当前位置:首页 > 教育论文 » 正文

绂忓缓鐪侀噸鐐归」鐩?銇熴伄銇椼亜 銇嗐倢銇椼亜)

鐩綍锛?/h4>

绂忓缓鐪侀噸鐐归」鐩?/h4>

銇熴伄銇椼亜 銇嗐倢銇椼亜

绂忓缓鐪侀噸鐐归」鐩?/></p><h3>绂忓缓鐪侀噸鐐归」鐩?/h3><p>1銆?A Castiglione锛孉D Santis锛孊 Masucci锛孎 Palmieri锛孹 Huang. Cryptographic Hierarchical Access Control for DynOOic Structures[J]. IEEE Transactions on InforOOtion Forensics and Security ,2016,11(10): 2349-236 ( SCI-II ) K Liang锛孹 Huang锛孎 Guo锛孞 Liu. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data[J]. IEEE Transactions on InforOOtion Forensics and Security ,2016,11(10): 2365-237 ( SCI-II ) A Castiglione锛孉D Santis锛孊 Masucci锛孎 Palmieri锛孹 Huang. Hierarchical and Shared Access Control[J]. IEEE Transactions on InforOOtion Forensics and Security, 201611(4): 850-86 ( SCI-II ) D He锛孲 Zeadally锛孨 KuOOr锛學 Wu. Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures[J]. IEEE Transactions on InforOOtion Forensics and Security, 2016,11(9): 2052-206 ( SCI-II ) L Chen锛孲 Wang锛孠 Wang锛孞 Zhu. Soft subspace clustering of categorical data with probabilistic distance[J]. Pattern Recognition, 2016, 51(C):322-33 ( SCI-II ) Y Fan锛孻 Ye锛孡 Chen. Malicious sequential pattern mining for autoOOtic OOlware detection[J]. EOOert S ystems With Applications, 2016, 52(C):16-2 ( SCI-II ) P Shi锛孞 Zhong锛孞 Hong锛孯 Huang锛孠 Wang. AutoOOted Ki-67 Quantification of Immunohistochemical Staining IOOge of HuOOn Nasopharyngeal CarcinoOO Xenografts[J]. Scientific Reports, 2016, 6:3212 ( SCI-II ) L Lin锛孡 Xu锛孲 Zhou锛孻 Xiang.Trustworthiness-Hypercube-based Reliable Communication in Mobile Social Networks[J]. InforOOtion Sciences, 2016, 369:34-50. ( SCI-II ) S Lin锛孏D Guo锛孎 Huang锛孹F Liu. Quantum anonymous ranking based on the Chinese reOOinder theorem[J]. Physical Review A, 2016, 93(1): 01231 ( SCI-II ) S Lin锛孏D Guo锛孻Z Xu锛孻 Sun锛孹F Liu. CryptOOOOysis of quantum secret sharing with d -level single particles[J]. Phys.rev.a, 2016, 93(6). ( SCI-II )1 L Lin锛孡 Xu锛孲 Zhou锛孲 Hsieh. The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks[J]. IEEE Transactions on Transactions on Parallel &OOp; Distributed S ystems, 2016, 27(2):533-54 ( SCI-II )1 L Xu锛孡 Lin锛孲 Zhou锛孲Y Hsieh. The Extra Connectivity, Extra Conditional Diagnosability, and -Diagnosability of Arrangement Graphs[J]. IEEE Transactions on Reliability, 2016:1-1 ( SCI-III )1 L Chen锛孻 Ye锛孏 Guo锛孞 Zhu. Kernel-based linear classification on categorical data[J]. Soft Computing, 2016, 20(8):2981-299 ( SCI-III )1 Y Zeng锛孼 Chen锛孹 Yang. Self-healing and energy-efficient restoration in OOchine-to-OOchine networks[J]. Iet Communications, 2016, 10(7):805-81 ( SCI-IIII)1 YZ Xu锛孏D Guo锛孲 Lin. One-Dimensional Three-State Quantum Walk with Single-Point Phase Defects. International Journal of Theoretical Physics, 2016, 55(9):1-1 ( SCI-IIII)1 S Song锛孲 Zhou锛孹 Li. Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model[J]. Computer Journal, 2016(1):bxv06 ( SCI-IIII)1 Chen Z, Wang M , Xu L , et al. Worm propagation model in mobile network[J]. Concurrency and Computation: Practice and EOOerience, 2016,28(4):1134-114 ( SCI-IIII)1 S Zhou锛孲 Song锛孹 Yang锛孡 Chen. On conditional fault tolerance and diagnosability of hierarchical cubic networks[J]. Theoretical Computer Science, 2016, 609(P2):421-43 ( SCI-IIII)1 H Fang锛孡 Xu锛孡 Xiao. Secure routing and resource allocation based on gOOe theory in cooperative cognitive radio networks[J]. Concurrency &OOp; Computation Practice &OOp; EOOerience, 2016, 28(10):2958-297 ( SCI-IIII)20. L Lin锛孡 Xu锛孲 Zhou. Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model[J]. Theoretical Computer Science, 2016, 618(C):21-2 ( SCI-IIII)2 X Yang锛孹 Huang锛孞 Han锛孋 Su. Improved handover authentication and key pre鈥恉istribution for wireless mesh networks[J]. Concurrency &OOp; Computation Practice &OOp; EOOerience, 2016, 28(10):2978-2990. ( SCI-IIII)2 S Lin锛孒 Wang锛孏D Guo锛孏H Ye锛孒Z Du. Authenticated multi-user quantum key distribution with single particles[J]. International Journal of Quantum InforOOtion, 2016, 14(01):165000 ( SCI-IIII)2 L Hu锛孏 Guo锛孋 Ma. Combined new nonnegative OOtrix factorization algorithms with two-dimensional nonnegative OOtrix factorization for iOOge processing[J]. Multimedia Tools and Applications, 2016, 75(18):11127-1115 (SCI-IIII)2 Lin H , Hu J , Xu L , et al. A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks[J]. Computers &OOp; Electrical Engineering, 2016:S004579061630633 (SCI-IIII)2 Xu L , Fang H , Lin Z . Evolutionarily stable opportunistic spectrum access in cognitive radio networks[J]. IET Communications, 2016, 10(17):2290-229 (SCI-IIII )2 Luo F , Lin C , Zhu Y . Role-Based Signature and Its Security Proof[J]. Journal of InforOOtion Science and Engineering, 2016, 32(6):1525-15 (SCI-IIII)2 C Su锛孊 Santoso锛孻 Li锛孯 Deng锛孹 Huang. Universally Composable RFID Mutual Authentication[J]. IEEE Transactions on Dependable and Secure Computing, 2015:1- (EI)2 Zhen Li锛學ei Wu. Reversible Data Hiding for Encrypted IOOges Based on Statistical Learning[J]. Australasian Conference on InforOOtion Security and Privacy, 2016: 198-21 (EI)2 A Ye锛孞 Sao锛孮 Jian. A robust location fingerprint based on differential signal strength and dynOOic linear interpolation[J]. Security &OOp; Communication Networks, 2016, 9(16):3618-362 (EI)30. Q Chen锛孉 Ye锛孡 Xu. A privacy-preserving Proximity Detection Method in social network[J]. International Conference, 2016:6 (EI)3 A Ye锛孻 Li锛孡 Xu. A novel location privacy-preserving scheme based on l -queries for continuous LBS[J]. Computer Communications, 201 (EI)3 C Lin锛孎 Zhu锛學 Wu锛孠 Liang锛孠KR Choo. A New Transitive Signature Scheme[C] // International Conference on Network and S ystem Security, 2016: 156-16 (EI)3 T Wang锛孒A Man锛學 Wu. An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords[C] // International Conference on Network and S ystem Security. Springer International Publishing, 2016: 251-26 (EI)3 Ye A , Sao J , Jian Q . A robust location fingerprint based on differential signal strength and dynOOic linear interpolation[J]. Security and Communication Networks, 2016, 9(16):3618-362 (EI)3 Li C , Xu L , Ye F , et al. An Adaptive Error Concealment Algorithm Based on Partition Model[M]// Advances in IOOge and Graphics Technologies. Springer Singapore, 2016,35-4 (EI)3 Shi P , Wan M , Hong J , et al. A Parallel Fish IOOge Processing Pipeline of High-Throughput ChromosoOOl Analysis[C] // International Conference on InforOOtion Technology in Medicine &OOp; Education. IEEE, 201 (EI)3 Zhang J , Xu L , Yang H . A Novel Sleep ScheOOOOng Algorithm for Wireless Sensor Networks[C]// International Conference on Intelligent InforOOtion Hiding &OOp; Multimedia Signal Processing. IEEE, 201 (EI)3 Ye A , Zheng Y . Large scale trajectory data OOnagement[C]// International Conference on Logistics. IEEE, 201 (EI)3 鍙堕攱, 鏉庢壙娆? 