Procedia Computer Science最新文献

筛选
英文 中文
A Comparison of Educational Perspectives on VDI 2221 and Axiomatic Design VDI 2221与公理化设计的教育视角比较
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.01.073
Patrick Kröpfl , Christian Landschützer , Hannes Hick , Wajih Haider Awan , Christopher A. Brown
{"title":"A Comparison of Educational Perspectives on VDI 2221 and Axiomatic Design","authors":"Patrick Kröpfl ,&nbsp;Christian Landschützer ,&nbsp;Hannes Hick ,&nbsp;Wajih Haider Awan ,&nbsp;Christopher A. Brown","doi":"10.1016/j.procs.2025.01.073","DOIUrl":"10.1016/j.procs.2025.01.073","url":null,"abstract":"<div><div>Engineering design methods play a crucial role in both academia and industry. These systematic approaches facilitate product and system development, allowing for innovative solutions and refinements. Specifically, this paper will compare two common engineering design methods Axiomatic Design (AD) and VDI 2221 in terms of their application in teaching and their transferability to industry, especially for small and medium-sized enterprises (SMEs). Firstly, a quantitative comparison of the two methods will be conducted. Comparative factors will include scope, accessibility, required prior knowledge, and the availability of tools for each method. Following this, insights from teaching experiences at the Technical University of Graz and Worcester Polytechnic Institute (WPI) will be discussed, focusing on the teachability of the methods. This will provide insights into the effectiveness and suitability of the methods for higher education. The transfer potential of the methods to SMEs will be derived from these. Finally, the findings and improvement potential will be summarized, and possibilities for the knowledge transfer of engineering design methods to SMEs will be formulated.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"253 ","pages":"Pages 94-103"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-based learning for industrial maintenance: a Unity 3D educational game of compressed air system training 基于游戏的工业维护学习:压缩空气系统培训的Unity 3D教育游戏
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.01.140
Birkan Işık , Gülbahar Emir Işık , Miroslav Zilka
{"title":"Game-based learning for industrial maintenance: a Unity 3D educational game of compressed air system training","authors":"Birkan Işık ,&nbsp;Gülbahar Emir Işık ,&nbsp;Miroslav Zilka","doi":"10.1016/j.procs.2025.01.140","DOIUrl":"10.1016/j.procs.2025.01.140","url":null,"abstract":"<div><div>This research introduces an innovative approach to industrial maintenance training by developing an interactive game using an interactive game developed with the Unity 3D engine and extended reality technologies. The game simulates the compressed air system maintenance, aiming to improve technicians’ practical skills and safety awareness through immersive, realistic scenarios. Leveraging Unity 3D’s advanced graphical and physics capabilities, it creates an engaging environment where participants interact with dynamic modules, enhancing decision-making, problem-solving, and analytical thinking. Gameplay involves guiding participants through the compressed air systems maintenance process with realistic controls that respond dynamically to user inputs, thereby allowing technicians to refine technical skills with a strong emphasis on safety. Performance is evaluated based on safety compliance and technical accuracy, demonstrating the value of game-based learning in technical education. This study highlights the potential of game-based learning within Industry 5.0, promoting lifelong learning and preparing professionals for future industrial challenges.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"253 ","pages":"Pages 784-793"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards AI-enhanced process planning: assessing machine tool capability based on part design 面向人工智能增强的工艺规划:基于零件设计的机床能力评估
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.01.122
Sepideh Abolghasem , Matthew Youssef , Faruk Abedrabbo , Amman Pandde
{"title":"Towards AI-enhanced process planning: assessing machine tool capability based on part design","authors":"Sepideh Abolghasem ,&nbsp;Matthew Youssef ,&nbsp;Faruk Abedrabbo ,&nbsp;Amman Pandde","doi":"10.1016/j.procs.2025.01.122","DOIUrl":"10.1016/j.procs.2025.01.122","url":null,"abstract":"<div><div>The emergence of the fourth industrial revolution, or Industry 4.0, necessitates a more automated approach to manufacturing process planning. This process begins with evaluating machine tool capabilities to handle specific part geometries and microstructures. Once a match is established, the focus shifts to developing an efficient method for converting design elements into physical components. This work aims to create and validate a framework that assesses the manufacturability of design features based on the available machinery and materials. Specifically, it involves classifying manufacturing processes, such as turning and milling, for a given part design geometry. To achieve this, feature attributes like rotational symmetry and D2 distribution are calculated for a dataset used to train a decision tree. This model then suggests the appropriate manufacturing process for a given CAD model. The decision tree is validated with a separate dataset, showing reasonable accuracy. Ultimately, the goal is to enhance process planning, ensuring the seamless translation of designs into physical products, with a particular emphasis on geometry, microstructure, and cost.