2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)最新文献

筛选
英文 中文
Implementation of an Expert System in Diagnosing Obstetrical Health in Pregnant Women using Fuzzy Algorithms and Certainty Factor 基于模糊算法和确定性因子的孕妇产科健康诊断专家系统的实现
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010502
Munawaroh, Niki Ratama, Diki Rasapta, Septa, Syndhe Qumaruw Syty, Octaviana Anugrah Ade Purnama
{"title":"Implementation of an Expert System in Diagnosing Obstetrical Health in Pregnant Women using Fuzzy Algorithms and Certainty Factor","authors":"Munawaroh, Niki Ratama, Diki Rasapta, Septa, Syndhe Qumaruw Syty, Octaviana Anugrah Ade Purnama","doi":"10.1109/ICCED56140.2022.10010502","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010502","url":null,"abstract":"The maternal mortality rate (MMR) in Indonesia is still very high and the highest among ASEAN countries. In 1990, the MMR was at a rate of 390 per 100,000 live births, and a survey in 2002-2003 yielded an estimate of 307 per 100,000 live births. However, the analysis concludes that the situation is very concerning for Indonesian women. An expert system is needed to help pregnant women find out quickly the health condition of the womb in pregnant women based on the symptoms that appear. Not only types of disease, this system also informs how to handle pregnant women whose health conditions are problematic. The method used is the fuzzy logic method and the certainly factor method is used to predict the health condition of pregnant women based on age and temperature, then the certainly factor method is used to predict the health of pregnant women based on the symptoms suffered. The results of this study are to make it easier for pregnant women to obtain information about the health of the womb in pregnant women who are suffering, as well as get solutions for handling it and make it easier for pregnant women to diagnose the health of pregnant women. The analysis of the maternal health diagnosis system has provided convenience and can be used as an alternative to diagnose other diseases, because it is able to diagnose accurately according to the symptoms felt, so that it can help make it easier to get accurate diagnostic results.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Absorption, Attention, Perceived Enthusiasm of Customer Satisfaction On Electronic Video on Demand 顾客满意度的吸收、注意力、感知热情对电子视频点播的影响
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/icced56140.2022.10010462
Fajar Julius Sorgang Lobuan Manurung, Muhammad Aufar Alfarisi, Cahya Resqia Dewi, Yudi Fernando, R. Ikhsan
{"title":"Impact of Absorption, Attention, Perceived Enthusiasm of Customer Satisfaction On Electronic Video on Demand","authors":"Fajar Julius Sorgang Lobuan Manurung, Muhammad Aufar Alfarisi, Cahya Resqia Dewi, Yudi Fernando, R. Ikhsan","doi":"10.1109/icced56140.2022.10010462","DOIUrl":"https://doi.org/10.1109/icced56140.2022.10010462","url":null,"abstract":"Business always starts with customers. It is because business revenue, development, and survival depend on customers. Therefore, it is necessary to design the electronic video on demand based on the customer's preference. However, designing information systems is always challenging without understanding the customers' needs. Many electronic services providers and digital platforms fail because they do not fully understand customer requirements. Therefore, business owners should understand, prioritise, and meet their customers' expectations in the competitive business environment and satisfy them. This study examines the impact of the absorption, attention, and perceived enthusiasm on customer satisfaction that utilise Video on Demand (Vod) streaming services. This study employed a quantitative approach with survey data from VoD service users in Indonesia. PLS-SEM is used to test five hypotheses statistically. The findings revealed a significant link between absorption, attention, and perceived enthusiasm and customer satisfaction. This study also investigated the interrelationship of the key variables absorption and attention with perceived enthusiasm. Finally, it was suggested that the relationship could lead to more research.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Malware Detection Results using Visualization-Based Detection Techniques ant Convolutional Neural Network 基于卷积神经网络的可视化检测技术改进的恶意软件检测结果
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010439
Putu Sukma Dharmalaksana, T. Mantoro, Lutfi G A Khakim, Muchlis Nurseno
{"title":"Improved Malware Detection Results using Visualization-Based Detection Techniques ant Convolutional Neural Network","authors":"Putu Sukma Dharmalaksana, T. Mantoro, Lutfi G A Khakim, Muchlis Nurseno","doi":"10.1109/ICCED56140.2022.10010439","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010439","url":null,"abstract":"The rapid advancement of internet technology has carried major changes in the use of software, st the industry growing up and competing with each other to present innovations for making life easier. However, software spread on various platforms contains a lot of malware, which can compromise the security of users’ personal information. Until now, researchers continue to try various methods of malware detection to minimize the weaknesses of dynamic and static methods. This study will compare the malware detection method using Visualization-Based Detection Techniques and one type of deep learning, which is Convolutional Neural Network (CNN). The evaluation experiment used two methods of image augmentation, which are the B2IMG dan Gabor Filter methods. The CNN architectures that we used, such as VGG3 dan other architectures combined with several convolutional layers and pooling layers. The evaluation run result indicates that the B2IMG visualization method got a maximum accuracy value of 99,86% and an F-score of 97,00% when using colored RGB image format.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prevention of Misuse of Information Technology in the Health Industry 预防健康产业滥用资讯科技
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010457
Hastanto Januar Ahmad, T. Mantoro, Ivan Yulivan
