2022 5th International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems 基于物联网监控系统的安全可靠的设备访问控制方案
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072568
Divya Paikaray, Jayneel Gandhi
{"title":"A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems","authors":"Divya Paikaray, Jayneel Gandhi","doi":"10.1109/IC3I56241.2022.10072568","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072568","url":null,"abstract":"Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132317470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method of Predicting of Trend in the Stock Exchange using ML and DL Algorithms 基于ML和DL算法的证券交易趋势预测方法
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073453
G. D. Arora, Mohammed Faez Hasan, Kawerinder Singh Sidhu, Vikas Tripathi, Dipankar Misra, T. V. Kumar
{"title":"Method of Predicting of Trend in the Stock Exchange using ML and DL Algorithms","authors":"G. D. Arora, Mohammed Faez Hasan, Kawerinder Singh Sidhu, Vikas Tripathi, Dipankar Misra, T. V. Kumar","doi":"10.1109/IC3I56241.2022.10073453","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073453","url":null,"abstract":"Stock are the core of every investing portfolio and may be the most commonly used financial tool ever created for accumulating wealth. Now, almost everyone may invest in stocks due to developments in selling technologies that have open up the market. The ordinary user’s interest in the stock market has skyrocketed during the previous several decades. It is crucial to possess a highly precise forecast of a new direction in a sector with such volatile financial conditions as the share market. It is essential that there be a reliable projection of stock prices because of the economic downturn & declining profitability. With the use of ai technology, computer learning’s progressing algorithms are necessary to forecast an ou pas signal (AI). With MS Xls serving as the greatest statistical method in graph & tabular depiction of predictions outcomes, we will employ Machine Learning Model in our study with an emphasis on Regression Model (Lb), 3 Months Exponential Moving (3MMA), Exponentially Weighted moving (Aes), and Time-Series Forecasting. While implementing LR, we gathered data from Marketwatch for the stocks of Apple (AMZN), Apple (AAPL), and Youtube (Xom). We accurately forecasted the stock market’s direction for the next quarter and assessed accuracy in accordance with measures.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovation Intervention: Cyber Stalking 创新干预:网络跟踪
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072899
Shweta Pandey, A. Gehlot, A. Dixit, Rajat Balyan, Rajesh Singh, Samta Kathuria
{"title":"Innovation Intervention: Cyber Stalking","authors":"Shweta Pandey, A. Gehlot, A. Dixit, Rajat Balyan, Rajesh Singh, Samta Kathuria","doi":"10.1109/IC3I56241.2022.10072899","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072899","url":null,"abstract":"Today, there is a growing acceptance of the Internet of Things (IoT). In addition, for Technology devices to better serve the expanding need for network devices or the services provided, a few major obstacles still require special attention. This new technology has enormous promise in the most varied technical fields and may considerably aid in realizing the IoT technologies vision in several ways, including by boosting the capacity for decentralization, simplifying interaction, enabling transaction models, or promoting autonomous device coordination. In order to help the issues related to cyberstalking technology plays important role like blockchain, big data. The objective of this article is to explain the fundamentals of big data & blockchain technology, as well as how they may be utilized to protect stalkers security and safety. Then, introduce the stalker, as selfish miner variation whose goal is to stop a node from publishing any blocks mostly on main chain.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
To Design & Implement the Image Encryption Algorithm, using Phase Retrieval in Elliptic Curve Cryptography (ECC) 椭圆曲线密码(ECC)中基于相位检索的图像加密算法的设计与实现
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072750
Reena Hooda, Himanhu, Vikas Poply
{"title":"To Design & Implement the Image Encryption Algorithm, using Phase Retrieval in Elliptic Curve Cryptography (ECC)","authors":"Reena Hooda, Himanhu, Vikas Poply","doi":"10.1109/IC3I56241.2022.10072750","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072750","url":null,"abstract":"The excessive demand for digitized images across all fields has made it necessary to safeguard the images from attackers for secure network transfer. Due to their sensitivity, sensitive photographs used in medical and criminal investigations are assumed to be of the highest quality. Modern encryption techniques simply expand the one developed for grayscale photos rather than being specifically created for colour images. To handle colour images utilized in medical and forensic applications, a multi-layered hybrid approach has been devised and given the term Hybrid multi-layered “Hyper-chaotic Hyper-elliptic curve-based image encryption (HHH)” technique. DNA encryption based on hyper chaos is used in the first layer to produce chaotic sequences. Images often hold very private and sensitive information. Since images are crucial in many situations, such as “military communication, object tracking, and medical image processing, protecting sensitive and secret information” from unauthorized use and modification is essential. Encryption is one of the greatest methods for concealing information for reaching this objective. In recent years, researchers have created a variety of techniques for image encryption. To boost security, they employ several picture encryptions concepts. To strengthen the integrity of the crypto system, substitution permutation raises the level of confusion dissemination. Secondary analysis has been done for this research to gather relevant information related to this topic.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile Technology and Artificial Intelligent Systems in Business Development 业务开发中的敏捷技术和人工智能系统
