首页 > 最新文献

ICST Transactions on Scalable Information Systems最新文献

英文 中文
Integrating Metaheuristics and Two-Tiered Classification for Enhanced Fake News Detection with Feature Optimization 整合元搜索和两级分类,利用特征优化加强假新闻检测
Pub Date : 2024-04-03 DOI: 10.4108/eetsis.5069
Poonam Narang, Ajay Vikram Singh, Himanshu Monga
INTRODUCTION: The challenge of distributing false information continues despite the significant impact of social media on opinions. The suggested framework, which is a metaheuristic method, is presented in this research to detect bogus news. Employing a hybrid metaheuristic RDAVA methodology coupled with Bi-LSTM, the method leverages African Vulture Optimizer and Red Deer Optimizer.OBJECTIVES: The objective of this study is to assess the effectiveness of the suggested model in identifying false material on social media by employing social network analysis tools to combat disinformation.METHODS: Employing the data sets from BuzzFeed, FakeNewsNet, and ISOT, the suggested model is implemented on the MATLAB Platform and acquires high accuracy rates of 97% on FakeNewsNet and 98% on BuzzFeed and ISOT. A comparative study with current models demonstrates its superiority.RESULTS: Outperforming previous models with 98% and 97% accuracy on BuzzFeed/ISOT and FakeNewsNet, respectively, the suggested model shows remarkable performance.CONCLUSION: The proposed strategy shows promise in addressing the problem of false information on social media in the modern day by effectively countering fake news. Its incorporation of social network analysis methods and metaheuristic methodologies makes it a powerful instrument for identifying false news.
引言:尽管社交媒体对舆论产生了重大影响,但传播虚假信息的挑战依然存在。本研究提出的框架是一种元搜索方法,用于检测虚假新闻。该方法采用了一种与 Bi-LSTM 相结合的混合元启发式 RDAVA 方法,利用了非洲秃鹫优化器和红鹿优化器:方法:利用 BuzzFeed、FakeNewsNet 和 ISOT 的数据集,在 MATLAB 平台上实现了所建议的模型,该模型在 FakeNewsNet 上获得了 97% 的高准确率,在 BuzzFeed 和 ISOT 上获得了 98% 的高准确率。结果:所建议的模型在 BuzzFeed/ISOT 和 FakeNewsNet 上的准确率分别为 98% 和 97%,优于之前的模型,显示出卓越的性能。结论:所建议的策略有望通过有效打击假新闻来解决当今社交媒体上的虚假信息问题。它结合了社交网络分析方法和元启发式方法,是识别虚假新闻的有力工具。
{"title":"Integrating Metaheuristics and Two-Tiered Classification for Enhanced Fake News Detection with Feature Optimization","authors":"Poonam Narang, Ajay Vikram Singh, Himanshu Monga","doi":"10.4108/eetsis.5069","DOIUrl":"https://doi.org/10.4108/eetsis.5069","url":null,"abstract":"INTRODUCTION: The challenge of distributing false information continues despite the significant impact of social media on opinions. The suggested framework, which is a metaheuristic method, is presented in this research to detect bogus news. Employing a hybrid metaheuristic RDAVA methodology coupled with Bi-LSTM, the method leverages African Vulture Optimizer and Red Deer Optimizer.OBJECTIVES: The objective of this study is to assess the effectiveness of the suggested model in identifying false material on social media by employing social network analysis tools to combat disinformation.METHODS: Employing the data sets from BuzzFeed, FakeNewsNet, and ISOT, the suggested model is implemented on the MATLAB Platform and acquires high accuracy rates of 97% on FakeNewsNet and 98% on BuzzFeed and ISOT. A comparative study with current models demonstrates its superiority.RESULTS: Outperforming previous models with 98% and 97% accuracy on BuzzFeed/ISOT and FakeNewsNet, respectively, the suggested model shows remarkable performance.CONCLUSION: The proposed strategy shows promise in addressing the problem of false information on social media in the modern day by effectively countering fake news. Its incorporation of social network analysis methods and metaheuristic methodologies makes it a powerful instrument for identifying false news.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"6 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140748036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid CNN Approach for Unknown Attack Detection in Edge-Based IoT Networks 基于边缘的物联网网络中未知攻击检测的混合 CNN 方法
Pub Date : 2024-04-03 DOI: 10.4108/eetsis.4887
R. R. Papalkar, Abrar S Alvi
INTRODUCTION: In the constantly growing Internet of Things (IoT), device security is crucial. As IoT gadgets pervade our lives, detecting unforeseen assaults is crucial to protecting them. Behavioral analysis, machine learning, and collaborative intelligence may be needed to protect against new dangers. This short discusses the need of detecting unexpected IoT attacks and essential security strategies for these interconnected environments.OBJECTIVES: This research uses the BoT-IoT dataset to create an enhanced IoT intrusion detection system. The goals are to optimize a CNN architecture for effective pattern recognition, address imbalanced data, and evaluate model performance using precision, recall, F1-score, and AUC-ROC measures. Improving IoT ecosystem reliability and security against unknown assaults is the ultimate goal.METHODS: The proposed methods use the BoT-IoT dataset to create a comprehensive IoT intrusion detection system. This involves tuning a Convolutional Neural Network (CNN) architecture to improve pattern recognition. Oversampling and class weighting address imbalanced data issues. RESULTS: The comprehensive evaluation of our innovative unknown attack detection method shows promise, suggesting it may be better than existing methods. A high accuracy, precision, recall, and f-measure of 98.23% were attained using an advanced model and feature selection methods. This achievement was achieved by using features designed to identify unknown attacks in the dataset, proving the proposed methodology works.CONCLUSION: This research presents an improved IoT Intrusion Detection System using the BoT-IoT dataset. The optimised Convolutional Neural Network architecture and imbalanced data handling approaches achieved 98.23% accuracy.
