feature selection algorithm. To the best of our knowledge, it has not been previously applied to data preprocessing in machine learning algorithms. The study aims to evaluate the impact of SPQR on the performance of an unsupervised clustering algorithm and compare its results to those obtained using principal component analysis (PCA) as the preprocessing algorithm. The evaluation is conducted on various publicly available datasets. The findings suggest that the SPQR algorithm can produce outcomes comparable to those achieved using PCA without altering the original dataset.
摘要人工智能应用的普及率正在上升,并且在许多研究领域产生了更好的结果。然而,这些应用程序的有效性在很大程度上取决于所使用数据的数量和质量。虽然近年来可用的数据量显著增加,但这并不总是能带来更好的结果,因为数据的信息内容也很重要。本研究旨在评估一种用于机器学习的新的数据预处理技术,称为半枢轴QR(SPQR)近似。该技术是为近似稀疏矩阵而设计的,并充当特征选择算法。据我们所知,它以前从未应用于机器学习算法中的数据预处理。该研究旨在评估SPQR对无监督聚类算法性能的影响,并将其结果与使用主成分分析(PCA)作为预处理算法获得的结果进行比较。评估是在各种公开可用的数据集上进行的。研究结果表明,SPQR算法可以在不改变原始数据集的情况下产生与使用PCA实现的结果相当的结果。
{"title":"Data preprocessing impact on machine learning algorithm performance","authors":"A. Amato, V. Di Lecce","doi":"10.1515/comp-2022-0278","DOIUrl":"https://doi.org/10.1515/comp-2022-0278","url":null,"abstract":"Abstract The popularity of artificial intelligence applications is on the rise, and they are producing better outcomes in numerous fields of research. However, the effectiveness of these applications relies heavily on the quantity and quality of data used. While the volume of data available has increased significantly in recent years, this does not always lead to better results, as the information content of the data is also important. This study aims to evaluate a new data preprocessing technique called semi-pivoted QR (SPQR) approximation for machine learning. This technique is designed for approximating sparse matrices and acts as a feature selection algorithm. To the best of our knowledge, it has not been previously applied to data preprocessing in machine learning algorithms. The study aims to evaluate the impact of SPQR on the performance of an unsupervised clustering algorithm and compare its results to those obtained using principal component analysis (PCA) as the preprocessing algorithm. The evaluation is conducted on various publicly available datasets. The findings suggest that the SPQR algorithm can produce outcomes comparable to those achieved using PCA without altering the original dataset.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42020442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of research results of different aspects of network security and Internet of Things under the background of big data 分析大数据背景下网络安全和物联网不同方面的研究成果
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0277
Ying Lu, Xiang Wang, Taotao Xie, Tian Xie
Abstract With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more security risks. Therefore, how to ensure the security of big data, prevent network attacks, and improve the security and reliability of the IoT has become a major issue in the current field of network security and the IoT. This article aims to analyze the research results of network security and the IoT in the context of big data and explore how to ensure big data security and improve the security and reliability of the IoT from a multidimensional perspective. Therefore, this article proposes BD technology, that is, through information mining, to ensure network security from the perspective of controlling information flow. At the same time, this article also proposes an LED lightweight encryption algorithm in the IOT, which is used to achieve secure communication between ordinary nodes and gateway nodes, effectively solving the security issues of data distribution in the network, resisting virus attacks and man-in--in-the--the-middle attacks, and has higher security and efficiency. Both of these methods can effectively protect network security: one is to control data flow, and the other is to start with communication protocols. Finally, this article analyzed the adoption of network security protection measures by netizens and found that only 13% of netizens frequently take network security protection measures, while 35% of netizens never take network security protection measures. This is also one of the important reasons for the increasing number of current network security issues.
