2022 International Conference on Information Technology Systems and Innovation (ICITSI)最新文献

筛选
英文 中文
Moth Flame Optimization for Weight Adjustment on Phased Array Antenna 相控阵天线重量调整的飞蛾火焰优化
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970826
Anisa Rahmanti, I. Mustika, Selo
{"title":"Moth Flame Optimization for Weight Adjustment on Phased Array Antenna","authors":"Anisa Rahmanti, I. Mustika, Selo","doi":"10.1109/ICITSI56531.2022.9970826","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970826","url":null,"abstract":"Adaptive beamforming refers to a method to proceed a signal to improve strength and steer the main beam of smart antenna to the desired user against interferer. In a phased array antenna, the weight of each element is adapted with Weight Adjustment Moth Flame Optimization (WAMFO). The algorithm is based on Moth Flame Optimization (MFO) that is inspired by the moth making spiral move to the flame as the objective function. The objective function is to obtain the minimum difference between reference and incoming signal. The weighted sum will generate the highest power to the desired direction, and then the interferer will be set to null. The simulation resulted in a uniform linear array showing that weight adjustment with the algorithm proposed could achieve faster convergence than other metaheuristic schemes. WAMFO had the average SNR values improvement of 26 to 32 dB for 100 iterations in five different scenarios.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128175034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Panic Button and Fingerprint Sensor on Security System RFID Using Internet of Things and e-KTP 基于物联网和e-KTP的安全系统RFID紧急按钮和指纹传感器的实现
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971021
Ni Putu Oppie Widiantari, N. Karna, Sussi, I. P. Y. N. Suparta, I. K. Gowinda
{"title":"Implementation of Panic Button and Fingerprint Sensor on Security System RFID Using Internet of Things and e-KTP","authors":"Ni Putu Oppie Widiantari, N. Karna, Sussi, I. P. Y. N. Suparta, I. K. Gowinda","doi":"10.1109/ICITSI56531.2022.9971021","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971021","url":null,"abstract":"Security is one of the factors that need to be maintained in a scope. Security can be disrupted by threats in form of loss of valuables to violence. This phenomenon became the idea of developing security system based on fingerprint sensor and Radio Frequency Identification (RFID). Right now, Internet of Things (IoT) has implemented in many sectors, one of them is in security system. In this work, authors propose a system called smartdoors using NodeMCU ESP8266 which utilizes the use of RFID sensor and fingerprint sensor as user authentication. The functionality of this system is also tested by measuring effective distance user from fingerprint sensor and RFID sensor using e-KTP and for its performance, Quality of Service (QoS) method is used to measure the quality of this proposed system. From the test results on the RFID sensor, the optimal distance to detect e-KTP is 3.5 cm, while the fingerprint sensor can only be read by sticking it directly. QoS performance on the alert feature produces an average throughput value of 29,622 bps and delay value of 68.90 ms. The open and close features have an average throughput value of 42,156 bps and delay value of 48.57 ms. While the panic button has an average throughput value of 44,795 bps and delay value of 37.33 ms.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic Readiness Information System For EJBCA Digital Signature Web Server EJBCA数字签名Web服务器的数字取证准备信息系统
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971126
Ihsan Faishal Rasyid, Luqman Muhammad Zagi, Suhardi
{"title":"Digital Forensic Readiness Information System For EJBCA Digital Signature Web Server","authors":"Ihsan Faishal Rasyid, Luqman Muhammad Zagi, Suhardi","doi":"10.1109/ICITSI56531.2022.9971126","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971126","url":null,"abstract":"As the nature of the website, the EJBCA digital signatures may have vulnerabilities. The list of web-based vulnerabilities can be found in OWASP's Top 10 2021. Anticipating the attack with an effective and efficient forensics application is necessary. The concept of digital forensic readiness can be applied as a pre-incident plan with a digital forensic lifecycle pipeline to establish an efficient forensic process. Managing digital evidence in the pre-incident plan includes data collection, examination, analysis, and findings report. Based on this concept, we implemented it in designing an information system that carries out the entire flow, provides attack evidence collection, visualization of attack statistics in executive summary, mitigation recommendation, and forensic report generation in a physical form when needed. This research offers an information system that can help the digital forensic process and maintain the integrity of the EJBCA digital signature server web.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115500168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patient Record System for People Living with HIV/AIDS (PLWHA) at The Srikandi Sejati Foundation Srikandi Sejati基金会的艾滋病患者记录系统(PLWHA)
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971085
Angelina Sanjaya Sugrinting, Ririn Ikana Desanti, Agus Sulaiman
{"title":"Patient Record System for People Living with HIV/AIDS (PLWHA) at The Srikandi Sejati Foundation","authors":"Angelina Sanjaya Sugrinting, Ririn Ikana Desanti, Agus Sulaiman","doi":"10.1109/ICITSI56531.2022.9971085","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971085","url":null,"abstract":"Public service is held to aid in the form of services from government, organizations, non-governmental organization, and others. As a form of public service, health care service becomes a service that is needed by people as an essential service. Srikandi Sejati Foundation is as an organization that serves the public in the form of assistance services for key populations (trans women) in suppressing and controlling HIV/AIDS, especially for Indonesian trans women. With the increasing number of patients that are assisted by Srikandi Sejati Foundation, a system is needed to manage and process the patients' data so it can be used to create reports and executive supervision for People Living With HIV/AIDS (PLWHA) through the program that was held by Srikandi Sejati Foundation with EpiC Indonesia, as well as monitoring the performance and operations of the foundation. The proposed system was built using the prototyping method and the result was a website that can be accessed by staffs and executives. The website is expected to assist the management of Srikandi Sejati Foundation's in managing patient data, reporting, visualizing, and monitoring in real time.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129307090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoAP Evaluation for Node-Edge Communication on Wireless Multimedia Sensor Network 无线多媒体传感器网络节点边缘通信的CoAP评估
