首页 > 最新文献

SLU Journal of Science and Technology最新文献

英文 中文
Hybridization of OFDMand Physical Layer Techniques for Information Security in Wireless System 无线系统信息安全中的ofdemand物理层混合技术
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.301
Olawoyin, Abdul-Rahman Musrafah, N. Faruk, A. OloyedeA., C. .AdeniranT., .. Imam-Fulani, Bashir Abdullahi Baba
Due to quest for high data rate, reliable and secure communication, this has motivated both wired and wireless network access service providers to deploy a next-generation network with ability to meet the required need. The use orthogonal frequency division multiplexing(OFDM) enables reliable transmission of various data traffic by optimizing subcarrier, power, and allocation of bits among different users. Traditionally, securing data in wireless system is always at the upper layer of open system interconnection(OSI) Model by using data encryption techniques. However, such techniques may not be acceptable for future decentralized networks due to their high complexity in implementation and computation. In this work, an OFDM IEEE 802.11a wireless system is used and physical layer encryption (PLE) schemes are implemented in securing the information transfer between two legitimate parties. In the simulation, the source data are encrypted by obfuscation with dummy data in between the encrypted data of which 52 subcarriers were considered of which 25 subcarriers are reserved for dummy data and 27 were for data. The simulation was conducted for four different modulation techniques i.e., BPSK, QPSK, 16 QAM, and 64 QAM. The result obtained shown that for all the modulation schemes, the key rate increases with an increase in the reserved subcarrier bits. Also ,the security level increased when substantial percentages of the subcarriers are reserved for dummy data
由于对高数据速率、可靠和安全通信的追求,这促使有线和无线网络接入服务提供商部署能够满足需求的下一代网络。正交频分复用(OFDM)通过优化子载波、功率和不同用户之间的比特分配,实现各种数据流量的可靠传输。传统上,无线系统中的数据安全通常是在开放系统互连(OSI)模型的上层使用数据加密技术来实现的。然而,由于实现和计算的高度复杂性,这种技术可能不适合未来的去中心化网络。在这项工作中,使用了OFDM IEEE 802.11a无线系统,并实施了物理层加密(PLE)方案来保护合法双方之间的信息传输。在仿真中,对源数据进行加密,在加密数据之间使用虚拟数据进行混淆,考虑52个子载波,其中25个子载波为虚拟数据保留,27个子载波为数据保留。模拟了四种不同的调制技术,即BPSK、QPSK、16 QAM和64 QAM。结果表明,对于所有调制方案,密钥速率随保留子载波位的增加而增加。此外,当相当比例的子载波被保留用于虚拟数据时,安全级别也会提高
{"title":"Hybridization of OFDMand Physical Layer Techniques for Information Security in Wireless System","authors":"Olawoyin, Abdul-Rahman Musrafah, N. Faruk, A. OloyedeA., C. .AdeniranT., .. Imam-Fulani, Bashir Abdullahi Baba","doi":"10.56471/slujst.v6i.301","DOIUrl":"https://doi.org/10.56471/slujst.v6i.301","url":null,"abstract":"Due to quest for high data rate, reliable and secure communication, this has motivated both wired and wireless network access service providers to deploy a next-generation network with ability to meet the required need. The use orthogonal frequency division multiplexing(OFDM) enables reliable transmission of various data traffic by optimizing subcarrier, power, and allocation of bits among different users. Traditionally, securing data in wireless system is always at the upper layer of open system interconnection(OSI) Model by using data encryption techniques. However, such techniques may not be acceptable for future decentralized networks due to their high complexity in implementation and computation. In this work, an OFDM IEEE 802.11a wireless system is used and physical layer encryption (PLE) schemes are implemented in securing the information transfer between two legitimate parties. In the simulation, the source data are encrypted by obfuscation with dummy data in between the encrypted data of which 52 subcarriers were considered of which 25 subcarriers are reserved for dummy data and 27 were for data. The simulation was conducted for four different modulation techniques i.e., BPSK, QPSK, 16 QAM, and 64 QAM. The result obtained shown that for all the modulation schemes, the key rate increases with an increase in the reserved subcarrier bits. Also ,the security level increased when substantial percentages of the subcarriers are reserved for dummy data","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study of Modern Operating Systems in terms of Memory and Security: A Case Study of Windows, iOS, and Android 现代操作系统在内存和安全性方面的比较研究:以Windows、iOS和Android为例
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.353
Abdullahi Umar Umar
Modern computer systems have an operating system, which serves as an interface between the device and the user and has the dual objectives of making the device easier to operate and making optimal use of device resources. The operating system offers some level of computer security like user authentication, file permission, firewall, encryption etc., but occasionally, problems develop due to societal or technical challenges like: vulnerable to malicious programs and viruses, which can cause the system to become sluggish or malicious actors be able to have an access to confidential user data, which compromise computer security. This comparative study provides insight into each of these operating systems and their relative strengths and weaknesses. The paper begins by discussing the concepts of memory management and security in general and then examines the specifics of each OS's memory management and security features. A case study of three popular applications is presented to illustrate how memory management and security features can be used in practice. The results of the comparison show that while each operating system has its own advantages and disadvantages, Windows is generally the most powerful and secure of the three, while iOS and Android offer more flexibility and ease of use.
