2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)最新文献

筛选
英文 中文
Computer based characterisation of Pteropus vampyrus endogenous betaretrovirus (PvEB) from bat genome project database 蝙蝠基因组计划数据库中吸血狐猴内源性β逆转录病毒(PvEB)的计算机特征分析
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010200
N. F. A. Razlan, R. Kambol
{"title":"Computer based characterisation of Pteropus vampyrus endogenous betaretrovirus (PvEB) from bat genome project database","authors":"N. F. A. Razlan, R. Kambol","doi":"10.1109/ISCAIE.2014.7010200","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010200","url":null,"abstract":"Retroviruses have been associated with numerous chronic diseases such as leukemias and immunodeficiencies which harbored by diverse host range of animals. Recently, one member of bat endogenous retrovirus has been reported as the basal of gammaretrovirus. Later, a study discovered that betaretrovirus also present in diverse micro and megabats. From these recent studies, we gain our interest to further analyze one of the discoveries of betaretrovirus in Pteropus vampyrus in which we called it as Pteropus vampyrus endogenous betaretrovirus (PvEB). The size of nucleotide sequence is 8.7kb which was obtained during screening and characterization of bat genome from large flying fox (Pteropus vampyrus) database genome project. It has a typical genomic organization of a retrovirus possessing all the major conserved motifs and LTR flanking the viral genes:5'-LTR-gag-dUTPase-pol-env-LTR-3'plus the presence of dUTPase which is common in al l betaretrovirus. Therefore, this discovery strengthens the current studies which extend the endogenous retrovirus from bats into betaretrovirus group.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129108210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comprehensive analysis of improving QoS and IMM traffic of high speed wireless campus network 提高高速无线校园网QoS和IMM流量的综合分析
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010201
J. S. Yalli, S. A. Latif, M. H. Masud, M. K. Alam, A. Abdallah
{"title":"A comprehensive analysis of improving QoS and IMM traffic of high speed wireless campus network","authors":"J. S. Yalli, S. A. Latif, M. H. Masud, M. K. Alam, A. Abdallah","doi":"10.1109/ISCAIE.2014.7010201","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010201","url":null,"abstract":"Interactive Multimedia (IMM) applications such as voice and video conferencing are very important in our learning environment. They offer useful services that benefit its users but these services suffers performance degradation from today's high speed Wireless Local Area Network (WLAN). However, guaranteed Quality of Service (QoS) remains the bottleneck in the network which becomes a great challenge in attempting to improve its performance. This work reviewed many approaches and considers mapping QoS class parameters such as Quality of Service Class Identifier (QCI), Maximum Bit Rate (MBR) and Allocation and Retention Priority (ARP) to the upstream and downstream data flowing in the network as an attempt to improve its performance. Priority is then given to the QoS bearer packets by associating Differentiated Services Code Point (DSCP). A comprehensive analysis of QoS in different protocols in wireless networks has been studied. Open issues and research directions have been addressed with a proposed mechanism to enhance the QoS of the wireless network.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a MOS estimation model for G.729 using listening-opinion tests with Thai speech referring to packet loss effects 基于丢包效应的泰语听力意见测试,开发了G.729的MOS估计模型
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010204
Pongpisit Wuttidittachotti, Phisit Khaoduang, Therdpong Daengsi
{"title":"Development of a MOS estimation model for G.729 using listening-opinion tests with Thai speech referring to packet loss effects","authors":"Pongpisit Wuttidittachotti, Phisit Khaoduang, Therdpong Daengsi","doi":"10.1109/ISCAIE.2014.7010204","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010204","url":null,"abstract":"This paper presents a proposed mathematical model of VoIP quality estimation from G.729. This model is based on native Thai users. The subjective Mean Opinion Score (MOS) were obtained from listening-opinion tests with a total of 102 subjects that covered five conditions of packet loss effects (0%, 3%, 5%, 10% and 20%). The model was then created using a simple function in Microsoft Excel, before evaluating with the test set data obtained from four test conditions (0%, 4%, 8% and 12%) with 30 subjects. From the evaluated result, it has been found that the Mean Absolute Percent Error (MAPE) of the model is 16.29%. That means this model is accepted as a good model for MOS estimation from G.729 for Thai users, referring to packet loss effects (0-10% =excellent, whereas about 10-20% = good).","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack SQL注入攻击检测模型:一种防止web应用程序遭受SQL注入攻击的方法
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010210
Geogiana Buja, Kamarularifin Bin Abd Jalil, Fakariah Bt Hj Mohd Ali, Teh Faradilla Abdul Rahman
