2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)最新文献

筛选
英文 中文
Robust Artificial Bee Colony Optimization Based Classifier for Prediction of Autism Spectrum Disorder 基于鲁棒人工蜂群优化的分类器预测自闭症谱系障碍
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753510
S. Malathi, D. Kannan
{"title":"Robust Artificial Bee Colony Optimization Based Classifier for Prediction of Autism Spectrum Disorder","authors":"S. Malathi, D. Kannan","doi":"10.1109/ICACTA54488.2022.9753510","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753510","url":null,"abstract":"Autism Spectrum Disorder (ASD) is a significant type of neurological disorder that affects the ability of person's to connect socially and communicate with others. Repetitive and limited patterns of conduct are also a part of ASD. The expenses of autism can spike while a diagnosis is being sought and when therapies are being delivered, but many of these expenditures are ongoing and will stay with a person for the rest of their lives. In order to get better outcomes, machine learning and optimization have extended across a wide variety of professions and specialties. In this paper, an optimization-based classification algorithm namely Robust Artificial Bee Colony Optimization based Classifier (RABCOC) is proposed for precise detection of ASD. RABCOC performs optimization before classification is done. For performing classification, this research work makes use of enhanced decision tree based gradient boosting method. RABCOC is evaluated with three different ASD screening dataset with the metrics Accuracy and F - Measure. Results achieved by RABCOC are compared with existing classifiers and it is found that RABCOC has better performance than existing classifiers towards prediction of ASD.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Implementation of MIMO and OFDM Based Visible Light Communication System for Indoor Environment 基于MIMO和OFDM的室内可见光通信系统的实现
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752992
K. M, S. K, P. D
{"title":"An Implementation of MIMO and OFDM Based Visible Light Communication System for Indoor Environment","authors":"K. M, S. K, P. D","doi":"10.1109/ICACTA54488.2022.9752992","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752992","url":null,"abstract":"MIMO systems that use multiple LED light sources and photo detectors are attractive for visible communication lights proportion to their acquired capacitive and the number of parallel single input single output channel. The MIMO VLC system overcomes the capacity limitations caused by the limited LED modulate bandwidth by using the high SNR of the SISO channel provided according to general lighting requirements. This paper compares Enhanced Optical OFDM (EOOFDM), that's uses as an excessive-bandwidth performance approach, with 3 famous OFDM (Orthogonal Frequency Division Multiplexing) methods. The proposed mechanism would increase the information switch price through 1/8 instances as compared to different traditional structures, while preserving the identical information level with the ideal approach, the simulation outcomes display that the Eb/No of the proposed machine has expanded through as a minimum 0.65dB. With the ensuing outcomes, EO-OFDM can offer better information cost while OFDM above the channels with confined frequency bands. The simulation outcomes display that this approach can extensively minimize PAPR. At the same time, beneath the LED's non-linear restriction and confined aggressive range, the general achievement of this results is higher above the different competing solutions","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Adaptive Priority Based IoT Communication in Wireless Network 基于自适应优先级的无线网络物联网通信设计
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753550
R. Prabha, Senthil G. A, N. N. Saranya, A. M, K. Somasundaram, K. C
{"title":"Design of Adaptive Priority Based IoT Communication in Wireless Network","authors":"R. Prabha, Senthil G. A, N. N. Saranya, A. M, K. Somasundaram, K. C","doi":"10.1109/ICACTA54488.2022.9753550","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753550","url":null,"abstract":"Heterogeneous wireless networks of the future must be able to satisfy ever increasing demands while also making the best use of available resources. Relaying IoT contact has emerged as a novel promising approach for improving coverage, lowering power consumption, and reducing the possibility of outages. Enabling cooperation among nodes significantly increases throughput in a multi-hop heterogeneous wireless system to provide optimal IoT communication. In recent IoT communication developments, relay selection has a significant impact on network performance. IoT communication, particularly in surveillance-based wireless networks, has a number of advantages over traditional direct communication, and relay selection is widely regarded as a smart way to increase capacity efficiency. The observation of numerous relying approaches prompted the creation of a better way to solve the imprecise nature of wireless networks by using adaptive priority-based relay selection decisions. In this work, a multi-hop terminal scenario, IoT communication to develop an efficient method for selecting a better relay in each IoT device, as well as to investigate the various user options for relay selection parameters. The results is experiments using NS2 (Network simulator) and implementation of Throughput, Packet Delivery Ratio (PDR) and End-to-End Delay performance are tested.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Child Safety Monitor in Cars Using Machine Learning 使用机器学习的汽车儿童安全监视器
