首页 > 最新文献

ICST Transactions on Scalable Information Systems最新文献

英文 中文
Review on DDoS Attack in Controller Environment of Software Defined Network 软件定义网络控制器环境中的 DDoS 攻击综述
Pub Date : 2024-07-24 DOI: 10.4108/eetsis.5823
Gunjani Vaghela, Nishant Sanghani, Bhavesh Borisaniya
Distributed Denial of Service (DDoS) attacks pose a significant threat to the security and availability of networks. With the increasing adoption of Software-Defined Networking (SDN) and its multi-controller architectures, there is a need to explore effective DDoS attack detection mechanisms tailored to these environments. An overview of the current research on detecting DDoS attacks in SDN environments, with a focus on different detection techniques, methodologies and problems is presented in this survey paper. The survey attempt to identify the limitations and strengths of current approaches and propose potential research directions for improving DDoS detection in this context.
分布式拒绝服务(DDoS)攻击对网络的安全性和可用性构成了重大威胁。随着越来越多地采用软件定义网络(SDN)及其多控制器架构,有必要探索适合这些环境的有效 DDoS 攻击检测机制。本调查报告概述了当前在 SDN 环境中检测 DDoS 攻击的研究,重点关注不同的检测技术、方法和问题。调查试图找出当前方法的局限性和优势,并提出在此背景下改进 DDoS 检测的潜在研究方向。
{"title":"Review on DDoS Attack in Controller Environment of Software Defined Network","authors":"Gunjani Vaghela, Nishant Sanghani, Bhavesh Borisaniya","doi":"10.4108/eetsis.5823","DOIUrl":"https://doi.org/10.4108/eetsis.5823","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks pose a significant threat to the security and availability of networks. With the increasing adoption of Software-Defined Networking (SDN) and its multi-controller architectures, there is a need to explore effective DDoS attack detection mechanisms tailored to these environments. An overview of the current research on detecting DDoS attacks in SDN environments, with a focus on different detection techniques, methodologies and problems is presented in this survey paper. The survey attempt to identify the limitations and strengths of current approaches and propose potential research directions for improving DDoS detection in this context.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"66 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel color image encryption method using Fibonacci transformation and chaotic systems 利用斐波那契变换和混沌系统的新型彩色图像加密方法
Pub Date : 2024-07-23 DOI: 10.4108/eetsis.5452
Chunming Xu
INTRODUCTION: With the rapid increase in network information data, the protection of image data has become a challenging task, where image encryption technology can play an important role. This paper studies color image encryption algorithms and proposes a novel method for color image encryption to enhance the security and effectiveness of image encryption.OBJECTIVES: The purpose of this study is to effectively integrate different channel information of color images, thereby improving the effect of pixel decomposition based image encryption algorithm. Different indicators are used to analyze the effect of image encryption, and it is also compared with existing image encryption algorithms.METHODS: Initially, through pixel decomposition, the pixel values of the R, G, B channels of the color image, each with a depth of 8 bits, are decomposed into two integers between 0-15 and combined into a new data matrix. Then, multiple rounds of scrambling are performed on the transformed matrix. Next, the Fibonacci transformation matrix is applied to the scanned matrix to further change the values of its elements. Finally, XOR diffusion operation is carried out to obtain the encrypted image.RESULTS: Experimental results show that the proposed method achieves relatively good results in multiple image encryption indicator tests. The algorithm not only inherits the advantages of existing image encryption but also effectively integrates the information of each channel of the color image, providing better security.CONCLUSION: This study further proves the effectiveness of image encryption algorithms based on pixel decomposition and provides a new idea for better color image encryption algorithms, which is expected to be applied to other issues such as information hiding and data protection.
