首页 > 最新文献

ICST Transactions on Scalable Information Systems最新文献

英文 中文
Improving Mobile Ad hoc Networks through an investigation of AODV, DSR, and MP-OLSR Routing Protocols 通过研究 AODV、DSR 和 MP-OLSR 路由协议改进移动 Ad hoc 网络
Pub Date : 2024-04-08 DOI: 10.4108/eetsis.5686
Hameed Khan, Kamal K. Kushwah, Jitendra S Thakur, G. Soni, Abhishek Tripathi
  Mobile Ad Hoc Networks (MANETs) pose a dynamically organized wireless network, posing a challenge to establishing quality of service (QoS) due to limitations in bandwidth and the ever-changing network topology. These networks are created by assembling nodes systematically, lacking a central infrastructure, and dynamically linking devices such as mobile phones and tablets. Nodes employ diverse methods for service delivery, all while giving priority to network performance. The effectiveness of protocols is crucial in determining the most efficient paths between source and destination nodes, ensuring the timely delivery of messages. Collaborative agreements with MANETs improve accessibility, allow for partial packet delivery and manage network load, ultimately minimizing delays and contributing to exceptional carrier performance. This article conducts a comparative analysis of simulation parameters for AODV, DSR, and MP-OLSR protocols to explore QoS limitations associated with different routing protocols. The study primarily focuses on evaluating various quality metrics for service improvement, assessing protocol performance. Simulation results underscore the DSR protocol's 80% superior throughput compared to AODV and MP-OLSR. However, in terms of delay and packet delivery ratio, the hybrid protocol outperforms both AODV and DSR protocols. These findings provide a distinct perspective for testing the compliance services of MANETs.
移动 Ad Hoc 网络(MANET)是一种动态组织的无线网络,由于带宽的限制和不断变化的网络拓扑结构,对建立服务质量(QoS)提出了挑战。这些网络是通过系统地组装节点而创建的,缺乏中央基础设施,并动态地连接移动电话和平板电脑等设备。节点采用多种方法提供服务,同时优先考虑网络性能。协议的有效性对于确定源节点和目的节点之间最有效的路径、确保信息的及时传递至关重要。与城域网的协作协议可提高可访问性,允许部分数据包传送,并管理网络负载,最终最大限度地减少延迟,为实现卓越的载波性能做出贡献。本文对 AODV、DSR 和 MP-OLSR 协议的仿真参数进行了比较分析,以探讨与不同路由协议相关的 QoS 限制。研究的主要重点是评估用于改善服务的各种质量指标,评估协议性能。仿真结果表明,与 AODV 和 MP-OLSR 相比,DSR 协议的吞吐量高出 80%。不过,在延迟和数据包传送率方面,混合协议的表现优于 AODV 和 DSR 协议。这些发现为测试城域网的合规性服务提供了一个独特的视角。
{"title":"Improving Mobile Ad hoc Networks through an investigation of AODV, DSR, and MP-OLSR Routing Protocols","authors":"Hameed Khan, Kamal K. Kushwah, Jitendra S Thakur, G. Soni, Abhishek Tripathi","doi":"10.4108/eetsis.5686","DOIUrl":"https://doi.org/10.4108/eetsis.5686","url":null,"abstract":"  \u0000Mobile Ad Hoc Networks (MANETs) pose a dynamically organized wireless network, posing a challenge to establishing quality of service (QoS) due to limitations in bandwidth and the ever-changing network topology. These networks are created by assembling nodes systematically, lacking a central infrastructure, and dynamically linking devices such as mobile phones and tablets. Nodes employ diverse methods for service delivery, all while giving priority to network performance. The effectiveness of protocols is crucial in determining the most efficient paths between source and destination nodes, ensuring the timely delivery of messages. Collaborative agreements with MANETs improve accessibility, allow for partial packet delivery and manage network load, ultimately minimizing delays and contributing to exceptional carrier performance. This article conducts a comparative analysis of simulation parameters for AODV, DSR, and MP-OLSR protocols to explore QoS limitations associated with different routing protocols. The study primarily focuses on evaluating various quality metrics for service improvement, assessing protocol performance. Simulation results underscore the DSR protocol's 80% superior throughput compared to AODV and MP-OLSR. However, in terms of delay and packet delivery ratio, the hybrid protocol outperforms both AODV and DSR protocols. These findings provide a distinct perspective for testing the compliance services of MANETs.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"122 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Sports Equipment Image Intelligent Recognition Response APP in Sports Training and Teaching 体育器材图像智能识别响应 APP 在体育训练和教学中的应用
Pub Date : 2024-04-04 DOI: 10.4108/eetsis.5470
Yang Ju
INTRODUCTION: The paper addresses the integration of intelligent technology in university physical education, highlighting the need for improved analysis methods for sports equipment image recognition apps to enhance teaching quality.OBJECTIVES: The study aims to develop a more accurate and efficient APP use analysis method for sports equipment image recognition, utilizing intelligent optimization algorithms and kernel limit learning machines.METHODS: The proposed method involves constructing an APP usage effect analysis index system, improving kernel limit learning machines through talent mining algorithms, and validating the model using user behavior data. The method integrates a talent mining algorithm to enhance the kernel limit learning machine (KELM). This integration aims to refine the learning machine’s ability to accurately analyze the large datasets generated by the APP's use, optimizing the parameters to improve prediction accuracy and processing speed.RESULTS: Preliminary tests on the sports equipment image intelligent recognition response APP demonstrate improved accuracy and efficiency in analyzing the APP's usage effects in physical education settings. The study compares the performance of the TDA-KELM algorithm with other algorithms like ELM, KELM, GWO-KELM, SOA-KELM, and AOA-KELM. The TDA-KELM algorithm showed the smallest relative error of 0.025 and a minimal time of 0.0025, indicating higher accuracy and efficiency. The analysis highlighted that the TDA-KELM algorithm outperformed others in analyzing the usage effects of sports equipment image recognition apps, with lower errors and faster processing times.CONCLUSION: The study successfully develops an enhanced APP use analysis method, showcasing potential for more accurate and real-time analysis in the application of sports equipment image recognition in physical education. 