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752789
A. M, S. M, Vallimaharajan G, Udhayanan C
{"title":"Child Safety Monitor in Cars Using Machine Learning","authors":"A. M, S. M, Vallimaharajan G, Udhayanan C","doi":"10.1109/ICACTA54488.2022.9752789","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752789","url":null,"abstract":"This Child Safety Monitoring System transmits a warning to the parent or guardian if a child is left inadvertently in the car. The deaths related to children left in cars recur even though many systems thus far exist. This developed system aims at making a move in preventing these accidents. This system can classify images in real-time using Machine Learning, which consists of an Arduino Pro Mini board equipped with an IR Proximity Sensor to detect whether the car doors are closed or not. An own, unique dataset has been developed with eight individual children. The Haar-like feature algorithm is chosen to detect individual faces, which uses Haar features and Integral Images and helps at the stage of feature extraction. The Local Binary Pattern Histogram has been utilized for facial recognition. The suggested study shows that the LBPH algorithm is a more popular and accurate face recognition algorithm when compared to the Eigenfaces and Fisherfaces algorithm. This LBPH algorithm treats the result as a binary number and visualizes the final result as histograms. The detected child face is sent to the parent or guardian through e-mail only in case of the doors and windows being closed. The results imply that the LBPH algorithm approach generates promising performances for the task of detecting child-like objects, with the highest accuracy of 93.4% and an average accuracy of 89.27%.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Medical Healthcare System with Hybrid Block based Predictive models for Quality preserving in Medical Images using Machine Learning Techniques 使用机器学习技术在医学图像中保持质量的基于混合块预测模型的医疗保健系统
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753355
M. Aruna, V. Arulkumar, M. Deepa, G. Latha
{"title":"Medical Healthcare System with Hybrid Block based Predictive models for Quality preserving in Medical Images using Machine Learning Techniques","authors":"M. Aruna, V. Arulkumar, M. Deepa, G. Latha","doi":"10.1109/ICACTA54488.2022.9753355","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753355","url":null,"abstract":"Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of a load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the other hand, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, the military, and the healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance Medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and Enhanced Key Aggregate Cryptosystem is a protected data protection method that provides highly effective security in the health care industry. This approach handles disagreements in the outflow of sensitive information and guarantees the data security deployment of a Cloud-based Intelligent Health Monitoring system for the parties involved in the dispute. Using the suggested method, the encrypted data format of medical and health-care prescriptions is recorded as it passes through the hands of patients and healthcare institutions. To increase the level of security, the double encryption method is used. During the encryption process, the Ciphertext ID is referred to as a class. The keyholder is a master secret key that aids in the retrieval of the secret keys of different kinds of monsters and creatures. The extracted key is transmitted and kept as a single aggregate for the benefit of the patient or client to facilitate decryption. Between the use of a key aggregation cryptosystem and double encryption method, the Cloud-based Intelligent Health Monitoring systems may establish a secure link with Healthcare Organizations and patients. As a result, when compared to prior methods, the results demonstrate that the study methodology achieves high levels of security in terms of confidentiality and integrity, as well as great scalability.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment 增强移动雾计算环境下的安全互认证
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753559
D. D, J. R
{"title":"Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment","authors":"D. D, J. R","doi":"10.1109/ICACTA54488.2022.9753559","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753559","url":null,"abstract":"Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Reality Based Escape Room 基于虚拟现实的密室逃生
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753531
V. Kiruthika, M. Jagadeeswari, C.Sneha Prabha, V. Vaishnavi, H. Sreejaa
