基于arm9的嵌入式電子文檔_第1頁(yè)
已閱讀1頁(yè),還剩17頁(yè)未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、<p><b>  東北大學(xué)軟件學(xué)院</b></p><p>  畢業(yè)設(shè)計(jì)(論文)外文參考資料</p><p><b>  (原文與譯文)</b></p><p>  外文題目:ARM9 Based Embedded E-Documentation</p><p>  中文題目:基于ARM

2、9的嵌入式電子文檔</p><p>  作 者:Sachin S. Taware,Sanjay G. Galande等</p><p><b>  專 業(yè): </b></p><p><b>  班 級(jí):</b></p><p><b>  學(xué) 號(hào):</b&g

3、t;</p><p><b>  姓 名: </b></p><p>  2012年5月20日</p><p>  ARM9 Based Embedded E-Documentation</p><p>  Sachin S. Taware, Sanjay G. Galande, Sachin D. Anap, A

4、mruta M. Kulkarni, Mahesh D. Nirmal, T.A.More</p><p><b>  Abstract</b></p><p>  Among the huge population of India many people facing the headache of the government documents. Unwill

5、ingly they have to pay extra money and extra time for these documents though it is our basic right to get it free and urgent! This project is proposed to achieve the main goals of anti-corruption system for government do

6、cuments needed for common people in day to day life. Our project basically includes four main parts, a fingerprint detector, ARM-9 control unit, PC with touch screen GUI and inte</p><p>  Index Terms—ARM9, A

7、TM, E-Documentation, GUI, UID,</p><p>  Introduction </p><p>  In the developing nation like India, the corruption is main economy problem. We can see the bribe taking corrupted officers and man

8、y government & private administrative peoples. The legal documents in day to day life are purposefully delayed by such people even though to get these documents on time is our basic right. Then our mind start to thin

9、k somewhere that why should we pay for our right? What happen if all these system become an electronic & automated?</p><p>  A.Brief History</p><p>  The ATM machine is the most used equipm

10、ent in public domain which is invented for easy money transaction and amount detailing at user side and banking section well. The Idea of very first electronics documentation for public domain is implemented in the decad

11、e 1970 in US for telephone and banking sectors. Further it is carried by most of the European countries for public domain.</p><p>  The breeze of this technology is flown in eastern countries late in 1990s.

12、china, Japan and India consequently are the countries adapted fast for these technologies. [1] Now we can see the miracle of the same!</p><p>  B. Recent trends & developments in E-documentation </p&g

13、t;<p>  The US, UK, Russia and many others western countries are keeping the electronic record of citizens for their security and smooth central documentation. The United States with the help of such records imple

14、ments various public development policies. Also the agriculture, government documentation, traffic control, tragedy control, security, domestic facility and population control etc. are traced by these records.[6] The mai

15、n advantage of such documentation is taken by their citizens for smooth gov</p><p>  II.Theoretical Details And Analysis</p><p>  A.Theoretical Review of E-Documentation</p><p>  

16、The frustration of bribe for government documents force to think us about some automated system. The idea of our project is output of all such frustrations and media awarance. Here we are going to implement a project in

17、which the system is able to detect the unique finger print of a person who is in need of such documents and accordingly it will immediately provides the necessary documents in printed format without any payment to respec

18、tive officer. This can be implemented in “Talhati office” fr</p><p>  In this project the fingerprint module will be used. It can store number of finger prints on its own memory at a time. It can be controll

19、ed through its serial port.</p><p>  The microcontroller ARM9 interacts with the module. You can add a fingerprint, Delete a fingerprint and identify the fingerprint. To add a fingerprint, just show the fing

20、er on the module and press the ADD key. Now the microcontroller will send the ADD command to the module and the module will add it into the memory. To delete the finger follow the same as above. To identify the finger, p

21、ress the Identify button and if the finger matches then the Relay is complemented. Also the fingerprint ID is </p><p>  B.Analytical review of E-Documentation</p><p>  When the code assigned to

22、 particular matched fingerprint is given to the Pc via serial communication; the Pc software made in VB/oracle will automatically open the personal account of detected person. The low cost touch screen is available on mo

