2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)最新文献

筛选
英文 中文
Eight Bit Full Adder Design Using Fifteen Transistors With Novel Five Transistors XNOR Gate 采用15个晶体管的8位全加法器设计,采用新颖的5个晶体管XNOR门
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080002
P. Sritha, P. Geethamani
{"title":"Eight Bit Full Adder Design Using Fifteen Transistors With Novel Five Transistors XNOR Gate","authors":"P. Sritha, P. Geethamani","doi":"10.1109/ICACCE46606.2019.9080002","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080002","url":null,"abstract":"Here, a new hybrid 8-bit full adder configuration utilizing both correlative metal-oxide-semiconductor (CMOS) reason and transmission gate judgment is described. The plan was first executed for 1 bit and after that stretched out for 32 bit likewise yet in this paper, the structure was actualized for 8-bit. The circuit was executed utilizing Cadence Virtuoso tools in 45-nm technology at 1.2-V and 1.8-V. Execution parameters for example power, delay, and transistor count up of the full adder contrasted and the officially existing paper. For 1.2-V supply at 45-nm technology, the normal power utilization 31.523nW was observed to be amazingly low with low defer 9.995ns resultant as of the predetermined inclusion of very frail CMOS inverters combined with well-built transmission gates designed for 1-bit. The plan was additionally stretched out for actualizing 8-bit full adder at 1.2-V (1.8-V) along with experimental towards only 241.0nW (556.1nW) power and −1.747ps (9.217ps) delay at 45-nm technology. Proposed full adder has been contrasted and the previously detailed circuits and the power utilization indicate better outcomes by enhancing XNOR gate.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security threats in industrial control systems and protection 工业控制系统中的网络安全威胁及防护
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079981
Mounesh Marali, S. Sudarsan, Ashok Gogioneni
{"title":"Cyber security threats in industrial control systems and protection","authors":"Mounesh Marali, S. Sudarsan, Ashok Gogioneni","doi":"10.1109/ICACCE46606.2019.9079981","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079981","url":null,"abstract":"Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimation of maximum range for underwater optical communication using PIN and avalanche photodetectors 利用PIN和雪崩光电探测器估算水下光通信的最大距离
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079984
M. Das, P. Arjun, A. Bhaskaran, P. S. Aravind, T. Aswin, Viswas Sadasivan
{"title":"Estimation of maximum range for underwater optical communication using PIN and avalanche photodetectors","authors":"M. Das, P. Arjun, A. Bhaskaran, P. S. Aravind, T. Aswin, Viswas Sadasivan","doi":"10.1109/ICACCE46606.2019.9079984","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079984","url":null,"abstract":"This paper presents an estimate of underwater optical communication (UWOC) range, using PIN and avalanche photodetectors (APDs). In this simulation-based study, the maximum range while transmitting high-quality video at 6Mbps speed is estimated as 520m in Pure Sea water, 65m in Clear Ocean and 44m in Coastal waters, when using a 100mW laser and APD. The channel here is modeled to include the effect of attenuation and noise. This work quantifies the benefits of using an adaptive system where the wavelength (blue, blue-green and green) of transmission and modulation scheme is changed based on water transmission. Wavelength adaptation according to varying water transmission was found to provide 16 to 40dB advantage in SNR, compared to a system with fixed wavelength, in different waters. A recommendation for wavelength adaptable transmitter design is made based on this. This study assumes the current state of the art in commercially available components.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Symbol Error Rate Performance of Hybrid DF/AF Relaying Protocol Using Particle Swarm Optimization Based Power Allocation 基于粒子群算法的混合DF/AF中继协议误码率性能研究
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079970
K. Ali, P. Sampath, C. Poongodi
{"title":"Symbol Error Rate Performance of Hybrid DF/AF Relaying Protocol Using Particle Swarm Optimization Based Power Allocation","authors":"K. Ali, P. Sampath, C. Poongodi","doi":"10.1109/ICACCE46606.2019.9079970","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079970","url":null,"abstract":"Cooperative communications technique receive a lot of interest, to combat frequency selectivity fading of wireless channels. Cooperative protocols are used to increase the total capacity, Signal to Noise Ratio (SNR) and reduced the Symbol Error Rate (SER) in wireless communication systems. The performance of Particle Swarm Optimization (PSO) based Power Allocation (PA) for Proposed Hybrid Decode and Forward (DF)/Amplify and Forward (AF) Relaying Protocol using Maximal Ratio Combining (MRC) technique with Mary-Phase Shift Keying (M-PSK) Modulation over Rayleigh fading and Rician fading is presented in this paper. The results are compared with exiting AF and DF relaying protocols. Hybrid DF/AF Relaying Protocol achieves reduced SER compared to the existing AF and DF relaying protocol.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing USB ports of real-time Cyber Physical Systems 保护实时网络物理系统的USB端口
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079997
P. Bhargavi, Alan Joy, T. Sukumara, U. Eranna
