首页 > 最新文献

International Journal of Software Engineering and Computer Systems最新文献

英文 中文
Sentiment Classification of Tweets with Explicit Word Negations and Emoji Using Deep Learning 基于深度学习的带有明确词否定和表情符号的推文情感分类
Pub Date : 2023-07-29 DOI: 10.15282/ijsecs.9.2.2023.3.0114
Mdurvwa Usiju Ijairi, M. Abdullahi, Ibrahim Hayatu Hassan
The widespread use of social media platforms such as Twitter, Instagram, Facebook, and LinkedIn have had a huge impact on daily human interactions and decision-making. Owing to Twitter's widespread acceptance, users can express their opinions/sentiments on nearly any issue, ranging from public opinion, a product/service, to even a specific group of people. Sharing these opinions/sentiments results in a massive production of user content known as tweets, which can be assessed to generate new knowledge. Corporate insights, government policy formation, decision-making, and brand identity monitoring all benefit from analyzing the opinions/sentiments expressed in these tweets. Even though several techniques have been created to analyze user sentiments from tweets, social media engagements include negation words and emoji elements that, if not properly pre-processed, would result in misclassification. The majority of available pre-processing techniques rely on clean data and machine learning algorithms to annotate sentiment in unlabeled texts. In this study, we propose a text pre-processing approach that takes into consideration negation words and emoji characteristics in text data by translating these features into single contextual words in tweets to minimize context loss. The proposed preprocessor was evaluated on benchmark Twitter datasets using four deep learning algorithms: Long Short-Term Memory (LSTM), Recurrent Neural Network (RNN), and Artificial Neural Network (ANN). The results showed that LSTM performed better than the approaches already discussed in the literature, with an accuracy of 96.36%, 88.41%, and 95.39%. The findings also suggest that pre-processing information like emoji and explicit word negations aids in the preservation of sentimental information. This appears to be the first study to classify sentiments in tweets while accounting for both explicit word negation conversion and emoji translation.
Twitter、Instagram、Facebook和LinkedIn等社交媒体平台的广泛使用,对日常人际互动和决策产生了巨大影响。由于Twitter的广泛接受,用户可以对几乎任何问题表达他们的意见/情绪,从公众意见,产品/服务,甚至是特定的人群。分享这些观点/情绪会产生大量的用户内容,这些内容被称为推文,可以通过评估来产生新的知识。企业洞察、政府政策形成、决策和品牌识别监控都受益于分析这些推文中表达的观点/情绪。尽管已经开发了几种技术来分析推文中的用户情绪,但社交媒体互动包括否定词和表情符号元素,如果不进行适当的预处理,就会导致错误分类。大多数可用的预处理技术依赖于干净的数据和机器学习算法来注释未标记文本中的情感。在本研究中,我们提出了一种文本预处理方法,该方法将文本数据中的否定词和表情符号特征转化为tweet中的单个上下文词,以最大限度地减少上下文丢失。使用长短期记忆(LSTM)、递归神经网络(RNN)和人工神经网络(ANN)四种深度学习算法在基准Twitter数据集上对所提出的预处理器进行了评估。结果表明,LSTM的准确率分别为96.36%、88.41%和95.39%,优于文献中讨论的方法。研究结果还表明,预处理表情符号和明确的单词否定等信息有助于保存情感信息。这似乎是第一个对推文中的情绪进行分类的研究,同时考虑到明确的单词否定转换和表情符号翻译。
{"title":"Sentiment Classification of Tweets with Explicit Word Negations and Emoji Using Deep Learning","authors":"Mdurvwa Usiju Ijairi, M. Abdullahi, Ibrahim Hayatu Hassan","doi":"10.15282/ijsecs.9.2.2023.3.0114","DOIUrl":"https://doi.org/10.15282/ijsecs.9.2.2023.3.0114","url":null,"abstract":"The widespread use of social media platforms such as Twitter, Instagram, Facebook, and LinkedIn have had a huge impact on daily human interactions and decision-making. Owing to Twitter's widespread acceptance, users can express their opinions/sentiments on nearly any issue, ranging from public opinion, a product/service, to even a specific group of people. Sharing these opinions/sentiments results in a massive production of user content known as tweets, which can be assessed to generate new knowledge. Corporate insights, government policy formation, decision-making, and brand identity monitoring all benefit from analyzing the opinions/sentiments expressed in these tweets. Even though several techniques have been created to analyze user sentiments from tweets, social media engagements include negation words and emoji elements that, if not properly pre-processed, would result in misclassification. The majority of available pre-processing techniques rely on clean data and machine learning algorithms to annotate sentiment in unlabeled texts. In this study, we propose a text pre-processing approach that takes into consideration negation words and emoji characteristics in text data by translating these features into single contextual words in tweets to minimize context loss. The proposed preprocessor was evaluated on benchmark Twitter datasets using four deep learning algorithms: Long Short-Term Memory (LSTM), Recurrent Neural Network (RNN), and Artificial Neural Network (ANN). The results showed that LSTM performed better than the approaches already discussed in the literature, with an accuracy of 96.36%, 88.41%, and 95.39%. The findings also suggest that pre-processing information like emoji and explicit word negations aids in the preservation of sentimental information. This appears to be the first study to classify sentiments in tweets while accounting for both explicit word negation conversion and emoji translation.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"131 4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87620870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Mapping on Android-based Platform for Smart Inventory System 基于android平台的智能库存系统制图
Pub Date : 2023-07-29 DOI: 10.15282/ijsecs.9.2.2023.1.0112
Noor Aisha Abdul Rahman, Nur Syazana Ahmad Jefiruddin, Z. Ahmad Zukarnain, Nor Asma Mohd Zin
Inventory tracking is one of the most crucial aspects in business strategy. Effective inventory system can help the prevention of stockouts, effective management of different locations, as well as the maintenance of accurate records in a business. Nowadays, digitalization is a critical component of business operations. Digitalization is the process of implementing new digital technology into all aspects of a company's operations, resulting in a significant change in how the business operates. A systematic mapping has been performed on Android-based for smart inventory system by using digitalized technology which is barcoding technology. The mapping are done by conducting systematic mapping process for analyzing related research areas on barcode and inventory system. Two research questions and related keywords are initiated for identifying possible operating system platforms in developing a smart inventory system with barcoding technology for tracking product items.
