網際網路技術學刊最新文献

筛选
英文 中文
Consumers' Motivations for Reading Electronic Word of Mouth (eWOM): A 4-IS Typology 消费者阅读电子口碑(eWOM)的动机:4-IS 类型学
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406011
Cheng-Wen Yao Cheng-Wen Yao, Dah-Kwei Liou Cheng-Wen Yao
{"title":"Consumers' Motivations for Reading Electronic Word of Mouth (eWOM): A 4-IS Typology","authors":"Cheng-Wen Yao Cheng-Wen Yao, Dah-Kwei Liou Cheng-Wen Yao","doi":"10.53106/160792642023112406011","DOIUrl":"https://doi.org/10.53106/160792642023112406011","url":null,"abstract":"EWOM initiates more consumers’ empathy and is also reliable information for a consumer. Consumers are increasingly relying on finding and reading eWOM to make purchasing decisions. Knowing why the consumers read these eWOM helps marketers provide proper information and marketing contents. This study uses the phenomenographic approach to explore consumers’ motivations for reading eWOM. After interviews with thirty participants, this study constructed a 4-IS typology of eWOM motivation based on two dimensions: consumer’s product familiarity and purchase intention. The study also adopts the concept of MOAB model to illustrate four categories. This study provides some useful insights for marketers to systematically analyze why consumers read eWOM. It not only helps us understand why a consumer reads eWOM also helps us figure out how the eWOM affects a consumer.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model 分析大学生网络使用行为对体育观众消费的影响:基于 SOR 模型的 SEM 实证研究
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406020
Yujie Zhang Yujie Zhang, Yuyang Hou Yujie Zhang, Luning Cao Yuyang Hou, You Xiong Luning Cao, Qian Huang You Xiong
{"title":"Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model","authors":"Yujie Zhang Yujie Zhang, Yuyang Hou Yujie Zhang, Luning Cao Yuyang Hou, You Xiong Luning Cao, Qian Huang You Xiong","doi":"10.53106/160792642023112406020","DOIUrl":"https://doi.org/10.53106/160792642023112406020","url":null,"abstract":"In light of China’s burgeoning sports competition and performance sector, the evident shift towards diverse sports consumption preferences underscores an urgent need to refine the current consumption structure. Notably, the underdeveloped ornamental sports consumption sphere impedes the evolution of this structure. This study, focusing on the pivotal demographic in the sports event consumption market—college students, deploys a questionnaire-based approach to explore patterns in ornamental sports consumption, internet usage behavior, perceived value associated with ornamental sports, and trust towards this mode of consumption. Leveraging the Stimulus-Organism-Response (SOR) model and integrating various theories, we constructed hypothetical models. Utilizing structural equation modeling, we probed the intricate relationships among these variables through path analysis. This empirical investigation specifically scrutinized the impact of college students’ internet behavior on their spectator sports consumption, extending to the intermediary roles played by the perceived value and trust related to ornamental sports. Key findings indicate: (1) A direct positive correlation exists between college students’ internet behaviors and their affinity for spectator sports. (2) The perceived value of ornamental sports acts as a mediator between students’ internet activities and their consumption behaviors. (3) Trust in ornamental sports consumption mediates the relationship between internet usage and consumption patterns.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast and On-demand Network-wide Telemetry via Cluster Based Path Planning 通过基于集群的路径规划进行快速、按需的全网遥测
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406016
Du Chen Du Chen, Deyun Gao Du Chen, Wei Quan Deyun Gao, Chuan Heng Foh Wei Quan, Hongke Zhang Chuan Heng Foh
{"title":"Fast and On-demand Network-wide Telemetry via Cluster Based Path Planning","authors":"Du Chen Du Chen, Deyun Gao Du Chen, Wei Quan Deyun Gao, Chuan Heng Foh Wei Quan, Hongke Zhang Chuan Heng Foh","doi":"10.53106/160792642023112406016","DOIUrl":"https://doi.org/10.53106/160792642023112406016","url":null,"abstract":"In-band Network Telemetry (INT) has profoundly promoted the network visibility. However, the existing solutions either face Maximum Transmission Unit (MTU) limitation or latency issue due to continuous insertion of INT metadata along long forwarding paths. In addition, conducting telemetry using user packets is prone to result in duplicate telemetry and fall short to achieve network-wide telemetry. In this work, we propose NetworkSight to comprehensively resolve these problems through