引言:本文针对智能技术在大学体育教学中的融合,强调需要改进体育器材图像识别APP的分析方法,以提高教学质量:方法:提出的方法包括构建 APP 使用效果分析指标体系,通过人才挖掘算法改进内核极限学习机,并利用用户行为数据验证模型。该方法整合了一种人才挖掘算法来改进内核极限学习机(KELM)。结果:对体育器材图像智能识别响应APP的初步测试表明,在分析APP在体育教学环境中的使用效果时,准确性和效率都有所提高。研究比较了 TDA-KELM 算法与 ELM、KELM、GWO-KELM、SOA-KELM 和 AOA-KELM 等其他算法的性能。TDA-KELM 算法的相对误差最小,仅为 0.025,所用时间最少,仅为 0.0025,这表明该算法具有更高的准确性和效率。分析结果表明,TDA-KELM 算法在分析运动器材图像识别应用程序的使用效果方面优于其他算法,误差更小,处理时间更快。结论:本研究成功开发了一种增强型 APP 使用分析方法,为运动器材图像识别在体育教学中的应用提供了更准确、更实时的分析潜力。
{"title":"Application of Sports Equipment Image Intelligent Recognition Response APP in Sports Training and Teaching","authors":"Yang Ju","doi":"10.4108/eetsis.5470","DOIUrl":"https://doi.org/10.4108/eetsis.5470","url":null,"abstract":"INTRODUCTION: The paper addresses the integration of intelligent technology in university physical education, highlighting the need for improved analysis methods for sports equipment image recognition apps to enhance teaching quality.OBJECTIVES: The study aims to develop a more accurate and efficient APP use analysis method for sports equipment image recognition, utilizing intelligent optimization algorithms and kernel limit learning machines.METHODS: The proposed method involves constructing an APP usage effect analysis index system, improving kernel limit learning machines through talent mining algorithms, and validating the model using user behavior data. The method integrates a talent mining algorithm to enhance the kernel limit learning machine (KELM). This integration aims to refine the learning machine’s ability to accurately analyze the large datasets generated by the APP's use, optimizing the parameters to improve prediction accuracy and processing speed.RESULTS: Preliminary tests on the sports equipment image intelligent recognition response APP demonstrate improved accuracy and efficiency in analyzing the APP's usage effects in physical education settings. The study compares the performance of the TDA-KELM algorithm with other algorithms like ELM, KELM, GWO-KELM, SOA-KELM, and AOA-KELM. The TDA-KELM algorithm showed the smallest relative error of 0.025 and a minimal time of 0.0025, indicating higher accuracy and efficiency. The analysis highlighted that the TDA-KELM algorithm outperformed others in analyzing the usage effects of sports equipment image recognition apps, with lower errors and faster processing times.CONCLUSION: The study successfully develops an enhanced APP use analysis method, showcasing potential for more accurate and real-time analysis in the application of sports equipment image recognition in physical education. ","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"28 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on User Interface Design and Interaction Experience: A Case Study from "Duolingo" Platform 用户界面设计与交互体验研究:来自 "Duolingo "平台的案例研究
Pub Date : 2024-04-04 DOI: 10.4108/eetsis.5461
Yan Qi, Rui Xu
INTRODUCTION: In today's information age, user interface design and interaction experience are crucial to the success of online platforms.OBJECTIVES: Through in-depth analysis of the user interface design features and user interaction experience of the "Duolingo" platform, this study reveals the potential correlation between them and proposes effective improvement methods to enhance user satisfaction and efficiency.METHODS: Interaction design principles were adopted to guide the improvement and optimization of the user interface. These principles include usability, consistency, and feedback to improve overall user satisfaction with the platform by actively considering user behavior and needs in the design. At the same time, specific mathematical models and equations are used to quantitatively analyze the efficiency and smoothness of the user interaction process, providing designers with more precise directions for improvement.RESULTS: Optimized user interface design and interaction experience can significantly improve user satisfaction and usage efficiency. Users operate the platform more smoothly, which provides useful reference and guidance for the design and development of e-learning platforms.CONCLUSION: Through in-depth analysis of the case of the "Duolingo" platform and the introduction of user experience evaluation methods and interaction design principles, this study has come up with a series of effective improvement measures and verified their effectiveness through experiments. It has certain theoretical and practical significance for improving the user experience of online learning platforms and promoting the design and development of Internet products.
