Journal of Web Engineering最新文献

筛选
英文 中文
Advancing Educational Management with the ATT-MR-WL Intelligent Question-Answering Model 用at - mr - wl智能问答模型推进教育管理
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-10-01 DOI: 10.13052/jwe1540-9589.2373
Ying Ba
{"title":"Advancing Educational Management with the ATT-MR-WL Intelligent Question-Answering Model","authors":"Ying Ba","doi":"10.13052/jwe1540-9589.2373","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2373","url":null,"abstract":"Higher education plays a critical role in cultivating talent, preserving culture, and promoting social progress. However, current challenges, such as inefficient information dissemination and low problem-solving efficiency among students, highlight the need for intelligent question-answering systems. These systems, leveraging artificial intelligence and natural language processing technologies, enable rapid and accurate responses to student queries, thereby providing intelligent support for higher education management. This study introduces the ATT-MR-WL model, a generative AI system integrating Mask R-CNN and Word2Vec+LSTM to enhance intelligent question-answering functionality. The model, customized to handle both text and visual data, is evaluated using the established VQA v2.0 dataset and a specially developed EM dataset reflecting university management scenarios. The ATT-MR-WL model demonstrates a 3% accuracy improvement over traditional methods and enhances its ability to handle multimodal queries. This research provides important insights for enhancing the efficiency and quality of higher education management and advancing the process of educational informatization.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 7","pages":"973-1002"},"PeriodicalIF":0.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10815715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142890308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining the Empirical Relationship Between Quality of Service (QoS) and Trust Mechanisms of Cloud Services 服务质量(QoS)与云服务信任机制的实证关系研究
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-10-01 DOI: 10.13052/jwe1540-9589.2372
Pooja Goyal;Sukhvinder Singh Deora
{"title":"Examining the Empirical Relationship Between Quality of Service (QoS) and Trust Mechanisms of Cloud Services","authors":"Pooja Goyal;Sukhvinder Singh Deora","doi":"10.13052/jwe1540-9589.2372","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2372","url":null,"abstract":"Service selection has emerged as a prominent challenge due to the flourishing demand for computing services and the dynamic nature of its resources. The increasing demand for cloud services makes it challenging to choose a provider offering equal services and facilities at costs that match those of competing providers. Apart from educating customers in the process of choosing cloud services, trust mechanisms include user reviews, reputation systems, and certifications assist to boost consumers' confidence in cloud services. The service measurement index (SMI) offers a disciplined framework combining both functional and non-functional quality of service indicators concurrently, therefore easing decision-making. The main emphasis of the research is on the fundamental elements influencing the choice of cloud services in the present environment, the identification of extra characteristics of cloud services transcending SMI, and the identification of the most suitable approach for some services. By means of the measurement of customer enjoyment and experience, QoS traits provide some insight on the impact of trust mechanisms on service acceptance. Comparisons of SMI and QoS measurements before and after trust mechanism deployment provide insightful analysis. Empirical research guides these comparisons. This study aims to clarify the interactions among QoS, trust mechanisms, and cloud service adoption as well as highlight the implications these elements have for customers and service providers. Furthermore, presented in this paper is an algorithm using a comprehensive method to trust estimation in order to ascertain the degree of confidence worthiness of certain people.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 7","pages":"913-971"},"PeriodicalIF":0.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142890177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Sports Science and Technology Integration Infrastructure: A Case Study of Speed Skating Utilizing Web and Mobile Applications, and Information Visualization Technologies 实施体育科技一体化基础设施:利用网络和移动应用程序以及信息可视化技术的速度滑冰案例研究
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2367
Minkyu Kim;Soojung Park
{"title":"Implementation of Sports Science and Technology Integration Infrastructure: A Case Study of Speed Skating Utilizing Web and Mobile Applications, and Information Visualization Technologies","authors":"Minkyu Kim;Soojung Park","doi":"10.13052/jwe1540-9589.2367","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2367","url":null,"abstract":"In the field of sports, there is an active discussion on and an attempt to apply technologies that integrate sports with cutting-edge science and technology for the purpose of enhancing athletic performance. In line with this trend, South Korea is supporting research on the fusion of sports and science technology at an interdepartmental level. For the improvement of performance in elite sports, it is important to consider the athlete's skills, the coach's information analysis, the scientification of equipment, and the environmental optimization. Accordingly, this study aims to propose web and mobile app technologies to establish an integrated infrastructure of sports science and technology for the three factors of athletes, equipment, and environment to improve the performance of speed skating. Furthermore, it aims to make policy recommendations to activate this integration. The application of such technologies and policy recommendations can be transferred and organically integrated into other sports, including track and field, which are time-based competitions. Additionally, it is expected that this approach will lead to the formation of new theories that consider the emotional aspects occurring in sports situations.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"849-868"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747172","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Quantum Key, Distribution Key and Post-Quantum Cryptography Key Applied Protocols for Data Science and Web Security 量子密钥、分发密钥和后量子密码学密钥研究 数据科学和网络安全的应用协议