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"253 ","pages":"Pages 603-611"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Skeletal Activity Scheduler using Machine Learning 使用机器学习开发骨骼活动调度程序
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.03.054
Sagar Bhandari , Muhammad Ahsanul Habib
{"title":"Developing Skeletal Activity Scheduler using Machine Learning","authors":"Sagar Bhandari ,&nbsp;Muhammad Ahsanul Habib","doi":"10.1016/j.procs.2025.03.054","DOIUrl":"10.1016/j.procs.2025.03.054","url":null,"abstract":"<div><div>Understanding human mobility patterns is crucial for sustainable urban planning. This study presents a novel approach for predicting daily activity sequences using machine learning techniques, specifically Long Short-Term Memory (LSTM) networks and Explainable Boosting Machines (EBM). Utilizing data from the 2022 Halifax Travel Activity (HaliTRAC) Survey, we train these models to predict sequences of activities based on individual and household characteristics, aiming to balance predictive performance with interpretability. The LSTM model effectively captures complex temporal dependencies, while EBM provides clear insights into the significance of individual features, addressing the \"black box\" nature of Machine Learning models. By simplifying activity sequences into five primary activity types, the refined LSTM and EBM models achieve accuracies of 70.25% and 73.73%, respectively. Key findings highlight employment status, age, and education level as major determinants of activity patterns, with household characteristics like size playing a secondary role. This research demonstrates the potential of utilizing advanced machine learning techniques in mobility analysis, offering both accurate predictions and actionable insights. The proposed framework provides a foundation for developing transparent and reliable tools to inform transportation policies and urban development strategies.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"257 ","pages":"Pages 412-419"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Drivers of Cryptocurrency Acceptance: An Empirical Study of Individual Adoption 了解接受加密货币的驱动因素:个人采用的实证研究
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.151
Máté Hidegföldi, Gergely Laszlo Csizmazia, Justina Karpavičė
{"title":"Understanding the Drivers of Cryptocurrency Acceptance: An Empirical Study of Individual Adoption","authors":"Máté Hidegföldi,&nbsp;Gergely Laszlo Csizmazia,&nbsp;Justina Karpavičė","doi":"10.1016/j.procs.2025.02.151","DOIUrl":"10.1016/j.procs.2025.02.151","url":null,"abstract":"<div><div>Cryptocurrencies offer a novel approach to finance by eliminating the need for traditional banking and enabling secure, traceable, and internet-accessible peer-to-peer transactions. However, despite their advantages, cryptocurrencies face persistent trust issues and low levels of engagement and awareness. This research aims to investigate individuals’ behavioral intentions to use cryptocurrencies and identify factors influencing technology adoption. Employing a qualitative meta-analytic approach, a new predictive model was proposed, drawing from TAM, UTAUT, and IDT theories. A survey administered in Hungary utilized Partial Least Squares Structural Equation Modelling (PLS-SEM) for data analysis, identifying social influence, facilitating conditions, and awareness as key factors impacting perceived ease of use (PEOU) and perceived usefulness (PE).</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 547-556"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143593380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Simulated Annealing and Tabu Search for Parallel Machine Scheduling 模拟退火和塔布搜索在并行机调度中的比较分析
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.154
Alzira Mota , Paulo Ávila , João Bastos , Luís A.C. Roque , António Pires