随着大数据和物联网技术的不断发展,网络安全和物联网领域的研究也在不断深入。大数据为网络安全和物联网提供了更多的数据支撑,同时也带来了更多的安全风险。因此,如何保障大数据的安全,防范网络攻击,提高物联网的安全性和可靠性,成为当前网络安全和物联网领域的一大课题。本文旨在分析大数据背景下网络安全和物联网的研究成果,从多维角度探讨如何保障大数据安全,提高物联网的安全可靠性。因此,本文提出了BD技术,即通过信息挖掘,从控制信息流的角度来保证网络安全。同时,本文还提出了一种IOT中的LED轻量级加密算法,用于实现普通节点与网关节点之间的安全通信,有效解决了网络中数据分布的安全问题,抵御病毒攻击和中间人攻击,具有更高的安全性和效率。这两种方法都能有效地保护网络安全:一是控制数据流,二是从通信协议入手。最后,本文分析了网民采取网络安全保护措施的情况,发现只有13%的网民经常采取网络安全保护措施,而35%的网民从不采取网络安全保护措施。这也是当前网络安全问题日益增多的重要原因之一。
{"title":"Analysis of research results of different aspects of network security and Internet of Things under the background of big data","authors":"Ying Lu, Xiang Wang, Taotao Xie, Tian Xie","doi":"10.1515/comp-2022-0277","DOIUrl":"https://doi.org/10.1515/comp-2022-0277","url":null,"abstract":"Abstract With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more security risks. Therefore, how to ensure the security of big data, prevent network attacks, and improve the security and reliability of the IoT has become a major issue in the current field of network security and the IoT. This article aims to analyze the research results of network security and the IoT in the context of big data and explore how to ensure big data security and improve the security and reliability of the IoT from a multidimensional perspective. Therefore, this article proposes BD technology, that is, through information mining, to ensure network security from the perspective of controlling information flow. At the same time, this article also proposes an LED lightweight encryption algorithm in the IOT, which is used to achieve secure communication between ordinary nodes and gateway nodes, effectively solving the security issues of data distribution in the network, resisting virus attacks and man-in--in-the--the-middle attacks, and has higher security and efficiency. Both of these methods can effectively protect network security: one is to control data flow, and the other is to start with communication protocols. Finally, this article analyzed the adoption of network security protection measures by netizens and found that only 13% of netizens frequently take network security protection measures, while 35% of netizens never take network security protection measures. This is also one of the important reasons for the increasing number of current network security issues.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66887414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of wireless sensor network technology based on artificial intelligence in security monitoring system 基于人工智能的无线传感器网络技术在安防监控系统中的应用
Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0280
Yajuan Zhang, Ru Jing, Xiang Ji, Nan Hu
Abstract The safety monitoring system has been used to monitor and manage engineering safety operation. The application scope of the safety monitoring system is very wide. It has a wide range of applications in the fields of pipeline safety monitoring, electrical safety monitoring and household safety monitoring. This article studied the application process of the household safety monitoring system. Many home safety accidents are caused by inadequate monitoring of safety problems. Therefore, it is very important to establish a household safety monitoring system. Traditional home safety monitoring systems only rely on cameras for safety monitoring, and the traditional home safety monitoring system uses too few sensors. With the continuous development of wireless sensor network (WSN) technology, it is possible to build a sensor node network, but provides real-time information for home security monitoring to the greatest extent. This article compared the home safety monitoring system based on the WSN technology of artificial intelligence (AI) with the traditional home safety monitoring system. The experimental results showed that in the large-scale home environment, the average monitoring accuracy of the traditional home security monitoring system and the home security monitoring system based on the WSN technology of AI was 77.76 and 89.36%, respectively. In the small-scale home environment, the average monitoring accuracy of the traditional home safety monitoring system and the home safety monitoring system based on the WSN technology of AI were 87.63 and 94.43%, respectively. Monitoring accuracy refers to the accuracy of the household safety monitoring system in detecting safety issues. Therefore, the application of the WSN technology based on artificial intelligence to the home safety monitoring system can effectively improve the accuracy of home safety monitoring.
