2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

筛选
英文 中文
Humanoid robot based physiotherapeutic assistive trainer for elderly health care 基于人形机器人的老年保健理疗辅助教练
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844199
P. Bhuvaneswari, S. Vignesh, S. Papitha, R. Dharmarajan
{"title":"Humanoid robot based physiotherapeutic assistive trainer for elderly health care","authors":"P. Bhuvaneswari, S. Vignesh, S. Papitha, R. Dharmarajan","doi":"10.1109/ICRTIT.2013.6844199","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844199","url":null,"abstract":"Orthopaedic problems have been a constant and nagging hindrance that has been plaguing the elderly community. The treatment for this requires either medication in hospital or at their home comfort by physiotherapists. The dearth of physiotherapists in India has compounded to this problem. Moreover, the media tools, that are employed to teach physiotherapy, have been found to be monotonous and non-interactive with the patients. In pursuit of finding a solution to this problem, a Physiotherapeutic Assistive Trainer (PAT) for elders using a Humanoid Robot, named Nao has been developed. Seamless interaction between Nao and the elderly patient is achieved using the Text-to-Speech module and sensors present in Nao. Further, it replaces human trainer by carefully monitoring the performance of the elders through the camera, equipped in Nao. The array of physiotherapeutic exercises executed by Nao is repeated when the patient make their request by touching Nao's tactile sensor. The performance of the limb and neck movement depicting the motion of Nao is analysed using ADAMS software. The reliability of the developed application is validated in a real-time environment. From the results obtained, it is inferred that the Humanoid Robot based Physiotherapeutic Trainer will be the scope of near future.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy preserving authentication in VANET for location based services 基于位置服务的VANET中的隐私保护身份验证
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844244
S. Muruganandham, Venkateshkumar Muthusamy, A. Rajasimmavarman, V. Vaidehi
{"title":"Privacy preserving authentication in VANET for location based services","authors":"S. Muruganandham, Venkateshkumar Muthusamy, A. Rajasimmavarman, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844244","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844244","url":null,"abstract":"This paper deals with providing location based services to emergency vehicles and to the ordinary vehicles in a secure manner that needs services in a Vehicular Ad hoc NETwork (VANET). In VANET the vehicles are equipped with the On Board Unit (OBU) in which the developed application obtains the current location of the vehicle and makes updates in the location server and to the Road Side Unit (RSU). The location server is the centralized server that collects all the necessary information like position and the Id of the vehicles that are moving. The emergency vehicle obtains the location of the doctors' vehicle from the location server or from the RSU. Then, the communication phase is established between the vehicles which are based on the Vehicle to Vehicle communication (V2V) model where the vehicles behave as nodes. Thus, by identifying the location information about the vehicle, the privacy of the vehicle users may be revealed. To avoid the issues involved in the privacy of vehicles users, the authentication for the vehicle users has been introduced. The successful authentication preserves the privacy of the vehicle user and establishes the secure communication between the vehicles. The efficiency of the communication is increased by introducing the Trusted Authority (TA). The trusted authority module performs the segregation of sensitive and insensitive messages and only the sensitive messages are encrypted through the pairing technique in the communication phase. Thus, Trusted Authority increases the performance of communication in a secure way between vehicles in emergency situation. The proposed system increases the performance by 19% for 100 characters when compared to existing system.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134049574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis and mode selection of SU-MIMO and MU-MIMO in 802.11ac 802.11ac中SU-MIMO和MU-MIMO的性能分析及模式选择
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844291
A. P. Theeksha, S. Srikanth
{"title":"Performance analysis and mode selection of SU-MIMO and MU-MIMO in 802.11ac","authors":"A. P. Theeksha, S. Srikanth","doi":"10.1109/ICRTIT.2013.6844291","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844291","url":null,"abstract":"IEEE 802.11ac, also known as gigabit Wi-Fi is the latest and emerging wireless local area network (WLAN) standard. The Very High Throughput (VHT) of the order of Gbps can be achieved primarily with two important modifications when compared with the previous 802.11n standard. The first one is the increased number of spatial streams (8 as compared to 4 in 11n standard) and the second one is the support for multi user - multiple input multiple output (MU-MIMO). This paper places key discussions and simulation results pertaining to these two objectives. It also compares the performance of MU-MIMO and single user - multiple input multiple output (SU-MIMO) precoding techniques assuming perfect Channel State Information at the Transmitter (CSIT) for both high and low correlation channels. The paper also introduces a novel algorithm that optimizes the various precoding algorithms by reducing the computational calculations with the mathematical background for the capacity calculations. By analyzing the performances of various precoding schemes used for SU-MIMO and MU-MIMO, the mode switching SNR can be found out. This quantitative measure of SNR is certainly a powerful measure to choose between SU and MU-MIMO and also to serve all the users to the best possible extent. Also, estimation of the mode selection with very less computational effort highlights the advantages of the algorithm over the existing algorithms.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134002630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A radial basis function neural network to recognize handwritten numerals with normalized moment features from skeletons 基于径向基函数神经网络的骨架归一化矩特征手写体数字识别