现代计算机系统有一个操作系统,它作为设备和用户之间的接口,具有使设备更易于操作和最佳利用设备资源的双重目标。操作系统提供了一定程度的计算机安全,如用户身份验证,文件权限,防火墙,加密等,但偶尔,由于社会或技术挑战而出现问题,例如:容易受到恶意程序和病毒的攻击,这可能导致系统变得迟缓或恶意行为者能够访问机密用户数据,从而危及计算机安全。这个比较研究提供了对这些操作系统及其相对优势和劣势的深入了解。本文首先讨论内存管理和安全的一般概念,然后检查每个操作系统的内存管理和安全特性的细节。本文介绍了三个流行应用程序的案例研究,以说明如何在实践中使用内存管理和安全特性。对比的结果显示,虽然每个操作系统都有自己的优点和缺点,但Windows通常是三种操作系统中功能最强大、最安全的,而iOS和Android提供了更多的灵活性和易用性。
{"title":"A Comparative Study of Modern Operating Systems in terms of Memory and Security: A Case Study of Windows, iOS, and Android","authors":"Abdullahi Umar Umar","doi":"10.56471/slujst.v6i.353","DOIUrl":"https://doi.org/10.56471/slujst.v6i.353","url":null,"abstract":"Modern computer systems have an operating system, which serves as an interface between the device and the user and has the dual objectives of making the device easier to operate and making optimal use of device resources. The operating system offers some level of computer security like user authentication, file permission, firewall, encryption etc., but occasionally, problems develop due to societal or technical challenges like: vulnerable to malicious programs and viruses, which can cause the system to become sluggish or malicious actors be able to have an access to confidential user data, which compromise computer security. This comparative study provides insight into each of these operating systems and their relative strengths and weaknesses. The paper begins by discussing the concepts of memory management and security in general and then examines the specifics of each OS's memory management and security features. A case study of three popular applications is presented to illustrate how memory management and security features can be used in practice. The results of the comparison show that while each operating system has its own advantages and disadvantages, Windows is generally the most powerful and secure of the three, while iOS and Android offer more flexibility and ease of use.","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Improved Particle Swarm Optimization for Feature Selection: A Survey 面向特征选择的改进粒子群优化研究进展
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.354
Isuwa Jeremiah
Over the years, scientists have used natural discoveries such as evolution to solve real-world problems. Addressing the challenges that arise when dealing with high-dimensional data is one such problem. These challenges include difficulties in analyzing, visualizing, and modelling these high-dimensional data. As a result, the Swarm Intelligence (SI) techniquewas developed, which was inspired by natural swarm foraging behaviors. Particle swarm optimization (PSO) is a well-known SI algorithm for addressing a wide range of optimization problems. As a result, it has been used to solve a variety of optimization problems in fields as diverse as genomic analysis and intrusion detection systems. One of the most successful areas of PSO application is feature selection, which entails using computational techniques to select a reduced subset of features that have a sufficient relationship with their corresponding class labels. This, in turn, addresses the mentioned challenges. Nonetheless, progressive research has revealed several problems with PSO, including problems with diversity, and premature convergence among others. As a result, several improvements and extensions were made to various aspects of the algorithm since its inception to make it efficient. This paper organizes and summarizes current research on improvements to the PSO algorithm for solving the feature selection problem. Consequently, it presents current trends and directions for scholars in the field, as well as open challenges and literature gaps to investigate
多年来,科学家们利用自然发现,如进化论,来解决现实世界的问题。解决处理高维数据时出现的挑战就是这样一个问题。这些挑战包括分析、可视化和建模这些高维数据的困难。因此,受自然群体觅食行为的启发,发展了群体智能(SI)技术。粒子群优化算法(PSO)是一种解决广泛的优化问题的著名的SI算法。因此,它已被用于解决各种领域的优化问题,如基因组分析和入侵检测系统。PSO应用中最成功的领域之一是特征选择,它需要使用计算技术来选择与相应类标签有充分关系的特征的简化子集。这反过来又解决了上述挑战。尽管如此,进步的研究已经揭示了PSO的几个问题,包括多样性问题和过早收敛等。因此,自算法开始以来,对算法的各个方面进行了一些改进和扩展,以使其高效。本文对粒子群算法在解决特征选择问题上的改进研究进行了梳理和总结。因此,它为该领域的学者提供了当前的趋势和方向,以及开放的挑战和文献空白进行调查
{"title":"Towards an Improved Particle Swarm Optimization for Feature Selection: A Survey","authors":"Isuwa Jeremiah","doi":"10.56471/slujst.v6i.354","DOIUrl":"https://doi.org/10.56471/slujst.v6i.354","url":null,"abstract":"Over the years, scientists have used natural discoveries such as evolution to solve real-world problems. Addressing the challenges that arise when dealing with high-dimensional data is one such problem. These challenges include difficulties in analyzing, visualizing, and modelling these high-dimensional data. As a result, the Swarm Intelligence (SI) techniquewas developed, which was inspired by natural swarm foraging behaviors. Particle swarm optimization (PSO) is a well-known SI algorithm for addressing a wide range of optimization problems. As a result, it has been used to solve a variety of optimization problems in fields as diverse as genomic analysis and intrusion detection systems. One of the most successful areas of PSO application is feature selection, which entails using computational techniques to select a reduced subset of