2022 32nd Conference of Open Innovations Association (FRUCT)最新文献

筛选
英文 中文
Mobile Application: An Approach with the Analytical Hierarchy Process (AHP) for the Allocation and Generation of Dietary Plans 移动应用:一种基于层次分析法(AHP)的膳食计划分配和生成方法
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953870
Lourdes Pairazaman, Antony Quispe, Lenis Wong
{"title":"Mobile Application: An Approach with the Analytical Hierarchy Process (AHP) for the Allocation and Generation of Dietary Plans","authors":"Lourdes Pairazaman, Antony Quispe, Lenis Wong","doi":"10.23919/FRUCT56874.2022.9953870","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953870","url":null,"abstract":"Obesity prevalence rates rise every year around the globe. This has become an alarming issue, due to the distress caused by the high probability of developing obesity in childhood which continues into adulthood, creating great health problems and even mortality. As a result, emerging technologies such as mobile applications have had a direct impact on the world of health, these rely on various specialized algorithms. This study seeks to propose an approach based on the Analytical Hierarchy Process (AHP), to assign and generate dietetic plans which will be used by nutritionists and patients. This approach consists of five phases: (1) anthropometric data definition, (2) macronutrients selection, (3) dietary meals dataset definition, (4) AHP definition (in order to obtain the best macronutrient and dietary meal) and (5) mobile application design. Two different experiments were conducted in a private medical entity, involving eight nutritionists and eight patients, who considered the following metrics: the “creation time of dietetic plans”, the “number of monthly revisions”, the “precision level” and the “satisfaction levels”. The results showed that mobile application users achieved significantly better outcomes in the assignation and generation of dietetic plans than those who used the traditional method.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions 信道流量最小化密钥共享协议,用于互联网上使用,不需要任何加密假设
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953895
V. Yakovlev, V. Korzhik, V. Starostin, Alexey Lapshin, A. Zhuvikin
{"title":"Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions","authors":"V. Yakovlev, V. Korzhik, V. Starostin, Alexey Lapshin, A. Zhuvikin","doi":"10.23919/FRUCT56874.2022.9953895","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953895","url":null,"abstract":"A further development of the key sharing protocol presented at previous FRUCT -31 session is proposed in the current paper. In contrast to the previous protocol executing by an exchange of real integers over Internet channel, a new protocol version operates with binary bits and all operations are modulo two additions. Such version significantly decreases channel traffic required for key sharing and a complexity of signal processing. The full description of protocol is given. Optimality of signal processing proposed in the paper for eavesdropper is proved.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Studies of Everyday Professional, Domestic and Client-Service Communication for the Development of Voice Assistants in Russian 俄语语音助手发展的日常专业、家庭和客户服务沟通实证研究
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953821
Tatiana Y. Sherstinova, Irina Petrova, O. Mineeva, Maria Fedosova
{"title":"Empirical Studies of Everyday Professional, Domestic and Client-Service Communication for the Development of Voice Assistants in Russian","authors":"Tatiana Y. Sherstinova, Irina Petrova, O. Mineeva, Maria Fedosova","doi":"10.23919/FRUCT56874.2022.9953821","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953821","url":null,"abstract":"Voice assistants are gradually becoming an increasingly common feature of our everyday life. However, the naturalness of communication provided by them usually leaves much to be desired. It may be caused by the fact that many chat-bots are trained on artificially created linguistic data sets and on fictional dialogues modeled by linguists on the basis of common phrasebooks or communication textbooks. As a result, the necessary pragmatic result can be achieved, but the feeling of “unnatural” communication of a voice assistant remains, which often reveals itself by the use of archaic phrases or remarks that are not quite suitable for the situation. This state of affairs seems to be improved by referring to real speech data―namely, to a representative volume of sound recordings of real speech communication. The paper discusses some approaches to the analysis of speech data from the sound corpus “One Day of Speech”, which is the most representative resource of Russian everyday spoken communication. The pragmatic structure of professional and everyday conversations is considered, as well as linguistic content of standard modules, such as Greeting and Farewell. As a practical recommendation, we can suggest increasing the variability of answers not due to the lexical diversity of phrases, but due to a more diverse intonation implementation for the most typical replicas in spoken Russian.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115842435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Twins of Activities: Role of Information Actions 活动的数字孪生:信息行动的角色
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953805
A. Geyda, L. Fedorchenko