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844182
N. V. Rao, G. Babu, B. Babu
{"title":"A radial basis function neural network to recognize handwritten numerals with normalized moment features from skeletons","authors":"N. V. Rao, G. Babu, B. Babu","doi":"10.1109/ICRTIT.2013.6844182","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844182","url":null,"abstract":"Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are extracted from the skeleton of the images. Classification is performed with these normalized moment features by a radial basis function neural network. The novelty of this approach is that the normalized moment features from the skeletons gives good recognition rate than the contour images and thinned images with radial basis function neural network. The performance of the proposed work is computed from the error rate. Results of this proposed method on MNIST handwritten numeral database is reported.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117223865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bee routing protocol for intermittently connected mobile networks 间歇连接移动网络的蜂群路由协议
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844201
S. Ramesh, R. Praveen, R. Indira, P. G. Kumar
{"title":"Bee routing protocol for intermittently connected mobile networks","authors":"S. Ramesh, R. Praveen, R. Indira, P. G. Kumar","doi":"10.1109/ICRTIT.2013.6844201","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844201","url":null,"abstract":"The Wireless and the Mobile Networks appear to provide a wide range of applications. The achievement of the real world applications are attained through effective routing. The Intermittently Connected Mobile Network (ICMN) is a sparse network where a full connectivity is never possible. ICMN is a disconnected mobile network and is also a Delay Tolerant Network (DTN) that sustains for higher delays. The routing in a disseminated network is a difficult task. A new routing scheme called Bee Routing Protocol (BRP) is been proposed with a motto of achieving optimal result in delivering the data packet towards the destined node. BRP is proposed with the basis of Bee Colony Optimization technique (BCO). The routing in ICMN is done by means of Bee routing protocol. The efficiency of BRP is enchanted in contrast to existing Epidemic routing and Spray and Wait routing protocols. This paper captivates a novel routing methodology for data transmission in ICMN.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114667228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LabVIEW and digital signal processor implementation of a channel vocoder based model of a cochlear implant LabVIEW和数字信号处理器实现了一种基于通道声码器的人工耳蜗模型
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844195
G. Rachel, S. J. J. Singh, P. Vijayalakshmi
{"title":"LabVIEW and digital signal processor implementation of a channel vocoder based model of a cochlear implant","authors":"G. Rachel, S. J. J. Singh, P. Vijayalakshmi","doi":"10.1109/ICRTIT.2013.6844195","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844195","url":null,"abstract":"A cochlear implant is a prosthetic device used to mimic the function of a cochlea in a person with profound and bilateral hearing loss caused by a damaged inner ear. The current work revolves around the design of real time channel vocoder based model of a cochlear implant in LabVIEW and the TMS320C6713 DSK. First, a uniform band 16-channel vocoder is designed for the analysis and synthesis of English vowels, where filters of 400 Hz bandwidth, with cut off frequencies up to 6200Hz are used, based on MATLAB analysis performed previously. To extend the analysis to words and sentences, short time features, namely, short time energy, short time zero crossing rate and main lobe width of the short time autocorrelation function, are extracted and Gaussian Mixture Modelling (GMM) is used to classify the speech segments as voiced or unvoiced. In an attempt to make the synthetic speech sound natural, the synthesis in the channel vocoder is done using a train of glottal pulses instead of a train of impulses. The intelligibility of the synthetic speech is measured by the Mean Opinion Score (MOS). For a channel vocoder where the synthesis section uses a train of glottal pulses, an MOS of 3.6 is obtained as against 3.5 when a train of impulses is used. The lab model of the cochlear implant, that is, the analysis section of the 16-channel vocoder is then realised in the TMS320C6713 DSK. Individual channel outputs are obtained by programming the DIP switches of the DSK and a DSK_AUDIO16_BASE, a 16-channel audio daughter card, is interfaced with the DSK to obtain the outputs from multiple channels simultaneously.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"39 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114741098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying variable chromosome length genetic algorithm for testing dynamism of web application 应用可变染色体长度遗传算法测试web应用程序的动态性
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844260
Anuja Arora, M. Sinha
