2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
Attention Mechanism for Human Motion Prediction 人体运动预测的注意机制
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096777
Amal Fahad Al-aqel, Murtaza Ali Khan
{"title":"Attention Mechanism for Human Motion Prediction","authors":"Amal Fahad Al-aqel, Murtaza Ali Khan","doi":"10.1109/ICCAIS48893.2020.9096777","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096777","url":null,"abstract":"Human motion prediction aims to forecast the most likely future frames of motion conditioned on a given sequence of frames. Because of its importance to many applications especially robotics, it has received a lot of interest and has become an active area of research. Since humans are very flexible in nature, human motion prediction is very challenging Recently, deep learning methods have been dominant in many tasks due to their successful results. Particularly, Recurrent Neural Networks (RNNs) have shown excellent performance on human motion prediction task and other tasks that depend on sequential data, where preserving the order of the sequence items is crucial. The well-known Sequence-to-Sequence (Seq2Seq) architectures have been used for sequence learning where two RNNs namely the encoder and the decoder work cooperatively to transform one sequence to another. In the context of neural machine translation, the use of attention decoders yields state-of-the-art results. This work employs a simple but efficient Seq2Seq model with attention decoder. Both encoder and decoder are trained jointly to predict 15 different categories of human motion. Our experiments have shown that the attention decoder clearly outperforms earlier methods and achieves state-of-the-art results in the short-term (< 500ms) motion prediction task. Contrary to earlier methods that show progressive deterioration as the time of prediction increases, our model shows high quality long-term (> 500ms) motion prediction which stays as high even after 1000ms of prediction.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Management of Stakeholder Communications in IT Projects IT项目中涉众沟通的管理
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096842
Abdulmohsen Alsulaimi, Tariq Abdullah
{"title":"Management of Stakeholder Communications in IT Projects","authors":"Abdulmohsen Alsulaimi, Tariq Abdullah","doi":"10.1109/ICCAIS48893.2020.9096842","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096842","url":null,"abstract":"The study centers on examining communication among stakeholders in information technology projects, exploring measures for application by project managers to ensure success. In projects, the correct management of the stakeholders and ensuring their effective communication is a key challenge. Issues of diversity, varying objectives and other communication barriers adversely affect project success. Other challenges entail resistance and weaknesses in shareholders in sharing information, challenge of reaching multiple audiences, heterogeneous goals and concerns, and resource limitations. The study objective is depicting a need for workflow process automation for effective stakeholder communication, identify challenges in communication and develop a useful workflow automation application for implementation in IT projects using Microsoft Visual Studio (ASP.net). Through the app, there is the defining of stakeholders and communications within the project with the inclusion of tasks, their status, and specific milestones. Finally, we aim in examining communication variation across age, educational level, and gender of stakeholder and explore how response times vary across these facets. The research applies a descriptive-survey method and reviews in expanding on the study, relying on information from reviewers and past studies. In the attainment of the project aims, the design and development of a communication software/application were undertaken. The prototype app was made with Microsoft Visual Studio (ASP.net). The design considers an app platform for adequate coverage and communication of stakeholders on different tasks. The prototype app is vital in supporting IT Project Manager in a dynamic stakeholder communication process. With the app, project managers can conveniently plan and control IT projects. The study shows challenges faced by project managers in communication. This entails resistance in data sharing, inability to reach multiple stakeholder needs and audiences, varied needs among various stakeholders, and limited resources or communication tools. The verification and validation procedures were conducted for measuring the product's performance, its functionalities, and customer perceptions. A sample of 102 reviewers was vital in the verification process during the inspection meeting. The data analysis from stakeholders showed that the average response time on project task communication was 300.20 minutes. From the analyzed demographic data collected from the reviewers, it was demonstrated that age affects the communication process and involvement level during the task in the stakeholders. Education and gender were shown as not affecting communication and task involvement.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NewsScatter: Topic Similarity in Social Media 新闻散布:社交媒体中的话题相似性
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096776
Raja H. Alyaffer, D. Alboaneen, Nourah F. Alqahtani
{"title":"NewsScatter: Topic Similarity in Social Media","authors":"Raja H. Alyaffer, D. Alboaneen, Nourah F. Alqahtani","doi":"10.1109/ICCAIS48893.2020.9096776","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096776","url":null,"abstract":"News organisations that use social media sites (such as Twitter) rapidly generate a large volume of data every day. Data visualisation is an effective way to represent microblogging data graphically in order to increase understanding of what news organisations are reporting over a given time period. This paper focuses on visualising the tweets (posts on Twitter) of a broad cross-section of English-language news outlets over time, with the goal of developing an interactive web-based visualisation system that summarises the output of news outlets’ tweets as a scatter plot where each point refers to a news outlet. Such a visualisation could enable interested parties to explore similarities and differences among what news outlets report based on the frequency with which specific words are used.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130510457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Fair Guide: Requirements and Design of a Smart Fair Management System 智慧展会指南:智慧展会管理系统的要求与设计
