Journal of Innovation in Digital Ecosystems最新文献

筛选
英文 中文
Rogue behavior detection in NoSQL graph databases NoSQL图数据库中的流氓行为检测
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.004
Arnaud Castelltort, Anne Laurent
{"title":"Rogue behavior detection in NoSQL graph databases","authors":"Arnaud Castelltort,&nbsp;Anne Laurent","doi":"10.1016/j.jides.2016.10.004","DOIUrl":"10.1016/j.jides.2016.10.004","url":null,"abstract":"<div><p>Rogue behaviors refer to behavioral anomalies that can occur in human activities and that can thus be retrieved from human generated data. In this paper, we aim at showing that NoSQL graph databases are a useful tool for this purpose. Indeed these database engines exploit property graphs that can easily represent human and object interactions whatever the volume and complexity of the data. These interactions lead to fraud rings in the graphs in the form of sophisticated chains of indirect links between fraudsters representing successive transactions (money, communications, etc.) from which rogue behaviours are detected. Our work is based on two extensions of such NoSQL graph databases. The first extension allows the handling of time-variant data while the second one is devoted to the management of imprecise queries with a DSL (to define flexible operators and operations with Scala) and the Cypherf declarative flexible query language over NoSQL graph databases. These extensions allow to better address and describe sophisticated frauds. Feasibility have been studied to assess our proposition.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 70-82"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining local process models 挖掘本地流程模型
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.11.001
Niek Tax , Natalia Sidorova , Reinder Haakma , Wil M.P. van der Aalst
{"title":"Mining local process models","authors":"Niek Tax ,&nbsp;Natalia Sidorova ,&nbsp;Reinder Haakma ,&nbsp;Wil M.P. van der Aalst","doi":"10.1016/j.jides.2016.11.001","DOIUrl":"10.1016/j.jides.2016.11.001","url":null,"abstract":"<div><p>In this paper we describe a method to discover frequent behavioral patterns in event logs. We express these patterns as <em>local process models</em>. Local process model mining can be positioned in-between process discovery and episode/sequential pattern mining. The technique presented in this paper is able to learn behavioral patterns involving sequential composition, concurrency, choice and loop, like in process mining. However, we do not look at start-to-end models, which distinguishes our approach from process discovery and creates a link to episode/sequential pattern mining. We propose an incremental procedure for building local process models capturing frequent patterns based on so-called process trees. We propose five quality dimensions and corresponding metrics for local process models, given an event log. We show monotonicity properties for some quality dimensions, enabling a speedup of local process model discovery through pruning. We demonstrate through a real life case study that mining local patterns allows us to get insights in processes where regular start-to-end process discovery techniques are only able to learn unstructured, flower-like, models.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 183-196"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.11.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133283395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Evaluating the descriptive power of Instagram hashtags 评估Instagram标签的描述能力
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.001
Stamatios Giannoulakis, Nicolas Tsapatsoulis
{"title":"Evaluating the descriptive power of Instagram hashtags","authors":"Stamatios Giannoulakis,&nbsp;Nicolas Tsapatsoulis","doi":"10.1016/j.jides.2016.10.001","DOIUrl":"10.1016/j.jides.2016.10.001","url":null,"abstract":"<div><p>Image tagging is an essential step for developing Automatic Image Annotation (AIA) methods that are based on the learning by example paradigm. However, manual image annotation, even for creating training sets for machine learning algorithms, requires hard effort and contains human judgment errors and subjectivity. Thus, alternative ways for automatically creating training examples, i.e., pairs of images and tags, are pursued. In this work, we investigate whether tags accompanying photos in the Instagram can be considered as image annotation metadata. If such a claim is proved then Instagram could be used as a very rich, easy to collect automatically, source of training data for the development of AIA techniques. Our hypothesis is that Instagram hashtags, and especially those provided by the photo owner/creator, express more accurately the content of a photo compared to the tags assigned to a photo during explicit image annotation processes like crowdsourcing. In this context, we explore the descriptive power of hashtags by examining whether other users would use the same, with the owner, hashtags to annotate an image. For this purpose 1000 Instagram images were collected and one to four hashtags, considered as the most descriptive ones for the image in question, were chosen among the hashtags used by the photo owner. An online database was constructed to generate online questionnaires containing 20 images each, which were distributed to experiment participants so they can choose the best suitable hashtag for every image according to their interpretation. Results show that an average of 66% of the participants hashtag choices coincide with those suggested by the photo owners; thus, an initial evidence towards our hypothesis confirmation can be claimed.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 114-129"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Occupancy driven building performance assessment 占用率驱动的建筑性能评估
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.008
Dimosthenis Ioannidis , Pantelis Tropios , Stelios Krinidis , George Stavropoulos , Dimitrios Tzovaras , Spiridon Likothanasis