{"title":"Securing USB ports of real-time Cyber Physical Systems","authors":"P. Bhargavi, Alan Joy, T. Sukumara, U. Eranna","doi":"10.1109/ICACCE46606.2019.9079997","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079997","url":null,"abstract":"With the advent of VLSI, complex circuits can be implemented on a small single chip leading to the development of embedded devices that perform dedicated functions most commonly deployed as Cyber Physical System (CPS) today. Security of real-time cyber physical systems is of great concern these days as attacking a single device in a network may cause all the devices in the network to be affected and the result of attack may be severe as these devices may need to respond in real time. Most of the CPS are built with USB ports which are extensively used for connectivity. It is possible for a proximate attacker to exploit the vulnerabilities in the devices through USB ports. Since merely powering-on a system and connecting a USB device provides it with access to kernel, the security of the device is at stake. For the real time cyber physical systems providing critical functionality, even a typical reboot may be of concern depending on its functionality. Hence these devices are to be thoroughly tested against any vulnerabilities and necessary measures are taken at initial stages of development. This paper covers experiences with fuzzing implemented using both Facedancer21 and umap tool and exploiting the driver vulnerability with invalid endpoint number using Facedancer21. The drivers that are vulnerable were disabled in the target host and the experiment was repeated and the target was found to be resistant to the attacks as the drivers responsible for the system crash were not loading during the enumeration process, thus securing the USB ports.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economic Analysis of Bi-Directional Net-meters with Orientation and Positioning of Solar Module 太阳能组件定向定位双向网表的经济分析
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079961
R. Nagananthini, G. Nithya, S. Bhuvanesh
{"title":"Economic Analysis of Bi-Directional Net-meters with Orientation and Positioning of Solar Module","authors":"R. Nagananthini, G. Nithya, S. Bhuvanesh","doi":"10.1109/ICACCE46606.2019.9079961","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079961","url":null,"abstract":"In this paper, the methodologies and worldwide impact of the net meter are discussed with the points to be considered in positioning the solar panel for maximizing the self-consumption. In addition, the net metering policies associated with its financial factors are discussed. The depletion of fossil fuels drags the world to the paramount use of available renewable energy sources for power production in small and medium scales. In this, the power production using solar energy is playing a vital role as it is safe and pollution free. The solar PV system has made a good impact in different countries and it's fast-paced in the last two decades because of the increase in demand for electric power. Apart from the utility service to generate power by Solar PV power plants in large scale, this idea has been an attraction to the peoples and results in implementing the Solar PV in their building roofs to generate their own power in small scale. The rooftop solar PV systems made the consumers to support their residential load during the power failure, consuming less power from the grid and in advance, it can feed the excess power to the grid. By delivering the power to the grid the consumer becomes prosumer and experience economic return equal to the power delivered to the grid. Bidirectional net energy meters are useful for the consumers to keep in track of the amount of power that is transmitted to the grid (Solar power generated in excess) and received by the consumer (power received from the utility center). The main outcome of this net metering from the consumer side is the reduced total tariff when they fed the excess power to the grid.-Researches are being developed in the area of minimizing the losses, and maximum consumption with low cost affordable to build Zero Energy Buildings. In some parts of the USA, the government has come forward for free installation of the rooftop solar PV system in their people's house as awareness and receiving their excess power at a considerable rate. Without this Net metering technology, the utility cannot consume power from the consumer.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Energy-Efficient Routing Protocols with QoS Assurances for Wireless Sensor Networks 无线传感器网络中具有QoS保证的高能效路由协议研究
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080007
N. Kanthimathi, N. Saranya, V. Baranidharan
{"title":"A Survey on Energy-Efficient Routing Protocols with QoS Assurances for Wireless Sensor Networks","authors":"N. Kanthimathi, N. Saranya, V. Baranidharan","doi":"10.1109/ICACCE46606.2019.9080007","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080007","url":null,"abstract":"Wireless sensor networks consist of huge nodes with sensing, computing and communication capabilities. The unique quality of a routing protocol is known by its minimized energy consumption, improved QoS which also prolongs the network life time. In this paper the routing protocols are recorded into three primary categories, route discovery model, network model and data delivery model. The routing protocols that fall in the first category can be named as proactive, reactive and hybrid. The routing protocols that fall under a the subsequent category are grouped as flat, hierarchical and location based. The routing protocols belonging to the third category can be parallely classified into two categories as transceiver protocol model and accuracy protocol model. Further transceiver protocol model has sub categories like negotiation, coherent based, query based. Sub categories of accuracy protocol model are QoS based protocol and multipath based protocol. The paper also plays up the merits and performance comparison of each routing technique.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Study of Medical Image Analysis 医学图像分析的综合研究