导言:在不断发展的物联网(IoT)中,设备安全至关重要。随着物联网小工具渗透到我们的生活中,检测不可预见的攻击对保护它们至关重要。要防范新的危险,可能需要行为分析、机器学习和协作智能。本短文讨论了检测意外物联网攻击的必要性以及这些互联环境的基本安全策略:本研究利用 BoT-IoT 数据集创建一个增强型物联网入侵检测系统。目标是优化 CNN 架构以实现有效的模式识别,解决不平衡数据问题,并使用精度、召回率、F1-分数和 AUC-ROC 等指标评估模型性能。最终目标是提高物联网生态系统的可靠性和安全性,抵御未知攻击。方法:所提出的方法使用 BoT-IoT 数据集创建一个全面的物联网入侵检测系统。这包括调整卷积神经网络(CNN)架构,以提高模式识别能力。过采样和类加权可解决数据不平衡问题。结果:对我们的创新未知攻击检测方法进行的综合评估显示,该方法可能优于现有方法。使用先进的模型和特征选择方法,准确率、精确率、召回率和 f-measure 均达到 98.23%。这一成果是通过使用旨在识别数据集中未知攻击的特征实现的,证明了所提出的方法是有效的。优化的卷积神经网络架构和不平衡数据处理方法达到了 98.23% 的准确率。
{"title":"Hybrid CNN Approach for Unknown Attack Detection in Edge-Based IoT Networks","authors":"R. R. Papalkar, Abrar S Alvi","doi":"10.4108/eetsis.4887","DOIUrl":"https://doi.org/10.4108/eetsis.4887","url":null,"abstract":"INTRODUCTION: In the constantly growing Internet of Things (IoT), device security is crucial. As IoT gadgets pervade our lives, detecting unforeseen assaults is crucial to protecting them. Behavioral analysis, machine learning, and collaborative intelligence may be needed to protect against new dangers. This short discusses the need of detecting unexpected IoT attacks and essential security strategies for these interconnected environments.OBJECTIVES: This research uses the BoT-IoT dataset to create an enhanced IoT intrusion detection system. The goals are to optimize a CNN architecture for effective pattern recognition, address imbalanced data, and evaluate model performance using precision, recall, F1-score, and AUC-ROC measures. Improving IoT ecosystem reliability and security against unknown assaults is the ultimate goal.METHODS: The proposed methods use the BoT-IoT dataset to create a comprehensive IoT intrusion detection system. This involves tuning a Convolutional Neural Network (CNN) architecture to improve pattern recognition. Oversampling and class weighting address imbalanced data issues. RESULTS: The comprehensive evaluation of our innovative unknown attack detection method shows promise, suggesting it may be better than existing methods. A high accuracy, precision, recall, and f-measure of 98.23% were attained using an advanced model and feature selection methods. This achievement was achieved by using features designed to identify unknown attacks in the dataset, proving the proposed methodology works.CONCLUSION: This research presents an improved IoT Intrusion Detection System using the BoT-IoT dataset. The optimised Convolutional Neural Network architecture and imbalanced data handling approaches achieved 98.23% accuracy.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"90 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140750557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Deep Neural Network Based Classification of Attack Vectors on the Ethereum Blockchain 基于量子深度神经网络的以太坊区块链攻击向量分类
Pub Date : 2024-03-27 DOI: 10.4108/eetsis.5572
A. Rajawat, S. B. Goyal, Manoj Kumar, Saurabh Kumar
INTRODUCTION: The implementation of robust security protocols is imperative in light of the exponential growth of blockchain-based platforms such as Ethereum. The importance of developing more effective strategies to detect and counter potential attacks is growing in tandem with the sophistication of the methods employed by attackers. In this study, we present a novel approach that leverages quantum computing to identify and predict attack vectors on the Ethereum blockchain. OBJECTIVES: The primary objective of this study is to suggest an innovative methodology for enhancing the security of Ethereum by leveraging quantum computing. The purpose of this study is to demonstrate that QRBM and QDN are efficient in identifying and predicting security flaws in blockchain transactions. METHODS: We combined methods from quantum computing with social network research approaches. An enormous dataset containing both genuine Ethereum transactions and a carefully chosen spectrum of malicious activity indicative of popular attack vectors was used to train our model, the QRBM. Thanks to the dataset, the QRBM was able to learn to distinguish between typical and out-of-the-ordinary activities. RESULTS: In comparison to more conventional deep learning models, the QRBM showed substantially better accuracy when it came to identifying transaction behaviours. The model's improved scalability and efficiency were made possible by its quantum nature, which is defined by features like entanglement and superposition. Specifically, the QRBM handled non-informative inputs better and solved problems faster. CONCLUSION: This study paves the way for further investigation into quantum-enhanced cybersecurity measures and highlights the promise of quantum neural networks in strengthening the security of blockchain technology. According to our research, quantum computing has the potential to be an essential tool in creating Ethereum-style blockchain security systems that are more advanced, efficient, and resilient.
