首页 > 最新文献

Journal of Information Systems Engineering and Business Intelligence最新文献

英文 中文
Comparing Fuzzy Logic Mamdani and Naïve Bayes for Dental Disease Detection 模糊逻辑Mamdani与Naïve贝叶斯在牙病检测中的比较
Pub Date : 2022-10-29 DOI: 10.20473/jisebi.8.2.182-195
L. Wanti, O. Somantri
Background: Dental disease detection is essential for the diagnosis of dental diseases.Objective: This research compares the Mamdani fuzzy logic and Naïve Bayes in detecting dental diseases.Methods: The first is to process data on dental disease symptoms and dental support tissues based on complaints of toothache consulted with experts at a community health centre (puskesmas). The second is to apply the Mamdani fuzzy logic and the Naïve Bayes to the proposed expert system. The third is to provide recommended decisions about dental diseases based on the symptom data inputted into the expert system. Patient data were collected at the North Cilacap puskesmas between July and December 2021.Results: The Mamdani fuzzy logic converts uncertain values into definite values, and the Naïve  Bayes method classifies the type of dental disease by calculating the weight of patients’ answers. The methods were tested on 67 patients with dental disease complaints. The accuracy rate of the Mamdani fuzzy logic was 85.1%, and the Naïve Bayes method was 82.1%.Conclusion: The prediction accuracy was compared to the expert diagnoses to determine whether the Mamdani fuzzy logic method is better than the Naïve Bayes method. Keywords: Dental Disease, Expert System, Mamdani Fuzzy Logic, Naïve Bayes, Prediction
背景:口腔疾病检测是诊断口腔疾病的必要手段。目的:比较Mamdani模糊逻辑和Naïve贝叶斯在口腔疾病诊断中的应用。方法:首先是根据社区卫生中心(puskesmas)专家咨询的牙痛投诉,处理牙齿疾病症状和牙齿支持组织的数据。二是将Mamdani模糊逻辑和Naïve贝叶斯算法应用于所提出的专家系统。第三是根据输入专家系统的症状数据,提供有关牙病的建议决策。患者数据于2021年7月至12月在North Cilacap puskesmas收集。结果:Mamdani模糊逻辑将不确定值转化为确定值,Naïve贝叶斯方法通过计算患者答案的权重对牙病类型进行分类。对67例口腔疾病主诉患者进行了试验。Mamdani模糊逻辑的准确率为85.1%,Naïve贝叶斯方法的准确率为82.1%。结论:将Mamdani模糊逻辑方法的预测精度与专家诊断结果进行比较,判断其是否优于Naïve贝叶斯方法。关键词:牙病,专家系统,Mamdani模糊逻辑,Naïve贝叶斯,预测
{"title":"Comparing Fuzzy Logic Mamdani and Naïve Bayes for Dental Disease Detection","authors":"L. Wanti, O. Somantri","doi":"10.20473/jisebi.8.2.182-195","DOIUrl":"https://doi.org/10.20473/jisebi.8.2.182-195","url":null,"abstract":"Background: Dental disease detection is essential for the diagnosis of dental diseases.\u0000Objective: This research compares the Mamdani fuzzy logic and Naïve Bayes in detecting dental diseases.\u0000Methods: The first is to process data on dental disease symptoms and dental support tissues based on complaints of toothache consulted with experts at a community health centre (puskesmas). The second is to apply the Mamdani fuzzy logic and the Naïve Bayes to the proposed expert system. The third is to provide recommended decisions about dental diseases based on the symptom data inputted into the expert system. Patient data were collected at the North Cilacap puskesmas between July and December 2021.\u0000Results: The Mamdani fuzzy logic converts uncertain values into definite values, and the Naïve  Bayes method classifies the type of dental disease by calculating the weight of patients’ answers. The methods were tested on 67 patients with dental disease complaints. The accuracy rate of the Mamdani fuzzy logic was 85.1%, and the Naïve Bayes method was 82.1%.\u0000Conclusion: The prediction accuracy was compared to the expert diagnoses to determine whether the Mamdani fuzzy logic method is better than the Naïve Bayes method.\u0000 \u0000Keywords: Dental Disease, Expert System, Mamdani Fuzzy Logic, Naïve Bayes, Prediction","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75320443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lexicon and Naive Bayes Algorithms to Detect Mental Health Situations from Twitter Data 从Twitter数据中检测心理健康状况的词典和朴素贝叶斯算法
Pub Date : 2022-10-29 DOI: 10.20473/jisebi.8.2.142-148
Sheila Shevira, I. M. A. D. Suarjaya, Putu Wira Buana
Background: Twitter is a popular social media where users express emotions, thoughts, and opinions that cannot be channelled in the real world. They do this by tweeting short, concise, and clear messages. Since users often express themselves, Twitter data can detect mental health trends.Objective: This study aims to detect suicidal messages through tweets written by users with mental health issues.Methods: These tweets are analysed and classified using the lexicon-based and Naive Bayes algorithms to determine whether it contains suicidal messages.Results: The classification results show that the ‘normal’ classification is predominant at 52.3% of the total 3,034,826 tweets, which indicates an increase from September to December 2021.Conclusion: Most tweets are categorised as ‘normal’, therefore the mental health status appears secure. However, this finding needs to be re-examined in the future, especially in DKI Jakarta Province, which has the most cases of mental disorders. This study found that the Naive Bayes algorithm is more accurate (85.5%) than the lexicon-based algorithm. This can be improved in future studies by increasing performance at the pre-processing stage. Keywords: Lexicon Based, Mental Disorder, Mental Health, Naïve Bayes, Twitter
