Global Transitions Proceedings最新文献

筛选
英文 中文
Face mask recogniser using image processing and computer vision approach 人脸识别采用图像处理和计算机视觉的方法
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.016
A.K. Sharadhi , Vybhavi Gururaj , Sahana P. Shankar , M.S. Supriya , Neha Sanjay Chogule
{"title":"Face mask recogniser using image processing and computer vision approach","authors":"A.K. Sharadhi ,&nbsp;Vybhavi Gururaj ,&nbsp;Sahana P. Shankar ,&nbsp;M.S. Supriya ,&nbsp;Neha Sanjay Chogule","doi":"10.1016/j.gltp.2022.04.016","DOIUrl":"10.1016/j.gltp.2022.04.016","url":null,"abstract":"<div><p>The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 67-73"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000528/pdfft?md5=e7bd6ddcdbaa4b2522cc1206ed68c426&pid=1-s2.0-S2666285X22000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Logistic regression technique for prediction of cardiovascular disease 预测心血管疾病的逻辑回归技术
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.008
Ambrish G, Bharathi Ganesh, Anitha Ganesh, Chetana Srinivas, Dhanraj, Kiran Mensinkal
{"title":"Logistic regression technique for prediction of cardiovascular disease","authors":"Ambrish G,&nbsp;Bharathi Ganesh,&nbsp;Anitha Ganesh,&nbsp;Chetana Srinivas,&nbsp;Dhanraj,&nbsp;Kiran Mensinkal","doi":"10.1016/j.gltp.2022.04.008","DOIUrl":"10.1016/j.gltp.2022.04.008","url":null,"abstract":"<div><p>One of the most life-threatening disease is cardiovascular disease. Its high mortality rate contributes to nearly 17 million deaths all over the world. Early diagnosis helps to treat the disease in timely manner to prevent mortality. There are several machine and deep learning techniques available to classify the presence and absence of the disease. In this research, Logistic Regression (LR) techniques is applied to UCI dataset to classify the cardiac disease. To improve the performance of the model, pre-processing of data by Cleaning the dataset, finding the missing values are done and features selection were performed by correlation with the target value for all the feature. The highly positive correlated features were selected. Then classification is performed by dividing the dataset into training. testing in the ratio of 90:10, 80:20, 70:30, 40:60 and 50:50. The splitting ratio of 90:10 gives best accuracy as listed below. The LR model obtained 87.10% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 127-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000449/pdfft?md5=7bc419bd4a0157463d4da7371d5bfdb4&pid=1-s2.0-S2666285X22000449-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80589189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Deepfake detection in digital media forensics 数字媒体取证中的深度造假检测
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.017
Vurimi Veera Venkata Naga Sai Vamsi , Sukanya S. Shet , Sodum Sai Mohan Reddy , Sharon S. Rose , Sona R. Shetty , S. Sathvika , Supriya M. S. , Sahana P. Shankar
{"title":"Deepfake detection in digital media forensics","authors":"Vurimi Veera Venkata Naga Sai Vamsi ,&nbsp;Sukanya S. Shet ,&nbsp;Sodum Sai Mohan Reddy ,&nbsp;Sharon S. Rose ,&nbsp;Sona R. Shetty ,&nbsp;S. Sathvika ,&nbsp;Supriya M. S. ,&nbsp;Sahana P. Shankar","doi":"10.1016/j.gltp.2022.04.017","DOIUrl":"10.1016/j.gltp.2022.04.017","url":null,"abstract":"<div><p>With the development of technology and ease of creation of fake content, the manipulation of media is carried out on a large scale in recent times. The rise of AI altered videos or Deepfake media has posed a great threat to media integrity and is being produced and spread widely across social media platforms, the detection of which is seen to be a major challenge. In this paper, an approach for Deepfake detection has been provided. ResNext, a Convolutional Neural Network (CNN) algorithm and Long Short-Term Memory (LSTM) is used as an approach to detect the Deepfake videos. The approach and its steps are discussed in this paper. The accuracy obtained for the developed Deep-Learning (DL) model over the Celeb-Df dataset is 91%.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 74-79"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200053X/pdfft?md5=2df3d71db7169b57a9eaa3250dfa26e8&pid=1-s2.0-S2666285X2200053X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78471616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Recent trends in wireless and optical fiber communication 无线和光纤通信的最新趋势
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.022
Supreet Kaur , Prabhdeep Singh , Vikas Tripathi , Rajbir Kaur
{"title":"Recent trends in wireless and optical fiber communication","authors":"Supreet Kaur ,&nbsp;Prabhdeep Singh ,&nbsp;Vikas Tripathi ,&nbsp;Rajbir Kaur","doi":"10.1016/j.gltp.2022.03.022","DOIUrl":"10.1016/j.gltp.2022.03.022","url":null,"abstract":"<div><p>The broad spectrum of optical wireless communication meets the needs of high-speed wireless communication, which is optical wireless communication's primary advantage over traditional wireless communication technologies. Optical fiber communications, as significant use of laser technology, are vital facilitators for the contemporary information era. With the rise of new technologies such as the Internet of Things, big data, cloud computing, virtual reality, and artificial intelligence, there is an increasing need in society for high-capacity data transmission, raising the bar for optical fiber communication technology. Many new technologies are coming our way, which has made our lives a lot simpler. But now that this new technology has arrived, we've run out of patience. To do whatever in the shortest possible period. Furthermore, in today's fast-paced society, sluggish walkers are quickly left behind while the rest of the world keeps moving forward. Many innovative methods for speeding up and simplifying our work have been identified. With optical fiber technology, our scientists have achieved a breakthrough, allowing us to go from one place to another in a matter of seconds. Wireless optical fiber communication networks are discussed in this research. This study also illustrates the many difficulties that optical fiber installation and processing face.