库存跟踪是企业战略中最重要的方面之一。有效的库存系统可以帮助防止缺货,有效地管理不同的地点,以及保持准确的记录在一个企业。如今,数字化是商业运作的关键组成部分。数字化是将新的数字技术应用到公司运营的各个方面,从而导致业务运作方式发生重大变化的过程。在基于android的智能库存系统中,采用数字化技术——条形码技术进行了系统的测绘。通过对条形码和库存系统相关研究领域的分析,进行系统的制图过程。本文提出了两个研究问题和相关关键词,以确定在开发具有条形码技术的智能库存系统中可能的操作系统平台。
{"title":"A Systematic Mapping on Android-based Platform for Smart Inventory System","authors":"Noor Aisha Abdul Rahman, Nur Syazana Ahmad Jefiruddin, Z. Ahmad Zukarnain, Nor Asma Mohd Zin","doi":"10.15282/ijsecs.9.2.2023.1.0112","DOIUrl":"https://doi.org/10.15282/ijsecs.9.2.2023.1.0112","url":null,"abstract":"Inventory tracking is one of the most crucial aspects in business strategy. Effective inventory system can help the prevention of stockouts, effective management of different locations, as well as the maintenance of accurate records in a business. Nowadays, digitalization is a critical component of business operations. Digitalization is the process of implementing new digital technology into all aspects of a company's operations, resulting in a significant change in how the business operates. A systematic mapping has been performed on Android-based for smart inventory system by using digitalized technology which is barcoding technology. The mapping are done by conducting systematic mapping process for analyzing related research areas on barcode and inventory system. Two research questions and related keywords are initiated for identifying possible operating system platforms in developing a smart inventory system with barcoding technology for tracking product items.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85416359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol Efficiency Using Multiple Level Encoding in Quantum Secure Direct Communication Protocol 量子安全直接通信协议中多级编码的协议效率
Pub Date : 2023-07-29 DOI: 10.15282/ijsecs.9.2.2023.4.0115
Nur Syuhada Mohamad Rodzi, Nur Shahirah Azahari, Nur Ziadah Harun
One of the objectives of information security is to maintain the confidentiality and integrity of the information by ensuring that information is transferred in a way that is secure from any listener or attacker. There was no comparison experiment conducted in earlier studies regarding different level encoding performance towards the multiphoton technique. In Quantum Secure Direct Communication (QSDC), when unpolarized light enters into the polarizer, the light value will be changed into a different value when it hit the Half Wave Plate (HWP) along the quantum communication channel. The multiphoton technique in the earlier study is particular to transmission time for data transfer encoding and extra time for polarizers to change polarization angles, both of which contribute to longer transmission times. With four different sizes of qubits, the three simulation experiments are carried out using Python coding with 2,4 and 8 levels of encoding. Experiment results demonstrate that the most efficient average photon transmission derived from 18 qubit size ranges from 98.71% to 98.73% depending on encoding level. With 18 qubit size, the four-level encoding result has the highest average efficiency, followed by the eight-level and two-level encodings, respectively. 4-level encoding exhibits the highest average photon efficiency between 2 and 8-level encoding.
