2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)最新文献

筛选
英文 中文
Face Recognition Login Authentication for Digital Payment Solution at COVID-19 Pandemic 新冠肺炎疫情下数字支付解决方案的人脸识别登录认证
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274654
Muhammad Irwan Padli Nasution, N. Nurbaiti, N. Nurlaila, Tri Inda Fadhila Rahma, Kamilah Kamilah
{"title":"Face Recognition Login Authentication for Digital Payment Solution at COVID-19 Pandemic","authors":"Muhammad Irwan Padli Nasution, N. Nurbaiti, N. Nurlaila, Tri Inda Fadhila Rahma, Kamilah Kamilah","doi":"10.1109/IC2IE50715.2020.9274654","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274654","url":null,"abstract":"On March 11, 2020 the World Health Organization has announced the status of a global pandemic of corona virus disease 2019 or also called corona virus disease 2019 (COVID-19). The World Health Organization defines this disease as a pandemic because all citizens of the world are potentially exposed to COVID-19 infection. With the establishment of the global pandemic status, WHO also confirmed that COVID-19 was an international emergency. The trend of digitalization is becoming a new business trend to develop and survive in the midst of a crisis due to this pandemic. The online buying and selling market, digital payments and electronic health services, from online training classes to consulting with doctors via the internet, continue to increase. Some companies in the offline market also continue to operate by implementing health protocols. The form of digital payments continues increasing, this is because according to WHO the surface of objects can be a medium in the spread of the covid-19 virus. However, some digital payment media still require a card and enter a Personal Identification Number (PIN) in the Electronic Data Capture machine. For a solution so that the buyer does not need to bring a card and touch the Electronic Data Capture machine, face recognition authentication can be developed instead of PIN.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
IT Infrastructure Security Risk Assessment using the Center for Internet Security Critical Security Control Framework: A Case Study at Insurance Company 使用互联网安全中心关键安全控制框架的IT基础设施安全风险评估:一个保险公司的案例研究
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274594
H. Winarno, Fatah Yasin, Muhamad Aries Prasetyo, Fathur Rohman, M. R. Shihab, B. Ranti
{"title":"IT Infrastructure Security Risk Assessment using the Center for Internet Security Critical Security Control Framework: A Case Study at Insurance Company","authors":"H. Winarno, Fatah Yasin, Muhamad Aries Prasetyo, Fathur Rohman, M. R. Shihab, B. Ranti","doi":"10.1109/IC2IE50715.2020.9274594","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274594","url":null,"abstract":"PT. XYZ is an insurance company that currently provides a variety of services using electronic systems in 80 service offices throughout Indonesia. At the end of 2019, the company experienced an IT security incident. The core application was hit by a malware attack that caused slow system performance and disruption of insurance operational services. These events have a negative impact on the company both operationally and to customers, so that it becomes a serious concern of management. Therefore, this research aims to see how companies develop infrastructure to ensure the reliability and improvement of IT security. The research methodology used is a qualitative approach by collecting data through documentation and interview studies. Based on the results of the assessment, there were 16 out of 20 controls that exceeded the threshold value. These results illustrate that the security of the IT infrastructure of PT. XYZ is very weak. Therefore, the company must carry out 13 recommendations for improvement that will be carried out in stages. This research is expected to be a lesson for other organizations especially insurance companies to improve the reliability and security of IT infrastructure.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127072565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Attention-based Approach to Detect Emotion from Tweets 一种基于注意力的推文情感检测方法
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274600
Sifat Ahmed, Abdus Sayef Reyadh, Fatima Tabsun Sithil, F. Shah, Asif Imtiaz Shaafi
{"title":"An Attention-based Approach to Detect Emotion from Tweets","authors":"Sifat Ahmed, Abdus Sayef Reyadh, Fatima Tabsun Sithil, F. Shah, Asif Imtiaz Shaafi","doi":"10.1109/IC2IE50715.2020.9274600","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274600","url":null,"abstract":"In today’s world, social networks are the place where user share their views, emotions in their way. Social media, such as Twitter, Instagram, Facebook, etc. where millions of people express their views in their daily day-to-day life, which can be their sentiments and opinions or expressing emotions about a particular thing or their own. This gave researchers an outstanding opportunity to analyze the emotions of users’ activities on social networks. These massive digital data contain people’s day to day life sentiments, opinions, and showing emotions. Over the years there have been different research on emotion analysis of the social platform. As people tend to have different thoughts, analyzing the right emotion from social data is becoming a challenge. This clearly states that there is a need for an attempt to work towards these problems and it has opened up several opportunities for future research for hidden emotion identification, users’ emotions about a particular topic, etc. Detecting emotion from text is one of the toughest challenges in natural language processing. Developing a system that can detect emotion from social media is a crying need as people are sharing more of their thoughts here. In this research work, to learn the representation of the tweets, we propose an attention-based model. The proposed model has been divided into different components and subcomponents consisting of ID Convolution, Bidirectional LSTM, and Attention mechanism. We create a new dataset from SemEval Affect in Tweets dataset and then conduct experiments for the best outcomes. Our model achieves up to 79% accuracy in this task.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Job Satisfaction and Worker Performance on Digital Business Company 数字化商务公司工作满意度与员工绩效的调查研究
