INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY最新文献

筛选
英文 中文
SHAPE OPTIMIZATION OF A TWO WHEELER SUSPENSION WITHDIFFERENT CROSS SECTIONS 不同横截面两轮悬架的形状优化
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-12-04 DOI: 10.48047/ijarst/v10/i12/01
{"title":"SHAPE OPTIMIZATION OF A TWO WHEELER SUSPENSION WITH\u0000DIFFERENT CROSS SECTIONS","authors":"","doi":"10.48047/ijarst/v10/i12/01","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i12/01","url":null,"abstract":"The two-wheeler chassis consists of the frame, suspension, wheels and brakes. The chassis is\u0000what truly sets the overall style of the two-wheeler. Automotive chassis is the main carriage\u0000systems of a vehicle. The frame serves as a skeleton upon which parts like gearbox and engine\u0000are mounted. It can be made of steel, aluminum or an alloy. It keeps the wheels in line to\u0000maintain the handling of the two-wheeler.The frame of a motor vehicle supports all the drive\u0000assemblies, i.e. the engine, gearbox and axles (front and rear). In addition the suspension and\u0000steering systems and the shock absorbers are attached to it. The appropriate body is fixed to the\u0000chassis. It is essential that the frame should not buckle on uneven road surfaces and that any\u0000distortions which may occur should not be transmitted to the body. The frame must therefore be\u0000torsion−resistant. The frame of a motor vehicle is the load bearing part of the chassis which\u0000supports all forces (wheel forces) and weights. It should be as rigid as possible.The main aim of\u0000the project is to model a frame of a two wheeler using 3D modeling software Pro/Engineer. Two\u0000models of suspension are designed for pipe type and rectangular cross sections.Considering the\u0000frame as a beam, calculations are done to determine the displacement and stress by applying\u0000loads.To validate the strength of two models, Structural analysis is done by applying the wheel\u0000forces. In this analysis ultimate stress limit for the model is determined. Analysis is done for\u0000frame using two materials steel and aluminum to verify the best material for frame. Modal\u0000analysis is also done to determine natural frequencies of suspension frame. Analysis is done in\u0000ANSYS software.Comparison is done mathematically and by FEA analysis. And also we can\u0000validate the better cross section and material for suspension frame.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FUZZY IDENTITY-BASED DATA INTEGRITY AUDITINGFOR DEPENDABLE CLOUD STORAGE SYSTEMS 基于模糊身份的可靠云存储系统数据完整性审计
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-30 DOI: 10.48047/ijarst/v10/i11/06
{"title":"FUZZY IDENTITY-BASED DATA INTEGRITY AUDITING\u0000FOR DEPENDABLE CLOUD STORAGE SYSTEMS","authors":"","doi":"10.48047/ijarst/v10/i11/06","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/06","url":null,"abstract":"Information honesty, a center security issue in solid distributed storage, has gotten a lot of\u0000consideration. Information inspecting conventions empower a verifier to productively check the\u0000trustworthiness of the re-appropriated information without downloading the information. A key\u0000exploration challenge related with existing plans of information reviewing conventions is the\u0000intricacy in key administration. In this paper, we look to address the unpredictable key\u0000administration challenge in cloud information uprightness checking by presenting fluffy\u0000personality based examining, the first in such a methodology, as far as we could possibly know.\u0000All the more explicitly, we present the crude of fluffy character based information examining,\u0000where a client's personality can be seen as a lot of spellbinding qualities. We formalize the\u0000framework model and the security model for this new crude. We at that point present a solid\u0000development of fluffy personality based inspecting convention by using biometrics as the fluffy\u0000character. The new convention offers the property of mistake resistance, in particular, it ties with\u0000private key to one personality which can be utilized to confirm the rightness of a reaction created\u0000with another character, if and just if the two characters are adequately close. We demonstrate the\u0000security of our convention dependent on the computational Diffie-Hellman suspicion and the\u0000discrete logarithm supposition in the particular ID security model. At long last, we build up a\u0000model usage of the convention which shows the common sense of the proposition.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123150954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIGITAL WALLET USING ARM MICROCONTROLLER 采用手臂微控制器的数字钱包
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-30 DOI: 10.48047/ijarst/v10/i11/07
