首页 > 最新文献

SLU Journal of Science and Technology最新文献

英文 中文
Modified Round Robin with Highest Response Ratio Next CPU Scheduling Algorithm using Dynamic Time Quantum 基于动态时间量子的改进最高响应率轮询下一CPU调度算法
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.363
Suleiman Ebaiya Abubakar
Background: The most popular time-sharing operating systems scheduling technique, whose efficiency heavily dependent on time slice selection, is the round robin CPU scheduling algorithm. The time slice works similar to the First-Come-First-Serve (FCFS) scheduling or processor sharing algorithm if it is large or extremely too small. Some of the existing research papers have an algorithm called Improved Round Robin with Highest Response Ratio Next (IRRHRRN) which made use of response ratio with a predefined time quantum of 10ms with the major aim of avoiding starvation. However, the IRRHRRN algorithm favors processes with shorter burst time than the ones with longer burst time, and gave no regard to the process arrival time, thus leading to starvation. Aim: This study tries to improve on the IRRHRRN algorithm by proposing the Modified Round Robin with Highest Response Ratio Next (MRRHRRN) CPU Scheduling Algorithm using Dynamic Time Quantum in order to reduce the problem of starvation. Method: Dynamic method of determining the time quantum was adopted. Results: The proposed algorithm was compared with four other existing algorisms such as Standard Round Robin (RR), Improved Round Robin (IRR), An Additional Improvement in Round Robin (AAIRR), and the Improved Round Robin with Highest Response Ratio Next (IRRHRRN) and it provided some promising results in terms of the Average Waiting Time of 35407.6 ms, Average Turnaround Time of 36117.6 ms, Average Response Time of 10894.8 ms and Number of Context Switch of 301for the Non-Zero Arrival Times Processes
背景:最流行的分时操作系统调度技术是轮循CPU调度算法,其效率严重依赖于时间片的选择。如果时间片太大或太小,它的工作原理类似于先到先服务(FCFS)调度或处理器共享算法。一些现有的研究论文有一种算法,称为改进轮询与最高响应比下一步(IRRHRRN),它利用响应比与一个预定义的时间量子为10ms,主要目的是避免饥饿。然而,IRRHRRN算法对突发时间短的进程比对突发时间长的进程更有利,并且不考虑进程到达时间,从而导致饥饿。目的:本研究试图对irhrrn算法进行改进,提出了基于动态时间量子的改进的最高响应比下一次轮询(MRRHRRN) CPU调度算法,以减少饥饿问题。方法:采用动态确定时间量子的方法。结果:将该算法与标准轮询算法(RR)、改进轮询算法(IRR)、改进轮询算法(AAIRR)和最高响应比改进轮询算法(IRRHRRN)进行比较,在非零到达时间进程的平均等待时间为35407.6 ms,平均周转时间为36117.6 ms,平均响应时间为10894.8 ms,上下文切换次数为301次方面取得了令人满意的结果
{"title":"Modified Round Robin with Highest Response Ratio Next CPU Scheduling Algorithm using Dynamic Time Quantum","authors":"Suleiman Ebaiya Abubakar","doi":"10.56471/slujst.v6i.363","DOIUrl":"https://doi.org/10.56471/slujst.v6i.363","url":null,"abstract":"Background: The most popular time-sharing operating systems scheduling technique, whose efficiency heavily dependent on time slice selection, is the round robin CPU scheduling algorithm. The time slice works similar to the First-Come-First-Serve (FCFS) scheduling or processor sharing algorithm if it is large or extremely too small. Some of the existing research papers have an algorithm called Improved Round Robin with Highest Response Ratio Next (IRRHRRN) which made use of response ratio with a predefined time quantum of 10ms with the major aim of avoiding starvation. However, the IRRHRRN algorithm favors processes with shorter burst time than the ones with longer burst time, and gave no regard to the process arrival time, thus leading to starvation. Aim: This study tries to improve on the IRRHRRN algorithm by proposing the Modified Round Robin with Highest Response Ratio Next (MRRHRRN) CPU Scheduling Algorithm using Dynamic Time Quantum in order to reduce the problem of starvation. Method: Dynamic method of determining the time quantum was adopted. Results: The proposed algorithm was compared with four other existing algorisms such as Standard Round Robin (RR), Improved Round Robin (IRR), An Additional Improvement in Round Robin (AAIRR), and the Improved Round Robin with Highest Response Ratio Next (IRRHRRN) and it provided some promising results in terms of the Average Waiting Time of 35407.6 ms, Average Turnaround Time of 36117.6 ms, Average Response Time of 10894.8 ms and Number of Context Switch of 301for the Non-Zero Arrival Times Processes","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beam Divergence Loss Mitigation in Free Space Optical Communication Channel Using Field of View Technique 利用视场技术降低自由空间光通信信道中的光束发散损耗
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.344
Sule Lamido
A rapid advancement in the electronics and telecommunications industries has been observed. As a result, Communication gadgets are becoming more powerful and are more widely adopted. The demand for high data rate transmission is increasing. This has led to spectrum scarcity in Radio Frequency (RF) systems. Consequently, it is necessary to explore other technical means to meet the increasing demand for higher data rates. Free Space Optical Communication (FSOC) is a promising technology that offers one of such means. However, the major technical challenge in the FSOC systems is that, their performance is limited by atmospheric impairments such as: absorption, scattering and turbulence caused by rain, cloud, snow, wind, dust, aerosol, and fog. This research is aimed to addressed beam divergence challenge due to fog and raindrop in a tropical climate using wider field of view technique (FoV). The result showed that, for the fog measurement using mini solar panel at the receiver, the system achieved higher SNR of 60 dB at corresponding BER of 10-4. While, with the photodiode, the system achieved an SNR of 38 dB at same BER. For the rain measurement the same procedure was adopted and the system achieved higher SNR of 90 dB and 58 dB at same BER utilizing both solar panel and photodiode respectively. The result showed that, the fog impairment attenuates optical signal more than of rain by 34 % averagely