简介:随着网络信息数据的迅速增加,图像数据的保护成为一项具有挑战性的任务,而图像加密技术在其中可以发挥重要作用。本文研究了彩色图像加密算法,并提出了一种新型的彩色图像加密方法,以提高图像加密的安全性和有效性:本研究的目的是有效整合彩色图像的不同通道信息,从而提高基于像素分解的图像加密算法的效果。方法:首先,通过像素分解,将彩色图像的 R、G、B 三个通道的像素值(每个通道的深度为 8 位)分解成 0-15 之间的两个整数,并组合成一个新的数据矩阵。然后,对转换后的矩阵进行多轮扰码处理。接着,将斐波那契变换矩阵应用于扫描矩阵,进一步改变其元素的值。结果:实验结果表明,所提出的方法在多个图像加密指标测试中取得了比较好的结果。结论:本研究进一步证明了基于像素分解的图像加密算法的有效性,为更好的彩色图像加密算法提供了新思路,有望应用于信息隐藏和数据保护等其他问题。
{"title":"A novel color image encryption method using Fibonacci transformation and chaotic systems","authors":"Chunming Xu","doi":"10.4108/eetsis.5452","DOIUrl":"https://doi.org/10.4108/eetsis.5452","url":null,"abstract":"INTRODUCTION: With the rapid increase in network information data, the protection of image data has become a challenging task, where image encryption technology can play an important role. This paper studies color image encryption algorithms and proposes a novel method for color image encryption to enhance the security and effectiveness of image encryption.OBJECTIVES: The purpose of this study is to effectively integrate different channel information of color images, thereby improving the effect of pixel decomposition based image encryption algorithm. Different indicators are used to analyze the effect of image encryption, and it is also compared with existing image encryption algorithms.METHODS: Initially, through pixel decomposition, the pixel values of the R, G, B channels of the color image, each with a depth of 8 bits, are decomposed into two integers between 0-15 and combined into a new data matrix. Then, multiple rounds of scrambling are performed on the transformed matrix. Next, the Fibonacci transformation matrix is applied to the scanned matrix to further change the values of its elements. Finally, XOR diffusion operation is carried out to obtain the encrypted image.RESULTS: Experimental results show that the proposed method achieves relatively good results in multiple image encryption indicator tests. The algorithm not only inherits the advantages of existing image encryption but also effectively integrates the information of each channel of the color image, providing better security.CONCLUSION: This study further proves the effectiveness of image encryption algorithms based on pixel decomposition and provides a new idea for better color image encryption algorithms, which is expected to be applied to other issues such as information hiding and data protection.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"31 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141814146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FaceNet – A Framework for Age Variation Facial Digital Images FaceNet - 年龄差异面部数字图像框架
Pub Date : 2024-07-19 DOI: 10.4108/eetsis.5198
Chethana H.T., Trisiladevi C. Nagavi, Mahesha P., Vinayakumar Ravi, Gururaj H.L.
Automated face recognition plays a vital role in forensics. The most important evidence in the criminal investigation is the facial images captured from the crime scene, as they represent the identity of the people involved in crime. The role of law enforcement agencies is to identify the facial images from the suitable database. This information can be treated as strong evidence for the law enforcement agencies which becomes the most important evidence in global counter-terrorism initiatives. Contour of chin and cheek, distancebetween different features and shapes of facial components are some of the parameters considered by the forensic experts for manual facial identification process. This process is time consuming, and it is a tedious job. To address this issue, there is a need for developing an automated face recognition system for forensics. As a result, FaceNet – a framework for age variation facial digital images is discussed in this research work. Experiments are evaluated on CSA dataset with three age variations which provides a recognition accuracy of86.8% and performs better than the existing algorithms.
自动人脸识别在法医学中起着至关重要的作用。刑事调查中最重要的证据是从犯罪现场捕捉到的面部图像,因为它们代表了涉案人员的身份。执法机构的职责就是从合适的数据库中识别面部图像。这些信息可作为执法机构的有力证据,成为全球反恐行动中最重要的证据。下巴和脸颊的轮廓、不同特征之间的距离和面部组件的形状是法医专家在人工面部识别过程中考虑的一些参数。这一过程非常耗时,是一项繁琐的工作。为了解决这个问题,有必要开发一个用于取证的自动人脸识别系统。因此,本研究工作讨论了 FaceNet--一个用于年龄变化面部数字图像的框架。实验在 CSA 数据集上进行了评估,该数据集有三种年龄变化,识别准确率为 86.8%,优于现有算法。
{"title":"FaceNet – A Framework for Age Variation Facial Digital Images","authors":"Chethana H.T., Trisiladevi C. Nagavi, Mahesha P., Vinayakumar Ravi, Gururaj H.L.","doi":"10.4108/eetsis.5198","DOIUrl":"https://doi.org/10.4108/eetsis.5198","url":null,"abstract":"Automated face recognition plays a vital role in forensics. The most important evidence in the criminal investigation is the facial images captured from the crime scene, as they represent the identity of the people involved in crime. The role of law enforcement agencies is to identify the facial images from the suitable database. This information can be treated as strong evidence for the law enforcement agencies which becomes the most important evidence in global counter-terrorism initiatives. Contour of chin and cheek, distancebetween different features and shapes of facial components are some of the parameters considered by the forensic experts for manual facial identification process. This process is time consuming, and it is a tedious job. To address this issue, there is a need for developing an automated face recognition system for forensics. As a result, FaceNet – a framework for age variation facial digital images is discussed in this research work. Experiments are evaluated on CSA dataset with three age variations which provides a recognition accuracy of86.8% and performs better than the existing algorithms.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 464","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141823579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eye Disease Detection Using Deep Learning Models with Transfer Learning Techniques 利用深度学习模型和迁移学习技术检测眼疾
Pub Date : 2024-07-19 DOI: 10.4108/eetsis.5971
Bhavadharini R.M., Kalla Bharath Vardhan, Mandava Nidhish, Surya Kiran C., Dudekula Nahid Shameem, Varanasi Sai Charan
INTRODUCTION: Diabetic Retinopathy, Cataract and Glaucoma are the major eye diseases posing significant diagnostic challenges due to their asymptotic nature at their early stages. These diseases if not detected and diagnosed at their early stages may lead to severe visual impairment and even can cause blindness in human beings. Early detection of eye diseases showed an exceptional recovery rate. Traditional diagnostic methods primarily relying on expertise in the field of ophthalmology involve a time-consuming process. With technological advancements in the field of imaging techniques, a large volume of medical images have been created which can be utilized for developing more accurate diagnostic tools in the field. Deep learning (DL) models are playing a significant role in analyzing medical images. DL algorithms can automatically learn the features which indicate eye diseases from eye image datasets. Training DL models, however, requires a significant amount of data and computational resources. To overcome this, we use advanced deep learning algorithms combined with transfer-learning techniques. Leveraging the power of deep learning, we aim to develop sophisticated models that can distinguish different eye diseases in medical image data. OBJECTIVES: To improve the accuracy and efficiency of early detection methods, improve diagnostic precision, and intervene in these challenging ocular conditions in a timely manner.METHODS: The well-known Deep Learning architectures VGG19, InceptionV3 and ResNet50 architectures with transfer learning were evaluated and the results are compared. RESULTS: VGG19, InceptionV3 and ResNet50 architectures with transfer learning achieved 90.33%, 89.8% and 99.94% accuracies, respectively. The precision, recall, and F1 scores for VGG19 were recorded as 79.17%, 79.17%, and 78.21%, while InceptionV3 showed 82.56%, 82.38%, and 82.11% and ResNet50 has 96.28%, 96.2%, and 96.24%.CONCLUSION: The Convolutional Neural Network models VGG19, Inception v3, ResNet50 combined with transfer learning achieve better results than the original Convolutional Neural Network models.