摘要安全监控系统已被用于对工程安全运行进行监控和管理。安全监控系统的应用范围非常广泛。在管道安全监控、电气安全监控、家居安全监控等领域有着广泛的应用。本文研究了家庭安全监控系统的应用过程。许多家庭安全事故是由于对安全问题监测不足造成的。因此,建立一个家庭安全监控系统是非常重要的。传统的家庭安全监控系统仅依靠摄像头进行安全监控,传统的家庭安全监控系统使用的传感器太少。随着无线传感器网络(WSN)技术的不断发展,构建传感器节点网络成为可能,为家庭安防监控提供最大程度的实时信息。本文将基于人工智能WSN技术的家庭安全监控系统与传统的家庭安全监控系统进行了比较。实验结果表明,在大规模家庭环境下,传统家庭安防监控系统和基于AI的WSN技术的家庭安防监控系统的平均监控准确率分别为77.76和89.36%。在小规模家庭环境下,传统家庭安全监控系统和基于AI的WSN技术的家庭安全监控系统的平均监控准确率分别为87.63和94.43%。监控精度是指家庭安全监控系统检测安全问题的准确性。因此,将基于人工智能的WSN技术应用到家庭安全监控系统中,可以有效地提高家庭安全监控的准确性。
{"title":"Application of wireless sensor network technology based on artificial intelligence in security monitoring system","authors":"Yajuan Zhang, Ru Jing, Xiang Ji, Nan Hu","doi":"10.1515/comp-2022-0280","DOIUrl":"https://doi.org/10.1515/comp-2022-0280","url":null,"abstract":"Abstract The safety monitoring system has been used to monitor and manage engineering safety operation. The application scope of the safety monitoring system is very wide. It has a wide range of applications in the fields of pipeline safety monitoring, electrical safety monitoring and household safety monitoring. This article studied the application process of the household safety monitoring system. Many home safety accidents are caused by inadequate monitoring of safety problems. Therefore, it is very important to establish a household safety monitoring system. Traditional home safety monitoring systems only rely on cameras for safety monitoring, and the traditional home safety monitoring system uses too few sensors. With the continuous development of wireless sensor network (WSN) technology, it is possible to build a sensor node network, but provides real-time information for home security monitoring to the greatest extent. This article compared the home safety monitoring system based on the WSN technology of artificial intelligence (AI) with the traditional home safety monitoring system. The experimental results showed that in the large-scale home environment, the average monitoring accuracy of the traditional home security monitoring system and the home security monitoring system based on the WSN technology of AI was 77.76 and 89.36%, respectively. In the small-scale home environment, the average monitoring accuracy of the traditional home safety monitoring system and the home safety monitoring system based on the WSN technology of AI were 87.63 and 94.43%, respectively. Monitoring accuracy refers to the accuracy of the household safety monitoring system in detecting safety issues. Therefore, the application of the WSN technology based on artificial intelligence to the home safety monitoring system can effectively improve the accuracy of home safety monitoring.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135954031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation evaluation of underwater robot structure and control system based on ADAMS 基于ADAMS的水下机器人结构与控制系统仿真评估
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0269
Donglin Tang, Long Li
Abstract The twenty-first century is the century of marine resources. The ocean is a treasure of biological resources, energy, water resources and mineral resources, and it would gradually become the “second space” of mankind. In the next few years, it would be more and more relevant to human life. Many scholars have realized the importance of the ocean and began to vigorously develop and use the ocean. Underwater robot is a means for human beings to explore and develop the ocean, and it would be widely used in this field. The development and promotion of underwater vehicles are of great significance to resource development, economic development, and national security. With the increasing shortage of land resources, the development and utilization of marine resources have received increasing attention. The direct exploitation of marine resources by humans would have adverse effects, so the underwater robot technology has developed rapidly in recent years. However, at present, most underwater robots are driven by electric turbines. The underwater working environment requires that the underwater motor has good sealing performance, so its structure is complex and expensive, and it is rarely used in ordinary underwater operations. In recent years, intelligent robots have been used more and more, but because of the complexity and uncertainty of the underwater working environment, there are many uncertain factors. Therefore, it is very meaningful to carry out stability control for it. The research results showed that the displacement, stability, and other corresponding test curves of each component can be obtained by establishing a simple model with software and through ADAMS (Automatic Dynamic Analysis of Mechanical Systems) simulation analysis. This can simulate the movement of real objects in the real environment and find the existing problems, so as to provide a reference for the actual underwater robot design. In this way, the development cycle and production costs can be reduced. This article analyzed the structure and control system of the underwater vehicle based on ADAMS simulation. The results showed that the dynamic stability of the underwater vehicle based on ADAMS simulation analysis was improved by 4.67% compared with the underwater vehicle before optimization.