背景:Twitter是一种流行的社交媒体,用户可以在这里表达在现实世界中无法表达的情感、思想和观点。他们通过发布简短、简洁、清晰的信息来做到这一点。由于用户经常表达自己,Twitter数据可以检测到心理健康趋势。目的:本研究旨在通过有心理健康问题的用户所写的推文来检测自杀信息。方法:使用基于词典和朴素贝叶斯算法对这些推文进行分析和分类,以确定其是否包含自杀消息。结果:分类结果显示,“正常”分类占主导地位,占总数3,034,826条推文的52.3%,表明从2021年9月到12月有所增加。结论:大多数推文被归类为“正常”,因此心理健康状况似乎是安全的。然而,这一发现需要在未来重新检查,特别是在DKI雅加达省,那里有最多的精神障碍病例。本研究发现,朴素贝叶斯算法比基于词典的算法准确率更高(85.5%)。这可以在未来的研究中通过提高预处理阶段的性能来改进。关键词:基于词典,精神障碍,心理健康,Naïve贝叶斯,Twitter
{"title":"Lexicon and Naive Bayes Algorithms to Detect Mental Health Situations from Twitter Data","authors":"Sheila Shevira, I. M. A. D. Suarjaya, Putu Wira Buana","doi":"10.20473/jisebi.8.2.142-148","DOIUrl":"https://doi.org/10.20473/jisebi.8.2.142-148","url":null,"abstract":"Background: Twitter is a popular social media where users express emotions, thoughts, and opinions that cannot be channelled in the real world. They do this by tweeting short, concise, and clear messages. Since users often express themselves, Twitter data can detect mental health trends.\u0000Objective: This study aims to detect suicidal messages through tweets written by users with mental health issues.\u0000Methods: These tweets are analysed and classified using the lexicon-based and Naive Bayes algorithms to determine whether it contains suicidal messages.\u0000Results: The classification results show that the ‘normal’ classification is predominant at 52.3% of the total 3,034,826 tweets, which indicates an increase from September to December 2021.\u0000Conclusion: Most tweets are categorised as ‘normal’, therefore the mental health status appears secure. However, this finding needs to be re-examined in the future, especially in DKI Jakarta Province, which has the most cases of mental disorders. This study found that the Naive Bayes algorithm is more accurate (85.5%) than the lexicon-based algorithm. This can be improved in future studies by increasing performance at the pre-processing stage.\u0000 \u0000Keywords: Lexicon Based, Mental Disorder, Mental Health, Naïve Bayes, Twitter","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80457244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Risk Assessment (ISRA): A Systematic Literature Review 资讯安全风险评估(ISRA):系统的文献回顾
Pub Date : 2022-10-29 DOI: 10.20473/jisebi.8.2.207-217
Rias Kumalasari Devi, D. I. Sensuse, Kautsarina, Ryan Randy Suryono
Background: Information security is essential for organisations, hence the risk assessment. Information security risk assessment (ISRA) identifies, assesses, and prioritizes risks according to organisational goals. Previous studies have analysed and discussed information security risk assessment. Therefore, it is necessary to understand the models more systematically.Objective: This study aims to determine types of ISRA and fill a gap in literature review research by categorizing existing frameworks, models, and methods.Methods: The systematic literature review (SLR) approach developed by Kitchenham is applied in this research. A total of 25 studies were selected, classified, and analysed according to defined criteria.Results: Most selected studies focus on implementing and developing new models for risk assessment. In addition, most are related to information systems in general.Conclusion: The findings show that there is no single best framework or model because the best framework needs to be tailored according to organisational goals. Previous researchers have developed several new ISRA models, but empirical evaluation research is needed. Future research needs to develop more robust models for risk assessments for cloud computing systems. Keywords: Information Security Risk Assessment, ISRA, Security Risk
背景:资讯保安对机构来说是必不可少的,因此需要进行风险评估。信息安全风险评估(ISRA)根据组织目标识别、评估风险,并对风险进行优先级排序。以往的研究对信息安全风险评估进行了分析和讨论。因此,有必要更系统地了解这些模型。目的:本研究旨在通过对现有框架、模型和方法进行分类,确定ISRA的类型,填补文献综述研究的空白。方法:采用Kitchenham提出的系统文献综述(SLR)方法进行研究。根据确定的标准,共选择、分类和分析了25项研究。结果:大多数选定的研究侧重于实施和开发新的风险评估模型。此外,大多数与一般的信息系统有关。结论:研究结果表明,没有单一的最佳框架或模型,因为最佳框架需要根据组织目标进行定制。前人已经建立了几种新的ISRA模型,但还需要进行实证评价研究。未来的研究需要为云计算系统的风险评估开发更强大的模型。关键词:信息安全风险评估,ISRA,安全风险
{"title":"Information Security Risk Assessment (ISRA): A Systematic Literature Review","authors":"Rias Kumalasari Devi, D. I. Sensuse, Kautsarina, Ryan Randy Suryono","doi":"10.20473/jisebi.8.2.207-217","DOIUrl":"https://doi.org/10.20473/jisebi.8.2.207-217","url":null,"abstract":"Background: Information security is essential for organisations, hence the risk assessment. Information security risk assessment (ISRA) identifies, assesses, and prioritizes risks according to organisational goals. Previous studies have analysed and discussed information security risk assessment. Therefore, it is necessary to understand the models more systematically.\u0000Objective: This study aims to determine types of ISRA and fill a gap in literature review research by categorizing existing frameworks, models, and methods.