2023 Somaiya International Conference on Technology and Information Management (SICTIM)最新文献

筛选
英文 中文
Teachers’ Perception about the Use of QR Code in Education 教师对二维码在教学中使用的认知
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104743
R. Bala, Shilpi Harnal, Monika Gupta
{"title":"Teachers’ Perception about the Use of QR Code in Education","authors":"R. Bala, Shilpi Harnal, Monika Gupta","doi":"10.1109/SICTIM56495.2023.10104743","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104743","url":null,"abstract":"These days, QR codes are more widely used. Numerous benefits, including quick reading speed, error correction, 360-degree reading, multilingual support, robustness, and a broad range of applications, are offered by QR codes. The education industry is using QR codes on a large scale to make teaching and learning effective. In a few universities and colleges, faculties are using QR code technology in the classroom as well. The use of QR codes dramatically increased during COVID 19. It was the time when the whole world was trying to discover the potential of QR codes in different sectors. Now, QR codes have become an essential part of our lives. Almost every industry uses QR codes, including entertainment, education, sports, FMCG, textiles, restaurants, healthcare, and tourism. The objective of the study is to determine the different ways to use QR code in classroom and to find the factors that develop teachers’ perception of use of QR codes in the classroom. The study also determines the role of QR code in making teaching learning effective. The data was collected from 50 faculty members of randomly selected five private universities of Haryana region through an online survey. The study found that in spite of multiple uses of QR codes in teaching, only a limited number of faculty members are using this technology in the classroom. The reason is that many teachers are not aware of different ways of using QR code in classroom. The study comes up with different factors that play an important role in developing teachers’ perception of use of QR code in classroom.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging IoT Technologies in Retail Industry to improve Customer Experience: Current Applications and Future Potential 利用物联网技术在零售业改善客户体验:当前应用和未来潜力
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104882
S. Saxena, Tripti Dhote
{"title":"Leveraging IoT Technologies in Retail Industry to improve Customer Experience: Current Applications and Future Potential","authors":"S. Saxena, Tripti Dhote","doi":"10.1109/SICTIM56495.2023.10104882","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104882","url":null,"abstract":"The Internet of Things (IoT) is promoting innovation and creating new opportunities by turning just about anything, including consumers and actions, into a digital activity. The IoT can significantly impact the retail industry transforming the customer experience. By creating digital ecosystems, retailers are trying out novel methods to employ connected, smart systems to provide unique offerings, alter user experiences, and expand their reach. The goal of this paper is to identify different customer touch points in a retail store, research the adoption of different IoT technologies to improve customer experience in the retail industry, comprehend the impact and benefits of these technologies, and suggest potential future applications to further enhance customer experience in the retail industry. This paper adopts a case study approach, looking at several IoT use cases in the retail industry in terms of the technology used and how it affects consumer experience. Academics, professionals, and retailers can use the study to build and create solutions for the retail sector that will improve the shopping experience for customers.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121713783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms for Implementing Repeated Homomorphic Operations on Restricted Data Type Ranges 在受限数据类型范围上实现重复同态运算的算法
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10105118
Sridhar Vemula, Ram Mohan Rao Kovvur, Dyna Marneni
{"title":"Algorithms for Implementing Repeated Homomorphic Operations on Restricted Data Type Ranges","authors":"Sridhar Vemula, Ram Mohan Rao Kovvur, Dyna Marneni","doi":"10.1109/SICTIM56495.2023.10105118","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10105118","url":null,"abstract":"Security is the primary concern for cloud-based data storage. While the data is stored in the cloud, it is queried and retrieved regularly from various remote locations. Various cloud providers come with built-in security features for all the data stored in the cloud. Even though cloud providers offer different security methods, organizations can’t rely on them when it comes to sensitive data. In various enterprise applications, there can be a requirement of performing different operations on data stored in coded form. In this situation, homomorphic ciphering techniques are useful. Different homomorphic encryption methods enable execution of operations on encrypted data without first