2022 International Conference on Edge Computing and Applications (ICECAA)最新文献

筛选
英文 中文
Public Sentiment Assessment of Coronavirus-Specific Tweets using a Transformer-based BERT Classifier 基于变压器的BERT分类器对冠状病毒特定推文的公众情绪评估
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936448
Kanak Mahor, A. Manjhvar
{"title":"Public Sentiment Assessment of Coronavirus-Specific Tweets using a Transformer-based BERT Classifier","authors":"Kanak Mahor, A. Manjhvar","doi":"10.1109/ICECAA55415.2022.9936448","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936448","url":null,"abstract":"Worldwide, the (COVID-19) pandemic had also affected people's daily routines. In general also during lockdown periods, people around the world use social media to express their thoughts and feelings about the epidemic which has interrupted their daily lives. There has been a huge spike in tweets about coronavirus on Twitter in a short period of time, including both positive and negative messages. As a result of the wide range of content in the tweets, the researchers have turned to sentiment analysis in order to gauge how the general public feels about COVID-19. According to the findings of this study, the best way to examine COVID-19 is to look at how people use Twitter to share their thoughts and opinions. Sentiment categorization can be accomplished by utilising a variety of feature sets as well as classifiers in combination with the suggested approach. Tweets collected from people with COVID-19 perceptions can be used to better understand and manage the epidemic. Positive, negative, as well as neutral emotion classifications are being used to classify tweets. In this study, Tweets containing specific information about the Coronavirus epidemic are used as sentiment analysis packages. Bidirectional Encoder Representations from Transformers (BERT) are used to identify sentiment categories, whereas the TF-IDF (term frequency-inverse document frequency) prototype is used to summarise the topics of postings. Trend analysis and qualitative methods are being used to identify negative sentiment traits. In general, when it comes to sentiment classification, the fine-tuned BERT is very accurate. In addition, the COVID-19-related post features of TF-IDF themes are accurately conveyed. Coronavirus tweet sentiments are analysed using a BERT and TF-IDF hybrid classifier. Single-sentence classification is transformed into pair-sentence classification, which solves BERT's performance issue in text classification problems. Our evaluation measures (accuracy= 0.70; precision= 0.67; recall= 0.64; and F1-score= 0.65) are used to evaluate the effectiveness of the classifier.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128896452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Test of Traditional Art Image Recognition Algorithm Integrated into Children’s Art Works Information Display Platform 传统艺术图像识别算法集成到儿童艺术作品信息展示平台的稳定性测试
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936224
Yuanyuan Lv
{"title":"Stability Test of Traditional Art Image Recognition Algorithm Integrated into Children’s Art Works Information Display Platform","authors":"Yuanyuan Lv","doi":"10.1109/ICECAA55415.2022.9936224","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936224","url":null,"abstract":"Laser scanning and infrared feature analysis technology are used to collect images of fake art works, and superpixel fusion method is used to fuse the collected information to extract the boundary feature information of images. The article describes in detail how teachers organize and carry out activities in art areas Effective strategies, through the development of colorful art area activities, make art area activities interesting, playable, studious, and develop children's creative thinking ability. The segmentation accuracy rate is stable. Object segmentation technology provides accurate positioning for further contour extraction and removes useless image background.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of Disease Prediction Model in AWS Cloud 疾病预测模型在AWS云中的部署
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936239
S. Sivakumar, D. Jayaram, S. V, V. Avasthi, R. Dhanalakshmi, S. S. Kumar
{"title":"Deployment of Disease Prediction Model in AWS Cloud","authors":"S. Sivakumar, D. Jayaram, S. V, V. Avasthi, R. Dhanalakshmi, S. S. Kumar","doi":"10.1109/ICECAA55415.2022.9936239","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936239","url":null,"abstract":"More than 500,000 humans go to emergency rooms every year for kidney stone problems. One out of each ten humans will broaden a kidney stone sooner or later in their lives. In India, kidney stones are one of the most common diseases which can be fatal if not treated properly. It can be caused by various parameters making it even more difficult to treat. When kidney stones are discovered in their early stages, they are much easier to treat than when they are discovered later on. To help this purpose, this study aims the development a website that is capable of predicting the presence of kidney stones using an image that was uploaded by the user itself. This website serves as a preliminary screening tool for the detection of kidney stones. This website is backed up by the algorithm which is proven to be the best in the prediction of kidney stones after a comparison between two different algorithms. These algorithms are trained and tested using the dataset which was obtained from Kaggle. This dataset is preprocessed to ensure the best performance of the classifier models. The performance of both the models is then compared and it is found that theSupport Vector Machine (SVM) algorithm is better than the Logistic Regression (LR) algorithm. The website is also integrated with the cloud using the AWS platform. This ensures the presence of an eternal space that supports the website when the number of users of the website increases.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Technology to Identify Arboviral Disease-Dengue Prediction 识别虫媒病毒性疾病-登革热预测的深度学习技术
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936511
T. Varshini, Badgu Samatha
