Open Computer Science最新文献

筛选
英文 中文
Application of wireless sensor network technology based on artificial intelligence in security monitoring system 基于人工智能的无线传感器网络技术在安防监控系统中的应用
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0280
Yajuan Zhang, Ru Jing, Xiang Ji, Nan Hu
{"title":"Application of wireless sensor network technology based on artificial intelligence in security monitoring system","authors":"Yajuan Zhang, Ru Jing, Xiang Ji, Nan Hu","doi":"10.1515/comp-2022-0280","DOIUrl":"https://doi.org/10.1515/comp-2022-0280","url":null,"abstract":"Abstract The safety monitoring system has been used to monitor and manage engineering safety operation. The application scope of the safety monitoring system is very wide. It has a wide range of applications in the fields of pipeline safety monitoring, electrical safety monitoring and household safety monitoring. This article studied the application process of the household safety monitoring system. Many home safety accidents are caused by inadequate monitoring of safety problems. Therefore, it is very important to establish a household safety monitoring system. Traditional home safety monitoring systems only rely on cameras for safety monitoring, and the traditional home safety monitoring system uses too few sensors. With the continuous development of wireless sensor network (WSN) technology, it is possible to build a sensor node network, but provides real-time information for home security monitoring to the greatest extent. This article compared the home safety monitoring system based on the WSN technology of artificial intelligence (AI) with the traditional home safety monitoring system. The experimental results showed that in the large-scale home environment, the average monitoring accuracy of the traditional home security monitoring system and the home security monitoring system based on the WSN technology of AI was 77.76 and 89.36%, respectively. In the small-scale home environment, the average monitoring accuracy of the traditional home safety monitoring system and the home safety monitoring system based on the WSN technology of AI were 87.63 and 94.43%, respectively. Monitoring accuracy refers to the accuracy of the household safety monitoring system in detecting safety issues. Therefore, the application of the WSN technology based on artificial intelligence to the home safety monitoring system can effectively improve the accuracy of home safety monitoring.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135954031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data preprocessing impact on machine learning algorithm performance 数据预处理对机器学习算法性能的影响
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0278
A. Amato, V. Di Lecce
{"title":"Data preprocessing impact on machine learning algorithm performance","authors":"A. Amato, V. Di Lecce","doi":"10.1515/comp-2022-0278","DOIUrl":"https://doi.org/10.1515/comp-2022-0278","url":null,"abstract":"Abstract The popularity of artificial intelligence applications is on the rise, and they are producing better outcomes in numerous fields of research. However, the effectiveness of these applications relies heavily on the quantity and quality of data used. While the volume of data available has increased significantly in recent years, this does not always lead to better results, as the information content of the data is also important. This study aims to evaluate a new data preprocessing technique called semi-pivoted QR (SPQR) approximation for machine learning. This technique is designed for approximating sparse matrices and acts as a feature selection algorithm. To the best of our knowledge, it has not been previously applied to data preprocessing in machine learning algorithms. The study aims to evaluate the impact of SPQR on the performance of an unsupervised clustering algorithm and compare its results to those obtained using principal component analysis (PCA) as the preprocessing algorithm. The evaluation is conducted on various publicly available datasets. The findings suggest that the SPQR algorithm can produce outcomes comparable to those achieved using PCA without altering the original dataset.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42020442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of research results of different aspects of network security and Internet of Things under the background of big data 分析大数据背景下网络安全和物联网不同方面的研究成果
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0277
Ying Lu, Xiang Wang, Taotao Xie, Tian Xie
{"title":"Analysis of research results of different aspects of network security and Internet of Things under the background of big data","authors":"Ying Lu, Xiang Wang, Taotao Xie, Tian Xie","doi":"10.1515/comp-2022-0277","DOIUrl":"https://doi.org/10.1515/comp-2022-0277","url":null,"abstract":"Abstract With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more security risks. Therefore, how to ensure the security of big data, prevent network attacks, and improve the security and reliability of the IoT has become a major issue in the current field of network security and the IoT. This article aims to analyze the research results of network security and the IoT in the context of big data and explore how to ensure big data security and improve the security and reliability of the IoT from a multidimensional perspective. Therefore, this article proposes BD technology, that is, through information mining, to ensure network security from the perspective of controlling information flow. At the same time, this article also proposes an LED lightweight encryption algorithm in the IOT, which is used to achieve secure communication between ordinary nodes and gateway nodes, effectively solving the security issues of data distribution in the network, resisting virus attacks and man-in--in-the--the-middle attacks, and has higher security and efficiency. Both of these methods can effectively protect network security: one is to control data flow, and the other is to start with communication protocols. Finally, this article analyzed the adoption of network security protection measures by netizens and found that only 13% of netizens frequently take network security protection measures, while 35% of netizens never take network security protection measures. This is also one of the important reasons for the increasing number of current network security issues.