Computing最新文献

筛选
英文 中文
Dynamic attention guider network 动态注意力引导网络
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-30 DOI: 10.1007/s00607-024-01328-4
Chunguang Yue, Jinbao Li, Qichen Wang, Donghuan Zhang
{"title":"Dynamic attention guider network","authors":"Chunguang Yue, Jinbao Li, Qichen Wang, Donghuan Zhang","doi":"10.1007/s00607-024-01328-4","DOIUrl":"https://doi.org/10.1007/s00607-024-01328-4","url":null,"abstract":"<p>Hybrid networks, benefiting from both CNNs and Transformers architectures, exhibit stronger feature extraction capabilities compared to standalone CNNs or Transformers. However, in hybrid networks, the lack of attention in CNNs or insufficient refinement in attention mechanisms hinder the highlighting of target regions. Additionally, the computational cost of self-attention in Transformers poses a challenge to further improving network performance. To address these issues, we propose a novel point-to-point Dynamic Attention Guider(DAG) that dynamically generates multi-scale large receptive field attention to guide CNN networks to focus on target regions. Building upon DAG, we introduce a new hybrid network called the Dynamic Attention Guider Network (DAGN), which effectively combines Dynamic Attention Guider Block (DAGB) modules with Transformers to alleviate the computational cost of self-attention in processing high-resolution input images. Extensive experiments demonstrate that the proposed network outperforms existing state-of-the-art models across various downstream tasks. Specifically, the network achieves a Top-1 classification accuracy of 88.3% on ImageNet1k. For object detection and instance segmentation on COCO, it respectively surpasses the best FocalNet-T model by 1.6 <span>(AP^b)</span> and 1.5 <span>(AP^m)</span>, while achieving a top performance of 48.2% in semantic segmentation on ADE20K.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"155 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141869711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority-based DAG task offloading and secondary resource allocation in IoT edge computing environments 物联网边缘计算环境中基于优先级的 DAG 任务卸载和二次资源分配
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-29 DOI: 10.1007/s00607-024-01327-5
Yishan Chen, Xiansong Luo, Peng Liang, Junxiao Han, Zhonghui Xu
{"title":"Priority-based DAG task offloading and secondary resource allocation in IoT edge computing environments","authors":"Yishan Chen, Xiansong Luo, Peng Liang, Junxiao Han, Zhonghui Xu","doi":"10.1007/s00607-024-01327-5","DOIUrl":"https://doi.org/10.1007/s00607-024-01327-5","url":null,"abstract":"<p>With the development of IoT, the concept of intelligent services has gradually come to the fore. Intelligent services usually involve a large number of computation intensive tasks with data dependencies that are often modelled as directed acyclic graphs (DAGs), and the offloading of DAG tasks is complex and has proven to be an NP hard challenge. As a key research issue, the task offloading process migrates the computation intensive tasks from resource-constrained IoT devices to nearby edge servers, and pursuing a lower delay and energy consumption. However, data dependencies among tasks are complex, and it is challenging to coordinate the computation intensive tasks among multiple edge servers. In this paper, a flexible and generic DAG task model is built to support the associative task offloading process with complex data dependencies in IoT edge computing environments. Additionally, a priority-based DAG task offloading algorithm and a secondary resource allocation algorithm are proposed to minimize the response delay and improve the resource utilization of edge servers. Experimental results demonstrate that the proposed method can well support the DAG task offloading process with the shortest response delay, while outperforming all the benchmark policies, which is suitable for IoT edge computing environments.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"77 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141869712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of strategies for scalable transaction creation in blockchains 区块链可扩展交易创建策略分析
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-29 DOI: 10.1007/s00607-024-01324-8
Ole Delzer, Richard Hobeck, Ingo Weber, Dominik Kaaser, Michael Sober, Stefan Schulte
{"title":"Analysis of strategies for scalable transaction creation in blockchains","authors":"Ole Delzer, Richard Hobeck, Ingo Weber, Dominik Kaaser, Michael Sober, Stefan Schulte","doi":"10.1007/s00607-024-01324-8","DOIUrl":"https://doi.org/10.1007/s00607-024-01324-8","url":null,"abstract":"<p>The growing popularity of blockchains highlights the need to improve their scalability. While previous research has focused on scaling transaction processing, the scalability of transaction creation remains unexplored. This issue is particularly important for organizations needing to send large volumes of transactions quickly or continuously. Scaling transaction creation is challenging, especially for blockchain platforms like Ethereum, which require transactions to include a sequence number. This paper proposes four different methods to scale transaction creation. Our experimental evaluation assesses the scalability and latency of these methods, identifying two as feasible for scaling transaction creation. Additionally, we provide an in-depth theoretical analysis of these two methods.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"48 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141869710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
