首页 > 最新文献

International Journal of Information Technology and Computer Science最新文献

英文 中文
Python Data Analysis and Visualization in Java GUI Applications Through TCP Socket Programming 通过 TCP Socket 编程在 Java GUI 应用程序中实现 Python 数据分析和可视化
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.07
Dr. Bala Dhandayuthapani V
Python is popular in artificial intelligence (AI) and machine learning (ML) due to its versatility, adaptability, rich libraries, and active community. The existing Python interoperability in Java was investigated using socket programming on a non-graphical user interface (GUI). Python's data analysis library modules such as numpy, pandas, and scipy, together with visualization library modules such as Matplotlib and Seaborn, and Scikit-learn for machine-learning, aim to integrate into Java graphical user interface (GUI) applications such as Java applets, Java Swing, and Java FX. The substantial method used in the integration process is TCP socket programming, which makes instruction and data transfers to provide interoperability between Python and Java GUIs. This empirical research integrates Python data analysis and visualization graphs into Java applications and does not require any additional libraries or third-party libraries. The experimentation confirmed the advantages and challenges of this integration with a concrete solution. The intended audience for this research extends to software developers, data analysts, and scientists, recognizing Python's broad applicability to artificial intelligence (AI) and machine learning (ML). The integration of data analysis and visualization and machine-learning functionalities within the Java GUI. It emphasizes the self-sufficiency of the integration process and suggests future research directions, including comparative analysis with Java's native capabilities, interactive data visualization using libraries like Altair, Bokeh, Plotly, and Pygal, performance and security considerations, and no-code and low-code implementations.
Python 因其多功能性、适应性、丰富的库和活跃的社区而在人工智能(AI)和机器学习(ML)领域广受欢迎。通过在非图形用户界面(GUI)上使用套接字编程,对现有 Python 在 Java 中的互操作性进行了研究。Python 的数据分析库模块(如 numpy、pandas 和 scipy)以及可视化库模块(如 Matplotlib 和 Seaborn)和用于机器学习的 Scikit-learn 都旨在集成到 Java 图形用户界面(GUI)应用程序(如 Java applets、Java Swing 和 Java FX)中。集成过程中使用的主要方法是 TCP 套接字编程,它可以进行指令和数据传输,从而提供 Python 和 Java GUI 之间的互操作性。这项实证研究将 Python 数据分析和可视化图形集成到 Java 应用程序中,不需要任何额外的库或第三方库。实验以具体的解决方案证实了这种集成的优势和挑战。鉴于 Python 在人工智能(AI)和机器学习(ML)领域的广泛适用性,本研究的目标受众包括软件开发人员、数据分析师和科学家。在 Java GUI 中集成数据分析和可视化以及机器学习功能。它强调了集成过程的自足性,并提出了未来的研究方向,包括与 Java 本地功能的比较分析,使用 Altair、Bokeh、Plotly 和 Pygal 等库进行交互式数据可视化,性能和安全考虑因素,以及无代码和低代码实现。
{"title":"Python Data Analysis and Visualization in Java GUI Applications Through TCP Socket Programming","authors":"Dr. Bala Dhandayuthapani V","doi":"10.5815/ijitcs.2024.03.07","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.07","url":null,"abstract":"Python is popular in artificial intelligence (AI) and machine learning (ML) due to its versatility, adaptability, rich libraries, and active community. The existing Python interoperability in Java was investigated using socket programming on a non-graphical user interface (GUI). Python's data analysis library modules such as numpy, pandas, and scipy, together with visualization library modules such as Matplotlib and Seaborn, and Scikit-learn for machine-learning, aim to integrate into Java graphical user interface (GUI) applications such as Java applets, Java Swing, and Java FX. The substantial method used in the integration process is TCP socket programming, which makes instruction and data transfers to provide interoperability between Python and Java GUIs. This empirical research integrates Python data analysis and visualization graphs into Java applications and does not require any additional libraries or third-party libraries. The experimentation confirmed the advantages and challenges of this integration with a concrete solution. The intended audience for this research extends to software developers, data analysts, and scientists, recognizing Python's broad applicability to artificial intelligence (AI) and machine learning (ML). The integration of data analysis and visualization and machine-learning functionalities within the Java GUI. It emphasizes the self-sufficiency of the integration process and suggests future research directions, including comparative analysis with Java's native capabilities, interactive data visualization using libraries like Altair, Bokeh, Plotly, and Pygal, performance and security considerations, and no-code and low-code implementations.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141370032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Analytics Maturity Model for SMEs 中小企业大数据分析成熟度模型
Pub Date : 2024-04-08 DOI: 10.5815/ijitcs.2024.02.01
Matthew Willetts, Anthony S. Atkins
Small and medium-sized enterprises (SMEs) are the backbone of the global economy, constituting 90% of all businesses. Despite being widely adopted by large businesses who have reported numerous benefits including increased profitability and increased efficiency and a survey in 2017 of 50 Fortune 1000 and leading firms’ executives indicated that 48.4% of respondents confirmed they are achieving measurable results from their Big Data investments, with 80.7% confirming that they have generated business. Big Data Analytics is adopted by only 10% of SMEs. The paper outlines a review of Big Data Maturity Models and discusses their positive features and limitations. Previous research has analysed the barriers to adoption of Big Data Analytics in SMEs and a scoring tool has been developed to help SMEs adopt Big Data Analytics. The paper demonstrates that the scoring tool could be translated and compared to a Maturity Model to provide a visual representation of Big Data Analytics maturity and help SMEs to understand where they are on the journey. The paper outlines a case study to show a comparison to provide intuitive visual model to assist top management to improve their competitive advantage.