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970953
Mokhamad Arfan Wicaksono, Y. Bandung
{"title":"CoAP Evaluation for Node-Edge Communication on Wireless Multimedia Sensor Network","authors":"Mokhamad Arfan Wicaksono, Y. Bandung","doi":"10.1109/ICITSI56531.2022.9970953","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970953","url":null,"abstract":"Nowadays, multimedia data has been spreading throughout the world in a network, and the Internet of Things (IoT) also plays a role in it. The current technology can provide multimedia data sensing in an embedded device. The communication resource limitation is still going to be encountered, and it leads to choosing the proper protocol. Constrained Application Protocol (CoAP) is a suitable protocol for the embedded device since it works on top of User Datagram Protocol (UDP), which has a lower overhead compared to Transmission Control Protocol (TCP). CoAP protocol can communicate reliably with a large data payload through a confirmable block-wise approach. The evaluation has been conducted to the CoAP protocol in some research, but it is not yet evaluated in a wireless multimedia sensor network (WMSN) in multiple devices. This paper presents the evaluation of the CoAP protocol performance in multiple multimedia sensor devices connected to the edge server. Several different numbers of nodes are sending the multimedia data through resource-limited access point. The performance is measured by comparing the throughput value and the retransmission event number. The experiment result shows that the device addition affects the average throughput reduction in a linear pattern.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133710007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Systematic Literature Review of E-Wallet: The Technology and Its Regulations in Indonesia 电子钱包的系统文献综述:印度尼西亚的技术及其法规
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970986
Cecilia Michell, Charys Naomi Winarto, L. Bestari, Dimas Ramdhan, Andry Chowanda
{"title":"Systematic Literature Review of E-Wallet: The Technology and Its Regulations in Indonesia","authors":"Cecilia Michell, Charys Naomi Winarto, L. Bestari, Dimas Ramdhan, Andry Chowanda","doi":"10.1109/ICITSI56531.2022.9970986","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970986","url":null,"abstract":"In recent years, FinTech has developed very rapidly, especially in Indonesia. One of them is E-Wallet. The rapid development of E-Wallet makes understanding the related technologies even more important, such as Artificial Intelligence and Big Data. In this paper, we do a literature review and discuss how the use of Artificial Intelligence and Machine Learning help a lot in decision making, analysis security, and creating innovations that are useful in the FinTech industry, especially E-Wallet. The use of data mining and text mining in Big Data is also being discussed here. The technologies in E-Wallet are certainly very helpful, but the question is how secure the E-Wallet application is itself. There are a lot of cybercrimes including scamming, phishing, theft of personal data, and privacy losses that happened in the past few years. Therefore, we discuss the regulations in Indonesia regarding the E-Wallet and why it is not strong enough to protect the data or privacy of E-Wallet users. The readers will get the insight about the security of using E-Wallet and how the government, BI (Bank Indonesia), and OJK (Otoritas Jasa Keuangan) need to cooperate. That is because even though the regulations about data protection have been regulated here, there is no broader explanation about how the consumers should be informed about the processing of their data provided in the regulations. In this this paper, we use a Systematic Literature Review along with the research questions.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining Services Computing Systems Engineering Framework and Scrum for Agile Development 结合服务计算系统工程框架和敏捷开发的Scrum
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970965
Andri Kusdiyanto, Suhardi, Wardani Muhamad
{"title":"Combining Services Computing Systems Engineering Framework and Scrum for Agile Development","authors":"Andri Kusdiyanto, Suhardi, Wardani Muhamad","doi":"10.1109/ICITSI56531.2022.9970965","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970965","url":null,"abstract":"Services Computing Systems Engineering (SCSE) Framework is an engineering framework or methodology for building service computing systems based on Service Oriented Architecture (SOA). Flexibility and ease of making changes are the advantages offered by SOA. It is also provided by the software development process with the Scrum framework in Agile software development. By using the SCSE framework, the service computing development process runs sequentially from the beginning to the end of the process in one cycle timeline. These guides are excellent for developing systems with obvious requirements and are released in one cycle. However, for services computing that requires fast release, following the guidelines in the SCSE Framework is hard to achieve. Modifications are needed to use the framework in agile system development so that development can be carried out quickly and with multiple releases. This research will be a starting point for combining SCSE with Scrum to produce a new framework that takes advantage of both. The main objective of this research is to determine how SCSE can be used in an agile development environment to produce a service computing system with fast delivery. The research methodology we use is Design Science Research Methodology (DSRM). A system development project has been tested using the proposed framework for one initial release with good results. A survey with the quantitative result has also been conducted among several stakeholders in system development to evaluate the proposed framework. As a result of this study, a framework is proposed to guide system development in an agile manner for creating services computing systems.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"185 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Requirements for Estimating Official Statistics Indicator 官方统计指标估算的大数据需求