简介:鉴于以太坊等基于区块链的平台呈指数级增长,实施稳健的安全协议势在必行。随着攻击者使用的方法越来越复杂,制定更有效的策略来检测和应对潜在攻击的重要性也与日俱增。在本研究中,我们提出了一种利用量子计算来识别和预测以太坊区块链上攻击载体的新方法。目标:本研究的主要目的是提出一种利用量子计算增强以太坊安全性的创新方法。本研究的目的是证明 QRBM 和 QDN 能够有效识别和预测区块链交易中的安全漏洞。方法:我们将量子计算方法与社交网络研究方法相结合。我们使用了一个庞大的数据集来训练我们的模型 QRBM,该数据集包含真实的以太坊交易和精心挑选的恶意活动,这些恶意活动表明了流行的攻击载体。借助该数据集,QRBM 能够学会区分典型活动和异常活动。结果:与更传统的深度学习模型相比,QRBM 在识别交易行为方面表现出更高的准确性。该模型之所以能够提高可扩展性和效率,是因为它具有量子特性,即纠缠和叠加等特征。具体来说,QRBM 能更好地处理非信息输入,更快地解决问题。结论:本研究为进一步研究量子增强网络安全措施铺平了道路,并强调了量子神经网络在加强区块链技术安全性方面的前景。根据我们的研究,量子计算有可能成为创建以太坊式区块链安全系统的重要工具,使其更先进、更高效、更有弹性。
{"title":"Quantum Deep Neural Network Based Classification of Attack Vectors on the Ethereum Blockchain","authors":"A. Rajawat, S. B. Goyal, Manoj Kumar, Saurabh Kumar","doi":"10.4108/eetsis.5572","DOIUrl":"https://doi.org/10.4108/eetsis.5572","url":null,"abstract":"INTRODUCTION: The implementation of robust security protocols is imperative in light of the exponential growth of blockchain-based platforms such as Ethereum. The importance of developing more effective strategies to detect and counter potential attacks is growing in tandem with the sophistication of the methods employed by attackers. In this study, we present a novel approach that leverages quantum computing to identify and predict attack vectors on the Ethereum blockchain. \u0000OBJECTIVES: The primary objective of this study is to suggest an innovative methodology for enhancing the security of Ethereum by leveraging quantum computing. The purpose of this study is to demonstrate that QRBM and QDN are efficient in identifying and predicting security flaws in blockchain transactions. \u0000METHODS: We combined methods from quantum computing with social network research approaches. An enormous dataset containing both genuine Ethereum transactions and a carefully chosen spectrum of malicious activity indicative of popular attack vectors was used to train our model, the QRBM. Thanks to the dataset, the QRBM was able to learn to distinguish between typical and out-of-the-ordinary activities. \u0000RESULTS: In comparison to more conventional deep learning models, the QRBM showed substantially better accuracy when it came to identifying transaction behaviours. The model's improved scalability and efficiency were made possible by its quantum nature, which is defined by features like entanglement and superposition. Specifically, the QRBM handled non-informative inputs better and solved problems faster. \u0000CONCLUSION: This study paves the way for further investigation into quantum-enhanced cybersecurity measures and highlights the promise of quantum neural networks in strengthening the security of blockchain technology. According to our research, quantum computing has the potential to be an essential tool in creating Ethereum-style blockchain security systems that are more advanced, efficient, and resilient.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"39 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140376802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging technologies in information systems project management 信息系统项目管理中的新兴技术
Pub Date : 2024-03-22 DOI: 10.4108/eetsis.4632
Ana María Choquehuanca-Sánchez, Keiko Donna Kuzimoto-Saldaña, Jhonatan Rubén Muñoz-Huanca, Dennis Gerardo Requena-Manrique, Rodrigo Antony Trejo-Lozano, Josemaria Isimer Vasquez-Martinez, Edy Guillermo Zenozain-Gara, William Joel Marín Rodriguez
The article discusses emerging technologies in information systems project management. Project management is a modern discipline that began to take shape from 1900 and has evolved and adapted to the needs of society and business. Emerging technologies such as artificial intelligence, blockchain, augmented and virtual reality, and process automation are transforming the way information systems projects are managed. These technologies can be used to analyze large amounts of data, ensure data integrity and security, visualize a project's design and perform virtual testing, and automate tasks to reduce project time and cost. It is important for companies to be aware of these technologies and use them effectively to improve the efficiency and profitability of their projects.
