Fusion: Practice and Applications最新文献

筛选
英文 中文
Media Students’ Internship planning and practices During and After COVID-19: Fusion of technology perspective 媒体学生在新冠肺炎期间和之后的实习策划与实践:融合技术视角
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.100202
Walaa Fouda, F. Triolo, Amira Al Nahdi
{"title":"Media Students’ Internship planning and practices During and After COVID-19: Fusion of technology perspective","authors":"Walaa Fouda, F. Triolo, Amira Al Nahdi","doi":"10.54216/fpa.100202","DOIUrl":"https://doi.org/10.54216/fpa.100202","url":null,"abstract":"The COVID-19 pandemic had a significant impact on many areas of the workforce, including internship programs. The education sector in general started integrating technology as a kind of fusion of technology in different ways. The internship course was one of the important educational programs that get affected by the pandemic and there was a deep need for technology fusion to overcome the hard times. This study investigates the effects of COVID-19 on internship programs and provides recommendations for implementing effective strategies in a post-COVID-19 World. To accomplish this, a comprehensive review of relevant literature review has been conducted, including academic journals, governments, and industry reports, as well as employing both qualitative and quantitative research methods. This study also discussed a case study of the Professional Work Shadow Program, an internship for media students specialized in Integrated marketing communication, Broadcasting, International relations, and public relations. The study findings recommend various marketing strategies, which can help media internship providers and beyond offer effective and sustainable programs to university students.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116317983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Students’ Performance Prediction in Higher Education During COVID-19 Pandemic Based on Recurrent Forecasting and Singular Spectrum Analysis 基于循环预测和奇异谱分析的新冠肺炎大流行期间高校学生成绩预测
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.130106
Kismiantini Kismiantini, Shazlyn M., Adi, Rasyidhani Aditya, Salsa-Billa Syahida Al, Murugan, Hairulnizam, Salama A. Mostafa
{"title":"Students’ Performance Prediction in Higher Education During COVID-19 Pandemic Based on Recurrent Forecasting and Singular Spectrum Analysis","authors":"Kismiantini Kismiantini, Shazlyn M., Adi, Rasyidhani Aditya, Salsa-Billa Syahida Al, Murugan, Hairulnizam, Salama A. Mostafa","doi":"10.54216/fpa.130106","DOIUrl":"https://doi.org/10.54216/fpa.130106","url":null,"abstract":"The COVID-19 pandemic is a virus that is changing habits in human life worldwide. The COVID-19 outbreaks in Indonesia have forced educational activities such as teaching and learning to be conducted online. Teaching and learning activities using the online method are familiar, but the effectiveness of this method still needs to be investigated to be applied in all educational systems. This study used the predictive modeling of Recurrent Forecasting (RF) derived from Singular Spectrum Analysis (SSA) to know the online learning method's practicality on the student's academic performance. The fundamental notion of the predictive fusion model is to improve the effectiveness of several forms of forecast models in SSA by employing a fusion method of two parameters, a window length (L), and a number of leading components (r). This study used undergraduate students' grade point averages (GPA) from a public university in Indonesia through online classes during the COVID-19 epidemic. The experiments unveiled that a parameter of L = 14 ( ) yielded the finest prediction using the RF-SSA model with a root mean square error (RMSE) value of 0.20. Such a finding signified the ability of the RF-SSA to project the students' academic performance according to the GPA for the forthcoming semester. Nonetheless, developing the RF-SSA algorithm for greater effectiveness is essential to acquiring more datasets, such as by gathering a bigger group of respondents from several Indonesian universities.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARZARA: Augmented reality app to try watch on your wrist ARZARA:增强现实应用,尝试戴在手腕上的手表
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.020202
A. Admin, Monil Pahwa, Prayant Gupta, Surinder Kaur
{"title":"ARZARA: Augmented reality app to try watch on your wrist","authors":"A. Admin, Monil Pahwa, Prayant Gupta, Surinder Kaur","doi":"10.54216/fpa.020202","DOIUrl":"https://doi.org/10.54216/fpa.020202","url":null,"abstract":"Whenever we visit a showroom to buy a watch, we are unable to try all color variants of watches due to unavailability and also if a watch is tried by too many customers it loses its shine and finishing. We tried to overcome this problem by our Augmented reality app called “Arzara”. This Augmented reality app lets customers see how a particular watch model looks on their hand without physically trying the watch. It will not only prevent degradation of polish of watches due to repeated wear by different customers at offline stores but also this new Augmented Reality watch app will make online watch shopping take off. It will make it easier for customers to make decisions and purchase watches.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ultrasound Image Noise Reduction and Enhancement Model based on Yellow Saddle Goatfish Optimization Algorithm 基于黄鞍山羊鱼优化算法的超声图像降噪增强模型
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.120201
Anamika Goel, Jawed Wasim, P. Srivastava, Aditi Sharma
