2020 2nd Annual International Conference on Information and Sciences (AiCIS)最新文献

筛选
英文 中文
Design and Implementation an Open Source Web Based Clearance System for Iraqi Educational Institutions 为伊拉克教育机构设计和实现一个开源的基于Web的清查系统
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00026
Rebaz N. Ramadhan, Kamaran H. Manguri, Balen H. Manguri
{"title":"Design and Implementation an Open Source Web Based Clearance System for Iraqi Educational Institutions","authors":"Rebaz N. Ramadhan, Kamaran H. Manguri, Balen H. Manguri","doi":"10.1109/AiCIS51645.2020.00026","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00026","url":null,"abstract":"Clearance is a mandatory process in almost every university. Either graduated or undergraduate students must undertake the procedure to grant the permission to participate in the final exams. In addition to this, students need stamped clearance paper to receive their final exam results. Over the last decades, clearance has been carried out manually. With the manual clearance system, students endure a long and exhausting process of signatures and stamps. In the Iraqi educational system, the process involves visiting many departments including library, registrar, accounting, accommodation, laboratory, storage, sport and artistic activity departments, and the dean's office; only to have the clearance certified. The aim of this project is to propose an open source clearance system. In simple words, the proposed system will have several advantages over the old system for instance time and effort, cost, speed, and data safety. Languages such as HTML, CSS, and JavaScript are used to design and implement the front-end side. On the other hand, its back-end is created by the help of PHP scripts and MySQL for the database. Generally, the system has four equally important major tasks to be fulfilled in order to have the clearance. The tasks are registration, unit administrator (to confirm a clearance status as Cleared/Not Cleared), Exam committee (to check whether student's clearance status), and finally, a system administrator (to manage the entire system). Furthermore, system admin can add or remove any unit administrator or any student to/from the system. This proposed system is available online and can be found at the following link: shorturl.at/hvwNY","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133884072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time Pose Estimation for Human-Robot Interaction 人机交互的实时姿态估计
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00023
Saad D. Al-Sheekh, Majid Dherar Younus
{"title":"Real-Time Pose Estimation for Human-Robot Interaction","authors":"Saad D. Al-Sheekh, Majid Dherar Younus","doi":"10.1109/AiCIS51645.2020.00023","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00023","url":null,"abstract":"Text-based communication is one of the most popular categories used. Emails, SMS messages while the voice call is better than text. it connects several remote people at once and it is more personal and easier than text. currently, the video call is the best method for communication between people. After transmitting of text, voice, and video successfully the next step is motion transmission. Motion-based communication requires detection of human motion in the sending site and motivation of robot's servo motors in the receiving site. The most important step in motion-based communication is the detection of human pose in real-time and good accuracy because this detection will be driven to a servo motor. If there is some wrong in detection, it will be dangerous because the robot may be damage itself or the motion may be harmful. In this paper, we propose a realtime method for motion transmission by using deep neural networks (DNN) for the detection of human body joints, Then convert the obtained results into commands suitable to work in robot environment. And implement the results on robot so that the human motion corresponds to that of the robot in real-time.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116098534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of business intelligence techniques in enhancing requirements of knowledge management: An applied analytical study of the teachers' opinions of the Northern Technical University and some of its formations 商业智能技术在提高知识管理需求中的作用:对北方工业大学及部分院校教师意见的应用分析研究
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00039
Ibrahim. M. Jassim, Amer. S. Abd
{"title":"The role of business intelligence techniques in enhancing requirements of knowledge management: An applied analytical study of the teachers' opinions of the Northern Technical University and some of its formations","authors":"Ibrahim. M. Jassim, Amer. S. Abd","doi":"10.1109/AiCIS51645.2020.00039","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00039","url":null,"abstract":"The study aims at defining the concept of business intelligence and its technologies, its role for enhancing requirements of knowledge management. The study included two basic variables, the first (the independent variable), business intelligence technologies, and it included three sub-dimensions: (ETL technology, OLAP technology, DM technology). As for the second major variable (the adopted variable), it is the requirements of knowledge management, and it has three sub-dimensions which are (providing the necessary infrastructure represented by technology, providing the necessary human resources, organizational leadership). The study population consisted of lecturers at Northern Technical University and some of its formations. A simple random sample was selected, where (65) questionnaires were distributed, (58) questionnaires were retrieved. The study was based on the analytical descriptive approach using the statistical software package (SPSS, V24). In light of this, the following question was determined to be the limits of the study problem as follows: (What is the role of business intelligence techniques in enhancing requirements of knowledge management?). A hypothetical scheme has been developed that shows the nature of the relationship between the two dimensions with their variables. It was clarified by a set of hypotheses, the study reached a set of conclusions, the most important of which are: 1. Verify the existence of a correlation found between business intelligence techniques and requirements of knowledge management. 2- Achieve a significant impact of business intelligence techniques and requirements of knowledge management. The study concludes with a set of recommendations necessary for the organizations concerned with the study, perhaps the most important of them, the need for paying attention to the application of business intelligence techniques for the purpose of enhancing requirements of knowledge management in business organizations, as well as providing a set of proposals for areas of future studies related to the variables of the current study.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Phases Strategy Of Electronic Management Application “A Proposed Model” 电子管理应用的三阶段策略“一种建议模式”