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274648
Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Mohamad Yusup Dias Ibrahim, Sofian Lusa, D. I. Sensuse, Nadya Safitri, Damayanti Elisabeth
{"title":"Investigation of Job Satisfaction and Worker Performance on Digital Business Company","authors":"Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Mohamad Yusup Dias Ibrahim, Sofian Lusa, D. I. Sensuse, Nadya Safitri, Damayanti Elisabeth","doi":"10.1109/IC2IE50715.2020.9274648","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274648","url":null,"abstract":"Nowadays, digital marketing strategy has made major improvement in business and industry within more than two decades. In the era of rapid information technology development, business competition is also getting stricter through the transformation of digital business. This is also happening in one of Indonesia’s digital business company known as PT XYZ Indonesia. For its sustainability, knowledge management has been adopted. But, there are some issues in its implementation because of high turnover rate and incorrect implementation process. In addition, there is a complaint rating of approximately 20% of 1049 projects. This paper aims to investigate KM implementation process on job satisfaction and worker performance for XYZ and give recommendation based on the measurement result to KM process implementation. The result of this paper is organizational culture has significant relationship with job satisfaction and knowledge sharing has significant relationship with worker performance. Based on the result, we recommend to create reward, KM policy, allocate budget, and organize special division of KM to optimal the KM implementation.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Affecting Student’s Perceived Readiness on Abrupt Distance Learning Adoption: Indonesian Higher-Education Perspectives 影响学生对突然接受远程教育的感知准备的因素:印尼高等教育的视角
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274640
L. M. Hasani, Hafizh Rafizal Adnan, D. I. Sensuse, Kautsarina, Ryan Randy Suryono
{"title":"Factors Affecting Student’s Perceived Readiness on Abrupt Distance Learning Adoption: Indonesian Higher-Education Perspectives","authors":"L. M. Hasani, Hafizh Rafizal Adnan, D. I. Sensuse, Kautsarina, Ryan Randy Suryono","doi":"10.1109/IC2IE50715.2020.9274640","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274640","url":null,"abstract":"Widespread lockdowns across the globe during Covid-19 outbreak forced the universities to abruptly adopt full-online distance learning. Such unprecedented abrupt adoption requires a degree of student readiness to ensure the success of distance learning delivery. However, prior research about student readiness of e-Learning adoption is still limited to discussing proactive adoption in normal conditions. To address this issue, this study investigated the factors that affect the student’s perceived readiness for abrupt distance learning adoption. By applying Structural Equation Modelling (SEM) using the Partial Least Square algorithm, this study found that self-competence, comfort with e-Learning, uncertainty avoidance, financial ability, and technological facilitating conditions are factors that significantly affect student’s perceived readiness. Based on this finding, faculties are recommended to be an early adopter of e-Learning, to provide an e-Learning platform with excellent usability and effective instructional design for the students, to provide clear instructions for both students and instructors, and to provide needed resources (e.g. internet connection) to the students. Moreover, future studies could be focused on lecturers’ or faculties’ readiness for abrupt distance learning adoption.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130328271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance Analysis of Reverse Proxy and Web Application Firewall with Telegram Bot as Attack Notification On Web Server 以Telegram Bot作为攻击通知的Web服务器上反向代理和Web应用防火墙的性能分析
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274592
Defiana Arnaldy, Tio Setia Hati
{"title":"Performance Analysis of Reverse Proxy and Web Application Firewall with Telegram Bot as Attack Notification On Web Server","authors":"Defiana Arnaldy, Tio Setia Hati","doi":"10.1109/IC2IE50715.2020.9274592","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274592","url":null,"abstract":"Sophisticated technology in the world has been developing very rapidly, especially in terms of accessing all the information that is on the web. Website is one of technological sophistication that presents various kinds of information needed, from children to adults easily accessing websites on the internet. Unwittingly the number of accesses made by users around the world causes a web server or a place that provides a website will be weak and can occur down. When a web server becomes weak, hackers will use it to attack the web server, retrieve data, important information, and even more fatal is when user data is stolen and misused by hackers. The web developers only focus on a website appearance but do not focus on access and security of the website. Therefore, we need an optimal web server that can accommodate the many accesses caused by users and the security of the web server to safeguard data and information stored. This research applies a package namely Reverse Proxy which is used to optimize a web server and Web Application Firewall which is used to maintain the security of a web server.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131944328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Disaster Impact Analysis Uses Land Cover Classification, Case study: Petobo Liquefaction 灾害影响分析使用土地覆盖分类,案例研究:石油液化
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274573
R. Hidayat, A. M. Arymurthy, Dimas Sony Dewantara