{"title":"Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack","authors":"Geogiana Buja, Kamarularifin Bin Abd Jalil, Fakariah Bt Hj Mohd Ali, Teh Faradilla Abdul Rahman","doi":"10.1109/ISCAIE.2014.7010210","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010210","url":null,"abstract":"Since the past 20 years the uses of web in daily life is increasing and becoming trend now. As the use of the web is increasing, the use of web application is also increasing. Apparently most of the web application exists up to today have some vulnerability that could be exploited by unauthorized person. Some of well-known web application vulnerabilities are Structured Query Language (SQL) Injection, Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). By compromising with these web application vulnerabilities, the system cracker can gain information about the user and lead to the reputation of the respective organization. Usually the developers of web applications did not realize that their web applications have vulnerabilities. They only realize them when there is an attack or manipulation of their code by someone. This is normal as in a web application, there are thousands of lines of code, therefore it is not easy to detect if there are some loopholes. Nowadays as the hacking tools and hacking tutorials are easier to get, lots of new hackers are born. Even though SQL injection is very easy to protect against, there are still large numbers of the system on the internet are vulnerable to this type of attack because there will be a few subtle condition that can go undetected. Therefore, in this paper we propose a detection model for detecting and recognizing the web vulnerability which is; SQL Injection based on the defined and identified criteria. In addition, the proposed detection model will be able to generate a report regarding the vulnerability level of the web application. As the consequence, the proposed detection model should be able to decrease the possibility of the SQL Injection attack that can be launch onto the web application.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Non-standard Malaysian car license plate recognition 非标准马来西亚汽车车牌识别
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010228
H. Y. Chai, H. H. Woon, Liang Kim Meng, Yuen Shang Li
{"title":"Non-standard Malaysian car license plate recognition","authors":"H. Y. Chai, H. H. Woon, Liang Kim Meng, Yuen Shang Li","doi":"10.1109/ISCAIE.2014.7010228","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010228","url":null,"abstract":"Automated car license plate recognition systems are developed and applied for purpose of facilitating the surveillance, law enforcement, access control and intelligent transportation monitoring with least human intervention. The challenging part of this system lies in accurately recognizing a non-standard plate that consists of various character fonts, character sizes, plate size, orientations, plate and character colors, materials, positions of numeric characters and alphabetic characters. The objective of the paper is to present our developed algorithms that cope with these practical variations in the context of non-standard Malaysian plate from image scene acquisition to optical character recognition. In each standard step of license plate recognition, we consider the processing of the plates under various environmental condition and non-standard formation of characters in real scene. The algorithm is tested with 500 Malaysian car plates in real-time and the result shown that the algorithm remains relatively robust under different conditions and car plate standard.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
BareBone cloud IaaS: Revitalization disruptive technology BareBone云IaaS:颠覆性技术的复兴
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1504/IJBIS.2015.066130
Joseph Ng Poh Soon, A. Mahmood, P. Y. Choo, See Wan Wong, K. Y. Phan, E. H. Lim
{"title":"BareBone cloud IaaS: Revitalization disruptive technology","authors":"Joseph Ng Poh Soon, A. Mahmood, P. Y. Choo, See Wan Wong, K. Y. Phan, E. H. Lim","doi":"10.1504/IJBIS.2015.066130","DOIUrl":"https://doi.org/10.1504/IJBIS.2015.066130","url":null,"abstract":"With today's Internet of Hype-Things, technology innovation is no longer a strategic weapon to gain competitiveness or even sustainability at SME. Legacy frameworks are biased towards larger computing during happy day environment. This paper presents a new framework for SME to embrace IaaS with confidence to move up the value chain despite facing volatile economic turbulence. While disruptive BareBone cloud technology maybe inferior to large enterprises, holds potential opportunities to the smaller enterprise where base cost does matter. The use of three instruments (mass survey, interview and focus group) for collecting primary data has ensured consistent information validation. The findings from the directional correlation hypothesis affirm the negative correlation between infancy stage of technology innovation and the measurable organizational values expected by the small enterprise. This contribution can be applied during dilemma decision making stage for migrating into the next cloud computing infrastructure.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
BYOD: Current state and security challenges BYOD:当前的状态和安全挑战
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010235
M. Eslahi, Maryam Var Naseri, H. Hashim, N. Tahir, E. Saad