中小企业是全球经济的支柱,占所有企业的 90%。尽管大企业广泛采用大数据,并报告了包括提高盈利能力和效率在内的众多好处,2017 年对 50 家财富 1000 强企业和领先企业高管的调查显示,48.4% 的受访者确认他们正在从大数据投资中取得可衡量的成果,80.7% 的受访者确认他们已经创造了业务。只有 10% 的中小企业采用了大数据分析技术。本文概述了大数据成熟度模型,并讨论了这些模型的积极特点和局限性。先前的研究分析了中小企业采用大数据分析的障碍,并开发了一个评分工具,以帮助中小企业采用大数据分析。本文表明,该评分工具可转化为成熟度模型并与之进行比较,以提供大数据分析成熟度的可视化表示,帮助中小企业了解其所处的阶段。论文概述了一个案例研究,通过比较来提供直观的可视化模型,帮助高层管理人员提高竞争优势。
{"title":"Big Data Analytics Maturity Model for SMEs","authors":"Matthew Willetts, Anthony S. Atkins","doi":"10.5815/ijitcs.2024.02.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.02.01","url":null,"abstract":"Small and medium-sized enterprises (SMEs) are the backbone of the global economy, constituting 90% of all businesses. Despite being widely adopted by large businesses who have reported numerous benefits including increased profitability and increased efficiency and a survey in 2017 of 50 Fortune 1000 and leading firms’ executives indicated that 48.4% of respondents confirmed they are achieving measurable results from their Big Data investments, with 80.7% confirming that they have generated business. Big Data Analytics is adopted by only 10% of SMEs. The paper outlines a review of Big Data Maturity Models and discusses their positive features and limitations. Previous research has analysed the barriers to adoption of Big Data Analytics in SMEs and a scoring tool has been developed to help SMEs adopt Big Data Analytics. The paper demonstrates that the scoring tool could be translated and compared to a Maturity Model to provide a visual representation of Big Data Analytics maturity and help SMEs to understand where they are on the journey. The paper outlines a case study to show a comparison to provide intuitive visual model to assist top management to improve their competitive advantage.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"148 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM) 使用信息系统安全评估框架(ISSAF)和开源安全测试方法手册(OSSTMM)对 Udayana 大学的 OASE 电子学习平台进行网络应用程序渗透测试
Pub Date : 2024-04-08 DOI: 10.5815/ijitcs.2024.02.04
I. Gusti, Agung Surya, Pramana Wijaya, Gusti Made, Arya Sasmita, Putu Agus, Eka Pratama
Education is a field that utilizes information technology to support academic and operational activities. One of the technologies widely used in the education sector is web-based applications. Web-based technologies are vulnerable to exploitation by attackers, which highlights the importance of ensuring strong security measures in web-based systems. As an educational organization, Udayana University utilizes a web-based application called OASE. OASE, being a web-based system, requires thorough security verification. Penetration testing is conducted to assess the security of OASE. This testing can be performed using the ISSAF and OSSTMM frameworks. The penetration testing based on the ISSAF framework consists of 9 steps, while the OSSTMM framework consists of 7 steps for assessment. The results of the OASE penetration testing revealed several system vulnerabilities. Throughout the ISSAF phases, only 4 vulnerabilities and 3 information-level vulnerabilities were identified in the final testing results of OASE. Recommendations for addressing these vulnerabilities are provided as follows. Implement a Web Application Firewall (WAF) to reduce the risk of common web attacks in the OASE web application. input and output validation to prevent the injection of malicious scripts addressing the stored XSS vulnerability. Update the server software regularly and directory permission checks to eliminate unnecessary information files and prevent unauthorized access. Configure a content security policy on the web server to ensure mitigation and prevent potential exploitation by attackers.