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"13 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66887414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation evaluation of underwater robot structure and control system based on ADAMS 基于ADAMS的水下机器人结构与控制系统仿真评估
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0269
Donglin Tang, Long Li
{"title":"Simulation evaluation of underwater robot structure and control system based on ADAMS","authors":"Donglin Tang, Long Li","doi":"10.1515/comp-2022-0269","DOIUrl":"https://doi.org/10.1515/comp-2022-0269","url":null,"abstract":"Abstract The twenty-first century is the century of marine resources. The ocean is a treasure of biological resources, energy, water resources and mineral resources, and it would gradually become the “second space” of mankind. In the next few years, it would be more and more relevant to human life. Many scholars have realized the importance of the ocean and began to vigorously develop and use the ocean. Underwater robot is a means for human beings to explore and develop the ocean, and it would be widely used in this field. The development and promotion of underwater vehicles are of great significance to resource development, economic development, and national security. With the increasing shortage of land resources, the development and utilization of marine resources have received increasing attention. The direct exploitation of marine resources by humans would have adverse effects, so the underwater robot technology has developed rapidly in recent years. However, at present, most underwater robots are driven by electric turbines. The underwater working environment requires that the underwater motor has good sealing performance, so its structure is complex and expensive, and it is rarely used in ordinary underwater operations. In recent years, intelligent robots have been used more and more, but because of the complexity and uncertainty of the underwater working environment, there are many uncertain factors. Therefore, it is very meaningful to carry out stability control for it. The research results showed that the displacement, stability, and other corresponding test curves of each component can be obtained by establishing a simple model with software and through ADAMS (Automatic Dynamic Analysis of Mechanical Systems) simulation analysis. This can simulate the movement of real objects in the real environment and find the existing problems, so as to provide a reference for the actual underwater robot design. In this way, the development cycle and production costs can be reduced. This article analyzed the structure and control system of the underwater vehicle based on ADAMS simulation. The results showed that the dynamic stability of the underwater vehicle based on ADAMS simulation analysis was improved by 4.67% compared with the underwater vehicle before optimization.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43477478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration on the application of electronic information technology in signal processing based on big data 电子信息技术在基于大数据的信号处理中的应用探索
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0272
Li Liu
{"title":"Exploration on the application of electronic information technology in signal processing based on big data","authors":"Li Liu","doi":"10.1515/comp-2022-0272","DOIUrl":"https://doi.org/10.1515/comp-2022-0272","url":null,"abstract":"Abstract Mobile phones are the most commonly used electronic devices in people’s daily life. The image, voice, and other information in these devices need to be processed through signal transmission. The role of signal processing is to process the acquired information in a certain way to get the final result. In order to ensure that the whole processing program can work normally, it is necessary to implement good control to achieve the desired effect. However, with the continuous progress and development of science and technology, its requirements are becoming increasingly strict. The traditional signal processing method is unreliable, has poor real time, and has error-prone characteristics, which can no longer meet the accuracy requirements of current information acquisition equipment. Therefore, people begin to study more complex and precise information processing methods and apply these algorithms to various advanced electronic devices to achieve better results. From the perspective of big data, electronic information technology is generated and developed based on massive data processing. It not only has a strong storage function but also has strong computing power and a wide range of application scenarios. It has strong applicability in real life. In this article, the signal to be processed was divided into several wavelet components in different frequency ranges by empirical mode