人们观察到电子和电信工业的迅速发展。因此,通讯工具变得越来越强大,被越来越广泛地采用。对高数据速率传输的需求越来越大。这导致了射频(RF)系统中的频谱稀缺。因此,有必要探索其他技术手段来满足对更高数据速率日益增长的需求。自由空间光通信(FSOC)是一种很有前途的技术,它提供了一种这样的手段。然而,FSOC系统的主要技术挑战是,它们的性能受到大气损伤的限制,例如:由雨、云、雪、风、灰尘、气溶胶和雾引起的吸收、散射和湍流。本研究旨在利用宽视场技术(FoV)解决热带气候下雾和雨滴造成的光束发散挑战。结果表明,在接收端使用小型太阳能板进行雾测量时,系统在相应的误码率为10-4时,信噪比达到60 dB。而采用光电二极管,在相同的误码率下,系统实现了38 dB的信噪比。雨水测量采用了同样的方法,在相同的误码率下,系统分别利用太阳能电池板和光电二极管实现了90 dB和58 dB的高信噪比。结果表明,雾对光信号的衰减平均比雨大34%
{"title":"Beam Divergence Loss Mitigation in Free Space Optical Communication Channel Using Field of View Technique","authors":"Sule Lamido","doi":"10.56471/slujst.v6i.344","DOIUrl":"https://doi.org/10.56471/slujst.v6i.344","url":null,"abstract":"A rapid advancement in the electronics and telecommunications industries has been observed. As a result, Communication gadgets are becoming more powerful and are more widely adopted. The demand for high data rate transmission is increasing. This has led to spectrum scarcity in Radio Frequency (RF) systems. Consequently, it is necessary to explore other technical means to meet the increasing demand for higher data rates. Free Space Optical Communication (FSOC) is a promising technology that offers one of such means. However, the major technical challenge in the FSOC systems is that, their performance is limited by atmospheric impairments such as: absorption, scattering and turbulence caused by rain, cloud, snow, wind, dust, aerosol, and fog. This research is aimed to addressed beam divergence challenge due to fog and raindrop in a tropical climate using wider field of view technique (FoV). The result showed that, for the fog measurement using mini solar panel at the receiver, the system achieved higher SNR of 60 dB at corresponding BER of 10-4. While, with the photodiode, the system achieved an SNR of 38 dB at same BER. For the rain measurement the same procedure was adopted and the system achieved higher SNR of 90 dB and 58 dB at same BER utilizing both solar panel and photodiode respectively. The result showed that, the fog impairment attenuates optical signal more than of rain by 34 % averagely","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Phase Virtual Machine Placement in Cloud Computing Data Centers Using Extreme Learning Machine Prediction-Based Triggering Method 基于极端学习机预测的触发方法在云计算数据中心的两阶段虚拟机放置
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.359
Nafiu Musa Muhaammad
Background: Two-phase Optimization of Virtual Machine Placement (VMP) Problem considers both the Online Incremental VMP (iVMP) phase in which the new arrival of dynamic requests of Virtual Machines VMs are attended to and the Offline VMP reconfiguration (VMPr) phase that performs placement recalculation. In the two-phase scheme, the first part of the two-phase approach is the iVMP, where virtual machines (VMs) can be built, changed, or destroyed at runtime. While the second phase focuses on raising the standard of solutions produced by the iVMP, several studies have been done in different literature to solve the VMP problem. However, the methods used tend to be over-forecast and have long runs of a linear trend. This affects the prediction and produces a less optimal solution. Objective: The following four objective functions are optimized using the proposed Extreme Learning Machine Prediction-Based Triggering Method for Virtual Machine Placement in Cloud Computing Datacenters in Two-Phases, which combines the advantages of both online (dynamic) and static (offline) VMP formulations: the length of the reconfiguration process, the amount of energy used, the way resources are used, and the financial expenses. This study suggests a brand-new strategy for deciding when to start the VMP reconfiguration phase. Results: The Method provides more accuracy to the predicted requests as well as reduces the total economic penalties for service Level Agreement(SLA) violations. An experimental comparison with the existing approach is conducted utilizing 400 cases. Conclusion: The results demonstrated that, in comparison to the benchmark approach, the proposed work obtained a minimum cost function with a 10.5% improvement
背景:两阶段优化的虚拟机布局(VMP)问题考虑了在线增量VMP (iVMP)阶段和离线VMP重新配置(VMPr)阶段,其中在线增量VMP (iVMP)阶段是处理新到达的虚拟机虚拟机的动态请求,离线VMP重新配置(VMPr)阶段是执行布局重新计算。在两阶段方案中,两阶段方法的第一部分是iVMP,可以在运行时构建、更改或销毁虚拟机(vm)。虽然第二阶段的重点是提高由iVMP产生的解决方案的标准,但在不同的文献中已经做了一些研究来解决VMP问题。然而,所使用的方法往往是过度预测和长期的线性趋势。这会影响预测并产生较不理想的解决方案。目标:利用提出的基于极限学习机预测的两阶段云计算数据中心虚拟机放置触发方法,对以下四个目标函数进行优化,该方法结合了在线(动态)和静态(离线)VMP公式的优势:重构过程的长度、能源使用量、资源使用方式和财务费用。本研究提出了一种决定何时开始VMP重构阶段的全新策略。结果:该方法提高了预测请求的准确性,并减少了违反服务水平协议(SLA)的总体经济处罚。利用400个案例与现有方法进行了实验比较。结论:结果表明,与基准方法相比,所提出的工作获得了最小成本函数,提高了10.5%
