首页 > 最新文献

i-manager's Journal on Computer Science最新文献

英文 中文
DATA VISUALIZATION OF COVID-19 AND ASSOCIATED DISEASES COVID-19和相关疾病的数据可视化
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.1.18406
Mahadevaswamy UDIGALA BASAVARAJU, Manjunath Chandini, N. Shivani, P. Swathi
The novel coronavirus disease (COVID-19) has currently affected millions of people, claiming more than 4,000,000 lives all over the world. Several dashboards have been created to analyze the present situation and get a better grasp of the current status of COVID-19. As the situation unfolded, infections caused by species of fungi, Mucormycosis (commonly called black fungus), have affected patients treated for COVID-19. Therefore, to facilitate information and to create awareness, it would be better to have a dashboard that display trends and data on COVID-19 and associated related diseases. In the proposed work, a dashboard has been created to visualize how COVID-19 epidemic has an impact in the global scenario. With the present work, the spread of diseases associated with COVID-19 (fungi variants) can be visualized. The data visualization is performed using Python. The tool kits and packages used for this purpose is Dash by Plotly. The acquired data is classified and filtered with interesting criteria in the ranging process stage. Using specific tools, data representations like line chart, bubble map, heat map, choropleths, tree map and, folium map are plotted to visualize the data.
新型冠状病毒病(COVID-19)目前已影响数百万人,夺去了全世界400多万人的生命。已经创建了几个仪表板来分析目前的情况,并更好地掌握COVID-19的现状。随着形势的发展,由毛霉病(通常称为黑菌)真菌引起的感染已影响到接受COVID-19治疗的患者。因此,为了方便信息和提高认识,最好有一个仪表板,显示COVID-19和相关疾病的趋势和数据。在拟议的工作中,创建了一个仪表板,以可视化COVID-19流行病如何对全球情景产生影响。通过目前的工作,可以可视化与COVID-19(真菌变体)相关的疾病的传播。数据可视化是使用Python执行的。用于此目的的工具包和包是Dash by Plotly。在测距处理阶段,对采集到的数据进行分类和过滤。使用特定的工具,绘制数据表示,如折线图、气泡图、热图、枝叶图、树图和叶图,以使数据可视化。
{"title":"DATA VISUALIZATION OF COVID-19 AND ASSOCIATED DISEASES","authors":"Mahadevaswamy UDIGALA BASAVARAJU, Manjunath Chandini, N. Shivani, P. Swathi","doi":"10.26634/jcom.9.1.18406","DOIUrl":"https://doi.org/10.26634/jcom.9.1.18406","url":null,"abstract":"The novel coronavirus disease (COVID-19) has currently affected millions of people, claiming more than 4,000,000 lives all over the world. Several dashboards have been created to analyze the present situation and get a better grasp of the current status of COVID-19. As the situation unfolded, infections caused by species of fungi, Mucormycosis (commonly called black fungus), have affected patients treated for COVID-19. Therefore, to facilitate information and to create awareness, it would be better to have a dashboard that display trends and data on COVID-19 and associated related diseases. In the proposed work, a dashboard has been created to visualize how COVID-19 epidemic has an impact in the global scenario. With the present work, the spread of diseases associated with COVID-19 (fungi variants) can be visualized. The data visualization is performed using Python. The tool kits and packages used for this purpose is Dash by Plotly. The acquired data is classified and filtered with interesting criteria in the ranging process stage. Using specific tools, data representations like line chart, bubble map, heat map, choropleths, tree map and, folium map are plotted to visualize the data.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AES-based encoding and decoding images using MATLAB 基于aes的图像编码和解码
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.4.18595
Thakur Neelima, Choubey Siddhartha, Choubey Abha
This paper mainly deals with mixed-image secret writing techniques. From the point of view of information security, recording secret images are extremely important. Security is the most complex aspect of networks and network applications. The web and networked applications are growing in the blink of an eye, which increases the importance and, therefore, the value of the information transmitted through the web or alternative media. Encryption can be related to improve image security by scanning pixels. Encryption will protect privacy on its own. It works in a wide variety of fields, such as network communications, medical photography, and military communications. Due to the natural selection of images, such as high duplication of information and the ability of mass dissemination of information, image encryption is different from the text. Text encryption is the conversion of information into an encoded cipher code that cannot be easily decrypted by outsiders.