23、nitor screen, by selecting the particular option related to whatever document we need it will display on the screen. If we want to print this document then print command will also be available for each account. In short

24、our system is fully automated antic</p><p>  C.Possibility of Implementation</p><p>  Our society is now well aware of ATM banking. The key features of project like smartcard and biometric pers

25、on identification make this system possible to implement even at remote level. The similar procedure like ATM banking is included in the E-documentation system which will allow user to produce the confidential documents

26、related to his/her record in hard or soft format. Also the highest security provided by biometric and unique ID will serve the purpose to avoid the misuse of such important </p><p>  D.System description<

27、;/p><p>  The E-documentation system consist of four modules, each of these is function dependant and interconnected to each other to form a complete system. Each module has its own significance thus need to be

28、 work synchronously with another one. The system is divided into following parts.</p><p>  1)User Identification module</p><p>  2)ARM-9 control module.</p><p>  3)GUI and Printi

29、ng module.</p><p>  4)Networking module.</p><p>  Each of the above consists of one or more than one electronic subpart that will be discussed in detail later in this section. Before starting w

30、ith detail description we should understand that E-documentation is public application of ATM subsystems and it is not an ATM machine. The far advance and smarter use of biometrics and UID concepts make it a fabulous use

31、r friendly system. The key advance feature of automated working increases its applicability and intensive use at user end. Let we discuss</p><p>  E. User Identification module</p><p>  The User

32、 Identification module (UIM) is the basic man machine interface which is used to trace the identity of the user and provides a secure access to important government documents. Since each person who needs documents should

33、 not conflict with identity of another person each of them needs unique identity. The identity of the person in our system is decided using two basic signatures, one is figure print and another is unique identification n

34、umber provided to each person.</p><p>  F.Biometric Identification using Finger print module</p><p>  The figure print detection module is the basic important module for user identification whi

35、ch generates the binary data by scanning the finger print loops. Fingerprint of any two persons cannot be same at anytime, anywhere and anyhow! Thus the unique biometric identity of a person differentiates it from other

36、humans. The biometric fingerprint system scans and stores large amount of fingerprints by assigning them a unique ID number. Also the data related to each finger can be serially accessed to</p><p>  G. Uni

37、que Identification (UID) using smartcard</p><p>  The UID is the number assigned to each of the user which is non-transferable and unique.[6] The 16-digit UID consist of a smart chip. Multi-factor and proxim

38、ity authentication can and has been embedded into smart cards to increase the security of all services on the card. For example, a smart card can be programmed to only allow a contactless transaction if it is also within

39、 range of another device like a uniquely paired mobile phone. This can significantly increase the security of the smart car</p><p>  These savings are passed onto society through a reduction in the necessary

40、 funding or enhanced public services.</p><p>  Individuals gain increased security and convenience when using smart cards designed for interoperability between services. For example, consumers only need to r

41、eplace one card if their wallet is lost or stolen. Additionally, the data storage available on a card could contain medical information that is critical in an emergency should the card holder allow access to this. Today’

42、s smart card with ferroelectric memory and advance recording technique can store data up to 256KB. In our system 16 digi</p><p>  1)1-digit: security bit.</p><p>  2)5-digit: User code.</p&

43、gt;<p>  3)2-digit: Village/city code.</p><p>  4)2-digit: Taluka code.</p><p>  5)2-digit: District code.</p><p>  6)2-digit: State code.</p><p>  7)2-digi

44、t: country code.</p><p>  Using this ID any user can be identified easily if this 16-digit code is matched with fingerprint data-code.</p><p>  H.ARM-9 control module</p><p>  In o

45、ur system ARM control module plays a vital role since it is the heart of all data processing structure. Here, we use ARM9 centrally to compare the fingerprint data and code assigned to it with data code coming serially/p

46、arallel from smart card sub-module. If the match is found, the user is authenticated and will be allowed for further access of E-documentation system.</p><p>  ARM-9 is an ARM architecture 32-bit R ISC CPU f