导言:糖尿病视网膜病变、白内障和青光眼是主要的眼科疾病,由于其早期无症状,给诊断带来了巨大挑战。这些疾病如果不能在早期发现和诊断,可能会导致严重的视力损伤,甚至导致失明。眼科疾病的早期发现显示了极高的康复率。传统的诊断方法主要依赖眼科领域的专业知识,过程耗时。随着成像技术领域的技术进步,产生了大量医学图像,可用于开发该领域更准确的诊断工具。深度学习(DL)模型在分析医学图像方面发挥着重要作用。深度学习算法可以自动学习眼科图像数据集中显示眼部疾病的特征。然而,训练 DL 模型需要大量的数据和计算资源。为了克服这一问题,我们采用了先进的深度学习算法,并结合了迁移学习技术。利用深度学习的强大功能,我们的目标是开发出能够在医学图像数据中区分不同眼部疾病的复杂模型。目标:方法:对著名的深度学习架构 VGG19、InceptionV3 和 ResNet50 架构与迁移学习进行了评估,并对结果进行了比较。结果:采用迁移学习的 VGG19、InceptionV3 和 ResNet50 架构的准确率分别为 90.33%、89.8% 和 99.94%。VGG19 的精确度、召回率和 F1 分数分别为 79.17%、79.17% 和 78.21%,而 InceptionV3 的精确度、召回率和 F1 分数分别为 82.56%、82.38% 和 82.11%,ResNet50 的精确度、召回率和 F1 分数分别为 96.28%、96.2% 和 96.24%。
{"title":"Eye Disease Detection Using Deep Learning Models with Transfer Learning Techniques","authors":"Bhavadharini R.M., Kalla Bharath Vardhan, Mandava Nidhish, Surya Kiran C., Dudekula Nahid Shameem, Varanasi Sai Charan","doi":"10.4108/eetsis.5971","DOIUrl":"https://doi.org/10.4108/eetsis.5971","url":null,"abstract":"INTRODUCTION: Diabetic Retinopathy, Cataract and Glaucoma are the major eye diseases posing significant diagnostic challenges due to their asymptotic nature at their early stages. These diseases if not detected and diagnosed at their early stages may lead to severe visual impairment and even can cause blindness in human beings. Early detection of eye diseases showed an exceptional recovery rate. Traditional diagnostic methods primarily relying on expertise in the field of ophthalmology involve a time-consuming process. With technological advancements in the field of imaging techniques, a large volume of medical images have been created which can be utilized for developing more accurate diagnostic tools in the field. Deep learning (DL) models are playing a significant role in analyzing medical images. DL algorithms can automatically learn the features which indicate eye diseases from eye image datasets. Training DL models, however, requires a significant amount of data and computational resources. To overcome this, we use advanced deep learning algorithms combined with transfer-learning techniques. Leveraging the power of deep learning, we aim to develop sophisticated models that can distinguish different eye diseases in medical image data. \u0000OBJECTIVES: To improve the accuracy and efficiency of early detection methods, improve diagnostic precision, and intervene in these challenging ocular conditions in a timely manner.\u0000METHODS: The well-known Deep Learning architectures VGG19, InceptionV3 and ResNet50 architectures with transfer learning were evaluated and the results are compared. \u0000RESULTS: VGG19, InceptionV3 and ResNet50 architectures with transfer learning achieved 90.33%, 89.8% and 99.94% accuracies, respectively. The precision, recall, and F1 scores for VGG19 were recorded as 79.17%, 79.17%, and 78.21%, while InceptionV3 showed 82.56%, 82.38%, and 82.11% and ResNet50 has 96.28%, 96.2%, and 96.24%.\u0000CONCLUSION: The Convolutional Neural Network models VGG19, Inception v3, ResNet50 combined with transfer learning achieve better results than the original Convolutional Neural Network models.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"105 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP. JWTAMH:基于 JSON 网络令牌的 HADOOP 验证机制。
Pub Date : 2024-07-17 DOI: 10.4108/eetsis.5429
Manish Gupta, Anish Gupta, Britto Raj S., Annu Sharma
The Hadoop platform has become a widely adopted distributed computing platform for handling large-scale data processing tasks. However, the security of the Hadoop platform has become a major concern due to the increased risk of cyber-attacks. To address this concern, various security mechanisms have been proposed for the Hadoop platform, including authentication and access control. This research paper proposes a token-based authentication mechanism to enhance the security of the Hadoop platform. The proposed mechanism utilizes a combination of Kerberos and JSON Web Tokens (JWT) for secure communication between Hadoop components. The experimental results demonstrate the effectiveness of the Single point of failure, Guessing attack, Replay Attack, Brute force attack, and Dictionary attack. The proposed model has better performance in terms of average processing time and accuracy of authentication than other models.
