International Journal of Information Technology and Computer Science最新文献

筛选
英文 中文
Development of an Interactive Dashboard for Analyzing Autism Spectrum Disorder (ASD) Data using Machine Learning 使用机器学习分析自闭症谱系障碍(ASD)数据的交互式仪表板的开发
International Journal of Information Technology and Computer Science Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.02
A. Saha, Dibakar Barua, Mahbub C. Mishu, Ziad Mohib, Sumaya Binte Zilani Choya
{"title":"Development of an Interactive Dashboard for Analyzing Autism Spectrum Disorder (ASD) Data using Machine Learning","authors":"A. Saha, Dibakar Barua, Mahbub C. Mishu, Ziad Mohib, Sumaya Binte Zilani Choya","doi":"10.5815/ijitcs.2022.04.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.02","url":null,"abstract":"Autism Spectrum Disorder (ASD) is a neuro developmental disorder that affects a person's ability to communicate and interact with others for rest of the life. It affects a person's comprehension and social interactions. Furthermore, people with ASD experience a wide range of symptoms, including difficulties while interacting with others, repeated behaviors, and an inability to function successfully in other areas of everyday life. Autism can be diagnosed at any age and is referred to as a \"behavioral disorder\" since symptoms usually appear in the life's first two years. The majority of individuals are unfamiliar with the illness and so don't know whether or not a person is disordered. Rather than aiding the sufferer, this typically leads to his or her isolation from society. The problem with ASD starts in childhood and extends into adolescence and adulthood. In this paper, we studied 25 research articles on autism spectrum disorder (ASD) prediction using machine learning techniques. The data and findings of those publications using various approaches and algorithms are analyzed. Techniques are primarily assessed using four publicly accessible non-clinically ASD datasets. We found that support vector machine (SVM) and Convolutional Neural Network (CNN) provides most accurate results compare to other techniques. Therefore, we developed an interactive dashboard using Tableau and Python to analyze Autism data.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment Client-server环境下基于智能手机的门禁管理生物认证方案
International Journal of Information Technology and Computer Science Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.04
S. A. Lone, A. H. Mir
{"title":"Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment","authors":"S. A. Lone, A. H. Mir","doi":"10.5815/ijitcs.2022.04.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.04","url":null,"abstract":"As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual attempting to ascertain is the individual in question. Thus, resulting in a more reliable, usable, and cost-effective model with a higher level of protection to deter an attacker from obtaining entry to a computer or network and gaining access to confidential data. This paper introduces a novel fingerprint-based authentication scheme for mobile environments, enabling user authentication based on fingerprint features using a challenge-response-based authentication process. In this study, the proposed authentication system has been developed on a real Android-based smartphone, tested on actual users, and performance analysis has been carried out; empirical results reveal that the proposed authentication scheme achieves increased performance. Moreover, a usability analysis has been done to determine efficiency, effectiveness, and user satisfaction. The evaluation results indicate its feasibility to use it as an effective authentication mechanism for mobile phone environments.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN 基于RFID的车辆收费系统的UML和SPN定量分析
International Journal of Information Technology and Computer Science Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.03
R. Khan
{"title":"Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN","authors":"R. Khan","doi":"10.5815/ijitcs.2022.04.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.03","url":null,"abstract":"This paper focuses on the quantitative analysis of RFID based vehicle toll collection system. Since we conduct the quantitative analysis long before the implementation of the infrastructure, the approach is realized by the UML and SPN to capture the system dynamics and carry out multiple performance tests of the possible infrastructure. Thus, the performance tests ensure the installation of correct number of RFID vehicle toll collection booth in the entrance of a bridge or a highway so that the traffic congestion can be kept as minimal as possible as well as financial viability can be confirmed. We analyze the response time and throughput to know the maximum limit for the diverse number of arrival vehicles that is served by the different number of toll booths. This finally gives us a better understanding of the number of units necessary for toll collection to decrease the traffic congestion in a budget constraint manner.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions 尼日利亚本地云计算服务的采用:挑战和解决方案
International Journal of Information Technology and Computer Science Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.01
Emoghene Ogidiaka, F. Ogwueleka, Martins E. Irhebhude, Ugochi Orji