文章讨论了信息系统项目管理中的新兴技术。项目管理是一门现代学科,从 1900 年开始形成,并不断发展,以适应社会和企业的需求。人工智能、区块链、增强现实和虚拟现实以及流程自动化等新兴技术正在改变信息系统项目的管理方式。这些技术可用于分析大量数据、确保数据完整性和安全性、可视化项目设计和执行虚拟测试,以及自动化任务以减少项目时间和成本。企业必须了解这些技术,并有效利用它们来提高项目的效率和盈利能力。
{"title":"Emerging technologies in information systems project management","authors":"Ana María Choquehuanca-Sánchez, Keiko Donna Kuzimoto-Saldaña, Jhonatan Rubén Muñoz-Huanca, Dennis Gerardo Requena-Manrique, Rodrigo Antony Trejo-Lozano, Josemaria Isimer Vasquez-Martinez, Edy Guillermo Zenozain-Gara, William Joel Marín Rodriguez","doi":"10.4108/eetsis.4632","DOIUrl":"https://doi.org/10.4108/eetsis.4632","url":null,"abstract":"The article discusses emerging technologies in information systems project management. Project management is a modern discipline that began to take shape from 1900 and has evolved and adapted to the needs of society and business. Emerging technologies such as artificial intelligence, blockchain, augmented and virtual reality, and process automation are transforming the way information systems projects are managed. These technologies can be used to analyze large amounts of data, ensure data integrity and security, visualize a project's design and perform virtual testing, and automate tasks to reduce project time and cost. It is important for companies to be aware of these technologies and use them effectively to improve the efficiency and profitability of their projects.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140220239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration and Innovation Path Analysis of Enterprise Marketing Data Management Based on Deep Learning 基于深度学习的企业营销数据管理整合与创新路径分析
Pub Date : 2024-03-22 DOI: 10.4108/eetsis.4799
Xiaofeng Wang
INTRODUCTION: To explore the integration and innovation path of enterprise marketing data management based on deep learning to adapt to today's competitive business environment. With the continuous development of information technology, enterprises are faced with a large amount of marketing data, and how to efficiently manage and integrate these data has become an essential issue for enterprises to improve their market competitiveness. Deep learning, as a necessary technical means of artificial intelligence, provides enterprises with more intelligent and precise data processing tools.OBJECTIVES: The primary purpose of the study is to solve the problems of marketing data management in traditional enterprises and to achieve better integration and management of data through deep learning technology. Specifically, the goal is to explore the potential of deep learning in improving data processing efficiency and accurately analyzing user behavior and trends. By achieving these goals, organizations can better understand market needs, develop more effective marketing strategies, and stand out in a competitive marketplace.METHODS: This study adopts a comprehensive approach, including a literature review, case study, and empirical analysis of deep learning algorithms. First, the main issues of current enterprise marketing data management and the latest progress in deep learning were understood through an in-depth study of the literature in related fields. Second, several enterprise cases were selected to gain a deeper understanding of the challenges and needs of enterprises in marketing data management through field research and data collection. Finally, a series of deep learning algorithms were designed and implemented to validate their effectiveness in real-world applications and analyze their impact on data integration and innovation paths.RESULTS: The results of the study show that deep learning has significant advantages in enterprise marketing data management. By using deep learning algorithms, enterprises are able to handle large-scale marketing data more efficiently and achieve intelligent data integration and accurate analysis. This not only improves the efficiency of data processing but also provides enterprises with deeper market insights that help develop more targeted marketing strategies.CONCLUSION: The results of the study are of guiding significance for enterprises to realize data-driven marketing decision-making, which provides strong support for enterprises to maintain their competitive advantages in the highly competitive market. Future research can further explore the application of deep learning in different industries and scenarios, as well as how to optimize deep learning algorithms further to meet the changing needs of enterprises.
