2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

筛选
英文 中文
Factors Affecting Synchronization Time of Tree Parity Machines in Cryptography 密码学中影响树奇偶校验机同步时间的因素
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349327
M. Aleksandrov, Y. Bashkov
{"title":"Factors Affecting Synchronization Time of Tree Parity Machines in Cryptography","authors":"M. Aleksandrov, Y. Bashkov","doi":"10.1109/ATIT50783.2020.9349327","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349327","url":null,"abstract":"This article presents experimental results of evaluating factors affecting synchronization time of tree parity machines. Tree parity machines are proposed as a modification of the symmetric encryption algorithm. One of the advantages of the method consists in using the phenomenon of mutual synchronization of neural networks to generate an identical encryption key for users without the need to transfer it. As a result, the factors influencing the synchronization time of neural networks and the level of key cryptographic strength were determined. The degree of influence factors was found out experimentally. The influence of the learning rule on timing and stability of synchronization of neural networks was also determined. As a result, it was determined that the best rule for mutual learning of neural networks is Hebb’s rule, and when the architecture of neural networks becomes more complex, the number of hidden neurons should be increased first. The tasks of further research are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121105522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Paraphrase Identification Using Dependency Tree and Word Embeddings 释义识别使用依赖树和词嵌入
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349338
V. Vrublevskyi, O. Marchenko
{"title":"Paraphrase Identification Using Dependency Tree and Word Embeddings","authors":"V. Vrublevskyi, O. Marchenko","doi":"10.1109/ATIT50783.2020.9349338","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349338","url":null,"abstract":"In this paper, we are trying to develop an efficient and simple model for detecting paraphrase sentences in the English language. The dependency tree was chosen as the main structure to represent the relationships between words in a sentence. To represent the word semantics, we are using pre-trained general-purpose word embeddings. Based on these two key components, we designed a few features that can help to identify paraphrases. Conducted experiments proved that the model is efficient and shows relatively close results to state-of-the-art models.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonparametric Multiple Comparison Test for Change-Point Detection in Big Data 大数据变化点检测的非参数多重比较检验
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349323
D. Klyushin, K. Golubeva
{"title":"Nonparametric Multiple Comparison Test for Change-Point Detection in Big Data","authors":"D. Klyushin, K. Golubeva","doi":"10.1109/ATIT50783.2020.9349323","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349323","url":null,"abstract":"We offer a new effective tool for detection of change-points in tracking data (movement data, health rate data etc.). We developed a nonparametric test for homogeneity of data in two adjacent time intervals. In the context of Big Data and IoT it allows online analyzing data stream from sensor and recognizing significant deviations from the baseline. The significance level for the test is less than 0.05. Also, we provide the results of comparison of the test with well-known Kolmogorov–Smirnov test, the sign test, the Wilcoxon signed-rank test, and the Mann–Whitney test. The computational experiment has shown that the Klyushin–Petunin test based on p-statistics has very high robustness, specificity, and sensitivity, and is more universal than the Kolmogorov–Smirnov test, the sign test, the Wilcoxon signed-rank test, and the Mann–Whitney test.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123318524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methods for Predicting Adjustments to the Rates of Modern “Digital Money” 现代“数字货币”利率调整的预测方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349309
O. Leshchenko, Olexander Trush, Natalia Dahno, A. Dudnik, Karina Kazintseva, Olexander Kovalenko
{"title":"Methods for Predicting Adjustments to the Rates of Modern “Digital Money”","authors":"O. Leshchenko, Olexander Trush, Natalia Dahno, A. Dudnik, Karina Kazintseva, Olexander Kovalenko","doi":"10.1109/ATIT50783.2020.9349309","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349309","url":null,"abstract":"This article describes advantages and disadvantages of using methods for predicting the adjustment of the rates of modern digital money, which every year are gaining popularity among ordinary users - transors and entrepreneurs.Cryptocurrency is a set of concepts and technologies that together create basis for the digital money ecosystem. Money are used to save and transfer value between network members.The topicality of the topic is due to uncertainty about the appropriateness of using cryptocurrencies.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Use of a Genetic Algorithm in the Problem of Distribution of Information Security Organizational and Financial Resources 遗传算法在信息安全组织和财务资源分配问题中的应用
