JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
A highly robust and secure digital image watermarking using modified optimal foraging algorithm - based SVM classifier and hyperchaotic Fibonacci Q-matrix 基于改进的最优觅食算法和超混沌Fibonacci q矩阵的支持向量机分类器实现了高度鲁棒性和安全性的数字图像水印
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133247
Megha Gupta, R. Rama Kishore
{"title":"A highly robust and secure digital image watermarking using modified optimal foraging algorithm - based SVM classifier and hyperchaotic Fibonacci Q-matrix","authors":"Megha Gupta, R. Rama Kishore","doi":"10.1080/09720529.2022.2133247","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133247","url":null,"abstract":"Abstract Transmission media is at rise over the internet, due to which the copyright risk is alarming. In such situation, enhanced security is the main concern. Digital image watermarking is the technique that ensures the copyright protection, security, and authenticity of the digital image. This research work recommends a highly secured and robust digital image watermarking system. In this method, the cover image is confused by arbitrarily generated numbers by a six-dimensional hyperchaotic technique, then this permuted image is scattered by applying the Fibonacci Q matrix to generate a scattered host image. This scattered image is decomposed up to 3 levels through DWT and the low pass sub-band caused by DWT are further decomposed by SVD. Singular values generated by SVD are used for watermark embedding as a slight change in the value does not affect the image quality. SVM classifier is used to classify the appropriate location to insert the scattered binary watermark. In this method SVM parameters are optimized by a modified optimal foraging algorithm, so that classification error can be reduced. Pixel rearrangement of the watermark image and host image makes the proposed method more secure, and it is highly robust as SVM is trained to classify locations that are less distorted by noise. Experimental outcomes depicts that the proposed method is accurate and better to the current cutting-edge methods in terms of security and robustness of digital image watermarking, as PSNR is approx. 72db and NC values are 1 after applying all the possible attacks.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47226554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effortless and beneficial processing of natural languages using transformers 使用transformer轻松而有益地处理自然语言
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133239
K. Amrutha, P. Prabu
{"title":"Effortless and beneficial processing of natural languages using transformers","authors":"K. Amrutha, P. Prabu","doi":"10.1080/09720529.2022.2133239","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133239","url":null,"abstract":"Abstract Natural Language Processing plays a vital role in our day-to-day life. Deep learning models for NLP help make human life easier as computers can think, talk, and interact like humans. Applications of the NLP models can be seen in many domains, especially in machine translation and psychology. This paper briefly reviews the different transformer models and the advantages of using an Encoder-Decoder language translator model. The article focuses on the need for sequence-to-sequence language-translation models like BERT, RoBERTa, and XLNet, along with their components.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42031743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Short question-answers assessment using lexical and semantic similarity based features 基于词汇和语义相似性特征的短问答评估
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133245
Tameem Ahmad, Maksud Ahamad, Sayyed Usman Ahmed, Nesar Ahmad
{"title":"Short question-answers assessment using lexical and semantic similarity based features","authors":"Tameem Ahmad, Maksud Ahamad, Sayyed Usman Ahmed, Nesar Ahmad","doi":"10.1080/09720529.2022.2133245","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133245","url":null,"abstract":"Abstract Evaluation of short answers is a challenging task. As there could be more than one way of expressing the same thing in a sentence by quite different words and phrases, evaluation through computer-based system of Short answers requires natural language understanding. Study has performed comparative analysis for short answer assessment with regression algorithms namely: Support Vector Regression, Linear Regression, Bagging Tree, Boosting Tree, Multilayer Perceptron Regressor, and Random Forest on extracted features. It proposes the combined features that take account of lexical, approximate string matching, and semantic similarity features. An empirical evaluation of feature selection is also done that further improves the results. These combined features achieved improved results as 0.71 & 0.78 for correlation and RMSE values respectively.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48470392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A convenient way to mitigate DDoS TCP SYN flood attack 一个方便的方式减轻DDoS TCP SYN flood攻击
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133246
Toyeer-E-Ferdoush, Habibur Rahman, M. Hasan
{"title":"A convenient way to mitigate DDoS TCP SYN flood attack","authors":"Toyeer-E-Ferdoush, Habibur Rahman, M. Hasan","doi":"10.1080/09720529.2022.2133246","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133246","url":null,"abstract":"Abstract Sharing information from one device to another is gradually replacing hand-to-hand paper work in this connected digital age. Digital, modern technology are used to control the data communication. Because of this, the pace of a device’s cyber security is presently fast increasing. DDoS(Distributed Denial-of-Service), is one such phenomenon. TCP (Transmission Control Protocol) Half-open attacks include an SYN(Synchronization) flood attacks. It is a form of distributed denial of service attack that seeks to block all valid communication to a server in order to available server resources. This paper aims to protect the communication from DDoS TCP SYN flood attack. There are many research papers which can detect the attack after the attack take place and the prevention percentage is low. In this research paper this attack can be prevented much well than other model because a flood attack can detect before hampering the server and deny the connection attempt. There will be two cases studied and solved here that SYN-ACK(Synchronization-Acknowledgement) lost (no destination), SYN-ACK—no response.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45175942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting customer churn: A systematic literature review 预测客户流失:系统的文献回顾