{"title":"Deep Learning Technology to Identify Arboviral Disease-Dengue Prediction","authors":"T. Varshini, Badgu Samatha","doi":"10.1109/ICECAA55415.2022.9936511","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936511","url":null,"abstract":"Arboviral disease-dengue infections are viral diseases that are transmitted via the bite of infected insects such as mosquitoes. Some of the well-known vector-borne diseases are chikungunya, zika, yellow fever, etc. According to the national centre for vector-borne disease control, the growing number of dengue infections in India has reached 1,23,106 cases in September 2021. This unprecedented increase in the infection has resulted in developing new and automated technologies to detect and recognize the platelets. Aside from the symptoms, this condition can be identified via a blood smear. The proposed technology is based on the images retrieved from blood smears. The image processing and segmentation has been performed by incorporating a deep learning algorithm to detect and determine whether the image is dengue infected or not infected by counting the platelets in the blood cells.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architectural and Functional Differences in Dot Net Solutions 网点解决方案的架构和功能差异
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936278
Arpit Arora, Mohana Mohana
{"title":"Architectural and Functional Differences in Dot Net Solutions","authors":"Arpit Arora, Mohana Mohana","doi":"10.1109/ICECAA55415.2022.9936278","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936278","url":null,"abstract":"In the product development and management area, .NET is critical. The sequential development of versions of .NET describes the importance and continuous feedback of customers about their experience. There are several architectural and functional differences of .NET evolution to its cross-platform version i.e., .NET core and above. Prominence of .NET in the improvement of development sector is evident. Quantum of open-source projects all over the globe and place of C# among the five most well-known programming languages are two pointers. Its ubiquity is simply going to develop, particularly now that the most recent emphasis (.NET 5) has changed business by presenting the idea of general programming advancement. .NET help for programming improvement isn’t restricted to the numerous programming dialects can utilize. .NET likewise advances utilization of a few prescribed procedures while allowing to utilize the methodology like to construct our application. .NET framework was the underlying kind of .NET. It gives engineer a bunch of APIs for most widely recognized programming needs and connects with basic working framework. It runs just on Windows, and its lifecycle is reaching a conclusion at this moment, after the arrival of .NET 5. Numerous executions emerged from that point forward, so the .NET name made ambiguities. .NET 5 means to make concrete the underlying vision of a widespread improvement stage.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Algorithm for Detecting Spasmodic Dysphonia Voice Pathology using Random Forest Frame Work 一种基于随机森林框架的痉挛性发声障碍语音病理检测新算法
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936567
G. Murthy, V. Iswarya, K. R. Sri, K. Harshitha, Ch. Prasanth
{"title":"A Novel Algorithm for Detecting Spasmodic Dysphonia Voice Pathology using Random Forest Frame Work","authors":"G. Murthy, V. Iswarya, K. R. Sri, K. Harshitha, Ch. Prasanth","doi":"10.1109/ICECAA55415.2022.9936567","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936567","url":null,"abstract":"Spasmodic dysphonia, a rare voice disorder is detected in the current work using Random Forest frame work. Voice pathology is related to the vocal tract area affecting the quality of speech. Numerous voice pathologies have been over the years of them are unnoticed as the symptoms are not significant. Even the symptoms are known the nature of the disorder is difficult to identify due to the over lapping nature of the symptoms. The existing algorithms for voice pathology detection are capable of classifying between normal and affected subjects, while the nature of the disorder has been considered in the proposed algorithm. Computational complexity has been reduced due to the incorporation of finite significant energy features estimated over non overlapping frames. Classification of accuracy of 93.5 has been seen with a population of 100 trees.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reliable, Secure and Efficient Decentralised Conditional of KYC Verification System: A Blockchain Approach 可靠、安全、高效的去中心化KYC验证系统:一种区块链方法
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936486
Bhavya Dhiman, Rubin Bose S
{"title":"A Reliable, Secure and Efficient Decentralised Conditional of KYC Verification System: A Blockchain Approach","authors":"Bhavya Dhiman, Rubin Bose S","doi":"10.1109/ICECAA55415.2022.9936486","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936486","url":null,"abstract":"KYC or Know Your Customer is the procedure to verify the individuality of its consumers & evaluating the possible dangers of illegitimate trade relations. A few problems with the existing KYC manual process are that it is less secure, time-consuming and expensive. With the advent of Blockchain technology, its structures such as consistency, security, and geographical diversity make them an ideal solution to such problems. Although marketing solutions such as KYC-chain.co, K-Y-C. The legal right to enable blockchain-based KYC authentication provides a way for documents to be verified by a trusted network participant. This project uses an ETHereum based Optimised KYC Block-chain system with uniform A-E-S encryption and compression built on the LZ method. The system publicly verifies a distributed encryption, is protected by cryptography, operates by pressing the algorithm and is all well-designed blockchain features. The suggested scheme is a novel explanation based on Distributed Ledger Technology or Blockchain technology that would cut KYC authentication process expenses of organisations & decrease the regular schedule for completion of the procedure whilst becoming easier for clients. The largest difference in the system in traditional methods is the full authentication procedure is performed in just no time for every client, regardless of the number of institutions you desire to be linked to. Furthermore, since DLT is employed, validation findings may be securely distributed to consumers, enhancing transparency. Based on this method, a Proof of Concept (POC) is produced with Ethereum's API, websites as endpoints and the android app as the front office, recognising the viability and efficacy of this technique. Ultimately, this strategy enhances consumer satisfaction, lowers budget overrun & promotes transparency in the customer transport network.