{"title":"Virtual Reality Based Escape Room","authors":"V. Kiruthika, M. Jagadeeswari, C.Sneha Prabha, V. Vaishnavi, H. Sreejaa","doi":"10.1109/ICACTA54488.2022.9753531","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753531","url":null,"abstract":"Escape rooms have become highly popular over the last few years which builds one's creativity by making puzzles or clues where the person can find the clues and reach a certain destination. The purpose of the escape room is to improve creative thinking and it also seems to be interesting for the users. Escape rooms can be designed in various interesting worlds in the field of gaming. The users can find the clues by navigating and solving riddles or puzzles that will unlock the doors and finally escape from the environment. These escape rooms use in virtual reality technology where the user can feel the real-time experience as he/she is there inside the environment. The user can also interact with the environment by picking objects, finding the clues, navigation, etc which provides real-time hands-on experience. Escape rooms can be designed as per the choice of the owner who creates the environment. The primary thing required for an escape room is a simple room and as per the assets used, it can be designed at a lower cost. If some changes/advancement is to be done inside the environment, the owner can directly change inside the project in unity software instead of completely changing the environment. The VR simulations can be viewed through many headsets namely HTC Vive, Oculus Rift, Oculus Quest, Google cardboard, etc. The Virtual Reality escape rooms can be created through various engines but this developed escape room is created using a unity engine. This VR escape room is designed for Oculus Quest 2 and it can be viewed through this VR headset.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowd Exemption Notifier 人群豁免通知
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752887
A. K, P. G, B. Priya
{"title":"Crowd Exemption Notifier","authors":"A. K, P. G, B. Priya","doi":"10.1109/ICACTA54488.2022.9752887","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752887","url":null,"abstract":"Crowd management is a challenging problem in the pandemic situation to ensure public safety. To overcome the difficulties, many technologies have been incorporated to cope up with the problems. However, the effectiveness of these techniques is limited due to the density of the crowd changing from low to extremely high depending on the time. We propose a robust feature-based approach to deal with the problem of crowd management for people's security. We have evaluated our method using a dataset and have performed a detailed analysis. The crowd is monitored through a surveillance camera and the image is recognized frame by frame using OpenCV and the recognized frame is processed through the YoloV4 and COCO dataset to get the human identification count. When the crowd exceeds the allocated limit “Crowd Exemption Notifier” intimates the organizer. This mechanism could help the common people and the government to withstand the widespread viral disease.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132570335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Speech Recognition for Tulu Language Using Gmm-Hmm and DNN-HMM Techniques 基于Gmm-Hmm和DNN-HMM技术的土鲁语语音自动识别
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753319
Amoolya G, Arnold Sachith A Hans, V. R. Lakkavalli, Senthil Kumar Swami Durai
{"title":"Automatic Speech Recognition for Tulu Language Using Gmm-Hmm and DNN-HMM Techniques","authors":"Amoolya G, Arnold Sachith A Hans, V. R. Lakkavalli, Senthil Kumar Swami Durai","doi":"10.1109/ICACTA54488.2022.9753319","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753319","url":null,"abstract":"In this work a first Automatic Speech Recognition (ASR) for Tulu language is developed. Seven hours of speech database for Tulu is recorded from native speakers in natural conditions for read speech. Kaldi toolkit is employed to develop GMM-HMM and DNN-HMM based ASR systems. Different speech units are employed to build the system and a detailed set of experiments is carried out on the collected dataset. It was observed that because of the lesser data, monophone GMM-HMM models provide better word error rate (WER) when compared to triphone models. More data is required for the system to reach to better performance with triphones.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on IoT based Farm Freshness Mobile Application 基于物联网的农场新鲜度移动应用调查
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752796
B. Swathi, P. T, P. S, Shankar Y, G. V.
{"title":"Survey on IoT based Farm Freshness Mobile Application","authors":"B. Swathi, P. T, P. S, Shankar Y, G. V.","doi":"10.1109/ICACTA54488.2022.9752796","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752796","url":null,"abstract":"Food safety and hygiene are major concerns when it comes to preventing food waste. In India's major markets the fruits and vegetables are getting wasted due to temperature and humidity fluctuations. The quality of the food (fruits and vegetables) should be examined, and they should be guarded from rotting and decaying due to atmospheric aspects like temperatures, moisture, and shade, which help farmers conserve the food (fruits and vegetables) while in transit. An Android application based on the Internet of Things will be built in this article to monitor environmental elements such as heat, moisture, alcohol percentage, and light exposed. The Arduino UNO, a well-known popular tooling board, is at the heart of this device. Different sensors are interfaced to the Microcontroller board such as the DHT11, MQ3, LDR, $16times 2$ LCD, ESP8266 Wi-Fi, and Image sensor, which are all connected to an Android app where the user is notified with real-time data that defines the food quality. ML will be used to analyze the image captured by the app and predict the condition of the food. The app includes a chatbot that provides information on food quality. The app will suggest nearby organic stores based on the user's location. The app will also support Multilanguage's like English, Telugu, Tamil, Kannada and Hindi which will help the farmers, stakeholders to understand in their local language.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信