首页 > 最新文献

Journal of Information Systems Engineering and Business Intelligence最新文献

英文 中文
Booking Prediction Models for Peer-to-peer Accommodation Listings using Logistics Regression, Decision Tree, K-Nearest Neighbor, and Random Forest Classifiers 基于logistic回归、决策树、k近邻和随机森林分类器的点对点住宿列表预订预测模型
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.123-132
M. A. Afrianto, Meditya Wasesa
Background: Literature in the peer-to-peer accommodation has put a substantial focus on accommodation listings' price determinants. Developing prediction models related to the demand for accommodation listings is vital in revenue management because accurate price and demand forecasts will help determine the best revenue management responses. Objective: This study aims to develop prediction models to determine the booking likelihood of accommodation listings. Methods: Using an Airbnb dataset, we developed four machine learning models, namely Logistics Regression, Decision Tree, K-Nearest Neighbor (KNN), and Random Forest Classifiers. We assessed the models using the AUC-ROC score and the model development time by using the ten-fold three-way split and the ten-fold cross-validation procedures. Results: In terms of average AUC-ROC score, the Random Forest Classifiers outperformed other evaluated models. In three-ways split procedure, it had a 15.03% higher AUC-ROC score than Decision Tree, 2.93 % higher than KNN, and 2.38% higher than Logistics Regression. In the cross-validation procedure, it has a 26,99% higher AUC-ROC score than Decision Tree, 4.41 % higher than KNN, and 3.31% higher than Logistics Regression.  It should be noted that the Decision Tree model has the lowest AUC-ROC score, but it has the smallest model development time. Conclusion: The performance of random forest models in predicting booking likelihood of accommodation listings is the most superior. The model can be used by peer-to-peer accommodation owners to improve their revenue management responses.
背景:点对点住宿的文献已经把大量的注意力放在了住宿列表的价格决定因素上。开发与住宿列表需求相关的预测模型对于收入管理至关重要,因为准确的价格和需求预测将有助于确定最佳的收入管理响应。目的:本研究旨在建立预测模型,以确定住宿列表的预订可能性。方法:利用Airbnb数据集,我们开发了四种机器学习模型,即物流回归、决策树、k近邻(KNN)和随机森林分类器。我们使用AUC-ROC评分对模型进行评估,使用十倍三向分裂和十倍交叉验证程序对模型开发时间进行评估。结果:在AUC-ROC平均得分方面,随机森林分类器优于其他评估模型。三分法的AUC-ROC评分比决策树法高15.03%,比KNN法高2.93%,比logistic回归法高2.38%。在交叉验证过程中,它的AUC-ROC得分比决策树高26.99%,比KNN高4.41%,比logistic回归高3.31%。值得注意的是,决策树模型具有最低的AUC-ROC分数,但它具有最小的模型开发时间。结论:随机森林模型对住宿信息预订可能性的预测效果最优。点对点住宿业主可以使用该模型来改善他们的收入管理响应。
{"title":"Booking Prediction Models for Peer-to-peer Accommodation Listings using Logistics Regression, Decision Tree, K-Nearest Neighbor, and Random Forest Classifiers","authors":"M. A. Afrianto, Meditya Wasesa","doi":"10.20473/jisebi.6.2.123-132","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.123-132","url":null,"abstract":"Background: Literature in the peer-to-peer accommodation has put a substantial focus on accommodation listings' price determinants. Developing prediction models related to the demand for accommodation listings is vital in revenue management because accurate price and demand forecasts will help determine the best revenue management responses. Objective: This study aims to develop prediction models to determine the booking likelihood of accommodation listings. Methods: Using an Airbnb dataset, we developed four machine learning models, namely Logistics Regression, Decision Tree, K-Nearest Neighbor (KNN), and Random Forest Classifiers. We assessed the models using the AUC-ROC score and the model development time by using the ten-fold three-way split and the ten-fold cross-validation procedures. Results: In terms of average AUC-ROC score, the Random Forest Classifiers outperformed other evaluated models. In three-ways split procedure, it had a 15.03% higher AUC-ROC score than Decision Tree, 2.93 % higher than KNN, and 2.38% higher than Logistics Regression. In the cross-validation procedure, it has a 26,99% higher AUC-ROC score than Decision Tree, 4.41 % higher than KNN, and 3.31% higher than Logistics Regression.  It should be noted that the Decision Tree model has the lowest AUC-ROC score, but it has the smallest model development time. Conclusion: The performance of random forest models in predicting booking likelihood of accommodation listings is the most superior. The model can be used by peer-to-peer accommodation owners to improve their revenue management responses.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"35 1","pages":"123-132"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84657303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Thesis Supervisor Recommendation with Representative Content and Information Retrieval 论文导师推荐与代表性内容及资料检索
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.143-150
M. Wijanto, Rachmi Rachmadiany, Oscar Karnalim
Background: In higher education in Indonesia, students are often required to complete a thesis under the supervision of one or more lecturers. Allocating a supervisor is not an easy task as the thesis topic should match a prospective supervisor’s field of expertise. Objective: This study aims to develop a thesis supervisor recommender system with representative content and information retrieval. The system accepts a student thesis proposal and replies with a list of potential supervisors in a descending order based on the relevancy between the prospective supervisor’s academic publications and the proposal. Methods: Unique to this, supervisor profiles are taken from previous academic publications. For scalability, the current research uses the information retrieval concept with a cosine similarity and a vector space model. Results: According to the accuracy and mean average precision (MAP), grouping supervisor candidates based on their broad expertise is effective in matching a potential supervisor with a student. Lowercasing is effective in improving the accuracy. Considering only top ten most frequent words for each lecturer’s profile is useful for the MAP. Conclusion: An arguably effective thesis supervisor recommender system with representative content and information retrieval is proposed.