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133238
Soumi De, P. Prabu
{"title":"Predicting customer churn: A systematic literature review","authors":"Soumi De, P. Prabu","doi":"10.1080/09720529.2022.2133238","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133238","url":null,"abstract":"Abstract Churn prediction is an active topic for research and machine learning approaches have made significant contributions in this domain. Models built to address customer churn, aim to identify customers who are at a high risk of terminating services offered by a company. Hence, an effective machine learning model indirectly contributes to the revenue growth of an organization, by identifying “at risk” customers, well in advance. This improves the success rate of retention campaigns and reduces costs associated with churn. The aim of this study is to explore the state-of-the-art machine learning techniques used in churn prediction. A systematic literature review, that is driven by 5 research questions and rigorous quality assessment criteria, is presented. There are 38 primary studies that are selected out of 420 studies published between 2018 and 2021. The review identifies popular machine learning techniques used in churn prediction and provides directions for future research. Firstly, the study finds that churn models lack generalization capability across industry domains. Hence, it identifies a need for researchers to explore techniques that extend beyond model experimentation, to improve efficiency of classifiers across domains. Secondly, it is observed that the traditional approaches to churn prediction depend significantly on demographic, product-usage, and revenue features alone. However, recent papers have integrated social network analysis-related features in churn models and achieved satisfactory results. Furthermore, there is a lack of scientific work that utilizes information-rich content of customer-company-interaction instances via email, chat conversations and other means. This area is the least explored. Thirdly, there is scope to investigate the effect of hybrid sampling strategies on model performance. This has not been extensively evaluated in literature. Lastly, there is no formal guideline on correct evaluation parameters to be used for models applied on imbalanced churn datasets. This is a grey area that requires greater attention.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45530621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A highly efficient FPGA implementation of AES for high throughput IoT applications 用于高吞吐量物联网应用的高效AES FPGA实现
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133242
S. Dhanda, Brahmjit Singh, P. Jindal, D. Panwar
{"title":"A highly efficient FPGA implementation of AES for high throughput IoT applications","authors":"S. Dhanda, Brahmjit Singh, P. Jindal, D. Panwar","doi":"10.1080/09720529.2022.2133242","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133242","url":null,"abstract":"Abstract With nearly 500 billion connected devices in 2025, information security will be the main concern of the researchers. It is the driving force in developing resource efficient cryptographic solutions. In this paper, we present a high throughput AES design with 32-bit data path that achieves the high efficiency via FPGA implementation. With the help of data path compression and effective utilization of FPGA architecture, the resource consumption is minimized. Galois field arithmetic is utilized for s-box implementation. Separate S-box for key generation has been employed to achieve higher throughput and low latency. The proposed design has been synthesized by PlanAhead software and implemented on different Xilinx FPGAs. It is compared with AES implementations. With a throughput of 2.34 Gbps and efficiency of 5.10 Mbps/slice, the design outperforms different lightweight ciphers. High throughput and low latency make it suitable for surveillance applications in IoT and smart grid.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41824573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing scheduling in cloud using a meta-heuristic approach 使用元启发式方法优化云中的调度
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133252
S. Maheshwari, S. Shiwani, S. Choudhary
{"title":"Optimizing scheduling in cloud using a meta-heuristic approach","authors":"S. Maheshwari, S. Shiwani, S. Choudhary","doi":"10.1080/09720529.2022.2133252","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133252","url":null,"abstract":"Abstract Cloud computing aims to optimal use of its resources by aggregating them to increase throughput and solve difficult computational problems in the most efficient way possible. Task scheduling problem is incompliant with exact solutions in cloud due to its NP-hard nature. To address this, various meta-heuristic strategies have been developed. A task scheduler should locate the optimal resources for the user’s job while taking into account specific cloud task parameter constraints. Here, a hybrid task scheduling strategy is described that incorporates deep learning and nature-inspired meta-heuristic optimization to maximize cloud throughput while minimizing completion time in an IaaS cloud. The scheduler succeeds towards cloudlet allocation resulted to shorter makespan and higher system throughput. The novel scheduling technique was evaluated against certain algorithms using the CloudSim software. When compared to existing algorithms such as Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO), the experimental findings show that the suggested approach outperforms them.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43309317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Count vectorizer model based web application vulnerability detection using artificial intelligence approach 基于计数矢量模型的人工智能web应用漏洞检测方法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133243