摘要二十一世纪是海洋资源的世纪。海洋是生物资源、能源、水资源和矿产资源的宝库,它将逐渐成为人类的“第二空间”。在接下来的几年里,它将越来越与人类生活相关。许多学者已经意识到海洋的重要性,并开始大力开发和利用海洋。水下机器人是人类探索和开发海洋的一种手段,将在这一领域得到广泛应用。水下航行器的开发和推广对资源开发、经济发展和国家安全具有重要意义。随着陆地资源日益短缺,海洋资源的开发利用越来越受到重视。人类直接开采海洋资源会产生不利影响,因此水下机器人技术近年来发展迅速。然而,目前,大多数水下机器人都是由电动涡轮机驱动的。水下工作环境要求水下电机具有良好的密封性能,因此其结构复杂、价格昂贵,在普通水下作业中很少使用。近年来,智能机器人的应用越来越多,但由于水下工作环境的复杂性和不确定性,存在许多不确定因素。研究结果表明,利用软件建立简单的模型,并通过ADAMS(Automatic Dynamic Analysis of Mechanical Systems)仿真分析,可以得到各部件的位移、稳定性等相应的试验曲线。这样可以模拟真实物体在真实环境中的运动,发现存在的问题,为实际的水下机器人设计提供参考。通过这种方式,可以减少开发周期和生产成本。本文基于ADAMS仿真,对水下机器人的结构和控制系统进行了分析。结果表明,基于ADAMS仿真分析的水下机器人动力学稳定性比优化前提高了4.67%。
{"title":"Simulation evaluation of underwater robot structure and control system based on ADAMS","authors":"Donglin Tang, Long Li","doi":"10.1515/comp-2022-0269","DOIUrl":"https://doi.org/10.1515/comp-2022-0269","url":null,"abstract":"Abstract The twenty-first century is the century of marine resources. The ocean is a treasure of biological resources, energy, water resources and mineral resources, and it would gradually become the “second space” of mankind. In the next few years, it would be more and more relevant to human life. Many scholars have realized the importance of the ocean and began to vigorously develop and use the ocean. Underwater robot is a means for human beings to explore and develop the ocean, and it would be widely used in this field. The development and promotion of underwater vehicles are of great significance to resource development, economic development, and national security. With the increasing shortage of land resources, the development and utilization of marine resources have received increasing attention. The direct exploitation of marine resources by humans would have adverse effects, so the underwater robot technology has developed rapidly in recent years. However, at present, most underwater robots are driven by electric turbines. The underwater working environment requires that the underwater motor has good sealing performance, so its structure is complex and expensive, and it is rarely used in ordinary underwater operations. In recent years, intelligent robots have been used more and more, but because of the complexity and uncertainty of the underwater working environment, there are many uncertain factors. Therefore, it is very meaningful to carry out stability control for it. The research results showed that the displacement, stability, and other corresponding test curves of each component can be obtained by establishing a simple model with software and through ADAMS (Automatic Dynamic Analysis of Mechanical Systems) simulation analysis. This can simulate the movement of real objects in the real environment and find the existing problems, so as to provide a reference for the actual underwater robot design. In this way, the development cycle and production costs can be reduced. This article analyzed the structure and control system of the underwater vehicle based on ADAMS simulation. The results showed that the dynamic stability of the underwater vehicle based on ADAMS simulation analysis was improved by 4.67% compared with the underwater vehicle before optimization.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43477478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration on the application of electronic information technology in signal processing based on big data 电子信息技术在基于大数据的信号处理中的应用探索
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0272
Li Liu
Abstract Mobile phones are the most commonly used electronic devices in people’s daily life. The image, voice, and other information in these devices need to be processed through signal transmission. The role of signal processing is to process the acquired information in a certain way to get the final result. In order to ensure that the whole processing program can work normally, it is necessary to implement good control to achieve the desired effect. However, with the continuous progress and development of science and technology, its requirements are becoming increasingly strict. The traditional signal processing method is unreliable, has poor real time, and has error-prone characteristics, which can no longer meet the accuracy requirements of current information acquisition equipment. Therefore, people begin to study more complex and precise information processing methods and apply these algorithms to various advanced electronic devices to achieve better results. From the perspective of big data, electronic information technology is generated and developed based on massive data processing. It not only has a strong storage function but also has strong computing power and a wide range of application scenarios. It has strong applicability in real life. In this article, the signal to be processed was divided into several wavelet components in different frequency ranges by empirical mode decomposition technology, and then the signal was denoised by combining three wavelet denoising methods to obtain noise data with good signal-to-noise ratio and high classification accuracy. Finally, the corresponding feature information was extracted according to the signal-receiving model to improve the system recognition rate. This article compared the traditional signal processing methods with the signal processing approaches from the perspective of electronic information technology. The results showed that the processing method had a high computing speed and could better solve the problem of detection performance degradation caused by interference. User satisfaction had also increased by 2.87%, which showed that signal processing based on big data and information processing technology had broad application prospects in communication systems. The core of open computer science is to build a unified, efficient, and scalable computing platform based on massive data processing and use signal processing and computer technology to manage and optimize the scheduling of information resources to better meet various business needs.