features that have a sufficient relationship with their corresponding class labels. This, in turn, addresses the mentioned challenges. Nonetheless, progressive research has revealed several problems with PSO, including problems with diversity, and premature convergence among others. As a result, several improvements and extensions were made to various aspects of the algorithm since its inception to make it efficient. This paper organizes and summarizes current research on improvements to the PSO algorithm for solving the feature selection problem. Consequently, it presents current trends and directions for scholars in the field, as well as open challenges and literature gaps to investigate","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125990480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Schemes for Extending the Network Lifetime of Wireless Rechargeable Sensor Networks 延长无线可充电传感器网络寿命的方案
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.373
S. A. Mikail
Most Wireless Rechargeable Sensor Networks (WRSN) allow simultaneous energy replenishment with data gathering. These schemes suffer from high energy consumption of mobile chargers and could require new sensor design for their integration. Thus, we propose Distributed Energy Replenishment and Data Gathering (DERDG) to reduce the energy consumption of the chargers and Spatio-Temporal Non-Concurrent Data gathering and Energy replenishment (ST-NCDR) that are easily be integrable on the sensor nodes. In these schemes, sensor nodes are divided into clusters and requests from energy-hungry nodes are arranged based on their temporal properties in DERDG, but using their spatial and temporal properties in ST-NCDR. In ST-NCDR scheme, two mobile chargers replenish the energy of energy-hungry nodes when they are not performing sensing and transmission of data, but irrespective of their operational states in DERDG scheme. Simulation results indicate the superiority of the schemes over state-of-the-art schemes in terms of energy consumption of mobile chargers and average residual energy of the nodes. Both DERDG and ST-NCDR reduced the energy consumption of the chargers, without reduction in the network lifetime, by an average of 29.45% and 73.70%, respectively, when compared to the work of Han et al. (2018), and by 71.40% and 93.80% in comparison to the work of Mikail et al. (2020). DERDG reduces data delivery delay by 95.50% in comparison to the work of Han et. al, (2018). The findings imply that ST-NCDR can be easily integrated into sensor nodes and yields a reduction in the energy of mobiles chargers use in charging the sensor nodes that translate to lower cost of network operation, in addition to improving the residual energy of nodes in WRSN. This part should state the context of the research being reported. Aim: the objective of the research should be clearly stated here Method: the research approach used in the study, justifying its suitability for the study should be stated here. Results: the findings and their implication(s) should be clearly enumerated and briefly discussed here
大多数无线充电传感器网络(WRSN)允许在收集数据的同时补充能量。这些方案受到移动充电器高能耗的影响,可能需要新的传感器设计来集成它们。因此,我们提出了分布式能量补充和数据收集(DERDG)来减少充电器的能量消耗,以及易于在传感器节点上集成的时空非并发数据收集和能量补充(ST-NCDR)。在这些方案中,传感器节点被划分成集群,来自耗能节点的请求在DERDG中根据它们的时间属性进行排列,而在ST-NCDR中则使用它们的空间和时间属性。在ST-NCDR方案中,两个移动充电器在耗能节点不进行传感和数据传输时为其补充能量,而在DERDG方案中,无论其运行状态如何。仿真结果表明,该方案在移动充电器能耗和节点平均剩余能量方面优于现有方案。与Han等人(2018)的研究相比,DERDG和ST-NCDR在不减少网络寿命的情况下,分别平均降低了29.45%和73.70%的充电器能耗,与Mikail等人(2020)的研究相比,分别降低了71.40%和93.80%。与Han等人(2018)的工作相比,DERDG将数据传递延迟减少了95.50%。研究结果表明,ST-NCDR可以很容易地集成到传感器节点中,并且除了提高WRSN节点的剩余能量外,还可以减少用于给传感器节点充电的移动充电器的能量,从而降低网络运行成本。这部分应该说明所报道的研究的背景。目的:研究的目的应该在这里明确说明方法:研究中使用的研究方法,证明其适合研究的理由应该在这里说明。结果:研究结果及其意义应在此明确列举并简要讨论
{"title":"Schemes for Extending the Network Lifetime of Wireless Rechargeable Sensor Networks","authors":"S. A. Mikail","doi":"10.56471/slujst.v6i.373","DOIUrl":"https://doi.org/10.56471/slujst.v6i.373","url":null,"abstract":"Most Wireless Rechargeable Sensor Networks (WRSN) allow simultaneous energy replenishment with data gathering. These schemes suffer from high energy consumption of mobile chargers and could require new sensor design for their integration. Thus, we propose Distributed Energy Replenishment and Data Gathering (DERDG) to reduce the energy consumption of the chargers and Spatio-Temporal Non-Concurrent Data gathering and Energy replenishment (ST-NCDR) that are easily be integrable on the sensor nodes. In these schemes, sensor nodes are divided into clusters and requests from energy-hungry nodes are arranged based on their temporal properties in DERDG, but using their spatial and temporal properties in ST-NCDR. In ST-NCDR scheme, two mobile chargers replenish the energy of energy-hungry nodes when they are not performing sensing and transmission of data, but irrespective of their operational states in DERDG scheme. Simulation results indicate the superiority of the schemes over state-of-the-art schemes in terms of energy consumption of mobile chargers and average residual energy of the nodes. Both DERDG and ST-NCDR reduced the energy consumption of the chargers, without reduction