\u0000Methods: The systematic literature review (SLR) approach developed by Kitchenham is applied in this research. A total of 25 studies were selected, classified, and analysed according to defined criteria.\u0000Results: Most selected studies focus on implementing and developing new models for risk assessment. In addition, most are related to information systems in general.\u0000Conclusion: The findings show that there is no single best framework or model because the best framework needs to be tailored according to organisational goals. Previous researchers have developed several new ISRA models, but empirical evaluation research is needed. Future research needs to develop more robust models for risk assessments for cloud computing systems.\u0000 \u0000Keywords: Information Security Risk Assessment, ISRA, Security Risk","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84043668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Emotion in Indonesian Tweets: A Term-Weighting Scheme Study 印尼文推文的情绪侦测:一项术语加权方案研究
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.61-70
Kuncahyo Setyo Nugroho, F. A. Bachtiar, W. Mahmudy
Background: Term-weighting plays a key role in detecting emotion in texts. Studies in term-weighting schemes aim to improve short text classification by distinguishing terms accurately.Objective: This study aims to formulate the best term-weighting schemes and discover the relationship between n-gram combinations and different classification algorithms in detecting emotion in Twitter texts.Methods: The data used was the Indonesian Twitter Emotion Dataset, with features generated through different n-gram combinations. Two approaches assign weights to the features. Tests were carried out using ten-fold cross-validation on three classification algorithms. The performance of the model was measured using accuracy and F1 score.Results: The term-weighting schemes with the highest performance are Term Frequency-Inverse Category Frequency (TF-ICF) and Term Frequency-Relevance Frequency (TF-RF). The scheme with a supervised approach performed better than the unsupervised one. However, we did not find a consistent advantage as some of the experiments found that Term Frequency-Inverse Document Frequency (TF-IDF) also performed exceptionally well. The traditional TF-IDF method remains worth considering as a term-weighting scheme.Conclusion: This study provides recommendations for emotion detection in texts. Future studies can benefit from dealing with imbalances in the dataset to provide better performance.Keywords: Emotion Detection, Feature Engineering, Term-Weighting, Text Mining
背景:词汇权重在文本情感检测中起着关键作用。术语加权方案的研究旨在通过准确区分术语来改进短文本分类。目的:本研究旨在制定最佳术语加权方案,并发现n-gram组合与不同分类算法在Twitter文本情感检测中的关系。方法:使用的数据是印度尼西亚Twitter情绪数据集,通过不同的n-gram组合生成特征。有两种方法为特征分配权重。对三种分类算法进行了十倍交叉验证。使用准确率和F1分数来衡量模型的性能。结果:性能最好的术语加权方案是术语频率-逆类别频率(TF-ICF)和术语频率-相关频率(TF-RF)。有监督方案的性能优于无监督方案。然而,我们并没有发现一致的优势,因为一些实验发现术语频率-逆文档频率(TF-IDF)也表现得非常好。传统的TF-IDF方法作为一种期限加权方案仍然值得考虑。结论:本研究为文本情感检测提供了建议。未来的研究可以从处理数据集中的不平衡中受益,以提供更好的性能。关键词:情感检测,特征工程,术语加权,文本挖掘
{"title":"Detecting Emotion in Indonesian Tweets: A Term-Weighting Scheme Study","authors":"Kuncahyo Setyo Nugroho, F. A. Bachtiar, W. Mahmudy","doi":"10.20473/jisebi.8.1.61-70","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.61-70","url":null,"abstract":"Background: Term-weighting plays a key role in detecting emotion in texts. Studies in term-weighting schemes aim to improve short text classification by distinguishing terms accurately.\u0000Objective: This study aims to formulate the best term-weighting schemes and discover the relationship between n-gram combinations and different classification algorithms in detecting emotion in Twitter texts.\u0000Methods: The data used was the Indonesian Twitter Emotion Dataset, with features generated through different n-gram combinations. Two approaches assign weights to the features. Tests were carried out using ten-fold cross-validation on three classification algorithms. The performance of the model was measured using accuracy and F1 score.\u0000Results: The term-weighting schemes with the highest performance are Term Frequency-Inverse Category Frequency (TF-ICF) and Term Frequency-Relevance Frequency (TF-RF). The scheme with a supervised approach performed better than the unsupervised one. However, we did not find a consistent advantage as some of the experiments found that Term Frequency-Inverse Document Frequency (TF-IDF) also performed exceptionally well. The traditional TF-IDF method remains worth considering as a term-weighting scheme.\u0000Conclusion: This study provides recommendations for emotion detection in texts. Future studies can benefit from dealing with imbalances in the dataset to provide better performance.\u0000Keywords: Emotion Detection, Feature Engineering, Term-Weighting, Text Mining","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74738818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mask R-CNN and GrabCut Algorithm for an Image-based Calorie Estimation System 基于图像的卡路里估计系统的掩模R-CNN和GrabCut算法
