期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
Lightweight and Robust Android Ransomware Detection Using Behavioral Analysis and Feature Reduction
1
作者 Muhammad Sibtain Mehdi Hussain +3 位作者 Qaiser Riaz Sana Qadir Naveed Riaz Ki-Hyun Jung 《Computers, Materials & Continua》 2025年第9期5177-5199,共23页
Ransomware is malware that encrypts data without permission,demanding payment for access.Detecting ransomware on Android platforms is challenging due to evolving malicious techniques and diverse application behaviors.... Ransomware is malware that encrypts data without permission,demanding payment for access.Detecting ransomware on Android platforms is challenging due to evolving malicious techniques and diverse application behaviors.Traditional methods,such as static and dynamic analysis,suffer from polymorphism,code obfuscation,and high resource demands.This paper introduces a multi-stage approach to enhance behavioral analysis for Android ransomware detection,focusing on a reduced set of distinguishing features.The approach includes ransomware app collection,behavioral profile generation,dataset creation,feature identification,reduction,and classification.Experiments were conducted on∼3300 Android-based ransomware samples,despite the challenges posed by their evolving nature and complexity.The feature reduction strategy successfully reduced features by 80%,with only a marginal loss of detection accuracy(0.59%).Different machine learning algorithms are employed for classification and achieve 96.71%detection accuracy.Additionally,10-fold cross-validation demonstrated robustness,yielding an AUC-ROC of 99.3%.Importantly,latency and memory evaluations revealed that models using the reduced feature set achieved up to a 99%reduction in inference time and significant memory savings across classifiers.The proposed approach outperforms existing techniques by achieving high detection accuracy with a minimal feature set,also suitable for deployment in resource-constrained environments.Future work may extend datasets and include iOS-based ransomware applications. 展开更多
关键词 Ransomware behavioral analysis Android ransomware feature reduction machine learning
在线阅读 下载PDF
Mechanism of Thermally Radiative Prandtl Nanofluids and Double-Diffusive Convection in Tapered Channel on Peristaltic Flow with Viscous Dissipation and Induced Magnetic Field
2
作者 Yasir Khan Safia Akram +3 位作者 Maria Athar Khalid Saeed Alia Razia A.Alameer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1501-1520,共20页
The application of mathematical modeling to biological fluids is of utmost importance, as it has diverse applicationsin medicine. The peristaltic mechanism plays a crucial role in understanding numerous biological flo... The application of mathematical modeling to biological fluids is of utmost importance, as it has diverse applicationsin medicine. The peristaltic mechanism plays a crucial role in understanding numerous biological flows. In thispaper, we present a theoretical investigation of the double diffusion convection in the peristaltic transport of aPrandtl nanofluid through an asymmetric tapered channel under the combined action of thermal radiation andan induced magnetic field. The equations for the current flow scenario are developed, incorporating relevantassumptions, and considering the effect of viscous dissipation. The impact of thermal radiation and doublediffusion on public health is of particular interest. For instance, infrared radiation techniques have been used totreat various skin-related diseases and can also be employed as a measure of thermotherapy for some bones toenhance blood circulation, with radiation increasing blood flow by approximately 80%. To solve the governingequations, we employ a numerical method with the aid of symbolic software such as Mathematica and MATLAB.The velocity, magnetic force function, pressure rise, temperature, solute (species) concentration, and nanoparticlevolume fraction profiles are analytically derived and graphically displayed. The results outcomes are compared withthe findings of limiting situations for verification. 展开更多
关键词 Double diffusion convection thermal radiation induced magnetic field peristaltic flow tapered asymmetric channel viscous dissipation Prandtl nanofluid
在线阅读 下载PDF
Performance Enhancement of Praseodymium Doped Fiber Amplifiers 被引量:1
3
作者 Abdullah G.Alharbi Jawad Mirza +1 位作者 Mehak Raza Salman Ghafoor 《Computers, Materials & Continua》 SCIE EI 2022年第12期5411-5422,共12页
