首页 > 最新文献

Journal of Information Processing Systems最新文献

英文 中文
GMM-Based Maghreb Dialect IdentificationSystem 基于gmm的马格里布方言识别系统
IF 1.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2015-02-01 DOI: 10.3745/JIPS.02.0015
Lachachi Nour-Eddine, Adla Abdelkader
While Modern Standard Arabic is the formal spoken and written language of the Arab world; dialects are the major communication mode for everyday life. Therefore, identifying a speaker`s dialect is critical in the Arabic-speaking world for speech processing tasks, such as automatic speech recognition or identification. In this paper, we examine two approaches that reduce the Universal Background Model (UBM) in the automatic dialect identification system across the five following Arabic Maghreb dialects: Moroccan, Tunisian, and 3 dialects of the western (Oranian), central (Algiersian), and eastern (Constantinian) regions of Algeria. We applied our approaches to the Maghreb dialect detection domain that contains a collection of 10-second utterances and we compared the performance precision gained against the dialect samples from a baseline GMM-UBM system and the ones from our own improved GMM-UBM system that uses a Reduced UBM algorithm. Our experiments show that our approaches significantly improve identification performance over purely acoustic features with an identification rate of 80.49%.
现代标准阿拉伯语是阿拉伯世界的正式口语和书面语;方言是日常生活中主要的交流方式。因此,在阿拉伯语世界中,识别说话人的方言对于语音处理任务至关重要,例如自动语音识别或识别。在本文中,我们研究了在自动方言识别系统中减少通用背景模型(UBM)的两种方法,这些方法适用于以下五种阿拉伯马格里布方言:摩洛哥语、突尼斯语和阿尔及利亚西部(奥拉尼亚语)、中部(阿尔及利亚语)和东部(君士坦丁尼亚语)地区的3种方言。我们将我们的方法应用于马格里布方言检测领域,该领域包含一个10秒的话语集合,我们将从基线GMM-UBM系统和我们自己的改进GMM-UBM系统中获得的方言样本的性能精度进行了比较,该系统使用了简化的UBM算法。实验表明,我们的方法显著提高了纯声学特征的识别性能,识别率达到80.49%。
{"title":"GMM-Based Maghreb Dialect IdentificationSystem","authors":"Lachachi Nour-Eddine, Adla Abdelkader","doi":"10.3745/JIPS.02.0015","DOIUrl":"https://doi.org/10.3745/JIPS.02.0015","url":null,"abstract":"While Modern Standard Arabic is the formal spoken and written language of the Arab world; dialects are the major communication mode for everyday life. Therefore, identifying a speaker`s dialect is critical in the Arabic-speaking world for speech processing tasks, such as automatic speech recognition or identification. In this paper, we examine two approaches that reduce the Universal Background Model (UBM) in the automatic dialect identification system across the five following Arabic Maghreb dialects: Moroccan, Tunisian, and 3 dialects of the western (Oranian), central (Algiersian), and eastern (Constantinian) regions of Algeria. We applied our approaches to the Maghreb dialect detection domain that contains a collection of 10-second utterances and we compared the performance precision gained against the dialect samples from a baseline GMM-UBM system and the ones from our own improved GMM-UBM system that uses a Reduced UBM algorithm. Our experiments show that our approaches significantly improve identification performance over purely acoustic features with an identification rate of 80.49%.","PeriodicalId":46825,"journal":{"name":"Journal of Information Processing Systems","volume":"1 1","pages":"22-38"},"PeriodicalIF":1.6,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70056739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Probabilistic Models for Local Patterns Analysis 局部模式分析的概率模型
IF 1.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2014-03-31 DOI: 10.3745/JIPS.2014.10.1.145
K. Salim, B. Hafida, Rahal Sid Ahmed
Recently, many large organizations have multiple data sources (MDS') distributed over different branches of an interstate company. Local patterns analysis has become an effective strategy for MDS mining in national and international organizations. It consists of mining different datasets in order to obtain frequent patterns, which are forwarded to a centralized place for global pattern analysis. Various synthesizing models (2,3,4,5,6,7,8,26) have been proposed to build global patterns from the forwarded patterns. It is desired that the synthesized rules from such forwarded patterns must closely match with the mono-mining results (i.e., the results that would be obtained if all of the databases are put together and mining has been done). When the pattern is present in the site, but fails to satisfy the minimum support threshold value, it is not allowed to take part in the pattern synthesizing process. Therefore, this process can lose some interesting patterns, which can help the decider to make the right decision. In such situations we propose the application of a probabilistic model in the synthesizing process. An adequate choice for a probabilistic model can improve the quality of patterns that have been discovered. In this paper, we perform a comprehensive study on various probabilistic models that can be applied in the synthesizing process and we choose and improve one of them that works to ameliorate the synthesizing results. Finally, some experiments are presented in public database in order to improve the efficiency of our proposed synthesizing method.