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349310
V. Lakhno, B. Akhmetov, S. Adilzhanova, A. Blozva, Rzaieva Svitlana, Rzaiev Dmytro
{"title":"The Use of a Genetic Algorithm in the Problem of Distribution of Information Security Organizational and Financial Resources","authors":"V. Lakhno, B. Akhmetov, S. Adilzhanova, A. Blozva, Rzaieva Svitlana, Rzaiev Dmytro","doi":"10.1109/ATIT50783.2020.9349310","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349310","url":null,"abstract":"A model of the application of the genetic algorithm (GA) for solving the problem of multicriteria optimization in the distribution of resources allocated for the cybersecurity of the protected object is proposed. In the presented model, in contrast to the existing solutions, the Bellman-Zade principle is involved, which makes it possible to optimize the distribution, for example, of the organizational and financial resources of the protected object. It is shown that the use of GAs in the tasks of multicriteria optimization of cybersecurity resources will make it possible, based on multivariate simulation modeling, to select the optimal variant of resource allocation, which is especially important when these resources are limited in volume, and the defense side does not have data on the attackers’ resources.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132463723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ATIT 2020 Copyright Page ait2020版权页面
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349349
I. Polovinkin, V. Savchenko, O. Stefurak, O. Barabash, systemSerhii Korotin, A. Salii, Yurii P. Tselischev, Ivan P. Korovin, Anatolii V. Kotsiuruba, Yurii M. Kolomiets, Olha Suprun, Anton Sorokun, O. Suprun, Viktor Matviichuk, Svetlana Zhakiyeva, Rustam Nassirkhan
{"title":"ATIT 2020 Copyright Page","authors":"I. Polovinkin, V. Savchenko, O. Stefurak, O. Barabash, systemSerhii Korotin, A. Salii, Yurii P. Tselischev, Ivan P. Korovin, Anatolii V. Kotsiuruba, Yurii M. Kolomiets, Olha Suprun, Anton Sorokun, O. Suprun, Viktor Matviichuk, Svetlana Zhakiyeva, Rustam Nassirkhan","doi":"10.1109/atit50783.2020.9349349","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349349","url":null,"abstract":"Paper / Article Title Author Name Author Email Authorized Signatory Name Authorized Signatory Email D te of Sigature Copyright Type IEEEATIT2020-10 The method of improving the quality of signal detection by accounting for interferenceOleksander Laptiev, Igor Polovinkin, Vitalii Savchenko, Oleh Stefurak and Oleg Barabash alaptev64@ukr.net,Igor1964mo@i.ua,savitan@ukr.net,stefurak.oleg@ukr.net,bar64@ukr.net 2020-12-15 IEEE IEEEATIT2020-101 Modeling the characteristics of the stabilization circuit of a hypothetical dynamic systemSerhii Korotin, Anatolii Salii, Yurii Tselischev, Ivan Korovin, Anatolii Kotsiuruba and Yurii Kolomiets korotin2008@gmail.com,salyi_ _g@nuou.org.ua,cup1938@ukr.net,korovinip@gmail.com,kav2510@ukr.net,ip48212@gmail.com 2020-12-15 IEEE IEEEATIT2020-102 Research of Features and Possibilities of Modern Real Time Video Services Olha Suprun, Anton Sorokun, Oleh Suprun, Viktor Matviichuk , Serhii Voskoboinikov and Yurii Babenko o.n.suprun@gmail.com,sorokun@gmail.com,oleh.o.suprun@gmail.com,123qwert1@ukr.net,Rtyvcb@gmail.com,babenkomahalych@gmail.com 2020-12-15 IEEE IEEEATIT2020-103 Information model of decision support in the design of information and communication systems based on the customer's profile Viach slav Riabtsev viacheslav.riabtsev@gmail.com 2020-12-15 IEEE IEEEATIT2020-104 Protection Of Information In Assessing The Factors Of Influence Tsiutsiura Mykola, Tsiutsiura Svitlana, Andrii Yerukaiev, Terentiev Oleksandr, Kyivska Kateryna, Kuleba Mykola alusion@ukr.net 2020-12-15 IEEE IEEEATIT2020-105-1 The Network Reliability Assessment and Risk Prevention Measures for the Power System of Kazakhstan Due to High Renewables Svetlana Zhakiyeva, Rustam Nassirkhan, Bekzhan Mukatov and Nurkhat Zhakiyev zhakiyevas@gmail.com,o arov.r@climate.kz,mukatov@kegoc.kz,nurkhat.zhakiyev@astanait.edu.kz 2020-12-21 IEEE IEEEATIT2020-106 Mathematical Model for Heterogeneous Databases Parameters Estimation in Distributed Systems with Dynamic Structure Vad m Mukh n, Yaroslav Ko naga, Viktor Bondarenko, Valerii Zavgorodnii, Oksana Herasymenko and Oleksii Sholokhov v.mukhin@kpi.u ,slovyan_k@ukr.net,victorbondarenko@ukr.net,z vgorodni valerii@gmail.com,oksgerasymenko@gmail.com,gyroalex@ukr.net 2020-12-16 IEEE IEEEATIT2020-11 Comparison of floating-point numbers absolute values when representation of the exponents with sign-inverse two’s complementary code Ol ksandr Miroshkin, Oleksandr Samoshchenko and Heorhii Marhiiev miroshkina @gmail.com,aleksandr.samoshchenko@gmail.com,margievge@gmail.com 2020-12-16 IEEE IEEEATIT2020-111 Methods of Assessing the Scientific Activity of Scientists and Higher Education Institutions Andrii Biloshchytskyi, Alexander Kuchansky, Yurii Andrashko, Aidos Mukhatayev, Sapar Toxanov and Adil Faizullin kuczanski@gmail.com,b o1978@gmail.com,andrashkojv@gmail.com 2020-12-16 IEEE IEEEATIT2020-114 Hierarchical model of a complex of IoT devices based on the use of a wireless sensor network Yrii Afanasiev, Valerii Chystov, Volodymyr A","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Method of Improving the Signal Detection Quality by Accounting for Interference 考虑干扰因素提高信号检测质量的方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349259