47、amily. With this design generation, ARM moved from a von Neumann architecture (Princeton architecture) to a Harvard architecture with separate instruction and data buses (and caches), significantly increasing its potenti

48、al speed. Most silicon chips integrating these cores will package them as modified Harvard architecture chips, combining the two address buses on the other side of separated CPU caches and tightly coupled memories.</p

49、><p>  The ARM9? processor family enables single processor solutions for microcontroller, DSP and Java applications, offering savings in chip area and complexity, power consumption, and time-to-market. The ARM9

50、 DSP-enhanced processors are well suited for applications requiring a mix of DSP and microcontroller performance.</p><p>  I.GUI and Printing module </p><p>  After confirmation of authenticati

51、on of user the data access simply by touch to the panel with glass window is provided in E-documentation system. The GUI is displayed on the touch screen module which is connected to PC. Touch panel provides the mouse cl

52、ick access to the user without delay.[4]</p><p>  J.Networking module</p><p>  The fingerprint and UID signature is compare online with the server database and if match is found then the access

53、 bit becomes active. The option window will be pop up which will show various options to the user as mentioned above. The documentation may either in soft format or there will be certain option to get these into hard cop

54、y format. The scanned copies of all these documents with necessary signature of authorized officer are previously uploaded onto the account of the respective user. Ne</p><p>  III. SOFTWARE ARCHITECTURE AND

55、ALGORITHMS</p><p>  A.Working of System</p><p>  India is a developing nation, but the corruption is main problem in front of us. We can see the bribe taking corrupted officers and many governm

56、ent & private administrative peoples in day to day life. Even the legal documentation needed in day to day life is also purposefully delayed by such people even though to get these documents on time is our basic righ

57、t. Then our mind tries to think that why should we pay for our right? If all these system become an electronic & automated then what happen?</p><p>  This can be implemented in “Government office” from w

58、here we need to take many important documents like Cast Certificate, Nationality, Income Certificate, 7/12 details, Agricultural area proof, Proof of Residence etc.</p><p>  We have to collect all informatio

59、n about each person with its Fingerprints stored into a database then this system is to be displayed in the public where anyone can easily access the system.</p><p>  When a user have desire to take his nati

60、onality certificate then he just had to touch his thumb on thumb Detector. If you are authorized then user enters in system and shows his Certificate titles. If user unauthorized then user not enter in database.</p>

61、;<p>  In this project the fingerprint module from Physical Biometrics is used. It can store up to 200 finger prints on its own memory.</p><p>  You can Add fingerprint, Delete fingerprint and Search

62、operation can performed on it. To add a fingerprint, just touch the finger on the module and press the ADD key. Now the microcontroller will send the ADD command know this finger add into Database. To delete the finger t

63、hen go to Database and remove the fingerprint same as search. This authority provide by only Administrator not user.</p><p>  These utilize fingerprint recognition technology to allow access to only those wh

64、ose fingerprints you choose or only authorized user. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked.</p><p

65、>  The code assigned to particular matched fingerprint is given to the Database. the software made in java will automatically open the personal account of detected person.</p><p>  The low cost touch scre

66、en is available on monitor screen, by selecting the particular option related to whatever document we need it will display on the screen.</p><p>  This project will help for better communication between gove

67、rnment schemes and people.</p><p>  Show Government scheme’s available for that user.</p><p>  If we want to print this document then print and cancel command will be available for each account.

68、</p><p>  B.Front end and Back end design</p><p>  1)Front End</p><p>  On the front end side Java software is used. It provides the tabular information. This helps in providing t

69、he Government office in a sophisticated fashion. The Java code are embedded in a single page. Before the actual coding, all the required name space and libraries required for the code are called in using an import statem

70、ent.</p><p>  2).Back End</p><p>  Microsoft Access is used as the back end where the tables are created on the database. There are two tables, one for registered user table and information tab

71、le. The structure of the field and data type is provided in the table design. An authenticated access is provided to the database. All the information given when a new user signs up is captured in this database. Whenever

72、 the user logs in, the credentials are authenticated with the server and ensure further progress to the other pages. Users</p><p>  IV. Advantages and Future Scope</p><p>  A.Advantages of the