In this paper,we report a simulation study on the performance enhancement of Praseodymium doped silica fiber amplifiers(PDFAs)in O-band(1270-1350 nm)in terms of small signal gain,power conversion efficiency(PCE),and o... In this paper,we report a simulation study on the performance enhancement of Praseodymium doped silica fiber amplifiers(PDFAs)in O-band(1270-1350 nm)in terms of small signal gain,power conversion efficiency(PCE),and output optical power by employing bidirectional pumping.The PDFA performance is examined by optimizing the length of Praseodymium doped silica fiber(PDF),its mode-field diameter(MFD)and the concentration of Pr^(3+).A small-signal peak gain of 56.4 dB,power conversion efficiency(PCE)of 47%,and output optical power of around 1.6 W(32 dBm)is observed at optimized parameters for input signal wavelength of 1310 nm.Minimum noise figure(NF)of 4.1 dB is observed at input signal wavelength of 1310 nm.Moreover,the effect of varying the pump wavelength and pump power on output optical power of the amplifier and amplified spontaneous emission(ASE)noise is also investigated,respectively.Finally,the impact of ion-ion interaction(up-conversion effect)on small-signal gain of the amplifier is also studied by considering different values of up-conversion coefficient. 展开更多
关键词 Praseodymium-doped fiber doped fiber amplifiers optical amplification mode field diameter noise figure
在线阅读 下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
4
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
Recurrent Convolutional Neural Network MSER-Based Approach for Payable Document Processing 被引量:1
5
作者 Suliman Aladhadh Hidayat Ur Rehman +1 位作者 Ali Mustafa Qamar Rehan Ullah Khan 《Computers, Materials & Continua》 SCIE EI 2021年第12期3399-3411,共13页
A tremendous amount of vendor invoices is generated in the corporate sector.To automate the manual data entry in payable documents,highly accurate Optical Character Recognition(OCR)is required.This paper proposes an e... A tremendous amount of vendor invoices is generated in the corporate sector.To automate the manual data entry in payable documents,highly accurate Optical Character Recognition(OCR)is required.This paper proposes an end-to-end OCR system that does both localization and recognition and serves as a single unit to automate payable document processing such as cheques and cash disbursement.For text localization,the maximally stable extremal region is used,which extracts a word or digit chunk from an invoice.This chunk is later passed to the deep learning model,which performs text recognition.The deep learning model utilizes both convolution neural networks and long short-term memory(LSTM).The convolution layer is used for extracting features,which are fed to the LSTM.The model integrates feature extraction,modeling sequence,and transcription into a unified network.It handles the sequences of unconstrained lengths,independent of the character segmentation or horizontal scale normalization.Furthermore,it applies to both the lexicon-free and lexicon-based text recognition,and finally,it produces a comparatively smaller model,which can be implemented in practical applications.The overall superior performance in the experimental evaluation demonstrates the usefulness of the proposed model.The model is thus generic and can be used for other similar recognition scenarios. 展开更多
关键词 Character recognition text spotting long short-term memory recurrent convolutional neural networks
在线阅读 下载PDF
Dates Fruit Recognition: From Classical Fusion to Deep Learning 被引量:1
6
作者 Khaled Marji Alresheedi Suliman Aladhadh +1 位作者 Rehan Ullah Khan Ali Mustafa Qamar 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期151-166,共16页
There are over 200 different varieties of dates fruit in the world.Interestingly,every single type has some very specific features that differ from the others.In recent years,sorting,separating,and arranging in automa... There are over 200 different varieties of dates fruit in the world.Interestingly,every single type has some very specific features that differ from the others.In recent years,sorting,separating,and arranging in automated industries,in fruits businesses,and more specifically in dates businesses have inspired many research dimensions.In this regard,this paper focuses on the detection and recognition of dates using computer vision and machine learning.Our experimental setup is based on the classical machine learning approach and the deep learning approach for nine classes of dates fruit.Classical machine learning includes the Bayesian network,Support Vector