引言:探索基于深度学习的企业营销数据管理的整合与创新路径,以适应当今竞争激烈的商业环境。随着信息技术的不断发展,企业面临着大量的营销数据,如何对这些数据进行高效管理和整合,已成为企业提高市场竞争力必不可少的问题。深度学习作为人工智能的必要技术手段,为企业提供了更加智能化、精准化的数据处理工具:研究的主要目的是解决传统企业营销数据管理的问题,通过深度学习技术实现对数据更好的整合与管理。具体来说,目的是探索深度学习在提高数据处理效率、精确分析用户行为和趋势方面的潜力。通过实现这些目标,企业可以更好地了解市场需求,制定更有效的营销策略,并在激烈的市场竞争中脱颖而出。方法:本研究采用综合方法,包括文献综述、案例研究和深度学习算法的实证分析。首先,通过深入研究相关领域的文献,了解当前企业营销数据管理的主要问题和深度学习的最新进展。其次,选取了几个企业案例,通过实地调研和数据收集,深入了解企业在营销数据管理方面的挑战和需求。最后,设计并实现了一系列深度学习算法,以验证其在实际应用中的有效性,并分析其对数据整合和创新路径的影响。结果:研究结果表明,深度学习在企业营销数据管理中具有显著优势。通过使用深度学习算法,企业能够更高效地处理大规模营销数据,实现数据的智能整合和精准分析。结论:研究结果对企业实现数据驱动营销决策具有指导意义,为企业在激烈的市场竞争中保持竞争优势提供了有力支持。未来的研究可以进一步探索深度学习在不同行业、不同场景中的应用,以及如何进一步优化深度学习算法,以满足企业不断变化的需求。
{"title":"Integration and Innovation Path Analysis of Enterprise Marketing Data Management Based on Deep Learning","authors":"Xiaofeng Wang","doi":"10.4108/eetsis.4799","DOIUrl":"https://doi.org/10.4108/eetsis.4799","url":null,"abstract":"INTRODUCTION: To explore the integration and innovation path of enterprise marketing data management based on deep learning to adapt to today's competitive business environment. With the continuous development of information technology, enterprises are faced with a large amount of marketing data, and how to efficiently manage and integrate these data has become an essential issue for enterprises to improve their market competitiveness. Deep learning, as a necessary technical means of artificial intelligence, provides enterprises with more intelligent and precise data processing tools.OBJECTIVES: The primary purpose of the study is to solve the problems of marketing data management in traditional enterprises and to achieve better integration and management of data through deep learning technology. Specifically, the goal is to explore the potential of deep learning in improving data processing efficiency and accurately analyzing user behavior and trends. By achieving these goals, organizations can better understand market needs, develop more effective marketing strategies, and stand out in a competitive marketplace.METHODS: This study adopts a comprehensive approach, including a literature review, case study, and empirical analysis of deep learning algorithms. First, the main issues of current enterprise marketing data management and the latest progress in deep learning were understood through an in-depth study of the literature in related fields. Second, several enterprise cases were selected to gain a deeper understanding of the challenges and needs of enterprises in marketing data management through field research and data collection. Finally, a series of deep learning algorithms were designed and implemented to validate their effectiveness in real-world applications and analyze their impact on data integration and innovation paths.RESULTS: The results of the study show that deep learning has significant advantages in enterprise marketing data management. By using deep learning algorithms, enterprises are able to handle large-scale marketing data more efficiently and achieve intelligent data integration and accurate analysis. This not only improves the efficiency of data processing but also provides enterprises with deeper market insights that help develop more targeted marketing strategies.CONCLUSION: The results of the study are of guiding significance for enterprises to realize data-driven marketing decision-making, which provides strong support for enterprises to maintain their competitive advantages in the highly competitive market. Future research can further explore the application of deep learning in different industries and scenarios, as well as how to optimize deep learning algorithms further to meet the changing needs of enterprises.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140213635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk management in large-scale information system projects 大型信息系统项目的风险管理
Pub Date : 2024-03-22 DOI: 10.4108/eetsis.4608
Diego Armando Castillo-Ñopo, Khateryn Fiorela Loyola-Blanco, Raul Castro-Marca, Gian Davor La Rosa-Gavino, Jherson Giovanny Aragón-Retuerto, Hegel Alvaro Rafael-Sifuentes, William Joel Marín Rodriguez
This article deals with project management in information systems, whose relevance lies in the vital importance of these systems in modern companies. Information systems are essential for decision making and data management in today's interconnected world. Project management, on the other hand, coordinates elements such as scope, resources, costs, schedules and risks to achieve defined objectives. The systems development life cycle (SDLC) structures the process, encompassing phases such as scope definition, planning, execution, monitoring and closure. These phases are integrated with risk management, which identifies, evaluates and mitigates threats and opportunities. Mitigation strategies act before adversity, while contingency planning prepares for the unforeseen. That is why risk management is integrated throughout the project life cycle to anticipate and address challenges. The combination of both aspects is critical in a constantly evolving technology environment. In addition, organizational culture and communication play a critical role. A culture of awareness and accountability, transparency in communication and active stakeholder participation are essential. Training and continuous adaptation allow learning from past experiences and improving practices.