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096722
S. Z. Iqbal, Dania Huzam, N. Aleliwi, Asma Alabdulkareem, Shikah Alalyani, Shaikha Alfaris, H. Gull
{"title":"Smart Fair Guide: Requirements and Design of a Smart Fair Management System","authors":"S. Z. Iqbal, Dania Huzam, N. Aleliwi, Asma Alabdulkareem, Shikah Alalyani, Shaikha Alfaris, H. Gull","doi":"10.1109/ICCAIS48893.2020.9096722","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096722","url":null,"abstract":"Reading is an essential part of our life, and it is a way by which we acquire new knowledge, discover ourselves and develop our skills. A book fair is an event that provides visitors with the opportunity to further enhance their knowledge, to obtain rare books and to meet their favorite authors. In this event, the staff aim to achieve visitor’s satisfaction, and to increase the fair’s value. Every year Kingdom of Saudi Arabia alos arrange such events to promote knowledge. These events provide readers a chance to acquire international books that may not be available in the Kingdom. The Book Fair organizers are always seeking to reach a better level of organization to gain visitors’ satisfaction and avoid losing the basic value of the Book Fair. SmartFair Guide is a web- based and application-based system that will manage the Kingdom’s book fair event and that will enhance the experience of all individuals involved. The reason the system is referred to as smart is its outstanding features and most specifically, the system includes implementing number of data mining techniques anticipated to have a direct effect on the books classification process and the recommendation system. In this research paper the proposed model structure will display the main procedures and the user’s role behavior in the cycle of the system. The cycle includes seven of the system’s processes which are the donation, ticket trade, barcode scanning, crowd deduction, recommendation, classification and section locating processes. The system analysis demonstrates the diagrams which includes the Use Case, DFDs, ER, Activity, Sequence diagrams and their description.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI Driven Methodology for Anomaly Detection in Apache Spark Streaming Systems 人工智能驱动的方法异常检测在Apache Spark流系统
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096667
Ahmad Alnafessah, G. Casale
{"title":"AI Driven Methodology for Anomaly Detection in Apache Spark Streaming Systems","authors":"Ahmad Alnafessah, G. Casale","doi":"10.1109/ICCAIS48893.2020.9096667","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096667","url":null,"abstract":"Cloud computing, Artificial Intelligence, and Big Data technologies have recently become one of the most impactful forms of technology innovation. It is common to have multiple users share the same computing resources. This practice noticeably leads to performance anomalies. For instance, some applications can feature variability in processing time due to interference from other applications, or software contention from the other users, which may lead to unexpectedly long execution time and be considered anomalous. There is an urgent need for an automated effective performance anomaly detection method that can be used within the production environment for the streaming system to avoid any late detection of unexpected system failures. To address this challenge, we introduce a new black-box training workload configuration optimization with a neural network driven methodology to identify anomalous performance in an in-memory Spark streaming Big Data platform. The proposed methodology effectively uses Bayesian Optimization to find the ideal training dataset size and Spark streaming workload configuration parameters to train the anomaly detection model. The proposed model is validated on the Apache Spark streaming system. The results demonstrate that the proposed solution succeeds and accurately detects many types of performance anomalies. In addition, the training time for the machine learning model is reduced by more than 50%, which offers a fast anomaly detection deployment for system developers to utilize more efficient monitoring solutions.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Symmetric and Asymmetric Array Clover Patch Microstrip Antennas at 2.4 GHz Frequency 2.4 GHz对称与非对称三叶草贴片微带天线的设计
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096716
R. Yuwono, M. F. Edy Purnomo, Dandy Imam Zaki, A. Rafli
{"title":"Design of Symmetric and Asymmetric Array Clover Patch Microstrip Antennas at 2.4 GHz Frequency","authors":"R. Yuwono, M. F. Edy Purnomo, Dandy Imam Zaki, A. Rafli","doi":"10.1109/ICCAIS48893.2020.9096716","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096716","url":null,"abstract":"Efficient and easy-to-produce characteristics of microstrip antenna makes it very common of being applied on communication devices. This research used five clover-shaped patch array microstrip antenna with 1×1, 2×2, 3×3, 4×4, and 5×5 format to analyze the parameters on 2.4 GHz operation frequency. VSWR, return loss, bandwidth and gain of each antennas are analyzed on this research. In conclusion, the addition of radiating element (patch) of the antenna lower the antenna’s performance in VSWR and return loss, but widen the bandwidth and increasing gain of the antenna.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"84 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133136175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Escape The Countries: A VR Escape Room Game 逃离国家:一个VR逃离房间游戏
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096727