引言:在当今信息时代,用户界面设计和交互体验是在线平台成功的关键:方法:采用交互设计原则来指导用户界面的改进和优化。这些原则包括可用性、一致性和反馈,通过在设计中积极考虑用户行为和需求,提高用户对平台的整体满意度。结果:优化的用户界面设计和交互体验可以显著提高用户满意度和使用效率。结论:本研究通过对 "Duolingo "平台案例的深入分析,引入用户体验评价方法和交互设计原则,提出了一系列行之有效的改进措施,并通过实验验证了其有效性。对于改善在线学习平台的用户体验,促进互联网产品的设计与开发,具有一定的理论和实践意义。
{"title":"Research on User Interface Design and Interaction Experience: A Case Study from \"Duolingo\" Platform","authors":"Yan Qi, Rui Xu","doi":"10.4108/eetsis.5461","DOIUrl":"https://doi.org/10.4108/eetsis.5461","url":null,"abstract":"INTRODUCTION: In today's information age, user interface design and interaction experience are crucial to the success of online platforms.OBJECTIVES: Through in-depth analysis of the user interface design features and user interaction experience of the \"Duolingo\" platform, this study reveals the potential correlation between them and proposes effective improvement methods to enhance user satisfaction and efficiency.METHODS: Interaction design principles were adopted to guide the improvement and optimization of the user interface. These principles include usability, consistency, and feedback to improve overall user satisfaction with the platform by actively considering user behavior and needs in the design. At the same time, specific mathematical models and equations are used to quantitatively analyze the efficiency and smoothness of the user interaction process, providing designers with more precise directions for improvement.RESULTS: Optimized user interface design and interaction experience can significantly improve user satisfaction and usage efficiency. Users operate the platform more smoothly, which provides useful reference and guidance for the design and development of e-learning platforms.CONCLUSION: Through in-depth analysis of the case of the \"Duolingo\" platform and the introduction of user experience evaluation methods and interaction design principles, this study has come up with a series of effective improvement measures and verified their effectiveness through experiments. It has certain theoretical and practical significance for improving the user experience of online learning platforms and promoting the design and development of Internet products.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"2 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140746298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truculent Post Analysis for Hindi Text 针对印地语文本的 Truculent Post 分析
Pub Date : 2024-04-04 DOI: 10.4108/eetsis.5641
Mitali Agarwal, Poorvi Sahu, Nisha Singh, Jasleen, Puneet Sinha, Rahul Kumar Singh
INTRODUCTION: With the rise of social media platforms, the prevalence of truculent posts has become a major concern. These posts, which exhibit anger, aggression, or rudeness, not only foster a hostile environment but also have the potential to stir up harm and violence. OBJECTIVES: It is essential to create efficient algorithms for detecting virulent posts so that they can recognise and delete such content from social media sites automatically. In order to improve accuracy and efficiency, this study evaluates the state-of-the-art in truculent post detection techniques and suggests a unique method that combines deep learning and natural language processing. The major goal of the proposed methodology is to successfully regulate hostile social media posts by keeping an eye on them. METHODS: In order to effectively identify the class labels and create a deep-learning method, we concentrated on comprehending the negation words, sarcasm, and irony using the LSTM model. We used multilingual BERT to produce precise word embedding and deliver semantic data. The phrases were also thoroughly tokenized, taking into consideration the Hindi language, thanks to the assistance of the Indic NLP library. RESULTS:  The F1 scores for the various classes are given in the "Proposed approach” as follows: 84.22 for non-hostile, 49.26 for hostile, 68.69 for hatred, 49.81 for fake, and 39.92 for offensive CONCLUSION: We focused on understanding the negation words, sarcasm and irony using the LSTM model, to classify the class labels accurately and build a deep-learning strategy.
引言:随着社交媒体平台的兴起,辱骂性帖子的盛行已成为人们关注的焦点。这些帖子表现出愤怒、攻击性或粗鲁无礼,不仅助长了敌对环境,还有可能引发伤害和暴力。目标: 必须创建高效的算法来检测恶意帖子,以便自动识别和删除社交媒体网站上的此类内容。为了提高准确性和效率,本研究评估了最先进的恶意帖子检测技术,并提出了一种结合深度学习和自然语言处理的独特方法。所提方法的主要目标是通过密切关注恶意社交媒体帖子,成功对其进行监管。方法:为了有效识别类标签并创建深度学习方法,我们使用 LSTM 模型专注于理解否定词、讽刺和反讽。我们使用多语言 BERT 生成精确的词嵌入并提供语义数据。在 Indic NLP 库的帮助下,考虑到印地语的特点,我们还对短语进行了彻底的标记化处理。结果:"建议的方法 "中给出了不同类别的 F1 分数如下:非敌意为 84.22,敌意为 49.26,仇恨为 68.69,虚假为 49.81,冒犯为 39.92 结论:我们使用 LSTM 模型重点理解了否定词、讽刺和挖苦,从而准确地对类别标签进行分类,并构建了一种深度学习策略。
{"title":"Truculent Post Analysis for Hindi Text","authors":"Mitali Agarwal, Poorvi Sahu, Nisha Singh, Jasleen, Puneet Sinha, Rahul Kumar Singh","doi":"10.4108/eetsis.5641","DOIUrl":"https://doi.org/10.4108/eetsis.5641","url":null,"abstract":"INTRODUCTION: With the rise of social media platforms, the prevalence of truculent posts has become a major concern. These posts, which exhibit anger, aggression, or rudeness, not only foster a hostile environment but also have the potential to stir up harm and violence. \u0000OBJECTIVES: It is essential to create efficient algorithms for detecting virulent posts so that they can recognise and delete such content from social media sites automatically. In order to improve accuracy and efficiency, this study evaluates the state-of-the-art in truculent post detection techniques and suggests a unique method that combines deep learning and natural language processing. The major goal of the proposed methodology is to successfully regulate hostile social media posts by keeping an eye on them. \u0000METHODS: In order to effectively identify the class labels and create a deep-learning method, we concentrated on comprehending the negation words, sarcasm, and irony using the LSTM model. We used multilingual BERT to produce precise word embedding and deliver semantic data. The phrases were also thoroughly tokenized, taking into consideration the Hindi language, thanks to the assistance of the Indic NLP library. \u0000RESULTS:  The F1 scores for the various classes are given in the \"Proposed approach” as follows: 84.22 for non-hostile, 49.26 for hostile, 68.69 for hatred, 49.81 for fake, and 39.92 for offensive \u0000CONCLUSION: We focused on understanding the negation words, sarcasm and irony using the LSTM model, to classify the class labels accurately and build a deep-learning strategy.