Journal of Engineering and Applied Sciences最新文献

筛选
英文 中文
Research on Self-Propagating High-Temperature Synthesis of Ceramic Matrix Composites 陶瓷基复合材料自传播高温合成研究
Journal of Engineering and Applied Sciences Pub Date : 2023-08-22 DOI: 10.11648/j.eas.20230804.13
Deshui Yu, Yan Zhang, Jianping Zhou, Daqian Sun, Hongmei Li
{"title":"Research on Self-Propagating High-Temperature Synthesis of Ceramic Matrix Composites","authors":"Deshui Yu, Yan Zhang, Jianping Zhou, Daqian Sun, Hongmei Li","doi":"10.11648/j.eas.20230804.13","DOIUrl":"https://doi.org/10.11648/j.eas.20230804.13","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79414464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Opportunities of Irrigated Wheat (Triticum Estievum L.) Production in Jimma Zone South West Ethiopia: A Review 灌溉小麦面临的挑战与机遇埃塞俄比亚西南部Jimma地区的生产综述
Journal of Engineering and Applied Sciences Pub Date : 2023-08-04 DOI: 10.11648/j.eas.20230804.12
Etefa Tilahun Ashine
{"title":"Challenges and Opportunities of Irrigated Wheat (<i>Triticum Estievum</i> L.) Production in Jimma Zone South West Ethiopia: A Review","authors":"Etefa Tilahun Ashine","doi":"10.11648/j.eas.20230804.12","DOIUrl":"https://doi.org/10.11648/j.eas.20230804.12","url":null,"abstract":": Wheat Production Initiative was designed to make the country self-sufficient in wheat production. The highlands of the central, south-eastern, and North West parts of the country are the main wheat-growing areas, however, there was no/little experience of wheat production in the lowland. Poor irrigation management that results in either excessive or inadequate water application can significantly reduce the potential for profitability. Increasing irrigation efficiency by applying improved water management strategies could be the prime objective for sustainable irrigated agriculture. In Jimma zone, even though there are a plenty of available natural resources such as land, water and suitable agro-ecology, there were some water deficit because of their location (physical nature) in the gorges and not suitable for surface irrigation and demand sophisticated irrigation technology. In this study different literatures were seen in addition to site observation at different irrigated wheat cluster farming to identify the different challenges and opportunities of irrigated wheat production. The major challenges for the production of irrigated wheat in Jimma zone were limited study on the suitability of the specific area of land for irrigated wheat farming, limited agricultural inputs, in adequate and low performance of small scale irrigation schemes, disease and pest problem, lack of market access, lack of financial support for irrigated wheat, and low quality of wheat products. Availability of water resources and irrigable land and high demand of wheat from the consumer side are among the opportunities that encourage farmers and other stakeholders to involve in the irrigated wheat production in Jimma Zone. The quality of irrigated wheat has to get an attention from the producer side.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80254316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of Radio-Waste from TRIGA II Research Reactor and Assessment of Corresponding Radiation Dose in Bangladesh 孟加拉TRIGA II研究堆放射性废物特性及辐射剂量评估
Journal of Engineering and Applied Sciences Pub Date : 2023-08-04 DOI: 10.11648/j.eas.20230804.11
R. Moshiur, K. Islam, Humaira Takia, Khokon Hossen, Moinul Islam, S. Ghose
{"title":"Characterization of Radio-Waste from TRIGA II Research Reactor and Assessment of Corresponding Radiation Dose in Bangladesh","authors":"R. Moshiur, K. Islam, Humaira Takia, Khokon Hossen, Moinul Islam, S. Ghose","doi":"10.11648/j.eas.20230804.11","DOIUrl":"https://doi.org/10.11648/j.eas.20230804.11","url":null,"abstract":": During the reactor operation a significant amount of high and intermediate level radioactive wastes are inevitably raised, which are managed and finally disposed of with particular care. The ion exchange resin is used to purify water during the operation of 3 MW TRIGA Mark II research reactor in Bangladesh, when the decontamination efficiency is insufficient to maintain the required primary coolant quality. Five spent ion exchange resin samples and eleven liquid samples from exhausted coolant of 3 MW TRIGA Mark II research reactor were analyzed by using HPGe detector having 40% relative efficiency and 1.8 keV resolution coupled with computer-based MCA. Two radionuclides 54 Mn, 60 Co have been recognized in the spent ion-exchange resin and three radionuclides such as 137 Cs, 60 Co, and 65 Zn have been identified in the liquid radio wastes samples. The specific activity concentrations of these nuclides and the Inhalation dose for the corresponding nuclide for different body parts such as bladder, Bone surface, Brain, Breast, Stomach, Kidneys, Liver, Red Marrow, lungs, Skin and Thyroid for public are also evaluated according to the ICRP 68. Rad Toolbox software was used for the assessment. The maximum inhalation dose is originated from 137 Cs and lung is found to be the maximum radiation sensitive organ, received maximum dose of 53.5 m Sv from 60 Co (1332 keV). The experiment results would be helpful to develop a policy for radioactive waste management that produced during the operation and maintenance of a research reactor.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85476794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Forward Kinematics of 2R Robotic Arm 2R机械臂正运动学分析