decrypting it. Typically, these calculations include performing arithmetic operations on encrypted cloud-based data. When the data to be stored is structured and its elements are to be stored in various data type fields, there is a restriction on the range of values stored in the respective data type. Using existing homomorphic techniques, direct operations between two or more encrypted values cause the result value’s size to increase by that many bits. The size of the result is proportional to the number of times the operation performed. It is therefore challenging to enable numerous additions or multiplications over encrypted numeric values stored in databases. In this paper, we propose a methodology to support an unlimited number of homomorphic operations on encrypted data without increase in size of the final result by incorporating few changes in implementation of various operations. Our proposed work guarantees that it supports unlimited additions or multiplications over encrypted data such that the final result does not exceed the storage size of the data by more than the number of bits. This article provides algorithms for additive homomorphic with Paillier and multiplicative homomorphic with RSA.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Expert System for Identification of Domestic Emergency based on Normal and Abnormal Sound 基于正常与异常声音的家庭突发事件识别专家系统
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10105052
S. Shilaskar, S. Bhatlawande, Aditya Vaishale, Prapti Duddalwar, Aditya Ingale
{"title":"An Expert System for Identification of Domestic Emergency based on Normal and Abnormal Sound","authors":"S. Shilaskar, S. Bhatlawande, Aditya Vaishale, Prapti Duddalwar, Aditya Ingale","doi":"10.1109/SICTIM56495.2023.10105052","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10105052","url":null,"abstract":"The paper describes abnormal sound identification for normal and abnormal event class. In this proposed methodology, an aggregate of regular and abnormal sounds is proposed using topological data analysis. As it classifies the different sounds using various algorithms namely Random Forest, Support Vector Machine (SVM), Decision Tree and K-Nearest Neighbors (KNN). It detects distinct events based on the dataset. This identification will help to classify which sound is safe or unusual in indoor environment. Events like fall, medical issues of elderly people, attack, hostage situation, child abuse, irregular human activities, etc. give rise to unusual sound. Proposed expert systemidentifies glass breaking, gunshot, stabbing, screaming, shouting, unexpected silence etc. as abnormal activity. The best accuracy offered by machine learning model is 98% using KNN.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129763326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric-based Unique Identification for Bovine Animals — Comparative Study of Various Machine and Deep Learning Computer Vision Methods 基于生物特征的牛动物唯一识别-各种机器和深度学习计算机视觉方法的比较研究
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10105004
Neel Patel, Harshal Jain, Vaibhav Sadashiv Lonkar, Dineshkumar Singh
{"title":"Biometric-based Unique Identification for Bovine Animals — Comparative Study of Various Machine and Deep Learning Computer Vision Methods","authors":"Neel Patel, Harshal Jain, Vaibhav Sadashiv Lonkar, Dineshkumar Singh","doi":"10.1109/SICTIM56495.2023.10105004","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10105004","url":null,"abstract":"Animal recognition and identification is an expanding area of inquiry in computer vision, feature extraction, cognitive science, and pattern recognition. In the context of zoonotic diseases, cattle recognition has become an unfolding research field in modern times for registration, distinctive identification, verification of livestock (cattle), controlling outbreaks of diseases, production management, vaccination, assignment of ownership, settlement of insurance claims, and traceability of livestock. Out of the existing noninvasive methods using computer vision, this study illustrates the fundamental implementation of a cattle biometric method to distinguish them using its muzzle (snout) point. Cattle muzzle point characteristics may be recognized in a manner how a human fingerprint can be recognized down to the tiniest of details, and how we can generate unique muzzle signatures to compare with each other. We have reviewed various methods like SIFT algorithm, LBP matcher approach, and image classification. Our study concludes that when the need is to distinctly identify between two cattle using muzzle images-based key points descriptor, then SIFT and LBP approaches are more suitable. For other scenarios, the image classification method gives better results.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Groundwater Potential Storage and Recharge Zone Map Delineation Using Statistics based Hydrological and Machine Learning based Artificial Intelligent Models 基于统计水文和基于机器学习的人工智能模型的地下水潜力储灌区圈定研究综述
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104829
Dineshkumar Singh, Vishnu Sharma