最近,许多大型组织都有多个数据源(MDS),分布在跨州公司的不同分支机构上。局部模式分析已成为国内外组织进行MDS挖掘的有效策略。它包括挖掘不同的数据集,以获得频繁的模式,这些模式被转发到一个集中的地方进行全局模式分析。提出了多种综合模型(2、3、4、5、6、7、8、26),从转发的模式中构建全局模式。需要的是,来自这种转发模式的合成规则必须与单挖掘结果(即,如果将所有数据库放在一起并完成挖掘将获得的结果)紧密匹配。当图案在现场存在,但不能满足最小支持阈值时,不允许参加图案合成过程。因此,这个过程可能会失去一些有趣的模式,这些模式可以帮助决策者做出正确的决定。在这种情况下,我们建议在综合过程中应用概率模型。对概率模型的适当选择可以提高已发现模式的质量。在本文中,我们对综合过程中可以应用的各种概率模型进行了全面的研究,并选择和改进了其中一种可以改善综合结果的概率模型。最后,在公共数据库中进行了一些实验,以提高我们所提出的合成方法的效率。
{"title":"Probabilistic Models for Local Patterns Analysis","authors":"K. Salim, B. Hafida, Rahal Sid Ahmed","doi":"10.3745/JIPS.2014.10.1.145","DOIUrl":"https://doi.org/10.3745/JIPS.2014.10.1.145","url":null,"abstract":"Recently, many large organizations have multiple data sources (MDS') distributed over different branches of an interstate company. Local patterns analysis has become an effective strategy for MDS mining in national and international organizations. It consists of mining different datasets in order to obtain frequent patterns, which are forwarded to a centralized place for global pattern analysis. Various synthesizing models (2,3,4,5,6,7,8,26) have been proposed to build global patterns from the forwarded patterns. It is desired that the synthesized rules from such forwarded patterns must closely match with the mono-mining results (i.e., the results that would be obtained if all of the databases are put together and mining has been done). When the pattern is present in the site, but fails to satisfy the minimum support threshold value, it is not allowed to take part in the pattern synthesizing process. Therefore, this process can lose some interesting patterns, which can help the decider to make the right decision. In such situations we propose the application of a probabilistic model in the synthesizing process. An adequate choice for a probabilistic model can improve the quality of patterns that have been discovered. In this paper, we perform a comprehensive study on various probabilistic models that can be applied in the synthesizing process and we choose and improve one of them that works to ameliorate the synthesizing results. Finally, some experiments are presented in public database in order to improve the efficiency of our proposed synthesizing method.","PeriodicalId":46825,"journal":{"name":"Journal of Information Processing Systems","volume":"10 1","pages":"145-161"},"PeriodicalIF":1.6,"publicationDate":"2014-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70056943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator 基于Xilinx System Generator的多图像加密技术的软硬件联合仿真
IF 1.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2013-09-30 DOI: 10.3745/JIPS.2013.9.3.499
Panduranga H, Naveen Kumar, Sharath Kumar
Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.