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"14 32","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140745681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Painting Exhibitions: Utilizing Internet of Things Technology Creating Interactive Art Spaces 智能绘画展:利用物联网技术创建互动艺术空间
Pub Date : 2024-04-04 DOI: 10.4108/eetsis.5375
Xiaoyan Peng, Chuang Chen
INTRODUCTION: With the rapid development of science and technology, intelligent painting exhibitions have gradually attracted people's attention with their unique forms. This study aims to create an interactive art space using Internet of Things (IoT) technology to provide audiences with a more prosperous and deeper art experience. OBJECTIVES: The primary purpose of this study is to explore how to use IoT technology to transform a painting exhibition into a digital space that can interact with the audience. By fusing art and technology, the researchers aim to promote innovation in traditional art presentations and stimulate the audience's freshness and interest in art.METHODS: In the Smart Painting exhibition, the researchers used advanced Internet of Things (IoT) technology to incorporate the audience's movements, emotions, and feedback into the artworks through sensors, wearable devices, and cloud computing. The digital devices in the exhibition space could sense the audience's presence and generate and adjust the art content in real-time according to their movements or emotional state, creating a unique display that interacted with the audience. RESULTS: After implementing the Smart Painting exhibition, the audience's sense of participation and immersion in the art display was significantly increased. Through IoT technology, viewers can interact with the artwork in real-time and feel a more personalized art experience. The digitized exhibition space provided the audience a new level of perception, deepening their understanding and appreciation of the artworks. CONCLUSION: This study demonstrates the feasibility of using IoT technology to create interactive art spaces and shows that this innovation can inject new vitality into traditional painting exhibitions. Through digitalization, the interactivity of the art space is enhanced, providing the audience with a more profound art experience. This approach provides artists with new possibilities for creativity and opens up a fresh vision of participatory art for the audience. The Smart Painting Exhibition is expected to become a new model for integrating art and technology, pushing the art world towards a more innovative and open future. 
引言:随着科学技术的飞速发展,智能画展以其独特的形式逐渐吸引了人们的眼球。本研究旨在利用物联网技术创建一个互动艺术空间,为观众提供更丰富、更深入的艺术体验。目标:本研究的主要目的是探索如何利用物联网技术将画展转变为一个能与观众互动的数字空间。方法:在智能绘画展中,研究人员利用先进的物联网技术,通过传感器、可穿戴设备和云计算,将观众的动作、情绪和反馈融入艺术作品中。展览空间中的数字设备可以感知观众的存在,并根据他们的动作或情绪状态实时生成和调整艺术内容,从而创造出一种与观众互动的独特展示方式。结果:实施智能绘画展览后,观众的参与感和对艺术展示的沉浸感明显增强。通过物联网技术,观众可以与艺术作品进行实时互动,感受更加个性化的艺术体验。数字化的展览空间为观众提供了一个新的感知层面,加深了他们对艺术作品的理解和欣赏。结论:本研究证明了利用物联网技术创建互动艺术空间的可行性,并表明这种创新可以为传统绘画展览注入新的活力。通过数字化,艺术空间的互动性得到增强,为观众提供了更深刻的艺术体验。这种方式为艺术家的创作提供了新的可能性,也为观众开启了参与式艺术的全新视野。智能绘画展有望成为艺术与技术相结合的新模式,推动艺术界走向更加创新和开放的未来。
{"title":"Smart Painting Exhibitions: Utilizing Internet of Things Technology Creating Interactive Art Spaces","authors":"Xiaoyan Peng, Chuang Chen","doi":"10.4108/eetsis.5375","DOIUrl":"https://doi.org/10.4108/eetsis.5375","url":null,"abstract":"INTRODUCTION: With the rapid development of science and technology, intelligent painting exhibitions have gradually attracted people's attention with their unique forms. This study aims to create an interactive art space using Internet of Things (IoT) technology to provide audiences with a more prosperous and deeper art experience. OBJECTIVES: The primary purpose of this study is to explore how to use IoT technology to transform a painting exhibition into a digital space that can interact with the audience. By fusing art and technology, the researchers aim to promote innovation in traditional art presentations and stimulate the audience's freshness and interest in art.METHODS: In the Smart Painting exhibition, the researchers used advanced Internet of Things (IoT) technology to incorporate the audience's movements, emotions, and feedback into the artworks through sensors, wearable devices, and cloud computing. The digital devices in the exhibition space could sense the audience's presence and generate and adjust the art content in real-time according to their movements or emotional state, creating a unique display that interacted with the audience. RESULTS: After implementing the Smart Painting exhibition, the audience's sense of participation and immersion in the art display was significantly increased. Through IoT technology, viewers can interact with the artwork in real-time and feel a more personalized art experience. The digitized exhibition space provided the audience a new