網際網路技術學刊最新文献

筛选
英文 中文
Preserving Privacy and Traceability in Car-sharing Blockchain Based on Attribute Cryptosystem 基于属性密码系统的汽车共享区块链的隐私保护与可追溯性
網際網路技術學刊 Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502001
Tzu-Hao Chen Tzu-Hao Chen, Chit-Jie Chew Tzu-Hao Chen, Jung-San Lee Chit-Jie Chew
{"title":"Preserving Privacy and Traceability in Car-sharing Blockchain Based on Attribute Cryptosystem","authors":"Tzu-Hao Chen Tzu-Hao Chen, Chit-Jie Chew Tzu-Hao Chen, Jung-San Lee Chit-Jie Chew","doi":"10.53106/160792642024032502001","DOIUrl":"https://doi.org/10.53106/160792642024032502001","url":null,"abstract":"\u0000 A car-sharing system has been considered the most promising solution for mitigating the waste of natural resources, traffic congestion, and greenhouse gas emission in the city. However, conventional car-sharing method relies on a trusted third party, which is facing the challenge of maximizing the benefits of C2C model and privacy disclosure risk. This work aims to design a brand-new car-sharing version based on blockchain network and attribute-based cryptosystem. The demander and supplier can use the smart contract to share the vehicle without the help of a centralized node; thus, avoiding the collusion manipulation to reach the optimal profit. In particular, even if the vehicle has been damaged, the supplier can trace the responsibility by accessing the order information stored in the blockchain. Security analysis has demonstrated the confirmation of robustness and privacy essentials, while experimental outcomes have shown the satisfactory feasibility of the new method.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"63 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140404331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved SSD Model for Small Size Work-pieces Recognition in Automatic Production Line 用于自动生产线小尺寸工件识别的改进型 SSD 模型
網際網路技術學刊 Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502004
Xiaoning Bo Xiaoning Bo, Zhiyuan Zhang Xiaoning Bo, Yipeng Wang Zhiyuan Zhang
{"title":"An Improved SSD Model for Small Size Work-pieces Recognition in Automatic Production Line","authors":"Xiaoning Bo Xiaoning Bo, Zhiyuan Zhang Xiaoning Bo, Yipeng Wang Zhiyuan Zhang","doi":"10.53106/160792642024032502004","DOIUrl":"https://doi.org/10.53106/160792642024032502004","url":null,"abstract":"\u0000 Aiming at the problems of slow recognition speed and low recognition accuracy of arbitrarily placed workpiece by machine vision in traditional automated production lines, a workpiece recognition algorithm based on improved SSD is proposed. Firstly, the improved DarkNet53 is used to replace the backbone network in the original SSD network framework, and the network enhancement is used in the backbone network to solve the defect of small target missed detection. Then, channel attention module and deep semantic feature fusion module are added, in order to improve the recognition ability and detection accuracy of the small target features. Lastly, the loss function was optimized, and the problem caused by sample imbalance was solved by changing the weight distribution of positive and negative samples. In the experiment, image datasets of typical bolts, nuts, and connecting plates were constructed for the network training, the experimental results showed that, the recognition accuracy and speed have been optimized and meet the requirements of automatic work-piece detection in actual production, compared with traditional YOLOv4 and the original SSD algorithm in the work-piece recognition task.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"47 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140400398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of A Blockchain-based Searchable Encryption for Securing Contact Tracing Data 实现基于区块链的可搜索加密,确保联系人追踪数据安全
網際網路技術學刊 Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502007
Zheng Yao Ng Zheng Yao Ng, Iftekhar Salam Zheng Yao Ng
{"title":"Implementation of A Blockchain-based Searchable Encryption for Securing Contact Tracing Data","authors":"Zheng Yao Ng Zheng Yao Ng, Iftekhar Salam Zheng Yao Ng","doi":"10.53106/160792642024032502007","DOIUrl":"https://doi.org/10.53106/160792642024032502007","url":null,"abstract":"\u0000 We developed a blockchain-based multi-keyword searchable encryption scheme for securing COVID-19 contact tracing data. In this scheme, we used AES-GCM to encrypt the contact tracing data, guaranteeing that only authorized users can perform decryption. Our scheme employed a Ciphertext-Policy Attribute-based searchable encryption to encrypt the search index, ensuring only users with appropriate attributes can perform search operations. The scheme supports dynamic updates of the search index. The blockchain-based storage with smart contract ensures immutability and non-repudiation of storage and retrieval. Overall, the evaluation of the scheme shows that it works efficiently without compromising the security goals. This is one of the first works to implement a solution for secure storage and search of contact tracing data with blockchain-based searchable encryption. Compared to the existing searchable contact tracing schemes, it provides more features and maintains efficiency even if a large search index is used.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"221 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relay-node Selection Method Based on Weighted Strategy for 3D Scenario in Internet of Vehicles 基于加权策略的车联网 3D 场景中继节点选择方法