cluster based path planning and source routing based on-demand forwarding. Specifically, a cluster based path planning algorithm is designed to generate several balanced short forwarding paths that cover the entire network. As a consequence, the MTU limitation is overcome and the telemetry latency can be reduced. Instead of operating on user packets, NetworkSight sends crafted probes built on source routing to travel synchronously over the generated forwarding paths. With these improvements, network-wide telemetry is achieved. Besides, we define a suite of telemetry primitives and develop corresponding APIs for users to flexibly express their telemetry requirements. Extensive experimental results show that NetworkSight can generate more balanced forwarding paths. The results show that it outperforms state-of-the-art mechanisms, where it reduces the telemetry latency by tens of milliseconds.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139296972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can University Marks Measure Programming Skills for Novice Programmers? An Exploratory Study 大学分数能否衡量程序员新手的编程技能?一项探索性研究
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406002
Fanghui Zha Fanghui Zha, Yong Wang Fanghui Zha, Liqiang Mao Yong Wang, Jin Liu Liqiang Mao, Xue Wang Jin Liu
{"title":"Can University Marks Measure Programming Skills for Novice Programmers? An Exploratory Study","authors":"Fanghui Zha Fanghui Zha, Yong Wang Fanghui Zha, Liqiang Mao Yong Wang, Jin Liu Liqiang Mao, Xue Wang Jin Liu","doi":"10.53106/160792642023112406002","DOIUrl":"https://doi.org/10.53106/160792642023112406002","url":null,"abstract":"Programming skills are the key ability of programmers. For novice programmers who are new and have little experience in programming, it is important to measure and improve their programming skills. In practice, novice programmers learn programming knowledge and coding ability at university, and course learning is the main way for novice programmers to improve programming skills. However, can university marks be used to measure the programming skills of programming novices? To answer this question, in a controlled experiment, we compare university marks of novice programmers with their performance in programming tasks. The results showed that there were 7 courses with significant correlation among the 13 courses, among which the software engineering course had the most significant correlation.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139302050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Valuable Knowledge Topics in Innovation Communities Using Innovation-LDA 利用创新-LDA 在创新社区中识别有价值的知识主题
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406012
Hongting Tang Hongting Tang, Yanlin Zhang Hongting Tang, Xianyun Lin Yanlin Zhang, Lanteng Wu Xianyun Lin
{"title":"Identifying Valuable Knowledge Topics in Innovation Communities Using Innovation-LDA","authors":"Hongting Tang Hongting Tang, Yanlin Zhang Hongting Tang, Xianyun Lin Yanlin Zhang, Lanteng Wu Xianyun Lin","doi":"10.53106/160792642023112406012","DOIUrl":"https://doi.org/10.53106/160792642023112406012","url":null,"abstract":"Researchers and practitioners have recognized that user-generated content in the innovation community plays an important role. However, it is challenging to automatically identify valuable knowledge from these unstructured texts. Thus, in this study, we propose an efficient model for extracting innovation-oriented topics and, simultaneously, for assigning discovered topics to each post in the online innovation community. Specifically, we introduce a variant of the latent Dirichlet allocation (LDA) topic model, called the Innovation-LDA model, which comprehensively considers users’ interests (reflected by pageviews and replies) and the structure of threads (e.g., header or body) to generate the valuable topics. We access the quality of discovered information through statistical fit as well as substantive fit. Based on our experimental results, we can conclude that our proposed method exhibits better performance than that of the contrasted method and can locate more meaningful innovation topics; that is, our innovation-LDA model is capable of not only identifying more rigorous topics for each thread by utilizing the text structure but is also capable of learning more semantic and coherent themes from user interests. This investigation expands topic identification research by providing both a new theoretical perspective and useful guidance for enterprises in product innovation.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Atlas Segmentation Algorithm with An Improved Sparse Representation on Brain MR Images 改进稀疏表示的脑磁共振图像多图集分割算法
