2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)最新文献

筛选
英文 中文
Fuzzy Logic Control Strategy for Axial Flux Permanent Magnet Synchronous Generator in WHM 1.5KW WHM 1.5KW轴向磁通永磁同步发电机模糊控制策略
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865461
Demas Yangindrajat, H. Guntur
{"title":"Fuzzy Logic Control Strategy for Axial Flux Permanent Magnet Synchronous Generator in WHM 1.5KW","authors":"Demas Yangindrajat, H. Guntur","doi":"10.1109/CyberneticsCom55287.2022.9865461","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865461","url":null,"abstract":"This study presents the uses of Fuzzy control for AFPMSG (Axial Flux Permanent Magnet Synchronous Generator), which it is implemented on a Wheel Hub Motor (WHM) 1.5KW. The use of Fuzzy aims to stabilize the voltage used for charging batteries in electric vehicles. Electric vehicles today have a shortage in mileage. This research optimizes the WHM function for driving and also to charging with AFPMSG Fuzzy control. AFPMSG was made on the WHM stator and magnets on the WHM cover. The type of generator is used without a core on the coil. The generator has been simulated using MATLAB and FEM. The simulation results show a maximum voltage of 24 Volts at a speed of 1000 RPM. The system used for Fuzzy input is the speed and distance of the motor. The resulting output is a voltage. Fuzzy control is used for the stability of the charging system in electric vehicles. The research is presented in the form of simulations and field tests.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Support Vector Machine and Neural Network Algorithm in Drone Detection System 支持向量机与神经网络算法在无人机检测系统中的比较
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865628
Risa Farrid Christianti, Hanin Latif Fuadi, M. Afandi, Azhari S.N., Andi Dharmawan
{"title":"Comparison of Support Vector Machine and Neural Network Algorithm in Drone Detection System","authors":"Risa Farrid Christianti, Hanin Latif Fuadi, M. Afandi, Azhari S.N., Andi Dharmawan","doi":"10.1109/CyberneticsCom55287.2022.9865628","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865628","url":null,"abstract":"With the increase in the number of drones, it is possible to have the danger of using drones illegally. It is crucial to detect adverse events or conditions so that security operators can obtain that information and situational identification of drones. This paper proposes two methods of classifying acoustic sensor data in a UAV detection system, using Support Vector Machine and Neural Network, that will be compared. This research shows that the accuracy achieved in predicting acoustic sensor data is 82.27% in the SVM method. The accuracy achieved is 90.58% for the NN method under the same input conditions and amount of training data. This comparation needs to do to choose the best accuracy in a public safety environment.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of machine translation for Vietnamese and Korean on the TED Talks 2020 corpus 2020年TED演讲语料库上越南语和韩语的机器翻译研究
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865594
Binh Van Duong, Kim Chi T. Phan, Chien Nhu Ha, Phat Cao Tran, Trong-Hop Do
{"title":"A study of machine translation for Vietnamese and Korean on the TED Talks 2020 corpus","authors":"Binh Van Duong, Kim Chi T. Phan, Chien Nhu Ha, Phat Cao Tran, Trong-Hop Do","doi":"10.1109/CyberneticsCom55287.2022.9865594","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865594","url":null,"abstract":"Vietnam has achieved impressive economic growth in the last two decades. It becomes a worth investing country in the area. Consequently, the need of understanding foreign investors from different countries (S. Korea in specific) is an essential issue. Therefore, building an automatic machine translation system with high precision is a necessary solution, especially during the COVID-19 pandemic, where keeping distance is the best way to avoid spreading the virus. As a result, this research presents some experimental results on the TED Talks 2020 dataset for the task Korean - Vietnamese and Vietnamese - Korean machine translation with the purpose of providing an overview of the dataset and a deep learning machine translation model for the problem.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card fraud detection system using machine learning technique 信用卡诈骗检测系统采用机器学习技术
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865466
Ayushi Maurya, Arun C. S. Kumar
{"title":"Credit card fraud detection system using machine learning technique","authors":"Ayushi Maurya, Arun C. S. Kumar","doi":"10.1109/CyberneticsCom55287.2022.9865466","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865466","url":null,"abstract":"Over the years, with the development of e-commerce, people are mostly making online transactions, and the risk of getting scammed has also increased. This in turn forces the financial institutions to improve continuously and upgrade their model. Machine Learning techniques were used to detect fraud in credit card transactions, but working with real-time data can be tough for machine learning to handle. Thus, implementation of blockchain techniques with machine learning to improve the efficiency and accuracy of the model. In the proposed model, Ethereum dataset has been used to check the fraudulent transaction and secure it with the help of machine learning algorithms. Out of all the classifiers XGBoost has attained the highest accuracy of 99.21% for the stated dataset.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of AODV, AODV-ETX and Modified AODV-ETX in VANET using NS3 基于NS3的AODV、AODV- etx和改进型AODV- etx在VANET中的性能比较