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"118 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126417048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Medical Internet of Things with Big Data using RF-BFA and DL in Healthcare System 基于RF-BFA和DL的医疗大数据物联网发展
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936335
Cuddapah Anitha, K. Komala Devi, D. Jayasutha, B. Gomathi, R. Mahaveerakannan, Chamandeep Kaur
{"title":"Development of Medical Internet of Things with Big Data using RF-BFA and DL in Healthcare System","authors":"Cuddapah Anitha, K. Komala Devi, D. Jayasutha, B. Gomathi, R. Mahaveerakannan, Chamandeep Kaur","doi":"10.1109/ICECAA55415.2022.9936335","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936335","url":null,"abstract":"Internet of Things (IoT) developments in biomedical and health care technology have opened up exciting new avenues for innovation. A wide range of principles and fascinating examples are explored in this chapter, including theoretical, methodological, conceptual, and empirical aspects of the subject. This research study is initiated with a description on how IoT and big data are being used to analyze a massive image database created daily from diverse sources using big data, machine learning, and other kinds of artificial intelligence to produce structured data for remote diagnosis. Health care providers may rely on the heterogeneous IoT platform to manage their data reliably, thanks to dedicated computing equipment. It is critical to healthcare service reliability that varied data streams are effectively managed owing to variations and errors. To make sense of the gathered data, a Chi-square-based term feature extraction method was employed. Outliers in sensor data are filtered out and unwanted features are removed with the use of density-based spatial clustering (DBSCAN) and random forest (RF)-backward feature elimination (BFE) as RF-BFE. The pre-trained model of Convolutional Neural Network (CNN) is used to make predictions based on these features. Finally, experiments are run to determine the effectiveness of the suggested model based on a number of different criteria.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Road Safety Approach to Mitigating the Accidents in Vehicular Networks 缓解车辆网络事故的道路安全途径
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936341
Gogineni Hima Bindu, Thalakola Syamsundararao, Vuyyuru Lakshmareddy, P. R., Dasari Koteswara Rao, B. Samatha
{"title":"Road Safety Approach to Mitigating the Accidents in Vehicular Networks","authors":"Gogineni Hima Bindu, Thalakola Syamsundararao, Vuyyuru Lakshmareddy, P. R., Dasari Koteswara Rao, B. Samatha","doi":"10.1109/ICECAA55415.2022.9936341","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936341","url":null,"abstract":"The steady increase in the death tolls due to road accidents has gained a significant research attention from both academia and industries. The main reason behind road accidents is vehicle collision. In particular, to model the effect of accidents, the rear-end collisions can be analyzed by using vehicle location and speed. Moreover, the speed, direction, distance between cars, and relative speed of each vehicle simulator in various accident/collision scenarios in automobile networks must be investigated and analyzed. A safety system has been designed to reduce the probability of accidents. The proposed technique estimates the impact of a vehicular collision by considering: pedestrian crossings, interval between collisions, and accident avoidance at intersections. The proposed method is dependent on a novel criterion to determine accidents with 92.6% accuracy. Cases with a 7.4% chance of occurrence allow the passive safety system to help people survive and prevent injury in the case of an emergency.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Stability Big Data Environment of Intelligent Financial Data Abnormal QoS System based on Wolf Pack Algorithm 基于狼群算法的智能金融数据异常QoS系统稳定性大数据环境分析
2022 International Conference on Edge Computing and Applications (ICECAA) Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936159
Lijuan Cui
{"title":"Analysis of Stability Big Data Environment of Intelligent Financial Data Abnormal QoS System based on Wolf Pack Algorithm","authors":"Lijuan Cui","doi":"10.1109/ICECAA55415.2022.9936159","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936159","url":null,"abstract":"A new swarm intelligence algorithm, the Wolf Pack Algorithm has been proposed in this paper, and the convergence of the algorithm is proved based on the Markov chain theory. It reduces the risk of the algorithm falling into local optimum due to the excessively large penalty parameter. Inspired by the reproduction mode of wol ves, a big data environment analysis for the stability of the QoS system for abnormal data is proposed based on the binary wolf pack algorithm. Moreover, the Convolutional Neural Network with 4 hidden layers is used to classify and evaluate the constructed time series financial data. Data testing and analysis are performed using actual financial data. It is believed that the supervision system and relevant laws and regulations need to be improved first; secondly, the big data is used to collect personal credit records so as to establish a sound credit system as soon as possible; finally, through big data and computer technology, risk control methods are innovated to enhance the stability of Internet finance.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信