{"title":"Occupancy driven building performance assessment","authors":"Dimosthenis Ioannidis ,&nbsp;Pantelis Tropios ,&nbsp;Stelios Krinidis ,&nbsp;George Stavropoulos ,&nbsp;Dimitrios Tzovaras ,&nbsp;Spiridon Likothanasis","doi":"10.1016/j.jides.2016.10.008","DOIUrl":"10.1016/j.jides.2016.10.008","url":null,"abstract":"<div><p>In this paper, we focus on the building performance assessment using big data and visual analytics techniques driven by building occupancy. Building occupancy is a paramount factor in building performance, specifically lighting, plug loads and HVAC equipment utilization. Extrapolation of patterns from big data sets, which consist of building information, energy consumption, environmental measurements and namely occupancy information, is a powerful analysis technique to extract useful semantic information about building performance. To this end, visual analytics techniques are exploited to visualize them in a compact and comprehensive way taking into account properties of human cognition, perception and sense making. Visual Analytics facilitates the detailed spatiotemporal analysis building performance in terms of occupancy comfort, building performance and energy consumption and exploits innovative data mining techniques and mechanisms to allow analysts to detect patterns and crucial point that are difficult to be detected otherwise, thus assisting them to further optimize the building’s operation. The presented tool has been tested on real data information acquired from a building located at southern Europe demonstrating its effectiveness and its usability for building managers.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 57-69"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117169013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks pase - li:用于无线传感器网络覆盖的带有位置信息的豌豆
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.11.002
Rachid Beghdad, Mohamed Abdenour Hocini, Narimane Cherchour, Mourad Chelik
{"title":"PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks","authors":"Rachid Beghdad,&nbsp;Mohamed Abdenour Hocini,&nbsp;Narimane Cherchour,&nbsp;Mourad Chelik","doi":"10.1016/j.jides.2016.11.002","DOIUrl":"10.1016/j.jides.2016.11.002","url":null,"abstract":"<div><p>Probing Environment and Adaptive Sleeping (PEAS) is one of the most cited protocols in the literature for coverage in Wireless Sensor Networks (WSNs). PEAS maintains only two variables: the number of received messages N and the period of time T necessary to receive these messages. Sensor nodes do not keep any information about their neighbors. In this paper we present PEAS-LI an extension of PEAS to improve the coverage and connectivity. PEAS-LI operates in two steps, initially we apply PEAS as described in Ye et al. (2003) then the neighbors exchange their state and location information in order to estimate precisely the coverage and to make their decision basing on the gathered information. The alone additional requirement is that PEAS-LI supposes that each node knows its position in the monitored area of interest (AI). PEAS-LI performance evaluation proves that it is a robust protocol with high coverage ratio and that it outperforms PEAS and a set of other protocols.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 163-171"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.11.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127211074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CAS-based information retrieval in semi-structured documents: CASISS model 基于CASISS的半结构化文档信息检索:CASISS模型
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.11.004
Larbi Guezouli , Hassane Essafi
{"title":"CAS-based information retrieval in semi-structured documents: CASISS model","authors":"Larbi Guezouli ,&nbsp;Hassane Essafi","doi":"10.1016/j.jides.2016.11.004","DOIUrl":"10.1016/j.jides.2016.11.004","url":null,"abstract":"<div><p>This paper aims to address the assessment the similarity between documents or pieces of documents. For this purpose we have developed CASISS (CAlculation of SImilarity of Semi-Structured documents) method to quantify how two given texts are similar. The method can be employed in wide area of applications including content reuse detection which is a hot and challenging topic. It can be also used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document (Content Only search — CO) but also the topology (position continuity) of these terms (based on Content And Structure Search — CAS). Tracking the origin of the information in social media, copy right management, plagiarism detection, social media mining and monitoring, digital forensic are among other applications require tools such as CASISS to measure, with a high accuracy, the content overlap between two documents.</p><p>CASISS identify elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of elements descriptors, which characterize the content of the elements.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 155-162"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.11.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Meaning-based machine learning for information assurance 用于信息保障的基于意义的机器学习
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.007
Courtney Falk, Lauren Stuart
{"title":"Meaning-based machine learning for information assurance","authors":"Courtney Falk,&nbsp;Lauren Stuart","doi":"10.1016/j.jides.2016.10.007","DOIUrl":"10.1016/j.jides.2016.10.007","url":null,"abstract":"<div><p>This paper presents meaning-based machine learning, the use of semantically meaningful input data into machine learning systems in order to produce output that is meaningful to a human user where the semantic input comes from the Ontological Semantics Technology theory of natural language processing. How to bridge from knowledge-based natural language processing architectures to traditional machine learning systems is described to include high-level descriptions of the steps taken. These meaning-based machine learning systems are then applied to problems in information assurance and security that remain unsolved and feature large amounts of natural language text.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 141-147"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79982565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data 增强型图形分析平台(GAP)提供大网络数据洞察力
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.005
Anastasios Drosou , Ilias Kalamaras , Stavros Papadopoulos , Dimitrios Tzovaras