{"title":"Two-Phase Virtual Machine Placement in Cloud Computing Data Centers Using Extreme Learning Machine Prediction-Based Triggering Method","authors":"Nafiu Musa Muhaammad","doi":"10.56471/slujst.v6i.359","DOIUrl":"https://doi.org/10.56471/slujst.v6i.359","url":null,"abstract":"Background: Two-phase Optimization of Virtual Machine Placement (VMP) Problem considers both the Online Incremental VMP (iVMP) phase in which the new arrival of dynamic requests of Virtual Machines VMs are attended to and the Offline VMP reconfiguration (VMPr) phase that performs placement recalculation. In the two-phase scheme, the first part of the two-phase approach is the iVMP, where virtual machines (VMs) can be built, changed, or destroyed at runtime. While the second phase focuses on raising the standard of solutions produced by the iVMP, several studies have been done in different literature to solve the VMP problem. However, the methods used tend to be over-forecast and have long runs of a linear trend. This affects the prediction and produces a less optimal solution. Objective: The following four objective functions are optimized using the proposed Extreme Learning Machine Prediction-Based Triggering Method for Virtual Machine Placement in Cloud Computing Datacenters in Two-Phases, which combines the advantages of both online (dynamic) and static (offline) VMP formulations: the length of the reconfiguration process, the amount of energy used, the way resources are used, and the financial expenses. This study suggests a brand-new strategy for deciding when to start the VMP reconfiguration phase. Results: The Method provides more accuracy to the predicted requests as well as reduces the total economic penalties for service Level Agreement(SLA) violations. An experimental comparison with the existing approach is conducted utilizing 400 cases. Conclusion: The results demonstrated that, in comparison to the benchmark approach, the proposed work obtained a minimum cost function with a 10.5% improvement","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Resources Security Threat in University Libraries in Katsina State 卡齐纳州高校图书馆信息资源安全威胁研究
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.389
Abdulkadir Ahmed Idris
This study was carried out to investigate information resource security threat in university libraries in Katsina State. The objectives of the paper were to identify the types of information resources threat available and the measures taken to solve the issue of information resource security threat in university libraries in Katsina state. The paper employed a qualitative methodological approach using a narrative-based design. The population of the study comprises nine (9) participants selected from the libraries under study. A narrative-based analysis was adopted to analyze the data collected. The study established that theft of library collections, mutilations of the library collection, disruptive patrons’ behavior,natural disaster and artificial disaster, poorly secured premises, library staff attitude and ignorance of security issues were types of information resources threat in the university libraries in Katsina State. The study also established that windows and doors protection, a mark of ownership, checking in and checking out, recruitment of more library staff and security personnel, and use of telecommunication system e.g.,electronic access control, CCTV, RFID were the measures taken to solve the issue of information resources threat in the university libraries in Katsina State. Based on the findings of the study, the paper therefore recommends that university libraries should have a written collection development policy that covers security measures that will help other new staff and the academic community to know what is on the ground for them to follow strictly. The study further concludes that, the libraries should provide a perimeter alarm system, electro-magnetic control system, firewall installation, radio frequency identification system, and electronic access control in the university libraries, and security entrance of every university library should be managed by well-trained and qualified professionals to save resources from any act of mismanagement or security threat of information resources
本研究旨在调查卡齐纳州大学图书馆的信息资源安全威胁。本文的目的是确定可用的信息资源威胁的类型和所采取的措施,以解决卡齐纳州大学图书馆的信息资源安全威胁问题。本文采用基于叙述的设计,采用定性方法。本研究的人口包括从所研究的图书馆中选出的九(9)名参与者。采用基于叙述的分析方法对收集到的数据进行分析。研究表明,盗窃图书馆藏书、毁坏图书馆藏书、扰乱顾客行为、自然灾害和人为灾害、房屋安全不良、图书馆工作人员的态度和对安全问题的无知是卡齐纳州大学图书馆面临的信息资源威胁类型。研究还确定,门窗保护、所有权标志、入住和退房、招聘更多的图书馆工作人员和保安人员以及使用电子门禁、闭路电视、RFID等电信系统是解决卡齐纳州大学图书馆信息资源威胁问题的措施。基于这项研究的结果,论文建议大学图书馆应该有一个书面的馆藏发展政策,包括安全措施,这将帮助其他新员工和学术界了解他们严格遵守的依据。研究进一步认为,图书馆应在图书馆内设置周界报警系统、电磁控制系统、防火墙、射频识别系统和电子门禁系统,各大学图书馆的安全入口应由训练有素的专业人员管理,以避免信息资源管理不善或安全威胁
{"title":"Information Resources Security Threat in University Libraries in Katsina State","authors":"Abdulkadir Ahmed Idris","doi":"10.56471/slujst.v6i.389","DOIUrl":"https://doi.org/10.56471/slujst.v6i.389","url":null,"abstract":"This study was carried out to investigate information resource security threat in university libraries in Katsina State. The objectives of the paper were to identify the types of information resources threat available and the measures taken to solve the issue of information resource security threat in university libraries in Katsina state. The paper employed a qualitative methodological approach using a narrative-based design. The population of the study comprises nine (9) participants selected from the libraries under study. A narrative-based analysis was adopted to analyze the data collected. The study established that theft of library collections, mutilations of the library collection, disruptive patrons’ behavior,natural disaster and artificial