2023 International Conference on Networking and Communications (ICNWC)最新文献

筛选
英文 中文
A Logical Investigation of Stock Market Prediction and Analysis using Supervised Machine Learning Algorithm 基于监督机器学习算法的股票市场预测与分析的逻辑研究
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127391
R. Dhanalakshmi, V. V. Kumar, Saleem Basha, N. Vijayaraghavan
{"title":"A Logical Investigation of Stock Market Prediction and Analysis using Supervised Machine Learning Algorithm","authors":"R. Dhanalakshmi, V. V. Kumar, Saleem Basha, N. Vijayaraghavan","doi":"10.1109/ICNWC57852.2023.10127391","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127391","url":null,"abstract":"In the Field of computer science, artificial intelligence (AI) is a broad field, which is concerned with structuring smart products and machines able to perform tasks which require the intellectual capability of humans. Artificial Intelligence is in need for Stock trading’s future. Robotic advisers examine millions of pieces of data using artificial intelligence and carry out the analysis at the best possible price. Market forecasts are more precise and effective thanks to the analysts. For providing higher returns, the trading firms efficiently mitigate the risk using Artificial Intelligence Techniques. Our proposed Stock Market system is a Web Application which uses the Random Forest Algorithm. The Random Forest Algorithm comes under Supervised Learning. With the system, one can forecast the stock prices for the subsequent days.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128467897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Labeling of Textual Cyberbullying using BiLSTM and BERT 基于BiLSTM和BERT的文本网络欺凌识别与标记
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127308
Shikhar S Gupta, Unnati Vadgama, T. R. Vedhavathy
{"title":"Identification and Labeling of Textual Cyberbullying using BiLSTM and BERT","authors":"Shikhar S Gupta, Unnati Vadgama, T. R. Vedhavathy","doi":"10.1109/ICNWC57852.2023.10127308","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127308","url":null,"abstract":"In this aeon of digitalization, people are inclining more and more towards technology. This has both positive and negative aspects, and one of the negative effects is cyberbullying. Cyberbullying allows people to comment negatively on various social media platforms, this project aims at detecting and classifying such text. Using BiLSTM (Bidirectional Long Shortterm Memory) and BERT(Bidirectional Encoder Representations from Transformers), the cyberbullying text on various social media platforms is identified and classified into classes such as religion, age, gender, ethnicity, not_cyberbullying and other_cyberbullying. This helps in keep the record of types of cyberbullying that occurs on social media and whether it’s reduced over time after reporting it and taking strict measures against it.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification with Deep Learning Methods for Detecting and Staging Bone Cancer from MRI 基于深度学习方法的MRI骨癌检测与分期图像分类
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127368
E. Lingappa, L. Parvathy
{"title":"Image Classification with Deep Learning Methods for Detecting and Staging Bone Cancer from MRI","authors":"E. Lingappa, L. Parvathy","doi":"10.1109/ICNWC57852.2023.10127368","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127368","url":null,"abstract":"Mutations in cancer-causing genes can be passed down from parents to offspring. or because of DNA dam age from unprotected exposures to the elements. Cancer, which is brought on by unchecked cell development, can be lethal. Bone cancer begins when normally functioning bone cells undergo a malignant transformation and proliferate out of control, resulting in a tumour. When it comes to cancers of the bones, the incidence and severity rank high. To treat bone cancer effectively, early diagnosis and staging are essential. This study utilized CT and MRI with a Convolutional Neural Network to detect bone malignancy. The accuracy of the suggested technique was evaluated using 100 bone MRIs from patients who had already been validated. In this analysis, CNNs are utilised to determine if a bone tumour is benign or malignant. Classifying bone cancer using the proposed method is highly accurate (93.75 percent).","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Candlestick Chart Based Stock Analysis System using Ensemble Learning 基于集成学习的烛台图股票分析系统
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127261
Angel Ann Varghese, J. Krishnadas, R. S. Kumar