教育是一个利用信息技术支持学术和业务活动的领域。教育领域广泛使用的技术之一是网络应用程序。基于网络的技术很容易被攻击者利用,这就凸显了确保基于网络系统的强大安全措施的重要性。作为一个教育机构,乌达亚纳大学使用了一个名为 OASE 的网络应用程序。OASE 作为一个基于网络的系统,需要彻底的安全验证。进行渗透测试是为了评估 OASE 的安全性。该测试可使用 ISSAF 和 OSSTMM 框架进行。基于 ISSAF 框架的渗透测试包括 9 个步骤,而 OSSTMM 框架包括 7 个评估步骤。OASE 渗透测试的结果显示了几个系统漏洞。在整个 ISSAF 阶段,OASE 的最终测试结果只发现了 4 个漏洞和 3 个信息级漏洞。解决这些漏洞的建议如下。实施网络应用程序防火墙(WAF),以降低 OASE 网络应用程序中常见网络攻击的风险。定期更新服务器软件和目录权限检查,消除不必要的信息文件,防止未经授权的访问。在网络服务器上配置内容安全策略,以确保缓解和防止攻击者的潜在利用。
{"title":"Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)","authors":"I. Gusti, Agung Surya, Pramana Wijaya, Gusti Made, Arya Sasmita, Putu Agus, Eka Pratama","doi":"10.5815/ijitcs.2024.02.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.02.04","url":null,"abstract":"Education is a field that utilizes information technology to support academic and operational activities. One of the technologies widely used in the education sector is web-based applications. Web-based technologies are vulnerable to exploitation by attackers, which highlights the importance of ensuring strong security measures in web-based systems. As an educational organization, Udayana University utilizes a web-based application called OASE. OASE, being a web-based system, requires thorough security verification. Penetration testing is conducted to assess the security of OASE. This testing can be performed using the ISSAF and OSSTMM frameworks. The penetration testing based on the ISSAF framework consists of 9 steps, while the OSSTMM framework consists of 7 steps for assessment. The results of the OASE penetration testing revealed several system vulnerabilities. Throughout the ISSAF phases, only 4 vulnerabilities and 3 information-level vulnerabilities were identified in the final testing results of OASE. Recommendations for addressing these vulnerabilities are provided as follows. Implement a Web Application Firewall (WAF) to reduce the risk of common web attacks in the OASE web application. input and output validation to prevent the injection of malicious scripts addressing the stored XSS vulnerability. Update the server software regularly and directory permission checks to eliminate unnecessary information files and prevent unauthorized access. Configure a content security policy on the web server to ensure mitigation and prevent potential exploitation by attackers.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"86 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmenting Sentiment Analysis Prediction in Binary Text Classification through Advanced Natural Language Processing Models and Classifiers 通过高级自然语言处理模型和分类器增强二进制文本分类中的情感分析预测
Pub Date : 2024-04-08 DOI: 10.5815/ijitcs.2024.02.02
Zhengbing Hu, I. Dychka, K. Potapova, Vasyl Meliukh
Sentiment analysis is a critical component in natural language processing applications, particularly for text classification. By employing state-of-the-art techniques such as ensemble methods, transfer learning and deep learning architectures, our methodology significantly enhances the robustness and precision of sentiment predictions. We systematically investigate the impact of various NLP models, including recurrent neural networks and transformer-based architectures, on sentiment classification tasks. Furthermore, we introduce a novel ensemble method that combines the strengths of multiple classifiers to improve the predictive ability of the system. The results demonstrate the potential of integrating state-of-the-art Natural Language Processing (NLP) models with ensemble classifiers to advance sentiment analysis. This lays the foundation for a more advanced comprehension of textual sentiments in diverse applications.