{"title":"An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data","authors":"Anastasios Drosou ,&nbsp;Ilias Kalamaras ,&nbsp;Stavros Papadopoulos ,&nbsp;Dimitrios Tzovaras","doi":"10.1016/j.jides.2016.10.005","DOIUrl":"10.1016/j.jides.2016.10.005","url":null,"abstract":"<div><p>Being a widely adapted and acknowledged practice for the representation of inter- and intra-dependent information streams, network graphs are nowadays growing vast in both size and complexity, due to the rapid expansion of sources, types, and amounts of produced data. In this context, the efficient processing of the big amounts of information, also known as Big Data forms a major challenge for both the research community and a wide variety of industrial sectors, involving security, health and financial applications. Serving these emerging needs, the current paper presents a Graph Analytics based Platform (GAP) that implements a top-down approach for the facilitation of Data Mining processes through the incorporation of state-of-the-art techniques, like behavioural clustering, interactive visualizations, multi-objective optimization, etc. The applicability of this platform is validated on 2 istinct real-world use cases, which can be considered as characteristic examples of modern Big Data problems, due to the vast amount of information they deal with. In particular, (i) the root cause analysis of a Denial of Service attack in the network of a mobile operator and (ii) the early detection of an emerging event or a hot topic in social media communities. In order to address the large volume of the data, the proposed application starts with an aggregated overview of the whole network and allows the operator to gradually focus on smaller sets of data, using different levels of abstraction. The proposed platform offers differentiation between different user behaviors that enable the analyst to obtain insight on the network’s operation and to extract the meaningful information in an effortless manner. Dynamic hypothesis formulation techniques exploited by graph traversing and pattern mining, enable the analyst to set concrete network-related hypotheses, and validate or reject them accordingly.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 83-97"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Using neural networks to aid CVSS risk aggregation — An empirically validated approach 使用神经网络来帮助CVSS风险聚合-一种经验验证的方法
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.002
Alexander Beck , Stefan Rass
{"title":"Using neural networks to aid CVSS risk aggregation — An empirically validated approach","authors":"Alexander Beck ,&nbsp;Stefan Rass","doi":"10.1016/j.jides.2016.10.002","DOIUrl":"10.1016/j.jides.2016.10.002","url":null,"abstract":"<div><p>Managing risks in large information infrastructures is often tied to inevitable simplification of the system, to make a risk analysis feasible. One common way of “compacting” matters for efficient decision making is to aggregate vulnerabilities and risks identified for distinct components into an overall risk measure related to an entire subsystem and the system as a whole. Traditionally, this aggregation is done pessimistically by taking the overall risk as the maximum of all individual risks, following the heuristic understanding that the “security chain” is only as strong as its weakest link. As that method is quite wasteful of information, this work proposes a new approach, which uses neural networks to resemble human expert’s decision making in the same regard. To validate the concept, we conducted an empirical study on human expert’s risk assessments, and trained several candidate networks on the empirical data to identify the best approximation to the opinions in our expert group.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 148-154"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123550635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The importance of socio-technical resources for software ecosystems management 社会技术资源对软件生态系统管理的重要性
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.006
Thaiana Lima, Rodrigo Pereira dos Santos, Jonice Oliveira, Cláudia Werner
{"title":"The importance of socio-technical resources for software ecosystems management","authors":"Thaiana Lima,&nbsp;Rodrigo Pereira dos Santos,&nbsp;Jonice Oliveira,&nbsp;Cláudia Werner","doi":"10.1016/j.jides.2016.10.006","DOIUrl":"10.1016/j.jides.2016.10.006","url":null,"abstract":"<div><p>Software Ecosystem (SECO) is often understood as a set of actors interacting among themselves and manipulating artifacts with the support of a common technology platform. Usually, SECO approaches can be designed as an environment whose component repository is gathering stakeholders as well as software products and components. By manipulating software artifacts, a technical network emerges from interactions made over the component repository in order to reuse artifacts, improving code quality, downloading, selling, buying etc. Although technical repositories are essential to store SECO’s artifacts, the interaction among actors in an emerging social network is a key factor to strengthen the SECO’s through increasing actor’s participation, e.g., developing new software, reporting bugs, and communicating with suppliers. In the SECO context, both the internal and external actors keep the platform’s components updated and documented, and even support requirements and suggestions for new releases and bug fixes. However, those repositories often lack resources to support actors’ relationships and consequently to improve the reuse processes by stimulating actors’ interactions, information exchange and better understanding on how artifacts are manipulated by actors. In this paper, we focused on investigating SECO as component repositories that include socio-technical resources. As such, we present a survey that allowed us to identify the relevance of each resource for a SECO based on component repositories, initially focused on the Brazilian scenario. This paper also describes the analysis of the data collected in that survey. Information of other SECO elements extracted from the data is also presented, e.g., the participants’ profile and how they behave within a SECO. As an evolution of our research, a study for evaluating the availability and the use of such resources on top of two platforms was also conducted with experts in collaborative development in order to analyze the usage of the most relevant resources in real SECO’s platforms. We concluded that socio-technical resources have aided collaboration in software development for SECO, coordination of teams based on more knowledge of actor’s tasks and interactions, and monitoring of quality of SECOs’ platforms through the orchestration of the contributions developed by external actors.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 98-113"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信