本文将描述一种多图像加密技术的硬件-软件联合仿真。我们提出了基于拉丁平方图像密码(LSIC)的多图像加密技术。首先,利用256位密钥生成基于拉丁方的载波图像。在输入图像和拉丁方图像之间应用异或操作来生成加密图像。然后,在加密后的图像与第二张输入图像之间进行异或运算,对第二张图像进行加密。这个过程一直持续到第n个输入图像被加密为止。我们使用Xilinx System Generator (XSG)实现了所提出的多图像加密技术的硬件联合仿真。利用Simulink和XSG Block对该加密技术进行建模,并将其合成到Virtex 2 pro FPGA器件上。采用软硬件联合仿真的方法对所提出的技术进行了验证。
{"title":"Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator","authors":"Panduranga H, Naveen Kumar, Sharath Kumar","doi":"10.3745/JIPS.2013.9.3.499","DOIUrl":"https://doi.org/10.3745/JIPS.2013.9.3.499","url":null,"abstract":"Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.","PeriodicalId":46825,"journal":{"name":"Journal of Information Processing Systems","volume":"151 1","pages":"499"},"PeriodicalIF":1.6,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70056932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks MAP:一种用于无线传感器网络的平衡能量消耗路由协议
IF 1.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2010-09-30 DOI: 10.3745/JIPS.2010.6.3.295
M. Azim
Abstract —Network lifetime is a critical issue in Wireless Sensor Networks (WSNs). In which, a large number of sensor nodes communicate together to perform a predetermined sensing task. In such networks, the network life time depends mainly on the lifetime of the sensor nodes constituting the network. Therefore, it is essential to balance the energy consumption among all sensor nodes to ensure the network connectivity. In this paper, we propose an energy-efficient data routing protocol for wireless sensor networks. Contrary to the protocol proposed in [6], that always selects the path with minimum hop count to the base station, our proposed routing protocol may choose a longer path that will provide better distribution of the energy consumption among the sensor nodes. Simulation results indicate clearly that compared to the routing protocol proposed in [6], our proposed protocol evenly distributes the energy consumption among the network nodes thus maximizing the network life time. Keywords
网络生存期是无线传感器网络(WSNs)中的一个关键问题。其中,大量传感器节点相互通信,共同执行预定的感知任务。在这种网络中,网络寿命主要取决于构成网络的传感器节点的寿命。因此,平衡各传感器节点之间的能量消耗以保证网络的连通性至关重要。本文提出了一种高效节能的无线传感器网络数据路由协议。与[6]中提出的协议总是选择到基站的跳数最少的路径相反,我们提出的路由协议可以选择更长的路径,从而更好地分配传感器节点之间的能量消耗。仿真结果清楚地表明,与[6]中提出的路由协议相比,我们提出的协议均匀地分配了网络节点之间的能量消耗,从而最大化了网络的生存时间。关键字
{"title":"MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks","authors":"M. Azim","doi":"10.3745/JIPS.2010.6.3.295","DOIUrl":"https://doi.org/10.3745/JIPS.2010.6.3.295","url":null,"abstract":"Abstract —Network lifetime is a critical issue in Wireless Sensor Networks (WSNs). In which, a large number of sensor nodes communicate together to perform a predetermined sensing task. In such networks, the network life time depends mainly on the lifetime of the sensor nodes constituting the network. Therefore, it is essential to balance the energy consumption among all sensor nodes to ensure the network connectivity. In this paper, we propose an energy-efficient data routing protocol for wireless sensor networks. Contrary to the protocol proposed in [6], that always selects the path with minimum hop count to the base station, our proposed routing protocol may choose a longer path that will provide better distribution of the energy consumption among the sensor nodes. Simulation results indicate clearly that compared to the routing protocol proposed in [6], our proposed protocol evenly distributes the energy consumption among the network nodes thus maximizing the network life time. Keywords","PeriodicalId":46825,"journal":{"name":"Journal of Information Processing Systems","volume":"6 1","pages":"295-306"},"PeriodicalIF":1.6,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70056856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks 无线传感器网络的抢占式实时调度策略研究
IF 1.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2009-09-30 DOI: 10.3745/JIPS.2009.5.3.135
Zhao Zhibin, Gao Fuxiang
Most of the tasks in wireless sensor networks (WSN) are requested to run in a real-time way. Neither EDF nor FIFO can ensure real-time scheduling in WSN. A real-time scheduling strategy (RTS) is proposed in this paper. All tasks are divided into two layers and endued diverse priorities. RTS utilizes a preemptive way to ensure hard real-time scheduling. The experimental results indicate that RTS has a good performance both in communication throughput and over-load.