{"title":"DIGITAL WALLET USING ARM MICROCONTROLLER","authors":"","doi":"10.48047/ijarst/v10/i11/07","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/07","url":null,"abstract":"As the world is getting digital there are few things which are used as it is for a long time. The\u0000most important thing which we do in our daily life is the transaction of money. Money\u0000transaction is a process which should be digitized for more security and the ease of the\u0000individual. So, by making a digital wallet the money transaction can be made much simpler and\u0000effortless. Using digital wallet we can keep all our important cards such as health card, driving\u0000license and other important papers in only one place with much more security.\u0000The digital wallet can be our transaction medium which can be used anywhere such as shops,\u0000malls or for giving money to someone else. And with such high security, all the information\u0000which the wallet is carrying will be safe. In case, if the wallet is lost, GPS will help to detect the\u0000location of our device and GSM sends message of the location to the user mobile and that what\u0000makes the wallet a digital safe. Digital wallet and user mobile will be connected wirelessly\u0000through Bluetooth.\u0000If the digital wallet is lost, the Bluetooth connection between the user mobile and digital wallet\u0000will be lost and this is identified as Bluetooth connection lost in the mobile. Immediately GPS\u0000will track the wallet location and GSM will send the location parameters to the user mobile.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE TEST OF DIFFERENT TYPES OF WASTE ASPARTIAL REPLACEMENT OF CEMENT IN HOT ASPHALTMIX 不同类型废弃物在热沥青混合料中部分替代水泥的性能试验
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-27 DOI: 10.48047/ijarst/v10/i11/04
{"title":"PERFORMANCE TEST OF DIFFERENT TYPES OF WASTE AS\u0000PARTIAL REPLACEMENT OF CEMENT IN HOT ASPHALT\u0000MIX","authors":"","doi":"10.48047/ijarst/v10/i11/04","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/04","url":null,"abstract":"One of the major fillers used in HMA is cement. With the extensive use of cement in\u0000mortars/concrete, there have been some environmental concerns in terms of damage caused by\u0000the extraction of raw material and Carbon dioxide (CO2) emission during cement manufacture.\u0000This has brought pressures to reduce the cement consumption in the industry. This journal\u0000outlines the ongoing research on different waste materials partial replacement of cement as filler\u0000used in hot mix asphalt mixes. Many studies regarding their effects on bituminous mixes were\u0000also analysed in combination with cement filler mastic. This project summarizes the interaction\u0000of Waste materials partial replacement of cement with different percentages 0%, 25%, 50%,\u000075%, 100% and finding out the optimun percenetage of waste material i.e: GGBS, Flyash,\u0000Concrete dust, Metakaolin and Marble powder as partial replacment of cement in bituminous\u0000mixes. Marshall properties such as stability, flow value, unit weight, air voids, are used to\u0000determine optimum waste material content for the used grade of bitumen (100/120).","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CLOUD BASED SECURITY FOR ADVANCED MINIMIZINGENERGY BASED DATA SHARING IN MULTI-CLOUDS 基于云的安全性,用于多云中基于能源的高级数据共享最小化
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-25 DOI: 10.48047/ijarst/v10/i11/03
{"title":"A CLOUD BASED SECURITY FOR ADVANCED MINIMIZING\u0000ENERGY BASED DATA SHARING IN MULTI-CLOUDS","authors":"","doi":"10.48047/ijarst/v10/i11/03","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/03","url":null,"abstract":"Protect Cloud is better than protecting your account calculate with internal consumption\u0000characteristics assets. In terms of cloud computing, it provides cloud services give an endless\u0000storage and file information and creates an abstracts information uploading the data of\u0000various clients. It can help customers reduce economic costs of document management by\u0000moving with the district administration utility and policies to use on cloud servers. Offer safe\u0000statistics The security key can be confiscated Distribute and share information for dynamic\u0000groups. Within this task, the existing scheme is able to help Dynamic organizations work\u0000effectively when there are new users in case of joining the organization or termination of the\u0000user from the organization, the private keys of the opposite party customers do not need to be\u0000reimbursed now and do not need to do so date. In addition, the scheme can achieve comfort\u0000customer cancellation cannot be a blocked client data files can be retrieved for the first time\u0000although they conspired with unbelievers of clouds. To avoid these threats, conspiracies\u0000against information are a how to remove a copy of a statistical copy, the cloud has been\u0000widely used in garages to reduce storage space, throughput and deployment in cloudy\u0000weather information is saved. Recommended compiler The encryption model has been\u0000widely followed Convenient anti-conspiracy, correct and reliable control a variety of\u0000compiler keys.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURE PRESERVING DATA IN INTERNET OF THINGS (IOT)USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES 使用加密和隐写技术安全保存物联网(iot)中的数据
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-24 DOI: 10.48047/ijarst/v10/i11/01
{"title":"SECURE PRESERVING DATA IN INTERNET OF THINGS (IOT)\u0000USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES","authors":"","doi":"10.48047/ijarst/v10/i11/01","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/01","url":null,"abstract":"Information is the contribution for different man-made reasoning (AI) calculations to mine\u0000important highlights, yet information in Internet is dissipated all over and constrained by various\u0000partners who can't put stock in one another, and use of the information in complex the internet is\u0000hard to approve or to approve. Accordingly, it is extremely hard to empower information\u0000partaking in the internet for the genuine enormous information, just as a genuine amazing AI. In\u0000this paper, we propose the SecNet, a design that can empower secure information putting away,\u0000processing, and partaking in the enormous scope Internet climate, focusing on a safer the internet\u0000with genuine