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406019
Hong Shi Hong Shi, Leiyi Gao Hong Shi, Ruixin Zhang Leiyi Gao, Junzhu Wang Ruixin Zhang, Hongxia Deng Junzhu Wang
{"title":"A Multi-Atlas Segmentation Algorithm with An Improved Sparse Representation on Brain MR Images","authors":"Hong Shi Hong Shi, Leiyi Gao Hong Shi, Ruixin Zhang Leiyi Gao, Junzhu Wang Ruixin Zhang, Hongxia Deng Junzhu Wang","doi":"10.53106/160792642023112406019","DOIUrl":"https://doi.org/10.53106/160792642023112406019","url":null,"abstract":"Macaque brains are very close to human brains, so it’s an effective way to deepen the understanding of human brain functions by studying macaque brain structures. In order to segment subcortical nuclei of macaque brains more accurately, a multi-atlas segmentation algorithm based on an improved sparse representation has been designed in this paper. Firstly, a type of labeling information for atlas brain images is introduced when sparse patch-based representation is constructed, and then mutual information is improved by changing the calculation method of the information entropy, and it is used to measure the similarity between the target image and the atlas images. These two make the weights of the atlas more reasonable during fusion. Secondly, in order to fuse the segmentation results from two methods, nonlocal-patch-weighted method and the sparse representation method, a new similarity index based on a combination of dice coefficient and cosine distance is proposed. Finally, the experimental results show that this algorithm proposed in this paper has improved the accuracy of segmentation of hippocampus, striatum, claustrum and other nuclei, and it has better robustness.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A k-hop Constrained Reachability Based Proactive Connectivity Maintaining Mechanism of UAV Swarm Networks 一种基于 k 跳受限可达性的无人机蜂群网络主动连接维护机制
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406015
Huibin Wang Huibin Wang, Ming Chen Huibin Wang, Xianglin Wei Ming Chen
{"title":"A k-hop Constrained Reachability Based Proactive Connectivity Maintaining Mechanism of UAV Swarm Networks","authors":"Huibin Wang Huibin Wang, Ming Chen Huibin Wang, Xianglin Wei Ming Chen","doi":"10.53106/160792642023112406015","DOIUrl":"https://doi.org/10.53106/160792642023112406015","url":null,"abstract":"Harsh or hostile environments may lead to node failure and connectivity degradation of a UAV swarm system. In order to maintain or restore the connectivity of a network in case of node failure, this paper proposes a mechanism to adjust the network topology to resist the impact caused by node failure. Firstly, a network model of a UAV swarm network based on k-hop constrained reachability is proposed. Secondly, a k-hop constrained reachability based proactive connectivity maintaining mechanism of UAV swarm network is presented. In this mechanism, each node identifies the network abnormality distributed according to k-hop reachability, and reports the observed abnormality to the master node; then, a virtual edge-based topology reconstruction algorithm is put forward for the master node to derive a topology reconstruction solution in a centralized way; afterwards, the solution is delivered to the slave nodes to reconfigure the network topology in parallel. Thirdly, a quantitative method is introduced to optimize the total travel distance of nodes, and a spanning tree-based method is designed to maintain the connectivity during the topology transformation process. Both theoretical analysis and simulation results have shown that: on the one hand, the proposed mechanism are effective in maintaining a UAV swarm’s connectivity in case of node failure; on the other hand, the proposed mechanism outperforms existing mechanisms in terms of fault tolerance, connectivity, and total travel distance, and it’s less affected by the failure rate.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139293230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency Evaluation of Business in IoT Supply Chains by Network DEA 利用网络 DEA 评估物联网供应链中的业务效率
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406018
Han-Ying Kao Han-Ying Kao, Chien-Hao Lan Han-Ying Kao, Chia-Hsien Hsu Chien-Hao Lan