背景:在印尼的高等教育中,学生通常需要在一位或多位讲师的指导下完成一篇论文。分配导师并不是一件容易的事情,因为论文主题应该与未来导师的专业领域相匹配。目的:本研究旨在开发具有代表性内容和信息检索的论文导师推荐系统。该系统接受学生的论文提案,并根据未来导师的学术出版物与提案之间的相关性,以降序排列潜在导师的列表。方法:独特的是,从以前的学术出版物中获取导师简介。在可扩展性方面,目前的研究采用了余弦相似度和向量空间模型的信息检索概念。结果:根据准确性和平均精度(MAP),根据广泛的专业知识对导师候选人进行分组,可以有效地匹配潜在的导师和学生。小写可以有效地提高精度。考虑到每个讲师的个人资料中只有前十个最常用的单词对MAP是有用的。结论:提出了一个具有代表性内容和信息检索的有效论文导师推荐系统。
{"title":"Thesis Supervisor Recommendation with Representative Content and Information Retrieval","authors":"M. Wijanto, Rachmi Rachmadiany, Oscar Karnalim","doi":"10.20473/jisebi.6.2.143-150","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.143-150","url":null,"abstract":"Background: In higher education in Indonesia, students are often required to complete a thesis under the supervision of one or more lecturers. Allocating a supervisor is not an easy task as the thesis topic should match a prospective supervisor’s field of expertise. Objective: This study aims to develop a thesis supervisor recommender system with representative content and information retrieval. The system accepts a student thesis proposal and replies with a list of potential supervisors in a descending order based on the relevancy between the prospective supervisor’s academic publications and the proposal. Methods: Unique to this, supervisor profiles are taken from previous academic publications. For scalability, the current research uses the information retrieval concept with a cosine similarity and a vector space model. Results: According to the accuracy and mean average precision (MAP), grouping supervisor candidates based on their broad expertise is effective in matching a potential supervisor with a student. Lowercasing is effective in improving the accuracy. Considering only top ten most frequent words for each lecturer’s profile is useful for the MAP. Conclusion: An arguably effective thesis supervisor recommender system with representative content and information retrieval is proposed.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"1 1","pages":"143-150"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77935515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood 动态隐写与像素邻域拉伸最小有效位
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.151-158
M. K. Harahap, N. Khairina
Background: The confidentiality of a message may at times be compromised. Steganography can hide such a message in certain media. Steganographic media such as digital images have many pixels that can accommodate secret messages. However, the length of secret messages may not match with the number of image pixels so the messages cannot be inserted into the digital images. Objective: This research aims to see the dynamics between an image size and a secret message’s length in order to prevent out of range messages entered in an image. Methods: This research will combine the Least Significant Bit (LSB) method and the Stretch technique in hiding secret messages. The LSB method uses the 8 th bit to hide secret messages. The Stretch technique dynamically enlarges the image size according to the length of the secret messages. Images will be enlarged horizontally on the rightmost image pixel block until n blocks of image pixels. Results: This study compares an original image size and a stego image size and examines a secret message’s length that can be accommodated by the stego image, as well as the Mean Square Error and Structure Similarity Index. The test is done by comparing the size change of the original image with the stego image from the Stretch results, where each original image tested always changes dynamically according to the increasing number of secret message characters. From the MSE and SSIM test results, the success was only with the first image, while the second image to the fourth image remained erroneous because they also did not have the same resolution. Conclusion: The combination of LSB steganography and the Stretch technique can enlarge an image automatically according to the number of secret messages to be inserted. For further research development, image stretch must not only be done horizontally but also vertically.