{"title":"Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions","authors":"Emoghene Ogidiaka, F. Ogwueleka, Martins E. Irhebhude, Ugochi Orji","doi":"10.5815/ijitcs.2022.04.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.01","url":null,"abstract":"Cloud momentum seems unstoppable in Nigeria, as businesses and organizations in the country see less and less advantage in the slog of maintaining their infrastructure. The shift to the cloud in today's COVID-19 driven world has created an opportunity for investments to improve local cloud computing services. However, there are key challenges that must be addressed by the local cloud service providers in the country in order not to lose out to the foreign cloud service providers. This paper assessed the challenges to local cloud computing services adoption among sixty-seven (67) businesses and organizations in Nigeria. The research employed a non-probability purposive sampling approach. The surveyed data were obtained through an online form which was distributed via Linkedln. Descriptive and inferential analysis was used in analyzing the collected data via IBM SPSS software. Findings from the research showed the key challenges to include inadequate awareness of local cloud service vendors, poor innovation and local content, inadequate cloud infrastructure, local cloud vendor interoperability issue, national insecurity, shortages in skilled personnel, Service Level Agreement (SLA), security strategies, privacy, compliance terms, and requirements issues. Thus, adequate local cloud service offerings, skilled personnel, and the IT infrastructural backbone of the country have to be well established to increase the trust in local cloud computing, open up Nigeria to offshore markets while driving economic competitiveness and growth.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating Preference Changes through Users’ Input in Collaborative Filtering Movie Recommender System 协同过滤电影推荐系统中用户输入的偏好变化
International Journal of Information Technology and Computer Science Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.05
Abba Almu, Aliyu Ahmad, A. Roko, M. Aliyu
{"title":"Incorporating Preference Changes through Users’ Input in Collaborative Filtering Movie Recommender System","authors":"Abba Almu, Aliyu Ahmad, A. Roko, M. Aliyu","doi":"10.5815/ijitcs.2022.04.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.05","url":null,"abstract":"The usefulness of Collaborative filtering recommender system is affected by its ability to capture users' preference changes on the recommended items during recommendation process. This makes it easy for the system to satisfy users' interest over time providing good and quality recommendations. The Existing system studied fails to solicit for user inputs on the recommended items and it is also unable to incorporate users' preference changes with time which lead to poor quality recommendations. In this work, an Enhanced Movie Recommender system that recommends movies to users is presented to improve the quality of recommendations. The system solicits for users' inputs to create a user profiles. It then incorporates a set of new features (such as age and genre) to be able to predict user's preference changes with time. This enabled it to recommend movies to the users based on users new preferences. The experimental study conducted on Netflix and Movielens datasets demonstrated that, compared to the existing work, the proposed work improved the recommendation results to the users based on the values of Precision and RMSE obtained in this study which in turn returns good recommendations to the users.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hierarchical Document Clustering Framework on Large TREC Biomedical Documents 大型TREC生物医学文档的层次化聚类框架
International Journal of Information Technology and Computer Science Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.02
P. Kumari, M. Jeeva, C. Satyanarayana
{"title":"A Novel Hierarchical Document Clustering Framework on Large TREC Biomedical Documents","authors":"P. Kumari, M. Jeeva, C. Satyanarayana","doi":"10.5815/ijitcs.2022.03.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.02","url":null,"abstract":"The growth of microblogging sites such as Biomedical, biomedical, defect, or bug databases makes it difficult for web users to share and express their context identification of sequential key phrases and their categories on text clustering applications. In the traditional document classification and clustering models, the features associated with TREC texts are more complex to analyze. Finding relevant feature-based key phrase patterns in the large collection of unstructured documents is becoming increasingly difficult, as the repository's size increases. The purpose of this study is to develop and implement a new hierarchical document clustering framework on a large TREC data repository. A document feature selection and clustered model are used to identify and extract MeSH related documents from TREC biomedical clinical benchmark datasets. Efficiencies of the proposed model are indicated in terms of computational memory, accuracy, and error rate, as demonstrated by experimental results.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontologies as Building Blocks of Cloud Security 本体作为云安全的构建块
International Journal of Information Technology and Computer Science Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.05
N. Shaikh, Affan Yasin, R. Fatima
{"title":"Ontologies as Building Blocks of Cloud Security","authors":"N. Shaikh, Affan Yasin, R. Fatima","doi":"10.5815/ijitcs.2022.03.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.05","url":null,"abstract":"Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS. Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132919890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of a Mobile-Based Hostel Location and Recommendation Chatbot System 基于移动的旅舍定位与推荐聊天机器人系统的开发
International Journal of Information Technology and Computer Science Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.03
F. Isinkaye, Imran Gbolahan AbiodunBabs, M. Paul