Journal of Engineering and Applied Sciences Pub Date : 2023-05-18 DOI: 10.11648/j.eas.20230802.11
Fatima Mohammad Amin
{"title":"Analysis of Forward Kinematics of 2R Robotic Arm","authors":"Fatima Mohammad Amin","doi":"10.11648/j.eas.20230802.11","DOIUrl":"https://doi.org/10.11648/j.eas.20230802.11","url":null,"abstract":": In Kinematics, the analysis of acceleration and velocity is usually done whereas the forces are neglected. The machine’s smallest unit is the link, which is akin to a cell in the human body. Robotics is built on the foundation of machines. A pair is established by the combination of links which leads to the construction of linkage. A mechanical linkage is a collection of bodies that are connected to control forces and movement. The combination of linkage (also known as Mechanism) generates Machine. The robot’s kinematics equations are used in robotics, video games and animation. Inverse kinematics is the mathematical process of determining variable joint parameters necessary to place an object at the end of a kinematic chain in a specific position and orientation with respect to the start of the chain, such as robot manipulator or skeleton of an animated character. The role of Forward and Inverse Kinematics in a 2R Robotic Arm are studied with successful demonstrations. Forward Kinematics of a 2R Robotic Arm using Matlab and Python confirming similar results are exhibited (Figure 8 and Figure 9). Matlab illustrated 2D Path Tracing for 2R Robotic Arm with Inverse Kinematics. Finally, inverse kinematics of 2R Robotic Arm in Matlab using fuzzy logic is modelled successfully. Thus, it helps in the understanding of kinematics and can be used in the simulation of machines.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91193663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Bi-Stable Vibration Energy Harvesting System Using Duffing-Type Motion Model 基于duffing型运动模型的双稳态振动能量收集系统的开发
Journal of Engineering and Applied Sciences Pub Date : 2023-03-21 DOI: 10.11648/j.eas.20230801.12
Xuguang Zhang, Wei Zhao, Jingchao Guan, Apollo B. Fukuchi, Xilu Zhao
{"title":"Development of Bi-Stable Vibration Energy Harvesting System Using Duffing-Type Motion Model","authors":"Xuguang Zhang, Wei Zhao, Jingchao Guan, Apollo B. Fukuchi, Xilu Zhao","doi":"10.11648/j.eas.20230801.12","DOIUrl":"https://doi.org/10.11648/j.eas.20230801.12","url":null,"abstract":": Vibration power generation is an important issue in development of renewable energy. If a vibration system with a maximum possible amplitude is designed, it can be advantageous in improving the vibration power generation efficiency. In this study, we propose a Duffing-type bi-stable vibration energy harvesting system that utilizes the stochastic resonance phenomenon, which can significantly expand the vibration amplitude. We designed the motion rail shape of the bistable vibration model using the Duffing function","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74369181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis for Arabic Sentiment Analysis ModelsIn E-Marketing Using Deep Learning Techniques 基于深度学习技术的网络营销中阿拉伯情感分析模型的比较分析
Journal of Engineering and Applied Sciences Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050102
Sara Almutairi, F. Alotaibi
{"title":"A Comparative Analysis for Arabic Sentiment Analysis Models\u0000In E-Marketing Using Deep Learning Techniques","authors":"Sara Almutairi, F. Alotaibi","doi":"10.5455/jeas.2023050102","DOIUrl":"https://doi.org/10.5455/jeas.2023050102","url":null,"abstract":"The Internet has a huge amount of information when it comes to analysis, much of which is valuable and significant. Arabic Sentiment Analysis (SA) is a method responsible for analyzing people’s thoughts, feelings, and responses to a variety of products and services on social networking and commercial sites. Several researchers utilize sentiment analysis to determine the opinions of customers in various areas, including e-marketing, business, and other fields. Deep learning (DL) is a useful technology for developing sentiment analysis models to improve e-marketing operations. There are a few studies targeting Arabic sentiment analysis (ASA) in e-marketing using deep learning algorithms. Due to a number of difficulties in the Arabic language, such as the language’s morphological features, the diversity of dialects, and the absence of suitable corpora, sentiment analysis on Arabic material is restricted. In this paper, we will compare several Arabic sentiment analysis models. Also, we