{"title":"Ultrasound Image Noise Reduction and Enhancement Model based on Yellow Saddle Goatfish Optimization Algorithm","authors":"Anamika Goel, Jawed Wasim, P. Srivastava, Aditi Sharma","doi":"10.54216/fpa.120201","DOIUrl":"https://doi.org/10.54216/fpa.120201","url":null,"abstract":"In the modern-day diagnostics, ultrasound play an important role in different applications such as vascular, gynecological, cardiac, and obstetrical for diagnosis the various diseases. The main benefit of the ultrasound is that it is non-invasive method and inexpensive. However, in the real-scenario, ultrasound images contain speckle noise which negatively impact the image quality in terms of edges, texture information, and boundaries. In order to eliminate noise, various filters are deployed by researchers in the literature. The limitations of their method are that a fixed level of noise is removed using conventional filters in which parameter values of the filters are fixed. However, in the real-time situation, the noise is random and adaptive filters are required which eliminate any level of noise. To achieve this goal, this paper proposes an adaptive filtering model for eliminate speckle noise based on yellow saddle goatfish optimization (YSGO) algorithm. The YSGO algorithm is based on the hunting behaviour of the fishes. In the proposed model, bilateral filter and speckle-reducing anisotropic diffusion filtering methods and enhancement power law method are taken under consideration. Further, the parameter values of the filtering method and enhancement methods are determined using the nature-inspired YSGO algorithm. The YSGO algorithm minimize the noise and enhances the image brightness and edge information based on the objective function. In our model, mean square error (MSE) and entropy is taken as the objective function. Further, the proposed model is applied on the standard ultrasound images. The visual analysis of the images is done based on the subjective analysis whereas various performance metrics are measured for measure the image quality in the objective analysis. The results reveals that the proposed model outperforms over the existing models in terms of PSNR.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driver Drowsiness Detection in Real-time 驾驶员困倦检测实时
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.070203
Daksh Khetan, Arun Nawani, Anshul .., Ms. Surinder Kaur
{"title":"Driver Drowsiness Detection in Real-time","authors":"Daksh Khetan, Arun Nawani, Anshul .., Ms. Surinder Kaur","doi":"10.54216/fpa.070203","DOIUrl":"https://doi.org/10.54216/fpa.070203","url":null,"abstract":"In modern life, drowsiness is one of the major causes of road accidents, many of which are fatal. Analyzing statistics, it can be assumed that most road accidents occur as a result of drowsiness leading to serious injury and death. For this reason, various studies have been done on designing programs that can detect driver fatigue and alert them before a serious error occurs. This prevents them from falling asleep and having an accident. Some of the most common methods use automotive-based methods to design their own system. But these traditional measures were strongly influenced by other factors such as road structure, vehicle type and driver-wheel driveability. Some methods use psychological methods of their system that often provide the most accurate and consistent results in the driver's drowsiness monitoring. However, such techniques are very tedious as the electrodes need to be placed on the head and body. In addition, few studies are available where independent measurements are used as system installation, but such methods can confuse the driver and lead to unintended consequences. In this paper, we have proposed a non-disruptive and real-time program. Our proposed system classifies it as sleep deprivation. The model is fed with a large database of closed eyes and open eyes to produce results. The driver is notified by Buzz every time he is found drowsy. In our model, we use a standard forward-looking smartphone camera and use the information we have gained to produce results on our website. This can be more economical than using additional hardware.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127084919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fusion Optimization and Classification Model for Blockchain Assisted Healthcare Environment 区块链辅助医疗环境的融合优化与分类模型
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.090205
Reem Atassi, Fuad Alhosban
{"title":"Fusion Optimization and Classification Model for Blockchain Assisted Healthcare Environment","authors":"Reem Atassi, Fuad Alhosban","doi":"10.54216/fpa.090205","DOIUrl":"https://doi.org/10.54216/fpa.090205","url":null,"abstract":"Healthcare transformation is becoming one of the highest priorities in a world whereby remarkable advances in technology are taking place. Recent healthcare data fusion management systems are centralized, which possess the probability of failure in case of a natural disaster. Blockchain has expanded fast to be the most widely spoken innovation that could address a large number of present data management problems in the health care sector. The usage of blockchain technology for the distribution of secure and safe health care datasets has received all the attention. This article presents a Bat Optimization Algorithm with Fuzzy Neural Network Based Classification (BOA-FNNC) Model for Blockchain Assisted Healthcare Data Fusion Environment. The presented BOA-FNNC technique mainly focuses on achieving security in the healthcare sector using BC technology. For accomplishing this, the BOA-FNNC technique performs BC assisted data transmission in the medical sector. Besides, the VGG-16 model is exploited for the creation of feature vectors. To classify healthcare data, the BOA with FNN model is utilized in this study, where the BOA fine tune the parameters related to the FNN model which in turn boosts the classifier efficiency. For illustrating the betterment of the BOA-FNNC technique, a series of experiments were performed. The comparison study reported the enhancements of the BOA-FNNC technique over other recent approaches.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient fusion method for Protecting Software-Defined Networks Against ARP Attacks: Analysis and Experimental Validation 一种保护软件定义网络免遭ARP攻击的有效融合方法:分析与实验验证