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00033
Younis Mohammad Kh. Al-Sabaawe, Wesam ali Husien, A. Hammadi
{"title":"Three Phases Strategy Of Electronic Management Application “A Proposed Model”","authors":"Younis Mohammad Kh. Al-Sabaawe, Wesam ali Husien, A. Hammadi","doi":"10.1109/AiCIS51645.2020.00033","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00033","url":null,"abstract":"This study aims at conducting for a theoretical review of management connotations of electronic management applications for the sake of coming out with a proposed model. The proposed model is suggesting an electronic management application and adaptation through three-sage (phase) strategy that includes three stages (phases). These stages are: first, the right preparation and establishment for the electronic mechanisms, equipment and tools required in applying the electronic management within a suitable framework and ground for the basic requirements to create an appropriate environment for the dissemination and application of electronic management culture. Secondly, the development of the main elements which assist in activating the electronic system network as a harmonic system. Then testing and implementing these element. Thirdly, clarifying and presenting the basic requirements which are necessary in supporting the successful application of electronic management within the framework of supporting both internal and external environments. Additionally, the basic requirements and the global processes which lead to the expected results that are required to be achieved at each stage are clarified. The purpose for such clarification is to shed light upon the progress from one stage into another to provide a sequential comprehensive model for an integrated strategic vision explaining the stages of electronic management application","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Radio over Fiber Transmission over Polarized Conversion Light Using SOA 利用SOA优化偏振转换光的光纤无线传输
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00022
Ismael Shanan Desher
{"title":"Optimization of Radio over Fiber Transmission over Polarized Conversion Light Using SOA","authors":"Ismael Shanan Desher","doi":"10.1109/AiCIS51645.2020.00022","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00022","url":null,"abstract":"This paper investigates an optimization of the quality factor (Q) performance in terms of the input optical power signal of the system and the electrical injection current in the semiconductor optical amplifiers (SOAs). Two different binary phase shift keying (BPSK) formats at 10 Gbps data rate are modulated at a radio frequency (RF) of 10 GHz. The RF signals are externally modulated via two Mach-Zehnder modulators (MZMs) at a wavelength of 1440 nm horizontal and vertical polarized light. Then, a wavelength conversion utilizing two SOAs converts the RoF signals from 1440 nm to 1550 nm. The variations in Q factor, BER and eye opening with respect to the SOA current, bit rate and fiber length using Optisystem 7 simulation software are investigated.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy based Weighted Features for Detecting the Influential Users on Twitter 基于熵的加权特征检测Twitter上有影响力的用户
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00012
Yasir Abdalhamed Najern, A. S. Hadi
{"title":"Entropy based Weighted Features for Detecting the Influential Users on Twitter","authors":"Yasir Abdalhamed Najern, A. S. Hadi","doi":"10.1109/AiCIS51645.2020.00012","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00012","url":null,"abstract":"The research in influence social of social networks has attracted big interest in last years of its importance in marketing, information diffusion, and recommendation. Identifying which users have the power to influence the choices of other users is a significant research topic because it provides an opportunity for companies to identify influential users. However, most current methods to influencers find out by relying on measures of centrality computed on networks that use different kinds of interrelationships to link users. Popular users which have a large number of followers are not necessarily influential in terms of spawning mentions or retweets. A small proportion of all users are called the influencer set. Where these influencers have a big active audience that doubles the content and consumes published. For that reason, an influencer's post whether it is links or text is spread in the social network and draws the attention of a big number of individuals although they may not be direct followers to the influencer. The greater the spread of the post, the user impact is rise. In this research, the proposed method displays the ability to find influencer users by using eleven features such as mention, retweet actions, new tweets, the rate of followers to friends, and the count of public lists etc. which are completely effective indicators for influential users, by employing the Entropy method technique and threshold value Analysis for identifying users influential on Twitter.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133984446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Job Scheduling Performance for Multiple Partner Non-Contiguous Allocation with k-Ary n-Cube connected Multi-Computers k-Ary - n-Cube连接多计算机的多伙伴非连续分配作业调度性能
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00025
D. M. A. Al-Kerboly