情感分析是自然语言处理应用中的重要组成部分,尤其是在文本分类方面。通过采用集合方法、迁移学习和深度学习架构等最先进的技术,我们的方法显著提高了情感预测的稳健性和精确度。我们系统地研究了各种 NLP 模型(包括递归神经网络和基于转换器的架构)对情感分类任务的影响。此外,我们还引入了一种新颖的集合方法,该方法结合了多个分类器的优势,从而提高了系统的预测能力。研究结果表明,将最先进的自然语言处理(NLP)模型与集合分类器整合在一起,具有推进情感分析的潜力。这为在各种应用中更深入地理解文本情感奠定了基础。
{"title":"Augmenting Sentiment Analysis Prediction in Binary Text Classification through Advanced Natural Language Processing Models and Classifiers","authors":"Zhengbing Hu, I. Dychka, K. Potapova, Vasyl Meliukh","doi":"10.5815/ijitcs.2024.02.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.02.02","url":null,"abstract":"Sentiment analysis is a critical component in natural language processing applications, particularly for text classification. By employing state-of-the-art techniques such as ensemble methods, transfer learning and deep learning architectures, our methodology significantly enhances the robustness and precision of sentiment predictions. We systematically investigate the impact of various NLP models, including recurrent neural networks and transformer-based architectures, on sentiment classification tasks. Furthermore, we introduce a novel ensemble method that combines the strengths of multiple classifiers to improve the predictive ability of the system. The results demonstrate the potential of integrating state-of-the-art Natural Language Processing (NLP) models with ensemble classifiers to advance sentiment analysis. This lays the foundation for a more advanced comprehension of textual sentiments in diverse applications.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"140 S261","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ScrumSpiral: An Improved Hybrid Software Development Model ScrumSpiral:改进的混合软件开发模型
Pub Date : 2024-04-08 DOI: 10.5815/ijitcs.2024.02.05
Tapu Biswas, Farhan Sadik Ferdous, Zinniya Taffannum Pritee, Akinul Islam Jony
In the lightning-quick world of software development, it is essential to find the most effective and efficient development methodology. This thesis represents "Scrum Spiral" which is an improved hybrid software development model that combines the features of Scrum and Spiral approach to enhance the software development process. This thesis aims to identify the usefulness of "ScrumSpiral" methodology and compare it with other hybrid software development models to encourage its use in software development projects. To develop this hybrid model, we did extensive research on the software engineering domain and decided to create a hybrid model by using Scrum and Spiral, named "Scrum Spiral" which is suitable for complicated projects and also for those projects whose requirements are not fixed. Traditional software development models face numerous challenges in rapidly changing markets. By developing this kind of hybrid model, we want to overcome these kinds of limitations and present the software development community with a novel concept for better project results. Final outcome of this thesis was that we developed a model that should be able to complete the project according to the expected schedule, satisfy customer requirements, and obtain productivity through team coordination. The significance of the hybrid model "Scrum Spiral" is reflected in its ability to offer flexibility towards various size projects, proactive risk management to identify all risks before developing the system, and result in higher-quality outcomes for those projects whose requirements are not properly described initially in the project.
在飞速发展的软件开发领域,找到最有效、最高效的开发方法至关重要。本论文介绍的 "Scrum Spiral "是一种改进的混合软件开发模型,它结合了Scrum和螺旋方法的特点,以加强软件开发过程。本论文旨在确定 "ScrumSpiral "方法的实用性,并将其与其他混合软件开发模型进行比较,以鼓励在软件开发项目中使用这种方法。为了开发这种混合模型,我们对软件工程领域进行了广泛的研究,并决定使用 Scrum 和 Spiral 创建一种混合模型,命名为 "Scrum Spiral",它适用于复杂的项目,也适用于需求不固定的项目。传统的软件开发模式在瞬息万变的市场中面临着诸多挑战。通过开发这种混合模式,我们希望克服这些限制,并为软件开发界提供一种新概念,以取得更好的项目成果。本论文的最终成果是,我们开发的模型应能按照预期进度完成项目,满足客户要求,并通过团队协调提高生产率。混合模型 "Scrum Spiral "的意义体现在它能够为各种规模的项目提供灵活性,能够在开发系统之前主动进行风险管理以识别所有风险,并且能够为那些在项目初期没有正确描述需求的项目带来更高质量的成果。
{"title":"ScrumSpiral: An Improved Hybrid Software Development Model","authors":"Tapu Biswas, Farhan Sadik Ferdous, Zinniya Taffannum Pritee, Akinul Islam Jony","doi":"10.5815/ijitcs.2024.02.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.02.05","url":null,"abstract":"In the lightning-quick world of software development, it is essential to find the most effective and efficient development methodology. This thesis represents \"Scrum Spiral\" which is an improved hybrid software development model that combines the features of Scrum and Spiral approach to enhance the software development process. This thesis aims to identify the usefulness of \"ScrumSpiral\" methodology and compare it with other hybrid software development models to encourage its use in software development projects. To develop this hybrid model, we did extensive research on the software engineering domain and decided to create a hybrid model by using Scrum and Spiral, named \"Scrum Spiral\" which is suitable for complicated projects and also for those projects whose requirements are not fixed. Traditional