背景:消息的机密性有时可能会受到损害。隐写术可以在某些媒体中隐藏这样的信息。诸如数字图像之类的隐写媒体具有许多可以容纳秘密信息的像素。但是,秘密消息的长度可能与图像像素的数量不匹配,因此不能将消息插入数字图像中。目的:本研究旨在了解图像大小和秘密消息长度之间的动态关系,以防止在图像中输入超出范围的消息。方法:本研究将最低有效位(LSB)方法与拉伸技术相结合,实现秘密信息的隐藏。LSB方法使用第8位来隐藏秘密消息。拉伸技术根据秘密信息的长度动态放大图像大小。图像将在最右边的图像像素块上水平放大,直到n块图像像素。结果:本研究比较了原始图像大小和隐去图像大小,并检查了隐去图像可以容纳的秘密信息长度,以及均方误差和结构相似指数。该测试是通过比较原始图像与来自Stretch结果的隐去图像的大小变化来完成的,其中每个测试的原始图像总是根据秘密消息字符数量的增加而动态变化。从MSE和SSIM测试结果来看,只有第一张图像成功,而第二张图像到第四张图像仍然是错误的,因为它们也没有相同的分辨率。结论:LSB隐写技术与拉伸技术相结合,可以根据插入的密文数量自动放大图像。为了进一步的研究发展,图像拉伸不仅要在水平方向上进行,还要在垂直方向上进行。
{"title":"Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood","authors":"M. K. Harahap, N. Khairina","doi":"10.20473/jisebi.6.2.151-158","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.151-158","url":null,"abstract":"Background: The confidentiality of a message may at times be compromised. Steganography can hide such a message in certain media. Steganographic media such as digital images have many pixels that can accommodate secret messages. However, the length of secret messages may not match with the number of image pixels so the messages cannot be inserted into the digital images. Objective: This research aims to see the dynamics between an image size and a secret message’s length in order to prevent out of range messages entered in an image. Methods: This research will combine the Least Significant Bit (LSB) method and the Stretch technique in hiding secret messages. The LSB method uses the 8 th bit to hide secret messages. The Stretch technique dynamically enlarges the image size according to the length of the secret messages. Images will be enlarged horizontally on the rightmost image pixel block until n blocks of image pixels. Results: This study compares an original image size and a stego image size and examines a secret message’s length that can be accommodated by the stego image, as well as the Mean Square Error and Structure Similarity Index. The test is done by comparing the size change of the original image with the stego image from the Stretch results, where each original image tested always changes dynamically according to the increasing number of secret message characters. From the MSE and SSIM test results, the success was only with the first image, while the second image to the fourth image remained erroneous because they also did not have the same resolution. Conclusion: The combination of LSB steganography and the Stretch technique can enlarge an image automatically according to the number of secret messages to be inserted. For further research development, image stretch must not only be done horizontally but also vertically.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"10 1","pages":"151-158"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74377794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Dissemination by Using Natural Language Processing Technology 基于自然语言处理技术的智能传播
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.133-142
Tora Fahrudin, Kastaman Kastaman, Sherin Nadya Meideni, Padma Edhitya Chairunnisafa Priyono, Muhammad Galang Fathirkina, Samira Samira
Background: Recently, WhatsApp has become the world's most popular text and voice messaging application with 1.5 billion users. A lot of WhatsApp Application Programming Interface (API) has also been established to be connected to other applications. On the other hand, the development of natural language processing (NLP) for WhatsApp messages has snowballed. There are extensive studies on the dissemination information using WhatsApp but the study on NLP involving data from WhatsApp is lacking. Objective: This study aims to implement NLP in smart dissemination applications by using WhatsApp API. Methods: We build a framework that embeds an intelligent system based on the NLP in WhatsApp API to disseminate a dynamic message. Some of the sentences are used to evaluate the accuracy of this application. Results: Smart dissemination consists of dynamic filter and dynamic content. Dynamic filter was conducted by using the POS tagger and clause statement. Meanwhile, dynamic content was built by using the replace MySQL function. There are twofold limitation: the application could not transform a message that matches rule with conjunction “dan”; has the same attribute before and after tag; and the maximum of the logical operator is one type for coordinating conjunction (AND/OR) in one sentence. Conclusion: Our framework can be used for dynamic dissemination of messages using dynamic message content and dynamic message recipient with an accuracy of 95% from twenty sample messages.