level of perception, deepening their understanding and appreciation of the artworks. CONCLUSION: This study demonstrates the feasibility of using IoT technology to create interactive art spaces and shows that this innovation can inject new vitality into traditional painting exhibitions. Through digitalization, the interactivity of the art space is enhanced, providing the audience with a more profound art experience. This approach provides artists with new possibilities for creativity and opens up a fresh vision of participatory art for the audience. The Smart Painting Exhibition is expected to become a new model for integrating art and technology, pushing the art world towards a more innovative and open future. ","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"10 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140745818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Contracts for Ensuring Data Integrity in Cloud Storage with Blockchain 利用区块链确保云存储数据完整性的智能合约
Pub Date : 2024-04-04 DOI: 10.4108/eetsis.5633
Kashish Bhurani, Aashna Dogra, Prerna Agarwal, P. Shrivastava, Thipendra P Singh, Mohit Bhandwal
INTRODUCTION: Data integrity protection has become a significant priority for both consumers and organizations as cloud storage alternatives have multiplied since they provide scalable solutions for individuals and organizations alike. Traditional cloud storage systems need to find new ways to increase security because they are prone to data modification and unauthorized access thus causing data breaches. OBJECTIVES: The main objective of this study is to review usage of smart contracts and blockchain technology to ensure data integrity in cloud storage. METHODS: . Case studies, performance evaluations, and a thorough literature review are all used to demonstrate the effectiveness of the suggested system. RESULTS: This research has unveiled a revolutionary approach that capitalizes on the fusion of smart contracts and cloud storage, fortified by blockchain technology. CONCLUSION: This theoretical analysis demonstrate that smart contracts offer a dependable and scalable mechanism for maintaining data integrity in cloud storage, opening up a promising area for further research and practical application.
引言:由于云存储可为个人和组织提供可扩展的解决方案,因此数据完整性保护已成为消费者和组织的重要优先事项。传统的云存储系统容易受到数据修改和未经授权访问的影响,从而导致数据泄露,因此需要找到新的方法来提高安全性。目标:本研究的主要目的是审查智能合约和区块链技术的使用情况,以确保云存储中的数据完整性。方法:.案例研究、性能评估和全面的文献综述都被用来证明建议系统的有效性。结果:这项研究揭示了一种革命性的方法,它利用区块链技术将智能合约和云存储融合在一起。结论:这一理论分析表明,智能合约为维护云存储中的数据完整性提供了一种可靠且可扩展的机制,为进一步研究和实际应用开辟了一个前景广阔的领域。
{"title":"Smart Contracts for Ensuring Data Integrity in Cloud Storage with Blockchain","authors":"Kashish Bhurani, Aashna Dogra, Prerna Agarwal, P. Shrivastava, Thipendra P Singh, Mohit Bhandwal","doi":"10.4108/eetsis.5633","DOIUrl":"https://doi.org/10.4108/eetsis.5633","url":null,"abstract":"INTRODUCTION: Data integrity protection has become a significant priority for both consumers and organizations as cloud storage alternatives have multiplied since they provide scalable solutions for individuals and organizations alike. Traditional cloud storage systems need to find new ways to increase security because they are prone to data modification and unauthorized access thus causing data breaches. \u0000OBJECTIVES: The main objective of this study is to review usage of smart contracts and blockchain technology to ensure data integrity in cloud storage. \u0000METHODS: . Case studies, performance evaluations, and a thorough literature review are all used to demonstrate the effectiveness of the suggested system. \u0000RESULTS: This research has unveiled a revolutionary approach that capitalizes on the fusion of smart contracts and cloud storage, fortified by blockchain technology. \u0000CONCLUSION: This theoretical analysis demonstrate that smart contracts offer a dependable and scalable mechanism for maintaining data integrity in cloud storage, opening up a promising area for further research and practical application.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"21 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Metaheuristics and Two-Tiered Classification for Enhanced Fake News Detection with Feature Optimization 整合元搜索和两级分类,利用特征优化加强假新闻检测
Pub Date : 2024-04-03 DOI: 10.4108/eetsis.5069
Poonam Narang, Ajay Vikram Singh, Himanshu Monga
INTRODUCTION: The challenge of distributing false information continues despite the significant impact of social media on opinions. The suggested framework, which is a metaheuristic method, is presented in this research to detect bogus news. Employing a hybrid metaheuristic RDAVA methodology coupled with Bi-LSTM, the method leverages African Vulture Optimizer and Red Deer Optimizer.OBJECTIVES: The objective of this study is to assess the effectiveness of the suggested model in identifying false material on social media by employing social network analysis tools to combat disinformation.METHODS: Employing the data sets from BuzzFeed, FakeNewsNet, and ISOT, the suggested model is implemented on the MATLAB Platform and acquires high accuracy rates of 97% on FakeNewsNet and 98% on BuzzFeed and ISOT. A comparative study with current models demonstrates its superiority.RESULTS: Outperforming previous models with 98% and 97% accuracy on BuzzFeed/ISOT and FakeNewsNet, respectively, the suggested model shows remarkable performance.CONCLUSION: The proposed strategy shows promise in addressing the problem of false information on social media in the modern day by effectively countering fake news. Its incorporation of social network analysis methods and metaheuristic methodologies makes it a powerful instrument for identifying false news.