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.1-10
Tiara Lestari Subaran, Transmissia Semiawan, Nurjannah Syakrani
Background: A calorie estimation system based on food images uses computer vision technology to recognize and count calories. There are two key processes required in the system: detection and segmentation. Many algorithms can undertake both processes, each algorithm with different levels of accuracy.Objective: This study aims to improve the accuracy of calorie calculation and segmentation processes using a combination of Mask R-CNN and GrabCut algorithms.Methods: The segmentation mask generated from Mask R-CNN and GrabCut were combined to create a new mask, then used to calculate the calorie. By considering the image augmentation technique, the accuracy of the calorie calculation and segmentation processes were observed to evaluate the method’s performance.Results: The proposed method could achieve a satisfying result, with an average calculation error value of less than 10% and an F1 score above 90% in all scenarios.Conclusion: Compared to earlier studies, the combination of Mask R-CNN and GrabCut could obtain a more satisfying result in calculating food calories with different shapes.Keywords: Augmentation, Calorie Calculation, Detection
背景:一种基于食物图像的卡路里估算系统,利用计算机视觉技术来识别和计算卡路里。系统中需要两个关键的过程:检测和分割。许多算法可以同时进行这两个过程,每个算法具有不同的精度水平。目的:本研究旨在利用Mask R-CNN和GrabCut算法相结合的方法提高卡路里计算和分割过程的准确性。方法:将mask R-CNN生成的分割掩码与GrabCut合成一个新的分割掩码,并用于计算卡路里。结合图像增强技术,观察了热量计算和分割过程的准确性,评价了该方法的性能。结果:所提出的方法能够取得令人满意的结果,在所有场景下,平均计算误差值小于10%,F1得分均在90%以上。结论:与前期研究相比,Mask R-CNN与GrabCut结合计算不同形状食物热量的结果更令人满意。关键词:增强,卡路里计算,检测
{"title":"Mask R-CNN and GrabCut Algorithm for an Image-based Calorie Estimation System","authors":"Tiara Lestari Subaran, Transmissia Semiawan, Nurjannah Syakrani","doi":"10.20473/jisebi.8.1.1-10","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.1-10","url":null,"abstract":"Background: A calorie estimation system based on food images uses computer vision technology to recognize and count calories. There are two key processes required in the system: detection and segmentation. Many algorithms can undertake both processes, each algorithm with different levels of accuracy.\u0000Objective: This study aims to improve the accuracy of calorie calculation and segmentation processes using a combination of Mask R-CNN and GrabCut algorithms.\u0000Methods: The segmentation mask generated from Mask R-CNN and GrabCut were combined to create a new mask, then used to calculate the calorie. By considering the image augmentation technique, the accuracy of the calorie calculation and segmentation processes were observed to evaluate the method’s performance.\u0000Results: The proposed method could achieve a satisfying result, with an average calculation error value of less than 10% and an F1 score above 90% in all scenarios.\u0000Conclusion: Compared to earlier studies, the combination of Mask R-CNN and GrabCut could obtain a more satisfying result in calculating food calories with different shapes.\u0000Keywords: Augmentation, Calorie Calculation, Detection","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79331984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Early Stopping Effectiveness for YOLOv4 YOLOv4的早期停止有效性
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.11-20
Afif Rana Muhammad, Hamzah Prasetio Utomo, Priyanto Hidayatullah, Nurjannah Syakrani
Background: YOLOv4 is one of the fastest algorithms for object detection. Its methods, i.e., bag of freebies and bag of specials, can prevent overfitting, but this can be combined with early stopping as it could also prevent overfitting.Objective: This study aims to identify the effectiveness of early stopping in preventing overfitting in the YOLOv4 training process.Methods: Four datasets were grouped based on the training data size and object class, These datasets were tested in the experiment, which was carried out using three patience hyperparameters: 2, 3, and 5. To assess the consistency, it was repeated eight times.Results: The experimental results show that early stopping is triggered more frequently in training with data below 2,000 images. Of the three patience hyperparameters used, patience 2 and 3 were able to halve the training duration without sacrificing accuracy. Patience 5 rarely triggers early stopping. There is no pattern of correlation between the number of object classes and early stopping.Conclusion: Early stopping is useful only in training with data below 2,000 images. Patience with a value of 2 or 3 are recommended.Keywords: Early Stopping, Overfitting, Training data, YOLOv4
背景:YOLOv4是最快的目标检测算法之一。它的方法,即一袋免费赠品和一袋特价,可以防止过拟合,但这可以与早期停止相结合,因为它也可以防止过拟合。目的:本研究旨在确定早期停止在YOLOv4训练过程中防止过拟合的有效性。方法:根据训练数据大小和对象类别将4个数据集进行分组,使用3、3、5三个耐心超参数对这些数据集进行测试。为了评估一致性,重复了8次。结果:实验结果表明,在2000张以下数据的训练中,触发提前停止的频率更高。在使用的三个耐心超参数中,耐心2和3能够在不牺牲准确性的情况下将训练时间减半。耐心很少会引发提前停车。对象类的数量和提前停止之间没有关联模式。结论:只有在2000张以下图像的训练中,早期停止是有用的。建议耐心值为2或3。关键词:早停,过拟合,训练数据,YOLOv4