背景:最近,WhatsApp已经成为世界上最受欢迎的文本和语音消息应用程序,拥有15亿用户。WhatsApp还建立了许多应用程序编程接口(API)来连接其他应用程序。另一方面,WhatsApp消息的自然语言处理(NLP)的发展已经滚雪球。关于使用WhatsApp传播信息的研究已经非常广泛,但是关于涉及WhatsApp数据的NLP研究还很缺乏。目的:利用WhatsApp API实现NLP在智能传播应用中的应用。方法:构建一个框架,在WhatsApp API中嵌入基于NLP的智能系统,实现动态消息的传播。其中一些句子用于评估此应用程序的准确性。结果:智能传播由动态过滤和动态内容组成。利用POS标注器和子句语句进行动态筛选。同时,利用replace MySQL函数构建动态内容。有两方面的限制:应用程序不能转换匹配规则和连词“dan”的消息;具有相同的属性before和after标签;逻辑运算符的最大值是一个句子中用于协调连接(and /OR)的类型。结论:我们的框架可以使用动态消息内容和动态消息接收者进行消息的动态传播,从20个样本消息中获得95%的准确率。
{"title":"Smart Dissemination by Using Natural Language Processing Technology","authors":"Tora Fahrudin, Kastaman Kastaman, Sherin Nadya Meideni, Padma Edhitya Chairunnisafa Priyono, Muhammad Galang Fathirkina, Samira Samira","doi":"10.20473/jisebi.6.2.133-142","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.133-142","url":null,"abstract":"Background: Recently, WhatsApp has become the world's most popular text and voice messaging application with 1.5 billion users. A lot of WhatsApp Application Programming Interface (API) has also been established to be connected to other applications. On the other hand, the development of natural language processing (NLP) for WhatsApp messages has snowballed. There are extensive studies on the dissemination information using WhatsApp but the study on NLP involving data from WhatsApp is lacking. Objective: This study aims to implement NLP in smart dissemination applications by using WhatsApp API. Methods: We build a framework that embeds an intelligent system based on the NLP in WhatsApp API to disseminate a dynamic message. Some of the sentences are used to evaluate the accuracy of this application. Results: Smart dissemination consists of dynamic filter and dynamic content. Dynamic filter was conducted by using the POS tagger and clause statement. Meanwhile, dynamic content was built by using the replace MySQL function. There are twofold limitation: the application could not transform a message that matches rule with conjunction “dan”; has the same attribute before and after tag; and the maximum of the logical operator is one type for coordinating conjunction (AND/OR) in one sentence. Conclusion: Our framework can be used for dynamic dissemination of messages using dynamic message content and dynamic message recipient with an accuracy of 95% from twenty sample messages.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"1 1","pages":"133-142"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89094191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Privacy Concerns Among Instagram Users: The Case of Indonesian College Students Instagram用户对信息隐私的担忧:以印尼大学生为例
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.159-168
Eko Wahyu Tyas Darmaningrat, H. M. Astuti, Fadhila Alfi
Background : Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia. Objective : This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia. Methods : This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM). Results : The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has. Conclusion : The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.
背景:印度尼西亚的青少年天性开放,通过在Instagram上上传照片或视频和发帖来满足他们的生存欲望。上传包含个人信息的照片、视频或文章的习惯可能是危险的,并可能导致用户隐私问题。印度尼西亚发生了几起信息滥用引起的刑事案件。目的:本文调查印度尼西亚Instagram用户的信息隐私问题,特别是印度尼西亚最大的Instagram用户群体——大学生。方法:本研究参照互联网用户信息隐私关注(IUIPC)方法,通过发放在线问卷收集数据,并运用结构方程模型(SEM)对数据进行分析。结果:研究发现,即使学生意识到Instagram中信息滥用的潜在危险,但这并不影响他们使用Instagram的意图。影响印尼大学生信任度的其他因素包括Instagram的声誉、使用Instagram的用户数量、使用Instagram的易用性、印尼学生对Instagram的技能和知识、以及Instagram的隐私设置。结论:印尼大学生对信息隐私的意识和关注会显著影响信息隐私风险意识的提高。然而,风险意识的提高并没有直接影响印尼大学生在Instagram上发布私人信息的行为。
{"title":"Information Privacy Concerns Among Instagram Users: The Case of Indonesian College Students","authors":"Eko Wahyu Tyas Darmaningrat, H. M. Astuti, Fadhila Alfi","doi":"10.20473/jisebi.6.2.159-168","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.159-168","url":null,"abstract":"Background : Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia. Objective : This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia. Methods : This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM). Results : The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has. Conclusion : The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"7 1","pages":"159-168"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75417518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Moving Object Detection Using Ultrasonic Radar with Proper Distance, Direction, and Object Shape Analysis 运动目标检测用超声雷达与适当的距离,方向,和目标形状分析
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.99-111
A. Biswas, Sabrina Abedin, Md. Ahasan Kabir
Background: In its early development, radar (radio detection and ranging) was primarily used by the navy, the military, and the aviation services, as well as space organizations for security and monitoring purposes. Nowadays, the demand of radar is expanding. Research has been conducted to overcome the limitations of radar.Objective: One of the current limitations to detect moving object. The current paper aims to fill the gap in the literature by using a radar system in the identification of moving object, capturing the distance, direction, radar pulse duration and object shape simultaneously. Velocity or the object’s speed towards or away from the radar was determined by using an algorithm to obtain the precision.Methods: The accuracy of distance measurement and angle is ensured by comparing the real values and the values obtained by the radar. The objects under study consist of metal and non-metal. Novelty of this work is the accurate detection of moving objects with suitable algorithms using only one Arduino UNO and one ultrasonic sensor.Results: The experiment design yielded much better efficiency than previous works. The proposed method predicted the exact speed of the object detected by the radar system. The experiment has successfully proven the accuracy of moving object sensor.Conclusion: Besides proper distance and velocity, a large set of data was taken to find the accuracy of the radar for objects of different shapes. For a cylindrical object, the radar provided 100% efficiency in a constant environment when the object was 5 cm away. The accuracy decreased to 30% when the distance was 17 cm away. The limitation of this system is that it was unable to detect small object or if the object was very close (1 cm).