本文论述信息系统中的项目管理,其相关性在于这些系统在现代公司中的极端重要性。在当今相互联系的世界中,信息系统对于决策和数据管理至关重要。而项目管理则是协调范围、资源、成本、进度和风险等要素,以实现既定目标。系统开发生命周期(SDLC)构建了这一过程,包括范围定义、规划、执行、监控和结束等阶段。这些阶段与风险管理相结合,后者负责识别、评估和缓解威胁与机遇。缓解战略在逆境之前采取行动,而应急计划则为不可预见的情况做好准备。这就是为什么风险管理要贯穿整个项目生命周期,以预测和应对挑战。在不断发展的技术环境中,这两方面的结合至关重要。此外,组织文化和沟通也起着至关重要的作用。意识和责任文化、沟通的透明度以及利益相关者的积极参与都至关重要。通过培训和不断调整,可以从过去的经验中吸取教训,改进做法。
{"title":"Risk management in large-scale information system projects","authors":"Diego Armando Castillo-Ñopo, Khateryn Fiorela Loyola-Blanco, Raul Castro-Marca, Gian Davor La Rosa-Gavino, Jherson Giovanny Aragón-Retuerto, Hegel Alvaro Rafael-Sifuentes, William Joel Marín Rodriguez","doi":"10.4108/eetsis.4608","DOIUrl":"https://doi.org/10.4108/eetsis.4608","url":null,"abstract":"This article deals with project management in information systems, whose relevance lies in the vital importance of these systems in modern companies. Information systems are essential for decision making and data management in today's interconnected world. Project management, on the other hand, coordinates elements such as scope, resources, costs, schedules and risks to achieve defined objectives. The systems development life cycle (SDLC) structures the process, encompassing phases such as scope definition, planning, execution, monitoring and closure. These phases are integrated with risk management, which identifies, evaluates and mitigates threats and opportunities. Mitigation strategies act before adversity, while contingency planning prepares for the unforeseen. That is why risk management is integrated throughout the project life cycle to anticipate and address challenges. The combination of both aspects is critical in a constantly evolving technology environment. In addition, organizational culture and communication play a critical role. A culture of awareness and accountability, transparency in communication and active stakeholder participation are essential. Training and continuous adaptation allow learning from past experiences and improving practices.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140216195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Management in the Information Age: Use of Systems, Data Processing and Scalability for Organizational Efficiency 信息时代的企业管理:利用系统、数据处理和可扩展性提高组织效率
Pub Date : 2024-03-21 DOI: 10.4108/eetsis.5408
Karla Martell, Rosa Cueto-Orbe, S. Vela-del-Aguila, Julio Iván Torres-Manrique, Karen Reátegui-Villacorta, C. Alejandría-Castro
Abstract: This article reviews the challenges and opportunities facing companies in business management in the era of information. Challenges in managing large volumes of data, emerging trends in cybersecurity, and companies' ability to adapt to the digitalized environment are analyzed. The methodology used includes an exhaustive search of articles in indexed journals and the application of inclusion criteria to select 50 relevant articles. Key findings include obstacles in data management, the increasing sophistication of cyber threats, and business adaptation strategies such as digital transformation and the integration of emerging technologies. In conclusion, the importance of addressing these challenges and leveraging the opportunities presented by technology to enhance business efficiency and competitiveness is highlighted.
摘要:本文回顾了信息时代企业在业务管理方面面临的挑战和机遇。文章分析了管理大量数据的挑战、网络安全的新趋势以及公司适应数字化环境的能力。所采用的方法包括对索引期刊中的文章进行详尽搜索,并采用纳入标准挑选出 50 篇相关文章。主要发现包括数据管理方面的障碍、日益复杂的网络威胁以及数字化转型和新兴技术整合等业务适应战略。最后,强调了应对这些挑战和利用技术带来的机遇提高业务效率和竞争力的重要性。
{"title":"Business Management in the Information Age: Use of Systems, Data Processing and Scalability for Organizational Efficiency","authors":"Karla Martell, Rosa Cueto-Orbe, S. Vela-del-Aguila, Julio Iván Torres-Manrique, Karen Reátegui-Villacorta, C. Alejandría-Castro","doi":"10.4108/eetsis.5408","DOIUrl":"https://doi.org/10.4108/eetsis.5408","url":null,"abstract":"Abstract: This article reviews the challenges and opportunities facing companies in business management in the era of information. Challenges in managing large volumes of data, emerging trends in cybersecurity, and companies' ability to adapt to the digitalized environment are analyzed. The methodology used includes an exhaustive search of articles in indexed journals and the application of inclusion criteria to select 50 relevant articles. Key findings include obstacles in data management, the increasing sophistication of cyber threats, and business adaptation strategies such as digital transformation and the integration of emerging technologies. In conclusion, the importance of addressing these challenges and leveraging the opportunities presented by technology to enhance business efficiency and competitiveness is highlighted.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 61","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140221215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-GVD: Efficient Software Vulnerability Detection Techniques Based on Graph Neural Network E-GVD:基于图神经网络的高效软件漏洞检测技术
Pub Date : 2024-03-21 DOI: 10.4108/eetsis.5056
Haiye Wang, Zhiguo Qu, Le Sun
INTRODUCTION: Vulnerability detection is crucial for preventing severe security incidents like hacker attacks, data breaches, and network paralysis. Traditional methods, however, face challenges such as low efficiency and insufficient detail in identifying code vulnerabilities. OBJECTIVES: This paper introduces E-GVD, an advanced method for source code vulnerability detection, aiming to address the limitations of existing methods. The objective is to enhance the accuracy of function-level vulnerability detection and provide detailed, understandable insights into the vulnerabilities. METHODS: E-GVD combines Graph Neural Networks (GNNs), which are adept at handling graph-structured data, with residual connections and advanced Programming Language (PL) pre-trained models. RESULTS: Experiments conducted on the real-world vulnerability dataset CodeXGLUE show that E-GVD significantly outperforms existing baseline methods in detecting vulnerabilities. It achieves a maximum accuracy gain of 4.98%, indicating its effectiveness over traditional methods. CONCLUSION: E-GVD not only improves the accuracy of vulnerability detection but also contributes by providing fine-grained explanations. These explanations are made possible through an interpretable Machine Learning (ML) model, which aids developers in quickly and efficiently repairing vulnerabilities, thereby enhancing overall software security.