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073410
M. Lourens, R. Raman, P. Vanitha, Rajesh Singh, Geetha Manoharan, M. Tiwari
{"title":"Agile Technology and Artificial Intelligent Systems in Business Development","authors":"M. Lourens, R. Raman, P. Vanitha, Rajesh Singh, Geetha Manoharan, M. Tiwari","doi":"10.1109/IC3I56241.2022.10073410","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073410","url":null,"abstract":"This article examines how Agile methodology and concepts are used to the delivery of artifical intelligence as well as how Agile has transformed over time. Artificial Intelligence (AI) are wide-ranging set of technologies that can promise various benefits for the company in terms off added business value and customer satisfaction.In earlier times, organizations/companies are increasingly turning to intelligence technology in order to gain more business value following a deluge of data as well as a strong increase in computational capacity. This is encouraging the incorporation of AI into business operations, but the effects of this adoption need to be investigated more thoroughly. The way that enterprises as well as consumers use information has evolved as a result of the internet’s and smart devices’ exponential growth in data volume. As a result, companies are starting to use AI technologies to embrace agility. Agile technique is the capacity to adapt quickly and effectively to these external situations in order to prosper in an industry that is frequently developing and unpredictable. This research focuses on the entire effects of AI on enterprises, including future changes in business models as well as research, innovation, and market deployment. Additionally, it focuses on several ways to incorporate artificial intelligence methods into scrum methodolgy.It also provides the information regarding iterative development process can be adapted to A.I evolvment well as the comparison of agile technology and artiofical intelligence in terms of business management development.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Techniques for using Intelligent Internet of Things Appliances to Protect Health Department Information 使用智能物联网设备保护卫生部门信息的深度学习技术
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073140
Neha Tyagi, D. Buddhi, S. Poojitha, Kumud Pant, A. Aruna, Tarun Parashar
{"title":"Deep Learning Techniques for using Intelligent Internet of Things Appliances to Protect Health Department Information","authors":"Neha Tyagi, D. Buddhi, S. Poojitha, Kumud Pant, A. Aruna, Tarun Parashar","doi":"10.1109/IC3I56241.2022.10073140","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073140","url":null,"abstract":"Profound Learning (DL) is an innovation that repeats the manner in which the human mind’s capabilities with regard to deciphering information and showing up at choices. DL was created by Google and IBM. DL and brain networks have a wide assortment of uses, some of which incorporate discourse acknowledgement, normal language handling (NLP), and PC vision. In the field of medical care, it has been put to use in the determination and therapy of an expansive assortment of constant sicknesses, as well as in the counteraction and the board of such circumstances. These calculations might help with ending the spread of ailment, improving the proficiency with which clinical analyses are made, and diminishing the monetary weight put on patients as well as authoritative staff. This paper examines the technique of profound realizing, which is utilized in an assortment of medical care disciplines, in addition to analyzing the Elliptic Curve Cryptography solution to the healthcare data security problem. Following the completion of the summaries of the data obtained from each category, comparison tables are prepared employing the essential criteria. The frameworks for DL make use of a broad array of applications, tools, techniques, and data sets. DL stands for deep learning. In order to bring this whole thing to a close, we will talk about the opportunities and challenges that lie ahead for further research into profound learning models.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126443888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Techniques for the Detections of Congenital Diseases: Challenges and Research Perspectives 先天性疾病检测的人工智能技术:挑战和研究前景
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072469
K. Kaur, Charanjit Singh, Yogesh Kumar
{"title":"Artificial Intelligence Techniques for the Detections of Congenital Diseases: Challenges and Research Perspectives","authors":"K. Kaur, Charanjit Singh, Yogesh Kumar","doi":"10.1109/IC3I56241.2022.10072469","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072469","url":null,"abstract":"Congenital infections, disorders, or diseases occur when pregnant women get infected with an organism that further enters into their placenta and fetus after entering their bloodstream. Such conditions may affect newborn infants and unborn fetuses that need to be cured by early prediction. In the field of medicine, better high-performance prediction is achieved using Artificial intelligence. It is a broad area of science for simulating the natural intelligence established by animals and humans through machine learning. In this paper, we have given an overview of using AI algorithms to predict various congenital diseases and forward with a broad category of congenital disorders and infections that come under prenatal and neonatal categories. Later, a comparative table was formulated to study its effects on the embryo and fetus. In the case of performing tasks using ML or DL algorithms, specific steps have been followed that are given in detail under the framework section. In the last section of the paper, we have performed a comparative study on work done in predicting different congenital diseases using fuzzy logic, deep neural network, Ensemble learning, Support vector machine, Artificial neural network, Random forest, and Naïve Bayes. From the study, it has been found that although different ML or DL algorithms used in the individual prediction of different congenital diseases can give good outcomes, more work still needs to be done on proposing approaches for predicting hybrid methods.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Approach to Machine Learning for Cancer Classification 癌症分类的机器学习系统方法