{"title":"Comparative Analysis of Simulated Annealing and Tabu Search for Parallel Machine Scheduling","authors":"Alzira Mota ,&nbsp;Paulo Ávila ,&nbsp;João Bastos ,&nbsp;Luís A.C. Roque ,&nbsp;António Pires","doi":"10.1016/j.procs.2025.02.154","DOIUrl":"10.1016/j.procs.2025.02.154","url":null,"abstract":"<div><div>This paper compares the performance of Simulated Annealing and Tabu Search meta-heuristics in addressing a parallel machine scheduling problem aimed at minimizing weighted earliness, tardiness, total flowtime, and machine deterioration costs—a multi-objective optimization problem. The problem is transformed into a single-objective problem using weighting and weighting relative distance methods. Four scenarios, varying in the number of jobs and machines, are created to evaluate these metaheuristics. Computational experiments indicate that Simulated Annealing consistently yields superior solutions compared to Tabu Search in scenarios with lower dimensions despite longer run times. Conversely, Tabu Search performs better in higher-dimensional scenarios. Furthermore, it is observed that solutions generated by different weighting methods exhibit similar performance.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 573-582"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143593383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sovereignty in Automated Stroke Prediction and Recommendation System with Explanations and Semantic Reasoning 具有解释和语义推理的自动中风预测和推荐系统的主权
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.079
Ayan Chatterjee
{"title":"Sovereignty in Automated Stroke Prediction and Recommendation System with Explanations and Semantic Reasoning","authors":"Ayan Chatterjee","doi":"10.1016/j.procs.2025.02.079","DOIUrl":"10.1016/j.procs.2025.02.079","url":null,"abstract":"<div><div>Personalized approaches are required for stroke management due to the variability in symptoms, triggers, and patient characteristics. An innovative stroke recommendation system that integrates automatic predictive analysis with semantic knowledge to provide personalized recommendations for stroke management is proposed by this paper. Stroke exacerbation are predicted and the recommendations are enhanced by the system, which leverages automatic Tree-based Pipeline Optimization Tool <strong>(TPOT)</strong> and semantic knowledge represented in an <strong>OWL Ontology (StrokeOnto). Digital sovereignty</strong> is addressed by ensuring the secure and autonomous control over patient data, supporting data sovereignty and compliance with jurisdictional data privacy laws. Furthermore, classifications are explained with Local Interpretable Model-Agnostic Explanations <strong>(LIME)</strong> to identify feature importance. Tailored interventions based on individual patient profiles are provided by this conceptual model, aiming to improve stroke management. The proposed model has been verified using public stroke dataset, and the same dataset has been utilized to support ontology development and verification. In TPOT, the best <strong>Variance Threshold + DecisionTree Classifier</strong> pipeline has outperformed other supervised machine learning models with an accuracy of <strong>95.2%,</strong> for the used datasets. The Variance Threshold method reduces feature dimensionality with variance below a specified threshold of 0.1 to enhance predictive accuracy. To implement and evaluate the proposed model in clinical settings, further development and validation with more diverse and robust datasets are required.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 201-210"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143550880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems 通过机器学习注入的NEXT-G和超越生态系统的主动防御分析,确保数字主权和信任的现代威胁情报
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.062
Sudhakar Kumar , Sunil K. Singh , Rakesh Kumar , Chandra Kumari Subba , Kwok Tai Chui , Brij B. Gupta
{"title":"Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems","authors":"Sudhakar Kumar ,&nbsp;Sunil K. Singh ,&nbsp;Rakesh Kumar ,&nbsp;Chandra Kumari Subba ,&nbsp;Kwok Tai Chui ,&nbsp;Brij B. Gupta","doi":"10.1016/j.procs.2025.02.062","DOIUrl":"10.1016/j.procs.2025.02.062","url":null,"abstract":"<div><div>In the domain of Cyber-Physical Systems (CPS) and the Internet of Things (IoT), this research presents a novel approach to Neoteric Threat Intelligence ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems. As Sixth Generation and Beyond (6G and B) wireless networks undergo rapid evolution, our framework is designed to proactively anticipate and counter security incidents by utilizing advanced machine learning algorithms. This approach effectively addresses the shortcomings of conventional models, ensuring that digital assets and communications remain secure, trustworthy, and under rightful control. The study delves into the theoretical integration of this paradigm within the NextG network architecture, reinforcing digital sovereignty through a dynamic and adaptable defense mechanism. In-depth technical examinations include advanced machine learning algorithms, adaptive defenses, and scalability considerations. By critically analyzing and comparing existing security approaches, this study significantly advances technical knowledge and practical applications for wireless network security, supporting defenses against the evolving and complex threats characteristic of the 6G and Beyond era.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 39-47"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143550981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sovereignty-Aware Intrusion Detection on Streaming Data: Automatic Machine Learning Pipeline and Semantic Reasoning 流数据的主权感知入侵检测:自动机器学习管道和语义推理