73、E-documentation System</p><p>  1)All data records are keeping digitally and Provide certificate in Digital format.</p><p>  2)This project will help for better communication between governmen

74、t schemes and people.</p><p>  3)Somehow corruption will be controlled.</p><p>  4)Time will be saved for long Government procedures.</p><p>  5)Nations safety will be increased

75、due to unique ID.</p><p>  6)Thumb impression will provide more safety to each account.</p><p>  7)Documentation is easier than existing system.</p><p>  8)Reduce Human resources

76、 and Save time.</p><p>  9)Record keeping is much easier than existing system.</p><p>  10)Data is easily accessible for the users.</p><p>  B.Challenges in front of E-documentat

77、ion system</p><p>  1)Collection of data and its storage across the</p><p><b>  country.</b></p><p>  2)Database management and security.</p><p>  3)High

78、 speed dedicated networking.</p><p>  4)Awarance about E-documentation</p><p>  C.Future scope</p><p>  E-documentation system can be an advance system which may implemented for t

79、he detail documentation of the citizens like, birth certificate, online results, college/school registration, and university registration, medical database storage, criminal report storage, cast certificates etc. Also, a

80、griculture related government schemes can be easily be reached to the farmers</p><p>  V. Conclusion</p><p>  The government documents are most important and frequently used things in day to day

81、 life. Hence a large number of users needs authorized certificates so that they can access certificate digitally and can easily get hard copy of certificate. The existing electronics storage systems are complicated and n

82、ot reliable to handle such huge amount of data. Managing all this stuff and saving all the data is very difficult task. So we are going to develop an e-documentation system for government document</p><p>  E

83、-documentation is easier than existing system and reduced human resources as well as time and money saving will make it most fascinating system soon.</p><p>  REFERENCES</p><p>  [1]“E-Governan

84、ce Strategy in India” White Paper, by Sameer</p><p>  Sachdeva, Dec 2002, pages 1 to 35. </p><p>  [2] “E-Governance and Best Practices”, Survey paper by government of India, Annex 6.3.1,year 2

85、008 helps to understand the concept and regional limitations on E-governance in India.</p><p>  [3]“E-Governance in India: Dream or reality?” By Mrinalini</p><p>  Shah, International Journal o

86、f Education and Development using Information and Communication Technology (IJEDICT), 2007, Vol. 3, Issue 2, pp. 125-137.</p><p>  [4]“ATM terminal design is based on fingerprint recognition”, By</p>

87、<p>  Yun Yang & JiaMi, 2010 2nd International IEEE Conference on Computer Engineering and Technology, paper code 978-1-4244-6349-7.</p><p>  [5]Raza, V. Hugue, “Application of Touch Screen techno

88、logy”,</p><p>  IEEE Trans. Technology, February 1999.</p><p>  [6]B. J. Shin et al., “Design of Thumb Detector, IDEC Conf. 2002.</p><p>  [7]“Promoting E-Governance”, Government

89、Of India, Second</p><p>  Administrative Reforms Commission, Eleventh Report,</p><p>  December 2008.基于ARM9的嵌入式電子文檔</p><p>  Sachin S. Taware, Sanjay G. Galande, Sachin D. Anap, Amr

90、uta M. Kulkarni, Mahesh D. Nirmal, T.A.More</p><p><b>  摘要</b></p><p>  由于印度龐大的人口,許多人需要面對(duì)令人頭痛的政府文件。他們雖然不情愿,但是卻必須付出額外的錢和額外的時(shí)間在這些文件上面,即使自由的,緊急的獲得它是我們的基本權(quán)利!該項(xiàng)目主要是通過(guò)手機(jī)老百姓日常生活需要的政府文檔來(lái)創(chuàng)建一個(gè)