Hadoop 平台已成为处理大规模数据处理任务的广泛采用的分布式计算平台。然而,由于网络攻击风险的增加,Hadoop 平台的安全性已成为一个主要问题。为了解决这个问题,人们为 Hadoop 平台提出了各种安全机制,包括身份验证和访问控制。本研究论文提出了一种基于令牌的身份验证机制,以增强 Hadoop 平台的安全性。该机制结合使用了 Kerberos 和 JSON Web 标记(JWT),以确保 Hadoop 组件之间的安全通信。实验结果证明了单点故障、猜测攻击、重放攻击、暴力攻击和字典攻击的有效性。与其他模型相比,所提出的模型在平均处理时间和认证准确性方面具有更好的性能。
{"title":"JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP.","authors":"Manish Gupta, Anish Gupta, Britto Raj S., Annu Sharma","doi":"10.4108/eetsis.5429","DOIUrl":"https://doi.org/10.4108/eetsis.5429","url":null,"abstract":"The Hadoop platform has become a widely adopted distributed computing platform for handling large-scale data processing tasks. However, the security of the Hadoop platform has become a major concern due to the increased risk of cyber-attacks. To address this concern, various security mechanisms have been proposed for the Hadoop platform, including authentication and access control. This research paper proposes a token-based authentication mechanism to enhance the security of the Hadoop platform. The proposed mechanism utilizes a combination of Kerberos and JSON Web Tokens (JWT) for secure communication between Hadoop components. The experimental results demonstrate the effectiveness of the Single point of failure, Guessing attack, Replay Attack, Brute force attack, and Dictionary attack. The proposed model has better performance in terms of average processing time and accuracy of authentication than other models.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Sectional Analysis of Australian Dental Practitioners’ Perceptions of Teledentistry 澳大利亚牙科医生对远程牙科治疗看法的横断面分析
Pub Date : 2024-07-16 DOI: 10.4108/eetsis.5366
Joshua Lee, J. Park, Hua Wang, Boxi Feng, Kate N Wang
INTRODUCTION: There has been an increased use of teledentistry by dental practitioners in Australia as a response to the COVID-19 pandemic. Previous studies conducted analysing the opinions of dental practitioners were performed prior to the pandemic, and therefore it is important to determine if perceptions regarding teledentistry have changed following the outbreak.OBJECTIVES: The aim of this study was to determine the perceptions of oral healthcare professionals regarding teledentistry in a clinical setting.METHODS: The cross-sectional study involved an anonymous electronic questionnaire with a sample of 152 dental practitioners. The questionnaire contained 28 questions utilizing a 5-point Likert-scale to assess the perceptions of general dentists on teledentistry regarding diagnosis, accessibility, patient care, technology and finances. Chi-squared test and analysis of variance (ANOVA) were used to analyse the results and percentages of agreement and disagreement were calculated.RESULTS: The participants of the questionnaire believed that teledentistry was effective for consultations and in the diagnosis of simple cases. They indicated large benefits of teledentistry in improving access, delivering post-operative care, and triaging patients, and found it particularly useful during the COVID-19 pandemic. However, the participants felt that teledentistry was ineffective in diagnosing complex cases such as pathology. Concerns were also raised regarding the interventional capacity of teledentistry, the quality of the technology, data security and medicolegal issues. In general, participants preferred in-person care in comparison with teledentistry. They were neutral regarding finance.CONCLUSION: The study provided an insight into the perceptions of Australian dental practitioners regarding teledentistry post-COVID-19. Opinions have changed slightly, but there are large hurdles still to overcome before teledentistry is more widely accepted. Research should be continued to further improve teledentistry in the future.