網際網路技術學刊 Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502006
Dun Cao Dun Cao, Jiawen Liu Dun Cao, Qinghua Liu Jiawen Liu, Jin Wang Qinghua Liu, Min Zhu Jin Wang
{"title":"Relay-node Selection Method Based on Weighted Strategy for 3D Scenario in Internet of Vehicles","authors":"Dun Cao Dun Cao, Jiawen Liu Dun Cao, Qinghua Liu Jiawen Liu, Jin Wang Qinghua Liu, Min Zhu Jin Wang","doi":"10.53106/160792642024032502006","DOIUrl":"https://doi.org/10.53106/160792642024032502006","url":null,"abstract":"\u0000 In recent years, Internet of Vehicles (IoV), as a supporting technology for Intelligent Transportation System (ITS), is flourishing with the emergence and development of new technologies such as edge computing, 5G communication, and Artificial Intelligence (AI). However, the more complexity of wireless channels and vehicle distribution in 3D scenario brings a great challenge for relay-node selection in ITS. In this paper, we focus on how to alleviate the problem that the decline of two-hop distance and two-hop connection probability caused by the relative fading of inter-layer communication radius in 3D scenario with Vehicle-to-Vehicle (V2V) communication. To face this challenge, we develop a Relay-node Selection method based on Weighted Strategy for Overpass scenario (RSWSO). The simulation results show that RSWSO achieves improvement in two-hop distance, and an increase of up to 11.2% in terms of two-hop connection probability.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"28 109","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RDVFF- Reliable Data Dissemination in Vehicular Ad Hoc Networks Based on Validation of Far to Farthest Zone RDVFF--基于远至最远区域验证的车载 Ad Hoc 网络中的可靠数据传播
網際網路技術學刊 Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501008
Deepak Gupta Deepak Gupta, Rakesh Rathi Deepak Gupta
{"title":"RDVFF- Reliable Data Dissemination in Vehicular Ad Hoc Networks Based on Validation of Far to Farthest Zone","authors":"Deepak Gupta Deepak Gupta, Rakesh Rathi Deepak Gupta","doi":"10.53106/160792642024012501008","DOIUrl":"https://doi.org/10.53106/160792642024012501008","url":null,"abstract":"\u0000 The rise of connected and autonomous vehicles has resulted in the development of vehicular ad hoc networks (VANETs) as a means of improving road safety, traffic efficiency, and passenger comfort. However, VANETs present challenges to achieving reliability and service quality in networks suffered highly by broadcast storms due to their mobility, scalability, and high node density. By addressing such challenges, this paper seeks to contribute to solving the problem of efficient information dissemination by diluting the broadcast storm and coverage issues by proposing a novel relay selection scheme based on the validation of the far-to-farthest zone technique. A flag control suppression mechanism is presented to overcome repeated information problems. RDVFF includes a separate algorithm for the optimization of participants for relay inclusion to address the latency issue during communication based on a multi-directional multiple-selection scheme. Compared with state-of-art protocols in terms of throughput, delivery ratio, collision, and latency experimental results show improvement of an average of 21.27%, 18.34%, 36.76%, and 38.04% respectively.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"8 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139637401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Media Richness Theory and Technology Acceptance Model to Study the Learning Outcomes of Air Quality Education App 结合媒体丰富性理论和技术接受模型研究空气质量教育应用程序的学习效果
網際網路技術學刊 Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501004
Po-Yuan Su Po-Yuan Su, Chung-Ho Su Po-Yuan Su, Chao-Ming Wang Chung-Ho Su, Kuo-Kuang Fan Chao-Ming Wang