in the network lifetime, by an average of 29.45% and 73.70%, respectively, when compared to the work of Han et al. (2018), and by 71.40% and 93.80% in comparison to the work of Mikail et al. (2020). DERDG reduces data delivery delay by 95.50% in comparison to the work of Han et. al, (2018). The findings imply that ST-NCDR can be easily integrated into sensor nodes and yields a reduction in the energy of mobiles chargers use in charging the sensor nodes that translate to lower cost of network operation, in addition to improving the residual energy of nodes in WRSN. This part should state the context of the research being reported. Aim: the objective of the research should be clearly stated here Method: the research approach used in the study, justifying its suitability for the study should be stated here. Results: the findings and their implication(s) should be clearly enumerated and briefly discussed here","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Expert System for Bank Loan Approval 银行贷款审批模糊专家系统
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.349
A. Ismail
Background: Bank loan approval is one of the important pillars of the banking system; it is the process of approving or denying a loan to companies or individual customers by the bank. The approval process has a lot of parameters to be taken into consideration, which is ambiguous in nature; hence, bank loan approval required special knowledge to be executed. Aim: Due to the ambiguity of the approval process, we proposed the use of a fuzzy expert system which proved to handle such ambiguous problems to help banks easily and accurately make decisions on bank credit approval. This proposed fuzzy expert system will help banks in making accurate decisions easily even in the absence of the domain expert on credit approval based on the knowledge of an expert in the field. Method: The proposed fuzzy expert system was developed using a fuzzy tool in MATLAB software and it has two stages, where the first stage decides on three output parameters which are repayment, ability manage, and risk. Total asset, credit repayment, 18% earning, business stability, credit missed, asset/debt ratio, bond rating, and dollar to Naira ratio are the input parameters for the first stage of the system. The second stage of the system used the output parameters values of the first stage as its input parameters to make the final decision on whether to approve the credit or not. Results: Using 0.938, 0.583, 0.715, 0.88, 0.104, 0.897, 0.842, and 0.856 membership degree for total asset, credit request (loan amount), 18% earning, business stability, asset/debt ratio, bond rating, and dollar to naira ratio respectively as an input to the first stage of the system, the resultant output were 0.625, 0.367, and 0.25 for repayment, ability manage, and risk respectively, and those were feed to the second stage and result in 0.656 loan membership degree which means the loan can be approve to the customer
背景:银行贷款审批是银行体系的重要支柱之一;它是银行批准或拒绝向公司或个人客户提供贷款的过程。审批过程中有很多需要考虑的参数,这在本质上是模糊的;因此,银行贷款审批需要特殊知识才能执行。目的:针对审批过程的模糊性,提出利用模糊专家系统来处理这类模糊性问题,帮助银行更方便、准确地进行银行信贷审批决策。本文提出的模糊专家系统可以帮助银行在没有领域专家的情况下,根据该领域专家的知识,轻松地做出准确的信贷审批决策。方法:利用MATLAB软件中的模糊工具开发所提出的模糊专家系统,该系统分为两个阶段,其中第一阶段确定还款、能力管理和风险三个输出参数。总资产、信用偿还、18%的收益、业务稳定性、信用缺失、资产负债率、债券评级和美元对奈拉比率是系统第一阶段的输入参数。系统的第二阶段使用第一阶段的输出参数值作为其输入参数,最终决定是否批准信贷。结果:将总资产、信贷请求(贷款金额)、18%收入、业务稳定性、资产负债率、债券评级、美元对奈拉比率的隶属度分别为0.938、0.583、0.715、0.88、0.104、0.897、0.842、0.856作为系统第一阶段的输入,得到的偿还、管理能力、风险的输出分别为0.625、0.367、0.25。这些被反馈到第二阶段,结果是0.656的贷款成员度,这意味着贷款可以被批准给客户
{"title":"Fuzzy Expert System for Bank Loan Approval","authors":"A. Ismail","doi":"10.56471/slujst.v6i.349","DOIUrl":"https://doi.org/10.56471/slujst.v6i.349","url":null,"abstract":"Background: Bank loan approval is one of the important pillars of the banking system; it is the process of approving or denying a loan to companies or individual customers by the bank. The approval process has a lot of parameters to be taken into consideration, which is ambiguous in nature; hence, bank loan approval required special knowledge to be executed. Aim: Due to the ambiguity of the approval process, we proposed the use of a fuzzy expert system which proved to handle such ambiguous problems to help banks easily and accurately make decisions on bank credit approval. This proposed fuzzy expert system will help banks in making accurate decisions easily even in the absence of the domain expert on credit approval based on the knowledge of an expert in the field. Method: The proposed fuzzy expert system was developed using a fuzzy tool in MATLAB software and it has two stages, where the first stage decides on three output parameters which are repayment, ability manage, and risk. Total asset, credit repayment, 18% earning, business stability, credit missed, asset/debt ratio, bond rating, and dollar to Naira ratio are the input parameters for the first stage of the system. The second stage of the system used the output parameters values of the first stage as its input parameters to make the final decision on whether to approve the credit or not. Results: Using 0.938, 0.583, 0.715, 0.88, 0.104, 0.897, 0.842, and 0.856 membership degree for total asset, credit request (loan amount), 18% earning, business stability, asset/debt ratio, bond rating, and dollar to naira ratio respectively as an input to the first stage of the system, the resultant output were 0.625, 0.367, and 0.25 for repayment, ability manage, and risk respectively, and those were feed to the second stage and result in 0.656 loan membership degree which means the loan can be approve to the customer","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"578 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131512690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Face Recognition-Based Attendance System 基于人脸识别的考勤系统开发