信息安全的目标之一是维护信息的机密性和完整性,确保信息以一种对任何侦听者或攻击者都安全的方式传输。在以往的研究中,并没有对多光子技术的不同级别编码性能进行对比实验。在量子安全直接通信(QSDC)中,当非偏振光进入偏振器时,沿量子通信信道到达半波片(HWP)时,光值会发生变化。先前研究的多光子技术特别关注数据传输编码的传输时间和偏振器改变偏振角的额外时间,这两者都有助于延长传输时间。在四种不同大小的量子比特下,使用Python编码进行了三次模拟实验,分别为2级、4级和8级编码。实验结果表明,根据编码水平的不同,18量子比特的平均光子传输效率在98.71% ~ 98.73%之间。在18量子位的情况下,4级编码结果的平均效率最高,8级编码次之,2级编码次之。4级编码在2级和8级编码之间表现出最高的平均光子效率。
{"title":"Protocol Efficiency Using Multiple Level Encoding in Quantum Secure Direct Communication Protocol","authors":"Nur Syuhada Mohamad Rodzi, Nur Shahirah Azahari, Nur Ziadah Harun","doi":"10.15282/ijsecs.9.2.2023.4.0115","DOIUrl":"https://doi.org/10.15282/ijsecs.9.2.2023.4.0115","url":null,"abstract":"One of the objectives of information security is to maintain the confidentiality and integrity of the information by ensuring that information is transferred in a way that is secure from any listener or attacker. There was no comparison experiment conducted in earlier studies regarding different level encoding performance towards the multiphoton technique. In Quantum Secure Direct Communication (QSDC), when unpolarized light enters into the polarizer, the light value will be changed into a different value when it hit the Half Wave Plate (HWP) along the quantum communication channel. The multiphoton technique in the earlier study is particular to transmission time for data transfer encoding and extra time for polarizers to change polarization angles, both of which contribute to longer transmission times. With four different sizes of qubits, the three simulation experiments are carried out using Python coding with 2,4 and 8 levels of encoding. Experiment results demonstrate that the most efficient average photon transmission derived from 18 qubit size ranges from 98.71% to 98.73% depending on encoding level. With 18 qubit size, the four-level encoding result has the highest average efficiency, followed by the eight-level and two-level encodings, respectively. 4-level encoding exhibits the highest average photon efficiency between 2 and 8-level encoding.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134920305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS 确保物联网医疗应用和区块链的安全:应对安全攻击
Pub Date : 2023-07-29 DOI: 10.15282/ijsecs.9.2.2023.5.0116
S. Usman, Shahnurin Khanam Sanchi, Muhammad Idris, Sadiq Abubakar Zagga
The Internet of Things (IoT) describes the connection of bodily devices as "things" that can communicate with other systems and devices through the Internet and exchange statistics (data or information), facilitating the exchange of data with other systems and devices. These devices have sensors, software, and various components designed to exchange data seamlessly within the IoT network. Securing and protecting the data transmitted over the Internet from unauthorized access is imperative to ensuring the integrity and confidentiality of the information. IoT Smart health monitoring systems, integral components of the IoT landscape, are susceptible to various attacks. These include denial of service (DoS), fingerprint, router, select, forwarding, sensor, and replay attacks, all of which pose significant threats to the security of these systems. As such, there is a pressing need to address and mitigate the vulnerabilities associated with IoT healthcare applications. This paper aims to explore the significant role of IoT devices in healthcare systems and provide an in-depth review of attacks that threaten the security of IoT healthcare applications. The study analyses the existing literature on the vulnerabilities present in smart health monitoring systems and the potential application of blockchain technology as a robust solution to enhance the security of IoT healthcare applications. This research reveals critical vulnerabilities in IoT healthcare applications and highlights blockchain's effectiveness in mitigating them, providing insights for robust security measures and strategic decision-making in secure healthcare systems. This paper provides valuable insight and recommendations for policymakers, researchers, and practitioners involved in the domain of the IoT healthcare system.