software development models face numerous challenges in rapidly changing markets. By developing this kind of hybrid model, we want to overcome these kinds of limitations and present the software development community with a novel concept for better project results. Final outcome of this thesis was that we developed a model that should be able to complete the project according to the expected schedule, satisfy customer requirements, and obtain productivity through team coordination. The significance of the hybrid model \"Scrum Spiral\" is reflected in its ability to offer flexibility towards various size projects, proactive risk management to identify all risks before developing the system, and result in higher-quality outcomes for those projects whose requirements are not properly described initially in the project.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"77 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Farmland Intrusion Detection using Internet of Things and Computer Vision Techniques 利用物联网和计算机视觉技术进行农田入侵检测
Pub Date : 2024-04-08 DOI: 10.5815/ijitcs.2024.02.03
I. M. Oyelade, O.K. Boyinbode, O. Adewale, E. Ibam
Farmland security in Nigeria is still a major challenge and existing methods such as building brick fences around the farmland, installing electric fences, setting up deterrent plants with spikey branches or those that have displeasing scents are no longer suitable for farmland security. This paper presents an IoT based farmland intrusion detection model using sensors and computer vision techniques. Passive Infrared (PIR) sensors and camera sensors are mounted in strategic positions on the farm. The PIR sensor senses motion by the radiation of body heat and sends a message to the raspberry pi to trigger the camera to take a picture of the scene. An improved Faster Region Based Convolutional Neural Network is developed and used for object detection and One-shot learning algorithm for face recognition in the case of a person. At the end of the detection and recognition stage, details of intrusion are sent to the farm owner through text message and email notification. The raspberry pi also turns on the wade off system to divert an intruding animal away. The model achieved an improved accuracy of 92.5% compared to previous methods and effectively controlled illegal entry into a farmland.
尼日利亚的农田安全仍然是一项重大挑战,现有的方法,如在农田周围建造砖砌围栏、安装电栅栏、种植带有尖刺或气味令人讨厌的植物等,已不再适用于农田安全。本文利用传感器和计算机视觉技术提出了一种基于物联网的农田入侵检测模型。被动红外(PIR)传感器和摄像头传感器安装在农场的战略位置。PIR 传感器通过体热辐射感应运动,并向 raspberry pi 发送信息,触发摄像头拍摄场景。开发并使用改进的基于区域的更快卷积神经网络进行物体检测,并使用单次学习算法进行人脸识别。在检测和识别阶段结束后,入侵的详细信息会通过短信和电子邮件通知农场主。树莓派还会打开涉水关闭系统,将入侵动物引开。与以前的方法相比,该模型的准确率提高了 92.5%,有效控制了非法进入农田的行为。
{"title":"Farmland Intrusion Detection using Internet of Things and Computer Vision Techniques","authors":"I. M. Oyelade, O.K. Boyinbode, O. Adewale, E. Ibam","doi":"10.5815/ijitcs.2024.02.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.02.03","url":null,"abstract":"Farmland security in Nigeria is still a major challenge and existing methods such as building brick fences around the farmland, installing electric fences, setting up deterrent plants with spikey branches or those that have displeasing scents are no longer suitable for farmland security. This paper presents an IoT based farmland intrusion detection model using sensors and computer vision techniques. Passive Infrared (PIR) sensors and camera sensors are mounted in strategic positions on the farm. The PIR sensor senses motion by the radiation of body heat and sends a message to the raspberry pi to trigger the camera to take a picture of the scene. An improved Faster Region Based Convolutional Neural Network is developed and used for object detection and One-shot learning algorithm for face recognition in the case of a person. At the end of the detection and recognition stage, details of intrusion are sent to the farm owner through text message and email notification. The raspberry pi also turns on the wade off system to divert an intruding animal away. The model achieved an improved accuracy of 92.5% compared to previous methods and effectively controlled illegal entry into a farmland.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"181 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing SSKHOA:云雾计算中资源感知任务调度的混合元搜索算法
Pub Date : 2024-02-08 DOI: 10.5815/ijitcs.2024.01.01
M. S. Kumar, K. G. Reddy, Rakesh Kumar Donthi
Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly explores the solution space and finds near-optimal work schedules by modelling the swarm intelligence of krill herds and the predator-prey behavior of sharks. In order to test the efficacy of the SSKHOA algorithm, we created a synthetic cloud fog environment and performed some tests. Traditional task scheduling techniques like LTRA, DRL, and DAPSO were used to evaluate the findings. The experimental results demonstrate that the SSKHOA outperformed the baseline algorithms in terms of task success rate increased 34%, reduced the execution time by 36%, and reduced makespan time by 54% respectively.