{"title":"Disaster Impact Analysis Uses Land Cover Classification, Case study: Petobo Liquefaction","authors":"R. Hidayat, A. M. Arymurthy, Dimas Sony Dewantara","doi":"10.1109/IC2IE50715.2020.9274573","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274573","url":null,"abstract":"Analysis of changes in the conditions of an area can be done through satellite image analysis. This study utilizes the classification of satellite imagery to determine the impact of disasters and liquefaction disaster recovery efforts in the Petobo region, Palu, Central Sulawesi. The deep learning approach, namely Convolutional Neural Network (CNN) and CNN combined with ResNet as the Transfer Learning model, were selected as classification methods that would be compared in determining the approach with the best performance. The classification of satellite imagery is mapped into two main classes, namely natural land cover and artificial land cover. This research subsequently succeeded in mapping land cover changes that occurred as a result of liquefaction disasters and recovery efforts that have been carried out with promising performance","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Scrum Practice Maturity in Software Development of Mobile Communication Application 移动通信应用软件开发中Scrum实践成熟度评价
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274625
Pramitya Lisnawaty Ayunda, E. K. Budiardjo
{"title":"Evaluation of Scrum Practice Maturity in Software Development of Mobile Communication Application","authors":"Pramitya Lisnawaty Ayunda, E. K. Budiardjo","doi":"10.1109/IC2IE50715.2020.9274625","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274625","url":null,"abstract":"Focusing on the big topic of information technology related to software engineering, Scrum is one of the frameworks on the agile methodology to develop innovative products and services. Implementing the Scrum framework can be challenging. Changes in teamwork culture, both vertically and horizontally in a software development organization, cannot be avoided. In software development process improvement, evaluation of the scrum implementation using the Scrum Maturity Model. Scrum Maturity Model also assesses the extent of the implementation of the scrum such as the implementation of roles, events, and artifacts following the Scrum Guide. This research occurred to the representative of the product owner, scrum master, and development team. There are seven sub-categories which do not implement the best scrum practices. These practices have an impact on the avoided risk. By understanding the impact of these risks, the team can make plans to avoid those risks. The sub-categories are the product owner, development team, sprint, sprint planning, daily Scrum, product backlog, and sprint backlog.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130477845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Template Pattern for Simple Question Transformation 简单问题转换模板模式
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274666
Rakhmayudhi, W. Suwarningsih
{"title":"Template Pattern for Simple Question Transformation","authors":"Rakhmayudhi, W. Suwarningsih","doi":"10.1109/IC2IE50715.2020.9274666","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274666","url":null,"abstract":"The classification of question types in the Indonesian medical domain is the important component of the medical question answering system. The strategy proposed in this paper is to build the template pattern and rule-based parser for extracting some important words using the generated feature to automatically query the classification of question. Classification aims to prove that the system is capable of classifying queries only by using the available language resources. The proposed method has been evaluated using datasets collected from various Indonesian health consultation websites. Test results from the proposed method indicated that the classification process is very effective with an accuracy of 84.33%.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Product Cognition, Platform Emotion, Behavior Intention, and Actual Behavior Stage in Cross Border E-commerce (Case Study: Shopee as The Biggest Cross Border E-Commerce in Indonesia) 跨境电商中的产品认知、平台情感、行为意向与实际行为阶段(以印尼最大的跨境电商Shopee为例)
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274563
Diyang Risma Gabriella, A. Agus
{"title":"Product Cognition, Platform Emotion, Behavior Intention, and Actual Behavior Stage in Cross Border E-commerce (Case Study: Shopee as The Biggest Cross Border E-Commerce in Indonesia)","authors":"Diyang Risma Gabriella, A. Agus","doi":"10.1109/IC2IE50715.2020.9274563","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274563","url":null,"abstract":"Cross-border e-commerce (CBEC) is growing rapidly, it provides a new shopping experience for customers where they can involve in a global transaction. Each year, CBEC receives a significant total number of transactions, recorded in 2018, CBEC transactions have increased by 27.5% globally. Shopee as the biggest of Indonesia CBEC has dominated the market with a monthly average of 200.2 million visits. Competition between CBEC in Indonesia continues, they are competing to provide the best quality of products and platform experience to gain trust and purchase from the customers. Building a trust and customer intention to purchase in CBEC platform is a challenge, while customers’ awareness of products is the first step in creating optimal product cognition. Perceived trust can be improved by the involvement of customers in the CBEC platform, the provision of convincing product information, as well as the awareness of good product quality, thus it will influence purchase intention of customers. Therefore, this study was conducted to analyze the relationship between product cognition stage, platform emotion stage, behavior intention stage, and actual behavior stage at the biggest CBEC in Indonesia. The research is based on the Hierarchy of Effect (HOE) model which consists of customers stages of journey. The survey began in January to March, 2020 and 1.281 respondents were processed through a structured questionnaire, and data were analyzed using the Structural Equation Method (SEM).","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"43 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129990677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信