{"title":"Development of a Mobile-Based Hostel Location and Recommendation Chatbot System","authors":"F. Isinkaye, Imran Gbolahan AbiodunBabs, M. Paul","doi":"10.5815/ijitcs.2022.03.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.03","url":null,"abstract":"A Chabot is a conversational intelligent agent that has the capability of engaging in human-like interaction with its users. A lot of chatbots have been developed, but to the best of our knowledge, there are few or no chatbots that have been developed for hostel location integrated with a recommendation component to ease the cost, time, and stress of identifying suitable hostels for students, especially at higher institutions of learning. Therefore, this work develops a location-based chatbot system enhanced with recommendation capabilities to allow students to locate hostels that satisfy their needs in an easy and efficient way. The chatbot system was designed as a cross platform compatibility application with different tools and technologies which include Python, HTML and CSS with JavaScript to enhance the interactivity and attractiveness of the system. PHP provides access to MySQL database. The chatbot system provides good experience to its users in terms of loading speed, user friendliness, interface appearance, platform compatibility and recommendation accuracy as it allows them identify suitable hostel speedily and as well provides personalized recommendation of hostels to them.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay and Energy Optimized Safety Information Dissemination Scheme in V2I Networks V2I网络中时延和能量优化的安全信息传播方案
International Journal of Information Technology and Computer Science Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.04
Ramesh B. Koti, M. Kakkasageri
{"title":"Delay and Energy Optimized Safety Information Dissemination Scheme in V2I Networks","authors":"Ramesh B. Koti, M. Kakkasageri","doi":"10.5815/ijitcs.2022.03.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.04","url":null,"abstract":"Intelligent Transport System (ITS) is a transport system that uses communicating technologies such as cellular network communication, digital video broadcasting and adhoc wireless communication to link people on the road, vehicles with aim of solving various traffic related issues. Vehicle to infrastructure (V2I) communication is an important research area to develop cooperative self-driving support system using DSRC technology. V2I develops an environment friendly system that also accelerates the fuel efficiency by establishing high quality links between vehicles to roadside infrastructure. It is a system to prevent and help drivers to overlooking or missing the red lights at junctions. V2I system along the road side and intersections continuously transmit the traffic signal information to vehicles by warning the driver about red lights and thus help us to prevent road rule violations. ITS helps to prevent drivers' oversight about signals right/left turn collision avoidance and timely activation of brake system. In the proposed work we used a three-layer Vehicle to Infrastructure (V2I) network architecture to collect and disseminate the safety information using static and dynamic agents. These methods help us to quickly selecting high quality error free links to forward the data packets. In a highway road scenario with moderate traffic density, the proposed system gives an improved performance in terms of coverage area, lossless transmission and reduced latency. Finally, qualitative comparison is made with present V2I system and found significance improvement in its performance metrics. The outcome of the proposed system improved by 23%, 13%, 15% compared to the existing system in terms of end-to-end delay, communication overhead and energy consumption respectively considering V2I network architecture.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127200386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability Assessment for Open-Source Software Using Deterministic and Probabilistic Models 基于确定性和概率模型的开源软件可靠性评估
International Journal of Information Technology and Computer Science Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.01
Islam S. Ramadan, H. Harb, Hamdy M. Mousa, Mohammed G. Malhat
{"title":"Reliability Assessment for Open-Source Software Using Deterministic and Probabilistic Models","authors":"Islam S. Ramadan, H. Harb, Hamdy M. Mousa, Mohammed G. Malhat","doi":"10.5815/ijitcs.2022.03.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.01","url":null,"abstract":"Nowadays, computer software plays a significant role in all fields of our life. Essentially open-source software provides economic benefits for software companies such that it allows building new software without the need to create it from scratch. Therefore, it is extremely used, and accordingly, open-source software’s quality is a critical issue and one of the top research directions in the literature. In the development cycles of the software, checking the software reliability is an important indicator to release software or not. The deterministic and probabilistic models are the two main categories of models used to assess software reliability. In this paper, we perform a comparative study between eight different software reliability models: two deterministic models, and six probabilistic models based on three different methodologies: perfect debugging, imperfect debugging, and Gompertz distribution. We evaluate the employed models using three versions of a standard open-source dataset which is GNU’s Not Unix Network Object Model Environment projects. We evaluate the employed models using four evaluation criteria: sum of square error, mean square error, R-square, and reliability. The experimental results showed that for the first version of the open-source dataset SRGM-4 based on imperfect debugging methodology achieved the best reliability result, and for the last two versions of the open-source dataset SRGM-6 based on Gompertz distribution methodology achieved the best reliability result in terms of sum of square error, mean square error, and R-square.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信