Machine,Random Forest,and Multi-Layer Perceptron(MLP),while the Convolutional Neural Network is used for the deep learning set.The feature set includes Color Layout features,Fuzzy Color and Texture Histogram,Gabor filtering,and the Pyramid Histogram of the Oriented Gradients.The fusion of various features is also extensively explored in this paper.The MLP achieves the highest detection performance with an F-measure of 0.938.Moreover,deep learning shows better accuracy than the classical machine learning algorithms.In fact,deep learning got 2%more accurate results as compared to the MLP and the Random forest.We also show that classical machine learning could give increased classification performance which could get close to that provided by deep learning through the use of optimized tuning and a good feature set. 展开更多
关键词 features Deep SEPARATING
在线阅读 下载PDF
户县农民画 被引量:2
7
作者 杨浪 《地图》 2011年第2期140-140,共1页
我国的民间艺术源远流长,其中,尽显关中风情的陕西户县农民画尤以其独特的艺术风格受到世人的关注与喜爱。其实,户县农民画的影响早已远播海外,30多年前大约是它声名的一个顶峰:
关键词 农民 户县 民间艺术 艺术风格 关中
在线阅读 下载PDF
将证券市场引入中国 被引量:1
8
作者 王波明 《财经》 2008年第7期128-129,共2页
对于中国的改革而言,资本市场的创立突破了“摸着石头过河”的模式,它遵循“拿来主义”,借鉴了国外成熟市场的经验,起点很高。
关键词 证券市场 中国 “拿来主义” 资本市场 成熟市场 经验
在线阅读 下载PDF
永定门的尴尬 被引量:1
9
作者 杨浪 《地图》 2010年第6期144-144,共1页
老北京“内九外七”共16座城门现在存留的只有:正阳门城楼,正阳门箭楼,德胜门箭楼,另外还有复建的永定门。
关键词 永定 正阳门 城楼 城门 复建
在线阅读 下载PDF
终于见到赝品老图了 被引量:1
10
作者 杨浪 《地图》 2011年第1期138-138,共1页
星期天去报国寺,一个小伙子的摊上有一幅《大清天下中华各省府州县厅分布全图》,纸质,四条屏,看似木板印刷,纸边有残,左图上角有“乾隆二十五年”字样。小伙开价800,最后竞还到100,于是本来就生疑惑的我索性放下,小伙还在背后悻悻地... 星期天去报国寺,一个小伙子的摊上有一幅《大清天下中华各省府州县厅分布全图》,纸质,四条屏,看似木板印刷,纸边有残,左图上角有“乾隆二十五年”字样。小伙开价800,最后竞还到100,于是本来就生疑惑的我索性放下,小伙还在背后悻悻地埋怨“看你就没诚心要”。之后来到潘家园老张头的摊上,居然也挂着那么一幅。老张说:“开价600,要是您要,100也成。” 展开更多
关键词 赝品 收藏品 收藏家 图版
在线阅读 下载PDF
Neural Machine Translation Models with Attention-Based Dropout Layer
11
作者 Huma Israr Safdar Abbas Khan +3 位作者 Muhammad Ali Tahir Muhammad Khuram Shahzad Muneer Ahmad Jasni Mohamad Zain 《Computers, Materials & Continua》 SCIE EI 2023年第5期2981-3009,共29页
In bilingual translation,attention-based Neural Machine Translation(NMT)models are used to achieve synchrony between input and output sequences and the notion of alignment.NMT model has obtained state-of-the-art perfo... In bilingual translation,attention-based Neural Machine Translation(NMT)models are used to achieve synchrony between input and output sequences and the notion of alignment.NMT model has obtained state-of-the-art performance for several language pairs.However,there has been little work exploring useful architectures for Urdu-to-English machine translation.We conducted extensive Urdu-to-English translation experiments using Long short-term memory(LSTM)/Bidirectional recurrent neural networks(Bi-RNN)/Statistical recurrent unit(SRU)/Gated recurrent unit(GRU)/Convolutional neural network(CNN)and Transformer.Experimental results show that Bi-RNN and LSTM with attention mechanism trained iteratively,with a scalable data set,make precise predictions on unseen data.The trained models yielded competitive results by achieving 62.6%and 61%accuracy and 49.67 and 47.14 BLEU scores,respectively.From a qualitative perspective,the translation of the test sets was examined manually,and it was observed that trained models tend to produce repetitive output more frequently.The attention score produced by Bi-RNN and LSTM produced clear alignment,while GRU showed incorrect translation for words,poor alignment and lack of a clear structure.Therefore,we considered refining the attention-based models by defining an additional attention-based dropout layer.Attention dropout fixes alignment errors and minimizes translation errors at the word level.After empirical demonstration and comparison with their counterparts,we found improvement in the quality of the resulting translation system and a decrease in the perplexity and over-translation score.The ability of the proposed model was evaluated using Arabic-English and Persian-English datasets as well.We empirically concluded that adding an attention-based dropout layer helps improve GRU,SRU,and Transformer translation and is considerably more efficient in translation quality and speed. 展开更多
关键词 Natural language processing neural machine translation word embedding ATTENTION PERPLEXITY selective dropout regularization URDU PERSIAN Arabic BLEU
在线阅读 下载PDF
ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing
12
作者 Ayesha Riaz Naveed Riaz +4 位作者 Awais Mahmood Sajid Ali Khan Imran Mahmood Omar Almutiry Habib Dhahri 《Computers, Materials & Continua》 SCIE EI 2021年第6期2747-2764,共18页