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971049
Kemas Muhammad Irsan Riza, Suhardi
{"title":"Big Data Requirements for Estimating Official Statistics Indicator","authors":"Kemas Muhammad Irsan Riza, Suhardi","doi":"10.1109/ICITSI56531.2022.9971049","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971049","url":null,"abstract":"Official statistical indicators are used primarily to assist the decision-making process regarding the development of an area. The data sources for calculating this indicator are generally obtained from the results of censuses and surveys which have a high level of difficulty, a relatively long time, and large costs. Therefore, another approach is needed for calculating statistical indicators using big data so that the process of calculating these indicators can be easier, faster, and cheaper. This paper will discuss the potential use of big data and the data source requirements that must be considered to produce official statistical indicator estimates. This research use document analysis method to gather the requirements, and conclude 14 list of conditions needed for the data source and process so that it can be used as estimation for official statistics indicator.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124917622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of VR and AR Learning Media for Enterprise Business Ethic Scenarios 面向企业商业伦理场景的VR、AR学习媒体开发
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970892
A. E. Permanasari, Hendrasworo Enggar Nugroho, Henry Balzano Satrio Ardhanarko, Silmi Fauziati, Irma Kurnia Utami, M. Sholihin
{"title":"Development of VR and AR Learning Media for Enterprise Business Ethic Scenarios","authors":"A. E. Permanasari, Hendrasworo Enggar Nugroho, Henry Balzano Satrio Ardhanarko, Silmi Fauziati, Irma Kurnia Utami, M. Sholihin","doi":"10.1109/ICITSI56531.2022.9970892","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970892","url":null,"abstract":"Nowadays, information technology has impacted many sectors, such as education. In general, the way students learn has experienced a transformation. Most of the Y and Z generation prefer visual-based learning. Business ethics course is important in business practice. The course focuses on procedures and prevailing norms that workers should follow in their business activities. Immersive technology, such as Virtual Reality (VR) and Augmented Reality (AR) have an opportunity to bring a new experience to visual learners because they are visually interactive. It can be applied in business ethics course. The use of immersive technology-based media can support and enrich learning materials. In this research, we developed VR and AR learning media related to business ethic course. The performance is measured through System Usability, User Experience Questionnaire, and Black Box. The evaluation resulted VR value was below average and AR value was good. The improvement of VR application is required to meet the user's expectations. Meanwhile, AR application is working properly. Immersive technology is expected to be a promising media in the visual-based business ethics course.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SupTech Governance in Regulatory/Supervisory Government Agencies: A Systematic Literature Review 监管/监管政府机构的高技术治理:系统文献综述
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970863
Dinna Mayasari, A. A. Arman
{"title":"SupTech Governance in Regulatory/Supervisory Government Agencies: A Systematic Literature Review","authors":"Dinna Mayasari, A. A. Arman","doi":"10.1109/ICITSI56531.2022.9970863","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970863","url":null,"abstract":"Supervision is the process of ensuring that organizational and management objectives are achieved. Supervision as a control tool in monitoring and reporting activities. Supervision starts from planning, implementing, monitoring, and evaluating to produce the right policies or decisions. Supervision can not be separated from the rules that have been set. The supervision aspect is also assessed by how obedient it is in implementing the regulations that have been set, including the aspect of accelerating regulatory changes in the event of regulatory changes that must be adjusted. The limitations of human resources in analyzing several existing regulations and conducting supervision from existing data sources directly result in the quality of monitoring results being not optimal. The limited time for supervision is considered less than optimal for supervising more complex problems. SupTech is here as an innovation to change the monitoring system to be more accurate, effective, and efficient. This paper describes the systematic literature on governance, technology oversight, and sub-regulators in government agencies. The research process by searching for articles through the database of article sources published from 2017 to 2022 by carrying out the stages of the literature study process based on the research objectives. Several stages were carried out to obtain the final study article. There is a research article as a final study related to research questions that can answer SupTech that can be applied to the field of supervision. Researchers feel the need to research more deeply about the standardization of IT governance guidelines for SupTech.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信