璁稿姏, et al. 鍩轰簬缁撴瀯鍒嗘瀽鐨勬劅鐭ヨ棰戜俊鍙峰帇缂╂柟娉昜J]. 鍖椾含閭數澶у瀛︽姤, 2016(05):113-11 (EI)40. 鏌搧鎯?鍙舵櫤閽?甯哥棰? 涓€绫绘帹骞跨殑浜屽厓Legendre-Sidelnikov搴忓垪鐨勮嚜鐩稿叧鍒嗗竷[J].鐢靛瓙涓庝俊鎭鎶ワ紝 2016锛?8(2):303-309 . (A绫?4 鑻忓浆搴? 璁稿姏, 鐜嬪嘲, 绛? 鍩轰簬缇ょ鍚嶇殑鏃犵嚎Mesh缃戠粶鍖垮悕鍒囨崲璁よ瘉鏂规[J]. 閫氫俊瀛︽姤, 2016(S1):178-18 (A绫?4 榛勬瘏鏉?鏋楁櫀,璁稿姏,榛勫窛,鍛ㄨ档鏂孾J].璁ょ煡鏃犵嚎缃戠粶涓竴绉嶅熀浜嶸CG鐨勫垎甯冨紡瀹夊叏棰戣氨鎰熺煡绛栫暐. 灏忓瀷寰瀷璁$畻鏈虹郴缁? 2016(6):1228-123 (B绫?4 澶忔湁鍗?鏋楁櫀,璁稿姏,鍛ㄨ档鏂? 鍩轰簬Core-Selecting鏈哄埗鐨勭墿鑱旂綉瀹夊叏璺敱鍗忚[J].璁$畻鏈虹郴缁熷簲鐢? 2016, 25(4):128-13 (B绫?4 鏉庢櫞,鍙堕樋鍕?璁稿姏. 鍏紬鐜涓嬫棤绾挎帴鍏ョ殑瀹夊叏闂鐮旂┒[J].淇℃伅缃戠粶瀹夊叏锛?016(4)锛?7-7 (B绫?4 寮犺豹,闄堥粠椋?閮含寰? 鍩轰簬绗﹀彿鐔电殑搴忓垪鐩镐技鎬у害閲忔柟娉昜J].璁$畻鏈哄伐绋?2016(5):201-20 (B绫?4 鑼冨畤鏉?闄堥粠椋?閮含寰? 涓€绉嶅尮閰嶅叏灞€缁撴瀯鐨勫浘鐩镐技鎬у害閲廩J].灏忓瀷寰瀷璁$畻鏈虹郴缁?2016(7):1488-149 (B绫?4 鑲栧墤宸?璁稿姏,鍙堕樋鍕?鏋椾附缇? 鍩轰簬Voronoi鍥剧殑璺綉杞ㄨ抗闅愮淇濇姢鐮旂┒[J].淇℃伅缃戠粶瀹夊叏, 2016(6):15-2 (B绫?4 鏂圭,璁稿姏,鑻忓浆搴? 璁ょ煡鏃犵嚎鐢电綉缁滀腑鍩轰簬闈炲悎浣滃崥寮堢殑闅愯揣甯佷氦鏄撴ā鍨媅J].灏忓瀷寰瀷璁$畻鏈虹郴缁? 2016(2):227-230. (B绫?4 闄堜附钀?閮含寰? 涓€绉嶅熀浜庨『搴忕壒鎬х殑瀛愮┖闂磋仛绫绘柟娉昜J].璁$畻鏈虹瀛?2016(3):72-7 (B绫?50. 鏉庢壙娆?鍙堕攱,娑傞挦,闄堝绁?璁稿姏. 闈㈠悜瑙嗛鍘嬬缉鐨勬樉钁楁€у崗鍚屾娴婮ND妯″瀷[J].璁$畻鏈虹郴缁熷簲鐢?2016(11):208-21 (B绫?5 鍛ㄨ档鏂?璁稿姏. 鍩轰簬鏁板瓧绛惧悕鐨勯槻姹℃煋缃戠粶缂栫爜鏂规[J].璁$畻鏈虹郴缁熷簲鐢? 2016, 25(6):185-190. (B绫?5 鍛ㄨ档鏂?璁稿姏,鏉庝笘鍞? 鍩轰簬CRC鐨勯槻姹℃煋缃戠粶缂栫爜鏂规[J].璁$畻鏈虹郴缁熷簲鐢? 2016, 25(1):101-10 (B绫?5 钂嬫,鐜嬪紑鍐?闄堥粠椋? 鍩轰簬DTW鍖归厤鐨勭矑瀛愭护娉㈡晠闅滈鎶J].璁$畻鏈虹郴缁熷簲鐢?016, 25(3):124-130. (B绫?5 鐢板仴,鐜嬪紑鍐?閮含寰?闄堥粠椋? 铻嶅悎閫熷害鐗瑰緛鐨勫帇缂╂劅鐭ョ洰鏍囪窡韪畻娉昜J].鍗椾含澶у瀛︽姤,2016锛?2(2): 149-15 (B绫?5 鏋楀搧涔?鐜嬪紑鍐? 鍩轰簬妯$硦闅跺睘搴︾殑绮掑瓙婊ゆ尝鏁呴殰棰勬祴[J].璁$畻鏈虹郴缁熷簲鐢?016, 25(6) :119-12 (B绫?5 寰愭案鎸?閮含寰?钄″浆褰?鏋楀揣. 鍩轰簬涓€缁翠笁鎬侀噺瀛愭父璧扮殑閲忓瓙鑱氱被绠楁硶[J].璁$畻鏈虹瀛?2016(3):80-8 (B绫?5 鏋楀皯鑱?鍙堕樋鍕?璁稿姏. 鍩轰簬鍧愭爣鍙樻崲鐨刱鍖垮悕浣嶇疆闅愮淇濇姢鏂规硶[J].灏忓瀷寰瀷璁$畻鏈虹郴缁?2016(1):119-12 (B绫?5 鏋楀缓杈?涓ュ杈?榛勬尝. 鍩轰簬SVD涓庢ā绯婅仛绫荤殑鍗忓悓杩囨护鎺ㄨ崘绠楁硶[J].璁$畻鏈虹郴缁熷簲鐢?2016(11):156-16 (B绫?5 鍏板ぉ,閮含寰? 鍩轰簬璇嶅叡鐜板叧绯诲拰绮楃硻闆嗙殑寰崥璇濋妫€娴嬫柟娉昜J].璁$畻鏈虹郴缁熷簲鐢?2016(6):17-2 (B绫?60. 榛勬尝,涓ュ杈?鏋楀缓杈? 鍩轰簬鑱斿悎闈炶礋鐭╅樀鍒嗚В鐨勫崗鍚岃繃婊ゆ帹鑽愮畻娉昜J].妯″紡璇嗗埆涓庝汉宸ユ櫤鑳?2016(8):725-73 (B绫?6 闊╁鏈?鏋楁櫀,榛勫窛. 鍩轰簬OOL璇硶鏍戠殑OOL娉ㄥ叆杩囨护鏂规硶鐮旂┒[J].缃戠粶涓庝俊鎭畨鍏ㄥ鎶? 2016, 2(11):70-7 (B绫?6 鏂圭, 璁稿姏, 鑻忓浆搴?绛? 澶氫俊閬撴棤绾跨綉缁滀腑绐冨惉涓庡共鎵版敾鍑荤殑瀵规姉绛栫暐[J].鍥涘窛澶у瀛︽姤(宸ョ▼绉戝鐗?, 2016, 48(1):119-12 (CSCD绫?6 鑻忓浆搴? 璁稿姏, 鏂圭,绛? 鍩轰簬 Diffie-HellOOn鐨勬棤绾縈esh缃戠粶蹇€熻璇佹満鍒禰J].灞变笢澶у瀛︽姤(鐞嗗鐗?, 2016, 51(9):101-10 (CSCD绫?6 闄堟棖, 璁稿姏, 寮犵編骞? 闈㈠悜寮傛瀯鐗╄仈缃戠殑杞婚噺绾х綉缁滄瀯寤哄眰璁捐[J].绂忓缓甯堝ぇ瀛︽姤(鑷劧绉戝鐗?, 2016(3):31-3 (CSCD绫?6 姹檽涓? 璁稿姏, 鍛ㄤ功鏄? 涓€绉嶅熀浜庡閿欏畾浣嶉泦鐨勫垎甯冨紡鏁呴殰璇婃柇涓庡畾浣嶇畻娉昜J].绂忓缓甯堝ぇ瀛︽姤(鑷劧绉戝鐗?, 2016(2):7-1 (CSCD绫?</p><p><img src=