{"title":"Prevention of Misuse of Information Technology in the Health Industry","authors":"Hastanto Januar Ahmad, T. Mantoro, Ivan Yulivan","doi":"10.1109/ICCED56140.2022.10010457","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010457","url":null,"abstract":"Technological advances in the field of digitalization and networks of information have made the world enter the industrial revolution 4.0 including in the health and medical sector. This revolution is marked by the easy exchange of information in a short amount of time without being limited by geographical constraints and the shift from paper-based documents to digital. The health sector has also begun to adopt the 4.0 revolution by making health services more accessible to the public such as online medical applications, the use of electronic medical records, and the use of big data to personalize medical therapy for sick people. Even though the use of this information technology has a lot of benefits, there is also potential to be misused such as the purchase of dangerous medicines and leakage of patient's medical data also inadequate support from telemedical services due to a lack of guidance for personnel which has the potential to harm both physically and materially. Indonesia currently does not have a defense mechanism and regulations to protect its citizen from the misuse of information technology in the health industry. Systematic efforts are needed so that the use of information technology can run properly and safely. There need to be some measures to prevent the unlawful use of health information technology such as strict regulation and monitoring, defense against cyber hacking and leakage, also adequate training for the operators of health services in using the technology","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124165928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the Cyber Attacks in Indonesia’s Health Sector in Industry 4.0 Era 工业4.0时代印尼卫生部门网络攻击分析
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/icced56140.2022.10010340
A. Hidayat, Teddy Mantoro, A. Susandi
{"title":"Analysis of the Cyber Attacks in Indonesia’s Health Sector in Industry 4.0 Era","authors":"A. Hidayat, Teddy Mantoro, A. Susandi","doi":"10.1109/icced56140.2022.10010340","DOIUrl":"https://doi.org/10.1109/icced56140.2022.10010340","url":null,"abstract":"At this time the world has undergone considerable changes, where the world has entered the era of the industrial revolution 4.0. With these changes, there are many positive impacts or opportunities that can support human activities in the economic, political, socio-cultural, health, and other fields. And alsothe author tries to analyze about industry 4.0 era for Indonesia’s health sector with SWOT Analysis to know about Strenght, Weaknesses, Opportunities, and Threats. However, the challenges of technological advances can pose a threat to countries that are not ready to facethem, one of which is cyber attacks that can threaten data security. Therefore, it is necessary to be prepared in terms of data security by cooperating with various parties involved in it.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indonesia’s Economic Recovery Post Covid-19 Pandemic Sentiment Analysis 2019冠状病毒病大流行后印尼经济复苏情绪分析
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010695
A. Erfina, Lakoa Fitina, Prasetyo Hartanto, Sudin Saepudin, Diah Rahmalenia, Dini Maulinda, Fauziah Nur Octafiani
{"title":"Indonesia’s Economic Recovery Post Covid-19 Pandemic Sentiment Analysis","authors":"A. Erfina, Lakoa Fitina, Prasetyo Hartanto, Sudin Saepudin, Diah Rahmalenia, Dini Maulinda, Fauziah Nur Octafiani","doi":"10.1109/ICCED56140.2022.10010695","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010695","url":null,"abstract":"Since the Covid-19 pandemic was first confirmed on March 2, 2020, Indonesia has faced many crises, one of which is the economic crisis. Many companies lose profits and impose layoffs for their workers. The Indonesian government in its efforts to restore the economy in Indonesia carried out several maneuvers such as eliminating the PCR/SWAB requirement for public transportation users and increasing tourism enthusiasm in Indonesia by organizing the Mandalika MotoGP. However, this is considered insufficient by some groups of people because the prices of primary needs continue to increase. This study aims to find out public sentiment towards the government for efforts to restore the economy in Indonesia. The results of this study indicate that the Indonesian government is considered successful and has taken the right steps in efforts to recover the economy in Indonesia. This is evidenced by the high percentage margin between positive and negative sentiments of 37%.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Traffic Management System using Internet of Things: A Systematic Literature Review 基于物联网的智能交通管理系统:系统文献综述
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010602
Hendra Marcos, R. Gernowo, I. Rosyida, O. Nurhayati
{"title":"Intelligent Traffic Management System using Internet of Things: A Systematic Literature Review","authors":"Hendra Marcos, R. Gernowo, I. Rosyida, O. Nurhayati","doi":"10.1109/ICCED56140.2022.10010602","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010602","url":null,"abstract":"The number of vehicles on the road will continue to expand as cities worldwide grow in population. This increases transportation congestion, especially in major cities and especially during rush hour. This phenomenon continuously pushes academics, city authorities, and urban planners to enhance traffic control systems for safety and efficiency. The application of Internet of Things (IoT) in the field of intelligent transportation systems is getting the attention of many parties. A well-controlled transportation management system can reduce congestion, especially at intersections and roads. This study was conducted to observe and study the development of research in transportation management, especially the use of IoT technology. There are 743 documents according to the keywords given related to IMS and ITS, the period 2012 until September 2021. Mapping of these articles, both in terms of publishers, the relationship between authors, and the methods used from keywords, abstracts, and titles, is expected to help the author determine research gaps and future research directions.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cost-Effective IoT Device for Protecting People from the Dangers of Environmental Risk in Bangladesh 一种具有成本效益的物联网设备,可保护孟加拉国人民免受环境风险的危害