{"title":"Early Stopping Effectiveness for YOLOv4","authors":"Afif Rana Muhammad, Hamzah Prasetio Utomo, Priyanto Hidayatullah, Nurjannah Syakrani","doi":"10.20473/jisebi.8.1.11-20","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.11-20","url":null,"abstract":"Background: YOLOv4 is one of the fastest algorithms for object detection. Its methods, i.e., bag of freebies and bag of specials, can prevent overfitting, but this can be combined with early stopping as it could also prevent overfitting.\u0000Objective: This study aims to identify the effectiveness of early stopping in preventing overfitting in the YOLOv4 training process.\u0000Methods: Four datasets were grouped based on the training data size and object class, These datasets were tested in the experiment, which was carried out using three patience hyperparameters: 2, 3, and 5. To assess the consistency, it was repeated eight times.\u0000Results: The experimental results show that early stopping is triggered more frequently in training with data below 2,000 images. Of the three patience hyperparameters used, patience 2 and 3 were able to halve the training duration without sacrificing accuracy. Patience 5 rarely triggers early stopping. There is no pattern of correlation between the number of object classes and early stopping.\u0000Conclusion: Early stopping is useful only in training with data below 2,000 images. Patience with a value of 2 or 3 are recommended.\u0000Keywords: Early Stopping, Overfitting, Training data, YOLOv4","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77037166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Drivers of a Digital Signature System Adoption: Evidence from Finance and Information System Departments 采用数字签名系统的驱动因素:来自财务和信息系统部门的证据
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.80-90
Ahmad Arif Santosa, F. Alamsjah
Background: With the massive e-commerce transactions and document transfers, reliable system protection is needed. A digital signature is a tool that consists of encryption and decryption algorithms in a secret key to prevent data theft and online fraud.Objective: This research proposes an integrated technology-organization-environment (TOE) and the unified theory of acceptance and use of technology (UTAUT) to determine the factors affecting consumer intention to adopt the digital signature system. This research uses finance and information system departments’ perspectives in various industries.Methods: The analytical method is the Structural Equation Modeling (SEM) approach using the Smart Partial Least Square statistical version 3.0 software to examine the hypothesized connections between latent variables.Results: The results show that support from top management, size of the enterprise, and social influence have significant and positive effects on digital signature adoption. Meanwhile, user involvement and perceived simplicity have a negative effect on the adoption of a digital signature system in finance and information system departments.Conclusion: The current research suggests that executive levels in the finance and information system departments encourage the adoption of digital signature tools in doing daily tasks to increase efficiency.Keywords: Digital signature, consumer intention, finance and information system, structural equation modeling, TOE and UTAUT
背景:随着大量的电子商务交易和文件传输,需要可靠的系统保护。数字签名是一种由加密和解密算法组成的工具,用于防止数据被盗和在线欺诈。目的:本研究提出综合技术-组织-环境(TOE)和技术接受与使用统一理论(UTAUT)来确定影响消费者采用数字签名系统意愿的因素。本研究采用不同行业的财务及资讯系统部门的观点。方法:采用结构方程建模(SEM)方法,利用Smart偏最小二乘统计3.0版软件对潜在变量之间的假设联系进行检验。结果:企业高层的支持、企业规模和社会影响力对数字签名的采用有显著的正向影响。同时,用户参与和感知的简单性对财务和信息系统部门采用数字签名系统有负面影响。结论:目前的研究表明,财务和信息系统部门的管理层鼓励在日常工作中采用数字签名工具以提高效率。关键词:数字签名,消费者意向,金融信息系统,结构方程建模,TOE和UTAUT
{"title":"The Drivers of a Digital Signature System Adoption: Evidence from Finance and Information System Departments","authors":"Ahmad Arif Santosa, F. Alamsjah","doi":"10.20473/jisebi.8.1.80-90","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.80-90","url":null,"abstract":"Background: With the massive e-commerce transactions and document transfers, reliable system protection is needed. A digital signature is a tool that consists of encryption and decryption algorithms in a secret key to prevent data theft and online fraud.\u0000Objective: This research proposes an integrated technology-organization-environment (TOE) and the unified theory of acceptance and use of technology (UTAUT) to determine the factors affecting consumer intention to adopt the digital signature system. This research uses finance and information system departments’ perspectives in various industries.\u0000Methods: The analytical method is the Structural Equation Modeling (SEM) approach using the Smart Partial Least Square statistical version 3.0 software to examine the hypothesized connections between latent variables.