Samira Yeasmin, Layla Abdulrahman Albabtain
{"title":"Escape The Countries: A VR Escape Room Game","authors":"Samira Yeasmin, Layla Abdulrahman Albabtain","doi":"10.1109/ICCAIS48893.2020.9096727","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096727","url":null,"abstract":"Technology has become an integral part of our life. One of the most emerging technologies of the 21st century is Virtual Reality. It is being applied to medicine, education, engineering, architecture, training, entertainment and so on. Nowadays it is being used in the gaming field as well. Game developers are turning their games into VR games and it is gaining a lot of popularity. Virtual reality gaming is the application of a 3D artificial environment to games. A VR gaming accessory involves VR headsets, sensor-equipped gloves, hand controllers, etc. Virtual reality games can be played on standalone systems, on specialized game consoles, or using advanced laptops and PCs using Oculus Rift, HTC Vive and Lenovo Explorer [1]. An escape room game is a game where players have to ‘escape’ a room by solving challenges within a given time limit [2]. Sometimes the challenges are made inaccessible and must be found by completing puzzles. Therefore, this project proposes to create a VR escape room game that will help the players to enhance their skills. The game will have several rooms to escape representing different cultures of different countries to help the player interact with different cultures. The game will have puzzle-solving challenges to solve so that players can escape the room. The challenges will be based on math, arrangement, and pattern recognition. During the project, a survey will be carried out to gather information about playing VR games and the significance of a VR escape room game. Similar games around the world will also be reviewed. The goal of the project is to use people’s free time to teach them skills.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126825588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Parametric studies of aerodynamic properties of wings using various forms of machine learning 利用各种形式的机器学习对机翼气动特性进行参数化研究
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096831
C. Farhat, N. Alhazmi, P. Avery, R. Tezaur, Y. Ghazi
{"title":"Parametric studies of aerodynamic properties of wings using various forms of machine learning","authors":"C. Farhat, N. Alhazmi, P. Avery, R. Tezaur, Y. Ghazi","doi":"10.1109/ICCAIS48893.2020.9096831","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096831","url":null,"abstract":"In aerodynamic studies, models are essential tools for understanding complex fluid flow phenomena. However, their use can be expensive in terms of computer power and calculation time. Therefore, machine learning algorithms have become essential when it comes to analyzing uncertainty in modelling and predicting the values for new input parameters with sensitivity quantifications and in a reasonably short time. The aim of this paper is to predict the key factors in aircraft design by finding the best estimation of the dependent variable in the form of the lift to drag ratio, for any new input-dependent values in the form of Mach numbers and angle of attack. Therefore, different regressions of classical supervised learning algorithms have been applied. The statistical errors have been calculated for these regressions in order to choose the best fit for an unknown model. In addition, artificial neural networks (ANN) have been used to train the data, and to predict the ratio of lift to drag in a practical time compared to the use of experimental tests and the computational fluid dynamics (CFD) technique.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114780324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of hydrocarbon fuels imports under a new Mexican regime 墨西哥新政权下碳氢燃料进口分析
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096848
Rolando Treviño-Lozano, Juan Raúl Martinez-Gutierrez, Francisco Javier Cantu Ortiz, Hector Gibran Ceballos Cancino
{"title":"Analysis of hydrocarbon fuels imports under a new Mexican regime","authors":"Rolando Treviño-Lozano, Juan Raúl Martinez-Gutierrez, Francisco Javier Cantu Ortiz, Hector Gibran Ceballos Cancino","doi":"10.1109/ICCAIS48893.2020.9096848","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096848","url":null,"abstract":"In 2018 a new regime arrived to Mexican administrative apparatus. This new regime has expressed plans to abolish public policies from previous administrations, energetic policy among them. This document tries to determine if hydrocarbon fuels imports have been affected by this new regime.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Accuracy Phishing Detection Based on Convolutional Neural Networks 基于卷积神经网络的高精度网络钓鱼检测
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096869
S. Yerima, Mohammed K. Alzaylaee
{"title":"High Accuracy Phishing Detection Based on Convolutional Neural Networks","authors":"S. Yerima, Mohammed K. Alzaylaee","doi":"10.1109/ICCAIS48893.2020.9096869","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096869","url":null,"abstract":"The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks. Consequently, more effective phishing detection is required for improved cyber defence. Hence, in this paper we present a deep learning-based approach to enable high accuracy detection of phishing sites. The proposed approach utilizes convolutional neural networks (CNN) for high accuracy classification to distinguish genuine sites from phishing sites. We evaluate the models using a dataset obtained from 6,157 genuine and 4,898 phishing websites. Based on the results of extensive experiments, our CNN based models proved to be highly effective in detecting unknown phishing sites. Furthermore, the CNN based approach performed better than traditional machine learning classifiers evaluated on the same dataset, reaching 98.2% phishing detection rate with an F1-score of 0.976. The method presented in this paper compares favourably to the state-of-the art in deep learning based phishing website detection.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信