简介:为应对 COVID-19 大流行,澳大利亚的牙科医生越来越多地使用远程牙科治疗。以前对牙科医生的意见进行分析的研究都是在大流行之前进行的,因此确定人们对远程牙科治疗的看法在大流行之后是否发生了变化非常重要:方法:这项横断面研究采用匿名电子问卷的形式,抽样调查了 152 名牙科医生。问卷包含 28 个问题,采用 5 点李克特量表评估普通牙医对远程医疗在诊断、可及性、患者护理、技术和财务方面的看法。结果:参与问卷调查的人认为远程医疗在咨询和诊断简单病例方面很有效。他们表示远程医疗在改善就诊、提供术后护理和分流病人方面有很大的好处,并认为远程医疗在 COVID-19 大流行期间特别有用。然而,与会者认为远程会诊在诊断病理等复杂病例方面效果不佳。与会者还对远程会诊的介入能力、技术质量、数据安全和医疗法律问题表示担忧。总体而言,与远程门诊相比,与会者更倾向于亲自就诊。结论:本研究深入探讨了澳大利亚牙科医生对第 19 次鸦片战争后远程会诊的看法。他们的观点略有改变,但要使远程口腔治疗被更广泛地接受,仍有许多障碍需要克服。今后应继续开展研究,进一步改进远程医疗。
{"title":"Cross-Sectional Analysis of Australian Dental Practitioners’ Perceptions of Teledentistry","authors":"Joshua Lee, J. Park, Hua Wang, Boxi Feng, Kate N Wang","doi":"10.4108/eetsis.5366","DOIUrl":"https://doi.org/10.4108/eetsis.5366","url":null,"abstract":"INTRODUCTION: There has been an increased use of teledentistry by dental practitioners in Australia as a response to the COVID-19 pandemic. Previous studies conducted analysing the opinions of dental practitioners were performed prior to the pandemic, and therefore it is important to determine if perceptions regarding teledentistry have changed following the outbreak.\u0000OBJECTIVES: The aim of this study was to determine the perceptions of oral healthcare professionals regarding teledentistry in a clinical setting.\u0000METHODS: The cross-sectional study involved an anonymous electronic questionnaire with a sample of 152 dental practitioners. The questionnaire contained 28 questions utilizing a 5-point Likert-scale to assess the perceptions of general dentists on teledentistry regarding diagnosis, accessibility, patient care, technology and finances. Chi-squared test and analysis of variance (ANOVA) were used to analyse the results and percentages of agreement and disagreement were calculated.\u0000RESULTS: The participants of the questionnaire believed that teledentistry was effective for consultations and in the diagnosis of simple cases. They indicated large benefits of teledentistry in improving access, delivering post-operative care, and triaging patients, and found it particularly useful during the COVID-19 pandemic. However, the participants felt that teledentistry was ineffective in diagnosing complex cases such as pathology. Concerns were also raised regarding the interventional capacity of teledentistry, the quality of the technology, data security and medicolegal issues. In general, participants preferred in-person care in comparison with teledentistry. They were neutral regarding finance.\u0000CONCLUSION: The study provided an insight into the perceptions of Australian dental practitioners regarding teledentistry post-COVID-19. Opinions have changed slightly, but there are large hurdles still to overcome before teledentistry is more widely accepted. Research should be continued to further improve teledentistry in the future.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"1 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141640595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fortifying Patient Data Security in the Digital Era: A Two-Layer Approach with Data Hiding and Electrocardiogram 加强数字时代的患者数据安全:利用数据隐藏和心电图的双层方法
Pub Date : 2024-07-15 DOI: 10.4108/eetsis.5644
Praveen Gupta, Ajay Prasad
In an era dominated by digital technology, the imperative of securing patient data cannot be overstated. The deployment of advanced protective measures, including encryption, firewalls, and robust authentication protocols, is an absolute necessity when it comes to preserving the confidentiality and integrity of sensitive patient information. Furthermore, the establishment of stringent access controls serves as a fundamental safeguard, ensuring that only authorized personnel are granted access to this invaluable data. An innovative development in the realm of patient data protection is the utilization of ElectroCardioGram (ECG) as a unique identifier for individuals. In the context of this study, ECG data is ingeniously embedded within cover images using a technique known as Reversible Data Hiding (RDH). RDH offers a distinctive advantage by ensuring that the original image can be fully restored without loss of data after extraction. This achievement is made possible through the application of inventive pixel interpolation and histogram shifting algorithms. Crucially, the study's simulations, conducted across a diverse array of images, underscore the enhanced embedding capacity of the RDH technique while maintaining a commendable balance in terms of the Peak Signal to Noise Ratio (PSNR) and boundary map. This empirical evidence corroborates the efficacy of the approach and its potential to provide an advanced level of security for patient data in the digital landscape.
