2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)最新文献

筛选
英文 中文
Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery 多签名认证和密钥管理系统,确保有效载荷传递的可靠路径
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181336
K. Ramkumar, Mishita Juneja
{"title":"Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery","authors":"K. Ramkumar, Mishita Juneja","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181336","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181336","url":null,"abstract":"There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Instruction Verification of Ethereum Virtual Machine by Formal Method 基于形式化方法的以太坊虚拟机指令验证
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181334
Chun-Sheng Ke, Yean-Ru Chen
{"title":"Instruction Verification of Ethereum Virtual Machine by Formal Method","authors":"Chun-Sheng Ke, Yean-Ru Chen","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181334","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181334","url":null,"abstract":"In recent years, many smart contracts on the ethereum platform are increasingly closer to our life. The existence of smart contract enables us to complete complicated transactions without depending on the third party. It should be not only fast, but also secure guaranteed. When the smart contract is requested to execute, the action is performed by ethereum virtual machine (EVM). If EVM occurs errors in the process of implementation, the contract execution result will also have mistaken. Therefore, ensuring the correctness of the EVM is very important. In this work, we propose a framework to formally verify EVM instruction implementations by model checking to check whether the instruction operation behaviors working on EVM is the same as the expected definitions in the ethereum yellow paper. In addition, we also define a set of interfaces specifically for EVM instruction verification to achieve the reusability of our proposed verification environment. The experimental results indicate that the formal verification method used in this work is more trustworthy than the conventional testing method. It can exactly capture the errors in the design which may be undetected by testing/simulation methods. The defined instructions are divided into 11 categories, and our work has completed to verify 7 categories, including 92 instructions of total 134, in 50 hours.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Condition-Action Rule-Based Integration Platform for the Internet of Things 基于条件-动作规则的物联网集成平台
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181347
Chu-Yi Chen, Ren-Song Ko
{"title":"A Condition-Action Rule-Based Integration Platform for the Internet of Things","authors":"Chu-Yi Chen, Ren-Song Ko","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181347","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181347","url":null,"abstract":"The vigorous development of micro-electro-mechanical systems has enabled the possibility of Internet of Things that envisions interactions between tens of, or possibly hundreds of, smart things such as computers, sensors, and actuators to realize a cyber-physical environment. With the number of devices, it will become tedious and difficult to configure and management the interactions between these things. Therefore, this paper presents an integration platform which allows smart things to be plug-and-play and condition-action rules to be established between things visually. We describe the specifications and architecture of the proposed platform, and also illustrate the implementation. We believe our work will alleviate the complexity of managing and configuring medium-scale of smart things, and pave the way for the solution of large-scale Internet of Things.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132676832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keypoints Detection for Stroke Order of Chinese Characters 汉字笔画顺序的关键点检测
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181315
Hao-Ting Li, Tz-Ting Huang, Chen-Kuo Chiang
{"title":"Keypoints Detection for Stroke Order of Chinese Characters","authors":"Hao-Ting Li, Tz-Ting Huang, Chen-Kuo Chiang","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181315","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181315","url":null,"abstract":"Chinese character is written in a specific stroke order. However, it is hard to determine the stroke order of a Chinese character. In this paper, we propose a keypoint detection method to predict the stroke order of a Chinese character. The experiment result shows that we can find a rough rule to determine the stroke order of all Chinese characters.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Rejection Plus Shape Radiating Patch Triple Notched UWB/X Band Reconfigurable Monopole Antenna for Imaging and Close Range Radar Applications 用于成像和近距离雷达应用的高抑制加形状辐射贴片三陷口UWB/X波段可重构单极天线
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181330
Naresh Kumar, Pradeep Kumar, Manish Sharma
{"title":"High Rejection Plus Shape Radiating Patch Triple Notched UWB/X Band Reconfigurable Monopole Antenna for Imaging and Close Range Radar Applications","authors":"Naresh Kumar, Pradeep Kumar, Manish Sharma","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181330","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181330","url":null,"abstract":"This research article discusses monopole antenna designed for UWB (Ultrawideband) and X band applications. Patch is formed by merging two rectangular patches and modified rectangular ground plane leading to impedance bandwidth of 2.82GHz-15.73GHz. Antenna is also capable of removing three interfering bands namely Wireless Interoperability for Microwave Access (WiMAX/C band: 3.30GHz - 3.80GHz / 3.80GHz - 4.20GHz), Wireless Local Area Network (WLAN: 5.150GHz - 5.825GHz) and Downlink Satellite System (DSS: 7.25GHz - 7.75GHz). These interfering bands are further reconfigured by using RF PIN diode so that each interference can be controlled individually. WiMAX notched band is achieved by etching circular slot on radiating patch, WLAN is obtained by using C-shaped parasitic stubs near feed line and DSS notched band is due to T-shaped slot also etched on radiating patch. Designed antenna offers good frequency, space and time domain analysis with stable radiation pattern, maximum gain of 4.85dBi, radiation efficiency of 89%, acceptable impulse response and group delay ≤0.20ns. The entire above designed features and results offers designed antenna for number of applications in wireless communication system.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SBOT: A Social Media Based Object Tracking System SBOT:基于社交媒体的目标跟踪系统
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181331
E. Chu, Kun-Hsiang Lin, Shih-Yu Chen, Jiun Hsu, Hui-Mei Wu