引言:尽管社交媒体对舆论产生了重大影响,但传播虚假信息的挑战依然存在。本研究提出的框架是一种元搜索方法,用于检测虚假新闻。该方法采用了一种与 Bi-LSTM 相结合的混合元启发式 RDAVA 方法,利用了非洲秃鹫优化器和红鹿优化器:方法:利用 BuzzFeed、FakeNewsNet 和 ISOT 的数据集,在 MATLAB 平台上实现了所建议的模型,该模型在 FakeNewsNet 上获得了 97% 的高准确率,在 BuzzFeed 和 ISOT 上获得了 98% 的高准确率。结果:所建议的模型在 BuzzFeed/ISOT 和 FakeNewsNet 上的准确率分别为 98% 和 97%,优于之前的模型,显示出卓越的性能。结论:所建议的策略有望通过有效打击假新闻来解决当今社交媒体上的虚假信息问题。它结合了社交网络分析方法和元启发式方法,是识别虚假新闻的有力工具。
{"title":"Integrating Metaheuristics and Two-Tiered Classification for Enhanced Fake News Detection with Feature Optimization","authors":"Poonam Narang, Ajay Vikram Singh, Himanshu Monga","doi":"10.4108/eetsis.5069","DOIUrl":"https://doi.org/10.4108/eetsis.5069","url":null,"abstract":"INTRODUCTION: The challenge of distributing false information continues despite the significant impact of social media on opinions. The suggested framework, which is a metaheuristic method, is presented in this research to detect bogus news. Employing a hybrid metaheuristic RDAVA methodology coupled with Bi-LSTM, the method leverages African Vulture Optimizer and Red Deer Optimizer.OBJECTIVES: The objective of this study is to assess the effectiveness of the suggested model in identifying false material on social media by employing social network analysis tools to combat disinformation.METHODS: Employing the data sets from BuzzFeed, FakeNewsNet, and ISOT, the suggested model is implemented on the MATLAB Platform and acquires high accuracy rates of 97% on FakeNewsNet and 98% on BuzzFeed and ISOT. A comparative study with current models demonstrates its superiority.RESULTS: Outperforming previous models with 98% and 97% accuracy on BuzzFeed/ISOT and FakeNewsNet, respectively, the suggested model shows remarkable performance.CONCLUSION: The proposed strategy shows promise in addressing the problem of false information on social media in the modern day by effectively countering fake news. Its incorporation of social network analysis methods and metaheuristic methodologies makes it a powerful instrument for identifying false news.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"6 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140748036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid CNN Approach for Unknown Attack Detection in Edge-Based IoT Networks 基于边缘的物联网网络中未知攻击检测的混合 CNN 方法
Pub Date : 2024-04-03 DOI: 10.4108/eetsis.4887
R. R. Papalkar, Abrar S Alvi
INTRODUCTION: In the constantly growing Internet of Things (IoT), device security is crucial. As IoT gadgets pervade our lives, detecting unforeseen assaults is crucial to protecting them. Behavioral analysis, machine learning, and collaborative intelligence may be needed to protect against new dangers. This short discusses the need of detecting unexpected IoT attacks and essential security strategies for these interconnected environments.OBJECTIVES: This research uses the BoT-IoT dataset to create an enhanced IoT intrusion detection system. The goals are to optimize a CNN architecture for effective pattern recognition, address imbalanced data, and evaluate model performance using precision, recall, F1-score, and AUC-ROC measures. Improving IoT ecosystem reliability and security against unknown assaults is the ultimate goal.METHODS: The proposed methods use the BoT-IoT dataset to create a comprehensive IoT intrusion detection system. This involves tuning a Convolutional Neural Network (CNN) architecture to improve pattern recognition. Oversampling and class weighting address imbalanced data issues. RESULTS: The comprehensive evaluation of our innovative unknown attack detection method shows promise, suggesting it may be better than existing methods. A high accuracy, precision, recall, and f-measure of 98.23% were attained using an advanced model and feature selection methods. This achievement was achieved by using features designed to identify unknown attacks in the dataset, proving the proposed methodology works.CONCLUSION: This research presents an improved IoT Intrusion Detection System using the BoT-IoT dataset. The optimised Convolutional Neural Network architecture and imbalanced data handling approaches achieved 98.23% accuracy.