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.362
Okechukwu. M. Chukwude
Lecture attendance management is usually tedious, and time-consuming and may be prone to errors or manipulations when done manually. Hence, in this work, a web application called RollCall was developed and tested, for use by both students and lecturers in the Faculty of Engineering at the University of Ilorin as a model to manage attendance. The system manages attendance by allowing the lecturers to create courses, and take and retrieve attendance records for the courses created. Student functionalities include uploading their face data, enrolling for courses, and retrieving attendance records for the courses in which they enrolled. Attendance is marked through face recognition technology implemented with Python, OpenCV and Sci-kit Learn. The web interface was implemented using HTML5, Twitter Bootstrap CSS framework and JavaScript. The findings revealed that RollCall effectively streamlined attendance management, making it easier for both students and lecturers to keep track of attendance records. The web application is user-friendly and enhances the overall academic experience by improving the accuracy and efficiency of attendance management
讲座出勤管理通常是乏味的,耗时的,并且在手工完成时可能容易出错或被操纵。因此,在这项工作中,开发并测试了一个名为RollCall的web应用程序,供伊洛林大学工程学院的学生和讲师使用,作为管理出勤的模型。系统通过允许讲师创建课程、获取和检索所创建课程的出勤记录来管理出勤。学生功能包括上传他们的面部数据、注册课程和检索他们注册的课程的出勤记录。考勤是通过使用Python、OpenCV和Sci-kit Learn实现的人脸识别技术来标记的。web界面是使用HTML5、Twitter Bootstrap CSS框架和JavaScript实现的。调查结果显示,RollCall有效地简化了出勤管理,使学生和讲师更容易跟踪出勤记录。web应用程序是用户友好的,通过提高考勤管理的准确性和效率,增强了整体的学习体验
{"title":"Development of Face Recognition-Based Attendance System","authors":"Okechukwu. M. Chukwude","doi":"10.56471/slujst.v6i.362","DOIUrl":"https://doi.org/10.56471/slujst.v6i.362","url":null,"abstract":"Lecture attendance management is usually tedious, and time-consuming and may be prone to errors or manipulations when done manually. Hence, in this work, a web application called RollCall was developed and tested, for use by both students and lecturers in the Faculty of Engineering at the University of Ilorin as a model to manage attendance. The system manages attendance by allowing the lecturers to create courses, and take and retrieve attendance records for the courses created. Student functionalities include uploading their face data, enrolling for courses, and retrieving attendance records for the courses in which they enrolled. Attendance is marked through face recognition technology implemented with Python, OpenCV and Sci-kit Learn. The web interface was implemented using HTML5, Twitter Bootstrap CSS framework and JavaScript. The findings revealed that RollCall effectively streamlined attendance management, making it easier for both students and lecturers to keep track of attendance records. The web application is user-friendly and enhances the overall academic experience by improving the accuracy and efficiency of attendance management","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135949923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded Internet of Things (IoT) Enviromental Monitoring System Using Raspberry PI 基于树莓派的嵌入式物联网环境监测系统
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.352
Dauda Muhammad
Background: Measuring and monitoring the temperature and humidity levels in a computer laboratory is crucial for ensuring the safety of the facility and the comfort of those using it. The latest technology for collecting this data is the Internet of Things (IoT), which uses sensors to monitor these parameters remotely. Aim: This paper presents an IoT system that assesses the temperature and humidity levels in a computer laboratory using a Raspberry Pi single-board computer and a DHT11 sensorMethod: The major contribution of this research is it utilizes the ThingSpeak Cloud database which provide the result faster within the shortest interval time which improve the temperature and humidity values more than the traditional Message Queue Telemetry Transport (MQTT). The DHT11 sensor captures the temperature and humidity data, which is then uploaded to the servers in real-time. This allows laboratory managers and decision-makers to monitor the laboratory's condition through a web portal or a mobile application installed on their Android or iOS devices from anywhere.Results:The results show that the ThingSpeak Cloud database provides the result of the temperatureas to 31.5°C and the relative humidity 74.8%.