{"title":"Candlestick Chart Based Stock Analysis System using Ensemble Learning","authors":"Angel Ann Varghese, J. Krishnadas, R. S. Kumar","doi":"10.1109/ICNWC57852.2023.10127261","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127261","url":null,"abstract":"The 1$8^{mathrm{t}mathrm{h}}-$century candlestick charts, which were first utilized in the Japanese rice market, are now frequently used in trading tactics across all financial markets. Candlestick charts make it possible to comprehend an asset’s opening, high, low, and closing values all in one image. In addition to these benefits, the abundance of candlestick chart patterns makes practical application challenging. A software framework that employs candlestick charts to forecast trend direction was built for this study. There are four stages of the project. A system that can identify candle patterns is developed in the first stage. The second stage involves executing training and testing procedures on data sets with labeled candlestick chart types and trend directions in order to assess the model’s performance. During the machine learning phase, open-source techniques like xgboost were applied. In the project’s final stage, it was discovered that the strategy focused solely on identifying candlestick patterns and taking positions in line with the trend based on the suggested methodology produced larger profits in 11 global indices than the Buy & Hold strategy. In comparison to the current accuracy of 53.8%, the model’s average forecast accuracy is 59.42%","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel hybrid automatic intrusion detection system using machine learning technique for anomalous detection based on traffic prediction 一种基于流量预测的机器学习异常检测混合自动入侵检测系统
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127442
D. Vinod, M. Prasad
{"title":"A novel hybrid automatic intrusion detection system using machine learning technique for anomalous detection based on traffic prediction","authors":"D. Vinod, M. Prasad","doi":"10.1109/ICNWC57852.2023.10127442","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127442","url":null,"abstract":"Traffic classification is an automated technique that divides computer network traffic into several categories depending on different factors like protocol or port number. In a complicated context, traffic categorization is an important tool for network and system security. A monitoring system called intrusion detection looks for abnormal activity and sends out notifications. In order to safeguard a system from network-based attacks, Network Intrusion Detection Systems (NIDS) play a crucial role in monitoring and analyzing network traffic. Active and passive intrusion detection systems (IDS), network intrusion detection systems (NIDS), host intrusion detection systems (HIDS), knowledge-based (signature-based) IDS, and behaviorbased (anomaly-based) IDS are some of the numerous types of intrusion detection systems (IDS). Passive IDS is just designed to monitor and analyze network traffic behaviour and notify an operator of potential vulnerabilities and attacks, whereas Active IDS is also known as Intrusion Detection and Prevention System. A network’s malicious traffic is identified using a network-based intrusion detection system (NIDS). A host-based IDS monitors system activity and seeks for indications of abnormal behaviour. For networks with unidentified traffic, the intrusion detection system designed using flow and payload statistical characteristics and clustering approach needs additional clusters. The present intrusion detection system however is affected by false alarm rate, poor detection rate, imbalanced datasets and response time which lead to misclassification of intrusions in various scenarios. Hence, there is a requirement for developing an automated intrusion detection system that works well in different scenarios. The proposed system uses supervised and unsupervised intrusion detection and classification methods to increase the classification accuracy. To categorize the intrusions, dimensionality reduction strategies are used in conjunction with the classification procedure of logistic regression. Performance of intrusion detection system using PCA as dimensionality reduction algorithm has been evaluated with different classifiers such as Logistic Regression (LR), K-Nearest Neighbors (K-NN), Random Forest (RF), Support Vector Machine (Kernel SVM), Decision Tree (DT) using CIC IDS 2022 dataset. An automated way to detect intrusions has been proposed with cluster formation using adaptive weight butterfly optimization algorithm.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Know Them: Convolutional Neural Networks For Facial Emotion Recognition 了解他们:用于面部情绪识别的卷积神经网络
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127451
S. Swathi, M. B. Deepika Lakshmi, B. S. Minu Dhakshina, S. Aanandhini