decomposition technology, and then the signal was denoised by combining three wavelet denoising methods to obtain noise data with good signal-to-noise ratio and high classification accuracy. Finally, the corresponding feature information was extracted according to the signal-receiving model to improve the system recognition rate. This article compared the traditional signal processing methods with the signal processing approaches from the perspective of electronic information technology. The results showed that the processing method had a high computing speed and could better solve the problem of detection performance degradation caused by interference. User satisfaction had also increased by 2.87%, which showed that signal processing based on big data and information processing technology had broad application prospects in communication systems. The core of open computer science is to build a unified, efficient, and scalable computing platform based on massive data processing and use signal processing and computer technology to manage and optimize the scheduling of information resources to better meet various business needs.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43520273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of fingerprint image fuzzy edge recognition algorithm in criminal technology 指纹图像模糊边缘识别算法在刑事技术中的应用
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0263
Xinhua Lv
{"title":"Application of fingerprint image fuzzy edge recognition algorithm in criminal technology","authors":"Xinhua Lv","doi":"10.1515/comp-2022-0263","DOIUrl":"https://doi.org/10.1515/comp-2022-0263","url":null,"abstract":"Abstract In the context of the rapid development of science and technology and the modernization of the legal system, criminal activities are becoming more and more intelligent and technological, which also puts forward higher requirements for criminal technology. The current criminal technology equipment is relatively backward, and the technical level is not high enough, resulting in a low utilization rate of trace material evidence extraction, which directly affects the role of criminal technology in the investigation and solving of cases. In recent years, fingerprint recognition algorithms and image edge detection algorithms have been widely used in various fields. This work studied the application of fingerprint image fuzzy edge recognition algorithm in criminal technology, in order to improve the level of criminal technology and the utilization rate of physical evidence extraction. The criminal technology system is upgraded and optimized by combining fingerprint recognition algorithm and image edge detection algorithm. And fuzzy theory is added to ensure the feasibility of the research. The experimental results show that the fuzzy edge recognition algorithm of fingerprint image can improve the level of criminal technology and the utilization rate of material evidence to a certain extent. The utilization rate is increased by 7.04%. The recognition accuracy of the fuzzy recognition method is also 13.2% higher than that of the methods in the literature.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41681797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital forensics analysis based on cybercrime and the study of the rule of law in space governance 基于网络犯罪的数字取证分析与空间治理法治研究
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0266
Cheng Chen, Bin Dong
{"title":"Digital forensics analysis based on cybercrime and the study of the rule of law in space governance","authors":"Cheng Chen, Bin Dong","doi":"10.1515/comp-2022-0266","DOIUrl":"https://doi.org/10.1515/comp-2022-0266","url":null,"abstract":"Abstract With the rapid development of social informatization, the Internet has become an important channel for global information dissemination. The wireless network space and the real space are intertwined and have a significant impact on the political, economic, and cultural aspects of international society. For example, it can effectively solve the problem of information exchange between cities, regions, and countries. Wireless network crime and wireless network space security issues involve the development of information technology in various countries and, more importantly, involve all aspects of national security. In the age of science and technology, the current situation of cybercrime can be expressed by data as follows: the online crime rate is high. According to relevant statistics, nearly 5 million Internet users are involved in various cases every year due to the use of the Internet. This article starts with the digital forensics of wireless network crime and wireless network security management systems and discusses the composition, characteristics, existing problems, and future development directions of the current wireless network security management system. By comparing the wireless network security laws of China and the United States, using the latent Dirichlet allocation (LDA)-Gibbs model and the k-means algorithm to analyze the data, this article provides guidance for future research on wireless network space governance. The combination of digital forensics analysis based on cybercrime and space governance can improve the level of public security work. At present, the world has made some progress in cyberspace, but it still faces severe challenges. In the face of new situations and new measures, it is necessary to strengthen legislation, improve relevant systems, and strengthen supervision capacity. At the same time, it is necessary to establish perfect technical means and safeguards to ensure that this goal can be achieved.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44947025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic system allocation and application of cloud computing virtual resources based on system architecture 基于系统架构的云计算虚拟资源动态系统分配与应用