背景:测量和监测计算机实验室的温度和湿度水平对于确保设备的安全和使用人员的舒适度至关重要。收集这些数据的最新技术是物联网(IoT),它使用传感器远程监控这些参数。目的:本文介绍了一个物联网系统,该系统使用树莓派单板计算机和DHT11传感器评估计算机实验室的温度和湿度水平。方法:本研究的主要贡献是它利用ThingSpeak云数据库,在最短的间隔时间内更快地提供结果,比传统的消息队列遥测传输(MQTT)更能提高温度和湿度值。DHT11传感器捕获温度和湿度数据,然后将其实时上传到服务器。这使得实验室管理人员和决策者可以随时随地通过门户网站或安装在Android或iOS设备上的移动应用程序来监控实验室的状况。结果:ThingSpeak Cloud数据库提供了温度为31.5°C,相对湿度为74.8%的结果。
{"title":"Embedded Internet of Things (IoT) Enviromental Monitoring System Using Raspberry PI","authors":"Dauda Muhammad","doi":"10.56471/slujst.v6i.352","DOIUrl":"https://doi.org/10.56471/slujst.v6i.352","url":null,"abstract":"Background: Measuring and monitoring the temperature and humidity levels in a computer laboratory is crucial for ensuring the safety of the facility and the comfort of those using it. The latest technology for collecting this data is the Internet of Things (IoT), which uses sensors to monitor these parameters remotely. Aim: This paper presents an IoT system that assesses the temperature and humidity levels in a computer laboratory using a Raspberry Pi single-board computer and a DHT11 sensorMethod: The major contribution of this research is it utilizes the ThingSpeak Cloud database which provide the result faster within the shortest interval time which improve the temperature and humidity values more than the traditional Message Queue Telemetry Transport (MQTT). The DHT11 sensor captures the temperature and humidity data, which is then uploaded to the servers in real-time. This allows laboratory managers and decision-makers to monitor the laboratory's condition through a web portal or a mobile application installed on their Android or iOS devices from anywhere.Results:The results show that the ThingSpeak Cloud database provides the result of the temperatureas to 31.5°C and the relative humidity 74.8%.","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128449498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling of Post-COVID-19 Food Production Index in Nigeria using Box-Jenkins Methodology 利用Box-Jenkins方法建立尼日利亚后covid -19粮食生产指数模型
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.286
M. Garba
Before the COVID-19 pandemic, global food security has been known to be a major threat for developed and developing countries of the world. However, during the COVID-19 pandemic, global food security was expected to be at a very high risk due to lockdown across the globe. Consequently, the developing countries, most especially, were expected to experience food shortage challenges. One important way to measure the amount of food production of any country in the world is through the use of a macroeconomic variable known as Food Production Index (FPI). Therefore, this study seeks to examine the post-COVID-19 behaviorof the Nigeria’s FPI using the Box-Jenkins methodology for modelingunivariate time series. A low-frequency time series datasets over 56 years spanning from 1961 to 2016 on Nigerian FPI was extracted from World Bank repository. Pre-tests results from the unit root analyses, correlogram and selection criteria techniques showed that the FPI is a differenced stationary series of order one {I(1)}and that ARIMA (2, 1, 2) model best fitted the series. Besides, diagnostic checking of the fitted model confirmed that the error was white noise and forecast of 8 years (2017 to 2024) was made. Findings from the study revealed that the future values of the FPI are erratic and expected to fluctuate (i.e.,rise and fall) within the predicted periods. Conclusively, the fourteen years out sample forecast of FPI for the periods 2017 to 2030 indicates that the gains of FPI in recent years is currently being affected bythe current COVID-19 pandemic. The study recommends that concerted efforts to achieve optimal FPI must be focused on the improvement of inter-regional trade which will result in shorter food chains, and thereby creating more market for farmers and enhancing accessibility to both inputs and outputs
在2019冠状病毒病大流行之前,全球粮食安全一直是世界发达国家和发展中国家面临的重大威胁。然而,在2019冠状病毒病大流行期间,由于全球范围的封锁,预计全球粮食安全将面临非常高的风险。因此,发展中国家,尤其是发展中国家,预计将面临粮食短缺的挑战。衡量世界上任何国家粮食产量的一个重要方法是使用一个被称为粮食生产指数(FPI)的宏观经济变量。因此,本研究试图使用Box-Jenkins方法对单变量时间序列进行建模,研究尼日利亚FPI在2019冠状病毒病后的行为。从世界银行数据库中提取了1961年至2016年56年间尼日利亚FPI的低频时间序列数据集。单位根分析、相关图和选择标准技术的预检验结果表明,FPI是一个1阶的差分平稳序列{I(1)}, ARIMA(2,1,2)模型最适合该序列。对拟合模型进行诊断检查,确认误差为白噪声,并进行了8年(2017 - 2024)的预测。这项研究的结果显示,未来的渔业指数是不稳定的,预计在预测期内会波动(即上升和下降)。最后,对2017年至2030年期间14年的fdi样本预测表明,近年来fdi的增长目前正受到当前COVID-19大流行的影响。该研究建议,实现最优FPI的协调一致努力必须集中于改善区域间贸易,这将缩短食物链,从而为农民创造更多市场,提高获得投入和产出的机会