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865467
Bayu Ardianto, Hery Sapto Dwi Nurcahyo, Hasan Muftic, R. Harwahyu, R. F. Sari
{"title":"Performance Comparison of AODV, AODV-ETX and Modified AODV-ETX in VANET using NS3","authors":"Bayu Ardianto, Hery Sapto Dwi Nurcahyo, Hasan Muftic, R. Harwahyu, R. F. Sari","doi":"10.1109/CyberneticsCom55287.2022.9865467","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865467","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET) is used by autonomous vehicles as an efficient and reliable external vehicle communication. The routing protocol that has a stable and efficient performance is one that affects the quality of vehicle communication. This research simulates and analyzes the performance of VANET routing protocols, namely Ad-hoc On-demand Distance Vector (AODV), Ad-hoc On-demand Distance Vector-Expected Transmission (AODV-ETX), and Modified AODV-ETX using Network Simulator 3 (NS3). Our experiment shows that AODV has the best throughput performance, AODV-ETX performs the best Overhead and Packet Delivery Ratio, in terms of Modified AODV-ETX shows the best goodput performance compared to the others. Overall, the Modified AODV-ETX with My Route Timeout (MRT) and Active Route Timeout (ART) values 80 seconds provides better performance compared to AODV-ETX.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gas Turbine Anomaly Prediction using Hybrid Convolutional Neural Network with LSTM in Power Plant 基于混合卷积神经网络和LSTM的电厂燃气轮机异常预测
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865487
F. Zhultriza, Aries Subiantoro
{"title":"Gas Turbine Anomaly Prediction using Hybrid Convolutional Neural Network with LSTM in Power Plant","authors":"F. Zhultriza, Aries Subiantoro","doi":"10.1109/CyberneticsCom55287.2022.9865487","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865487","url":null,"abstract":"The fault and anomaly of real-time performance gas turbine data are difficult to predict because of the complexity of feature data and dynamically time series. In the case of real performance gas turbine, the complexity of the physical model is hard to interpret. In deep learning, the Convolutional Neural Network (CNN) is used to perform the identification of data with great feature extraction. But, since CNN is poorly accurate for time-series data, the prediction for gas turbine anomaly could be hardly optimized. Another neural network method that can interact with time-series data is Recurrent Neural Network (RNN), especially, the Long Short-Term Memory (LSTM) that can deal with the vanishing gradient problem in traditional RNN. This paper aims to develop hybrid CNN-LSTM as a proposed method to predict gas turbine anomaly more accurately than single CNN. The accuracy of the single CNN method is 81.33%. With the addition of LSTM in the same CNN architecture, the accuracy of hybrid CNN-LSTM is 91.79%. The accuracy of model data is significantly increased by adding LSTM layer after the convolutional and pooling layer.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing TehNusa Mobile Based Application Using Design Sprint Method 利用设计冲刺方法设计TehNusa移动应用程序
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865534
Dinda Maylan Setianti, Daffa Raihan Zaki, Gita Fadila Fitriana, Aditya Ammar Pradana
{"title":"Designing TehNusa Mobile Based Application Using Design Sprint Method","authors":"Dinda Maylan Setianti, Daffa Raihan Zaki, Gita Fadila Fitriana, Aditya Ammar Pradana","doi":"10.1109/CyberneticsCom55287.2022.9865534","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865534","url":null,"abstract":"Indonesia is a country where most of the population work in the agricultural and plantation sectors. Both sectors are significant for the economy of Indonesia because it contributes to the increase in Gross Domestic Product (GDP). Such as the tea plantation sub-sector, which is one of the export commodities in Indonesia. However, several problems occur to the tea farmers in Indonesia. These problems influence decreasing in tea quality and farmers' welfare in Indonesia. For that reason, TehNusa is created to help solve the issues. TehNusa can be utilized to buy and sell harvested or processed tea. Another hand, TehNusa also has other functions to develop the quality and ability of the community in caring for and managing processed tea. Another side, BUMDes will play a role by managing and developing village prospects and tea farmers to minimize gaps. The design of the TehNusa application is created using the design sprint methodology and for the design validation, we're using the system usability scale methodology. The design of the TehNusa application can be made within 40 working hours, and the test result of design validation gets a conclusion of 81 points or equivalent to grade B. The TehNusa application is rated by users as being able to help make it easier to solve problems. In addition, further research needs to be carried out to determine the implementation of making applications and building business cooperation with BUMDes in Indonesian villages that have skilled farmers and have the potential to become processed tea producers.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drone Flight Logs Sequence Mining 无人机飞行日志序列挖掘