简介:漏洞检测对于防止黑客攻击、数据泄露和网络瘫痪等严重安全事件至关重要。然而,传统方法在识别代码漏洞时面临效率低、细节不足等挑战。目标本文介绍一种先进的源代码漏洞检测方法 E-GVD,旨在解决现有方法的局限性。其目的是提高函数级漏洞检测的准确性,并提供详细、易懂的漏洞洞察。方法:E-GVD 结合了善于处理图结构数据的图神经网络 (GNN)、残差连接和高级编程语言 (PL) 预训练模型。结果:在真实世界的漏洞数据集 CodeXGLUE 上进行的实验表明,E-GVD 在检测漏洞方面明显优于现有的基线方法。它的最大准确率提高了 4.98%,表明它比传统方法更有效。结论:E-GVD 不仅能提高漏洞检测的准确性,还能提供细粒度的解释。这些解释是通过可解释的机器学习(ML)模型实现的,可帮助开发人员快速、高效地修复漏洞,从而提高软件的整体安全性。
{"title":"E-GVD: Efficient Software Vulnerability Detection Techniques Based on Graph Neural Network","authors":"Haiye Wang, Zhiguo Qu, Le Sun","doi":"10.4108/eetsis.5056","DOIUrl":"https://doi.org/10.4108/eetsis.5056","url":null,"abstract":"INTRODUCTION: Vulnerability detection is crucial for preventing severe security incidents like hacker attacks, data breaches, and network paralysis. Traditional methods, however, face challenges such as low efficiency and insufficient detail in identifying code vulnerabilities. OBJECTIVES: This paper introduces E-GVD, an advanced method for source code vulnerability detection, aiming to address the limitations of existing methods. The objective is to enhance the accuracy of function-level vulnerability detection and provide detailed, understandable insights into the vulnerabilities. METHODS: E-GVD combines Graph Neural Networks (GNNs), which are adept at handling graph-structured data, with residual connections and advanced Programming Language (PL) pre-trained models. RESULTS: Experiments conducted on the real-world vulnerability dataset CodeXGLUE show that E-GVD significantly outperforms existing baseline methods in detecting vulnerabilities. It achieves a maximum accuracy gain of 4.98%, indicating its effectiveness over traditional methods. CONCLUSION: E-GVD not only improves the accuracy of vulnerability detection but also contributes by providing fine-grained explanations. These explanations are made possible through an interpretable Machine Learning (ML) model, which aids developers in quickly and efficiently repairing vulnerabilities, thereby enhancing overall software security.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 70","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140221206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Quality Assessment of Multi-Satellite Pan-Sharpening Approach: A Case Study using Sentinel-2 Synthetic Panchromatic Image and Landsat-8 多卫星全色锐化方法的图像质量评估:使用哨兵-2 号合成全色图像和大地遥感卫星-8 号的案例研究
Pub Date : 2024-03-21 DOI: 10.4108/eetsis.5496
Greetta Pinheiro, Ishfaq Hussain Rather, Aditya Raj, S. Minz, Sushil Kumar
INTRODUCTION: The satellite's physical and technical capabilities limit high spectral and spatial resolution image acquisition. In Remote Sensing (RS), when high spatial and spectral resolution data is essential for specific Geographic Information System (GIS) applications, Pan Sharpening (PanS) becomes imperative in obtaining such data. OBJECTIVES: Study aims to enhance the spatial resolution of the multispectral Landsat-8 (L8) images using a synthetic panchromatic band generated by averaging four fine-resolution bands in the Sentinel-2 (S2) images. METHODS: Evaluation of the proposed multi-satellite PanS approach, three different PanS techniques, Smoothed Filter Intensity Modulation (SFIM), Gram-Schmidt (GS), and High Pass Filter Additive (HPFA) are used for two different study areas. The techniques' effectiveness was evaluated using well-known Image Quality Assessment Metrics (IQAM) such as Root Mean Square Error (RMSE), Correlation Coefficient (CC), Erreur Relative Globale Adimensionnelle de Synthèse (ERGAS), and Relative Average Spectral Error (RASE). This study leveraged the GEE platform for datasets and implementation. RESULTS: The promising values were provided by the GS technique, followed by the SFIM technique, whereas the HPFA technique produced the lowest quantitative result. CONCLUSION: In this study, the spectral bands of the MS image’s performance show apparent variation with respect to that of the different PanS techniques used.