无线传感器网络(WSN)中的大部分任务都要求实时运行。无论是EDF还是FIFO都不能保证WSN的实时调度。提出了一种实时调度策略(RTS)。所有任务都分为两层,并赋予不同的优先级。RTS利用先发制人的方式来确保硬实时调度。实验结果表明,RTS在通信吞吐量和过载方面都具有良好的性能。
{"title":"Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks","authors":"Zhao Zhibin, Gao Fuxiang","doi":"10.3745/JIPS.2009.5.3.135","DOIUrl":"https://doi.org/10.3745/JIPS.2009.5.3.135","url":null,"abstract":"Most of the tasks in wireless sensor networks (WSN) are requested to run in a real-time way. Neither EDF nor FIFO can ensure real-time scheduling in WSN. A real-time scheduling strategy (RTS) is proposed in this paper. All tasks are divided into two layers and endued diverse priorities. RTS utilizes a preemptive way to ensure hard real-time scheduling. The experimental results indicate that RTS has a good performance both in communication throughput and over-load.","PeriodicalId":46825,"journal":{"name":"Journal of Information Processing Systems","volume":"5 1","pages":"135-144"},"PeriodicalIF":1.6,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70056814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Empirical Study of Qualities of Association Rules from a Statistical View Point 基于统计的关联规则质量实证研究
IF 1.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2008-03-31 DOI: 10.3745/JIPS.2008.4.1.027
M. Dorn, W. Hou, D. Che, Zhewei Jiang
Minimum support and confidence have been used as criteria for generating association rules in all association rule mining algorithms. These criteria have their natural appeals, such as simplicity; few researchers have suspected the quality of generated rules. In this paper, we examine the rules from a more rigorous point of view by conducting statistical tests. Specifically, we use contingency tables and chi-square test to analyze the data. Experimental results show that one third of the association rules derived based on the support and confidence criteria are not significant, that is, the antecedent and consequent of the rules are not correlated. It indicates that minimum support and minimum confidence do not provide adequate discovery of meaningful associations. The chi-square test can be considered as an enhancement or an alternative solution.
在所有的关联规则挖掘算法中,最小支持度和置信度都被用作生成关联规则的标准。这些标准有其天然的吸引力,比如简单;很少有研究人员怀疑生成规则的质量。在本文中,我们通过进行统计检验,从更严格的角度来检验这些规则。具体来说,我们使用列联表和卡方检验来分析数据。实验结果表明,基于支持度和置信度标准的关联规则中有三分之一是不显著的,即规则的前因式和后因式不相关。这表明,最小的支持和最小的信心不能提供足够的发现有意义的关联。卡方检验可以被认为是一种增强或替代解决方案。
{"title":"An Empirical Study of Qualities of Association Rules from a Statistical View Point","authors":"M. Dorn, W. Hou, D. Che, Zhewei Jiang","doi":"10.3745/JIPS.2008.4.1.027","DOIUrl":"https://doi.org/10.3745/JIPS.2008.4.1.027","url":null,"abstract":"Minimum support and confidence have been used as criteria for generating association rules in all association rule mining algorithms. These criteria have their natural appeals, such as simplicity; few researchers have suspected the quality of generated rules. In this paper, we examine the rules from a more rigorous point of view by conducting statistical tests. Specifically, we use contingency tables and chi-square test to analyze the data. Experimental results show that one third of the association rules derived based on the support and confidence criteria are not significant, that is, the antecedent and consequent of the rules are not correlated. It indicates that minimum support and minimum confidence do not provide adequate discovery of meaningful associations. The chi-square test can be considered as an enhancement or an alternative solution.","PeriodicalId":46825,"journal":{"name":"Journal of Information Processing Systems","volume":"113 1","pages":"404-409"},"PeriodicalIF":1.6,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76675307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Information Processing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1