本文主要研究混合图像秘密书写技术。从信息安全的角度来看,记录秘密图像是极其重要的。安全是网络和网络应用最复杂的方面。网络和网络应用程序在眨眼之间不断发展,这增加了通过网络或其他媒体传播的信息的重要性和价值。加密可以通过扫描像素来提高图像安全性。加密本身就能保护隐私。它适用于各种领域,如网络通信、医学摄影和军事通信。由于图像的自然选择,如信息的高度重复和信息的大规模传播能力,图像加密不同于文本。文本加密是将信息转换为外人无法轻易解密的编码密码。
{"title":"AES-based encoding and decoding images using MATLAB","authors":"Thakur Neelima, Choubey Siddhartha, Choubey Abha","doi":"10.26634/jcom.9.4.18595","DOIUrl":"https://doi.org/10.26634/jcom.9.4.18595","url":null,"abstract":"This paper mainly deals with mixed-image secret writing techniques. From the point of view of information security, recording secret images are extremely important. Security is the most complex aspect of networks and network applications. The web and networked applications are growing in the blink of an eye, which increases the importance and, therefore, the value of the information transmitted through the web or alternative media. Encryption can be related to improve image security by scanning pixels. Encryption will protect privacy on its own. It works in a wide variety of fields, such as network communications, medical photography, and military communications. Due to the natural selection of images, such as high duplication of information and the ability of mass dissemination of information, image encryption is different from the text. Text encryption is the conversion of information into an encoded cipher code that cannot be easily decrypted by outsiders.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127480749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE EVALUATION OF CULTURAL ARTIFICIAL BEE COLONY AND CULTURAL ARTIFICIAL FISH SWARM ALGORITHM 人工养殖蜂群及人工养殖鱼群算法的性能评价
Pub Date : 1900-01-01 DOI: 10.26634/jcom.6.4.15725
Hadir Adebiyi Busayo, Tijani Salawudeen Ahmed, Folashade O. Adebiyi Risikat
{"title":"PERFORMANCE EVALUATION OF CULTURAL ARTIFICIAL BEE\u0000 COLONY AND CULTURAL ARTIFICIAL FISH SWARM ALGORITHM","authors":"Hadir Adebiyi Busayo, Tijani Salawudeen Ahmed, Folashade O. Adebiyi Risikat","doi":"10.26634/jcom.6.4.15725","DOIUrl":"https://doi.org/10.26634/jcom.6.4.15725","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSING CUSTOMER'S PURCHASING PATTERN BY MARKET BASKET ANALYSIS 通过市场购物篮分析分析客户的购买模式
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15582
Khandelwal Ritu, Divyasharma, Kanwar Harsh
{"title":"ANALYSING CUSTOMER'S PURCHASING PATTERN\u0000 BY MARKET BASKET ANALYSIS","authors":"Khandelwal Ritu, Divyasharma, Kanwar Harsh","doi":"10.26634/jcom.7.1.15582","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15582","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure authentication protocol for IoT applications based on blockchain technology 基于区块链技术的物联网应用安全认证协议
Pub Date : 1900-01-01 DOI: 10.26634/jcom.11.1.19380
Choubey Siddhartha, Choubey Abha, Bajpai Shiwanee, Kumar Bajpai Prageet
The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.