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010393
Mahmuda Mahfuz Rimi, Md Rasel Ahmed, Sakhawat Hossan, Masudur Rahaman, Md Anowar Hossen Faysal, Md. Ferdouse Ahmed Foysal
{"title":"A Cost-Effective IoT Device for Protecting People from the Dangers of Environmental Risk in Bangladesh","authors":"Mahmuda Mahfuz Rimi, Md Rasel Ahmed, Sakhawat Hossan, Masudur Rahaman, Md Anowar Hossen Faysal, Md. Ferdouse Ahmed Foysal","doi":"10.1109/ICCED56140.2022.10010393","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010393","url":null,"abstract":"The factors of population growth, unplanned urbanization, vehicles, factories, and brick kilns are constantly making air quality concerns. In addition, due to lack of public awareness, people are continually facing various kinds of unintended accidents, for example, gas cylinder poisoning. The main objective of our paper is to create a low-cost Internet of Things (IoT) based system that can measure atmospheric air quality and gas leakage. Sensitive data will be stored on the server via the Internet of Things (IoT) device, which will visualize the data from the server via the website and the Android app. Moreover, by understanding the state of the environment, the user will be informed about the environment through Android apps and websites to protect himself from the grip of air pollution and protect himself before an accident like a gas cylinder.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Government Regulations to Anticipate the Threat of Terrorism with Radioactive and Nuclear Technology 整合政府法规,以预测放射性和核技术的恐怖主义威胁
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010339
Mega Agustina, Rika Wijiyanti, T. Mantoro
{"title":"Integration of Government Regulations to Anticipate the Threat of Terrorism with Radioactive and Nuclear Technology","authors":"Mega Agustina, Rika Wijiyanti, T. Mantoro","doi":"10.1109/ICCED56140.2022.10010339","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010339","url":null,"abstract":"The development of science and technology is currently experiencing rapid progress, starting in the fields of energy, oil, non-destructive testing, health, agriculture, and other fields. The use of radioactive substances in the health sector is used for radiotherapy, nuclear medicine, and radiodiagnostics. The use of excess nuclear and radioactive substances can endanger living things and the environment. Monitoring and supervision of the use of these elements are very needed in order to avoid their utilization for non-peaceful purposes, such as terrorism. Nowadays, terrorist attacks in Indonesia began to evolve from the use of conventional explosives to the use of chemical, biological, radioactive, and nuclear materials. The data shows that during the period 2011-2019, there have been six attempted terror attacks using chemical, biological, radioactive, and nuclear elements. This paper examines the role of ministries/agencies in anticipating the use of nuclear and radioactive substances for terrorism. Based on the results of the library study, there are several ministries/agencies that have protocols for handling terrorism attacks that use chemical, biological, radioactive, and nuclear elements, but they are still sectoral. Therefore, it can be concluded that the integration of the regulations/protocols in handling terrorist attacks by using nuclear and radioactive elements are needed in order to increase the monitoring and supervision of the handling of radioactive waste. In addition, it is necessary to add the RPM tools to prevent the misuse of radioactive substances and nuclear materials by irresponsible parties.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security System In The Safe With The Personal Identification Method Of Number Identification With Modulo Arthmatic Patterns 基于模数模式的个人身份识别方法的保险箱安全系统
2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED) Pub Date : 2022-07-28 DOI: 10.1109/ICCED56140.2022.10010402
Aripin Triyanto, A. Sunardi, Woro Agus Nurtiyanto, Moch Koiru Ihksanudin, Mardiansyah
{"title":"Security System In The Safe With The Personal Identification Method Of Number Identification With Modulo Arthmatic Patterns","authors":"Aripin Triyanto, A. Sunardi, Woro Agus Nurtiyanto, Moch Koiru Ihksanudin, Mardiansyah","doi":"10.1109/ICCED56140.2022.10010402","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010402","url":null,"abstract":"The burglary of a safe in the city of Jombang, East Java, lost valuables belonging to the Cemerlang Multipurpose Trading Cooperative. Therefore, a security system tool was created in the safe that serves as a place to store valuables and important assets. Change the security system using the security system with a private unique method with modulo arithmetic pattern. The security system of the safe is designed in layers which are attached with the RFID tag by registering and then verifying it on the card. Entering the password on the card cannot be read or is not performed, then the system will refuse to open it. arduino mega type 256 components, RFID tag is attached to the RFID reader, only one validated passive tag can open access to the security system, namely number B9 20 E3 0F. Meanwhile, of the ten passwords entered, only three match the modulo arithmetic format and can open the security system, namely password numbers 22540, 51324 and 91032. The circuit system on the transistor in the solenoid driver circuit works after the safety system opens. The servo motor can rotate according to the input of the open 900 servo angle rotation program.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信