{"title":"Review of Groundwater Potential Storage and Recharge Zone Map Delineation Using Statistics based Hydrological and Machine Learning based Artificial Intelligent Models","authors":"Dineshkumar Singh, Vishnu Sharma","doi":"10.1109/SICTIM56495.2023.10104829","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104829","url":null,"abstract":"Abstract - Groundwater accounts for 63% of agriculture irrigation and 80% of household water supplies. In Many parts of the country, the water table is going down by 1 to 2 meters per year due to over utilization. It may result in up to a 20 percent decrease in food production. Given the huge impact this invisible resource has on the economy, environment, and society, we need to improve the scientific understanding, estimation, and governance of groundwater. The creation of groundwater’s possible storage area (GWPSZ) and regional recharge (GWRZ) zone maps can be helpful in this regard. They depend on statistics-based, machine learning (ML) based, and hybrid models. This paper reviews the work done by multiple researchers who have used geospatial techniques using satellite imagery sensing analytics in GIS, followed by AHP or Multi Influencing Factors (MIF) pairwise comparison to characterize, forecast GW levels, and generate GWPSZ and recharge GWRZ maps. We also reviewed the research on historical aquifer data using ML-based regression analysis, random forest (RF), supervised algorithms like support vector machine, nonparametric ML algorithm decision tree model, and ensemble hybrid multi-wavelet ANN models for the prediction of the GWL variability and storage loss/deceleration. Though some papers focused on the use cases like irrigation scheduling and predicting geothermal well locations or designing community cooling hubs, a comprehensive approach for village-level community water demand and supply assessment and decisionmaking is missing.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132589750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptocurrency with Blockchain Technology — A Literature Review 加密货币与区块链技术-文献综述
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104971
L. J. Parab, Prashant P Nitnaware, S. A. Patil
{"title":"Cryptocurrency with Blockchain Technology — A Literature Review","authors":"L. J. Parab, Prashant P Nitnaware, S. A. Patil","doi":"10.1109/SICTIM56495.2023.10104971","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104971","url":null,"abstract":"Blockchain is a new and secured way to store data. Multiple computers connected to form a series of blocks that holds transaction data and the information of the previous block. It is a technology used to develop first cryptocurrency Bitcoin. Blockchain technology is generating new opportunitiesin other industry domains along with financial sector. Thus, in this technology era, Blockchain becomes the future of internet. The growing popularity of cryptocurrencies as financial assets is an indicator of a revolution in the financial sector. It led to understanding the need-to-know blockchain technology in depth while investing money in cryptocurrencies. In this article, we will discuss the evolving blockchain technology related to cryptocurrency. We will outline the concept of cryptocurrency with blockchain technology in general along with strength and weaknesses, real world use cases, future trends and more. Cryptocurrencies currently havesignificant commercial value in the financial sector, so knowing the technology behind the implementation of cryptocurrencies will help investors and businesses easily predict financial market trends. This article will provide the general overview of blockchain technology and its features by studying various research papers, articles, news media and many more.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Solve the Identification and Authentication Challenges in Metaverse 一种解决元空间中身份识别和认证挑战的方法
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104998
Chauhan Chetan, Dudhia Hard Ashit, Shaji Joseph
{"title":"An Approach to Solve the Identification and Authentication Challenges in Metaverse","authors":"Chauhan Chetan, Dudhia Hard Ashit, Shaji Joseph","doi":"10.1109/SICTIM56495.2023.10104998","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104998","url":null,"abstract":"Technology is getting updated day by day, and the current pandemic has added to the need for the digital availability of various components of life. With this advancement came the concept of the metaverse, which has been predicted to give rise to businesses in the world as people will be able to access everything by sitting in their homes. However, along with the boon comes a bane for any new technology. With adoption of the various advance technologies, privacy and security concerns also appear which needs to be catered. Here, the bane we talk about is the security issues faced by metaverse in terms of authentication and identification. Enhancing the security and privacy features will allow metaverse to attract more and more users. This paper highlights the reasons for the traditional methods being less effective. We have also focused on the other security concerns in metaverse and how we can mitigate them. Along with this, the paper also provides a new model that will be more effective in terms of security.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115822927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Dataset Preparation Techniques for Regional/Marathi Language Analysis: Creating Customized Dataset for Regional Language/Marathi Language Text Analysis 区域/马拉地语分析的有效数据集准备技术:为区域语言/马拉地语文本分析创建自定义数据集