{"title":"Applying variable chromosome length genetic algorithm for testing dynamism of web application","authors":"Anuja Arora, M. Sinha","doi":"10.1109/ICRTIT.2013.6844260","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844260","url":null,"abstract":"This paper presents a proficient technique to test all static and dynamic analysis of chosen web application using state machine and variable chromosome length genetic algorithm. We propose a framework to generate user session based state machine model of dynamic behavior of a web application and the technique used to test the correctness of generated state machine is Variable chromosome length genetic algorithm. In this study, the author projected a new reflexive approach User Session based State Machine to test the dynamic content of a web application. This proposed technique will walk through various states of a highly dynamic web application, create a model of the active user session navigational paths and illustrate the dynamic content by means of a Finite State Machine (FSM). We applied Variable chromosome length genetic algorithm(VCL-GA) for generating test cases for proposed framework generated state machine. During test case generation we are refining test cases of generated state machine on progressive refinement manner using proposed VCL-GA. Finally the author depicts comparison of simple GA and variable chromosome length GA. Results shows that variable chromosome length GA gives efficient and better result on large state machine and especially in dynamic behaviors of application results are efficient.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115233533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of pervasive compaction monitoring interface for soil compactor — A GPS/GSM based approach 基于GPS/GSM的土壤压实机普适压实监测接口的开发
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844265
R. Prakash, K. Suresh, B. Venkatalakshmi, S. Vijayakumar
{"title":"Development of pervasive compaction monitoring interface for soil compactor — A GPS/GSM based approach","authors":"R. Prakash, K. Suresh, B. Venkatalakshmi, S. Vijayakumar","doi":"10.1109/ICRTIT.2013.6844265","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844265","url":null,"abstract":"Pervasive computing provides an attractive visionfor the future. Mobile and stationary devices will dynamically connect and coordinate to seamlessly help people to implement their tasks. However, in reality still there are practices which require pervasive monitoring especially in the domain of geo vehicle monitoring. To make the vision of pervasive computing technologies for the geo vehicle monitoring we are integrating technologies like GPS (Global Positioning Technology), GSM (Global System for Mobile) for compaction monitoring. GPS is recently used for wide applications like orbit identification and positioning. GPS need some compatible receivers which support location-awareness using positioning technique like LBS (Location Based System). Soil compaction is a form of physical degradation resulting in densification and distortion of the soil where biological activity, porosity and permeability were reduced, soil strength is increased and soil structure partly destroyed. Monitoring the soil compaction manually in the workspace is not reliable and continuous monitoring by a single person may not be feasible. This would be the motivation to choose wireless communication. The compaction data and the location data will be sent to the server for remote monitoring. GSM will allow us to transmit the data to the remote server. The objective of this paper is to provide better accuracy with low cost GPS receiver's positioning results. This paper makes use of GPS, ARM7/TDMI (LPC2378) family and GSM. NMEA (National Marine Electronics Association) data acquisition from GPS is monitored. Compaction input is interfaced with GPS coordinates. Alerts can be sent from the vehicle to the user mobile phone through GSM communication using AT commands.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework of cross layer based anomaly intrusion detection and self healing model for MANET 一种基于跨层的MANET异常入侵检测和自修复模型框架
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844242
K. Jothilakshmi, G. Usha, S. Bose
{"title":"A framework of cross layer based anomaly intrusion detection and self healing model for MANET","authors":"K. Jothilakshmi, G. Usha, S. Bose","doi":"10.1109/ICRTIT.2013.6844242","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844242","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are most popular area with many applications and it had infrastructure-less environment. As a result, malicious nodes can easily able to interrupt a route and access the communication without authentication. This paper proposes a cross layer intrusion detection system to discover the malicious nodes and different types of Dos attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. This approach used dynamic anomaly detection for efficient detection of anomalies in MANET. This approach include self healing model for repair the attacks during the transaction. Experiments based on simulation (network simulator 2(ns-2) shows that the proposed approach aided by the combination of cross layer technique, performs better than other existing approaches.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124315994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cross layer implementation with multiple descriptive coding to support video streaming in IEEE 802.11e networks 采用多种描述性编码的跨层实现,支持IEEE 802.11e网络中的视频流
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844243
A. Srinivasan, L. Raj, Dhananjay Kumar
{"title":"Cross layer implementation with multiple descriptive coding to support video streaming in IEEE 802.11e networks","authors":"A. Srinivasan, L. Raj, Dhananjay Kumar","doi":"10.1109/ICRTIT.2013.6844243","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844243","url":null,"abstract":"The emergence of different wireless LAN technologies has called for the implementation of various services such as multimedia streaming over these networks. The use of Wireless LANs has changed from simple data transfer to transmission of delay sensitive and bandwidth intense applications like multimedia streaming. The provision of Quality of Service for multiple simultaneous users is a challenge. Multiple Descriptive Coding (MDC) allows to efficiently stream video over variable bit rate channel. In this paper, we use cross layer design with MDC to provide a solution to this challenge. By formulating the network functions such as encoder behavior and MAC scheduling in cross layers can be jointly optimized to provide the best video quality. Our Simulation results shows a improved PSNR, while maintaining upper bound on QoS parameter delay and jitter.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信