91、反腐系統(tǒng)。我們的項(xiàng)目基本上包括四個(gè)主要部分,一個(gè)指紋識(shí)別器,ARM-9控制單元,PC觸摸屏界面和互聯(lián)網(wǎng)數(shù)據(jù)庫(kù)站。每一個(gè)國(guó)家的公??民的數(shù)據(jù)庫(kù)(姓名,地址,唯一的ID和指紋等)和相應(yīng)記錄(7-12記錄,居住證明等文件),記錄并存儲(chǔ)在數(shù)據(jù)庫(kù)站中。使用指紋識(shí)別,獨(dú)特的代碼和令牌數(shù)量,(特殊)用戶可以通過(guò)視覺(jué)或印刷格式輕松地獲得文件。我們的嵌入式電子文件系統(tǒng)是為政府工作的地面樞紐,鄉(xiāng)村/城市水平的“Talhati Office”實(shí)現(xiàn)的。通過(guò)將所

92、有這些系統(tǒng)借助連接到擁有一個(gè)資料庫(kù)站的安全專用網(wǎng)絡(luò)上,我們可以很容易地實(shí)現(xiàn)在國(guó)家任何地方的遠(yuǎn)程訪問(wèn)。這個(gè)項(xiàng)目擁有令人嘆為觀止的快速速度和可靠性,數(shù)據(jù)庫(kù)處理,類似ATM的用法,將會(huì)使這個(gè)設(shè)計(jì)很快傳遍全國(guó)各地。</p><p>  關(guān)鍵字:ARM9,ATM,電子文檔,圖形用戶界面,唯一的ID</p><p><b>  介紹</b></p><p>

93、;  在像印度這樣的發(fā)展中國(guó)家,腐敗是主要的經(jīng)濟(jì)問(wèn)題。我們可以看到要員和許多政府和私人的行政人員受賄。雖然及時(shí)得到日常法律文件是我們的基本權(quán)利,但是這些文件往往被這些人是故意拖延。然后我們的心開始考慮,我們?yōu)槭裁匆獮槲覀儜?yīng)有的權(quán)利付出這么多?如果將所有這些系統(tǒng)都電子化和自動(dòng)化,會(huì)怎么樣呢?</p><p><b>  簡(jiǎn)史</b></p><p>  ATM機(jī)是在公共

94、領(lǐng)域中最常用的設(shè)備的發(fā)明,這方便了貨幣的轉(zhuǎn)移與用戶端、銀行板塊詳細(xì)金額的處理。公共領(lǐng)域的第一個(gè)電子文件的構(gòu)想是美國(guó)在1970年,經(jīng)過(guò)10年時(shí)間在電話和銀行部門實(shí)現(xiàn)的。更甚的是,它已經(jīng)被大多數(shù)歐洲國(guó)家用于公共領(lǐng)域。</p><p>  這項(xiàng)技術(shù)在20世紀(jì)90年代后期,迅速傳播向東歐國(guó)家。 中國(guó),日本和印度,相繼使用到這些迅捷的技術(shù)。 [1]現(xiàn)在,我們可以看到同樣的奇跡!</p><p>  

95、最近電子文檔的趨勢(shì)和發(fā)展</p><p>  美國(guó),英國(guó),俄羅斯和其他西方國(guó)家都開始使用電子記錄,為他們的公民安全而流暢地保存關(guān)鍵文檔。美國(guó)在這些記錄的幫助下,實(shí)現(xiàn)了各種各樣的公共發(fā)展政策。此外,農(nóng)業(yè),政府文件,交通控制,災(zāi)難控制,安全,國(guó)內(nèi)設(shè)施和人口控制等都使用這些記錄進(jìn)行追蹤。[6]這些文件的主要優(yōu)點(diǎn)得益于能夠流暢處理政府相關(guān)問(wèn)題的公民。他們的政府也通過(guò)各種公共設(shè)施上的廣告,例如ATM,,火車站和機(jī)場(chǎng)的LED

96、廣告牌將信息傳達(dá)給公眾,構(gòu)建基礎(chǔ)框架等等,[3]所有這些都是我們的項(xiàng)目理念的起源。</p><p><b>  理論細(xì)節(jié)和分析</b></p><p><b>  電子文件的理論審查</b></p><p>  受賄的政府文件的挫折迫使我們?nèi)タ紤]一些自動(dòng)化系統(tǒng)。我們項(xiàng)目的想法是,所有這些挫折和媒體的一種表現(xiàn)。在這里,我們要