简介:卫星的物理和技术能力限制了高光谱和空间分辨率图像的获取。在遥感(RS)领域,当特定的地理信息系统(GIS)应用需要高空间和光谱分辨率数据时,平移锐化(PanS)就成为获取此类数据的当务之急。研究目的研究旨在利用哨兵-2(Sentinel-2,S2)图像中四个精细分辨率波段的平均值生成的合成全色波段,提高大地遥感卫星-8(Landsat-8,L8)多光谱图像的空间分辨率。方法:评估所提出的多卫星 PanS 方法,在两个不同的研究区域使用了三种不同的 PanS 技术:平滑滤波强度调制(SFIM)、格拉姆-施密特(GS)和高通滤波加法(HPFA)。使用众所周知的图像质量评估指标(IQAM),如均方根误差(RMSE)、相关系数(CC)、全球相对增量合成误差(ERGAS)和相对平均光谱误差(RASE),对这些技术的有效性进行了评估。本研究利用 GEE 平台进行数据集和实施。结果:GS 技术提供了有希望的数值,其次是 SFIM 技术,而 HPFA 技术产生的定量结果最低。结论:在本研究中,MS 图像的光谱波段性能与所使用的不同 PanS 技术的性能存在明显差异。
{"title":"Image Quality Assessment of Multi-Satellite Pan-Sharpening Approach: A Case Study using Sentinel-2 Synthetic Panchromatic Image and Landsat-8","authors":"Greetta Pinheiro, Ishfaq Hussain Rather, Aditya Raj, S. Minz, Sushil Kumar","doi":"10.4108/eetsis.5496","DOIUrl":"https://doi.org/10.4108/eetsis.5496","url":null,"abstract":"INTRODUCTION: The satellite's physical and technical capabilities limit high spectral and spatial resolution image acquisition. In Remote Sensing (RS), when high spatial and spectral resolution data is essential for specific Geographic Information System (GIS) applications, Pan Sharpening (PanS) becomes imperative in obtaining such data. \u0000OBJECTIVES: Study aims to enhance the spatial resolution of the multispectral Landsat-8 (L8) images using a synthetic panchromatic band generated by averaging four fine-resolution bands in the Sentinel-2 (S2) images. \u0000METHODS: Evaluation of the proposed multi-satellite PanS approach, three different PanS techniques, Smoothed Filter Intensity Modulation (SFIM), Gram-Schmidt (GS), and High Pass Filter Additive (HPFA) are used for two different study areas. The techniques' effectiveness was evaluated using well-known Image Quality Assessment Metrics (IQAM) such as Root Mean Square Error (RMSE), Correlation Coefficient (CC), Erreur Relative Globale Adimensionnelle de Synthèse (ERGAS), and Relative Average Spectral Error (RASE). This study leveraged the GEE platform for datasets and implementation. \u0000RESULTS: The promising values were provided by the GS technique, followed by the SFIM technique, whereas the HPFA technique produced the lowest quantitative result. \u0000CONCLUSION: In this study, the spectral bands of the MS image’s performance show apparent variation with respect to that of the different PanS techniques used.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140221707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Web-Based Augmented Reality System 基于网络的增强现实系统
Pub Date : 2024-03-20 DOI: 10.4108/eetsis.5481
Kevin Francis McNally, Hoshang Koviland
Web-based augmented reality (AR) systems have many use cases and opportunities in Product Visualisation, Education and Training, Advertising and Marketing, Navigation and Wayfinding, Virtual Try-On, Interactive Storey Telling, Museums and Cultural Heritage, Training and Simulation, Gamification and more. As such, this research paper, A Web-Based Augmented Reality System, will explore these technologies and their use cases in the form of a literature review and several examples utilising the likes of Vectary, Blippar, Model Viewer and World Cast AR. The purpose of which, is to demonstrate a level of understanding of these virtual technologies, to develop them and to develop their future with practical use cases.
基于网络的增强现实(AR)系统在产品可视化、教育和培训、广告和营销、导航和寻路、虚拟试穿、交互式楼层介绍、博物馆和文化遗产、培训和模拟、游戏化等领域有许多用例和机会。因此,这篇题为 "基于网络的增强现实系统 "的研究论文将通过文献综述和利用 Vectary、Bliippar、Model Viewer 和 World Cast AR 等软件的几个示例,探讨这些技术及其使用案例。其目的是展示对这些虚拟技术的理解程度,开发这些技术,并通过实际应用案例发展其未来。
{"title":"A Web-Based Augmented Reality System","authors":"Kevin Francis McNally, Hoshang Koviland","doi":"10.4108/eetsis.5481","DOIUrl":"https://doi.org/10.4108/eetsis.5481","url":null,"abstract":"Web-based augmented reality (AR) systems have many use cases and opportunities in Product Visualisation, Education and Training, Advertising and Marketing, Navigation and Wayfinding, Virtual Try-On, Interactive Storey Telling, Museums and Cultural Heritage, Training and Simulation, Gamification and more. As such, this research paper, A Web-Based Augmented Reality System, will explore these technologies and their use cases in the form of a literature review and several examples utilising the likes of Vectary, Blippar, Model Viewer and World Cast AR. The purpose of which, is to demonstrate a level of understanding of these virtual technologies, to develop them and to develop their future with practical use cases.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"28 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICST Transactions on Scalable Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1