手机是人们日常生活中最常用的电子设备。这些设备中的图像、语音等信息都需要通过信号传输进行处理。信号处理的作用就是对采集到的信息进行一定的处理,从而得到最终的结果。为了保证整个加工程序能够正常工作,必须实施良好的控制,以达到预期的效果。然而,随着科学技术的不断进步和发展,对其要求也越来越严格。传统的信号处理方法不可靠,实时性差,容易出错,已经不能满足当前信息采集设备的精度要求。因此,人们开始研究更复杂和精确的信息处理方法,并将这些算法应用到各种先进的电子设备中,以达到更好的效果。从大数据的角度来看,电子信息技术是在海量数据处理的基础上产生和发展起来的。它不仅具有强大的存储功能,而且具有强大的计算能力和广泛的应用场景。在现实生活中具有很强的适用性。本文通过经验模态分解技术将待处理信号分解成不同频率范围内的几个小波分量,然后结合三种小波去噪方法对信号进行去噪,得到信噪比好、分类精度高的噪声数据。最后,根据信号接收模型提取相应的特征信息,提高系统识别率。本文将传统的信号处理方法与电子信息技术视角下的信号处理方法进行了比较。结果表明,该处理方法计算速度快,能较好地解决干扰引起的检测性能下降问题。用户满意度提高2.87%,表明基于大数据和信息处理技术的信号处理在通信系统中具有广阔的应用前景。开放计算机科学的核心是构建基于海量数据处理的统一、高效、可扩展的计算平台,利用信号处理和计算机技术对信息资源进行管理和优化调度,更好地满足各种业务需求。
{"title":"Exploration on the application of electronic information technology in signal processing based on big data","authors":"Li Liu","doi":"10.1515/comp-2022-0272","DOIUrl":"https://doi.org/10.1515/comp-2022-0272","url":null,"abstract":"Abstract Mobile phones are the most commonly used electronic devices in people’s daily life. The image, voice, and other information in these devices need to be processed through signal transmission. The role of signal processing is to process the acquired information in a certain way to get the final result. In order to ensure that the whole processing program can work normally, it is necessary to implement good control to achieve the desired effect. However, with the continuous progress and development of science and technology, its requirements are becoming increasingly strict. The traditional signal processing method is unreliable, has poor real time, and has error-prone characteristics, which can no longer meet the accuracy requirements of current information acquisition equipment. Therefore, people begin to study more complex and precise information processing methods and apply these algorithms to various advanced electronic devices to achieve better results. From the perspective of big data, electronic information technology is generated and developed based on massive data processing. It not only has a strong storage function but also has strong computing power and a wide range of application scenarios. It has strong applicability in real life. In this article, the signal to be processed was divided into several wavelet components in different frequency ranges by empirical mode decomposition technology, and then the signal was denoised by combining three wavelet denoising methods to obtain noise data with good signal-to-noise ratio and high classification accuracy. Finally, the corresponding feature information was extracted according to the signal-receiving model to improve the system recognition rate. This article compared the traditional signal processing methods with the signal processing approaches from the perspective of electronic information technology. The results showed that the processing method had a high computing speed and could better solve the problem of detection performance degradation caused by interference. User satisfaction had also increased by 2.87%, which showed that signal processing based on big data and information processing technology had broad application prospects in communication systems. The core of open computer science is to build a unified, efficient, and scalable computing platform based on massive data processing and use signal processing and computer technology to manage and optimize the scheduling of information resources to better meet various business needs.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43520273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of fingerprint image fuzzy edge recognition algorithm in criminal technology 指纹图像模糊边缘识别算法在刑事技术中的应用
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0263
Xinhua Lv
Abstract In the context of the rapid development of science and technology and the modernization of the legal system, criminal activities are becoming more and more intelligent and technological, which also puts forward higher requirements for criminal technology. The current criminal technology equipment is relatively backward, and the technical level is not high enough, resulting in a low utilization rate of trace material evidence extraction, which directly affects the role of criminal technology in the investigation and solving of cases. In recent years, fingerprint recognition algorithms and image edge detection algorithms have been widely used in various fields. This work studied the application of fingerprint image fuzzy edge recognition algorithm in criminal technology, in order to improve the level of criminal technology and the utilization rate of physical evidence extraction. The criminal technology system is upgraded and optimized by combining fingerprint recognition algorithm and image edge detection algorithm. And fuzzy theory is added to ensure the feasibility of the research. The experimental results show that the fuzzy edge recognition algorithm of fingerprint image can improve the level of criminal technology and the utilization rate of material evidence to a certain extent. The utilization rate is increased by 7.04%. The recognition accuracy of the fuzzy recognition method is also 13.2% higher than that of the methods in the literature.