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079996
Gitanjali Ganpatrao Nikam, Shuchi Singh, Priya Singh, Radhika Sarraf
{"title":"A Comprehensive Study of Medical Image Analysis","authors":"Gitanjali Ganpatrao Nikam, Shuchi Singh, Priya Singh, Radhika Sarraf","doi":"10.1109/ICACCE46606.2019.9079996","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079996","url":null,"abstract":"Modern medicine has become reliant on medical imaging. The application of computer has proved to be an emerging technique in medical imaging and medical image analysis. Each level of analysis requires an effective algorithm as well as methods in order to generate an accurate and reliable result. Different modalities, such as X-Ray, Magnetic resonance imaging (MRI), Ultrasound, Computed tomography (CT), etc. are used for both diagnoses as well as therapeutic purposes in which it provides as much information about the patient as possible. Medical image processing includes image fusion, matching or warping which is the task of image registration. Medical image analysis includes Image enhancement, segmentation, quantification, registration, which is the most predominant ways to analyze the image. There are various difficulties in medical image processing and subsequent stages like image enhancement and its restoration; segmentation of features; registration and fusion of multimodality images; classification of medical images; image features measurement and analysis and assessment of measurement and development of integrated medical imaging systems for the medical field. In this paper, the techniques used in medical image analysis have been reviewed and discussed extensively. The vital goal of this review is to identify the current state of the art of medical image analysis methods as a reference paradigm in order to accelerate the performance of existing methods.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Retrieval using HDFS with LZO Compression 基于LZO压缩的HDFS大数据检索
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079993
T. Prasanth, K. Aarthi, M. Gunasekaran
{"title":"Big Data Retrieval using HDFS with LZO Compression","authors":"T. Prasanth, K. Aarthi, M. Gunasekaran","doi":"10.1109/ICACCE46606.2019.9079993","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079993","url":null,"abstract":"Any type of organization depends on accurate data analytics to make better decisions. Users of these organizations request access from different resources like processes or executors. When processing this request of users, the data retrieval speed is low and also data is inaccurate for some conditions. To solve this issue, a system may be proposed having Hadoop Distributed File system (HDFS) with Lempel-Ziv-Oberhumer(LZO). The first step in the proposed technique is to retrieve and mine the data from respective database. The next step is to cluster the extracted data and optimize it using HDFS and LZO compression method. In the last step, if the compressed data is found similar to user requested data, the final data has to be visualized to the user. The proposed retrieving process in big data gives better performance and reduced execution time.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Minutiae Matching Algorithm for Fingerprint Recognition 指纹识别的高效细节匹配算法
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079971
K. Nirmalakumari, H. Rajaguru, P. Rajkumar
{"title":"Efficient Minutiae Matching Algorithm for Fingerprint Recognition","authors":"K. Nirmalakumari, H. Rajaguru, P. Rajkumar","doi":"10.1109/ICACCE46606.2019.9079971","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079971","url":null,"abstract":"Recognition of human fingerprint verifies the match among two fingerprints in an automatic way and it is applied in various fields. The fingerprints are unique and its pattern will remain the same for the lifetime. The minutiae points represent the features of fingerprint that aids in the authentication of fingerprints. The main aim of this paper is to improve a scheme for verification of fingerprint by means of feature extraction and matching techniques. The initial step is preprocessing that involves image enhancement and binarization processes for the poor quality input fingerprint images. The fingerprint verification involves two main steps namely minutiae extraction and minutiae matching. The false minutiae points are to be removed and only efficient minutiae points are to be considered for further process. In this work, two publically available fingerprint datasets are utilized and the accuracy of fingerprint recognition is evaluated using the performance measures namely False Matching Ratio (FMR), False Non Matching Ratio (FNMR) and Threshold. From the results, it is clear that our work provides better results in fingerprint recognition.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114413520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信