$$mu $$ XL: explainable lead generation with microservices and hypothetical answers $$mu $$ XL:利用微服务和假设性答案生成可解释的线索
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-24 DOI: 10.1007/s00607-024-01321-x
Luís Cruz-Filipe, Sofia Kostopoulou, Fabrizio Montesi, Jonas Vistrup
{"title":"$$mu $$ XL: explainable lead generation with microservices and hypothetical answers","authors":"Luís Cruz-Filipe, Sofia Kostopoulou, Fabrizio Montesi, Jonas Vistrup","doi":"10.1007/s00607-024-01321-x","DOIUrl":"https://doi.org/10.1007/s00607-024-01321-x","url":null,"abstract":"<p>Lead generation refers to the identification of potential topics (the ‘leads’) of importance for journalists to report on. In this article we present <span>(mu )</span>XL, a new lead generation tool based on a microservice architecture that includes a component of explainable AI. <span>(mu )</span>XL collects and stores historical and real-time data from web sources, like Google Trends, and generates current and future leads. Leads are produced by a novel engine for hypothetical reasoning based on temporal logical rules, which can identify propositions that may hold depending on the outcomes of future events. This engine also supports additional features that are relevant for lead generation, such as user-defined predicates (allowing useful custom atomic propositions to be defined as Java functions) and negation (needed to specify and reason about leads characterized by the absence of specific properties). Our microservice architecture is designed using state-of-the-art methods and tools for API design and implementation, namely API patterns and the Jolie programming language. Thus, our development provides an additional validation of their usefulness in a new application domain (journalism). We also carry out an empirical evaluation of our tool.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"10 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141778641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic algorithm for an optimal solution of fully fuzzy transportation problem 全模糊运输问题最优解的启发式算法
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-21 DOI: 10.1007/s00607-024-01319-5
Nermin Kartli, Erkan Bostanci, Mehmet Serdar Guzel
{"title":"Heuristic algorithm for an optimal solution of fully fuzzy transportation problem","authors":"Nermin Kartli, Erkan Bostanci, Mehmet Serdar Guzel","doi":"10.1007/s00607-024-01319-5","DOIUrl":"https://doi.org/10.1007/s00607-024-01319-5","url":null,"abstract":"<p>Several problems involving uncertainties can be modeled with fuzzy numbers according to the type of these uncertainties. It is natural to express the solution to such a problem with fuzzy numbers. In this study, we consider the fully fuzzy transportation problem. All input parameters of the problem are expressed with fuzzy numbers given in the parametric form. We propose a new heuristic algorithm to approximate the fuzzy optimal solution. The fuzzy problem is solved by transforming it into two independent parametric problems with the proposed method. We first divide the interval [0, 1] into a sufficiently large number of equal intervals, then write a linear programming problem for each partition point and solve these problems by transforming them into transportation problems. The proposed algorithm is supported by examples.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient hashing technique for malicious profile detection at hypervisor environment 用于在管理程序环境中检测恶意配置文件的高效散列技术
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-19 DOI: 10.1007/s00607-024-01325-7
Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, Nallanthighal Srinivasa Raghava
{"title":"Efficient hashing technique for malicious profile detection at hypervisor environment","authors":"Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, Nallanthighal Srinivasa Raghava","doi":"10.1007/s00607-024-01325-7","DOIUrl":"https://doi.org/10.1007/s00607-024-01325-7","url":null,"abstract":"<p>Attack detection in cyber security systems is one of the complex tasks which require domain specific knowledge and cognitive intelligence to detect novel and unknown attacks from large scale network data. This research explores how the network operations and network security affects the detection of unknown attacks in network systems. A hash based profile matching technique is presented in this paper for attack detection. The main objective