导言:在不断发展的物联网(IoT)中,设备安全至关重要。随着物联网小工具渗透到我们的生活中,检测不可预见的攻击对保护它们至关重要。要防范新的危险,可能需要行为分析、机器学习和协作智能。本短文讨论了检测意外物联网攻击的必要性以及这些互联环境的基本安全策略:本研究利用 BoT-IoT 数据集创建一个增强型物联网入侵检测系统。目标是优化 CNN 架构以实现有效的模式识别,解决不平衡数据问题,并使用精度、召回率、F1-分数和 AUC-ROC 等指标评估模型性能。最终目标是提高物联网生态系统的可靠性和安全性,抵御未知攻击。方法:所提出的方法使用 BoT-IoT 数据集创建一个全面的物联网入侵检测系统。这包括调整卷积神经网络(CNN)架构,以提高模式识别能力。过采样和类加权可解决数据不平衡问题。结果:对我们的创新未知攻击检测方法进行的综合评估显示,该方法可能优于现有方法。使用先进的模型和特征选择方法,准确率、精确率、召回率和 f-measure 均达到 98.23%。这一成果是通过使用旨在识别数据集中未知攻击的特征实现的,证明了所提出的方法是有效的。优化的卷积神经网络架构和不平衡数据处理方法达到了 98.23% 的准确率。
{"title":"Hybrid CNN Approach for Unknown Attack Detection in Edge-Based IoT Networks","authors":"R. R. Papalkar, Abrar S Alvi","doi":"10.4108/eetsis.4887","DOIUrl":"https://doi.org/10.4108/eetsis.4887","url":null,"abstract":"INTRODUCTION: In the constantly growing Internet of Things (IoT), device security is crucial. As IoT gadgets pervade our lives, detecting unforeseen assaults is crucial to protecting them. Behavioral analysis, machine learning, and collaborative intelligence may be needed to protect against new dangers. This short discusses the need of detecting unexpected IoT attacks and essential security strategies for these interconnected environments.OBJECTIVES: This research uses the BoT-IoT dataset to create an enhanced IoT intrusion detection system. The goals are to optimize a CNN architecture for effective pattern recognition, address imbalanced data, and evaluate model performance using precision, recall, F1-score, and AUC-ROC measures. Improving IoT ecosystem reliability and security against unknown assaults is the ultimate goal.METHODS: The proposed methods use the BoT-IoT dataset to create a comprehensive IoT intrusion detection system. This involves tuning a Convolutional Neural Network (CNN) architecture to improve pattern recognition. Oversampling and class weighting address imbalanced data issues. RESULTS: The comprehensive evaluation of our innovative unknown attack detection method shows promise, suggesting it may be better than existing methods. A high accuracy, precision, recall, and f-measure of 98.23% were attained using an advanced model and feature selection methods. This achievement was achieved by using features designed to identify unknown attacks in the dataset, proving the proposed methodology works.CONCLUSION: This research presents an improved IoT Intrusion Detection System using the BoT-IoT dataset. The optimised Convolutional Neural Network architecture and imbalanced data handling approaches achieved 98.23% accuracy.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"90 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140750557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Deep Neural Network Based Classification of Attack Vectors on the Ethereum Blockchain 基于量子深度神经网络的以太坊区块链攻击向量分类
Pub Date : 2024-03-27 DOI: 10.4108/eetsis.5572
A. Rajawat, S. B. Goyal, Manoj Kumar, Saurabh Kumar
INTRODUCTION: The implementation of robust security protocols is imperative in light of the exponential growth of blockchain-based platforms such as Ethereum. The importance of developing more effective strategies to detect and counter potential attacks is growing in tandem with the sophistication of the methods employed by attackers. In this study, we present a novel approach that leverages quantum computing to identify and predict attack vectors on the Ethereum blockchain. OBJECTIVES: The primary objective of this study is to suggest an innovative methodology for enhancing the security of Ethereum by leveraging quantum computing. The purpose of this study is to demonstrate that QRBM and QDN are efficient in identifying and predicting security flaws in blockchain transactions. METHODS: We combined methods from quantum computing with social network research approaches. An enormous dataset containing both genuine Ethereum transactions and a carefully chosen spectrum of malicious activity indicative of popular attack vectors was used to train our model, the QRBM. Thanks to the dataset, the QRBM was able to learn to distinguish between typical and out-of-the-ordinary activities. RESULTS: In comparison to more conventional deep learning models, the QRBM showed substantially better accuracy when it came to identifying transaction behaviours. The model's improved scalability and efficiency were made possible by its quantum nature, which is defined by features like entanglement and superposition. Specifically, the QRBM handled non-informative inputs better and solved problems faster. CONCLUSION: This study paves the way for further investigation into quantum-enhanced cybersecurity measures and highlights the promise of quantum neural networks in strengthening the security of blockchain technology. According to our research, quantum computing has the potential to be an essential tool in creating Ethereum-style blockchain security systems that are more advanced, efficient, and resilient.