{"title":"Know Them: Convolutional Neural Networks For Facial Emotion Recognition","authors":"S. Swathi, M. B. Deepika Lakshmi, B. S. Minu Dhakshina, S. Aanandhini","doi":"10.1109/ICNWC57852.2023.10127451","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127451","url":null,"abstract":"Humans are capable of thousands of facial actions during communication that varies in complexity, intensity, and meaning. Emotions play a major role in Human life. Visually challenged is one of the marginalized people who face day-to-day problems without seeing the world. They find it difficult to predict the emotional state of a person surrounding them, this project helps them to understand the emotions of others through the facial expressions and thus interact well with people socially especially in public places. The rapid advancement in technology has now helped visually challenged people to explore the world through mobile phones. Few features that help them use these devices are virtual assistants, text-to-voice converters, image recognizers etc. Know Them is an application that uses image processing methods and Convolutional Neural Network (CNN) algorithms to identify the emotions of the people that the visually challenged wanted to know.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122451126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telemetry Simulation & Analysis 遥测仿真与分析
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127430
Pratyusha Gupta, Harshal Gupta, S. Ushasukhanya, E. Vijayaragavan
{"title":"Telemetry Simulation & Analysis","authors":"Pratyusha Gupta, Harshal Gupta, S. Ushasukhanya, E. Vijayaragavan","doi":"10.1109/ICNWC57852.2023.10127430","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127430","url":null,"abstract":"The purpose of this project is to analyze telemetry data for a comprehensive analysis of driving conditions, range, electric motor performance, and other characteristics linked to telemetry packets based on information transmitted by the car Telematics Control Unit (TCU). The strategy is intended to assist us in eliminating the requirement for sending test vehicles out to verify every tiny modification made by the software team and its impact on the core functionality of the vehicle systems. In the automobile industry, telemetry provides very useful information about a driver’s performance and vehicle by collecting telemetry data from sensors within the vehicle TCU. This is done for various reasons varying from, insurance rating and predictive maintenance to staff compliance monitoring. Telemetry analysis has taken over the complete control of the automobile sector. These conclusions are driving the automobile industry toward some unbelievable and never-before results. The automobile industry is on a roll and Telemetry Analysis is its wheels. Telemetry Analysis has helped the automobile industry achieve things that were beyond our imaginations from analyzing the trends to understanding the supply chain management, from taking care of its customers to turning our wildest dream of connected cars into a reality, Vehicle Telemetry Analysis is well and truly driving the automobile industry crazy.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Academic Information Storage and Verification Using Blockchain Technologies 基于区块链技术的学术信息存储与验证
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127235
S. Prabu, M. Sumathi, M. Rajkamal
{"title":"Academic Information Storage and Verification Using Blockchain Technologies","authors":"S. Prabu, M. Sumathi, M. Rajkamal","doi":"10.1109/ICNWC57852.2023.10127235","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127235","url":null,"abstract":"In general, academic verification of an employee is done manually takes a lot of time, cost and less trustworthy. The trustworthiness of the certificate is dependent on the employee. Due to financial benefits and other advantages, fake certificates are easily created by fraudulent members. Detecting a fraudulent certificate is a hard process. Nowadays, blockchain technology provides wonderful benefits to all sectors for maintaining documents in an immutable manner. Once the data is stored in a blockchain, no one can change or delete that data. Hence, blockchain technology is used to store and verify academic information is highly scalable and guaranteeing the privacy of users’ data. In a proposed work, the blockchain network is created between the educational institutions and employers for efficient information sharing and verification. For unique identification of the certificates QRcode is assigned to each academic certificate. By using SHA256 algorithm the hash value of the QRcode is calculated and has been stored in a block in a distributed ledger. The employer calculates the hash value of the certificate which is submitted by the employee and compared this hash value to the hash value of the certificate stored in the block. If both are equal, the employer identifies it’s a valid certificate or else rejected it’s invalid certificate. Thus, trustworthy verification like confidentiality, authentication, authorization, ownership and privacy is achieved through blockchain technology. Likewise, the certificate verification latency is reduced and throughput is increased in this approach.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study and analysis of various COVID-19 prediction techniques using CT images: A challenging overview 利用CT图像研究和分析各种COVID-19预测技术:一个具有挑战性的概述