{"title":"Integrating Media Richness Theory and Technology Acceptance Model to Study the Learning Outcomes of Air Quality Education App","authors":"Po-Yuan Su Po-Yuan Su, Chung-Ho Su Po-Yuan Su, Chao-Ming Wang Chung-Ho Su, Kuo-Kuang Fan Chao-Ming Wang","doi":"10.53106/160792642024012501004","DOIUrl":"https://doi.org/10.53106/160792642024012501004","url":null,"abstract":"\u0000 In recent years, the rapid expansion of digital media has revolutionized educational materials by incorporating engaging multimedia elements and gamification principles. These advancements in technology have transformed digital learning into a gamified experience, enhancing the creation and utilization of learning materials. The primary aim of this study was to develop a predictive model for measuring learning outcomes in the Air Quality Education (AQE) app. The study results revealed that the most influential factor affecting learning outcomes was Learning Outcome (R2 = 0.673), followed by Behavioral Intention (R2 = 0.541), Practicability (R2 = 0.456), Use Attitude (R2 = 0.431), and Entertainment (R2 = 0.328). The proposed model accounted for an impressive 67.29.8% of the variability in predicting learning outcomes. These research findings emphasize the significance of Behavioral Intention and Practicability as crucial factors in designing predictive models for learning outcomes within the AQE app. Furthermore, the study highlights the users’ strong emphasis on interface media richness and user experience design elements, indicating the need for their prioritized attention and enhancement. By focusing on these aspects, developers can heighten players’ expectations for interactive media elements and enable them to achieve a more immersive gaming experience through a user-friendly and interactive interface design.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"335 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Constructing Digital Resource Sharing and Management Platform by Applying Cultural Compositions of the Historical Urban Area 应用历史城区文化构成构建数字资源共享与管理平台的研究
網際網路技術學刊 Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501001
Kuo-Hsun Wen Kuo-Hsun Wen, Xinyi Chen Kuo-Hsun Wen, Cheng-Cheong Lei Xinyi Chen
{"title":"A Study on Constructing Digital Resource Sharing and Management Platform by Applying Cultural Compositions of the Historical Urban Area","authors":"Kuo-Hsun Wen Kuo-Hsun Wen, Xinyi Chen Kuo-Hsun Wen, Cheng-Cheong Lei Xinyi Chen","doi":"10.53106/160792642024012501001","DOIUrl":"https://doi.org/10.53106/160792642024012501001","url":null,"abstract":"\u0000 With the characteristics on recording the trace of human life, cultural heritage is acknowledged as possessing significant humanistic, spiritual, and socio-economic values. However, there remain problems such as insufficient integration with science and technology, inadequate design innovation, and the lack of digital construction. Based on these problems, the article discusses the need of constructing a digital management platform with cultural heritage knowledge, the expression paradigm, the essential contents, and key technologies. By elaborating current status of its application and utilization, the study explores issues including scattered resources, simple transplantation and lacking digital approach. And it found that designers’ cognition on cultural heritage is relatively superficial, especially for images and literal meanings. Aiming for sharing design knowledge of cultural heritage, the study proposes a conceptual model digital platform of management based on the exploration of design process in extracting cultural elements and verifying the feasibility where design needs can be achievable. Taking Macao’s historic area as an example, the study demonstrates a way to construct the digital resource sharing and management platform using “open source” approach as a sort of design alternative where cultural elements and compositions can be applied efficiently.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"56 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139634552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Adversarial Sample Detection Method Based on Image Similarity 基于图像相似性的对抗样本检测方法研究
網際網路技術學刊 Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501012
Xiaoxue Wu Xiaoxue Wu, Shuqi Zuo Xiaoxue Wu, Shiyu Weng Shuqi Zuo, Yongkang Jiang Shiyu Weng, Hao Huang Yongkang Jiang
{"title":"Research on Adversarial Sample Detection Method Based on Image Similarity","authors":"Xiaoxue Wu Xiaoxue Wu, Shuqi Zuo Xiaoxue Wu, Shiyu Weng Shuqi Zuo, Yongkang Jiang Shiyu Weng, Hao Huang Yongkang Jiang","doi":"10.53106/160792642024012501012","DOIUrl":"https://doi.org/10.53106/160792642024012501012","url":null,"abstract":"\u0000 With the widespread application of deep neural networks in image detection, adversarial sample attacks have gradually become a hot issue of concern for researchers. In this paper we propose a new adversarial sample detection approach called AdvDetector, which combines image generation through label fusion with image similarity detection. AdvDetector enhances sample quality and effectively identifies adversarial samples. Specifically, the method generates images by selecting seed pixels, the labels of deep neural network classification, and the pixel distribution learned from training data, and detects them using image similarity comparison methods. During the sample generation process, we introduce the AdvDetector method for adversarial sample detection to improve the quality of generated samples. We evaluated the effectiveness of the method on three publicly available image datasets, MNIST, Cifar-10, and GTSR, and the results show that the method is superior to existing baseline methods in terms of adversarial sample detection rate and sample generation quality.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"303 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139636024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approaches to Malicious PowerShell Scripts Detection and Feature Combination Analysis 恶意 PowerShell 脚本检测和特征组合分析的机器学习方法