\u0000Results: The results show that support from top management, size of the enterprise, and social influence have significant and positive effects on digital signature adoption. Meanwhile, user involvement and perceived simplicity have a negative effect on the adoption of a digital signature system in finance and information system departments.\u0000Conclusion: The current research suggests that executive levels in the finance and information system departments encourage the adoption of digital signature tools in doing daily tasks to increase efficiency.\u0000Keywords: Digital signature, consumer intention, finance and information system, structural equation modeling, TOE and UTAUT","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"80 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79649396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of Social Media Engagement on Market Share: A System Dynamics Model 社会媒体参与对市场份额的影响:一个系统动力学模型
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.71-79
E. Suryani, R. A. Hendrawan, Benyamin Limanto, Fatharani Wafda, Inayah Auliyah
Background: Some studies have shown that Return on Total Assets is a strategy to increase market share. Other studies have also shown that social media like WeChat can increase market share. However, no studies have considered Instagram engagement in increasing market share.Objective: This study aims to identify variable linkage that increases market share through a dynamic system approach in small and medium-sized enterprises (SMEs).Methods: Using a System Dynamics approach, this study presents a model simulation with a proposed increase in market share by considering Instagram features. This approach creates a Causal Loop Diagram converted into a simulated Stock Flow Diagram. The value generated from the simulation is validated with the mean comparison and % error variance formulas.Results: Instagram engagement increases market share from 0.009 to 0.018. Such engagement can be increased by posting regularly and doing more activities, such as increasing post frequency, holding contests, and maximizing all features.Conclusion: This study has successfully modeled information technology, i.e., a promotion module on social media. However, this work has not yet demonstrated how the features can gain more market share, so future research is needed. Keywords: Causal Loop Diagram, Engagement, Market Share, Stock Flow Diagram, System Dynamics
背景:一些研究表明,总资产报酬率是一种增加市场份额的策略。其他研究也表明,微信等社交媒体可以增加市场份额。然而,没有研究认为Instagram的参与会增加市场份额。目的:本研究旨在透过动态系统方法,找出提升中小企业市场占有率的可变连结。方法:利用系统动力学方法,本研究提出了一个模型仿真,并提出了考虑Instagram特征的市场份额增加。这种方法创建了一个因果循环图,将其转换为模拟的库存流程图。通过均值比较和%误差方差公式验证了仿真生成的值。结果:Instagram参与度将市场份额从0.009提升至0.018。这种粘性可以通过定期发布和做更多的活动来增加,比如增加发布频率,举办比赛,最大化所有功能。结论:本研究成功建模了信息技术,即社会化媒体上的推广模块。然而,这项工作尚未证明这些功能如何获得更多的市场份额,因此需要进一步的研究。关键词:因果循环图,参与,市场份额,库存流程图,系统动力学
{"title":"The Impact of Social Media Engagement on Market Share: A System Dynamics Model","authors":"E. Suryani, R. A. Hendrawan, Benyamin Limanto, Fatharani Wafda, Inayah Auliyah","doi":"10.20473/jisebi.8.1.71-79","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.71-79","url":null,"abstract":"Background: Some studies have shown that Return on Total Assets is a strategy to increase market share. Other studies have also shown that social media like WeChat can increase market share. However, no studies have considered Instagram engagement in increasing market share.\u0000Objective: This study aims to identify variable linkage that increases market share through a dynamic system approach in small and medium-sized enterprises (SMEs).\u0000Methods: Using a System Dynamics approach, this study presents a model simulation with a proposed increase in market share by considering Instagram features. This approach creates a Causal Loop Diagram converted into a simulated Stock Flow Diagram. The value generated from the simulation is validated with the mean comparison and % error variance formulas.\u0000Results: Instagram engagement increases market share from 0.009 to 0.018. Such engagement can be increased by posting regularly and doing more activities, such as increasing post frequency, holding contests, and maximizing all features.\u0000Conclusion: This study has successfully modeled information technology, i.e., a promotion module on social media. However, this work has not yet demonstrated how the features can gain more market share, so future research is needed.\u0000 Keywords: Causal Loop Diagram, Engagement, Market Share, Stock Flow Diagram, System Dynamics","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"97 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85322981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Academic Recommender System Using Engagement Advising and Backward Chaining Model 基于契约建议和反向链接模型的学术推荐系统
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.91-99
Cut Fiarni, Arif Gunawan, Fredrick Victor