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2365
Kyu-Seok Shim;Boseon Kim;Wonhyuk Lee
{"title":"Research on Quantum Key, Distribution Key and Post-Quantum Cryptography Key Applied Protocols for Data Science and Web Security","authors":"Kyu-Seok Shim;Boseon Kim;Wonhyuk Lee","doi":"10.13052/jwe1540-9589.2365","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2365","url":null,"abstract":"Currently, data security is one of the most concerning research topics. The traditional RSA encryption system has become vulnerable to quantum algorithms such as Grover and Shor, leading to the development of new security systems for the quantum. As a result, quantum cryptography is gaining importance as a key element of future communication security. This study focuses on quantum key distribution protocols for data quantum encryption, aiming to achieve quantum robustness in all stages of quantum cryptography communication processes. Quantum cryptography communication requires robust quantum encryption not only between end-nodes but also between all components. Therefore, this study demonstrates the process of end-to-end data quantum encryption and proves the overall quantum robustness in this process.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"813-830"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747171","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Security in Low-Power Wide-Area (LPWA) IoT Environments: The Role of HSM, Tamper-Proof Technology, and Quantum Cryptography 增强低功耗广域 (LPWA) 物联网环境的安全性:HSM、防篡改技术和量子密码学的作用
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2363
Hyung-Sub Han;Tae-hyuk Choi;Jong-Seong Yoon
{"title":"Enhancing Security in Low-Power Wide-Area (LPWA) IoT Environments: The Role of HSM, Tamper-Proof Technology, and Quantum Cryptography","authors":"Hyung-Sub Han;Tae-hyuk Choi;Jong-Seong Yoon","doi":"10.13052/jwe1540-9589.2363","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2363","url":null,"abstract":"Low-power wide-area (LPWA) networks are integral to expanding Internet of Things (IoT) applications, offering extensive coverage with low power consumption. However, these networks face significant security challenges due to their widespread deployment and inherent constraints. In order to provide secure services in an LPWA IoT environment, important information stored in IoT devices (encryption keys, device unique numbers, etc.) must be safely protected from external hacking or theft by physical access, and it is necessary to develop tamper-proof technology to enhance physical security. Meanwhile, with so many ruggedized IoT devices processing and transmitting sensitive information, security systems are essential to protect the integrity and privacy of IoT data. This paper explores the critical role of hardware security modules (HSMs), tamper-proof technology, and quantum cryptography in enhancing the physical, network, and data security of LPWA IoT environments. We propose operational strategies for HSMs, tamper-proof technology in ruggedized LPWA IoT settings, and a quantum key distribution (QKD)-based IPsec solution for robust network and data security.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"787-800"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747167","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Path Calculation for Multi-Ring Based Packet-Optical Transport Networks 基于多环的分组-光传输网络的最优路径计算
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2364
Hyuncheol Kim
{"title":"Optimal Path Calculation for Multi-Ring Based Packet-Optical Transport Networks","authors":"Hyuncheol Kim","doi":"10.13052/jwe1540-9589.2364","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2364","url":null,"abstract":"Multi-domain optical transport networks are inherently non-interoperable and require integrated orchestration and path provisioning mechanisms at the network-wide level. Moreover, ensuring the network's survivability is a critical issue. While the MPLS-TP (multi-protocol label switching-transport profile) defines various protection and recovery mechanisms as standards, it does not address methods for calculating and selecting protection and recovery paths. Therefore, an algorithm is needed to calculate and set up paths to ensure quick protection and recovery across the entire integrated network, minimizing conflicts in protection and recovery at the packet optical integrated network level. In this paper, we proposed an algorithm that calculates and sets a path that enables rapid protection and recovery in an MPLS-TP network composed of a multi-ring-mesh topology. To this end, this study proposes the concept of a transparent node (T-node) for calculating link-disjoint SPF (shortest path first) in a multi-ring network with dual or more rings. A T-node is a node in a ring with more than a dual ring and indicates that the node has been used once in route calculation. Therefore, during path calculation, a T-node can be used as a source node and an intermediate node but not as a destination node.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"801-812"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747169","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Functional Requirements and Inspection Items for AI System Change Management and Model Improvement on the Web Platform 网络平台上人工智能系统变更管理和模型改进的功能要求和检查项目研究
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2366
Dongsoo Moon;Seongjin Ahn
{"title":"A Study on Functional Requirements and Inspection Items for AI System Change Management and Model Improvement on the Web Platform","authors":"Dongsoo Moon;Seongjin Ahn","doi":"10.13052/jwe1540-9589.2366","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2366","url":null,"abstract":"The rapid adoption of artificial intelligence (AI) on the web platform across multiple sectors has highlighted not only its inherent technical hurdles, such as unpredictability and lack of transparency, but also significant societal concerns. These include the misuse of AI technology, invasions of privacy, discrimination fueled by biased data, and infringements of copyright. Such challenges jeopardize the sustainable growth of AI and risk the erosion of societal trust, industry adoption and financial investment. This analysis explores the AI system's lifecycle, emphasizing the essential continuous monitoring and the need for creating trustworthy AI technologies. It advocates for an ethically oriented development process to mitigate adverse effects and support sustainable progress. The dynamic