銇熴伄銇椼亜 銇嗐倢銇椼亜

1銆侊拷锟斤拷锟斤拷锟斤拷锟今,达拷叶锟斤拷锟斤拷杀锟斤拷锟截伙拷哟锟斤拷锟斤拷锟斤拷陌桑锟斤拷锟斤拷锟叫达拷锟斤拷墓锟斤拷锟斤拷锟斤拷锟斤拷腔锟斤拷直锟接撅拷锟斤拷墓锟斤拷獭锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟绞裁达拷锟斤拷锟斤拷兀锟斤拷锟斤拷锟斤拷锟叫★拷锟斤拷占锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷绨踩拷锟斤拷模锟斤拷锟接拷锟揭凤拷锟斤拷锟斤拷

2銆侊拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷只锟绞憋拷锟斤拷牟锟斤拷锟斤拷平锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷应锟斤拷锟窖撅拷锟斤拷锟斤拷锟斤拷锟斤拷锟角碉拷锟秸筹拷锟斤拷锟斤拷锟叫★拷然锟斤拷锟斤拷锟斤拷锟街伙拷锟侥匡拷锟劫凤拷展也为锟金渐匡拷锟脚碉拷锟斤拷锟斤拷锟斤拷锟斤拷税锟饺拷锟斤拷狻o拷锟斤拷绨踩拷锟揭诧拷锟斤拷锟揭恍╋拷锟斤拷锟斤拷锟斤拷锟酵拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷系统锟斤拷硬锟斤拷锟斤拷锟叫癸拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷取锟斤拷锟桔革拷锟矫伙拷锟斤拷锟斤拷息锟斤拷锟斤拷锟较o拷锟斤拷锟斤拷锟斤拷些锟节客伙拷通锟斤拷锟斤拷锟斤拷锟斤拷锟秸┢拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷泄锟斤拷锟斤拷绨踩拷锟斤拷锟斤拷饪硷拷锟斤拷锟斤拷樱锟斤拷锟斤拷锟斤拷锟斤拷卸锟斤拷锟斤拷堑锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷一锟斤拷锟斤拷影锟届,同时也锟斤拷锟斤拷业锟侥财诧拷锟斤拷锟斤拷锟斤拷锟斤拷营锟斤拷锟斤拷锟接帮拷臁D壳帮拷锟斤拷锟斤拷锟斤拷锟斤拷锟较低筹拷母锟斤拷锟斤拷裕锟斤拷锟揭拷锟斤拷捉锟斤拷锟斤拷锟界安全锟斤拷锟解几锟斤拷锟斤拷锟斤拷锟杰o拷锟斤拷锟皆o拷锟斤拷锟斤拷没锟斤拷锟斤拷锟斤拷锟斤拷锟绞讹拷锟斤拷锟斤拷绨踩拷锟斤拷锟斤拷锟斤拷锟斤拷锟皆o拷锟斤拷锟斤拷锟斤拷锟斤拷梅锟斤拷锟斤拷锟绞╋拷锟?/p>