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072474
Gaganpreet Kaur, C. Prabha, Deepshikha Chhabra, Navpreet Kaur, M. Veeramanickam, S. Gill
{"title":"A Systematic Approach to Machine Learning for Cancer Classification","authors":"Gaganpreet Kaur, C. Prabha, Deepshikha Chhabra, Navpreet Kaur, M. Veeramanickam, S. Gill","doi":"10.1109/IC3I56241.2022.10072474","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072474","url":null,"abstract":"Cancer is a lethal disease that is frequently brought on by the accumulation of hereditary disorders and many pathological alterations. Cancerous cells are aberrant, life-threatening growths that can appear anywhere on the human body. To determine what might be helpful for its treatment, cancer, also known as a tumour, should be promptly and accurately discovered in the early stages. Even while each approach has its own unique considerations, some of the major causes of mortality include difficult histories, inadequate diagnoses, and inadequate treatment. The study’s objective is to review, categorise, and discuss the most recent advances in machine learning for the identification of leukaemia, breast, brain, lung, and other human body cancers. Clinical practice, “translational medicine”, and the biological study of various diseases, such as cancer, have all been included in the medical applications of AI. “Current AI systems”, which are solely based on ML methodologies, have been used to improve various facets of “clinical practise”, including the “interpretation of genomic data” for the identification of genetic variants based on “high-throughput sequencing technologies” in many medical specialities, such as “pathology, radiology, ophthalmology, and dermatology”. A secondary method of data collection is considered for this research to gather relevant and factual data related to ML approaches use for cancer classification.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power-Efficient Secured Hardware Design of AES Algorithm on High Performance FPGA 基于高性能FPGA的AES算法节能安全硬件设计
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073148
K. Kumar, Vijay Singh, Gaurav Mishra, B. Babu, Nandita Tripathi, Pramod Kumar
{"title":"Power-Efficient Secured Hardware Design of AES Algorithm on High Performance FPGA","authors":"K. Kumar, Vijay Singh, Gaurav Mishra, B. Babu, Nandita Tripathi, Pramod Kumar","doi":"10.1109/IC3I56241.2022.10073148","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073148","url":null,"abstract":"With the expansion and growth of industries, the two major issues exist that affect both civilization and the environment. Technology development has made it more difficult to communicate and transmit data over secure channels. The use of Green Communication (GC) technology and energy-efficient parts can lessen the lack of electricity and energy. The usage of various technologies under one framework is the main topic of this study. In this article, a hardware implementation of the Advanced Encryption Standard (AES) algorithm is shown. Field Programmable Gate Array (FPGA) devices are taken into consideration for hardware implementations. The power calculation of the AES algorithm is computed for several clock speeds of the Spartan-7 FPGA, and the results are examined using VIVADO tool.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Application of Deep Learning in Natural Language Processing 深度学习在自然语言处理中的应用综述
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073309
P. Kshirsagar, D. H. Reddy, Mallika Dhingra, Dharmesh Dhabliya, Ankur Gupta
{"title":"A Review on Application of Deep Learning in Natural Language Processing","authors":"P. Kshirsagar, D. H. Reddy, Mallika Dhingra, Dharmesh Dhabliya, Ankur Gupta","doi":"10.1109/IC3I56241.2022.10073309","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073309","url":null,"abstract":"Natural Language Processing (NLP) is a developing method utilized in building different sorts of Artificial Intelligence (AI) that is available in today’s time. More intellectual applications will tend to be a primary goal for ongoing and upcoming research. The requirement and desire for data-driven strategies for automatic semantic analysis have risen as a result of recent improvements in processing capacity as well as the accessibility of enormous several linguistic records. A boom in the applications throughout the previous several years of deep learning approaches has advanced the area of natural language processing. This review offers a succinct summary of deep learning architectures and techniques as well as a basic introduction to the area. Our goal is to develop a theoretical study of numerous sectors where NLP may have a significant impact and completely alter the situation with its automated approaches. Everyone is interested in investing in it since it is a hot issue. An in-depth investigation of NLP and its field is used to create these applications. Natural language processing (NLP) trends and its constituent parts are covered in the introduction to this article before it discusses applications for NLP, its emergence, and related issues.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信