背景:在其早期发展中,雷达(无线电探测和测距)主要用于海军、军队和航空服务,以及用于安全和监测目的的空间组织。如今,雷达的需求在不断扩大。为了克服雷达的局限性,已经进行了研究。目的:研究当前移动物体检测的局限性之一。本文旨在填补文献空白,利用雷达系统对运动物体进行识别,同时捕捉距离、方向、雷达脉冲持续时间和物体形状。速度或物体接近或远离雷达的速度通过使用算法来确定,以获得精度。方法:通过实际测量值与雷达测量值的比较,确保距离测量和角度测量的准确性。所研究的对象包括金属和非金属。这项工作的新颖之处在于,仅使用一个Arduino UNO和一个超声波传感器,就可以使用合适的算法准确检测运动物体。结果:实验设计的效率明显高于以往的设计。该方法预测了雷达系统探测到的目标的准确速度。实验成功地验证了运动目标传感器的精度。结论:除了适当的距离和速度外,还需要大量的数据来寻找雷达对不同形状物体的精度。对于圆柱形物体,当物体距离5厘米时,雷达在恒定环境中提供100%的效率。当距离为17 cm时,精度降至30%。该系统的局限性是它无法检测到小物体或物体非常近(1厘米)。
{"title":"Moving Object Detection Using Ultrasonic Radar with Proper Distance, Direction, and Object Shape Analysis","authors":"A. Biswas, Sabrina Abedin, Md. Ahasan Kabir","doi":"10.20473/jisebi.6.2.99-111","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.99-111","url":null,"abstract":"Background: In its early development, radar (radio detection and ranging) was primarily used by the navy, the military, and the aviation services, as well as space organizations for security and monitoring purposes. Nowadays, the demand of radar is expanding. Research has been conducted to overcome the limitations of radar.Objective: One of the current limitations to detect moving object. The current paper aims to fill the gap in the literature by using a radar system in the identification of moving object, capturing the distance, direction, radar pulse duration and object shape simultaneously. Velocity or the object’s speed towards or away from the radar was determined by using an algorithm to obtain the precision.Methods: The accuracy of distance measurement and angle is ensured by comparing the real values and the values obtained by the radar. The objects under study consist of metal and non-metal. Novelty of this work is the accurate detection of moving objects with suitable algorithms using only one Arduino UNO and one ultrasonic sensor.Results: The experiment design yielded much better efficiency than previous works. The proposed method predicted the exact speed of the object detected by the radar system. The experiment has successfully proven the accuracy of moving object sensor.Conclusion: Besides proper distance and velocity, a large set of data was taken to find the accuracy of the radar for objects of different shapes. For a cylindrical object, the radar provided 100% efficiency in a constant environment when the object was 5 cm away. The accuracy decreased to 30% when the distance was 17 cm away. The limitation of this system is that it was unable to detect small object or if the object was very close (1 cm).","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80682097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tweets Responding to the Indonesian Government’s Handling of COVID-19: Sentiment Analysis Using SVM with Normalized Poly Kernel 响应印尼政府处理COVID-19的推文:使用归一化多核支持向量机的情绪分析
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.112-122
Pulung Hendro Prastyo, Amin Siddiq Sumi, A. Dian, A. E. Permanasari
Background: Handling COVID-19 (Corona Virus Disease-2019) in Indonesia was once trending on Twitter. The Indonesian government's handling evoked pros and cons in the community. Public opinions on Twitter can be used as a decision support system in making appropriate policies to evaluate government performance. A sentiment analysis method can be used to analyse public opinion on Twitter.Objective: This study aims to understand public opinion trends on COVID-19 in Indonesia both from a general perspective and an economic perspective.Methods: We used tweets from Twitterscraper library. Because they did not have a label, we provided labels using sentistrength_id and experts to be classified into positive, negative, and neutral sentiments. Then, we carried out a pre-processing to eliminate duplicate and irrelevant data. Next, we employed machine learning to predict the sentiments for new data. After that, the machine learning algorithms were evaluated using confusion matrix and K-fold cross-validation.Results: The SVM analysis on the sentiments on general aspects using two-classes dataset achieved the highest performance in average accuracy, precision, recall, and f-measure with the value of 82.00%, 82.24%, 82.01%, and 81.84%, respectively.Conclusion: From the economic perspective, people seemed to agree with the government’s policies in dealing with COVID-19; but people were not satisfied with the government performance in general. The SVM algorithm with the Normalized Poly Kernel can be used as an intelligent algorithm to predict sentiment on Twitter for new data quickly and accurately. 