在数字技术占主导地位的时代,保护患者数据安全的必要性怎么强调都不为过。部署先进的保护措施,包括加密、防火墙和强大的身份验证协议,是保护敏感病人信息的机密性和完整性的绝对必要条件。此外,建立严格的访问控制也是一项基本保障措施,可确保只有获得授权的人员才能访问这些宝贵的数据。患者数据保护领域的一项创新发展是利用心电图(ECG)作为个人的唯一标识符。在这项研究中,心电图数据被巧妙地嵌入到使用可逆数据隐藏(RDH)技术的封面图像中。RDH 具有独特的优势,可确保在提取数据后完全恢复原始图像而不会丢失数据。这一成就是通过应用创造性的像素插值和直方图移动算法实现的。最重要的是,这项研究对各种图像进行了模拟,结果表明 RDH 技术的嵌入能力得到了增强,同时在峰值信噪比(PSNR)和边界图方面保持了值得称赞的平衡。这些经验证据证实了该方法的有效性及其在数字环境中为患者数据提供高级安全保护的潜力。
{"title":"Fortifying Patient Data Security in the Digital Era: A Two-Layer Approach with Data Hiding and Electrocardiogram","authors":"Praveen Gupta, Ajay Prasad","doi":"10.4108/eetsis.5644","DOIUrl":"https://doi.org/10.4108/eetsis.5644","url":null,"abstract":"In an era dominated by digital technology, the imperative of securing patient data cannot be overstated. The deployment of advanced protective measures, including encryption, firewalls, and robust authentication protocols, is an absolute necessity when it comes to preserving the confidentiality and integrity of sensitive patient information. Furthermore, the establishment of stringent access controls serves as a fundamental safeguard, ensuring that only authorized personnel are granted access to this invaluable data. An innovative development in the realm of patient data protection is the utilization of ElectroCardioGram (ECG) as a unique identifier for individuals. In the context of this study, ECG data is ingeniously embedded within cover images using a technique known as Reversible Data Hiding (RDH). RDH offers a distinctive advantage by ensuring that the original image can be fully restored without loss of data after extraction. This achievement is made possible through the application of inventive pixel interpolation and histogram shifting algorithms. Crucially, the study's simulations, conducted across a diverse array of images, underscore the enhanced embedding capacity of the RDH technique while maintaining a commendable balance in terms of the Peak Signal to Noise Ratio (PSNR) and boundary map. This empirical evidence corroborates the efficacy of the approach and its potential to provide an advanced level of security for patient data in the digital landscape.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"23 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141647971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New directions for adapting intelligent communication and standardization towards 6G 面向 6G 的智能通信和标准化新方向
Pub Date : 2024-07-12 DOI: 10.4108/eetsis.5126
Anjanabhargavi Kulkarni, R. H. Goudar, Vijayalaxmi N. Rathod, D. G. M., Geetabai S. Hukkeri
Rapid advancements in wireless communication technology have made it easier to transfer digital data globally. With the complete assistance of artificial intelligence, the sixth-generation (6G) system—a new paradigm in wireless communication—is anticipated to be put into use between 2027 and 2030. Faster system capacity, faster data rate, lower latency, higher security, and better quality of service (QoS) in comparison to the 5G system are some of the main concerns that need to be addressed beyond 5G. Combining the growing need for more network coverage, lower latency, and greater data rates is the aim of 6G. It is recommended that to meet these needs and enable new services and applications, intelligent communication be implemented. The main enablers and facilitators for implementing intelligent communication beyond 5G are outlined in this paper. The article provides the horizon for new adaptations and standardization for integrating 6G intelligent communication in future networks and outlines the requirements and use-case scenarios for 6G. It also highlights the potential of 6G and key enablers from the standpoint of flexibility. It examines key research gaps like spectrum efficiency, network parameters, infrastructure deployment, and security flaws in past transitions while contrasting 5G and 6G communication. To overcome these challenges, modernizing 6G research domains are essential. Therefore, this review article focuses on the importance of 6G wireless communication and its network architecture, which also provides the technological paradigm shift from 5G to 6G. Furthermore, it highlights popular domains such as Artificial Intelligence, Internet of Things, Managing Big Data, Wireless Mobile networks, and Massive MIMO (Multiple Input Multiple Output), Quantum communication, Block chain Technology, Terahertz Communications (THz), Cell-free Communications and Intelligent Reflecting Surface as research objectives.
无线通信技术的飞速发展使全球数字数据传输变得更加容易。在人工智能的全面协助下,第六代(6G)系统--无线通信的新典范--预计将在 2027 年至 2030 年间投入使用。与 5G 系统相比,更快的系统容量、更快的数据传输速率、更低的延迟、更高的安全性和更好的服务质量(QoS)是 5G 系统之外需要解决的一些主要问题。将对更大网络覆盖范围、更低时延和更高数据传输速率的日益增长的需求结合起来,是 6G 的目标。为满足这些需求并启用新的服务和应用,建议实施智能通信。本文概述了实施 5G 以外智能通信的主要推动因素和促进因素。文章为在未来网络中集成 6G 智能通信提供了新的适应性和标准化前景,并概述了 6G 的要求和使用场景。文章还从灵活性的角度强调了 6G 的潜力和关键推动因素。报告在对比 5G 和 6G 通信的同时,还审视了过去过渡中的关键研究差距,如频谱效率、网络参数、基础设施部署和安全缺陷。要克服这些挑战,必须实现 6G 研究领域的现代化。因此,这篇综述文章重点探讨了 6G 无线通信及其网络架构的重要性,并介绍了从 5G 到 6G 的技术范式转变。此外,文章还强调了人工智能、物联网、大数据管理、无线移动网络、大规模多输入多输出(MIMO)、量子通信、区块链技术、太赫兹通信(THz)、无细胞通信和智能反射面等热门领域的研究目标。