物联网(IoT)是指将身体上的各种设备连接成 "物",这些 "物 "可以通过互联网与其他系统和设备进行通信并交换统计数据(数据或信息),从而促进与其他系统和设备的数据交换。这些设备拥有传感器、软件和各种组件,旨在物联网网络内无缝交换数据。要确保信息的完整性和保密性,就必须确保通过互联网传输的数据安全,防止未经授权的访问。物联网智能健康监测系统是物联网领域不可或缺的组成部分,容易受到各种攻击。这些攻击包括拒绝服务(DoS)攻击、指纹攻击、路由器攻击、选择攻击、转发攻击、传感器攻击和重放攻击,所有这些攻击都对这些系统的安全性构成重大威胁。因此,迫切需要解决和缓解与物联网医疗保健应用相关的漏洞。本文旨在探讨物联网设备在医疗保健系统中的重要作用,并对威胁物联网医疗保健应用安全的攻击进行深入评述。研究分析了现有文献中关于智能健康监测系统中存在的漏洞,以及区块链技术作为增强物联网医疗保健应用安全性的强大解决方案的潜在应用。这项研究揭示了物联网医疗保健应用中的关键漏洞,并强调了区块链在缓解这些漏洞方面的有效性,为安全医疗保健系统中的稳健安全措施和战略决策提供了深刻见解。本文为物联网医疗系统领域的政策制定者、研究人员和从业人员提供了宝贵的见解和建议。
{"title":"SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS","authors":"S. Usman, Shahnurin Khanam Sanchi, Muhammad Idris, Sadiq Abubakar Zagga","doi":"10.15282/ijsecs.9.2.2023.5.0116","DOIUrl":"https://doi.org/10.15282/ijsecs.9.2.2023.5.0116","url":null,"abstract":"The Internet of Things (IoT) describes the connection of bodily devices as \"things\" that can communicate with other systems and devices through the Internet and exchange statistics (data or information), facilitating the exchange of data with other systems and devices. These devices have sensors, software, and various components designed to exchange data seamlessly within the IoT network. Securing and protecting the data transmitted over the Internet from unauthorized access is imperative to ensuring the integrity and confidentiality of the information. IoT Smart health monitoring systems, integral components of the IoT landscape, are susceptible to various attacks. These include denial of service (DoS), fingerprint, router, select, forwarding, sensor, and replay attacks, all of which pose significant threats to the security of these systems. As such, there is a pressing need to address and mitigate the vulnerabilities associated with IoT healthcare applications. This paper aims to explore the significant role of IoT devices in healthcare systems and provide an in-depth review of attacks that threaten the security of IoT healthcare applications. The study analyses the existing literature on the vulnerabilities present in smart health monitoring systems and the potential application of blockchain technology as a robust solution to enhance the security of IoT healthcare applications. This research reveals critical vulnerabilities in IoT healthcare applications and highlights blockchain's effectiveness in mitigating them, providing insights for robust security measures and strategic decision-making in secure healthcare systems. This paper provides valuable insight and recommendations for policymakers, researchers, and practitioners involved in the domain of the IoT healthcare system.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139353943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Mobile Augmented Reality Application for Improving Learning of Electronic Component Module in TVET 移动增强现实技术在高职教育电子元件模块学习中的应用
Pub Date : 2023-07-29 DOI: 10.15282/ijsecs.9.2.2023.2.0113
Nalienaa Muthu, Faieza Abdul Aziz, L. N. Abdullah, M. Mokhtar, Muhd Khaizer Omar, Muhammad Amir Mustaqim Nazar
Teens and young adults may get training in anything from the basics to advanced skills in various workplace and academic settings at Technical and Vocational Education Training and Education (TVET) institutions. Some aspects of teaching and learning in TVET cannot be articulated clearly, and trainees cannot perceive how things fit together. The study was conducted to determine the optimal platform to develop mobile Augmented Reality applications for TVET trainees and, to assess the TVET trainee’s readiness for AR-based mobile application training deployment. An online questionnaire was sent to trainees at Industrial Training Institute in Malaysia via the online system. A marker-based Augmented Reality application was created for the Basic Electronic Components module utilizing Unity software, the Vuforia engine, and C# script. Finally, the trainees were allowed to test the generated application. The trainees were interviewed to obtain data on their responses. The results indicate that 83% of the TVET trainees own and use android as the application platform. The results of the pre-test and post-tests used to gauge the success of the Augmented Reality application show that its usage in the sub-learning module significantly improved memory recalls for the TVET trainees. The outcomes showed that the Augmented Reality application suited the participants' learning needs and improved the effectiveness of their learning. The result from this project will serve as a pre-test for determining the most suitable platform to deploy the Augmented Reality application to be developed in the future.
青少年和年轻人可以在技术和职业教育培训和教育(TVET)机构的各种工作场所和学术环境中接受从基础到高级技能的任何培训。技职教育中教与学的某些方面不能清晰地表达出来,受训者无法感知事物是如何结合在一起的。该研究旨在确定为TVET学员开发移动增强现实应用程序的最佳平台,并评估TVET学员对基于ar的移动应用程序培训部署的准备情况。通过在线系统向马来西亚工业培训学院的学员发送了一份在线问卷。使用Unity软件、Vuforia引擎和c#脚本,为Basic Electronic Components模块创建了一个基于标记的增强现实应用程序。最后,允许学员测试生成的应用程序。对受训者进行了访谈,以获取他们的回答数据。结果表明,83%的TVET学员拥有并使用android作为应用平台。用于衡量增强现实应用成功与否的前测和后测结果表明,在子学习模块中使用增强现实显著提高了受训人员的记忆回忆。结果表明,增强现实应用满足了参与者的学习需求,提高了他们的学习效率。该项目的结果将作为预测试,以确定最适合部署未来开发的增强现实应用程序的平台。
{"title":"The Mobile Augmented Reality Application for Improving Learning of Electronic Component Module in TVET","authors":"Nalienaa Muthu, Faieza Abdul Aziz, L. N. Abdullah, M. Mokhtar, Muhd Khaizer Omar, Muhammad Amir Mustaqim Nazar","doi":"10.15282/ijsecs.9.2.2023.2.0113","DOIUrl":"https://doi.org/10.15282/ijsecs.9.2.2023.2.0113","url":null,"abstract":"Teens and young adults may get training in anything from the basics to advanced skills in various workplace and academic settings at Technical and Vocational Education Training and Education (TVET) institutions. Some aspects of teaching and learning in TVET cannot be articulated clearly, and trainees cannot perceive how things fit together. The study was conducted to determine the optimal platform to develop mobile Augmented Reality applications for TVET trainees and, to assess the TVET trainee’s readiness for AR-based mobile application training deployment. An online questionnaire was sent to trainees at Industrial Training Institute