Background: The goal of academic supervision is to help students plan their academic journey and graduate on time. An intelligent support system is needed to spot potentially struggling students and identify the issues as early as possible.Objective: This study aims to develop an academic advising recommender system that improves decision-making through system utility, ease of use, and clearly visualized information. The study also aims to find the best advising relationship model to be implemented in the proposed system.Methods: The system was modeled by following the hybrid approach to obtain information and suggest recommended actions. The recommendation was modeled by backward chaining to prevent students from dropping out.Results: To validate the recommendations given by the proposed system, we used conformity level, and the result was 94.45%. To evaluate the utility of the system, we used the backbox method, resulting in satisfactory responses. Lastly, to evaluate user acceptance, we used the technology acceptance model (TAM), resulting in 85% ease of use and 91.2% perceived usefulness for the four main features, study planning, graduate timeline simulation, progress report, and visualization of academic KPIs.Conclusion: We propose an academic recommender system with KPIs visualization and academic planning information.Keywords: Academic advising model, recommender system, backward chaining, goal-driven, technology acceptance model, certainty factor
背景:学业指导的目标是帮助学生规划自己的学业之旅,按时毕业。需要一个智能支持系统来发现潜在的困难学生,并尽早发现问题。目的:本研究旨在开发一个学术建议推荐系统,通过系统的实用性、易用性和清晰的可视化信息来改善决策。本研究也旨在寻找在建议系统中实施的最佳建议关系模型。方法:采用混合方法对系统进行建模,获取信息并提出建议。为了防止学生辍学,该建议采用了反向链接的方法。结果:采用符合性标准对所提出的建议进行验证,符合性水平为94.45%。为了评估系统的效用,我们使用了backbox方法,结果得到了令人满意的回应。最后,为了评估用户接受度,我们使用了技术接受模型(TAM),结果显示,对于学习计划、毕业时间模拟、进度报告和学术kpi可视化这四个主要功能,易用性为85%,感知有用性为91.2%。结论:我们提出了一个具有kpi可视化和学术规划信息的学术推荐系统。关键词:学术指导模型,推荐系统,反向链,目标驱动,技术接受模型,确定性因素
{"title":"Academic Recommender System Using Engagement Advising and Backward Chaining Model","authors":"Cut Fiarni, Arif Gunawan, Fredrick Victor","doi":"10.20473/jisebi.8.1.91-99","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.91-99","url":null,"abstract":"Background: The goal of academic supervision is to help students plan their academic journey and graduate on time. An intelligent support system is needed to spot potentially struggling students and identify the issues as early as possible.\u0000Objective: This study aims to develop an academic advising recommender system that improves decision-making through system utility, ease of use, and clearly visualized information. The study also aims to find the best advising relationship model to be implemented in the proposed system.\u0000Methods: The system was modeled by following the hybrid approach to obtain information and suggest recommended actions. The recommendation was modeled by backward chaining to prevent students from dropping out.\u0000Results: To validate the recommendations given by the proposed system, we used conformity level, and the result was 94.45%. To evaluate the utility of the system, we used the backbox method, resulting in satisfactory responses. Lastly, to evaluate user acceptance, we used the technology acceptance model (TAM), resulting in 85% ease of use and 91.2% perceived usefulness for the four main features, study planning, graduate timeline simulation, progress report, and visualization of academic KPIs.\u0000Conclusion: We propose an academic recommender system with KPIs visualization and academic planning information.\u0000Keywords: Academic advising model, recommender system, backward chaining, goal-driven, technology acceptance model, certainty factor","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79034884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
License Plate Character Recognition using Convolutional Neural Network 基于卷积神经网络的车牌字符识别
Pub Date : 2022-04-26 DOI: 10.20473/jisebi.8.1.51-60
Firman Maulana Adhari, T. Abidin, R. Ferdhiana
Background: In the last decade, the number of registered vehicles has grown exponentially. With more vehicles on the road, traffic jams, accidents, and violations also increase. A license plate plays a key role in solving such problems because it stores a vehicle’s historical information. Therefore, automated license-plate character recognition is needed.Objective: This study proposes a recognition system that uses convolutional neural network (CNN) architectures to recognize characters from a license plate’s images. We called it a modified LeNet-5 architecture.Methods: We used four different CNN architectures to recognize license plate characters: AlexNet, LeNet-5, modified LeNet-5, and ResNet-50 architectures. We evaluated the performance based on their accuracy and computation time. We compared the deep learning methods with the Freeman chain code (FCC) extraction with support vector machine (SVM). We also evaluated the Otsu and the threshold binarization performances when applied in the FCC extraction method.Results: The ResNet-50 and modified LeNet-5 produces the best accuracy during the training at 0.97. The precision and recall scores of the ResNet-50 are both 0.97, while the modified