{"title":"New directions for adapting intelligent communication and standardization towards 6G","authors":"Anjanabhargavi Kulkarni, R. H. Goudar, Vijayalaxmi N. Rathod, D. G. M., Geetabai S. Hukkeri","doi":"10.4108/eetsis.5126","DOIUrl":"https://doi.org/10.4108/eetsis.5126","url":null,"abstract":"Rapid advancements in wireless communication technology have made it easier to transfer digital data globally. With the complete assistance of artificial intelligence, the sixth-generation (6G) system—a new paradigm in wireless communication—is anticipated to be put into use between 2027 and 2030. Faster system capacity, faster data rate, lower latency, higher security, and better quality of service (QoS) in comparison to the 5G system are some of the main concerns that need to be addressed beyond 5G. Combining the growing need for more network coverage, lower latency, and greater data rates is the aim of 6G. It is recommended that to meet these needs and enable new services and applications, intelligent communication be implemented. The main enablers and facilitators for implementing intelligent communication beyond 5G are outlined in this paper. The article provides the horizon for new adaptations and standardization for integrating 6G intelligent communication in future networks and outlines the requirements and use-case scenarios for 6G. It also highlights the potential of 6G and key enablers from the standpoint of flexibility. It examines key research gaps like spectrum efficiency, network parameters, infrastructure deployment, and security flaws in past transitions while contrasting 5G and 6G communication. To overcome these challenges, modernizing 6G research domains are essential. Therefore, this review article focuses on the importance of 6G wireless communication and its network architecture, which also provides the technological paradigm shift from 5G to 6G. Furthermore, it highlights popular domains such as Artificial Intelligence, Internet of Things, Managing Big Data, Wireless Mobile networks, and Massive MIMO (Multiple Input Multiple Output), Quantum communication, Block chain Technology, Terahertz Communications (THz), Cell-free Communications and Intelligent Reflecting Surface as research objectives.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"56 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141654319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bibliometric Analysis of Deepfakes : Trends, Applications and Challenges 深度伪造的文献计量分析:趋势、应用与挑战
Pub Date : 2024-07-12 DOI: 10.4108/eetsis.4883
Diya Garg, Rupali Gill
INTRODUCTION: The rapid progress in artificial intelligence (AI) over the past decade has ushered in a new era of transformative technologies. Deep learning has emerged as a potential tool, demonstrating remarkable capabilities in various applications. This paper focuses on one of the controversial applications of deep learning commonly known as deepfakes.OBJECTIVES: The main objective of this comprehensive bibliometric survey is to explore the trends, applications and challenges of deepfakes over the course of last 4.5 years.METHODS: In this research, a total of 794 documents published from 2019 to July 2023 were acquired from Scopus database. To conduct this bibliometric analysis, RStudio and VOSviewer tools have been used. In this current analysis, deepfake challenges, countries, sources, top 20 cited documents, and research trends in the field of deepfake have been included.RESULTS: The analysis highlights a substantial increase in deepfake publications from January 2019 to July 2023. Out of the 8 document types identified 38% are article publications. In addition, from the journal articles it has been depicted that the journal source entitled "Advances in Computer Vision and Pattern Recognition" holds Q1 status with 8.3% publications in the deepfakes domain during the targeted year range. Moreover, the data visualizations reveal the growing international collaboration, with the USA as the most prolific country in deepfake research.CONCLUSION: Despite numerous reviews on deepfakes, there has been a notable absence of comprehensive scientometric analyses. This paper fills this gap through a bibliometric study using the Scopus database as urderlying source. The analysis includes keyword analysis, leading research-contributing institutes, co-country collaboration, and co-keyword occurrence. The findings offer valuable insights for scholars, providing a foundational understanding including document types, prominent journals, international collaboration trends, and influential institutions and offering valuable guidance for future scholarly pursuits in this evolving field.