The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems.Such systems employ the latest mobile an... The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems.Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider,easy mobility,easy access,consistent patient engagement,and cost-effectiveness.Any leakage or unauthorized access to users’medical data can have serious consequences for any medical information system.The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks like spoong,replay,Masquerade,and stealing of stored templates.In this article,we propose a new cancelable biometric approach which has tentatively been named as“Expression Hash”for Telecare Medical Information Systems.The idea is to hash the expression templates with a set of pseudo-random keys which would provide a unique code(expression hash).This code can then be serving as a template for verication.Different expressions would result in different sets of expression hash codes,which could be used in different applications and for different roles of each individual.The templates are stored on the server-side and the processing is also performed on the server-side.The proposed technique is a multi-factor authentication system and provides advantages like enhanced privacy and security without the need for multiple biometric devices.In the case of compromise,the existing code can be revoked and can be directly replaced by a new set of expression hash code.The well-known JAFFE(The Japanese Female Facial Expression)dataset has been for empirical testing and the results advocate for the efcacy of the proposed approach. 展开更多
关键词 BIOMETRICS TMIS biohashing multifactor authentication medical information system
在线阅读 下载PDF
Thermally stratified flow of hybrid nanofluids with radiative heat transport and slip mechanism: multiple solutions
13
作者 Rai Sajjad Saif Hashim +1 位作者 Maria Zaman Muhammad Ayaz 《Communications in Theoretical Physics》 SCIE CAS CSCD 2022年第1期142-151,共10页
Research on flow and heat transfer of hybrid nanofluids has gained great significance due to their efficient heat transfer capabilities.In fact,hybrid nanofluids are a novel type of fluid designed to enhance heat tran... Research on flow and heat transfer of hybrid nanofluids has gained great significance due to their efficient heat transfer capabilities.In fact,hybrid nanofluids are a novel type of fluid designed to enhance heat transfer rate and have a wide range of engineering and industrial applications.Motivated by this evolution,a theoretical analysis is performed to explore the flow and heat transport characteristics of Cu/Al_(2)O_(3) hybrid nanofluids driven by a stretching/shrinking geometry.Further,this work focuses on the physical impacts of thermal stratification as well as thermal radiation during hybrid nanofluid flow in the presence of a velocity slip mechanism.The mathematical modelling incorporates the basic conservation laws and Boussinesq approximations.This formulation gives a system of governing partial differential equations which are later reduced into ordinary differential equations via dimensionless variables.An efficient numerical solver,known as bvp4c in MATLAB,is utilized to acquire multiple(upper and lower)numerical solutions in the case of shrinking flow.The computed results are presented in the form of flow and temperature fields.The most significant findings acquired from the current study suggest that multiple solutions exist only in the case of a shrinking surface until a critical/turning point.Moreover,solutions are unavailable beyond this turning point,indicating flow separation.It is found that the fluid temperature has been impressively enhanced by a higher nanoparticle volume fraction for both solutions.On the other hand,the outcomes disclose that the wall shear stress is reduced with higher magnetic field in the case of the second solution.The simulation outcomes are in excellent agreement with earlier research,with a relative error of less than 1%. 展开更多
关键词 multiple numerical solutions hybrid nanofluids thermal radiation thermal stratification slip conditions heat transfer
原文传递
Isolation Enhancement in a Compact Four-Element MIMO Antenna for Ultra-Wideband Applications
14
作者 Awais Khan Shahid Bashir +3 位作者 Salman Ghafoor Hatem Rmili Jawad Mirza Ammar Ahmad 《Computers, Materials & Continua》 SCIE EI 2023年第4期911-925,共15页