LeNet-5’s values are 0.98 and 0.96, respectively. The modified LeNet-5 shows a slightly higher precision score but a lower recall score. The modified LeNet-5 shows a slightly lower accuracy during the testing than ResNet-50. Meanwhile, the Otsu binarization’s FCC extraction is better than the threshold binarization. Overall, the FCC extraction technique performs less effectively than CNN. The modified LeNet-5 computes the fastest at 7 mins and 57 secs, while ResNet-50 needs 42 mins and 11 secs.Conclusion: We discovered that CNN is better than the FCC extraction method with SVM. Both ResNet-50 and the modified LeNet-5 perform best during the training, with F measure scoring 0.97. However, ResNet-50 outperforms the modified LeNet-5 during the testing, with F-measure at 0.97 and 1.00, respectively. In addition, the FCC extraction using the Otsu binarization is better than the threshold binarization. Otsu binarization reached 0.91, higher than the static threshold binarization at 127. In addition, Otsu binarization produces a dynamic threshold value depending on the images’ light intensity.Keywords: Convolutional Neural Network, Freeman Chain Code, License Plate Character Recognition, Support Vector Machine
背景:在过去十年中,注册车辆的数量呈指数级增长。随着道路上的车辆越来越多,交通堵塞、事故和违规行为也在增加。车牌在解决此类问题方面发挥着关键作用,因为它存储了车辆的历史信息。因此,需要自动车牌字符识别。目的:提出一种基于卷积神经网络(CNN)架构的车牌字符识别系统。我们称之为改良版的LeNet-5架构。方法:采用四种不同的CNN架构进行车牌字符识别:AlexNet、LeNet-5、修改后的LeNet-5和ResNet-50架构。我们根据它们的精度和计算时间来评估性能。将深度学习方法与支持向量机(SVM)的Freeman链码(FCC)提取方法进行了比较。我们还对应用于FCC提取方法的Otsu和阈值二值化性能进行了评价。结果:ResNet-50和改进后的LeNet-5在训练过程中准确率最高,为0.97。ResNet-50的查准率和查全率均为0.97,而改进后的LeNet-5的查准率和查全率分别为0.98和0.96。改进后的LeNet-5显示出略高的精度分数,但较低的召回分数。改进后的LeNet-5在测试过程中显示出比ResNet-50稍低的精度。同时,Otsu二值化的FCC提取效果优于阈值二值化。总的来说,FCC提取技术的效果不如CNN。改进后的LeNet-5计算速度最快,为7分57秒,而ResNet-50需要42分11秒。结论:我们发现CNN提取方法优于支持向量机的FCC提取方法。ResNet-50和改进后的LeNet-5在训练过程中表现最好,F测量得分为0.97。然而,ResNet-50在测试中优于改进的LeNet-5, F-measure分别为0.97和1.00。此外,使用Otsu二值化的FCC提取效果优于阈值二值化。Otsu二值化达到0.91,高于静态阈值二值化的127。此外,Otsu二值化根据图像的光强产生一个动态阈值。关键词:卷积神经网络,弗里曼链码,车牌字符识别,支持向量机
{"title":"License Plate Character Recognition using Convolutional Neural Network","authors":"Firman Maulana Adhari, T. Abidin, R. Ferdhiana","doi":"10.20473/jisebi.8.1.51-60","DOIUrl":"https://doi.org/10.20473/jisebi.8.1.51-60","url":null,"abstract":"Background: In the last decade, the number of registered vehicles has grown exponentially. With more vehicles on the road, traffic jams, accidents, and violations also increase. A license plate plays a key role in solving such problems because it stores a vehicle’s historical information. Therefore, automated license-plate character recognition is needed.\u0000Objective: This study proposes a recognition system that uses convolutional neural network (CNN) architectures to recognize characters from a license plate’s images. We called it a modified LeNet-5 architecture.\u0000Methods: We used four different CNN architectures to recognize license plate characters: AlexNet, LeNet-5, modified LeNet-5, and ResNet-50 architectures. We evaluated the performance based on their accuracy and computation time. We compared the deep learning methods with the Freeman chain code (FCC) extraction with support vector machine (SVM). We also evaluated the Otsu and the threshold binarization performances when applied in the FCC extraction method.\u0000Results: The ResNet-50 and modified LeNet-5 produces the best accuracy during the training at 0.97. The precision and recall scores of the ResNet-50 are both 0.97, while the modified LeNet-5’s values are 0.98 and 0.96, respectively. The modified LeNet-5 shows a slightly higher precision score but a lower recall score. The modified LeNet-5 shows a slightly lower accuracy during the testing than ResNet-50. Meanwhile, the Otsu binarization’s FCC extraction is better than the threshold binarization. Overall, the FCC extraction technique performs less effectively than CNN. The modified LeNet-5 computes the fastest at 7 mins and 57 secs, while ResNet-50 needs 42 mins and 11 secs.\u0000Conclusion: We discovered that CNN is better than the FCC extraction method with SVM. Both ResNet-50 and the modified LeNet-5 perform best during the training, with F measure scoring 0.97. However, ResNet-50 outperforms the modified LeNet-5 during the testing, with F-measure at 0.97 and 1.00, respectively. In addition, the FCC extraction using the Otsu binarization is better than the threshold binarization. Otsu binarization reached 0.91, higher than the static threshold binarization at 127. In addition, Otsu binarization produces a dynamic threshold value depending on the images’ light intensity.\u0000Keywords: Convolutional Neural Network, Freeman Chain Code, License Plate Character Recognition, Support Vector Machine","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"12 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91427398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Systems Engineering and Business Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1