{"title":"BYOD: Current state and security challenges","authors":"M. Eslahi, Maryam Var Naseri, H. Hashim, N. Tahir, E. Saad","doi":"10.1109/ISCAIE.2014.7010235","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010235","url":null,"abstract":"Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees' satisfaction and reduce an organization's device costs. Mobile devices are not well protected compared to computer and computer networks and users pay less attention to security updates and solutions. As a result, mobile security has become a crucial issue in BYOD as employees use their own mobile devices to access an organization's data and systems. Therefore, in this paper we present an overview of the current state of BYOD security and we discuss some future challenges in this area.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Middleware framework for network virtualization in SHAAL 用于网络虚拟化的SHAAL中间件框架
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010232
Z. Khalid, N. Fisal, Mohd. Rozaini, Hashim Safdar, R. Ullah, W. Maqbool
{"title":"Middleware framework for network virtualization in SHAAL","authors":"Z. Khalid, N. Fisal, Mohd. Rozaini, Hashim Safdar, R. Ullah, W. Maqbool","doi":"10.1109/ISCAIE.2014.7010232","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010232","url":null,"abstract":"Wireless Sensor Network (WSN) has led to a new paradigm of Internet of Things (IoT). WSNs are usually deployed for a particular application. However, the demand of WSNs in Smart Home and Ambient Assisted Living (SHAAL) is the accumulation and allocation of multiple resources providing diverse services and applications. Virtualization of a sensor network is an emerging technique that permits aggregation of several independent heterogeneous sensor networks. The technique of virtualization poses overhead challenges like more processing and power consumption. In this paper efforts have been put forward by proposing an energy aware middleware framework that resides on the sensor nodes to achieve network virtualization for SHAAL.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Electrical properties of tetrapod zinc oxide thin films deposited by thermal-CVD method 热cvd法沉积四足氧化锌薄膜的电学性能
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010218
N. Azhar, S. S. Shariffudin, I. H. Affendi, S. H. Herman, M. Rusop
{"title":"Electrical properties of tetrapod zinc oxide thin films deposited by thermal-CVD method","authors":"N. Azhar, S. S. Shariffudin, I. H. Affendi, S. H. Herman, M. Rusop","doi":"10.1109/ISCAIE.2014.7010218","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010218","url":null,"abstract":"Zinc oxide (ZnO) thin films were deposited by thermal chemical vapor deposition (TCVD) method. Gold (Au) metal was used as a catalyst to improve the growth of tetrapod ZnO structures. In this study, the substrates were deposited at 750°C to 800°C to study the temperature effect of tetrapod ZnO thin films. The surface morphology of ZnO thin films were characterized using field emission scanning electron microscope (FE-SEM). Energy dispersive X-ray (EDX) was analyzed to identify element composition of ZnO thin films. It exhibits the EDX spectrum was successful grown product which contains Zn and O only. The electrical properties were measured using 2-point probe I-V measurement. From I-V curve, the resistivity of ZnO thin films decreases, the films become more conductive as deposition temperature increased. The optical properties were measured through photoluminescence (PL) with wavelength 325 nm to 900 nm.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of left/right hand movement from EEG signal by intelligent algorithms 基于智能算法的脑电信号左/右手运动分类
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010230
M. Z. Baig, Ehtasham Javed, Y. Ayaz, W. Afzal, S. O. Gillani, Muhammad Naveed, Mohsin Jamil
{"title":"Classification of left/right hand movement from EEG signal by intelligent algorithms","authors":"M. Z. Baig, Ehtasham Javed, Y. Ayaz, W. Afzal, S. O. Gillani, Muhammad Naveed, Mohsin Jamil","doi":"10.1109/ISCAIE.2014.7010230","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010230","url":null,"abstract":"Brain Computer interface (BCI) shown enormous ability to advance the human way of life. Furthermore its application is also targeting the disabled ones. In this research, we have implemented a new approach to classify EEG signals more efficiently. The dataset used for this purpose is from BCI competition-II 2003 named Graz database. Initial processing of the EEG signals has been carried out on 2 electrodes named C3 & C4; after that the bi-orthogonal wavelet coefficients, Welench Power Spectral Density estimates and the average power were used as a feature set for classification. We have given a relative study of currently used classification algorithms along with a new approach for classification i.e. Self-organizing maps (SOM) based neural network technique. It is used to classify the feature vector obtain from the EEG dataset, into their corresponding classes belong to left/right hand movements. Algorithms have been implemented on both unprocessed features and processed reduced feature sets. Principal component Analysis (PCA) has been used for feature reduction. Measured data revealed that the maximum classification accuracy of 84.17% on PCA implemented reduce feature set has been achieved using SOM based classifier. Furthermore, the classification accuracy has been increased about 2% by simply using bi-orthogonal Wavelet transform rather than Daubechies wavelet transform.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信