简介:鉴于以太坊等基于区块链的平台呈指数级增长,实施稳健的安全协议势在必行。随着攻击者使用的方法越来越复杂,制定更有效的策略来检测和应对潜在攻击的重要性也与日俱增。在本研究中,我们提出了一种利用量子计算来识别和预测以太坊区块链上攻击载体的新方法。目标:本研究的主要目的是提出一种利用量子计算增强以太坊安全性的创新方法。本研究的目的是证明 QRBM 和 QDN 能够有效识别和预测区块链交易中的安全漏洞。方法:我们将量子计算方法与社交网络研究方法相结合。我们使用了一个庞大的数据集来训练我们的模型 QRBM,该数据集包含真实的以太坊交易和精心挑选的恶意活动,这些恶意活动表明了流行的攻击载体。借助该数据集,QRBM 能够学会区分典型活动和异常活动。结果:与更传统的深度学习模型相比,QRBM 在识别交易行为方面表现出更高的准确性。该模型之所以能够提高可扩展性和效率,是因为它具有量子特性,即纠缠和叠加等特征。具体来说,QRBM 能更好地处理非信息输入,更快地解决问题。结论:本研究为进一步研究量子增强网络安全措施铺平了道路,并强调了量子神经网络在加强区块链技术安全性方面的前景。根据我们的研究,量子计算有可能成为创建以太坊式区块链安全系统的重要工具,使其更先进、更高效、更有弹性。
{"title":"Quantum Deep Neural Network Based Classification of Attack Vectors on the Ethereum Blockchain","authors":"A. Rajawat, S. B. Goyal, Manoj Kumar, Saurabh Kumar","doi":"10.4108/eetsis.5572","DOIUrl":"https://doi.org/10.4108/eetsis.5572","url":null,"abstract":"INTRODUCTION: The implementation of robust security protocols is imperative in light of the exponential growth of blockchain-based platforms such as Ethereum. The importance of developing more effective strategies to detect and counter potential attacks is growing in tandem with the sophistication of the methods employed by attackers. In this study, we present a novel approach that leverages quantum computing to identify and predict attack vectors on the Ethereum blockchain. \u0000OBJECTIVES: The primary objective of this study is to suggest an innovative methodology for enhancing the security of Ethereum by leveraging quantum computing. The purpose of this study is to demonstrate that QRBM and QDN are efficient in identifying and predicting security flaws in blockchain transactions. \u0000METHODS: We combined methods from quantum computing with social network research approaches. An enormous dataset containing both genuine Ethereum transactions and a carefully chosen spectrum of malicious activity indicative of popular attack vectors was used to train our model, the QRBM. Thanks to the dataset, the QRBM was able to learn to distinguish between typical and out-of-the-ordinary activities. \u0000RESULTS: In comparison to more conventional deep learning models, the QRBM showed substantially better accuracy when it came to identifying transaction behaviours. The model's improved scalability and efficiency were made possible by its quantum nature, which is defined by features like entanglement and superposition. Specifically, the QRBM handled non-informative inputs better and solved problems faster. \u0000CONCLUSION: This study paves the way for further investigation into quantum-enhanced cybersecurity measures and highlights the promise of quantum neural networks in strengthening the security of blockchain technology. According to our research, quantum computing has the potential to be an essential tool in creating Ethereum-style blockchain security systems that are more advanced, efficient, and resilient.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"39 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140376802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging technologies in information systems project management 信息系统项目管理中的新兴技术
Pub Date : 2024-03-22 DOI: 10.4108/eetsis.4632
Ana María Choquehuanca-Sánchez, Keiko Donna Kuzimoto-Saldaña, Jhonatan Rubén Muñoz-Huanca, Dennis Gerardo Requena-Manrique, Rodrigo Antony Trejo-Lozano, Josemaria Isimer Vasquez-Martinez, Edy Guillermo Zenozain-Gara, William Joel Marín Rodriguez
The article discusses emerging technologies in information systems project management. Project management is a modern discipline that began to take shape from 1900 and has evolved and adapted to the needs of society and business. Emerging technologies such as artificial intelligence, blockchain, augmented and virtual reality, and process automation are transforming the way information systems projects are managed. These technologies can be used to analyze large amounts of data, ensure data integrity and security, visualize a project's design and perform virtual testing, and automate tasks to reduce project time and cost. It is important for companies to be aware of these technologies and use them effectively to improve the efficiency and profitability of their projects.
文章讨论了信息系统项目管理中的新兴技术。项目管理是一门现代学科,从 1900 年开始形成,并不断发展,以适应社会和企业的需求。人工智能、区块链、增强现实和虚拟现实以及流程自动化等新兴技术正在改变信息系统项目的管理方式。这些技术可用于分析大量数据、确保数据完整性和安全性、可视化项目设计和执行虚拟测试,以及自动化任务以减少项目时间和成本。企业必须了解这些技术,并有效利用它们来提高项目的效率和盈利能力。
{"title":"Emerging technologies in information systems project management","authors":"Ana María Choquehuanca-Sánchez, Keiko Donna Kuzimoto-Saldaña, Jhonatan Rubén Muñoz-Huanca, Dennis Gerardo Requena-Manrique, Rodrigo Antony Trejo-Lozano, Josemaria Isimer Vasquez-Martinez, Edy Guillermo Zenozain-Gara, William Joel Marín Rodriguez","doi":"10.4108/eetsis.4632","DOIUrl":"https://doi.org/10.4108/eetsis.4632","url":null,"abstract":"The article discusses emerging technologies in information systems project management. Project management is a modern discipline that began to take shape from 1900 and has evolved and adapted to the needs of society and business. Emerging technologies such as artificial intelligence, blockchain, augmented and virtual reality, and process automation are transforming the way information systems projects are managed. These technologies can be used to analyze large amounts of data, ensure data integrity and security, visualize a project's design and perform virtual testing, and automate tasks to reduce project time and cost. It is important for companies to be aware of these technologies and use them effectively to improve the efficiency and profitability of their projects.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140220239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICST Transactions on Scalable Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1