disaster, poorly secured premises, library staff attitude and ignorance of security issues were types of information resources threat in the university libraries in Katsina State. The study also established that windows and doors protection, a mark of ownership, checking in and checking out, recruitment of more library staff and security personnel, and use of telecommunication system e.g.,electronic access control, CCTV, RFID were the measures taken to solve the issue of information resources threat in the university libraries in Katsina State. Based on the findings of the study, the paper therefore recommends that university libraries should have a written collection development policy that covers security measures that will help other new staff and the academic community to know what is on the ground for them to follow strictly. The study further concludes that, the libraries should provide a perimeter alarm system, electro-magnetic control system, firewall installation, radio frequency identification system, and electronic access control in the university libraries, and security entrance of every university library should be managed by well-trained and qualified professionals to save resources from any act of mismanagement or security threat of information resources","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127366597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sum-Rate Systematic Intercell Interference Coordination Techniques for5GHeterogeneous Networks 5g异构网络的和速率系统小区间干扰协调技术
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.355
H. Bello
In the next generation of wireless networks, small base stations are being adopted to increase the system's speed and capacity. However, this adoption increases the likelihood of inter-cell interference, which can degrade performance the system. This report discusses different approaches to managing interference that can mitigate these effects. Currently, a few techniques are already in use in 4G systems, while others have been suggested but not put into practice. The purpose of this study is to conduct an analytical examination of the different and various interference management methods that could be utilized in Heterogeneous Networks (HetNets), focusing specifically on HetNets with high density of small cells as they are expected to be part of the network topology for 5G networks and beyond. The study involved implementing time-based enhanced inter-cell interference coordination (eICIC) by establishing coordination between macro and small base stations. The results showed that robust communication with low latency is essential, and backhaul connections play a critical role in achieving this. Consequently, the network's sum-rate was increased.
在下一代无线网络中,正在采用小型基站来提高系统的速度和容量。然而,这种采用增加了小区间干扰的可能性,这会降低系统的性能。本报告讨论了可以减轻这些影响的管理干扰的不同方法。目前,一些技术已经在4G系统中使用,而其他技术已经提出但尚未付诸实践。本研究的目的是对可用于异构网络(HetNets)的不同和各种干扰管理方法进行分析研究,特别关注具有高密度小蜂窝的HetNets,因为它们有望成为5G网络及以后网络拓扑的一部分。该研究涉及通过建立宏基站和小基站之间的协调来实现基于时间的增强小区间干扰协调(eICIC)。结果表明,低延迟的健壮通信是必不可少的,回程连接在实现这一目标中起着关键作用。因此,网络的和速率增加了。
{"title":"Sum-Rate Systematic Intercell Interference Coordination Techniques for5GHeterogeneous Networks","authors":"H. Bello","doi":"10.56471/slujst.v6i.355","DOIUrl":"https://doi.org/10.56471/slujst.v6i.355","url":null,"abstract":"In the next generation of wireless networks, small base stations are being adopted to increase the system's speed and capacity. However, this adoption increases the likelihood of inter-cell interference, which can degrade performance the system. This report discusses different approaches to managing interference that can mitigate these effects. Currently, a few techniques are already in use in 4G systems, while others have been suggested but not put into practice. The purpose of this study is to conduct an analytical examination of the different and various interference management methods that could be utilized in Heterogeneous Networks (HetNets), focusing specifically on HetNets with high density of small cells as they are expected to be part of the network topology for 5G networks and beyond. The study involved implementing time-based enhanced inter-cell interference coordination (eICIC) by establishing coordination between macro and small base stations. The results showed that robust communication with low latency is essential, and backhaul connections play a critical role in achieving this. Consequently, the network's sum-rate was increased.","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Performance Evaluation of Free Space Optical Communication Link in Zaria, Nigeria 尼日利亚Zaria自由空间光通信链路设计与性能评价
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.357
A. Bukar