in Malaysia via the online system. A marker-based Augmented Reality application was created for the Basic Electronic Components module utilizing Unity software, the Vuforia engine, and C# script. Finally, the trainees were allowed to test the generated application. The trainees were interviewed to obtain data on their responses. The results indicate that 83% of the TVET trainees own and use android as the application platform. The results of the pre-test and post-tests used to gauge the success of the Augmented Reality application show that its usage in the sub-learning module significantly improved memory recalls for the TVET trainees. The outcomes showed that the Augmented Reality application suited the participants' learning needs and improved the effectiveness of their learning. The result from this project will serve as a pre-test for determining the most suitable platform to deploy the Augmented Reality application to be developed in the future.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85345085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TWOFOLD FACE DETECTION APPROACH IN GENDER CLASSIFICATION USING DEEP LEARNING 基于深度学习的性别分类双人脸检测方法
Pub Date : 2023-05-19 DOI: 10.15282/ijsecs.9.1.2023.6.0110
Muhammad Firdaus B. Mustapha, Nur Maisarah Mohamad, Siti Haslini Ab Hamid
Face classification is a challenging task that is crucial to numerous applications. There are many algorithms for classifying gender, but their ability to evaluate their effectiveness regarding scientific data is constrained. Deep learning is popular among researchers in face classification problems. The detection of many faces is complicated and becomes a necessity in real problems. The proposed research aims to examine the effect of twofold face detection approach on the accuracy of gender classification, as well as the effect of using small datasets on accuracy. In this study, we use a small dataset to classify facial images based on their gender. The following phases involve deep learning methods along with the OpenCV library version 3.4.2 which is recommended to serve as a twofold face detection approach. In the experiments conducted, Phase 1 is the designated training phase, and Phase 2 serves as a testing phase. Two different algorithms are used in the testing phase to detect one face in the image (Experiment 1), while the remaining algorithm detects multiple faces in the image (Experiment 2). The FEI dataset is used to evaluate the accuracy of the proposed research, which results in 84% accuracy for Experiment 2 and 74% for Experiment 1, respectively.
人脸分类是一项具有挑战性的任务,对许多应用程序都至关重要。有许多分类性别的算法,但它们评估其在科学数据方面的有效性的能力受到限制。深度学习是人脸分类问题研究的热点。人脸检测是一个复杂的问题,在实际问题中是必须的。本研究旨在检验双重人脸检测方法对性别分类准确率的影响,以及使用小数据集对准确率的影响。在这项研究中,我们使用一个小的数据集来根据性别对面部图像进行分类。以下阶段涉及深度学习方法以及OpenCV库版本3.4.2,建议作为双重人脸检测方法。在进行的实验中,第一阶段是指定的训练阶段,第二阶段是测试阶段。在测试阶段使用了两种不同的算法来检测图像中的一张人脸(实验1),而剩下的算法则检测图像中的多张人脸(实验2)。使用FEI数据集来评估所提出研究的准确性,实验2和实验1的准确率分别为84%和74%。
{"title":"TWOFOLD FACE DETECTION APPROACH IN GENDER CLASSIFICATION USING DEEP LEARNING","authors":"Muhammad Firdaus B. Mustapha, Nur Maisarah Mohamad, Siti Haslini Ab Hamid","doi":"10.15282/ijsecs.9.1.2023.6.0110","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.6.0110","url":null,"abstract":"Face classification is a challenging task that is crucial to numerous applications. There are many algorithms for classifying gender, but their ability to evaluate their effectiveness regarding scientific data is constrained. Deep learning is popular among researchers in face classification problems. The detection of many faces is complicated and becomes a necessity in real problems. The proposed research aims to examine the effect of twofold face detection approach on the accuracy of gender classification, as well as the effect of using small datasets on accuracy. In this study, we use a small dataset to classify facial images based on their gender. The following phases involve deep learning methods along with the OpenCV library version 3.4.2 which is recommended to serve as a twofold face detection approach. In the experiments conducted, Phase 1 is the designated training phase, and Phase 2 serves as a testing phase. Two different algorithms are used in the testing phase to detect one face in the image (Experiment 1), while the remaining algorithm detects multiple faces in the image (Experiment 2). The FEI dataset is used to evaluate the accuracy of the proposed research, which results in 84% accuracy for Experiment 2 and 74% for Experiment 1, respectively.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82972664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOFTWARE POSITIONING TOOL TO SUPPORT SMES IN ADOPTION OF BIG DATA ANALYTICS USING A CASE STUDY APPLICATION 软件定位工具,通过案例研究应用程序支持中小企业采用大数据分析
Pub Date : 2023-05-02 DOI: 10.15282/ijsecs.9.1.2023.5.0109
Matthew Willetts, A. Atkins
Big Data Analytics is widely adopted by large companies but to a lesser extent by small to medium-sized enterprises (SMEs). SMEs comprise 99% of all businesses in the UK (6 million), employ 61% of the country’s workforce and generate over half of the turnover of the UK’s private sector (£2.1 trillion). SMEs represent 99% of all businesses in Europe and 90% worldwide. Therefore, assisting them to gain competitive advantage by the adoption of technology, such as Big Data Analytics is an important business initiative. The aim of this paper is to outline the process in which a positioning tool based on theoretical frameworks has been developed to help SMEs analyse their readiness to adopt Big Data Analytics using a case study. Previous work has identified 21 barriers to adoption and a methodology based on theoretical frameworks was developed to produce a positioning tool Holistic Big Data Analytics Framework for UK SMEs (HBDAF-UKSMEs). The paper outlines a case study based on a software development company to utilise this HBDAF-UKSMEs framework to assess the readiness using the proposed scoring tool for the adoption of Big Data Analytics based on three stages: pre-data analytics, business intelligence and Big Data Analytics.