摘要在科学技术快速发展和法制现代化的背景下,犯罪活动越来越智能化、技术化,这也对犯罪技术提出了更高的要求。目前刑事技术装备相对落后,技术水平不够高,导致痕迹物证提取利用率低,直接影响了刑事技术在侦查破案中的作用。近年来,指纹识别算法和图像边缘检测算法在各个领域得到了广泛的应用。本文研究了指纹图像模糊边缘识别算法在刑事技术中的应用,以提高刑事技术水平和物证提取的利用率。将指纹识别算法和图像边缘检测算法相结合,对犯罪技术系统进行升级优化。并加入模糊理论以保证研究的可行性。实验结果表明,指纹图像的模糊边缘识别算法可以在一定程度上提高犯罪技术水平和物证利用率。利用率提高了7.04%,模糊识别方法的识别准确率也比文献中的方法提高了13.2%。
{"title":"Application of fingerprint image fuzzy edge recognition algorithm in criminal technology","authors":"Xinhua Lv","doi":"10.1515/comp-2022-0263","DOIUrl":"https://doi.org/10.1515/comp-2022-0263","url":null,"abstract":"Abstract In the context of the rapid development of science and technology and the modernization of the legal system, criminal activities are becoming more and more intelligent and technological, which also puts forward higher requirements for criminal technology. The current criminal technology equipment is relatively backward, and the technical level is not high enough, resulting in a low utilization rate of trace material evidence extraction, which directly affects the role of criminal technology in the investigation and solving of cases. In recent years, fingerprint recognition algorithms and image edge detection algorithms have been widely used in various fields. This work studied the application of fingerprint image fuzzy edge recognition algorithm in criminal technology, in order to improve the level of criminal technology and the utilization rate of physical evidence extraction. The criminal technology system is upgraded and optimized by combining fingerprint recognition algorithm and image edge detection algorithm. And fuzzy theory is added to ensure the feasibility of the research. The experimental results show that the fuzzy edge recognition algorithm of fingerprint image can improve the level of criminal technology and the utilization rate of material evidence to a certain extent. The utilization rate is increased by 7.04%. The recognition accuracy of the fuzzy recognition method is also 13.2% higher than that of the methods in the literature.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41681797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic system allocation and application of cloud computing virtual resources based on system architecture 基于系统架构的云计算虚拟资源动态系统分配与应用
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0259
Chunhua Lin, Longzi Li, Yuanyi Chen
Abstract Cloud computing is a system development method based on dynamic sharing, which allows a large number of systems to be combined to provide services. The purpose of this work is to study the design and implementation of a dynamic virtual resource allocation system in cloud computing, whose architecture allows load balancing between virtual resource pools and reduces resource wastage. Using the cluster network topology, the resource usage of the dynamic system cluster can be monitored in real time, and the total cluster load can be automatically determined based on the monitoring data. The experiment is divided into two parts. Performance testing and scenario testing. Performance tests examine execution time, processor, and memory performance. In the scenario test, JMeter is used to simulate the occurrence of a large number of concurrent application access requests, the loss rate, and processing time of these requests on the cloud platform, and load balancing tests are performed. The test results show that the system running time is about 22–27 ms, the CPU utilization is about 90–95%, and the RAM is about 3.5 ms. The results show that cloud technology can improve resource scheduling of large tasks and optimize resource load balance.