{"title":"Modelling of Post-COVID-19 Food Production Index in Nigeria using Box-Jenkins Methodology","authors":"M. Garba","doi":"10.56471/slujst.v6i.286","DOIUrl":"https://doi.org/10.56471/slujst.v6i.286","url":null,"abstract":"Before the COVID-19 pandemic, global food security has been known to be a major threat for developed and developing countries of the world. However, during the COVID-19 pandemic, global food security was expected to be at a very high risk due to lockdown across the globe. Consequently, the developing countries, most especially, were expected to experience food shortage challenges. One important way to measure the amount of food production of any country in the world is through the use of a macroeconomic variable known as Food Production Index (FPI). Therefore, this study seeks to examine the post-COVID-19 behaviorof the Nigeria’s FPI using the Box-Jenkins methodology for modelingunivariate time series. A low-frequency time series datasets over 56 years spanning from 1961 to 2016 on Nigerian FPI was extracted from World Bank repository. Pre-tests results from the unit root analyses, correlogram and selection criteria techniques showed that the FPI is a differenced stationary series of order one {I(1)}and that ARIMA (2, 1, 2) model best fitted the series. Besides, diagnostic checking of the fitted model confirmed that the error was white noise and forecast of 8 years (2017 to 2024) was made. Findings from the study revealed that the future values of the FPI are erratic and expected to fluctuate (i.e.,rise and fall) within the predicted periods. Conclusively, the fourteen years out sample forecast of FPI for the periods 2017 to 2030 indicates that the gains of FPI in recent years is currently being affected bythe current COVID-19 pandemic. The study recommends that concerted efforts to achieve optimal FPI must be focused on the improvement of inter-regional trade which will result in shorter food chains, and thereby creating more market for farmers and enhancing accessibility to both inputs and outputs","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the Choice of Better Social Media Platform for Knowledge Delivery: Exploratory Study in University of Ilorin 面向更好的知识传播社会化媒体平台的选择:伊洛林大学的探索性研究
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.361
I. A. Sikiru
Rising from the outbreak of COVID-19 pandemic, all schools in Nigeria were put under lock and key, like other countries. This was to curtail the rapid spread of the virus, while the medical practitioners were in the laboratories. But due to longer period of shutdown to formal education, most higher institutions instantaneously keyed-in to any available social media platform (SMP) without understudying its efficiency and effectiveness for knowledge transfer. The consequences of this include non-satisfactory knowledge transfer, most especially, by the learners; hence, aim of knowledge impact is jeopardized. This study therefore is aimed to fill the gap to correct the existing damage, and prevent the likelihood of not-afore-put-to-test syndrome in the subsequent choice of SMP. To achieve this, University of Ilorin is chosen as the territory survey for being the most sought-after University for admission in Nigeria. Quantitative research methods were adopted, being the most appropriate for this study in the literature. A total of 200 respondents participated voluntarily with the adoption of Slovin’s formula for the sampling techniques; 156 students and 44 lecturers. The data collection process was performed through a survey comprising demographic, dichotomous, multiple choice, and open-ended questionnaire to capture detail information for the research work. Simple descriptive statistics was employed for the analysis. Our findings reveal that out of the seventeen SMPs put to test, zoom platform ranks the most effective and efficient for the knowledge delivery and acquisition by the lecturers and students of the University respectively, based on the designed principles. Therefore, making Zoom platform the most preferred for e-learning. This study recommends that choice of satisfactory SMP for knowledge delivery should be utmost concern of all institutions before embarking on virtual learning system
由于COVID-19大流行的爆发,尼日利亚的所有学校都像其他国家一样被锁上了锁。这是为了遏制病毒的迅速传播,而医生们都在实验室里。但由于正规教育关闭的时间较长,大多数高等院校都立即登录任何可用的社交媒体平台(SMP),而不影响其知识转移的效率和有效性。这种情况的后果包括不令人满意的知识转移,尤其是学习者;因此,知识影响的目的受到了损害。因此,本研究旨在填补这一空白,纠正现有的损害,并防止在后续选择SMP时出现不预先测试综合征的可能性。为了实现这一目标,伊洛林大学被选为尼日利亚最受欢迎的大学。采用定量研究方法,是文献中最适合本研究的方法。共有200名受访者自愿参与,采用斯洛文公式进行抽样技术;学生156人,讲师44人。数据收集过程通过人口统计、二分法、多项选择和开放式问卷调查来完成,以获取研究工作的详细信息。采用简单描述性统计进行分析。我们的研究结果显示,在测试的17个smp中,zoom平台根据设计的原则,分别对大学的讲师和学生的知识传递和获取最有效和最高效。因此,使Zoom平台成为电子学习的首选。本研究建议,所有院校在实施虚拟学习系统前,应首先考虑如何选择令人满意的知识传递SMP