大数据分析被大公司广泛采用,但中小企业(sme)的应用程度较低。中小企业占英国所有企业的99%(600万),雇佣了全国61%的劳动力,创造了英国私营部门一半以上的营业额(2.1万亿英镑)。中小企业占欧洲所有企业的99%,占全球企业的90%。因此,通过采用大数据分析等技术来帮助他们获得竞争优势是一项重要的业务举措。本文的目的是概述基于理论框架的定位工具的开发过程,通过案例研究帮助中小企业分析其采用大数据分析的准备情况。先前的工作已经确定了21个采用障碍,并开发了一种基于理论框架的方法,以产生定位工具英国中小企业整体大数据分析框架(HBDAF-UKSMEs)。本文概述了一个基于软件开发公司的案例研究,利用这个HBDAF-UKSMEs框架来评估采用大数据分析的准备情况,使用拟议的评分工具,基于三个阶段:数据前分析、商业智能和大数据分析。
{"title":"SOFTWARE POSITIONING TOOL TO SUPPORT SMES IN ADOPTION OF BIG DATA ANALYTICS USING A CASE STUDY APPLICATION","authors":"Matthew Willetts, A. Atkins","doi":"10.15282/ijsecs.9.1.2023.5.0109","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.5.0109","url":null,"abstract":"Big Data Analytics is widely adopted by large companies but to a lesser extent by small to medium-sized enterprises (SMEs). SMEs comprise 99% of all businesses in the UK (6 million), employ 61% of the country’s workforce and generate over half of the turnover of the UK’s private sector (£2.1 trillion). SMEs represent 99% of all businesses in Europe and 90% worldwide. Therefore, assisting them to gain competitive advantage by the adoption of technology, such as Big Data Analytics is an important business initiative. The aim of this paper is to outline the process in which a positioning tool based on theoretical frameworks has been developed to help SMEs analyse their readiness to adopt Big Data Analytics using a case study. Previous work has identified 21 barriers to adoption and a methodology based on theoretical frameworks was developed to produce a positioning tool Holistic Big Data Analytics Framework for UK SMEs (HBDAF-UKSMEs). The paper outlines a case study based on a software development company to utilise this HBDAF-UKSMEs framework to assess the readiness using the proposed scoring tool for the adoption of Big Data Analytics based on three stages: pre-data analytics, business intelligence and Big Data Analytics.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81990654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of Malay Root Word that Starts with Letter P in Malay e-Khutbah using Rule Based 基于规则的马来语e-Khutbah中以字母P开头的马来词根词提取
Pub Date : 2023-01-31 DOI: 10.15282/ijsecs.9.1.2023.4.0108
Nurhilyana Anuar, Zamri Abu Bakar, Normaly Kamal Ismail
Stemming is an important process in text processing especially in Natural Language Processing (NLP). It could extract root word from the affix words in the text. In addition, it helps in extracting useful information that contributes to many area of research study such as Information Retrieval. Several stemming algorithms have been discussed in previous studies. However, there are limited studies on Malay stemming process and the number of experimental data used. In this study, we focus on stemming process of Malay stemming algorithm by using rule-based algorithm for a larger dataset of Malay language text. The syntactic linguistic rule-based method was used in the stemming process involves of removing prefixes, suffixes and, prefixes and suffixes. Training dataset was used in this study which consisted of 3233 sentences from e-khutbah text. The result of the experimental evaluation was done by measuring the precision, recall and f-measure. It was found that the algorithm used in this study showed a promising result based on total of dataset used for each test. The value of precision, recall and F-measure increase to 95%, 97% and 97% respectively. The enhancement of the stemming process has shown a significant impact on Malay text processing which in general improved the performance of NLP applications.