Free Space Optical Communication (FSOC) is an optical technology with a great chance to complement traditional wireless communication technologies. It offers essential advantages compared to Radio Frequency (RF), such as low power consumption, no frequency restrictions, no electromagnetic interference, security, and a significant increase in bandwidth. Similarly, they have proven a worthy substitute for fiber optics with notable advantages. FSOC systems are usually installed above ground level and are therefore exposed to prevailing weather conditions such as haze, fog, rain, etc. which negatively affect the optical signal transmission. There is a shortage of research on using FSO systems in tropical regions. For this reason, accurate free space optical communication channel modeling helps telecommunication operators to engineer and appropriately manage their networks. Therefore, this research work developed Free Space Optical Communication Channel Model to mitigate the effects of atmospheric attenuations by estimating the specifically induced attenuation caused by both haze and rainfall rates on the FSOC link in the Zaria geographical area using two years of measured visibility data and rainfall rates data of the study location obtained from Nigerian Meteorological (NIMET) agency, Zaria station, locatedat the Nigeria College of Aviation Technology (NCAT) Zaria and Center for Energy Research and Training (CERT), Ahmadu Bello University (ABU), Zaria. The performance of the FSOC system is analyzed and evaluated through Link Margin (LM) analysis by using the design specifications of a commercial optical transceiver (TereScope 5000). The haze-induced attenuation obtained at 850nm, 950nm, and 1550nm is 5.934dB, 6.402dB, and 3.152dB respectively. Therefore, the result shows that the 1550 nm wavelength has minimum haze-induced attenuation compared to 850nm and 950nm at a propagation link distance of 6km. Furthermore, from the results of the performance evaluation of the LM analysis for the combined effects of Geometrical Attenuation (Gatt), Haze-Induced Attenuation (HIA), and Rain-Induced Attenuation (RIA), the result shows that operating a 1550nm wavelength in transmission power greatly improves optical transmission when compared with 850nm and 950nm wavelengths. Generally, the overall outcome of the research concludes that the free space optical communication system has the robustness to handle successful wireless communication during the worst weather conditions in Zaria throughout the year for a link range of up to 6km
自由空间光通信(FSOC)是一种极有可能补充传统无线通信技术的光学技术。与射频(RF)相比,它具有重要的优势,例如低功耗、无频率限制、无电磁干扰、安全性和带宽的显着增加。同样,它们已被证明是光纤的有价值的替代品,具有显著的优势。FSOC系统通常安装在地面以上,因此暴露于普遍的天气条件下,如雾霾,雾,雨等,这些都会对光信号传输产生负面影响。关于在热带地区使用FSO系统的研究还很缺乏。因此,准确的自由空间光通信信道建模有助于电信运营商设计和适当地管理其网络。因此,本研究工作开发了自由空间光通信信道模型,利用尼日利亚气象局(NIMET)获得的两年能见度数据和研究地点的降雨率数据,通过估算雾霾和降雨率对Zaria地理区域FSOC链路造成的特定诱导衰减,减轻大气衰减的影响。位于尼日利亚航空技术学院(NCAT) Zaria和能源研究与培训中心(CERT), Ahmadu Bello大学(ABU), Zaria。利用商用光收发器(TereScope 5000)的设计规范,通过链路裕度(LM)分析对FSOC系统的性能进行了分析和评估。在850nm、950nm和1550nm处雾霾诱导衰减分别为5.934dB、6.402dB和3.152dB。因此,结果表明,在传播链路距离为6km时,1550 nm波长比850nm和950nm波长具有最小的雾霾诱导衰减。此外,从几何衰减(Gatt)、雾致衰减(HIA)和雨致衰减(RIA)联合效应的LM分析性能评价结果看,与850nm和950nm波长相比,1550nm波长的传输功率大大提高了光透射率。总的来说,研究的总体结果表明,自由空间光通信系统具有鲁棒性,可以在全年Zaria最恶劣的天气条件下处理成功的无线通信,链路范围高达6公里
{"title":"Design and Performance Evaluation of Free Space Optical Communication Link in Zaria, Nigeria","authors":"A. Bukar","doi":"10.56471/slujst.v6i.357","DOIUrl":"https://doi.org/10.56471/slujst.v6i.357","url":null,"abstract":"Free Space Optical Communication (FSOC) is an optical technology with a great chance to complement traditional wireless communication technologies. It offers essential advantages compared to Radio Frequency (RF), such as low power consumption, no frequency restrictions, no electromagnetic interference, security, and a significant increase in bandwidth. Similarly, they have proven a worthy substitute for fiber optics with notable advantages. FSOC systems are usually installed above ground level and are therefore exposed to prevailing weather conditions such as haze, fog, rain, etc. which negatively affect the optical signal transmission. There is a shortage of research on using FSO systems in tropical regions. For this reason, accurate free space optical communication channel modeling helps telecommunication operators to engineer and appropriately manage their networks. Therefore, this research work developed Free Space Optical Communication Channel Model to mitigate the effects of atmospheric attenuations by estimating the specifically induced attenuation caused by both haze and rainfall rates on the FSOC link in the Zaria geographical area using two years of measured visibility data and rainfall rates data of the study location obtained from Nigerian Meteorological (NIMET) agency, Zaria station, locatedat the Nigeria College of Aviation Technology (NCAT) Zaria and Center for Energy Research and Training (CERT), Ahmadu Bello University (ABU), Zaria. The performance of the FSOC system is analyzed and evaluated through Link Margin (LM) analysis by using the design specifications of a commercial optical transceiver (TereScope 5000). The haze-induced attenuation obtained at 850nm, 950nm, and 1550nm is 5.934dB, 6.402dB, and 3.152dB respectively. Therefore, the result shows that the 1550 nm wavelength has minimum haze-induced attenuation compared to 850nm and 950nm at a propagation link distance of 6km. Furthermore, from the results of the performance evaluation of the LM analysis for the combined effects of Geometrical Attenuation (Gatt), Haze-Induced Attenuation (HIA), and Rain-Induced Attenuation (RIA), the result shows that operating a 1550nm wavelength in transmission power greatly improves optical transmission when compared with 850nm and 950nm wavelengths. Generally, the overall outcome of the research concludes that the free space optical communication system has the robustness to handle successful wireless communication during the worst weather conditions in Zaria throughout the year for a link range of up to 6km","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Constant Modulus Algorithm for Blind Signal Adaptation in Wireless Communications 一种改进的恒模算法用于无线通信中的盲信号自适应