背景:在印度尼西亚处理COVID-19(2019冠状病毒病)一度是推特上的热门话题。印尼政府的处理引起了社会上的褒贬不一。Twitter上的民意可以作为一个决策支持系统,用于制定适当的政策来评估政府绩效。情感分析方法可以用来分析Twitter上的民意。目的:本研究旨在从总体角度和经济角度了解印尼关于COVID-19的民意趋势。方法:我们使用来自Twitterscraper库的tweets。因为他们没有标签,所以我们使用sentistrength_id和专家提供标签,将他们分为积极、消极和中性情绪。然后,对重复数据和不相关数据进行预处理。接下来,我们使用机器学习来预测新数据的情绪。之后,使用混淆矩阵和K-fold交叉验证对机器学习算法进行评估。结果:使用两类数据集的支持向量机对一般方面情感进行分析,在平均正确率、精密度、召回率和f-measure上分别达到82.00%、82.24%、82.01%和81.84%。结论:从经济角度来看,国民对政府应对新冠疫情的政策似乎是赞同的;但人们对政府的总体表现并不满意。基于归一化聚核的支持向量机算法可以作为一种智能算法,快速准确地预测Twitter上新数据的情绪。
{"title":"Tweets Responding to the Indonesian Government’s Handling of COVID-19: Sentiment Analysis Using SVM with Normalized Poly Kernel","authors":"Pulung Hendro Prastyo, Amin Siddiq Sumi, A. Dian, A. E. Permanasari","doi":"10.20473/jisebi.6.2.112-122","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.112-122","url":null,"abstract":"Background: Handling COVID-19 (Corona Virus Disease-2019) in Indonesia was once trending on Twitter. The Indonesian government's handling evoked pros and cons in the community. Public opinions on Twitter can be used as a decision support system in making appropriate policies to evaluate government performance. A sentiment analysis method can be used to analyse public opinion on Twitter.Objective: This study aims to understand public opinion trends on COVID-19 in Indonesia both from a general perspective and an economic perspective.Methods: We used tweets from Twitterscraper library. Because they did not have a label, we provided labels using sentistrength_id and experts to be classified into positive, negative, and neutral sentiments. Then, we carried out a pre-processing to eliminate duplicate and irrelevant data. Next, we employed machine learning to predict the sentiments for new data. After that, the machine learning algorithms were evaluated using confusion matrix and K-fold cross-validation.Results: The SVM analysis on the sentiments on general aspects using two-classes dataset achieved the highest performance in average accuracy, precision, recall, and f-measure with the value of 82.00%, 82.24%, 82.01%, and 81.84%, respectively.Conclusion: From the economic perspective, people seemed to agree with the government’s policies in dealing with COVID-19; but people were not satisfied with the government performance in general. The SVM algorithm with the Normalized Poly Kernel can be used as an intelligent algorithm to predict sentiment on Twitter for new data quickly and accurately. ","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"125 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86014509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Trends and Patterns of The Internet Use During School Holidays 学校假期互联网使用的趋势和模式
Pub Date : 2020-10-27 DOI: 10.20473/jisebi.6.2.89-98
Khalid Khalid, I. S. Rozas, Dwi Rolliawati
Background: The Internet use according to Indonesian Internet Services Provider Association (APJII) can be an indicator for parents and educators to monitor students’ mental development and learning behaviors.Objective: This study aims to analyze trends and patterns of the Internet use among students during the school holidays.Methods: This study uses data from XYZ operator, one of the most affordable mobile service providers in Indonesia in 2019. The data was analyzed by using Online Analytical Processing (OLAP).Result: The results shows that the use of 3G and 4G data increased significantly during the school holidays, compared to school days. The highest increase of the Internet traffic is during the semester break, occurred at the rate of 22 to 24 hours a day, with the peak reaching 20.87% at 10:00.Conclusion: The research findings can inform relevant parties, both parents and school teachers in guiding their children to use the Internet.