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 343-348"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000280/pdfft?md5=04120f843f9830d18812033c570d1f7a&pid=1-s2.0-S2666285X22000280-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87877020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An experimental study to recognize and mitigate the malevolent attack in wireless sensors networks 无线传感器网络中恶意攻击识别与缓解的实验研究
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.013
Sankar Padmanabhan , R. Maruthi , R. Anitha
{"title":"An experimental study to recognize and mitigate the malevolent attack in wireless sensors networks","authors":"Sankar Padmanabhan ,&nbsp;R. Maruthi ,&nbsp;R. Anitha","doi":"10.1016/j.gltp.2022.04.013","DOIUrl":"10.1016/j.gltp.2022.04.013","url":null,"abstract":"<div><p>The Wireless Sensor Network (WSN)is applied in several networking situations. It suffers from dissimilar types of attack because of its meagre security mechanisms. The Sinkhole attack is the most destructive attack of WSN. A Reliable Self Reconfiguration (RSR) mechanism has been suggested in this work to eliminate the malicious sinkhole attack from the network. The proposed reliable reconfiguration (RSR)) system consists of two steps. The malicious node is detected and after detection it is corrected without resource loss by using the reconfiguration mechanism. In this paper, the reconfiguration mechanism for correcting sinkhole attack is applied using the C++ built simulator and factors such as Packet Delivery ratio and energy consumption are obtained for estimation The differences in the energy level have been calculated for the three scenarios i.e., Network without attack, Network with sinkhole attack and Network after Reconfiguration. The proposed Reliable Self-Reconfiguration (RSR) method outperforms the various detection mechanisms in finding and eliminating the sinkhole attack.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 55-59"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000498/pdfft?md5=a0d2a40d460de08068032d900421d321&pid=1-s2.0-S2666285X22000498-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81981515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and classification of sunspots via deep convolutional neural network 基于深度卷积神经网络的太阳黑子检测与分类
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.006
Channabasava Chola, J V Biabl Benifa
{"title":"Detection and classification of sunspots via deep convolutional neural network","authors":"Channabasava Chola,&nbsp;J V Biabl Benifa","doi":"10.1016/j.gltp.2022.03.006","DOIUrl":"10.1016/j.gltp.2022.03.006","url":null,"abstract":"<div><p>Sunspots are known to be the most prominent feature of the solar photosphere. Solar activities play a vital role in Space weather which greatly affects the Earth's environment. The appearance of sunspots determines the solar activities and being observed from early eighteenth century. In this work, we have implemented a deep learning model which automatically detects sunspots from MDI and HMI image datasets. Proposed model uses Alexnet based deep convolutional networks to generate promising deep hierarchical features and proposed deep learning approach achieved excellent classification accuracies. Also, model has shown the improved result with MDI data set which is equal to 99.71%, 100%, 100%, and 100 for accuracy, precision, recall, and F-score respectively. This is to construct and build robust and reliable event recognition system to monitor solar activities which are crucial to understanding space weather and for physicists it is an aid for their research.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 177-182"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000103/pdfft?md5=d7996f27757c5666a033ae37f1b5b22b&pid=1-s2.0-S2666285X22000103-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88609559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT-Enabled smart doors for monitoring body temperature and face mask detection 支持物联网的智能门,用于监测体温和口罩检测
Global Transitions Proceedings Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.071
B Varshini, HR Yogesh, Syed Danish Pasha, Maaz Suhail, V Madhumitha, Archana Sasi
{"title":"IoT-Enabled smart doors for monitoring body temperature and face mask detection","authors":"B Varshini,&nbsp;HR Yogesh,&nbsp;Syed Danish Pasha,&nbsp;Maaz Suhail,&nbsp;V Madhumitha,&nbsp;Archana Sasi","doi":"10.1016/j.gltp.2021.08.071","DOIUrl":"10.1016/j.gltp.2021.08.071","url":null,"abstract":"<div><p>COVID 19 pandemic is causing a global health epidemic. The most powerful safety tool is wearing a face mask in public places and everywhere else. The COVID 19 outbreak forced governments around the world to implement lockdowns to deter virus transmission. According to survey reports, wearing a face mask at public places reduces the risk of transmission significantly. In this paper, an IoT-enabled smart door that uses a machine learning model for monitoring body temperature and face mask detection. The proposed model can be used for any shopping mall, hotel, apartment entrance, etc. As an outcome a cost-effective and reliable method of using AI and sensors to build a healthy environment. Evaluation of the proposed framework is done by the Face Mask Detection algorithm using the TensorFlow software library. Besides, the body temperature of the individual is monitored using a non-contact temperature sensor. This proposed system can detect the users from COVID 19 by enabling the Internet of Things (IoT) technology.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 246-254"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84480101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Identification of aromatic coconuts using image processing and machine learning techniques 使用图像处理和机器学习技术识别芳香椰子