huge information and hence improved AI with a lot of information source, by\u0000incorporating three key segments: 1) blockchain-based information offering to possession\u0000ensure, which empowers believed information partaking in the huge scope climate to shape\u0000genuine large information; 2) AI-based secure figuring stage to create more insightful security\u0000rules, which assists with building a more confided in the internet; 3) confided in esteem trade\u0000instrument for buying security administration, giving an approach to members to increase\u0000financial prizes when giving out their information or administration, which advances the\u0000information sharing and subsequently accomplishes better execution of AI. Besides, we examine\u0000the common use situation of SecNet just as its possibly elective approach to convey, just as break\u0000down its adequacy from the part of organization security and financial income.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BREAST CANCER DETECTION USING MAMMOGRAM FEATURES USING RANDOM FOREST ALGORITHM 基于随机森林算法的乳房x线影像特征乳腺癌检测
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-24 DOI: 10.48047/ijarst/v10/i11/02
{"title":"BREAST CANCER DETECTION USING MAMMOGRAM FEATURES USING RANDOM FOREST ALGORITHM","authors":"","doi":"10.48047/ijarst/v10/i11/02","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/02","url":null,"abstract":"Breast Cancer is one of the most dangerous diseases for women. This cancer\u0000occurs when some breast cells begin to grow abnormally. Machine learning is the\u0000subfield of computer science that studies programs that generalize from past\u0000experience. This project looks at classification, where an algorithm tries to predict\u0000the label for a sample. The machine learning algorithm takes many of these\u0000samples, called the training set, and builds an internal model. This built model is\u0000used to classify and predict the data. There are two classes, benign and malignant.\u0000Random Forest classifier is used to predict whether the cancer is benign or\u0000malignant. Training and testing of the model are done by Wisconsin Diagnosis\u0000Breast Cancer dataset.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126390491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Day National Conference on ADVANCES IN LIFE SCIENCES 为期两天的生命科学进展全国会议
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-21 DOI: 10.48047/ijiemr/v08/spec/01
{"title":"Two Day National Conference on ADVANCES IN LIFE SCIENCES","authors":"","doi":"10.48047/ijiemr/v08/spec/01","DOIUrl":"https://doi.org/10.48047/ijiemr/v08/spec/01","url":null,"abstract":"An engineer needs to use mathematics and apply science for engineering\u0000solutions to many types of problems pertaining to different disciplines.\u0000Proper knowledge of mathematics is the prime requisite requirement for\u0000engineering various kinds of applications. An engineer must know general purpose\u0000mathematics and mathematics related to a specific discipline. An engineer having clear\u0000knowledge of the mathematics will be able to engineer solutions to the problems that\u0000are to be solved with least cost and time.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National conference on Biotech and Pharma Applications (NCBA) 全国生物技术与制药应用会议(NCBA)
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-20 DOI: 10.48047/ijiemr/v09/spec/03
{"title":"National conference on Biotech and Pharma Applications (NCBA)","authors":"","doi":"10.48047/ijiemr/v09/spec/03","DOIUrl":"https://doi.org/10.48047/ijiemr/v09/spec/03","url":null,"abstract":"Warm and Happy greetings to all.\u0000I am immensely happy that Department of Biotechnology of our K L University is\u0000organizing a National Conference on Biotech and Pharma Applications (NCBA-2020) during\u000012 March, 2020 and is going to discuss on a collection of technical papers in the proceedings.\u0000Department of Biotechnology, K L University continues to march on the way of success\u0000with confidence. On this occasion, I wish all the very best.\u0000I congratulate HOD, staff members, students of Department of Biotechnology, Delegates\u0000and Participants from different parts of the country and nations for their efforts in participating in\u0000this conference and wish the conference all the success.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National Conference on “Emerging Trends in Smart Grid Technologies “智能电网技术的新兴趋势”全国会议
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY Pub Date : 2020-11-20 DOI: 10.48047/ijiemr/v09/spec/01
{"title":"National Conference on “Emerging Trends in Smart Grid Technologies","authors":"","doi":"10.48047/ijiemr/v09/spec/01","DOIUrl":"https://doi.org/10.48047/ijiemr/v09/spec/01","url":null,"abstract":"It is with great pleasure that I extend a warm welcome to National Conference on\u0000“Emerging Trends in Smart Grid Technologies (NCETSGT - 2020)” organized by\u0000Electrical & Electronics Engineering Department during February 7 – 8, 2020. I am truly\u0000proud that the Department of Electrical and Electronics Engineering has managed to\u0000organize such an important conference in the field of smart electric grid an important\u0000area of electrical engineering, which is attracting academic and industrial participation,\u0000nationally and internationally. I am sure that this conference will achieve its intent – to\u0000serve as an effective platform for the research community to learn, share and\u0000supplement each other’s research, while keeping abreast of the latest trends in this\u0000arena.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信