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.120101
Ehab R. Mohamed, Heba M. Mansour, Osama El-Komy
{"title":"An efficient fusion method for Protecting Software-Defined Networks Against ARP Attacks: Analysis and Experimental Validation","authors":"Ehab R. Mohamed, Heba M. Mansour, Osama El-Komy","doi":"10.54216/fpa.120101","DOIUrl":"https://doi.org/10.54216/fpa.120101","url":null,"abstract":"In this paper, to protect software-defined networks (SDN) from various ARP attacks, we implement a three-dimensional algorithm (TDA). The main objective of TDA is to limit the methods by which attackers can breach SDN privacy and to prevent the three main types of ARP attacks, such as ARP flooding, ARP spoofing, and ARP broadcasting. This work discusses the three different ARP attack types, which are broken down into five different scenarios, and how the proposed solution detects and mitigates each one. We simulated the five attack scenarios by creating five Python scripts utilizing the Scapy library. And then we applied an efficient TDA to restrict the five scenarios of ARP attacks more efficiently and faster than existing methods. TDA provides the Ryu controller with a modified module to detect and mitigate these types of attacks, using a three-dimensional secure channel to analyze incoming ARP packets, which works as a filter that analyzes and filters incoming ARP packets from malicious ones, and then giving the controller the choice to forward or drop the packet. To simulate our investigation and apply our proposed solution, we used a Mininet emulator. To evaluate TDA, we calculated the delay times, accuracy controller's throughput, bandwidth, and other metrics. The results that we showed after applying TDA 100 times on our test scenarios indicate that the accuracy is 99.9% for the three stages and that the detection and mitigation times are very short compared to the existing solutions, which are that the minimum detection time is only from 0.1ms to 3.6ms, and the minimum mitigation time is only from 0.3ms to 2.9ms. We evaluated our algorithm by other important metrics such as controller bandwidth, which ranged from 18 GB/sec to 17.7 GB/sec in the cases before and after the attack and 16.5GB/sec in the case of attack; controller throughput, which recorded 1.72GB/sec in the case under the attack and reached 2.11GB/sec in the case after defense; and CPU utilization, which recorded 30.4% during the attack and reduced to 0.3% after mitigation. These metrics proved that our algorithm achieved the highest efficiency compared to other work in this field.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132014113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques 使用数据融合和机器学习技术保护云的软件定义网络功能虚拟化框架
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.030204
R. ., M. Botto-Tobar, P. Arya
{"title":"Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques","authors":"R. ., M. Botto-Tobar, P. Arya","doi":"10.54216/fpa.030204","DOIUrl":"https://doi.org/10.54216/fpa.030204","url":null,"abstract":"Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uniform and Nonuniform Filter Banks Design Based on Fusion Optimization 基于融合优化的均匀和非均匀滤波器组设计
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.090102
M. Saber, P. Dutta
{"title":"Uniform and Nonuniform Filter Banks Design Based on Fusion Optimization","authors":"M. Saber, P. Dutta","doi":"10.54216/fpa.090102","DOIUrl":"https://doi.org/10.54216/fpa.090102","url":null,"abstract":"One of the important schemes for modern communication is Filter Bank Multi-Carrier with Offset Quadrature Amplitude Modulation (FBMC OQAM), as it provides better spectral efficiency with small inter-symbol and inter-carrier interference specially in data fusion platforms. Unfortunately, the design of filter banks in FBMC is difficult and complex to achieve the requirement due to complexity of handling the data fusion issues. This paper presents a proposed method to design a uniform and nonuniform filter banks using a data fusion optimization technique. The design process represented as an objective function describes the amplitude in the stop band, and the goal is to minimize the objective function. Different examples are provided to illustrate the efficiency of the proposed design method.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Model for Encrypting Uncertain Rational Data Units Based on Refined Neutrosophic Integers Fusion and El Gamal Algorithm 基于精细中性整数融合和El - Gamal算法的不确定有理数据单元加密安全模型
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.100203
Mehmet Merkepci, Mohammad Abobala
{"title":"Security Model for Encrypting Uncertain Rational Data Units Based on Refined Neutrosophic Integers Fusion and El Gamal Algorithm","authors":"Mehmet Merkepci, Mohammad Abobala","doi":"10.54216/fpa.100203","DOIUrl":"https://doi.org/10.54216/fpa.100203","url":null,"abstract":"The objective of this paper is to introduce a novel security model for the encryption of uncertain rational data units represented as single-valued rational neutrosophic numbers by combining refined neutrosophic number theoretical concepts with the El Gamal public key crypto scheme. In addition, some applications on uncertain data units will be shown and illustrated.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信