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127326
Sonali Dhamele, G. Niranjana
{"title":"Study and analysis of various COVID-19 prediction techniques using CT images: A challenging overview","authors":"Sonali Dhamele, G. Niranjana","doi":"10.1109/ICNWC57852.2023.10127326","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127326","url":null,"abstract":"coronavirus disease (COVID-19) has scattering quickly across a globe due to its exceedingly infectious natural world and is affirmed as epidemic by World Health organization (WHO). This deadly disease has depicts the globe to a standstill. From a breakdown economy to increasing bereavement charges, this viral disease is infectingeverybody. It is significant to hold the increase to diminish the danger of affection. This can be carried outby means of extensive testing and tracing of contacts. In the detection of COVID-19, three major screening processes are utilized, which include chest X-Ray (CXR), Computed Tomography (CT) as well as Reverse TranscriptasePolymerase Chain Reaction (RT-PCR). To struggle against a rapid increase of coronavirus, analysis of CT clinical images engage a vital part in precise diagnostic. Hence, this survey paper overviews some techniques consequent to a detection of COVID-19 utilizing CT images. This survey assess 25 research papers concentrated on COVID-19 prediction utilizing CT images and presented method-wise overviews, like deep learning-based techniques, optimization based methods, transfer learning based techniques, and machine learning based approaches. An evaluation takes part in a review based on cataloging probe techniques, tools etemployed datasets, publication year, and evaluation metrics for the prediction of COVID-19. At last, the troubles and demerits of reviewed methods are explicated, which motive probers for introducing new effective methods for predicting COVID-19 by wielding images of CT.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122488253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Crop Cultivation Based on Weather Monitoring System 基于气象监测系统的作物优化栽培
2023 International Conference on Networking and Communications (ICNWC) Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127317
Anubhav Mishra, Merin Sheejith, B. Yamini
{"title":"Optimized Crop Cultivation Based on Weather Monitoring System","authors":"Anubhav Mishra, Merin Sheejith, B. Yamini","doi":"10.1109/ICNWC57852.2023.10127317","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127317","url":null,"abstract":"This project furnishes an automated vision of a climate and plant monitoring system. Based on it, the device stores data which are collected at a predetermined sampling interval for monitoring and analysis of various environmental parameters such as humidity, temperature, barometric pressure, wind speed and direction, air quality, rainfall amount and location coordinates. The device’s central processing unit consists of an Arduino UNO that is used in collecting data and information about various sensors and probes. This type of system can be deployed in controlled environments such as farms and aquaculture. The idea behind this is primarily to monitor and forecast the weather at a micro-ecological level, and monitor premeditated situations to issue warnings in adverse circumstances. Hardware-wise, it consists of a programmable circuit board and for software an integrated development environment that functions on available operating systems is used. Arduino’s microcontroller is used to develop a weather monitoring system based on temperature and humidity variables obtained from a DHT11 sensor. When testing, the monitoring system should be able to convey whether the weather is harsh, normal, or rainy, etc. based on accurate temperature and relative humidity within a 20-meter range. This project primarily incorporates the field-based control systems of two studies and the data collection strategy to produce a database system based on the attributes used to generate the data presented. The main elements here have been selected based on the sensors that are commonly used to build the system to design an effective weather monitoring project. The recommended sensors are used here to measure and collect temperature and humidity data. Weather monitoring proposes a system that monitors the weather in real-time through a mobile application. This very underrated platform to connect all these different types of sensors and broadcast their data over the internet is provided by Arduino UNO. The main intention of the work is to record the weather, which can be easily monitored remotely via the Internet of Things with the help of Arduino UNO. This lays out users with an easier, more reliable, and quicker way to assess the weather and other environmental parameters.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信