云雾计算是一种结合云计算和雾计算的新模式,可提高资源效率和分布式系统性能。任务调度在云雾计算中至关重要,因为它决定了计算机资源在任务间的分配方式。我们的研究建议在云雾计算的任务调度中采用鲨鱼搜索鱼群优化(SSKHOA)方法。为了增强优化过程的全局和局部搜索能力,SSKHOA 算法结合了鲨鱼搜索算法和磷虾群算法。它通过模拟磷虾群的群集智能和鲨鱼的捕食-猎物行为,快速探索解空间并找到接近最优的工作计划。为了测试 SSKHOA 算法的有效性,我们创建了一个合成云雾环境并进行了一些测试。我们使用了传统的任务调度技术,如 LTRA、DRL 和 DAPSO 来评估结果。实验结果表明,SSKHOA 在任务成功率提高 34%、执行时间缩短 36%、任务间隔时间缩短 54% 等方面均优于基线算法。
{"title":"SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing","authors":"M. S. Kumar, K. G. Reddy, Rakesh Kumar Donthi","doi":"10.5815/ijitcs.2024.01.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.01.01","url":null,"abstract":"Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly explores the solution space and finds near-optimal work schedules by modelling the swarm intelligence of krill herds and the predator-prey behavior of sharks. In order to test the efficacy of the SSKHOA algorithm, we created a synthetic cloud fog environment and performed some tests. Traditional task scheduling techniques like LTRA, DRL, and DAPSO were used to evaluate the findings. The experimental results demonstrate that the SSKHOA outperformed the baseline algorithms in terms of task success rate increased 34%, reduced the execution time by 36%, and reduced makespan time by 54% respectively.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 40","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139793181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure 关键基础设施背景下石油和天然气行业的威胁和网络安全分析
Pub Date : 2024-02-08 DOI: 10.5815/ijitcs.2024.01.05
Shakir A. Mehdiyev, Mammad A. Hashimovv
This article explores the multifaceted challenges inherent in ensuring the cybersecurity of critical infrastructures, i.e., a linchpin of modern society and the economy, spanning pivotal sectors such as energy, transportation, and finance. In the era of accelerating digitalization and escalating dependence on information technology, safeguarding these infrastructures against evolving cyber threats becomes not just crucial but imperative. The examination unfolds by dissecting the vulnerabilities that plague critical infrastructures, probing into the diverse spectrum of threats they confront in the contemporary cybersecurity landscape. Moreover, the article meticulously outlines innovative security strategies designed to fortify these vital systems against malicious intrusions. A distinctive aspect of this work is the nuanced case study presented within the oil and gas sector, strategically chosen to illustrate the vulnerability of critical infrastructures to cyber threats. By examining this sector in detail, the article aims to shed light on industry-specific challenges and potential solutions, thereby enhancing our understanding of cybersecurity dynamics within critical infrastructures. This article contributes a comprehensive analysis of the challenges faced by critical infrastructures in the face of cyber threats, offering contemporary security strategies and leveraging a focused case study to deepen insights into the nuanced vulnerabilities within the oil and gas sector.
关键基础设施是现代社会和经济的关键,横跨能源、交通和金融等关键领域,本文探讨了确保关键基础设施网络安全所面临的多方面挑战。在数字化进程不断加快、对信息技术的依赖不断升级的时代,保护这些基础设施免受不断演变的网络威胁不仅至关重要,而且势在必行。文章通过剖析困扰关键基础设施的薄弱环节,探究它们在当代网络安全环境中面临的各种威胁,展开了对关键基础设施的研究。此外,文章还细致地概述了旨在加强这些重要系统抵御恶意入侵的创新安全策略。这部著作的一个独特之处是在石油和天然气领域进行了细致入微的案例研究,战略性地选择了这一领域来说明关键基础设施在网络威胁面前的脆弱性。通过对该行业的详细研究,文章旨在揭示特定行业面临的挑战和潜在的解决方案,从而加深我们对关键基础设施内网络安全动态的理解。本文全面分析了关键基础设施在面对网络威胁时所面临的挑战,提供了当代安全战略,并利用重点案例研究加深了对石油和天然气行业细微脆弱性的了解。
{"title":"Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure","authors":"Shakir A. Mehdiyev, Mammad A. Hashimovv","doi":"10.5815/ijitcs.2024.01.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.01.05","url":null,"abstract":"This article explores the multifaceted challenges inherent in ensuring the cybersecurity of critical infrastructures, i.e., a linchpin of modern society and the economy, spanning pivotal sectors such as energy, transportation, and finance. In the era of accelerating digitalization and escalating dependence on information technology, safeguarding these infrastructures against evolving cyber threats becomes not just crucial but imperative. The examination unfolds by dissecting the vulnerabilities that plague critical infrastructures, probing into the diverse spectrum of threats they confront in the contemporary cybersecurity landscape. Moreover, the article meticulously outlines innovative security strategies designed to fortify these vital systems against malicious intrusions. A distinctive aspect of this work is the nuanced case study presented within the oil and gas sector, strategically chosen to illustrate the vulnerability of critical infrastructures to cyber threats. By examining this sector in detail, the article aims to shed light on industry-specific challenges and potential solutions, thereby enhancing our understanding of cybersecurity dynamics within critical infrastructures. This article contributes a comprehensive analysis of the challenges faced by critical infrastructures in the face of cyber threats, offering contemporary security strategies and leveraging a focused case study to deepen insights into the nuanced vulnerabilities within the oil and gas sector.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"14 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139854293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing SSKHOA:云雾计算中资源感知任务调度的混合元搜索算法
Pub Date : 2024-02-08 DOI: 10.5815/ijitcs.2024.01.01
M. S. Kumar, K. G. Reddy, Rakesh Kumar Donthi
Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly explores the solution space and finds near-optimal work schedules by modelling the swarm intelligence of krill herds and the predator-prey behavior of sharks. In order to test the efficacy of the SSKHOA algorithm, we created a synthetic cloud fog environment and performed some tests. Traditional task scheduling techniques like LTRA, DRL, and DAPSO were used to evaluate the findings. The experimental results demonstrate that the SSKHOA outperformed the baseline algorithms in terms of task success rate increased 34%, reduced the execution time by 36%, and reduced makespan time by 54% respectively.