of this work is to detect unknown attacks using a profile matching approach in Hypervisors. Hypervisors are characterized by their versatile nature since they allow the utilization of available system resources. The virtual machines (VMs) in the hypervisors are not dependent on the host hardware and as a result, hypervisors are considered advantageous. In addition, hypervisors have direct access to the hardware resources such as memory, storage and processors. However, hypervisors are more susceptible to the security threats which attack each and every VM. A SHA3-512 hashing algorithm used for generating hash values in hypervisor and the proposed model is used to verify whether the profile is malicious or benign. The performance of the hashbased profile matching technique is compared with traditional hash techniques namely SHA-256 and MD5 algorithm. Results show that the proposed SHA3-512 algorithm achieves a phenomenal performance in terms of phenomenal accuracy and zero false positive rates. Simulation results also show that the computation time required by Sha3-512 algorithm is lower compared to SHA-256 and MD5 algorithms. The performance analysis validates that the hash based approach achieves reliable performance for attack detection. The effectiveness of the hashing technique was determined using three different evaluation metrics namely attack DR, FPR, and computational time. Simulation results show that the existing SHA3- 512 algorithm detection rate of 97.24% with zero false positive rate and faster computational time compared to SHA 256 and MD5 algorithms.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"6 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141745628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep recommendation with iteration directional adversarial training 利用迭代定向对抗训练进行深度推荐
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-17 DOI: 10.1007/s00607-024-01326-6
Agyemang Paul, Yuxuan Wan, Zhefu Wu, Boyu Chen, Shufeng Gong
{"title":"Deep recommendation with iteration directional adversarial training","authors":"Agyemang Paul, Yuxuan Wan, Zhefu Wu, Boyu Chen, Shufeng Gong","doi":"10.1007/s00607-024-01326-6","DOIUrl":"https://doi.org/10.1007/s00607-024-01326-6","url":null,"abstract":"<p>Deep neural networks are vulnerable to attacks, posing significant security concerns across various applications, particularly in computer vision. Adversarial training has demonstrated effectiveness in improving the robustness of deep learning models by incorporating perturbations into the input space during training. Recently, adversarial training has been successfully applied to deep recommender systems. In these systems, user and item embeddings are perturbed through a minimax game, with constraints on perturbation directions, to enhance the model’s robustness and generalization. However, they still fail to defend against iterative attacks, which have shown an over 60% increase in effectiveness in the computer vision domain. Deep recommender systems may therefore be more susceptible to iterative attacks, which might lead to generalization failures. In this paper, we adapt iterative examples for deep recommender systems. Specifically, we propose a Deep Recommender with Iteration Directional Adversarial Training (DRIDAT) that combines attention mechanism and directional adversarial training for recommendations. Firstly, we establish a consumer-product collaborative attention to convey consumers different preferences on their interested products and the distinct preferences of different consumers on the same product they like. Secondly, we train the DRIDAT objective function using adversarial learning to minimize the impact of iterative attack. In addition, the maximum direction attack could push the embedding vector of input attacks towards instances with distinct labels. We mitigate this problem by implementing suitable constraints on the direction of the attack. Finally, we perform a series of evaluations on two prominent datasets. The findings show that our methodology outperforms all other methods for all metrics.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"54 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges 数字化医疗保健的联合学习:概念、应用、框架和挑战
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-10 DOI: 10.1007/s00607-024-01317-7
D. N. Sachin, B. Annappa, Sateesh Ambesange