词干提取是文本处理特别是自然语言处理(NLP)中的重要过程。它可以从文本中的词缀词中提取词根。此外,它有助于提取有用的信息,有助于许多领域的研究,如信息检索。在以前的研究中已经讨论了几种词干提取算法。然而,对马来语词干过程的研究和使用的实验数据数量有限。在本研究中,我们重点研究马来语词干提取算法的词干提取过程,并使用基于规则的算法对一个更大的马来语文本数据集进行分析。在词干提取过程中采用了基于句法语言学规则的方法,包括去除前缀、后缀和前缀后缀。本研究使用的训练数据集由来自e-khutbah文本的3233个句子组成。通过测量查全率、查全率和f-测度对实验结果进行了评价。研究发现,基于每个测试使用的数据集总数,本研究中使用的算法显示出令人满意的结果。精密度、召回率和f测量值分别提高到95%、97%和97%。词干提取过程的增强对马来语文本处理产生了重大影响,总体上提高了NLP应用程序的性能。
{"title":"Extraction of Malay Root Word that Starts with Letter P in Malay e-Khutbah using Rule Based","authors":"Nurhilyana Anuar, Zamri Abu Bakar, Normaly Kamal Ismail","doi":"10.15282/ijsecs.9.1.2023.4.0108","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.4.0108","url":null,"abstract":"Stemming is an important process in text processing especially in Natural Language Processing (NLP). It could extract root word from the affix words in the text. In addition, it helps in extracting useful information that contributes to many area of research study such as Information Retrieval. Several stemming algorithms have been discussed in previous studies. However, there are limited studies on Malay stemming process and the number of experimental data used. In this study, we focus on stemming process of Malay stemming algorithm by using rule-based algorithm for a larger dataset of Malay language text. The syntactic linguistic rule-based method was used in the stemming process involves of removing prefixes, suffixes and, prefixes and suffixes. Training dataset was used in this study which consisted of 3233 sentences from e-khutbah text. The result of the experimental evaluation was done by measuring the precision, recall and f-measure. It was found that the algorithm used in this study showed a promising result based on total of dataset used for each test. The value of precision, recall and F-measure increase to 95%, 97% and 97% respectively. The enhancement of the stemming process has shown a significant impact on Malay text processing which in general improved the performance of NLP applications.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87464664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation and Analysis of Crack Detection using UAV and CNN: A Case Study of Hospital Raja Permaisuri Bainun 基于无人机和CNN的裂纹检测研究与分析——以巴农医院为例
Pub Date : 2023-01-31 DOI: 10.15282/ijsecs.9.1.2023.2.0106
Goh Wei Sheng, Wan Isni Sofiah Wan Din, Quadri Waseem, A. Zabidi
Crack detection in old buildings has been shown to be inefficient, with many technical challenges such as physical inspection and difficult measurements. It is important to have an automatic, fast visual inspection of these building components to detect cracks by evaluating their conditions (impact) and the level of their risk. Unmanned Aerial Vehicles (UAV) can automate, avoid visual inspection, and avoid other physical check-ups of these buildings. Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF)that can be used with unmanned aerial vehicles (UAV). Therefore, we conducted a real-world experiment of crack detection at Hospital Raja Permaisuri Bainun using DJI Mavic Air (Drone Hardware) and DJI GO 4(Drone Software) using CNN through MATLAB software with CNN-SVM method with the accuracy rate of3.0 percent increased from 82.94%to 85.94%. in comparison with other ML algorithms like CNN Random Forest (RF), Support Vector Machine (SVM) and Artificial Neural Network (ANN).