云雾计算是一种结合云计算和雾计算的新模式,可提高资源效率和分布式系统性能。任务调度在云雾计算中至关重要,因为它决定了计算机资源在任务间的分配方式。我们的研究建议在云雾计算的任务调度中采用鲨鱼搜索鱼群优化(SSKHOA)方法。为了增强优化过程的全局和局部搜索能力,SSKHOA 算法结合了鲨鱼搜索算法和磷虾群算法。它通过模拟磷虾群的群集智能和鲨鱼的捕食-猎物行为,快速探索解空间并找到接近最优的工作计划。为了测试 SSKHOA 算法的有效性,我们创建了一个合成云雾环境并进行了一些测试。我们使用了传统的任务调度技术,如 LTRA、DRL 和 DAPSO 来评估结果。实验结果表明,SSKHOA 在任务成功率提高 34%、执行时间缩短 36%、任务间隔时间缩短 54% 等方面均优于基线算法。
{"title":"SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing","authors":"M. S. Kumar, K. G. Reddy, Rakesh Kumar Donthi","doi":"10.5815/ijitcs.2024.01.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.01.01","url":null,"abstract":"Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly explores the solution space and finds near-optimal work schedules by modelling the swarm intelligence of krill herds and the predator-prey behavior of sharks. In order to test the efficacy of the SSKHOA algorithm, we created a synthetic cloud fog environment and performed some tests. Traditional task scheduling techniques like LTRA, DRL, and DAPSO were used to evaluate the findings. The experimental results demonstrate that the SSKHOA outperformed the baseline algorithms in terms of task success rate increased 34%, reduced the execution time by 36%, and reduced makespan time by 54% respectively.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"99 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139853093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study: Performance of MVC Frameworks on RDBMS 比较研究:RDBMS 上 MVC 框架的性能
Pub Date : 2024-02-08 DOI: 10.5815/ijitcs.2024.01.03
M. H. Rahman, M. Naderuzzaman, M. A. Kashem, B. M. Salahuddin, Z. Mahmud
The regular utilization of web-based applications is crucial in our everyday life. The Model View Controller (MVC) architecture serves as a structured programming design that developers utilize to create user interfaces. This pattern is commonly applied by application software developers to construct web-based applications. The use of a MVC framework of PHP Scripting language is often essential for application software development. There is a significant argument regarding the most suitable PHP MVC such as Codeigniter & Laravel and Phalcon frameworks since not all frameworks cater to everyone's needs. It's a fact that not all MVC frameworks are created equal and different frameworks can be combined for specific scenarios. Selecting the appropriate MVC framework can pose a challenge at times. In this context, our paper focuses on conducting a comparative analysis of different PHP frameworks. The widely used PHP MVC frameworks are picked to compare the performance on basic Operation of Relational databases and different type of Application software to calculate execution time. In this experiment a large (Big Data) dataset was used. The Mean values of insert operation in MySQL database of Codeigniter, Laravel, Phalcon were 149.64, 149.99, 145.48 and PostgreSQL database`s 48.259, 49.39, 45.87 respectively. The Mean values of Update operation in MySQL database of Codeigniter, Laravel, Phalcon were 149.64, 158.39, 207.82 and PostgreSQL database`s 48.24, 49.39, 46.64 respectively. The Mean values of Select operation in MySQL database of Codeigniter, Laravel, Phalcon were 1.60, 3.23, 0.98 and PostgreSQL database`s 1.95, 4.57, 2.36 respectively. The Mean values of Delete operation in MySQL database of Codeigniter, Laravel, Phalcon were 150.27, 156.99, 149.63 and PostgreSQL database`s 42.95, 48.25, 42.07 respectively. The findings from our experiment can be advantageous for web application developers to choose proper MVC frameworks with their integrated development environment (IDE). This result will be helpful for small, medium & large-scale organization in choosing the appropriate PHP Framework.