Mutual coupling reduction or isolation enhancement in antenna arrays is an important area of research as it severely affects the performance of an antenna.In this paper,a new type of compact and highly isolated Multip... Mutual coupling reduction or isolation enhancement in antenna arrays is an important area of research as it severely affects the performance of an antenna.In this paper,a new type of compact and highly isolated Multiple-Input-Multiple-Output(MIMO)antenna for ultra-wideband(UWB)applications is presented.The design consists of four radiators that are orthogonally positioned and confined to a compact 40×40×0.8 mm3 space.The final antenna design uses an inverted L shape partial ground to produce an acceptable reflection coefficient(S11<−10 dB)in an entire UWB band(3.1–10.6)giga hertz(GHz).Moreover,the inter-element isolation has also been enhanced to>20 db for majority of the UWB band.The antenna was fabricated and tested with the vector network analyzer(VNA)and in an anechoic chamber for scattering parameters and radiation patterns.Furthermore,different MIMO diversity performance metrics are also measured to validate the proposed model.The simulation results and the experimental results from the constructed model agree quite well.The proposed antenna is compared with similar designs in recently published literature for various performance metrics.Because of its low envelope correlation coefficient(ECC<0.1),high diversity gain(DG>9.99 dB),peak gain of 4.6 dB,reduced channel capacity loss(CCL<0.4 b/s/Hz),and average radiation efficiency of over 85%,the proposed MIMO antenna is ideally suited for practical UWB applications. 展开更多
关键词 Multiple input multiple output antennas envelope correlation coefficient defected ground structure ultra wide band diversity gain
在线阅读 下载PDF
Developing Engagement in the Learning Management System Supported by Learning Analytics
15
作者 Suraya Hamid Shahrul Nizam Ismail +1 位作者 Muzaffar Hamzah Asad W.Malik 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期335-350,共16页
Learning analytics is an emerging technique of analysing student par-ticipation and engagement.The recent COVID-19 pandemic has significantly increased the role of learning management systems(LMSs).LMSs previously only... Learning analytics is an emerging technique of analysing student par-ticipation and engagement.The recent COVID-19 pandemic has significantly increased the role of learning management systems(LMSs).LMSs previously only complemented face-to-face teaching,something which has not been possible between 2019 to 2020.To date,the existing body of literature on LMSs has not analysed learning in the context of the pandemic,where an LMS serves as the only interface between students and instructors.Consequently,productive results will remain elusive if the key factors that contribute towards engaging students in learning are notfirst identified.Therefore,this study aimed to perform an exten-sive literature review with which to design and develop a student engagement model for holistic involvement in an LMS.The required data was collected from an LMS that is currently utilised by a local Malaysian university.The model was validated by a panel of experts as well as discussions with students.It is our hope that the result of this study will help other institutions of higher learning determine factors of low engagement in their respective LMSs. 展开更多
关键词 Engagement analysis learning analytics learning management system student engagement
在线阅读 下载PDF
《申报》地图:中国地图出版的里程碑
16
作者 杨浪 《中国测绘》 2009年第1期76-77,共2页
关注中国地图的出版就不能不关注《申报》地图,因为它实在是中国地图史上一个重要的里程碑式的版本。
关键词 地图出版 中国地图 里程 申报 地图史
在线阅读 下载PDF
居然还有这么一支歌!
17
作者 杨浪 《地图》 2009年第2期144-144,共1页
30多年前,有200多人在纽约集会要求实现美中关系正常化,这事居然上了《人民日报》。而且,我是在这篇30多年前的报道中才知道,那时居然有一首英文歌曲叫做《期望美中关系正常化》!
关键词 《期望美中关系正常化》 英文歌 音乐艺术 张越南
在线阅读 下载PDF
普利策与“终极关怀”
18
作者 杨浪 《地图》 2009年第1期144-144,共1页
观察并且记录一个年轻生命死亡的全过程是个很残酷的事情。对于中国读者尤其是这样,大约由于文化中对死亡的禁忌与恐惧,我们几乎没有看到中国摄影师以如此手法拍摄同类题材。而对“此岸”与“彼岸”世界的解释是每一个宗教都要回答的... 观察并且记录一个年轻生命死亡的全过程是个很残酷的事情。对于中国读者尤其是这样,大约由于文化中对死亡的禁忌与恐惧,我们几乎没有看到中国摄影师以如此手法拍摄同类题材。而对“此岸”与“彼岸”世界的解释是每一个宗教都要回答的问题。儒教注重现世,佛教讲究报应,基督教文明则敬奉着那座钉在十字架上的神明。这或许已经明示了某种文化差异。 展开更多
关键词 终极关怀 文化差异 全过程 摄影师 十字架 基督教 死亡 中国
在线阅读 下载PDF
乐亭:民间说唱之乡
19
作者 杨浪 《地图》 2011年第3期140-140,共1页
这是一幅20世纪30年代的乐亭地图。从这幅图上看,在过去的80年里该县的县域变化不大。本图编制于1931年,当时的乐亭县有1214平方公里,335433口人,这在当时也算大县了。作为大县的乐亭在教育上也比较"发达",共有各类学校约200所,包括... 这是一幅20世纪30年代的乐亭地图。从这幅图上看,在过去的80年里该县的县域变化不大。本图编制于1931年,当时的乐亭县有1214平方公里,335433口人,这在当时也算大县了。作为大县的乐亭在教育上也比较"发达",共有各类学校约200所,包括师范、民办的各种中小学校。这些学校里一定有一所是李大钊的母校,李就是本县大黑坨村人。 展开更多
关键词 民间 中小学校 乐亭县 李大钊 师范
在线阅读 下载PDF
运河图给我上了一课
20
作者 杨浪 《地图》 2010年第1期142-142,共1页
中国地图出版社出版了一函《清代京杭运河全图》。光看这一掌盈握的装帧就够让人喜欢的了:藤草纹的云锦套封,折叠装的一卷长图,展开了有7米多长!罕见的老图,罕见的装帧。
关键词 中国地图出版社 河图 京杭运河 装帧 全图
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部