{"title":"Federated learning for digital healthcare: concepts, applications, frameworks, and challenges","authors":"D. N. Sachin, B. Annappa, Sateesh Ambesange","doi":"10.1007/s00607-024-01317-7","DOIUrl":"https://doi.org/10.1007/s00607-024-01317-7","url":null,"abstract":"<p>Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the Covid-19 pandemic, digital transformation has taken place in many domains, especially in the healthcare domain; it has streamlined various healthcare activities. With the advancement in technology concept of telemedicine evolved over the years and led to personalized healthcare and drug discovery. The use of machine learning (ML) technique in healthcare enables healthcare professionals to make a more accurate and early diagnosis. Training these ML models requires a massive amount of data, including patients’ personal data, that need to be protected from unethical use. Sharing these data to train ML models may violate data privacy. A distributed ML paradigm called federated learning (FL) has allowed different medical research institutions, hospitals, and healthcare devices to train ML models without sharing raw data. This survey paper overviews existing research work on FL-related use cases and applications. This paper also discusses the state-of-the-art tools and techniques available for FL research, current shortcomings, and future challenges in using FL in healthcare.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"21 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141587884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring 利用递归图神经网络在预测性监测中进行后缀预测
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-09 DOI: 10.1007/s00607-024-01315-9
Efrén Rama-Maneiro, Juan C. Vidal, Manuel Lama, Pablo Monteagudo-Lago
{"title":"Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring","authors":"Efrén Rama-Maneiro, Juan C. Vidal, Manuel Lama, Pablo Monteagudo-Lago","doi":"10.1007/s00607-024-01315-9","DOIUrl":"https://doi.org/10.1007/s00607-024-01315-9","url":null,"abstract":"<p>Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges is forecasting the sequence of activities that will occur from a given point in time —suffix prediction—. Most approaches to the suffix prediction problem learn to predict the suffix by learning how to predict the next activity only, while also disregarding structural information present in the process model. This paper proposes a novel architecture based on an encoder-decoder model with an attention mechanism that decouples the representation learning of the prefixes from the inference phase, predicting only the activities of the suffix. During the inference phase, this architecture is extended with a heuristic search algorithm that selects the most probable suffix according to both the structural information extracted from the process model and the information extracted from the log. Our approach has been tested using 12 public event logs against 6 different state-of-the-art proposals, showing that it significantly outperforms these proposals.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"35 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141572979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model 利用基于机器学习的预测模型优化云计算中的预复制实时虚拟机迁移
IF 3.7 3区 计算机科学
Computing Pub Date : 2024-07-08 DOI: 10.1007/s00607-024-01318-6
Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan
{"title":"Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model","authors":"Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan","doi":"10.1007/s00607-024-01318-6","DOIUrl":"https://doi.org/10.1007/s00607-024-01318-6","url":null,"abstract":"<p>One of the preconditions for efficient cloud computing services is the continuous availability of services to clients. However, there are various reasons for temporary service unavailability due to routine maintenance, load balancing, cyber-attacks, power management, fault tolerance, emergency incident response, and resource usage. Live Virtual Machine Migration (LVM) is an option to address service unavailability by moving virtual machines between hosts without disrupting running services. Pre-copy memory migration is a common LVM approach used in cloud systems, but it faces challenges due to the high rate of frequently updated memory pages known as dirty pages. Transferring these dirty pages during pre-copy migration prolongs the overall migration time. If there are large numbers of remaining memory pages after a predefined iteration of page transfer, the stop-and-copy phase is initiated, which significantly increases downtime and negatively impacts service availability. To mitigate this issue, we introduce a prediction-based approach that optimizes the migration process by dynamically halting the iteration phase when the predicted downtime falls below a predefined threshold. Our proposed machine learning method was rigorously evaluated through experiments conducted on a dedicated testbed using KVM/QEMU technology, involving different VM sizes and memory-intensive workloads. A comparative analysis against proposed pre-copy methods and default migration approach reveals a remarkable improvement, with an average 64.91% reduction in downtime for different RAM configurations in high-write-intensive workloads, along with an average reduction in total migration time of approximately 85.81%. These findings underscore the practical advantages of our method in reducing service disruptions during live virtual machine migration in cloud systems.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"40 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141572980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信