{"title":"Towards the Choice of Better Social Media Platform for Knowledge Delivery: Exploratory Study in University of Ilorin","authors":"I. A. Sikiru","doi":"10.56471/slujst.v6i.361","DOIUrl":"https://doi.org/10.56471/slujst.v6i.361","url":null,"abstract":"Rising from the outbreak of COVID-19 pandemic, all schools in Nigeria were put under lock and key, like other countries. This was to curtail the rapid spread of the virus, while the medical practitioners were in the laboratories. But due to longer period of shutdown to formal education, most higher institutions instantaneously keyed-in to any available social media platform (SMP) without understudying its efficiency and effectiveness for knowledge transfer. The consequences of this include non-satisfactory knowledge transfer, most especially, by the learners; hence, aim of knowledge impact is jeopardized. This study therefore is aimed to fill the gap to correct the existing damage, and prevent the likelihood of not-afore-put-to-test syndrome in the subsequent choice of SMP. To achieve this, University of Ilorin is chosen as the territory survey for being the most sought-after University for admission in Nigeria. Quantitative research methods were adopted, being the most appropriate for this study in the literature. A total of 200 respondents participated voluntarily with the adoption of Slovin’s formula for the sampling techniques; 156 students and 44 lecturers. The data collection process was performed through a survey comprising demographic, dichotomous, multiple choice, and open-ended questionnaire to capture detail information for the research work. Simple descriptive statistics was employed for the analysis. Our findings reveal that out of the seventeen SMPs put to test, zoom platform ranks the most effective and efficient for the knowledge delivery and acquisition by the lecturers and students of the University respectively, based on the designed principles. Therefore, making Zoom platform the most preferred for e-learning. This study recommends that choice of satisfactory SMP for knowledge delivery should be utmost concern of all institutions before embarking on virtual learning system","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114581666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Multi-Robot Cooperative Hunting Using Differential Game Technique 基于微分博弈技术的多机器人协同狩猎分析
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.221
Bashir Abdullahi Baba
This research presents two robots cooperative hunting behavior by the use of a differential game method. There are two pursuer robots that are trying to find and then surround another robot prey evader. The purpose of the game is for the two pursuer robots to find the evader simultaneously or when one of the robots finds the evader first it will wait for the other robot to cooperate with it within a specified period of time. We use differential game theory to formulate the problem with a system of an ordinary differential equation. The conditions for the termination of the game were given to be when one of the pursuers catch the evader and the other cooperate with it or when the two pursuers catch it simultaneously.We carefully analyzed all the mathematical equations developed using the ordinary differential equations for the game and present the sufficient conditions that can warrant the two pursuers to catch the evader either simultaneously or one first and then the other cooperates with the first one which will result in termination of the game. We also show mathematically that in the course of the game the robot prey evader tries to prolong the capture time, while the pursuer robots try to shorten the capture time
利用微分对策方法研究了两个机器人的合作狩猎行为。有两个追赶机器人试图找到并包围另一个机器人猎物逃避者。游戏的目的是让两个追赶机器人同时找到逃避者,或者当其中一个机器人先找到逃避者时,等待另一个机器人在规定的时间内与它合作。我们用微分博弈论的方法用一个常微分方程组来表述这个问题。博弈终止的条件为:一方追捕者抓住了逃逃者,另一方与之合作,或者两个追捕者同时抓住了逃逃者。我们仔细分析了用常微分方程推导出的所有数学方程,并给出了两个追求者同时捕获或一个追求者先捕获另一个追求者后与第一个追求者合作导致博弈终止的充分条件。我们还从数学上证明了在游戏过程中,机器人猎物逃避者试图延长捕获时间,而追捕者试图缩短捕获时间
{"title":"Analysis of Multi-Robot Cooperative Hunting Using Differential Game Technique","authors":"Bashir Abdullahi Baba","doi":"10.56471/slujst.v6i.221","DOIUrl":"https://doi.org/10.56471/slujst.v6i.221","url":null,"abstract":"This research presents two robots cooperative hunting behavior by the use of a differential game method. There are two pursuer robots that are trying to find and then surround another robot prey evader. The purpose of the game is for the two pursuer robots to find the evader simultaneously or when one of the robots finds the evader first it will wait for the other robot to cooperate with it within a specified period of time. We use differential game theory to formulate the problem with a system of an ordinary differential equation. The conditions for the termination of the game were given to be when one of the pursuers catch the evader and the other cooperate with it or when the two pursuers catch it simultaneously.We carefully analyzed all the mathematical equations developed using the ordinary differential equations for the game and present the sufficient conditions that can warrant the two pursuers to catch the evader either simultaneously or one first and then the other cooperates with the first one which will result in termination of the game. We also show mathematically that in the course of the game the robot prey evader tries to prolong the capture time, while the pursuer robots try to shorten the capture time","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
SLU Journal of Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1