老旧建筑的裂缝检测效率低下,存在许多技术挑战,如物理检测和测量困难。重要的是要对这些建筑构件进行自动、快速的视觉检查,通过评估它们的状况(影响)和风险水平来检测裂缝。无人驾驶飞行器(UAV)可以自动化,避免目视检查,并避免对这些建筑物进行其他物理检查。使用机器学习算法(MLA),特别是传统神经网络(CNN)以及无人驾驶飞行器(UAV)进行自动裂缝检测是有效的,两者可以有效地协同工作,使用图像处理技术检测建筑物中的裂缝。本研究项目的目的是评估目前可用的裂缝检测系统,并利用聚合通道特征(ACF)开发一种可与无人机(UAV)一起使用的自动裂缝检测系统。因此,我们使用大疆Mavic Air (Drone Hardware)和大疆GO 4(Drone Software),通过MATLAB软件使用CNN,采用CNN- svm方法,在Raja permanisuri Bainun医院进行了真实的裂缝检测实验,准确率从82.94%提高到85.94%,提高了3.0%。与CNN随机森林(RF)、支持向量机(SVM)和人工神经网络(ANN)等其他ML算法相比。
{"title":"Investigation and Analysis of Crack Detection using UAV and CNN: A Case Study of Hospital Raja Permaisuri Bainun","authors":"Goh Wei Sheng, Wan Isni Sofiah Wan Din, Quadri Waseem, A. Zabidi","doi":"10.15282/ijsecs.9.1.2023.2.0106","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.2.0106","url":null,"abstract":"Crack detection in old buildings has been shown to be inefficient, with many technical challenges such as physical inspection and difficult measurements. It is important to have an automatic, fast visual inspection of these building components to detect cracks by evaluating their conditions (impact) and the level of their risk. Unmanned Aerial Vehicles (UAV) can automate, avoid visual inspection, and avoid other physical check-ups of these buildings. Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF)that can be used with unmanned aerial vehicles (UAV). Therefore, we conducted a real-world experiment of crack detection at Hospital Raja Permaisuri Bainun using DJI Mavic Air (Drone Hardware) and DJI GO 4(Drone Software) using CNN through MATLAB software with CNN-SVM method with the accuracy rate of3.0 percent increased from 82.94%to 85.94%. in comparison with other ML algorithms like CNN Random Forest (RF), Support Vector Machine (SVM) and Artificial Neural Network (ANN).","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88151394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latest Advances on Security Architecture for 5GTechnology and Services 5g技术与服务安全架构最新进展
Pub Date : 2023-01-31 DOI: 10.15282/ijsecs.9.1.2023.3.0107
K. Shobowale, Z. Mukhtar, B. Yahaya, Y. Ibrahim, M. O. Momoh
The roll out of the deployment of the 5G technology has been ongoing globally. The deployment of the technologies associated with 5G has seen mixed reaction as regards its prospects to improve communication services in all spares of life amid its security concerns. The security concerns of 5G network lies in its architecture and other technologies that optimize the performance of its architecture. There are many fractions of 5G security architecture in the literature, a holistic security architectural structure will go a long way in tackling the security challenges. In this paper, the review of the security challenges of the 5G technology based on its architecture is presented along with their proposed solutions. This review was carried out with some keywords relating to 5G securities and architecture; this was used to retrieve appropriate literature for fitness of purpose. The 5G security architectures are majorly centered around the seven network security layers; thereby making each of the layers a source of security concern on the 5G network. Many of the 5G security challenges are related to authentication and authorization such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio access technology, smart-grid network and light fidelity. The implementation of these solutions should be reviewed on a timely basis because of the dynamic nature of threats which will greatly reduce the occurrence of security attacks on the 5G network.
5G技术的部署一直在全球范围内进行。在安全担忧的背景下,与5G相关的技术部署在改善生活各个领域通信服务的前景方面,引发了不同的反应。5G网络的安全问题在于其架构和优化其架构性能的其他技术。文献中有很多关于5G安全架构的碎片,一个整体的安全架构结构将有助于应对安全挑战。在本文中,基于其架构对5G技术的安全挑战进行了回顾,并提出了解决方案。本文对5G安全与架构相关的关键词进行了综述;这是用来检索适当的文献适合的目的。5G安全架构主要围绕七个网络安全层展开;从而使每一层都成为5G网络安全问题的来源。5G的许多安全挑战都与身份验证和授权有关,例如拒绝服务攻击、中间人攻击和窃听。已经提出了硬件(无人机,现场可编程逻辑阵列)和软件(人工智能,机器学习,区块链,统计过程控制)的不同方法来减轻威胁。其他适用于5G安全问题的技术包括:多无线接入技术、智能电网网络和光保真度。由于威胁的动态性,这些解决方案的实施应及时进行审查,这将大大减少5G网络安全攻击的发生。
{"title":"Latest Advances on Security Architecture for 5GTechnology and Services","authors":"K. Shobowale, Z. Mukhtar, B. Yahaya, Y. Ibrahim, M. O. Momoh","doi":"10.15282/ijsecs.9.1.2023.3.0107","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.3.0107","url":null,"abstract":"The roll out of the deployment of the 5G technology has been ongoing globally. The deployment of the technologies associated with 5G has seen mixed reaction as regards its prospects to improve communication services in all spares of life amid its security concerns. The security concerns of 5G network lies in its architecture and other technologies that optimize the performance of its architecture. There are many fractions of 5G security architecture in the literature, a holistic security architectural structure will go a long way in tackling the security challenges. In this paper, the review of the security challenges of the 5G technology based on its architecture is presented along with their proposed solutions. This review was carried out with some keywords relating to 5G securities and architecture; this was used to retrieve appropriate literature for fitness of purpose. The 5G security architectures are majorly centered around the seven network security layers; thereby making each of the layers a source of security concern on the 5G network. Many of the 5G security challenges are related to authentication and authorization such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio access technology, smart-grid network and light fidelity. The implementation of these solutions should be reviewed on a timely basis because of the dynamic nature of threats which will greatly reduce the occurrence of security attacks on the 5G network.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"63 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89677017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Software Engineering and Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1