Global Transitions Proceedings Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.037
Shrihari Kallapur, Mahith Hegde, Adithya D. Sanil, Raghavendra Pai, Sneha NS
{"title":"Identification of aromatic coconuts using image processing and machine learning techniques","authors":"Shrihari Kallapur,&nbsp;Mahith Hegde,&nbsp;Adithya D. Sanil,&nbsp;Raghavendra Pai,&nbsp;Sneha NS","doi":"10.1016/j.gltp.2021.08.037","DOIUrl":"10.1016/j.gltp.2021.08.037","url":null,"abstract":"<div><p>The paper develops an efficient and accurate method for detecting fresh aromatic coconuts. Coconuts have a nearly cosmopolitan distribution due to human action in using them for agriculture. At present, the only way to determine whether a coconut is aromatic or not is by tasting it. By implementing the IAC (Identification of Aromatic Coconuts) method as proposed in this research, it is possible to identify the aromacy through non-invasive mechanisms with the help of image-processing techniques. The brightness of the image has to be adjusted accordingly for actual implementation. The underlying principle is that the color of the region of interest at the bottom part of the coconut shell is correlated to its age. Segmentation is done on the image via K-Means. The region of interest in RGB color is converted in to HSV and the Threshold is applied to it. After that the amount of white pixels in each layer on the image are measured using Polynomial Regression to obtain the predicted value of aromacy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 441-447"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81373759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring user requirements of network forensic tools 探索网络取证工具的用户需求
Global Transitions Proceedings Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.043
Kousik Barik, Saptarshi Das, Karabi Konar, Bipasha Chakrabarti Banik, Archita Banerjee
{"title":"Exploring user requirements of network forensic tools","authors":"Kousik Barik,&nbsp;Saptarshi Das,&nbsp;Karabi Konar,&nbsp;Bipasha Chakrabarti Banik,&nbsp;Archita Banerjee","doi":"10.1016/j.gltp.2021.08.043","DOIUrl":"10.1016/j.gltp.2021.08.043","url":null,"abstract":"<div><p>Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out tracks of cybercrime to elude alterations. Network forensics procedures use processes to expedite investigation by tracking each original packet and event that is generated in the network. There are many network forensic tools, both open source and commercial versions available in the market. In this work, the result of a survey participated by different experts in open source network forensic tools have been presented. The advantages, challenges, and necessities have been identified for network forensic investigation of such tools. A few open source network forensic tools have been studied and performed a comparative analysis based on six key parameters. Further, two malware datasets are analyzed using open source tools to perform investigation and present a comprehensive network forensic analysis comprising IO graphs, Flow graphs, TCP stream, UDP multicast stream, mac-based analysis, and operating system analysis.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 350-354"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82322685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT in smart cities: A contemporary survey 智慧城市中的物联网:当代调查
Global Transitions Proceedings Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.069
Janani RP , Renuka K , Aruna A , Lakshmi Narayanan K
{"title":"IoT in smart cities: A contemporary survey","authors":"Janani RP ,&nbsp;Renuka K ,&nbsp;Aruna A ,&nbsp;Lakshmi Narayanan K","doi":"10.1016/j.gltp.2021.08.069","DOIUrl":"10.1016/j.gltp.2021.08.069","url":null,"abstract":"<div><p>Smart cities are an important domain that is reaching great heights nowadays. IoT plays an important role in the implementation of smart cities. The people of the country which contains smart cities will be well developed socially, economically and the quality of their knowledge and living will also be developed a lot. The human efforts and time that are spent on doing the works manually will be reduced by bringing up smart cities. The people can be protected from any disaster, natural calamities, and any difficult situations by smart city ecosystem. The construction of smart cities will avoid time wastage in our day-to-day lives by all means. This paper mainly describes on what a smart city is, how it is created, uses, challenges, real-time applications, future scope for smart cities, etc. The IoT technologies used in implementing smart cities, the devices used to implement them are also discussed.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 187-193"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87468360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信