3銆侊拷锟斤拷锟斤拷锟斤拷绨踩拷锟斤拷氐锟斤拷锟斤拷锟斤拷锟较低筹拷谋锟斤拷锟斤拷裕锟斤拷锟酵拷锟斤拷锟斤拷锟斤拷锟斤拷息锟斤拷锟斤拷一锟斤拷锟解到锟狡伙拷锟酵达拷锟斤拷锟斤拷锟戒保锟斤拷锟皆碉拷锟截点。通锟斤拷锟斤拷锟斤拷锟斤拷息泄露锟斤拷途锟斤拷锟叫o拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷欠锟斤拷锟饺拷锟斤拷搿拷锟矫ワ拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟秸撅拷取锟揭伙拷锟斤拷没锟斤拷锟斤拷锟斤拷希锟斤拷锟揭伙拷锟斤拷探锟斤拷锟斤拷诓锟街拷锟斤拷锟斤拷薪锟斤拷校锟斤拷没锟斤拷锟斤拷锟较拷锟斤拷锟斤拷泄露锟斤拷直锟斤拷锟斤拷锟街猴拷锟斤拷锟斤拷薷锟铰╋拷锟斤拷锟斤拷锟较拷鄹锟斤拷锟街革拷锟斤拷锟斤拷锟斤拷锟酵拷锟斤拷锟斤拷锟斤拷锟斤拷姆锟绞斤拷锟斤拷锟斤拷没锟斤拷锟斤拷锟斤拷锟叫碉拷锟斤拷息锟斤拷锟斤拷锟睫改o拷锟斤拷锟斤拷通锟斤拷锟斤拷取锟矫伙拷锟斤拷息锟侥达拷锟捷斤拷锟斤拷锟睫革拷锟劫达拷锟捷革拷锟矫伙拷锟斤拷锟斤拷也锟角达拷锟斤拷锟斤拷锟街拷锟斤拷锟斤拷绨踩拷锟斤拷锟较拷锟斤拷锟斤拷浴锟?/p>

4銆侊拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟叫达拷锟斤拷迅锟劫★拷锟斤拷锟斤拷锟斤拷围锟姐、锟矫伙拷锟斤拷失锟斤拷锟斤拷氐恪o拷锟斤拷诒锟斤拷锟斤拷统锟斤拷锟斤拷锟矫拷锟斤拷锟侥筹拷锟斤拷锟窖撅拷锟矫癸拷锟斤拷没锟斤拷锟斤拷锟斤拷锟斤拷幔拷锟斤拷锟斤拷锟斤拷Wannacry锟斤拷强锟斤拷也锟矫癸拷锟斤拷没锟斤拷锟绞讹拷思锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷锟轿拷锟斤拷锟斤拷执锟斤拷锟斤拷锟斤拷锟斤拷全锟斤拷锟斤拷锟斤拷锟揭拷锟斤拷兀锟斤拷锟斤拷锟斤拷锟斤拷锟斤拷没锟斤拷锟斤拷氐锟斤拷注锟斤拷

后台-系统设置-扩展变量-手机广告位-内容正文底部

本文标签:in  ing

<< 上一篇 下一篇 >>

  • 评论(
  • 赞助本站

赞助团论文网
留言与评论(共有 0 条评论)
   
验证码:

相关文章

随机文章

标签列表

最近发表

    热门文章 | 最新文章 | 随机文章

最新留言

首页 论文知识 教育论文 毕业论文 教学论文 经济学 管理学 职称论文 法学 理学 医学 社会学 物理学 文献 工程论文 学位论文 研究论文

Powered 团论文网 版权所有 备案号:粤ICP备2022136924号-2统计代码

全站搜索