discuss the deep learning algorithms that are employed in Arabic sentiment analysis. The domain of the collected papers is Arabic sentiment analysis in e-marketing using deep learning. Our first contribution is to introduce and present deep learning models that are used in ASA. Secondly, investigate and study Arabic datasets utilized for Arabic sentence analysis. We create and develop a new Arabic dataset for Saudi Arabian communication companies, namely Sara-Dataset, to increase the quality and quantity of their services. Third, each collected study is assessed in terms of its methodology, contributions, deep learning techniques, performance, Arabic datasets in emarketing, and potential improvements in developing Arabic sentiment analysis models. Fourth, we analyzed several papers’ performance in terms of accuracy, F-measure, recall, pre-procession, and area under the curve (AUC). Also, our comparative analysis includes feature selection (e.g., domain-specific selection) methods that are used in Arabic sentiment analysis. Fifth, we also discuss how to improve Arabic sentiment analysis using preprocessing techniques (e.g., word embedding). Finally, we provide a design model for analyzing Arabic sentiment about communications services provided by Saudi Arabian enterprises.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87516608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measurement of Benefits, Reasons, and Barriers to Students’ Adoption of Electronic Applications 衡量学生采用电子应用程序的好处、原因和障碍
Journal of Engineering and Applied Sciences Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050101
M. Alghamdi
{"title":"Measurement of Benefits, Reasons, and Barriers to Students’ Adoption of Electronic Applications","authors":"M. Alghamdi","doi":"10.5455/jeas.2023050101","DOIUrl":"https://doi.org/10.5455/jeas.2023050101","url":null,"abstract":"Over the past decade, electronic applications, particularly social networking applications (SNAs), have been gaining considerable popularity, including among educated young people. The advantages of SNAs are apparent in many sectors, with education being no exception. SNAs are also playing the main role in enhancing the quality of education. The aim of this paper is to explore SNAs use (e.g., Twitter, Facebook, and YouTube) in higher education students enrolled at Albaha University, Saudi Arabia, focusing on their associated advantages, barriers, and reasons for adoption, as well as differences between the participants with respect to the study variables. The research methodology was a survey approach and the sample size reached 243 students, including 123 males and 120 females. The survey was distributed to students electronically. The results indicate that most students benefit from SNAs, and these resources motivate them to engage with SNAs to enhance their education. Barriers were also identified that must be addressed for effective education. No difference was found between male and female students in terms of benefiting from SNAs, as well as the reasons and barriers, thereby indicating the availability of SNAs for both genders and the flexibility of their use at any time and place, as well as awareness in both genders about their use. A noticeable difference was identified in the extent of the benefits derived from SNAs between participants older and younger than 20 years, and differences were also found in the reasons underpinning these benefits. This reflects a disparity in the use and mastery of SNAs between the two age groups. Students aged 20-25 years also encountered greater barriers to SNAs use compared to students aged younger than 20 years, which may be attributed to the lower familiarity of older students with SNAs.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87793943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing Serverless Applications with AWS Lambda: An Automatic Move to Serverless Architectures 使用AWS Lambda测试无服务器应用程序:自动迁移到无服务器架构
Journal of Engineering and Applied Sciences Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050104
Shamiksha Mishra, Abdullah Alenizi, S. Dutta
{"title":"Testing Serverless Applications with AWS Lambda: An Automatic Move to Serverless Architectures","authors":"Shamiksha Mishra, Abdullah Alenizi, S. Dutta","doi":"10.5455/jeas.2023050104","DOIUrl":"https://doi.org/10.5455/jeas.2023050104","url":null,"abstract":"In serverless computing, servers' computing resources are distributed dynamically by the cloud service provider. Consumers are charged based on the usage of resources, not on prepurchase computing capability. Programming models, abstractions, and platforms for cloud services and technologies need to evolve. This paper aims to provide large scalability and low configuration costs for cloud applications. This paper explores testing strategies for a system that allows users to request rides on unicorns from the Wild Rydes fleet. The proposed application to build, deploy and tested, for serverless services developed for the Amazon Web Services cloud platform. The results have been obtained for the parameters Duration, Error count & success rate, Call, Throttle, Total concurrent execution and compare with the existing work. The results have a less duration, with very high success rate with zero error. This paper will help users to help in state of art transportation service so that people can travel faster and easier.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78673567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Cybersecurity Awareness in Saudi Arabia 沙特阿拉伯的网络安全意识框架