背景:印度尼西亚互联网服务提供商协会(APJII)的互联网使用情况可以作为家长和教育工作者监测学生心理发展和学习行为的指标。目的:本研究旨在分析学生在学校假期使用互联网的趋势和模式。方法:本研究使用了XYZ运营商的数据,该运营商是2019年印度尼西亚最实惠的移动服务提供商之一。采用联机分析处理(OLAP)对数据进行分析。结果:结果显示,与在校期间相比,学校假期期间3G和4G数据的使用量显著增加。互联网流量增长最快的是在学期放假期间,以每天22 - 24小时的速度增长,10点时达到20.87%的峰值。结论:研究结果可以为相关方,包括家长和学校教师指导孩子使用互联网提供参考。
{"title":"Trends and Patterns of The Internet Use During School Holidays","authors":"Khalid Khalid, I. S. Rozas, Dwi Rolliawati","doi":"10.20473/jisebi.6.2.89-98","DOIUrl":"https://doi.org/10.20473/jisebi.6.2.89-98","url":null,"abstract":"Background: The Internet use according to Indonesian Internet Services Provider Association (APJII) can be an indicator for parents and educators to monitor students’ mental development and learning behaviors.Objective: This study aims to analyze trends and patterns of the Internet use among students during the school holidays.Methods: This study uses data from XYZ operator, one of the most affordable mobile service providers in Indonesia in 2019. The data was analyzed by using Online Analytical Processing (OLAP).Result: The results shows that the use of 3G and 4G data increased significantly during the school holidays, compared to school days. The highest increase of the Internet traffic is during the semester break, occurred at the rate of 22 to 24 hours a day, with the peak reaching 20.87% at 10:00.Conclusion: The research findings can inform relevant parties, both parents and school teachers in guiding their children to use the Internet.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81099000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foot 3D Reconstruction and Measurement using Depth Data 使用深度数据的足部三维重建和测量
Pub Date : 2020-04-27 DOI: 10.20473/jisebi.6.1.37-45
Doni S. Pambudi, L. Hidayah
Background: The need for shoes with non-standard sizes is increasing, but this is not followed by the competence to measure the foot effectively. The high cost of such an instrument in the market has led to the development of a precise yet affordable measurement system. Objective: This research attempts to solve the measuring problem by employing an automatic instrument utilizing a depth image sensor that is available on the market at an affordable price. Methods: Data from several Realsense sensors that have been preprocessed are combined using transformation techniques and noise cleaning is performed afterward. Finally the 3D model of the foot is ready and hence the length and width can be obtained. Results: The experimental results show that the proposed method produces a measurement error of 0.351 cm in foot length, and 0.355 cm in foot width. Conclusion: The result shows that multiple angles of a static Realsense sensor can produce a good 3D foot model automatically. This proposed system configuration can reduce complexity as well as being an affordable solution.
背景:对非标准尺码鞋的需求正在增加,但这并没有伴随着有效测量足部的能力。这种仪器在市场上的高成本导致了一种精确但负担得起的测量系统的发展。目的:本研究试图通过采用市场上价格合理的深度图像传感器的自动仪器来解决测量问题。方法:利用变换技术对多个Realsense传感器的预处理数据进行组合,然后进行噪声清除。最后制作出足部的三维模型,从而得到足部的长度和宽度。结果:实验结果表明,该方法的测量误差为脚长0.351 cm,脚宽0.355 cm。结论:静态Realsense传感器的多个角度可以自动生成良好的三维足部模型。这种建议的系统配置可以降低复杂性,并且是一种负担得起的解决方案。
{"title":"Foot 3D Reconstruction and Measurement using Depth Data","authors":"Doni S. Pambudi, L. Hidayah","doi":"10.20473/jisebi.6.1.37-45","DOIUrl":"https://doi.org/10.20473/jisebi.6.1.37-45","url":null,"abstract":"Background: The need for shoes with non-standard sizes is increasing, but this is not followed by the competence to measure the foot effectively. The high cost of such an instrument in the market has led to the development of a precise yet affordable measurement system. Objective: This research attempts to solve the measuring problem by employing an automatic instrument utilizing a depth image sensor that is available on the market at an affordable price. Methods: Data from several Realsense sensors that have been preprocessed are combined using transformation techniques and noise cleaning is performed afterward. Finally the 3D model of the foot is ready and hence the length and width can be obtained. Results: The experimental results show that the proposed method produces a measurement error of 0.351 cm in foot length, and 0.355 cm in foot width. Conclusion: The result shows that multiple angles of a static Realsense sensor can produce a good 3D foot model automatically. This proposed system configuration can reduce complexity as well as being an affordable solution.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"28 1","pages":"37-45"},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73526041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Students Activity Recognition by Heart Rate Monitoring in Classroom using K-Means Classification 基于k -均值分类的课堂心率监测中学生活动识别
Pub Date : 2020-04-27 DOI: 10.20473/jisebi.6.1.46-54
Hadi Helmi Md Zuraini, W. Ismail, R. Hendradi, Army Justitia