{"title":"Efficiency Evaluation of Business in IoT Supply Chains by Network DEA","authors":"Han-Ying Kao Han-Ying Kao, Chien-Hao Lan Han-Ying Kao, Chia-Hsien Hsu Chien-Hao Lan","doi":"10.53106/160792642023112406018","DOIUrl":"https://doi.org/10.53106/160792642023112406018","url":null,"abstract":"Recently Internet of things (IoT) and its applications are emerging as a momentous trend in industry. Numerous hardware and software providers have been entering the intense market competition in IoT related industries. Correspondingly, the attention on evaluation of IoT industry is growing. However, it is a main theme as how to consider the multiple dimensions and dependencies among the criteria in IoT supply chains simultaneously. By considering internal processes in DMUs as well as their interactions, this study designs the evaluation methods with network data envelopment analysis (NDEA) and multi-objective programming (MOP) techniques. This work intends to estimate the efficiency of IoT businesses from the perspectives of R&D, manufacturing, sales and finance, and the overall performance. The proposed models are implemented with empirical case studies in IoT supply chains in Taiwan. The results show the usefulness and validity of the proposed methods in evaluating IoT related business.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACStalk: Design and Implementation of An Access/Entry Control System using an Internet of Things (IoT) Platform ACStalk:利用物联网 (IoT) 平台设计和实施出入口控制系统
網際網路技術學刊 Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406017
Syuan-You Chen Syuan-You Chen, Shih-Wen Jiang Syuan-You Chen, Whai-En Chen Shih-Wen Jiang
{"title":"ACStalk: Design and Implementation of An Access/Entry Control System using an Internet of Things (IoT) Platform","authors":"Syuan-You Chen Syuan-You Chen, Shih-Wen Jiang Syuan-You Chen, Whai-En Chen Shih-Wen Jiang","doi":"10.53106/160792642023112406017","DOIUrl":"https://doi.org/10.53106/160792642023112406017","url":null,"abstract":"An access/entry control system usually consists of many subsystems. These subsystems have different Application Programming Interfaces (APIs), but they need to be integrated and interacted well. Without a good integrated platform, the communications between subsystems will be very complicated. In addition, except user name and password, Radio Frequency Identification (RFID), and the human’s biometrics (e.g., fingerprint and face) are used to identify users. Wireless Local Area Network (WLAN), mobile communications (e.g. 4G/5G) and Bluetooth are adopted as the remote access technologies. In addition, with the COVID-19 pandemic, public health and personal safety are getting more concerns. People are required to wear personal protective equipment (PPE) in some special areas (e.g., barns and factories) to ensure the personal healthy and food’s safety. To identify the user and detect whether the PPE is correctly worn, this paper proposes an access/entry control system by using an Internet of Things (IoT) platform. Through the proposed IoT system architecture, different identification mechanisms and communication technologies can be adopted, and the messages can be exchanged between two mechanisms. This paper elaborates the architecture design of the IoT platform and discusses the implementation/deployment issues of the PPE detection by using machine learning mechanisms.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Web Service Clustering Method with Semantic Enhancement Based on RGPS and BTM 基于RGPS和BTM的语义增强Web服务聚类方法
網際網路技術學刊 Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404012
Fang Xie Fang Xie, Jing-Liang Chen Fang Xie, Yi Zhu Jing-Liang Chen, Hong-Yan Zheng Yi Zhu
{"title":"A Web Service Clustering Method with Semantic Enhancement Based on RGPS and BTM","authors":"Fang Xie Fang Xie, Jing-Liang Chen Fang Xie, Yi Zhu Jing-Liang Chen, Hong-Yan Zheng Yi Zhu","doi":"10.53106/160792642023072404012","DOIUrl":"https://doi.org/10.53106/160792642023072404012","url":null,"abstract":"\u0000 In order to overcome the data sparsity problem in service description text and to improve the web service clustering quality, we propose a web service clustering method with semantic enhancement based on RGPS (Role-Goal-Process-Service) Framework and Bi-term Topic Model (BTM). First, we extend service description text’s feature according to RGPS meta-model framework. Also, we generate the service latent feature by BTM. Then, we employ K-means on the generated features. The results of experiments on service registry PWeb show that this method can get better clustering performance in purity and entropy. It is proved that this method has great efficiency compared with the baseline methods K-means, Agglomerative and LDA (Latent Dirichlet Allocation). This paper enhances the service clustering performance and creates foundation work for service organization and recommendation. \u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127288168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信