{"title":"Digital Twins of Activities: Role of Information Actions","authors":"A. Geyda, L. Fedorchenko","doi":"10.23919/FRUCT56874.2022.9953805","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953805","url":null,"abstract":"The article considers concepts and models for digital twins of activities and methods available to use such digital twins. Emphasis is made on modelling of information actions as a part of activity and information use in the activity. Authors show that there is a multidisciplinary gap between the need to model application of information for further activity in systems (when creating digital twin of activity) and available theoretical means for the modelling of application of information while performing activity. Models suggested can be used to create models for digital twin of activity, which represents an information application for activity. As a result, the digital twin of activity, represented by such models, can be used to synthesize activity characteristics and information actions for systems functioning in various conditions. To build models required, diagrammatic models of information application for activity in systems are suggested. Diagrammatic models suggested can be used for further creation of new formal models of activity and formal models of information technologies applications to fulfill successful activity. Suggested models can be applied to build digital twins of the activity. Such twins allow representing and, then, enhancing activity based on information collected and to enhance information application for activity. This could further allow us to solve problems related to digital transformation planning of various activities, system engineering problems, computer aided design and manufacture problems, information activities synthesis problems.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Social Network Users Profiling Using Machine Learning for Information Security Tasks 使用机器学习进行信息安全任务的社交网络用户分析
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953858
Elizaveta Dubasova, Artem Berdashkevich, G. Kopanitsa, Pavel P. Kashlikov, O. Metsker
{"title":"Social Network Users Profiling Using Machine Learning for Information Security Tasks","authors":"Elizaveta Dubasova, Artem Berdashkevich, G. Kopanitsa, Pavel P. Kashlikov, O. Metsker","doi":"10.23919/FRUCT56874.2022.9953858","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953858","url":null,"abstract":"The need for bot detection is growing in proportion to the increase in the number of social network users. The robotization of processes has not escaped social networks, with the result that bots, designed to mimic human behavior, create a burden and, in some cases, threats to users, including manipulation and misinformation. Classical information security threats related to bot activity are DDoS, collection and distribution of user data, manipulation of billing systems, and misuse of services. Often bot technology is used for scoring bonus points or using other customer loyalty mechanisms to gain their own benefit, in violation of the service policy. The problem is that it is often hard to confirm the correspondence between a real person and a profile due to the large amount of disparate information about users' activity, as well as the use of modern technologies, including machine learning, to develop bots. This paper focuses on the problem of detecting bots in social networks using machine learning. We propose an automatic, retrainable method for detecting fake accounts on a social network. The study describes the result of developing user classification models based on the activity logs of social network users in the problem of automated user profiling, that is, determining whether a user account is genuine or a bot is hiding behind it. The aim of the work is to develop methods for detecting bots using machine learning and intelligent analysis. In our work to solve the problem we use gradient boosting with an accuracy of AUC = 0.9999.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134173946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Implementing a IoMT Architecture with ISO/IEC 27001 Security Controls for Remote Patient Monitoring 实现IoMT架构与ISO/IEC 27001安全控制远程患者监测模型
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953893
Brandon Alegría, Lenis Wong, Diego Bedriñiana
{"title":"Model for Implementing a IoMT Architecture with ISO/IEC 27001 Security Controls for Remote Patient Monitoring","authors":"Brandon Alegría, Lenis Wong, Diego Bedriñiana","doi":"10.23919/FRUCT56874.2022.9953893","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953893","url":null,"abstract":"Due to the recent pandemic, the healthcare sector has been forced to incorporate new technologies into its systems, such as IoT and Fog Computing. However, being new technologies, they are prone to security breaches. From this context, it is identified that medical systems do not have a sufficient level of security, due to the use of new technologies such as IoT and the lack of controls to protect these new technologies. Therefore, a model for implementing an Internet of Medical Things (IoMT) Architecture with ISO/IEC 27001 security controls for remote patient monitoring is proposed. This model has 4 stages: Stage 1 selects an information security standard for the healthcare sector. Stage 2 selects the information security controls of the selected standard. Stage 3 selects and evaluates an IoMT architecture applicable to the healthcare sector. And Stage 4 designs the information security controls for each layer of the IoMT architecture. The IoMT architecture and information security controls are simulated and experimented with physicians (the productivity of the system) and with information security expert (the quality of the implemented controls). The results of the first experiment show that “effectiveness”, “productivity”, and “satisfaction” regarding the use of the IoMT architecture have an average rating of 4.05 (high level). The results of the second experiment show that “Information Security”, “Awareness” and “Security Incident Management” regarding the quality of the security controls implemented have an average rating of 3.65 (high level).","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134208066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Better Evaluation of Topic Model Quality 更好地评价主题模型质量
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953874
M. Khodorchenko, N. Butakov, D. Nasonov