云计算是一种基于动态共享的系统开发方法,它允许大量的系统组合起来提供服务。本工作的目的是研究云计算中动态虚拟资源分配系统的设计与实现,该系统的架构允许虚拟资源池之间的负载均衡,减少资源浪费。通过集群网络拓扑,可以实时监控动态系统集群的资源使用情况,并根据监控数据自动确定集群的总负载。实验分为两个部分。性能测试和场景测试。性能测试检查执行时间、处理器和内存性能。在场景测试中,使用JMeter模拟大量并发应用访问请求在云平台上的发生情况、丢失率和处理时间,并进行负载均衡测试。测试结果表明,系统运行时间约为22-27 ms, CPU利用率约为90-95%,RAM约为3.5 ms。结果表明,云技术可以改善大型任务的资源调度,优化资源负载平衡。
{"title":"Dynamic system allocation and application of cloud computing virtual resources based on system architecture","authors":"Chunhua Lin, Longzi Li, Yuanyi Chen","doi":"10.1515/comp-2022-0259","DOIUrl":"https://doi.org/10.1515/comp-2022-0259","url":null,"abstract":"Abstract Cloud computing is a system development method based on dynamic sharing, which allows a large number of systems to be combined to provide services. The purpose of this work is to study the design and implementation of a dynamic virtual resource allocation system in cloud computing, whose architecture allows load balancing between virtual resource pools and reduces resource wastage. Using the cluster network topology, the resource usage of the dynamic system cluster can be monitored in real time, and the total cluster load can be automatically determined based on the monitoring data. The experiment is divided into two parts. Performance testing and scenario testing. Performance tests examine execution time, processor, and memory performance. In the scenario test, JMeter is used to simulate the occurrence of a large number of concurrent application access requests, the loss rate, and processing time of these requests on the cloud platform, and load balancing tests are performed. The test results show that the system running time is about 22–27 ms, the CPU utilization is about 90–95%, and the RAM is about 3.5 ms. The results show that cloud technology can improve resource scheduling of large tasks and optimize resource load balance.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47253985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual inspection intelligent robot technology for large infusion industry 面向大型输液行业的视觉检测智能机器人技术
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0262
Qilang Liang, Bangshun Luo
Abstract The application of intelligent technology has realized the transformation of people’s production and lifestyle, and it has also promoted the development of the field of medicine. At present, the intensity of intelligence in the field of medicine is increasing. By using its cash methods and techniques combined with the mechanical field, this article proposes to use visual inspection technology to understand the fusion of the medical field and the mechanical field. It is helpful to analyze and solve objective problems such as low efficiency in current infusion and insufficient rigidity of large infusion plastic bottles. Drawing on the principles and laws of deep learning algorithms and neural networks, the technical research of intelligent robots for visual inspection is carried out to realize the intelligence of infusion robots. In the research accuracy of detection, the detection rate of standard particles higher than 85 µM has reached almost 100%, and the rate of 50 µM standard particles is lower and unstable. The detection effect of the control light bulb control was different, and the detection rate was between 50 and 80%, which was obviously worse than the detection robot effect. Therefore, the current research on the technology of intelligent robots is very important.
摘要智能技术的应用实现了人们生产生活方式的转变,也促进了医学领域的发展。目前,医学领域的智力强度正在提高。本文将其现金支付方法和技术与机械领域相结合,提出利用视觉检测技术来理解医学领域与机械领域的融合。有助于分析和解决目前输液效率低、大型输液塑料瓶刚性不足等客观问题。借鉴深度学习算法和神经网络的原理和规律,对用于视觉检测的智能机器人进行技术研究,以实现输液机器人的智能化。在研究检测精度时,标准颗粒物的检测率高于85 µM几乎达到100% µM标准颗粒较低且不稳定。控制灯泡控制的检测效果不同,检测率在50-80%之间,明显比检测机器人的效果差。因此,当前对智能机器人技术的研究具有十分重要的意义。
{"title":"Visual inspection intelligent robot technology for large infusion industry","authors":"Qilang Liang, Bangshun Luo","doi":"10.1515/comp-2022-0262","DOIUrl":"https://doi.org/10.1515/comp-2022-0262","url":null,"abstract":"Abstract The application of intelligent technology has realized the transformation of people’s production and lifestyle, and it has also promoted the development of the field of medicine. At present, the intensity of intelligence in the field of medicine is increasing. By using its cash methods and techniques combined with the mechanical field, this article proposes to use visual inspection technology to understand the fusion of the medical field and the mechanical field. It is helpful to analyze and solve objective problems such as low efficiency in current infusion and insufficient rigidity of large infusion plastic bottles. Drawing on the principles and laws of deep learning algorithms and neural networks, the technical research of intelligent robots for visual inspection is carried out to realize the intelligence of infusion robots. In the research accuracy of detection, the detection rate of standard particles higher than 85 µM has reached almost 100%, and the rate of 50 µM standard particles is lower and unstable. The detection effect of the control light bulb control was different, and the detection rate was between 50 and 80%, which was obviously worse than the detection robot effect. Therefore, the current research on the technology of intelligent robots is very important.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49668205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1