跨不同应用的物联网(IoT)基础设施缺乏安全性,引起了研究人员对物联网安全问题的关注。本文提出了区块链技术与物联网相结合的场景,以提供分散的安全机制。提出了针对物联网节点和对等体的安全认证和密钥协议技术,以确保在通信发生之前进行适当的授权。该协议使用公钥加密技术生成共享对称密钥,用于相互认证和双方对话。使用Scyther对该协议进行了测试,发现它足够健壮,可以抵御所有已知的与身份验证相关的攻击,包括重播和输入攻击。Hyperledger是一种区块链技术,用于为网络上物联网设备的可扩展性提供更高效的物联网基础设施。提出的技术为支持区块链的物联网环境中的设备身份验证提供了一个安全且可扩展的系统。
{"title":"Secure authentication protocol for IoT applications based on blockchain technology","authors":"Choubey Siddhartha, Choubey Abha, Bajpai Shiwanee, Kumar Bajpai Prageet","doi":"10.26634/jcom.11.1.19380","DOIUrl":"https://doi.org/10.26634/jcom.11.1.19380","url":null,"abstract":"The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A HYBRID NETWORK MODEL FOR EFFECTIVE HOUSE PRICE PREDICTION 一种有效预测房价的混合网络模型
Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.4.18150
P. Abarna, R. Archana, M. Kamali, K. Selvabhuvaneshwari
{"title":"A HYBRID NETWORK MODEL FOR EFFECTIVE HOUSE PRICE PREDICTION","authors":"P. Abarna, R. Archana, M. Kamali, K. Selvabhuvaneshwari","doi":"10.26634/jcom.8.4.18150","DOIUrl":"https://doi.org/10.26634/jcom.8.4.18150","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRECISE DETECTION OF PHISHING URLS USING RECURRENTNEURAL NETWORKS 使用递归神经网络精确检测钓鱼网址
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.1.18154
Neeharika Kamireddy, K. P. RUPHAA SRI, B. Vishruthi, M. Suresh Anand
{"title":"PRECISE DETECTION OF PHISHING URLS USING RECURRENT\u0000NEURAL NETWORKS","authors":"Neeharika Kamireddy, K. P. RUPHAA SRI, B. Vishruthi, M. Suresh Anand","doi":"10.26634/jcom.9.1.18154","DOIUrl":"https://doi.org/10.26634/jcom.9.1.18154","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"15 9-10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACHINE LEARNING APPROACH TO SENTIMENT ANALYSIS OF USERS’ MOVIE REVIEWS 用机器学习方法对用户的电影评论进行情感分析
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15701
Adetunmbi Adebayo, A. Oluwafemi, Olutomilola Oluwayemisi, Boyinbode Olutayo
{"title":"MACHINE LEARNING APPROACH TO SENTIMENT\u0000 ANALYSIS OF USERS’ MOVIE REVIEWS","authors":"Adetunmbi Adebayo, A. Oluwafemi, Olutomilola Oluwayemisi, Boyinbode Olutayo","doi":"10.26634/jcom.7.1.15701","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15701","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EVOLUTION OF OS ARCHITECTURES: A SURVEY ON PARALLELCOMPUTING BASED OS KERNELS 操作系统架构的演变:基于并行计算的操作系统内核综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.3.18252
Najam Rohma, Deen Ebrahim
{"title":"EVOLUTION OF OS ARCHITECTURES: A SURVEY ON PARALLEL\u0000COMPUTING BASED OS KERNELS","authors":"Najam Rohma, Deen Ebrahim","doi":"10.26634/jcom.8.3.18252","DOIUrl":"https://doi.org/10.26634/jcom.8.3.18252","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRID METHOD FOR DATA SHARING AMONG COOPERATIVEUSERS IN MOBILE ENVIRONMENT 移动环境下协作用户间数据共享的混合方法
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.2.17113
Bhomini P. AMUDHA, J. Jayasudha
{"title":"HYBRID METHOD FOR DATA SHARING AMONG COOPERATIVE\u0000USERS IN MOBILE ENVIRONMENT","authors":"Bhomini P. AMUDHA, J. Jayasudha","doi":"10.26634/jcom.9.2.17113","DOIUrl":"https://doi.org/10.26634/jcom.9.2.17113","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
i-manager's Journal on Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1