首页 > 最新文献

International Journal of Cooperative Information Systems最新文献

英文 中文
Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services 云存储服务中支持哈希函数关键字搜索的安全框架
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-18 DOI: 10.1142/s0218843024500011
P. Punitha, Lakshmana Kumar, S. Revathi, R. Premalatha, R. S. Aiswarya

As with IoT devices, cloud computation increases its applicability to other areas that use the information and puts it in a commonplace that is necessary for computing and analysis. These devices need the cloud to store and retrieve data since they are unable to store and process data on their own. Cloud computing offers a variety of services to consumers, including IaaS, PaaS, and SaaS. The usage of cloud resources for data storage that may be accessible by all users associated with cloud computing is a key disadvantage of cloud computing. Without disclosing the data’s contents, the usage of Public Key Encryptions with Keyword Search (PEKS) secures publicly encrypted keys against third-party search capabilities that are not trustworthy. PEKs provide a security risk every time Interior Keywords Guessing Attacks (IKGA) are discovered in the system since an unauthorized service estimates the keywords in the trapdoor. This issue can be resolved using various methodologies such as the Certificateless Fleshed Public Key Authenticated Encryption of Keyword Search (CL-HPAEKS), which also uses Altered Elliptic Curve Cryptography (MECC), and the Mutation Centred Flower Pollinations Algorithm (CM-FPA), which uses optimization in keys to be improving the algorithm’s performance. The system’s security is achieved by adding a Message Fragments 5 (MD5) scramble mechanism. The proposed system achieves system security of 96%, and it takes less time to implement than earlier encryption methods.

与物联网设备一样,云计算提高了其在使用信息的其他领域的适用性,并将其置于计算和分析所必需的普通环境中。这些设备需要云来存储和检索数据,因为它们自己无法存储和处理数据。云计算为消费者提供各种服务,包括 IaaS、PaaS 和 SaaS。使用云计算资源存储数据可能会被所有与云计算相关的用户访问,这是云计算的一个主要缺点。在不泄露数据内容的情况下,使用带有关键字搜索功能的公开密钥加密(PEKS)可确保公开加密密钥的安全,防止第三方搜索功能不可信。每当系统中发现内部关键词猜测攻击(IKGA)时,PEK 就会带来安全风险,因为未经授权的服务会估算陷阱门中的关键词。这个问题可以通过各种方法来解决,如关键词搜索的无证书有肉公钥认证加密(CL-HPAEKS),它也使用了椭圆曲线加密法(MECC),以及突变中心花粉算法(CM-FPA),它使用优化密钥来提高算法的性能。系统的安全性是通过添加信息碎片 5 (MD5) 加扰机制实现的。与早期的加密方法相比,拟议系统的系统安全性达到 96%,而且实施时间更短。
{"title":"Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services","authors":"P. Punitha, Lakshmana Kumar, S. Revathi, R. Premalatha, R. S. Aiswarya","doi":"10.1142/s0218843024500011","DOIUrl":"https://doi.org/10.1142/s0218843024500011","url":null,"abstract":"<p>As with IoT devices, cloud computation increases its applicability to other areas that use the information and puts it in a commonplace that is necessary for computing and analysis. These devices need the cloud to store and retrieve data since they are unable to store and process data on their own. Cloud computing offers a variety of services to consumers, including IaaS, PaaS, and SaaS. The usage of cloud resources for data storage that may be accessible by all users associated with cloud computing is a key disadvantage of cloud computing. Without disclosing the data’s contents, the usage of Public Key Encryptions with Keyword Search (PEKS) secures publicly encrypted keys against third-party search capabilities that are not trustworthy. PEKs provide a security risk every time Interior Keywords Guessing Attacks (IKGA) are discovered in the system since an unauthorized service estimates the keywords in the trapdoor. This issue can be resolved using various methodologies such as the Certificateless Fleshed Public Key Authenticated Encryption of Keyword Search (CL-HPAEKS), which also uses Altered Elliptic Curve Cryptography (MECC), and the Mutation Centred Flower Pollinations Algorithm (CM-FPA), which uses optimization in keys to be improving the algorithm’s performance. The system’s security is achieved by adding a Message Fragments 5 (MD5) scramble mechanism. The proposed system achieves system security of 96%, and it takes less time to implement than earlier encryption methods.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140169926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Computing Security of Mobile Communication System Based on Computer Algorithms 基于计算机算法的移动通信系统边缘计算安全性
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-09 DOI: 10.1142/s0218843024500023
Jinna Zhang

With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.