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.066
Ayan Chatterjee , Sundar Gopalakrishnan , Ayan Mondal
{"title":"Sovereignty-Aware Intrusion Detection on Streaming Data: Automatic Machine Learning Pipeline and Semantic Reasoning","authors":"Ayan Chatterjee ,&nbsp;Sundar Gopalakrishnan ,&nbsp;Ayan Mondal","doi":"10.1016/j.procs.2025.02.066","DOIUrl":"10.1016/j.procs.2025.02.066","url":null,"abstract":"<div><div>Intrusion Detection Systems (IDS) are critical in safeguarding network infrastructures against malicious attacks. Traditional IDSs often struggle with knowledge representation, real-time detection, and accuracy, especially when dealing with high-throughput data. This paper proposes a novel IDS framework that leverages machine learning models, streaming data, and semantic knowledge representation to enhance intrusion detection accuracy and scalability. Additionally, the study incorporates the concept of Digital Sovereignty, ensuring that data control, security, and privacy are maintained according to national and regional regulations. The proposed system integrates Apache Kafka for real-time data processing, an automatic machine learning pipeline (e.g., Tree-based Pipeline Optimization Tool (TPOT)) for classifying network traffic, and OWL-based semantic reasoning for advanced threat detection. The proposed system, evaluated on NSL-KDD and CIC-IDS-2017 datasets, demonstrated qualitative outcomes such as local compliance, reduced data storage needs due to real-time processing, and improved adaptability to local data laws. Experimental results reveal significant improvements in detection accuracy, processing efficiency, and Sovereignty alignment.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 78-87"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143551018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring Digital Sovereignty in Cross-chain EHR Sharing: A Relay-as-a-Service Approach for Secure Healthcare Interoperability 确保跨链EHR共享中的数字主权:用于安全医疗互操作性的中继即服务方法
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.063
Dharavath Ramesh , Thakur Santosh , Munesh Chandra Trivedi , Chi Hieu Le
{"title":"Ensuring Digital Sovereignty in Cross-chain EHR Sharing: A Relay-as-a-Service Approach for Secure Healthcare Interoperability","authors":"Dharavath Ramesh ,&nbsp;Thakur Santosh ,&nbsp;Munesh Chandra Trivedi ,&nbsp;Chi Hieu Le","doi":"10.1016/j.procs.2025.02.063","DOIUrl":"10.1016/j.procs.2025.02.063","url":null,"abstract":"<div><div>Electronic Health Records (EHRs) stored in cloud environments often face privacy challenges in healthcare data management due to the divide between patient ownership and institutional control. Blockchain technology offers a promising solution with its features of immutability and traceability. However, existing blockchain-based approaches for EHR privacy preservation are limited to single institutions and fail to address the critical need for cross-chain compatibility and digital sovereignty. To bridge this gap, we propose two novel strategies: Polkadot-based Cross-chain for EHR-preserving Blockchain (PCEB) and Relay-as-a-Service-based Cross-chain for EHR-preserving Blockchain (RaSCEB). PCEB utilizes Polkadot's relay communication to securely share EHR data across multiple healthcare networks while preserving patient privacy and ensuring digital sovereignty. RaSCEB introduces Relay-as-a-Service (RaaS) to enable seamless EHR sharing across blockchain ecosystems, empowering patients with control over their data while maintaining regulatory compliance and sovereignty over their digital health records. Both approaches are validated through comprehensive security analysis and performance evaluations. We also present an interoperability framework tailored for permissioned blockchain networks, emphasizing trust derived from consensus mechanisms. Our work addresses the urgent need for cross-chain compatibility in EHR privacy preservation and advances interoperability solutions while safeguarding digital sovereignty in healthcare and beyond.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 48-57"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143551085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信