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.364
Emmanuel Adotse Otsapa
While the Constant Modulus Algorithm (CMA) is the most often used blind signal equalization or adaptation technique, it converges slowly and produces excessive Side Lobe Level (SLL) radiation, which wastes energy and interferes with other equipment. Additionally, interfering signals may be picked up by side lobes, increasing the noise level in the receiver. A normalized constant-modulus method with adjustable step size was devised, which considerably increased its convergence rate. The Blackman window was also applied to the CMA to lower the SLL. The designed beamformer improved convergence rate by 40%, as observed by lower Mean Square Error (MSE) to Signal to Interference plus Noise Ratio (SINR) values. As a result, the beam former is a viable alternative in an environment where channel conditions are constantly changing. Furthermore, the use of the Blackman window had the ability to minimize the Peak Side Lobe Level (PSLL) and resulted in a 5 dB improvement over CMA for the SLL rejection gain. As compared to the conventional CMA, the Improved CMA displayed the highest reduction in PSLL with quick convergence capabilities and saved a lot of energy wastage due to side lobes minimization. These characteristics make the ICMA a potential choice for advanced wireless applications
恒模算法(Constant Modulus Algorithm, CMA)是最常用的盲信号均衡或自适应技术,但其收敛速度慢,产生过多的旁瓣电平(Side Lobe Level, SLL)辐射,不仅浪费能量,还会干扰其他设备。此外,干扰信号可能被旁瓣拾取,增加了接收机中的噪声水平。设计了一种步长可调的归一化常模方法,大大提高了算法的收敛速度。Blackman窗口也被应用于CMA以降低SLL。通过较低的均方误差(MSE)和信噪比(SINR)可以观察到,所设计的波束形成器将收敛速率提高了40%。因此,波束形成器在信道条件不断变化的环境中是一种可行的替代方案。此外,Blackman窗口的使用能够最小化峰值旁瓣电平(PSLL),并导致SLL抑制增益比CMA提高5 dB。与传统的CMA相比,改进的CMA显示出最大的PSLL降低,具有快速收敛能力,并且由于最小化了侧叶而节省了大量的能量浪费。这些特点使ICMA成为先进无线应用的潜在选择
{"title":"An Improved Constant Modulus Algorithm for Blind Signal Adaptation in Wireless Communications","authors":"Emmanuel Adotse Otsapa","doi":"10.56471/slujst.v6i.364","DOIUrl":"https://doi.org/10.56471/slujst.v6i.364","url":null,"abstract":"While the Constant Modulus Algorithm (CMA) is the most often used blind signal equalization or adaptation technique, it converges slowly and produces excessive Side Lobe Level (SLL) radiation, which wastes energy and interferes with other equipment. Additionally, interfering signals may be picked up by side lobes, increasing the noise level in the receiver. A normalized constant-modulus method with adjustable step size was devised, which considerably increased its convergence rate. The Blackman window was also applied to the CMA to lower the SLL. The designed beamformer improved convergence rate by 40%, as observed by lower Mean Square Error (MSE) to Signal to Interference plus Noise Ratio (SINR) values. As a result, the beam former is a viable alternative in an environment where channel conditions are constantly changing. Furthermore, the use of the Blackman window had the ability to minimize the Peak Side Lobe Level (PSLL) and resulted in a 5 dB improvement over CMA for the SLL rejection gain. As compared to the conventional CMA, the Improved CMA displayed the highest reduction in PSLL with quick convergence capabilities and saved a lot of energy wastage due to side lobes minimization. These characteristics make the ICMA a potential choice for advanced wireless applications","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135949922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Diabetes Mellitus using Machine Learning Algorithms: Comparative Analysis of K-Nearest Neighbor, Random Forest and Logistic Regression 用机器学习算法预测糖尿病:k近邻、随机森林和逻辑回归的比较分析
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.319
A. Adeshina
Diabetes Mellitus is a chronic and one of the deadliest diseases. Diabetes disease increases the risk of long-term complications, including heart diseases and kidney failures, among others. Undoubtedly, Diabetes Mellitus patients may live longer and lead healthier lives if the disease is detected early. Over the years, several efforts have been on more accurate and early detection procedures to safe patients of Diabetes Mellitus. Interestingly, with the applications of Information Technology to the disease diagnoses and therapy managements, more attention has been on using machine learning in the predictions and early detection of Diabetes Mellitus. Unfortunately, determining the most appropriate machine learning algorithm with the best performance in terms of optimum accuracy still remains a challenge. The study proposes a framework for Diabetes Mellitus detection using Machine Learning Algorithms. The proposed framework was evaluated using K-nearest neighbor (KNN), Random Forest (RF), and Logistic Regression (LR). Extensive experiments were conducted to analyze the performance of the framework focusing on four distinct different clinical datasets. To ensure robust, web compatible framework, Python and its popular data science related packages, Pandas, Numpy, Seaborn, Matplotlib and Pickle were used for the implementation. Significantly, using the standard datasets obtained from the National Institute of Diabetes and Kidney Disease, Random Forest was able to predict Diabetes Mellitus in the datasets with the best accuracy of 93.4 %.