在我们的日常生活中,经常使用基于网络的应用程序至关重要。模型视图控制器(MVC)架构是一种结构化的编程设计,开发人员利用它来创建用户界面。应用软件开发人员通常采用这种模式来构建网络应用程序。使用 PHP 脚本语言的 MVC 框架通常对应用软件开发至关重要。关于最合适的 PHP MVC(如 Codeigniter、Laravel 和 Phalcon 框架)存在很大争议,因为并非所有框架都能满足每个人的需求。事实上,并非所有的 MVC 框架都是一样的,不同的框架可以针对特定场景进行组合。选择合适的 MVC 框架有时会带来挑战。在这种情况下,我们的论文侧重于对不同的 PHP 框架进行比较分析。我们选取了广泛使用的 PHP MVC 框架来比较关系数据库基本操作和不同类型应用软件的性能,以计算执行时间。本实验使用了一个大型(大数据)数据集。在 MySQL 数据库中,Codeigniter、Laravel 和 Phalcon 的插入操作平均值分别为 149.64、149.99 和 145.48,而 PostgreSQL 数据库的插入操作平均值分别为 48.259、49.39 和 45.87。在 MySQL 数据库中,Codeigniter、Laravel 和 Phalcon 的更新操作平均值分别为 149.64、158.39、207.82,PostgreSQL 数据库的平均值分别为 48.24、49.39、46.64。在 MySQL 数据库中,Codeigniter、Laravel 和 Phalcon 的 Select 操作平均值分别为 1.60、3.23、0.98,PostgreSQL 数据库的平均值分别为 1.95、4.57、2.36。在 MySQL 数据库中,Codeigniter、Laravel 和 Phalcon 的 Delete 操作平均值分别为 150.27、156.99、149.63,PostgreSQL 数据库分别为 42.95、48.25、42.07。我们的实验结果有利于网络应用程序开发人员选择合适的 MVC 框架及其集成开发环境(IDE)。这一结果将有助于小型、中型和大型组织选择合适的 PHP 框架。
{"title":"Comparative Study: Performance of MVC Frameworks on RDBMS","authors":"M. H. Rahman, M. Naderuzzaman, M. A. Kashem, B. M. Salahuddin, Z. Mahmud","doi":"10.5815/ijitcs.2024.01.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.01.03","url":null,"abstract":"The regular utilization of web-based applications is crucial in our everyday life. The Model View Controller (MVC) architecture serves as a structured programming design that developers utilize to create user interfaces. This pattern is commonly applied by application software developers to construct web-based applications. The use of a MVC framework of PHP Scripting language is often essential for application software development. There is a significant argument regarding the most suitable PHP MVC such as Codeigniter & Laravel and Phalcon frameworks since not all frameworks cater to everyone's needs. It's a fact that not all MVC frameworks are created equal and different frameworks can be combined for specific scenarios. Selecting the appropriate MVC framework can pose a challenge at times. In this context, our paper focuses on conducting a comparative analysis of different PHP frameworks. The widely used PHP MVC frameworks are picked to compare the performance on basic Operation of Relational databases and different type of Application software to calculate execution time. In this experiment a large (Big Data) dataset was used. The Mean values of insert operation in MySQL database of Codeigniter, Laravel, Phalcon were 149.64, 149.99, 145.48 and PostgreSQL database`s 48.259, 49.39, 45.87 respectively. The Mean values of Update operation in MySQL database of Codeigniter, Laravel, Phalcon were 149.64, 158.39, 207.82 and PostgreSQL database`s 48.24, 49.39, 46.64 respectively. The Mean values of Select operation in MySQL database of Codeigniter, Laravel, Phalcon were 1.60, 3.23, 0.98 and PostgreSQL database`s 1.95, 4.57, 2.36 respectively. The Mean values of Delete operation in MySQL database of Codeigniter, Laravel, Phalcon were 150.27, 156.99, 149.63 and PostgreSQL database`s 42.95, 48.25, 42.07 respectively. The findings from our experiment can be advantageous for web application developers to choose proper MVC frameworks with their integrated development environment (IDE). This result will be helpful for small, medium & large-scale organization in choosing the appropriate PHP Framework.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139792436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1