{"title":"Towards Better Evaluation of Topic Model Quality","authors":"M. Khodorchenko, N. Butakov, D. Nasonov","doi":"10.23919/FRUCT56874.2022.9953874","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953874","url":null,"abstract":"Topic modelling is a popular unsupervised method for text corpora processing to obtain interpreted knowledge of the data. However, there is an automatic quality measurement gap between existing metrics, human evaluation and performance on the target tasks. That is a big challenge for automatic hyperparameter tuning methods as they heavily rely on the output signal to define the optimization direction. Currently, this process of evaluating the effectiveness of the topic model faces a number of difficulties and keeps being a labour-intensive routine performed manually due to the absence of a universal metric that may show strong correspondence with human assessment. The development of a quality metric that may satisfy this condition is essential to provide valuable feedback for the optimization algorithm when working with flexible and complex models, such as models based on additive regularisation or neural networks. To address the quality measurement gap, we performed an experimental study of existing scores on a specially created dataset containing topic models for several different text corpora in two languages accompanied by evaluated existing metrics and scores obtained from human assessment. The study results show how the situation with automatic quality estimation may be improved and pave the way to metrics learning with ensembles of machine learning algorithms.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134262138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Rule-Based Data Cleaning Using NLP 使用NLP的基于规则的自动数据清理
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953810
Konstantinos Mavrogiorgos, Argyro Mavrogiorgou, Athanasios Kiourtis, N. Zafeiropoulos, S. Kleftakis, D. Kyriazis
{"title":"Automated Rule-Based Data Cleaning Using NLP","authors":"Konstantinos Mavrogiorgos, Argyro Mavrogiorgou, Athanasios Kiourtis, N. Zafeiropoulos, S. Kleftakis, D. Kyriazis","doi":"10.23919/FRUCT56874.2022.9953810","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953810","url":null,"abstract":"Data Cleaning is a subfield of Data Mining that is thriving in the recent years. Ensuring the reliability of data, either when generated or received, is of vital importance to provide the best services possible to users. Accomplishing the aforementioned task is easier said than done, since data are complex, generated at an extremely high rate and are of enormous size. A variety of techniques and methods that are part of other subfields from the domain of the Computer Science have been invoked to assist in making Data Cleaning the most efficient and effective possible. Those subfields include, among others, Natural Language Processing (NLP), which in essence refers to the interaction among computers and human language, seeking to find a way to program computers to be able to process and analyze huge volumes of human language data. NLP is a concept that exists for a long time, but, as time goes by, it is proposed that it can be applied to a variety of concepts that are not solely NLP-related. In this paper, a rule-based data cleaning mechanism is proposed, which utilizes NLP to ensure data reliability. Making use of NLP enabled the mechanism not only to be extremely effective but also to be a lot more efficient compared to other corresponding mechanisms that do not utilize NLP. The mechanism was evaluated upon diverse healthcare datasets, not however being limited to the healthcare domain, but supporting a generalized data cleaning concept.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Driving Safe Speed Estimation Based on Outside Environment Vision Analysis 基于外部环境视觉分析的行车安全速度估计
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953827
A. Kashevnik, Ammar H. Ali
{"title":"Driving Safe Speed Estimation Based on Outside Environment Vision Analysis","authors":"A. Kashevnik, Ammar H. Ali","doi":"10.23919/FRUCT56874.2022.9953827","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953827","url":null,"abstract":"Using predefined speed limits on roads had huge positive safety effects on decreasing the vehicle accident rate. On the other hand using these static limits was the 20th-century solution. With the recent evolution of machine learning, driver assistant systems, and autonomous driving the necessity for dynamic speed limits are raised. In this paper we propose a novel method to analyze the scene and adjust the speed limits according to the environment's dynamic changes taking into account static constraints. Our proposed system is a recommendation system to estimate safe speed limits. It will consider the static predefined speed limits as well as other values like (the number of vehicles on the scene, the relative distance to the closest vehicle, the road width and curvature, the weather state, and the day/night (illumination) states.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Immunotherapy Classification: Application Domains, Datasets, Algorithms and Software Tools from Machine Learning Perspective 免疫治疗分类综述:机器学习视角下的应用领域、数据集、算法和软件工具
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953853
Ahsanullah Yunas Mahmoud, D. Neagu, D. Scrimieri, Amr Rashad Ahmed Abdullatif
{"title":"Review of Immunotherapy Classification: Application Domains, Datasets, Algorithms and Software Tools from Machine Learning Perspective","authors":"Ahsanullah Yunas Mahmoud, D. Neagu, D. Scrimieri, Amr Rashad Ahmed Abdullatif","doi":"10.23919/FRUCT56874.2022.9953853","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953853","url":null,"abstract":"Immunotherapy treatments can be essential some-times and a waste of valuable resources at other times, de-pending on the diagnosis results. Therefore, researchers in immunotherapy need to be updated on the current status of research by exploring: application domains e.g. warts, datasets e.g. immunotherapy, classifiers or algorithms e.g. kNN and software tools. The research objectives were: 1) to study the immunotherapy-related published literature from a supervised machine learning perspective. In addition, to reproduce im-munotherapy classifiers reported in research papers. 2) To find gaps and challenges both in publications and practical work, which may be the basis for further research. Immunotherapy, b-cell data, cryotherapy, exasens data and sample serum are explored. The results are compared with published literature. To address the found gaps in further research: novel experiments, unbalanced studies, focus on effectiveness and a new classifier algorithm are suggested.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信