97、實(shí)現(xiàn)一個(gè)項(xiàng)目,該系統(tǒng)能夠通過(guò)一個(gè)人獨(dú)特的指紋探測(cè)到誰(shuí)需要這樣的文件,繼而它會(huì)立即將需要的文檔以打印的格式提供出來(lái),并不需要給相關(guān)官員支付任何酬勞。這個(gè)想法可以在“Talhati Office”中被實(shí)現(xiàn),我們經(jīng)常會(huì)從這里獲取許多重要文件,如7/12的詳細(xì)信息,農(nóng)業(yè)區(qū)證明,戶籍證明等。利用指紋識(shí)別技術(shù),可以允許訪問(wèn)那些存儲(chǔ)在數(shù)據(jù)庫(kù)中的指紋。 它包含了讓您存儲(chǔ),刪除和識(shí)別指紋的所有必要的電子設(shè)備,而你只需觸摸一個(gè)按鈕與驗(yàn)證指紋。即使發(fā)生嚴(yán)重的

98、電源故障或電池漏事件,也同樣能夠儲(chǔ)存這些指紋。這消除了保管密鑰或記住組合密碼或PIN的麻煩。它只能在授權(quán)用戶在場(chǎng)時(shí)能夠被打開,避免了沒(méi)有密鑰或者密鑰被復(fù)制,被盜的可能,或者是能被避開鎖。</p><p>  在這個(gè)項(xiàng)目將使用指紋模塊。它可以在內(nèi)存中一次存儲(chǔ)大量的指紋。它可以通過(guò)串口控制。</p><p>  ARM9的微控制器和這個(gè)模塊進(jìn)行交互。你可以添加一個(gè)指紋,刪除指紋和認(rèn)證指紋。 添

99、加一個(gè)指紋,只需要在模塊上展示你的手指,然后點(diǎn)擊添加鍵即可。微控制器將向模塊發(fā)送添加命令,然后模塊就會(huì)將它添加到內(nèi)存中。刪除指紋遵循上述相同步驟。識(shí)別的手指,只需要按下識(shí)別按鈕,如果指紋匹配,則繼續(xù)下一個(gè)過(guò)程。也會(huì)在液晶顯示屏上顯示你的指紋ID。</p><p><b>  電子文檔的分析審查</b></p><p>  當(dāng)通過(guò)PC串行通訊,代碼分配到特定的匹配指紋;

100、在PC中的由VB/Oracle編寫的軟件會(huì)自動(dòng)打開個(gè)人賬戶,探測(cè)人員信息。在低成本的觸摸屏顯示器屏幕上,選擇特定的選項(xiàng),我們需要的文檔會(huì)在屏幕上顯示出來(lái)。如果我們想打印該文檔,然后也為每個(gè)帳戶提供打印命令。 總之,我們的系統(tǒng)是完全自動(dòng)化的使用指紋識(shí)別的反腐敗的嵌入式文件系統(tǒng)。由于媒體的公共監(jiān)督的主要武器,所以網(wǎng)絡(luò)顯示廣告和計(jì)劃,成為我們系統(tǒng)有力的特性,政府方面絕對(duì)對(duì)我們的系統(tǒng)的實(shí)現(xiàn)很感興趣。</p><p>&l

101、t;b>  執(zhí)行的可能性</b></p><p>  現(xiàn)在我們的社會(huì)也很好的接受了銀行的ATM。項(xiàng)目的關(guān)鍵特性,如智能卡和生物識(shí)別個(gè)人身份,使得該系統(tǒng)可以遠(yuǎn)程實(shí)現(xiàn)。電子文件系統(tǒng)包括類似ATM銀行程序,他會(huì)使用戶產(chǎn)生與他或她有關(guān)的,以硬質(zhì)或軟質(zhì)格式存儲(chǔ)紀(jì)錄的機(jī)密文件。使用最高級(jí)別的安全設(shè)置,將以生物技術(shù)和獨(dú)特的ID,可以避免重要文件的濫用。</p><p><b>

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論