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104666
Sudashan Sirsat, Nitish Zulpe
{"title":"Efficient Dataset Preparation Techniques for Regional/Marathi Language Analysis: Creating Customized Dataset for Regional Language/Marathi Language Text Analysis","authors":"Sudashan Sirsat, Nitish Zulpe","doi":"10.1109/SICTIM56495.2023.10104666","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104666","url":null,"abstract":"Regional language contents are the key to globalization of any successful internet based business model. Looking at the huge population interested in accessing the internet using their mother tongue or regional language is the new normal. This regional language contents on social media and word wide web pages fetched the attention of a large chunk of business analysts, data scientists and social reformists to understand the regional language sentiments through this humongous amount of regional language opinionated text. Regional Language Sentiment Analysis or Marathi language sentiment Analysis will be possible if one can create a dataset which can face text analytics language challenges like uniformity, syntactic and semantic challenges of regional language. This study is a small attempt to create a basic dataset capable of facing future Regional Language Sentiment Analysis or Marathi Language Sentiment Analysis based on NLP and SA based algorithmic approaches. This study will try to generate a Marathi language dataset from social media opinionated text and web scraping of a Marathi language webpage. All the technical issues associated with generating regional language or Marathi language dataset will be recorded, rectified and relatively refined through rigorous iterations to make the dataset future ready Marathi language sentiment analysis. This study will try to understand the needs of Regional Sentiment analysis requirements in terms of dataset, the best suitable file structure and efficient way of creating and customizing the Marathi text dataset in order to make it Natural Language Processing (NLP) and Sentiment Analysis SA ready for future studies in continuation.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approach for Blockchain Technology Implementation in Indian Courts for Speedy Disposal of Cases 区块链技术在印度法院的实施方法,以快速处理案件
2023 Somaiya International Conference on Technology and Information Management (SICTIM) Pub Date : 2023-03-24 DOI: 10.1109/SICTIM56495.2023.10104713
Rewa Pimpalkar, D. Jha, Kirti Arekar
{"title":"Approach for Blockchain Technology Implementation in Indian Courts for Speedy Disposal of Cases","authors":"Rewa Pimpalkar, D. Jha, Kirti Arekar","doi":"10.1109/SICTIM56495.2023.10104713","DOIUrl":"https://doi.org/10.1109/SICTIM56495.2023.10104713","url":null,"abstract":"Blockchain as a technology if implemented judiciously will prove to be effective and efficient for both private as well public sector enterprises. The use cases in Blockchain provide ample demonstration of improvement in the processes. The paper intends to provide insight into the application of Blockchain in the Indian Judiciary System. Some of the benefits as envisaged by the Blockchain implementation are time-efficient, cost-effective, greater security, and transparency resulting enhancement of trust in the overall working of the legal system. India’s global counterparts such as Estonia, China, the UK, Ghana, Ukraine, Canada, and Sweden have already integrated the Blockchain into their legal system. The judicial system in India is under tremendous pressure. According to the data from National Judicial Data Grid, 4.7 Crore cases are pending as on May 2022 at different levels of the judiciary, out of which 1.82 Lac cases have been pending for at least 30 years. For many years courts have been following the traditional working system, but during the Covid-19 pandemic, the courts have adopted the e-justice paradigm via online case hearings and video conferencing. Since, the system has already experienced the use of digital platforms, the experimentation if continued post-pandemic will yield a faster and better result. The technological advancements should complement the traditional working systems for the greater benefit of the entire system. The overall objective of the paper is to explore the application of Blockchain that will help improve the efficiency and transparency in operations in the Indian Judicial system.","PeriodicalId":244947,"journal":{"name":"2023 Somaiya International Conference on Technology and Information Management (SICTIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129459627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信