糖尿病是一种慢性病,也是最致命的疾病之一。糖尿病会增加长期并发症的风险,包括心脏病和肾衰竭等。毫无疑问,如果早期发现糖尿病,患者可能会活得更长,生活更健康。多年来,人们一直在努力寻找更准确、更早期的检测方法,以确保糖尿病患者的安全。有趣的是,随着信息技术在疾病诊断和治疗管理中的应用,机器学习在糖尿病预测和早期检测中的应用越来越受到关注。不幸的是,就最佳精度而言,确定最合适的机器学习算法仍然是一个挑战。该研究提出了一个使用机器学习算法检测糖尿病的框架。使用k近邻(KNN)、随机森林(RF)和逻辑回归(LR)对所提出的框架进行了评估。我们进行了大量的实验来分析该框架的性能,重点关注四个不同的临床数据集。为了确保框架的健壮性,web兼容,Python及其流行的数据科学相关软件包,Pandas, Numpy, Seaborn, Matplotlib和Pickle被用于实现。值得注意的是,使用从国家糖尿病和肾脏疾病研究所获得的标准数据集,Random Forest能够以93.4%的最佳准确率预测数据集中的糖尿病。
{"title":"Prediction of Diabetes Mellitus using Machine Learning Algorithms: Comparative Analysis of K-Nearest Neighbor, Random Forest and Logistic Regression","authors":"A. Adeshina","doi":"10.56471/slujst.v6i.319","DOIUrl":"https://doi.org/10.56471/slujst.v6i.319","url":null,"abstract":"Diabetes Mellitus is a chronic and one of the deadliest diseases. Diabetes disease increases the risk of long-term complications, including heart diseases and kidney failures, among others. Undoubtedly, Diabetes Mellitus patients may live longer and lead healthier lives if the disease is detected early. Over the years, several efforts have been on more accurate and early detection procedures to safe patients of Diabetes Mellitus. Interestingly, with the applications of Information Technology to the disease diagnoses and therapy managements, more attention has been on using machine learning in the predictions and early detection of Diabetes Mellitus. Unfortunately, determining the most appropriate machine learning algorithm with the best performance in terms of optimum accuracy still remains a challenge. The study proposes a framework for Diabetes Mellitus detection using Machine Learning Algorithms. The proposed framework was evaluated using K-nearest neighbor (KNN), Random Forest (RF), and Logistic Regression (LR). Extensive experiments were conducted to analyze the performance of the framework focusing on four distinct different clinical datasets. To ensure robust, web compatible framework, Python and its popular data science related packages, Pandas, Numpy, Seaborn, Matplotlib and Pickle were used for the implementation. Significantly, using the standard datasets obtained from the National Institute of Diabetes and Kidney Disease, Random Forest was able to predict Diabetes Mellitus in the datasets with the best accuracy of 93.4 %.","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Facial Recognition using Locality Preserving Projection Algorithm 基于局部保持投影算法的人脸识别
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.315
A. Adeshina
Facial Recognition Technology (FRT) has become the research object of many in the recent times considering the challenges with enormous increase in human population. The face as the main axis in social relations plays an important role in the representation of human identity, which requires an increased level of security and the creation of exchange tricks for safe and recognizable evidence and innovations of individual authentication. Apparently, facial recognition is widely adopted for security reasons, and the uniqueness of human characteristics has increased the popularity of facial recognition technology systems worldwide. Law enforcement agencies faced the problem of the impossibility of proper investigation of criminal cases. Suspects are often difficult to catch and the wrong persons may be arrested due to the basis and methods adopted for the investigation. This study proposes a facial recognition system for the identification of criminals using Locality Preserving Projection (LPP) Algorithm. The development of the system involves specification of the functions resulting from the performance analysis obtained from other related systems, and the translation of the developed model into the design of the proposed system. The framework was evaluated by matching the faces of people extracted through special cameras with the images of people on a watch list. Watch lists that contain images of people, including people not suspected of wrong doings. Strategically, the implementation of the facial recognition system was achieved with Locality Preserving Projection (LPP) Algorithm to improve the feature extraction methods and dimensionality reduction techniques. Cascading Style Sheets (CSS) was used for describing the presentation of the document written in HTML language and JavaScript for the front-end for optimum web compatibility. A Python binding of the cross-platform Qt GUI toolkit and Python plugin were used to implement the graphical user interface for detecting and recognizing images and the presence of an individual upon entering the database library. Interestingly, the developed framework recorded accuracy and recognition >95% capacity under normal conditions, including lighting and distance from camera and at a reasonably cheaper cost in comparison with previously proposed Facial Recognition Technology
面对人口急剧增长带来的挑战,人脸识别技术(FRT)近年来成为众多研究对象。脸作为社会关系的主轴,在人类身份的表征中发挥着重要作用,这需要提高安全水平,创造交换技巧,以获得安全和可识别的证据,并创新个人身份验证。显然,出于安全原因,人脸识别被广泛采用,人类特征的独特性增加了人脸识别技术系统在全球的普及程度。执法机关面临着无法对刑事案件进行适当调查的问题。由于侦查的依据和方法不同,犯罪嫌疑人往往难以抓捕,可能会抓错人。本研究提出一种基于局部保持投影(Locality Preserving Projection, LPP)算法的人脸识别系统。系统的开发包括从其他相关系统获得的性能分析得出的功能规范,以及将开发的模型转化为拟议系统的设计。该框架通过将通过特殊摄像机提取的人脸与监视名单上的人的图像进行匹配来评估。监视名单包含人物的图像,包括没有犯罪嫌疑的人。在策略上,采用局部保持投影(Locality Preserving Projection, LPP)算法改进特征提取方法和降维技术,实现了人脸识别系统的实现。层叠样式表(CSS)用于描述用HTML语言和JavaScript编写的文档的表示,以获得最佳的web兼容性。跨平台Qt GUI工具包和Python插件的Python绑定用于实现图形用户界面,用于检测和识别图像以及进入数据库库时个人的存在。有趣的是,与之前提出的面部识别技术相比,开发的框架在正常条件下(包括光照和与相机的距离)的准确率和识别率超过95%,成本也相对较低