and unpredictable nature of AI, compounded by variable data inputs and evolving distributions, requires consistent model updates and retraining to preserve the integrity of services. Addressing the ethical aspects, this paper outlines specific guidelines and evaluation criteria for AI development, proposing an adaptable feed-back loop for model improvement. This method aims to detect and rectify performance declines through prompt retraining, thereby cultivating robust, ethically sound AI systems. Such systems are expected to maintain performance while ensuring user trust and adhering to data science and web technology standards. Ultimately, the study seeks to balance AI's technological advancements with societal ethics and values, ensuring its role as a positive, reliable force across different industries. This balance is crucial for harmonizing innovation with the ethical use of data and science, thereby facilitating a future where AI contributes significantly and responsibly to societal well-being.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"831-848"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747166","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Estimating Theme Park Attendance Using the AdaBoost Algorithm Based on Weather Information from the Korea Meteorological Administration Web 基于韩国气象局网络天气信息,使用 AdaBoost 算法估算主题公园入园人数的研究
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2368
Jinkook Kim;Soohyun Kim
{"title":"A Study on Estimating Theme Park Attendance Using the AdaBoost Algorithm Based on Weather Information from the Korea Meteorological Administration Web","authors":"Jinkook Kim;Soohyun Kim","doi":"10.13052/jwe1540-9589.2368","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2368","url":null,"abstract":"The purpose of this study is to propose an efficient machine learning model based on five years of data for Seoul Grand Park in Republic of Korea, depending on the weather and day characteristics, and to increase its effectiveness as a strategic foundation for national theme park management and marketing. To this end, the AdaBoost model, which reflects the characteristics of the weather and the day of the week, was recently compared with the actual number of visitors and the predicted number of visitors to analyze the accuracy. The analysis showed 30 days of abnormal cases, and the overall annual distribution was found to show similar patterns. Abnormal cases required details of wind speed, average relative humidity, and fine dust concentration for weather information, and it was derived that more accurate predictions would be possible considering variables such as group visitors, new events, and unofficial holidays.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"869-884"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747165","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attacks on Pre-Trained Deep Learning Models for Encrypted Traffic Analysis 对用于加密流量分析的预训练深度学习模型的对抗性攻击
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2361
Byoungjin Seok;Kiwook Sohn
{"title":"Adversarial Attacks on Pre-Trained Deep Learning Models for Encrypted Traffic Analysis","authors":"Byoungjin Seok;Kiwook Sohn","doi":"10.13052/jwe1540-9589.2361","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2361","url":null,"abstract":"For web security, it's essential to accurately classify traffic across various web applications to detect malicious activities lurking within network traffic. However, the encryption protocols for privacy protection, such as TLS 1.3 and IPSec, make it difficult to apply traditional traffic classification methods like deep packet inspection (DPI). Recently, the advent of deep learning has significantly advanced the field of encrypted traffic analysis (ETA), outperforming traditional traffic analysis approaches. Notably, pre-trained deep learning based ETA models have demonstrated superior analytical capabilities. However, the security aspects of these deep learning models are often overlooked during the design and development process. In this paper, we conducted adversarial attacks to evaluate the security of pre-trained ETA models. We targeted ET-BERT, a state-of-the-art model demonstrating superior performance, to generate adversarial traffic examples. To carry out the adversarial example generation, we drew inspiration from adversarial attacks on discrete data, such as natural language, defining fluency from a network traffic perspective and proposing a new attack algorithm that can preserve this fluency. Finally, in our experiments, we showed our target model is vulnerable to the proposed adversarial attacks.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"749-768"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747168","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority-Based QoS Extensions and IAM Improvements 基于优先级的 QoS 扩展和 IAM 改进
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2362
Gyudong Park;Hyoek Jin Choi
{"title":"Priority-Based QoS Extensions and IAM Improvements","authors":"Gyudong Park;Hyoek Jin Choi","doi":"10.13052/jwe1540-9589.2362","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2362","url":null,"abstract":"The command and control system operates in a harsh and dynamic environment with limited resources and have a very high risk of failure or malfunction. In the case of military information systems, including the com-mand and control system, the efficiency and effectiveness of system resource management are very important and required. Therefore, the application of a QoS-like approach is necessary to improve the operational effectiveness of all command and control system resources. However, supporting QoS at the entire command and control system level incurs additional costs and burdens for implementation and operation. This paper describes the necessity and possibility of collaboration with QoS and IAM (identity and access management) among the collaboration between core functions within the command and control system. This paper proposes an extended QoS approach to improve the operational effectiveness of the entire command and control system resources. As a result of this research, expanded concepts, structures, standards, and methods of collaboration between QoS and IAM are developed and presented, and their feasibility is demonstrated through prototype development and experiments.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"769-786"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747170","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信