網際網路技術學刊 Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501014
Hsiang-Hua Hung Hsiang-Hua Hung, Jiann-Liang Chen Hsiang-Hua Hung, Yi-Wei Ma Jiann-Liang Chen
{"title":"Machine Learning Approaches to Malicious PowerShell Scripts Detection and Feature Combination Analysis","authors":"Hsiang-Hua Hung Hsiang-Hua Hung, Jiann-Liang Chen Hsiang-Hua Hung, Yi-Wei Ma Jiann-Liang Chen","doi":"10.53106/160792642024012501014","DOIUrl":"https://doi.org/10.53106/160792642024012501014","url":null,"abstract":"\u0000 With advances in communication technology, modern society relies more than ever on the Internet and various user-friendly digital tools. It provides access to and enables the manipulation of files, trips, and the Windows API. Attackers frequently use various obfuscation techniques PowerShell scripts to avoid detection by anti-virus software. Their doing so can significantly reduce the readability of the script. This work statically analyzes PowerShell scripts. Thirty-three features that were based on the script’s keywords, format, and string combinations were used herein to determine the behavioral intent of the script. Ones are characteristic-based features that are obtained by calculation; the others are behavior-based features that determine the execution function of behavior using keywords and instructions. Behavior-based features can be divided into positive behavior-based features, neutral behavior-based features, and negative behavior-based features. These three types of features are enhanced by observing samples and adding keywords. The other type of characteristic-based feature is introduced into the formula from other studies in this work. The XGBoost model was used to evaluate the importance of the features that are proposed in this study and to identify the combination of features that contributed most to the detection of PowerShell scripts. The final model with the combined features is found to exhibit the best performance. The model has 99.27% accuracy when applied to the validation dataset. The results clearly indicate that the proposed malicious PowerShell script detection model outperforms previously developed models.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"8 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139637364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantitative Characterization of Audience Response System Research 受众反应系统研究的量化特征
網際網路技術學刊 Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501011
Juan J. López-Jiménez Juan J. López-Jiménez, José A. García-Berná Juan J. López-Jiménez, Sofia Ouhbi José A. García-Berná, Begoña Moros Valle Sofia Ouhbi, José L. Fernández-Alemán Begoña Moros Valle
{"title":"A Quantitative Characterization of Audience Response System Research","authors":"Juan J. López-Jiménez Juan J. López-Jiménez, José A. García-Berná Juan J. López-Jiménez, Sofia Ouhbi José A. García-Berná, Begoña Moros Valle Sofia Ouhbi, José L. Fernández-Alemán Begoña Moros Valle","doi":"10.53106/160792642024012501011","DOIUrl":"https://doi.org/10.53106/160792642024012501011","url":null,"abstract":"\u0000 Audience Response Systems (ARS) can be used to increase students’ commitment and engagement. ARS are becoming popular at lectures, complementing traditional masterclasses and shedding light to a more profitability of the time. Several researchers studied the impact of ARS in the classroom. However, there is a lack of information about the current research landscape to identify paths towards the development of scientific research and projects in ARS field. This bibliometric study discusses a collection of bibliometric parameters on ARS literature that were calculated from data downloaded in Scopus database. A total of 2,015 publications were considered from Scopus database. Results showed that the number of publications is stable since 2010 with a noticeable decrease in 2019. The United States and the United Kingdom are the most productive countries with a total of 898 papers in the US and 179 in the UK. The most prolific author was Daniel Zingaro from the University of Toronto with a total of 10 manuscripts published. This study provides researchers who are interested in conducting research on ARS with insights on potential venues for publications and collaboration with research institutions and researchers that are more prolific in the field.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"54 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139634434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信