K. Manjunatha, M. Kempanna
{"title":"Count vectorizer model based web application vulnerability detection using artificial intelligence approach","authors":"K. Manjunatha, M. Kempanna","doi":"10.1080/09720529.2022.2133243","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133243","url":null,"abstract":"Abstract A web application is a dynamic, intricate, and interactive program that provides end-users with information and services such as utility payments, online communication, e-learning, socializing, shopping, online banking, and income tax filing etc. Web applications have become a major target for attackers due to their accessibility, availability, and ubiquity. Web application vulnerabilities are hazardous for some reasons. Attackers can harm an organizations image and status. The implementation flaws in web application allow the invader to infuse user-input that violates the syntax-based assembly of the query or infuse malicious code etc. Among various types of injection flaws, SQL injection (SQLI) is more prominent than (XML) both are considered as common application-layer web attack, which allows the attacker to bypass the security mechanisms therefore; these two are ranked as the most common vulnerabilities. Hence, a methodology for detecting evaluating both SQLI & XML vulnerabilities in web applications are considered for research. This research work addresses the above mentioned flaws and proposed an Ensemble Method to classify the Structure Query Language injection vulnerabilities, we selected a benchmark dataset with 33,758 rows containing; various types of SQL and XML injection attacks. Raw data is preprocessed to remove artifacts, and then feature engineering is performed using Natural Language Processing techniques to clean the data and extract 6 types of features such as TF-IDF, Word-to-Vector, SkipGram, Count Vectorizer, Glove and Continuous Bag of words. Imbalance data is handled using sampling techniques, best features are selected using 4 types of validation techniques Significant Test, PCA, Variance Threshold and Sbest. Prepared data is provided to Ensemble Model having two stages; Stage-2 accepts URL from the user and detects presence of susceptibility in the sub domains and domains. Stage-1 having 9 different types of machine learning models Multinomial, Gaussian, Bernoulli Naive Bayes, Logistic Regression, Decision Tree, Random Forest, AdaBoost, SVC with, poly, rbf and linear kernel, these models are trained on additional vectors such as google news and glove to detect the new query either SQL or XML for presences or absence of vulnerability, using this proposed ensemble approach obtained the accuracy of 99%.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48488623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suggestion mining from online reviews using temporal convolutional network 基于时间卷积网络的在线评论建议挖掘
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133249
Usama Bin Rashidullah Khan, N. Akhtar, Umar Tahir Kidwai, Ghufran Alam Siddiqui
{"title":"Suggestion mining from online reviews using temporal convolutional network","authors":"Usama Bin Rashidullah Khan, N. Akhtar, Umar Tahir Kidwai, Ghufran Alam Siddiqui","doi":"10.1080/09720529.2022.2133249","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133249","url":null,"abstract":"Abstract Business and brand owners are using social media networks to provide and deliver various services to their clients and collect information about their products from customers. Customers give their opinions as well as ideas for the improvement of the products on the review platforms and portals. Suggestion Mining is a technique of automatic extraction of these innovative ideas or suggestions from online source data. In this paper, we proposed TCN architecture for suggestion mining from online reviews. The TCN uses causal and dilated convolutional layers to process sequential or temporal data and captures long-term dependencies. TCN architecture on the dataset of SemEval-2019 subtask A is experimented. The dataset is highly imbalanced and to overcome this problem, the ensemble oversampling technique to balance the dataset is applied. TCN is also experimented with the attention mechanism. Our proposed model outperforms the existing works by achieving an F1 score of 82.0 %.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42286487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sustainable competing dynamic - Real-time Bangla license plate detection and recognition system using YOLOv5 and SSD: A deep learning application 基于YOLOv5和SSD的实时孟加拉车牌检测和识别系统:一个深度学习应用程序
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133248
Md Mehedi Hasan Real, Anamika Zaman Priya, Md Alomgir Hossain, Khandakar Rabbi Ahmed
{"title":"A sustainable competing dynamic - Real-time Bangla license plate detection and recognition system using YOLOv5 and SSD: A deep learning application","authors":"Md Mehedi Hasan Real, Anamika Zaman Priya, Md Alomgir Hossain, Khandakar Rabbi Ahmed","doi":"10.1080/09720529.2022.2133248","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133248","url":null,"abstract":"Abstract In this day and age, the programmed procurement of a tag and acknowledgment assumes a significant part in observing and coordinating vehicles in significant urban communities. It is hard to recognize a driver or proprietor of a vehicle that disregards traffic controls or plays out any incidental movement out and about. It will require a great deal of investment for a cop to review the plate of every vehicle. Subsequently, a mechanized tag acknowledgment framework can tackle these sorts of issues. This is the proposed technique; two Deep Learning calculations are utilized to distinguish the permit number and characters on the tag from the constant picture. The primary YOLOv5 model tracks down the main in the live video of a vehicle out and about. Then, at that point, cut out the area of the permit numbers in the video. The cut casing is then embedded into a second SSD (Single Shot Detection) to identify slugs on that tag. The prepared model acquires a high precision of 96.2% over a sum of 400 picture databases.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44086446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信