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0259
Chunhua Lin, Longzi Li, Yuanyi Chen
{"title":"Dynamic system allocation and application of cloud computing virtual resources based on system architecture","authors":"Chunhua Lin, Longzi Li, Yuanyi Chen","doi":"10.1515/comp-2022-0259","DOIUrl":"https://doi.org/10.1515/comp-2022-0259","url":null,"abstract":"Abstract Cloud computing is a system development method based on dynamic sharing, which allows a large number of systems to be combined to provide services. The purpose of this work is to study the design and implementation of a dynamic virtual resource allocation system in cloud computing, whose architecture allows load balancing between virtual resource pools and reduces resource wastage. Using the cluster network topology, the resource usage of the dynamic system cluster can be monitored in real time, and the total cluster load can be automatically determined based on the monitoring data. The experiment is divided into two parts. Performance testing and scenario testing. Performance tests examine execution time, processor, and memory performance. In the scenario test, JMeter is used to simulate the occurrence of a large number of concurrent application access requests, the loss rate, and processing time of these requests on the cloud platform, and load balancing tests are performed. The test results show that the system running time is about 22–27 ms, the CPU utilization is about 90–95%, and the RAM is about 3.5 ms. The results show that cloud technology can improve resource scheduling of large tasks and optimize resource load balance.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47253985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual inspection intelligent robot technology for large infusion industry 面向大型输液行业的视觉检测智能机器人技术
IF 1.5
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0262
Qilang Liang, Bangshun Luo
{"title":"Visual inspection intelligent robot technology for large infusion industry","authors":"Qilang Liang, Bangshun Luo","doi":"10.1515/comp-2022-0262","DOIUrl":"https://doi.org/10.1515/comp-2022-0262","url":null,"abstract":"Abstract The application of intelligent technology has realized the transformation of people’s production and lifestyle, and it has also promoted the development of the field of medicine. At present, the intensity of intelligence in the field of medicine is increasing. By using its cash methods and techniques combined with the mechanical field, this article proposes to use visual inspection technology to understand the fusion of the medical field and the mechanical field. It is helpful to analyze and solve objective problems such as low efficiency in current infusion and insufficient rigidity of large infusion plastic bottles. Drawing on the principles and laws of deep learning algorithms and neural networks, the technical research of intelligent robots for visual inspection is carried out to realize the intelligence of infusion robots. In the research accuracy of detection, the detection rate of standard particles higher than 85 µM has reached almost 100%, and the rate of 50 µM standard particles is lower and unstable. The detection effect of the control light bulb control was different, and the detection rate was between 50 and 80%, which was obviously worse than the detection robot effect. Therefore, the current research on the technology of intelligent robots is very important.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49668205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain localization cloud computing big data application evaluation method 区块链本地化云计算大数据应用评估方法
Open Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2023-0281
Lin Xu
{"title":"Blockchain localization cloud computing big data application evaluation method","authors":"Lin Xu","doi":"10.1515/comp-2023-0281","DOIUrl":"https://doi.org/10.1515/comp-2023-0281","url":null,"abstract":"Abstract Blockchain technology is a widely used emerging technology. It can integrate cloud computing technology and big data to form a distributed cloud computing system, providing efficient services for local enterprises and governments. In addition, local cloud computing is also widely used, and there are many big data in these applications. Blockchain and local cloud computing technology offers safe and reliable information exchange for data exchange and provides a practical method for analyzing big data. This article aims to study how to analyze and research the application analysis method of big data based on blockchain technology and improve the classical apriori algorithm (CAA). This article compares and analyzes the performance of CAA and improved apriori algorithm (IAA) in big data applications. When the number of key words in the query are 20 and 100, the result search time of the CAA are 1.08 and 9.24 s, respectively, and the IAA are 0.76 and 7.58 s, respectively. The result search cost of the CAA is 12.43 and 91.55 kB, respectively, and the IAA is 5.05 and 63.72 kB, respectively. It is not difficult to see that applying the IAA to the blockchain-based government data-sharing scheme had relatively excellent performance and was worth further promotion and application.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135952845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信