Journal of Engineering and Applied Sciences Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050103
Mead Albediwi, Kishwar Sadaf
{"title":"A Framework for Cybersecurity Awareness in Saudi Arabia","authors":"Mead Albediwi, Kishwar Sadaf","doi":"10.5455/jeas.2023050103","DOIUrl":"https://doi.org/10.5455/jeas.2023050103","url":null,"abstract":"The rapid advancement in technology has improved people's lives, but it has also increased the risks that come with using the Internet, including cybercrimes. Lately, Saudi Arabia, a booming economy, has become one of the prime targets of cyberattacks. The massive amount of cyberattacks targeting Saudi Arabia can be attributed to the lack of cybersecurity awareness among Saudi people. The objective of this study is to propose methods on the national level to increase the awareness of cybersecurity among Saudi people. We conducted a cybersecurity assessment survey to assess the cybersecurity awareness among Saudi people. The survey result indicated negligent behavior and lack of awareness. To address this issue, we proposed a cybersecurity awareness framework which targets all strata of Saudi Arabia demography. The proposed framework not only emphasized training programs in schools, universities and organizations but also addresses the awareness issue in people from informal backgrounds. The framework also includes the importance of incident response and its role in reducing incidents.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"373 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77987683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Analysis and Detection System for New Host-Based Cryptojacking Malware Dataset 基于主机的新型加密劫持恶意软件数据集智能分析与检测系统
Journal of Engineering and Applied Sciences Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050105
Hadeel Almurshid
{"title":"Smart Analysis and Detection System for New Host-Based Cryptojacking Malware Dataset","authors":"Hadeel Almurshid","doi":"10.5455/jeas.2023050105","DOIUrl":"https://doi.org/10.5455/jeas.2023050105","url":null,"abstract":"Cryptocurrency is a quickly growing technology in the finance industry, with the first cryptocurrency, Bitcoin, being created in 2009. Each cryptocurrency has its own unique hash value, and cryptocurrency mining involves participating in a guessing competition to release a unique hash into circulation, with the winner receiving a modest bonus in the form of bitcoin. However, as more bitcoins are discovered, it becomes increasingly difficult to obtain more, resulting in a need for extra computer resources and power. Consequently, the increasing popularity of cryptocurrency has led to a rise in cryptojacking malware, which secretly uses victims' computing resources to mine cryptocurrency. This malware can be either web-based or host-based, with similar execution and goals but differing in implementation and injection. Cryptojacking has affected numerous devices worldwide, but few studies have been carried out to detect it, especially the host-based type. Furthermore, the current studies on cryptojacking have limited datasets, which are often outdated or small, and the prediction models developed from these datasets may not be accurate. To address this gap, we conducted a thorough analysis of cryptojacking's behavior, lifecycle, impact, implementations, and possible detection methods. Additionally, we created an up-to-date dataset consisting of 114,985 samples, with 57,948 categorized as benign and 57,037 as cryptojacking. The dataset was used to build a smart cryptojacking detection system, with 5 different convolutional neural network models trained and evaluated against a subset of the dataset. The best performing model achieved an accuracy of 98.4%, an F1-Score of 98.3%, a precision of 98.4%, and a recall of 98.4%. Our proposed method, which involves running Windows executables in an isolated environment and closely monitoring their CPU usage, provides a thorough understanding of cryptojacking malware behavior and enables detection of the malware. The comprehensive dataset collected facilitates efficient detection model development. Additionally, evaluating the dataset with 5 different CNN algorithms and assessing their performance using established evaluation metrics ensures the effectiveness of our proposed method and dataset.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84253979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信