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865663
Swardiantara Silalahi, T. Ahmad, H. Studiawan
{"title":"Drone Flight Logs Sequence Mining","authors":"Swardiantara Silalahi, T. Ahmad, H. Studiawan","doi":"10.1109/CyberneticsCom55287.2022.9865663","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865663","url":null,"abstract":"Data mining techniques in analyzing log data can discover a useful pattern which then is used to infer knowledge. Interesting patterns in log data can help the stakeholder to take action to diagnose a problem or improve the running system. Drone as one loT device, which consists of subsystems working together, also implements a logging mechanism. While a drone is flying, event-related logs are written into specific log files. These files contain precious information in case of incident happens to the drone. Assuming that the integrity of the log files is guaranteed, the investigator can find useful patterns and help conclude the incidents. To this end, this paper studies the sequence mining approach to discover some pre-defined incident-related events. As this is an initial study, the main contribution of this paper is the domain adaptation and modeling of the flight logs into a sequence database. After experimenting, we conclude that the modeling procedure is an essential step in conducting sequence mining. Frequency-oriented techniques are not suitable for small sequence databases, as the found patterns tend to have less critical events. Finally, two potential future directions are elaborated.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Algorithms and Datasets for Modern IDS Design 现代IDS设计的机器学习算法和数据集
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865255
Inam Abdullah Abdulmajeed, I. Husien
{"title":"Machine Learning Algorithms and Datasets for Modern IDS Design","authors":"Inam Abdullah Abdulmajeed, I. Husien","doi":"10.1109/CyberneticsCom55287.2022.9865255","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865255","url":null,"abstract":"Intrusion Detection System (IDS) is a critical component in cyber security to capture and analyze the traffic and then differentiate between benignant and malicious traffic indicating the attack type. This review is aimed to investigate various Machine Learning (ML) algorithms utilized in IDS design; with particular focus on dataset used. The parameters used to compare the performance of each algorithm have been studied also. Dataset choice is exceptionally critical to guarantee that it is matching the IDS requirements. The dataset structure can influence in a great manner the selection of the of ML algorithm. Hence, metric will provide a numerical relation between ML algorithm against specific dataset. This review concluded that researches are liberating themselves from Supervised Learning and moving toward Clustering and other algorithms, which gives the hope that IDS in the future will be able to detect more unknown and zero-day attacks, also the percentage of utilizing hybrid algorithms has increased dramatically. On the other hand, recent ML researchers are depending more and more on modern datasets which contributes as a significant consideration in IDS design although some research articles are still seeing the KDDCup99 and its reduced variant as principal training dataset of IDSs, despite the fact that it is more than 20 years old, while cyber-threats keep rising together with adapting new technologies in the cyber world like cloud computing, IoT, and IPv6.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COVID-19 Disease Classification by Cough Records Analysis using Machine Learning 基于机器学习的咳嗽记录分析的COVID-19疾病分类
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865610
Kien Trang, Hoang An Nguyen, Long TonThat, Hung Ngoc Do, B. Vuong
{"title":"COVID-19 Disease Classification by Cough Records Analysis using Machine Learning","authors":"Kien Trang, Hoang An Nguyen, Long TonThat, Hung Ngoc Do, B. Vuong","doi":"10.1109/CyberneticsCom55287.2022.9865610","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865610","url":null,"abstract":"The rapid spreading rate of the Coronavirus disease 2019 (COVID-19) has resulted in more than 6.2 million deceased cases. Furthermore, the patients of the latest Omicron variation carry light to almost no symptoms of the disease themselves. Thus, the requirement for a new diagnosis method besides Reverse Transcription-Polymerase Chain Reaction (RT-PCR) becomes the most important step to successfully detect infected cases. In this research, the application of the KNN, Ensemble and SincNet models are implemented as the main models for classification diagnosis based on cough sound records of infected patients. After pre-processing steps for removing silence ranges in the audio scripts, the cough sounds are augmented, subsequently separated into single cough samples, then generated 3 testing scenarios for dealing with the imbalanced problem between the sample classes. Afterward, MelFrequency information and MelSprectrogram are extracted as main features for analysis in order to distinguish patients with COVID-19 disease and healthy cases. The AICV115M dataset consisting of two classes COVID-19 and NonCOVID-19 is implemented for performance evaluation. The recorded highest accuracy on the models KNN, Ensemble and SincNet are 92.49%, 90.1% and 85.15%, respectively.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信