{"title":"SBOT: A Social Media Based Object Tracking System","authors":"E. Chu, Kun-Hsiang Lin, Shih-Yu Chen, Jiun Hsu, Hui-Mei Wu","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181331","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181331","url":null,"abstract":"Indoor object tracking technology can be applied to various applications, such as equipment tracking, people finding, and geo-fence. With the support of indoor object tracking services, users can locate the objects they are interested in and then make appropriate arrangement or provide adequate responses to emergency. In order to provide users with an instant notification, mobile app is an essential part of the object tracking infrastructure. However, developing and maintaining a mobile app could be costly. The possible expenses include app store fees, security certification, and cross-platform testing and so on. Fortunately, due the popularity of social-media apps and the advance of IoT (Internet of Thing) technology, there is a growing trend to integrate social-medial apps with IoT so as to provide users with a user friendly and easy-to-use UI (User Interface). In this paper, we present a social-media based object tracking system, named SBOT, which combines the popular social media LINE with an object tracking system. SBOT has two major functions: equipment tracking and geo-fence. Users can use LINE interface to locate the equipment and get instant message when the equipment has been moved out of the predefined boundaries. SBOT also supports access control to authorize users' operations to avoid possible security and privacy issues. In order to evaluate the practicability of SBOT, we conducted a field trial in National Taiwan University Hospital Yunlin Branch. More than 40 beacons were deployed in the orthopedics ward to trace 17 mobile medical devices at the same time. Our results show that SBOT can achieve 3 to 5 meters position accuracy and attend a 5-second response time to cross-boundary events.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129957545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Detailed Survey of Fully Homomorphic Encryption Standards to Preserve Privacy over Cloud Communications 在云通信中保护隐私的完全同态加密标准的详细调查
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181325
Kudratdeep Aulakh, Ramkumar Ketti Ramachandran
{"title":"A Detailed Survey of Fully Homomorphic Encryption Standards to Preserve Privacy over Cloud Communications","authors":"Kudratdeep Aulakh, Ramkumar Ketti Ramachandran","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181325","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181325","url":null,"abstract":"The Homomorphic Encryption is a term that denotes a technique of encryption to enable additional computation on cipher texts, this additional computation helps to preserve privacy and provides confidentiality to the payloads those are getting processed between cloud server and clients. The term homomorphic is an indication to the homomorphism term used in Algebra. The term chiefly underlines the fact that homomorphisms between cipher text and plaintext spaces are comparable to the encryption and decryption functions. Homomorphic encryption underscores an additional assessment potential for computation over encrypted data, even without accessing the secret key or decrypting data sets. The results of such a computation continue to be encrypted. This paper gives an account of various homomorphic standards followed in cloud communications and summarizes the key facts and stats of these methods.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Health Detection for Potato Leaf with Convolutional Neural Network 基于卷积神经网络的马铃薯叶片健康检测
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181312
Trong-Yen Lee, Jui-Yuan Yu, Yu-Chun Chang, Jing-min Yang
{"title":"Health Detection for Potato Leaf with Convolutional Neural Network","authors":"Trong-Yen Lee, Jui-Yuan Yu, Yu-Chun Chang, Jing-min Yang","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181312","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181312","url":null,"abstract":"Potato is the fourth largest food crop in the world and grown in many places of the world. Potato crops mainly infected with fungi, and hence they got early blight diseases and late blight diseases. Real time control of disease and management can effectively increase production and reduce farmers' losses. The ability can identify infected crops automatically for farmers. Therefore, this paper proposes a CNN (Convolutional Neural Network) architecture which is suitable for potato disease detection. At first, we will create a database for our training set by means of image processing in the CNN. Adam is used as the optimizer, and cross entropy is used as the model analysis basis. Softmax is used as the final judgment function. The convolution layer and resources are minimized usage amount while maintaining high accuracy. The experimental results show that the parameter usage is 10,089,219 and the accuracy of the disease judgment can reach 99% under the preset model which is proposed in this paper.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Adaptive Convergence Ratio Generation Algorithm for Iterative Learning Control 迭代学习控制的自适应收敛比生成算法
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181353
Wen-Ling Chiu, Peng Chen
{"title":"An Adaptive Convergence Ratio Generation Algorithm for Iterative Learning Control","authors":"Wen-Ling Chiu, Peng Chen","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181353","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181353","url":null,"abstract":"Iterative learning control is a technique for improving the accuracy of industrial machining. Its convergence ratio significantly affects the learning efficiency, and is usually set based on user experience. However, this paper develops an algorithm for two-axis machining that automatically generates an appropriate convergence ratio at each learning iteration. This algorithm can rapidly reduce root-mean-square contour errors and the total learning iterations required for machining. The proposed algorithm is integrated into and implemented in LinuxCNC. Experimental results for the tested machining paths show that the proposed algorithm's convergence ratio quickly improves machining accuracy in fewer learning iterations.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"43 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120857111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Social Interaction of Autistic Students of Elementary and Junior High School Students Through the Teaching of Social Skills in Virtual Reality 虚拟现实中社交技能教学对中小自闭症学生社交互动的探索
2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN) Pub Date : 2020-02-01 DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181323
Chia-Chi Yeh, Ying-Ru Meng
{"title":"Exploring the Social Interaction of Autistic Students of Elementary and Junior High School Students Through the Teaching of Social Skills in Virtual Reality","authors":"Chia-Chi Yeh, Ying-Ru Meng","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181323","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181323","url":null,"abstract":"With the development of global technology and teaching trends, digital technology teaching has become a common phenomenon today. This study uses the virtual reality social skills course to teach ten autistic stu-dents for Elementary and Junior High School, with the theme of “One Art Tour with Students” and four key points in the 12-year National Basic Education Curriculum. In virtual reality situational teaching, through t-test analysis, it is found that inappropriate social behavior is obviously improved, and environmental adaptability is also greatly improved. Through interviews, parents and teachers believe that children's social skills have improved.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130437233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信