{"title":"Facial Recognition using Locality Preserving Projection Algorithm","authors":"A. Adeshina","doi":"10.56471/slujst.v6i.315","DOIUrl":"https://doi.org/10.56471/slujst.v6i.315","url":null,"abstract":"Facial Recognition Technology (FRT) has become the research object of many in the recent times considering the challenges with enormous increase in human population. The face as the main axis in social relations plays an important role in the representation of human identity, which requires an increased level of security and the creation of exchange tricks for safe and recognizable evidence and innovations of individual authentication. Apparently, facial recognition is widely adopted for security reasons, and the uniqueness of human characteristics has increased the popularity of facial recognition technology systems worldwide. Law enforcement agencies faced the problem of the impossibility of proper investigation of criminal cases. Suspects are often difficult to catch and the wrong persons may be arrested due to the basis and methods adopted for the investigation. This study proposes a facial recognition system for the identification of criminals using Locality Preserving Projection (LPP) Algorithm. The development of the system involves specification of the functions resulting from the performance analysis obtained from other related systems, and the translation of the developed model into the design of the proposed system. The framework was evaluated by matching the faces of people extracted through special cameras with the images of people on a watch list. Watch lists that contain images of people, including people not suspected of wrong doings. Strategically, the implementation of the facial recognition system was achieved with Locality Preserving Projection (LPP) Algorithm to improve the feature extraction methods and dimensionality reduction techniques. Cascading Style Sheets (CSS) was used for describing the presentation of the document written in HTML language and JavaScript for the front-end for optimum web compatibility. A Python binding of the cross-platform Qt GUI toolkit and Python plugin were used to implement the graphical user interface for detecting and recognizing images and the presence of an individual upon entering the database library. Interestingly, the developed framework recorded accuracy and recognition >95% capacity under normal conditions, including lighting and distance from camera and at a reasonably cheaper cost in comparison with previously proposed Facial Recognition Technology","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models Comparison Based On Intrusion Detection Using Machine Learning 基于机器学习的入侵检测模型比较
Pub Date : 2023-03-31 DOI: 10.56471/slujst.v6i.358
Maimuna Yusuf Ma’aji
Network security is the greatest challenges in our current generation. Network intrusion detection (NID) is one of the fundamental techniques used to protect computer networks from threads. However, there is contemplation on the possibility and sustainability of the traditional approaches employed especially with the current modern networks. Recently, majority of the researchers employ the application of machine learning models such as logistic regression (LR), random forest (RF), K-nearest neighbor (KNN) and Support Vector Machines (SVM) among others to address the NID problem. In this research, the Network intrusion classification system has been analyzed based on KDD Cup ’99 data set. In the classifier implementation section, the three most widely used models were employed; K-nearest neighbor, random forest and logistic regression as our classification algorithms. The attack detection accuracy and training time was used to evaluate the models. The random forest provides the best detection accuracy of 99.5% and 74 second training time provide by logistic regression
网络安全是我们这一代人面临的最大挑战。网络入侵检测(NID)是保护计算机网络免受线程攻击的基本技术之一。然而,人们对传统方法的可能性和可持续性进行了思考,特别是在当前的现代网络中。近年来,大多数研究人员采用逻辑回归(LR)、随机森林(RF)、k近邻(KNN)和支持向量机(SVM)等机器学习模型来解决NID问题。本研究对基于KDD Cup ' 99数据集的网络入侵分类系统进行了分析。在分类器实现部分,采用了三种最常用的模型;k近邻、随机森林和逻辑回归作为分类算法。利用攻击检测精度和训练时间对模型进行评价。随机森林的检测准确率为99.5%,逻辑回归的训练时间为74秒
{"title":"Models Comparison Based On Intrusion Detection Using Machine Learning","authors":"Maimuna Yusuf Ma’aji","doi":"10.56471/slujst.v6i.358","DOIUrl":"https://doi.org/10.56471/slujst.v6i.358","url":null,"abstract":"Network security is the greatest challenges in our current generation. Network intrusion detection (NID) is one of the fundamental techniques used to protect computer networks from threads. However, there is contemplation on the possibility and sustainability of the traditional approaches employed especially with the current modern networks. Recently, majority of the researchers employ the application of machine learning models such as logistic regression (LR), random forest (RF), K-nearest neighbor (KNN) and Support Vector Machines (SVM) among others to address the NID problem. In this research, the Network intrusion classification system has been analyzed based on KDD Cup ’99 data set. In the classifier implementation section, the three most widely used models were employed; K-nearest neighbor, random forest and logistic regression as our classification algorithms. The attack detection accuracy and training time was used to evaluate the models. The random forest provides the best detection accuracy of 99.5% and 74 second training time provide by logistic regression","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124035123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
SLU Journal of Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1