Background : Heartbeat playing the main roles in our life. With the heartbeat, the anxiety level can be known. Most of the heartbeat is used in the exercise. Heart rate measurement is unique and uncontrollable by any human being. Objective: This research aims to learn student’s actions by monitoring the heart rate. In this paper, we are measuring the student reaction and action in classroom can give impact on teacher’s way of delivery when in the teaching session. In monitoring, student’s behavior may give feedback whether the teaching session have positive or negative outcome. Methods: The method we use is K-Means algorithm. Firstly, we need to know the student’s normal heartbeat as benchmark. We used Hexiware for collecting data from students’ hear beat. We perform the classification where K is benchmark students’ heartbeat. K-Means algorithm performs classification of the heart rate measurement of students. Results: We did the testing for five students in different subjects. It shows that all students have anxiety during the testing and presentation. Its consistency because we tested 5 students with mixes activities in the classroom, where the student has quiz, presentation and only teaching. Conclusion: Heart rate during studying in the classroom can change the education world in improving the efficiency of knowledge transfer between student and teacher. This research may act as basic way in monitoring student behavior in the classroom. We have tested for 5 students. Three students have their anxiety in classroom during the exam, presentation, and question. Two students have normal rate during the seminar and lecturer. The drawback, Hexiware is capturing average of ten minutes and tested in different classes and students. In future, we need just measure one student for all the subjects and Hexiware need to configure in one minute.
背景:心跳在我们的生活中扮演着重要的角色。通过心跳,可以知道焦虑程度。大部分心跳都用在了运动中。心率测量是独一无二的,任何人都无法控制。目的:本研究旨在通过监测学生的心率来了解学生的行为。在本文中,我们测量了学生在课堂上的反应和行动在教学过程中对教师的教学方式的影响。在监控中,学生的行为可以给予反馈,无论教学过程的结果是积极的还是消极的。方法:采用K-Means算法。首先,我们需要知道学生的正常心跳作为基准。我们使用Hexiware收集学生的心跳数据。我们进行分类,其中K是基准学生的心跳。K-Means算法对学生的心率测量值进行分类。结果:我们对五名不同学科的学生进行了测试。这表明所有的学生在测试和演示过程中都有焦虑。它的一致性是因为我们测试了5名学生,在课堂上进行混合活动,学生有测验,演讲和教学。结论:课堂学习时的心率可以改变教育界,提高师生之间知识传递的效率。本研究可作为监控学生课堂行为的基本方法。我们测试了5个学生。三名学生在课堂上的焦虑表现在考试、陈述和提问。两名学生在研讨会和讲师的演讲中表现正常。缺点是,Hexiware平均占用10分钟的时间,并在不同的班级和学生中进行测试。未来,我们只需要测量一个学生的所有科目和Hexiware需要在一分钟内配置。
{"title":"Students Activity Recognition by Heart Rate Monitoring in Classroom using K-Means Classification","authors":"Hadi Helmi Md Zuraini, W. Ismail, R. Hendradi, Army Justitia","doi":"10.20473/jisebi.6.1.46-54","DOIUrl":"https://doi.org/10.20473/jisebi.6.1.46-54","url":null,"abstract":"Background : Heartbeat playing the main roles in our life. With the heartbeat, the anxiety level can be known. Most of the heartbeat is used in the exercise. Heart rate measurement is unique and uncontrollable by any human being. Objective: This research aims to learn student’s actions by monitoring the heart rate. In this paper, we are measuring the student reaction and action in classroom can give impact on teacher’s way of delivery when in the teaching session. In monitoring, student’s behavior may give feedback whether the teaching session have positive or negative outcome. Methods: The method we use is K-Means algorithm. Firstly, we need to know the student’s normal heartbeat as benchmark. We used Hexiware for collecting data from students’ hear beat. We perform the classification where K is benchmark students’ heartbeat. K-Means algorithm performs classification of the heart rate measurement of students. Results: We did the testing for five students in different subjects. It shows that all students have anxiety during the testing and presentation. Its consistency because we tested 5 students with mixes activities in the classroom, where the student has quiz, presentation and only teaching. Conclusion: Heart rate during studying in the classroom can change the education world in improving the efficiency of knowledge transfer between student and teacher. This research may act as basic way in monitoring student behavior in the classroom. We have tested for 5 students. Three students have their anxiety in classroom during the exam, presentation, and question. Two students have normal rate during the seminar and lecturer. The drawback, Hexiware is capturing average of ten minutes and tested in different classes and students. In future, we need just measure one student for all the subjects and Hexiware need to configure in one minute.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"44 1","pages":"46-54"},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75668542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Information Systems Engineering and Business Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1