导言:过去十年,人工智能(AI)取得了突飞猛进的发展,开创了变革性技术的新时代。深度学习已成为一种潜在的工具,在各种应用中展现出非凡的能力。本文将重点讨论深度学习的一种有争议的应用,即通常所说的深度伪造:方法:本研究从 Scopus 数据库中获取了 2019 年至 2023 年 7 月间发表的 794 篇文献。为了进行文献计量分析,使用了 RStudio 和 VOSviewer 工具。结果:分析结果表明,从2019年1月到2023年7月,deepfake出版物大幅增加。在确定的 8 种文献类型中,38% 是文章出版物。此外,从期刊论文来看,题为《计算机视觉与模式识别进展》(Advances in Computer Vision and Pattern Recognition)的期刊源在目标年份范围内以 8.3% 的深度伪造领域出版物占据第一位。此外,数据可视化显示国际合作日益增多,美国是深度伪造研究最活跃的国家。本文以 Scopus 数据库为基础,通过文献计量学研究填补了这一空白。分析包括关键词分析、主要研究贡献机构、合作国家和共同关键词出现情况。研究结果为学者们提供了宝贵的见解,使他们对文献类型、著名期刊、国际合作趋势和有影响力的机构有了基本的了解,并为今后在这一不断发展的领域开展学术研究提供了宝贵的指导。
{"title":"A Bibliometric Analysis of Deepfakes : Trends, Applications and Challenges","authors":"Diya Garg, Rupali Gill","doi":"10.4108/eetsis.4883","DOIUrl":"https://doi.org/10.4108/eetsis.4883","url":null,"abstract":"INTRODUCTION: The rapid progress in artificial intelligence (AI) over the past decade has ushered in a new era of transformative technologies. Deep learning has emerged as a potential tool, demonstrating remarkable capabilities in various applications. This paper focuses on one of the controversial applications of deep learning commonly known as deepfakes.OBJECTIVES: The main objective of this comprehensive bibliometric survey is to explore the trends, applications and challenges of deepfakes over the course of last 4.5 years.METHODS: In this research, a total of 794 documents published from 2019 to July 2023 were acquired from Scopus database. To conduct this bibliometric analysis, RStudio and VOSviewer tools have been used. In this current analysis, deepfake challenges, countries, sources, top 20 cited documents, and research trends in the field of deepfake have been included.RESULTS: The analysis highlights a substantial increase in deepfake publications from January 2019 to July 2023. Out of the 8 document types identified 38% are article publications. In addition, from the journal articles it has been depicted that the journal source entitled \"Advances in Computer Vision and Pattern Recognition\" holds Q1 status with 8.3% publications in the deepfakes domain during the targeted year range. Moreover, the data visualizations reveal the growing international collaboration, with the USA as the most prolific country in deepfake research.CONCLUSION: Despite numerous reviews on deepfakes, there has been a notable absence of comprehensive scientometric analyses. This paper fills this gap through a bibliometric study using the Scopus database as urderlying source. The analysis includes keyword analysis, leading research-contributing institutes, co-country collaboration, and co-keyword occurrence. The findings offer valuable insights for scholars, providing a foundational understanding including document types, prominent journals, international collaboration trends, and influential institutions and offering valuable guidance for future scholarly pursuits in this evolving field.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"54 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141654449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multitask Sentiment Analysis and Topic Classification Using BERT 使用 BERT 进行多任务情感分析和主题分类
Pub Date : 2024-07-11 DOI: 10.4108/eetsis.5287
P. Shah, Hiren Patel, Priya Swaminarayan
In this study, a multitask model is proposed to perform simultaneous news category and sentiment classification of a diverse dataset comprising 3263 news records spanning across eight categories, including environment, health, education, tech, sports, business, lifestyle, and science. Leveraging the power of Bidirectional Encoder Representations from Transformers (BERT), the algorithm demonstrates remarkable results in both tasks. For topic classification, it achieves an accuracy of 98% along with balanced precision and recall, substantiating its proficiency in categorizing news articles. For sentiment analysis, the model maintains strong accuracy at 94%, distinguishing positive from negative sentiment effectively. This multitask approach showcases the model's versatility and its potential to comprehensively understand and classify news articles based on content and sentiment. This multitask model not only enhances classification accuracy but also improves the efficiency of handling extensive news datasets. Consequently, it empowers news agencies, content recommendation systems, and information retrieval services to offer more personalized and pertinent content to their users.
本研究提出了一种多任务模型,可同时对由 3263 条新闻记录组成的多样化数据集进行新闻类别和情感分类,这些新闻记录横跨环境、健康、教育、科技、体育、商业、生活方式和科学等八个类别。利用变压器双向编码器表示(BERT)的强大功能,该算法在这两项任务中都取得了显著的成果。在主题分类方面,它的准确率达到 98%,精确度和召回率也达到了平衡,证明了它在新闻文章分类方面的能力。在情感分析方面,该模型的准确率高达 94%,能有效区分正面和负面情感。这种多任务方法展示了该模型的多功能性及其根据内容和情感对新闻文章进行全面理解和分类的潜力。这种多任务模型不仅提高了分类的准确性,还提高了处理大量新闻数据集的效率。因此,它能帮助新闻机构、内容推荐系统和信息检索服务为用户提供更加个性化和相关的内容。
{"title":"Multitask Sentiment Analysis and Topic Classification Using BERT","authors":"P. Shah, Hiren Patel, Priya Swaminarayan","doi":"10.4108/eetsis.5287","DOIUrl":"https://doi.org/10.4108/eetsis.5287","url":null,"abstract":"In this study, a multitask model is proposed to perform simultaneous news category and sentiment classification of a diverse dataset comprising 3263 news records spanning across eight categories, including environment, health, education, tech, sports, business, lifestyle, and science. Leveraging the power of Bidirectional Encoder Representations from Transformers (BERT), the algorithm demonstrates remarkable results in both tasks. For topic classification, it achieves an accuracy of 98% along with balanced precision and recall, substantiating its proficiency in categorizing news articles. For sentiment analysis, the model maintains strong accuracy at 94%, distinguishing positive from negative sentiment effectively. This multitask approach showcases the model's versatility and its potential to comprehensively understand and classify news articles based on content and sentiment. This multitask model not only enhances classification accuracy but also improves the efficiency of handling extensive news datasets. Consequently, it empowers news agencies, content recommendation systems, and information retrieval services to offer more personalized and pertinent content to their users.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"79 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141657710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICST Transactions on Scalable Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1