近年来,随着信息技术的进步,移动通信系统边缘计算(EC)已广泛应用于各行各业,但传统的移动通信系统EC模式存在隐私泄露、恶意篡改、病毒攻击等安全问题。计算机算法为边缘计算在移动通信系统中的应用带来了新的活力。本文选取 20 位用户作为研究对象,分析了计算机算法在移动通信系统 EC 模式中的应用。本文采用传统计算模式(如云计算)和基于计算机算法的移动通信系统EC安全研究。本文比较了两种模式对安全性能、数据传输效率、能耗、成本节约和用户满意度的影响。本文的实验结果表明,基于计算机算法的移动通信系统 EC 模式的平均安全性为 84%,平均数据传输时间为 4.8s。能耗为 40%,成本节约为 43.2 万元,用户满意度为 13 分。两者均优于传统的边缘计数模式。采用计算机算法的移动通信系统 EC 模式可以显著提高移动通信的安全性、数据传输速度、成本节约、用户满意度,并降低能耗。该模式对社会发展具有重要的意义和价值。
{"title":"Edge Computing Security of Mobile Communication System Based on Computer Algorithms","authors":"Jinna Zhang","doi":"10.1142/s0218843024500023","DOIUrl":"https://doi.org/10.1142/s0218843024500023","url":null,"abstract":"<p>With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8<span><math altimg=\"eq-00001.gif\" display=\"inline\" overflow=\"scroll\"><mspace width=\".17em\"></mspace></math></span><span></span>s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAIKD: Tesla stock prediction based on Twitter comments' sentiment feature extraction and ensemble networks CAIKD:基于推特评论情感特征提取和集合网络的特斯拉股票预测
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500072
Zilan Cao, Senyao Hu, Hangyu Cao, Zheng Tao
{"title":"CAIKD: Tesla stock prediction based on Twitter comments' sentiment feature extraction and ensemble networks","authors":"Zilan Cao, Senyao Hu, Hangyu Cao, Zheng Tao","doi":"10.1142/s0218843024500072","DOIUrl":"https://doi.org/10.1142/s0218843024500072","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACSICS: Deep Learning Modified Reinforcement Learning with Virtual Machine Consolidation for Energy-Efficient Resource Allocation in Cloud Computing ACSICS:深度学习改进型强化学习与虚拟机整合,实现云计算中的高能效资源分配
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500059
Chiranjit Dutta, R.M Rani, Amar Jain, I. Poonguzhali, D. Salunke, Ruchi Patel
{"title":"ACSICS: Deep Learning Modified Reinforcement Learning with Virtual Machine Consolidation for Energy-Efficient Resource Allocation in Cloud Computing","authors":"Chiranjit Dutta, R.M Rani, Amar Jain, I. Poonguzhali, D. Salunke, Ruchi Patel","doi":"10.1142/s0218843024500059","DOIUrl":"https://doi.org/10.1142/s0218843024500059","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: Privacy Preserving Wireless Sensor Networks For E-Healthcare Applications IMRCDS:用于电子医疗应用的隐私保护无线传感器网络
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500060
Amani K. Samha, Ghalib H. Alshammri, Niroj Kumar Pani, Yogesh Misra, V. Kolluru
{"title":"IMRCDS: Privacy Preserving Wireless Sensor Networks For E-Healthcare Applications","authors":"Amani K. Samha, Ghalib H. Alshammri, Niroj Kumar Pani, Yogesh Misra, V. Kolluru","doi":"10.1142/s0218843024500060","DOIUrl":"https://doi.org/10.1142/s0218843024500060","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Practitioner-Centric Heterogeneous Network Powered Efficient E-Healthcare Risk Prediction On Health Big Data 基于健康大数据的以医生为中心的异构网络支持高效电子医疗风险预测
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500126
P. Sathyaprakash, Poovendran Alagarsundaram, Mohanarangan Veerapperumal Devarajan, Ahmed Alkhayyat, Parthasarathy Poovendran, D. R. Rani, V. Savitha
{"title":"Medical Practitioner-Centric Heterogeneous Network Powered Efficient E-Healthcare Risk Prediction On Health Big Data","authors":"P. Sathyaprakash, Poovendran Alagarsundaram, Mohanarangan Veerapperumal Devarajan, Ahmed Alkhayyat, Parthasarathy Poovendran, D. R. Rani, V. Savitha","doi":"10.1142/s0218843024500126","DOIUrl":"https://doi.org/10.1142/s0218843024500126","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: Analysis of Influencing Factors of Economic Management Decision of Commercial Banks Based on Big Data Intelligent Decision IMRCDS:基于大数据智能决策的商业银行经济管理决策影响因素分析
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500114
Weijian Yang, Han Yang
{"title":"IMRCDS: Analysis of Influencing Factors of Economic Management Decision of Commercial Banks Based on Big Data Intelligent Decision","authors":"Weijian Yang, Han Yang","doi":"10.1142/s0218843024500114","DOIUrl":"https://doi.org/10.1142/s0218843024500114","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACSICS: Depth-guided filtering-based null-domain background suppression for graphic image enhancement in visual communication design ACSICS:基于深度引导滤波的空域背景抑制,用于视觉传达设计中的图形图像增强
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500102
Tian Xia
{"title":"ACSICS: Depth-guided filtering-based null-domain background suppression for graphic image enhancement in visual communication design","authors":"Tian Xia","doi":"10.1142/s0218843024500102","DOIUrl":"https://doi.org/10.1142/s0218843024500102","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CC2530-based wireless data long-distance communication simulation design and application 基于 CC2530 的无线数据长途通信仿真设计与应用
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500047
Yuling Zhang
{"title":"CC2530-based wireless data long-distance communication simulation design and application","authors":"Yuling Zhang","doi":"10.1142/s0218843024500047","DOIUrl":"https://doi.org/10.1142/s0218843024500047","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139525938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: Study on Soft Sensing Model of Multi-component System Concentration Based on Linear Superposition of Single Molecule System IMRCDS: 基于单分子系统线性叠加的多组分系统浓度软传感模型研究
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500084
Jiangting Song, Fujiang Jin, Li-chun Zhou
{"title":"IMRCDS: Study on Soft Sensing Model of Multi-component System Concentration Based on Linear Superposition of Single Molecule System","authors":"Jiangting Song, Fujiang Jin, Li-chun Zhou","doi":"10.1142/s0218843024500084","DOIUrl":"https://doi.org/10.1142/s0218843024500084","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139526273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cooperative Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1