O. Laptiev, I. Polovinkin, Savchenko Vitalii, O. Stefurak, O. Barabash, O. Zelikovska
{"title":"The Method of Improving the Signal Detection Quality by Accounting for Interference","authors":"O. Laptiev, I. Polovinkin, Savchenko Vitalii, O. Stefurak, O. Barabash, O. Zelikovska","doi":"10.1109/ATIT50783.2020.9349259","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349259","url":null,"abstract":"In the process of detecting the radio signal of information transmission in information systems, an urgent issue is to increase noise immunity. The article investigates the peculiarities of using low - pass filters with quadratic and linear dependence of the response on the input signal. It is shown that the principle of operation of filters is that the summation process is performed. In this case, the useful signal is summed coherently, and the interference signal is incoherent, ie the useful signal increases and the interference signal decreases.When influencing the input of linear and square filters, a rectangular pulse that mimics the signal of modern digital radio signals, the necessary parameters for further use of input and output signals are determined: mathematical expectation, correlation coefficient, variance, standard deviation.It is proved that the use of narrow-band low-pass filters in the process of signal processing allows to increase the noise immunity of the system for detection, recognition and localization of radio signals by 11%.Modeling of the process of filtering radio signals at different correlation coefficients is carried out. The simulation results confirmed the results of theoretical calculations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multimodular Cyberphysical Systems: Challenges and Existing Solutions 多模块网络物理系统:挑战和现有解决方案
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349291
Y. Albrekht, A. Pysarenko
{"title":"Multimodular Cyberphysical Systems: Challenges and Existing Solutions","authors":"Y. Albrekht, A. Pysarenko","doi":"10.1109/ATIT50783.2020.9349291","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349291","url":null,"abstract":"The modern solutions to parts of the problem of creating multimodular cyberphysical systems are described. The article contains analysis of current solutions to cyberphysical space systems, creating multi-module systems that includes micro robots, to create swarm intelligence, integration cyberphysical systems for conducting experiments and using LiFi in solving network issues in cyberphysical systems. The article also includes a list of still existing issues that are yet to be solved: security, reliability and performance issues. Combining these solutions and solving the remaining issues allow to create systems that can be used in variety of researches and automate the process of collecting data.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131545242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static Analysis of Resource Consumption in Programs Using Rewriting Rules 基于重写规则的程序资源消耗静态分析
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349290
T. Mamedov, A. Doroshenko, Ruslan Shevchenko
{"title":"Static Analysis of Resource Consumption in Programs Using Rewriting Rules","authors":"T. Mamedov, A. Doroshenko, Ruslan Shevchenko","doi":"10.1109/ATIT50783.2020.9349290","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349290","url":null,"abstract":"The paper presents a method of static analysis of resource consumption for C# programs. A software tool based on rewriting rules is proposed for that purpose for the case of opened and closed files. In order to work with C#-programs, the special plugin for TermWare, which helps to generate appropriate terms from source code, was developed. The plugin uses the Roslyn compiler to find different syntax errors and focus on the primary task of generating terms from source code. Also, an application based on TermWare system – a static analyzer that finds problems with open-close files, is described in the article.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three-Pass Cryptographic Protocol Based on Permutations 基于排列的三通道密码协议
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349343
Shcherba Anatoly, Faure Emil, Lavdanska Olha
{"title":"Three-Pass Cryptographic Protocol Based on Permutations","authors":"Shcherba Anatoly, Faure Emil, Lavdanska Olha","doi":"10.1109/ATIT50783.2020.9349343","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349343","url":null,"abstract":"The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信