{"title":"Job Scheduling Performance for Multiple Partner Non-Contiguous Allocation with k-Ary n-Cube connected Multi-Computers","authors":"D. M. A. Al-Kerboly","doi":"10.1109/AiCIS51645.2020.00025","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00025","url":null,"abstract":"The non-contiguous allocation strategies (N.C.A.S) execution might be genuinely full of the activity booking procedure utilized for restricting the sort in which occupations are decide to usage. With this paper, the renowned Multiple Partner N.C.A.S implementation aimed at k-ary n-cube shape associated multi-computers is returned to recognizing different important algorithms of job scheduling. These algorithms are the largest job first (LJF), last come first served (LCFS), smallest job first (SJF), and first come first served (FCFS) job scheduling algorithms. The algorithms are coordinated through complete flutter level simulations. Entirely simulations result subordinate upon engineered remaining task at synthetic workload models with these scenarios. Finished explicit, it is generously better than SJF and LJF in relationships of system utilization and average job turnaround times under little to hefty system loads.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127004727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Decision Stratigies for Physical Layer Authentication in Wireless Systems 基于机器学习的无线系统物理层认证决策策略
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00028
Eman Hani Enad, S. Younis
{"title":"Machine Learning based Decision Stratigies for Physical Layer Authentication in Wireless Systems","authors":"Eman Hani Enad, S. Younis","doi":"10.1109/AiCIS51645.2020.00028","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00028","url":null,"abstract":"In this paper, machine learning (ML) based decision strategies for physical layer authentication are presented. The intelligent authenticators learn the channel features and then classify the received message based on the channel attributes into two categories, legitimate or illegitimate. The training set construction using different features of the estimated channel fading coefficients explored. In addition, ML based physical layer authentication is compared with the statistical discriminative function formulated in binary hypothesis test with a pre-defined threshold. Simulation results demonstrated that the performance of intelligent authenticators outperform the statistical decision scheme as significant improvement can be achieved in the detection rate with minimum false alarm rate. The overall authentication accuracy measured in terms of the area under the receiver operating characteristic curve (AVC) confirmed the superior performance of the the support vector machine (SVM) based physical layer authentication compared with other ML approaches. In addition, it is concluded that using two distinct features improves the authentication performance compared with feature space constructed only from test statistic metrics.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134570331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Examinig the Moderating effect of Market Turbulence between Supply Chain integration capabilities and Competitive Advantage of Sudanese Manufacturing companies 市场动荡对苏丹制造业企业供应链整合能力与竞争优势的调节效应研究
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00040
A. Hamid, Maisoon Ali Abdelkareem, Saba Noori Alhamdany
{"title":"Examinig the Moderating effect of Market Turbulence between Supply Chain integration capabilities and Competitive Advantage of Sudanese Manufacturing companies","authors":"A. Hamid, Maisoon Ali Abdelkareem, Saba Noori Alhamdany","doi":"10.1109/AiCIS51645.2020.00040","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00040","url":null,"abstract":"Competitive advantage is one of the complex challenges of business firms that require distinct capabilities and resources to achieve and sustain it. Supply chain integration is one of the most critical capabilities which contribute to Competitive advantage according to resource-based theory RBV. Therefore this study tested the direct influence of supply chain integration capabilities on the competitive advantage of Sudanese manufacturing companies and indirect influence by testing market turbulence. Two main hypotheses were developed and tested based on data gathered from a non-probability sample of Sudanese manufacturing companies through a questionnaire sent to (200) companies, where the response rate (85%). The data analyzed by (SPSS) AMOS23. The findings showed that customer integration has a positive influence on quality, while flexibility is not affected by the integration capabilities of supply chain, nevertheless the market turbulence strengthening the positive effect of integration capabilities on flexibility. The study provides managerial and theoretical implications and direction for future research.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127738348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Effectiveness and Difficulties of E-Learning Under Crises from the Viewpoint of the Academic Staff and Students: An Analytical Study 师生视角下危机下电子学习的有效性与难点分析研究
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00034
A. Obaid, Khansaa Azeez Obayes Al-Husseini
{"title":"The Effectiveness and Difficulties of E-Learning Under Crises from the Viewpoint of the Academic Staff and Students: An Analytical Study","authors":"A. Obaid, Khansaa Azeez Obayes Al-Husseini","doi":"10.1109/AiCIS51645.2020.00034","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00034","url":null,"abstract":"At present, E-learning has become a common learning method used in many local and international universities due to the Covid-19 pandemic. So Many academic staff have been allowed to go to E-learning as an effective way to continue the educational process in times of crisis. This paper investigates the effectiveness and difficulties the use of E-learning in from the perspective of students and academic staff at the “Babylon Technical Institute, Al-Furat Al-Awsat Technical University”, Iraq. In this study, Google Forms was used in designing questionnaires due to the spread of the Coronavirus disease (COVID-19) and quarantine, the questionnaire included questions about the effectiveness of education and the most important difficulties in using E-learning. The results revealed the effectiveness of E-learning in that it enhances the thinking of students and the academic staff and develops their cognitive skills in the use of educational technology, provides them with opportunities to integrate with modern technology, and enhance the trend towards the electronic university. The results also reveal that the most important obstacles in the continuation of E-learning are the lack of financial support and training, poor Internet service, and lack of training on E-learning platforms, Also, many students admitted that applied education is not very effectiveness in E-learning.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122617798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信