首页 > 最新文献

International Journal of Software Engineering and Computer Systems最新文献

英文 中文
CHARACTERIZING SOFTWARE QUALITY ASSURANCE PRACTICES IN KENYA 描述肯尼亚的软件质量保证实践
Pub Date : 2022-02-21 DOI: 10.15282/ijsecs.8.1.2022.3.0093
Anthony Wambua Wambua, B. Maake
Given the increased reliance on technology, Software Quality Assurance(SQA) has become a vital area in Software Engineering (SE). SQA practices require training, cost and often take more time than actual code writing. Owing to these requirements, software developers often ignore or partly implement SQA practices, leading to potentially poor quality software development. The goal of the study is to characterise SQA practices of software developers in Kenya. As such, quantitative empirical research was conducted. Seventy-seven (N=77) completed questionnaires were received and analysed to yield the required insights. The analysis of the findings indicates compliance with SQA practices. However, the research unearths concerns such as failure to comply with Software Development Life Cycle (SDLC) models as having the potential to lower the quality of software products. The assessment found that Unit testing was the most common type of software test. Based on the findings and literature, recommendations are made. The need to improve software engineering education and invest in software testing is underscored. The results can be generalised to most developing countries and used by software developers and trainers to identify areas in SQA that need strengthening.
考虑到对技术的日益依赖,软件质量保证(SQA)已经成为软件工程(SE)中的一个重要领域。SQA实践需要培训,成本高,而且通常比实际编写代码花费更多的时间。由于这些需求,软件开发人员经常忽略或部分实现SQA实践,从而导致潜在的低质量软件开发。本研究的目的是描述肯尼亚软件开发人员的SQA实践。因此,本文进行了定量实证研究。共收到77份(N=77)完整的问卷,并对其进行分析,以获得所需的见解。对结果的分析表明符合SQA实践。然而,该研究揭示了一些问题,比如不遵守软件开发生命周期(SDLC)模型可能会降低软件产品的质量。评估发现单元测试是最常见的软件测试类型。根据研究结果和文献,提出建议。改进软件工程教育和投资软件测试的需要被强调。这些结果可以推广到大多数发展中国家,并被软件开发人员和培训人员用来确定SQA中需要加强的领域。
{"title":"CHARACTERIZING SOFTWARE QUALITY ASSURANCE PRACTICES IN KENYA","authors":"Anthony Wambua Wambua, B. Maake","doi":"10.15282/ijsecs.8.1.2022.3.0093","DOIUrl":"https://doi.org/10.15282/ijsecs.8.1.2022.3.0093","url":null,"abstract":"Given the increased reliance on technology, Software Quality Assurance(SQA) has become a vital area in Software Engineering (SE). SQA practices require training, cost and often take more time than actual code writing. Owing to these requirements, software developers often ignore or partly implement SQA practices, leading to potentially poor quality software development. The goal of the study is to characterise SQA practices of software developers in Kenya. As such, quantitative empirical research was conducted. Seventy-seven (N=77) completed questionnaires were received and analysed to yield the required insights. The analysis of the findings indicates compliance with SQA practices. However, the research unearths concerns such as failure to comply with Software Development Life Cycle (SDLC) models as having the potential to lower the quality of software products. The assessment found that Unit testing was the most common type of software test. Based on the findings and literature, recommendations are made. The need to improve software engineering education and invest in software testing is underscored. The results can be generalised to most developing countries and used by software developers and trainers to identify areas in SQA that need strengthening.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81213491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRID LOAD BALANCING ALGORITHM FOR FOG COMPUTING ENVIRONMENT 雾计算环境下的混合负载均衡算法
Pub Date : 2022-02-16 DOI: 10.15282/ijsecs.8.1.2022.2.0092
A. Abuhamdah, M. Al-Shabi
Fog computing has become a new trend in the Internet of things domain and cloud computing applications. It is a novel model to achieve the availability, flexibility and better responding time. In spite of that, there is so many challenges facing computing environments such as the misuse of the resources and load-balancing between them, which has a major effect on performance. The requirement of effective and robust load-balancing algorithms is one of the most significant interest in this field. Many researchers suggested various load-balancing algorithms in fog computing, but there is still inefficiency in the system performance and misalignment in load -balancing. This paper will provide a description of numerous concepts such as computing fog, fog nodes, load balancing and then we recommend a load-balancing algorithm to enhance the fog-computing environment performance, which is a hybrid algorithm benefits from the optimizing processing time (OPT) algorithms. In order to explore the proposed algorithm performance, a comparison made with other algorithms. Results indicates that using the proposed optimizing processing time algorithm in load-balancing algorithm has superior response and processing time than the compared algorithms to user requests, and the data total cost centre’s as well.
雾计算已经成为物联网领域和云计算应用的新趋势。它是一种实现可用性、灵活性和较好的响应时间的新颖模型。尽管如此,计算环境仍然面临着许多挑战,例如资源的滥用和它们之间的负载平衡,这对性能有很大的影响。对高效鲁棒负载均衡算法的需求是该领域最关注的问题之一。许多研究者在雾计算中提出了各种负载均衡算法,但仍然存在系统性能低下和负载均衡不均衡的问题。本文将对雾计算、雾节点、负载平衡等概念进行描述,然后推荐一种负载平衡算法来提高雾计算环境的性能,该算法是一种受益于优化处理时间(OPT)算法的混合算法。为了探究所提算法的性能,与其他算法进行了比较。结果表明,在负载均衡算法中使用所提出的优化处理时间算法,对用户请求的响应速度和处理时间均优于对比算法,数据总成本中心也优于对比算法。
{"title":"HYBRID LOAD BALANCING ALGORITHM FOR FOG COMPUTING ENVIRONMENT","authors":"A. Abuhamdah, M. Al-Shabi","doi":"10.15282/ijsecs.8.1.2022.2.0092","DOIUrl":"https://doi.org/10.15282/ijsecs.8.1.2022.2.0092","url":null,"abstract":"Fog computing has become a new trend in the Internet of things domain and cloud computing applications. It is a novel model to achieve the availability, flexibility and better responding time. In spite of that, there is so many challenges facing computing environments such as the misuse of the resources and load-balancing between them, which has a major effect on performance. The requirement of effective and robust load-balancing algorithms is one of the most significant interest in this field. Many researchers suggested various load-balancing algorithms in fog computing, but there is still inefficiency in the system performance and misalignment in load -balancing. This paper will provide a description of numerous concepts such as computing fog, fog nodes, load balancing and then we recommend a load-balancing algorithm to enhance the fog-computing environment performance, which is a hybrid algorithm benefits from the optimizing processing time (OPT) algorithms. In order to explore the proposed algorithm performance, a comparison made with other algorithms. Results indicates that using the proposed optimizing processing time algorithm in load-balancing algorithm has superior response and processing time than the compared algorithms to user requests, and the data total cost centre’s as well.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90217416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ENHANCEMENT OF GENERIC CODE CLONE DETECTION MODEL FOR PYTHON APPLICATION python应用中通用代码克隆检测模型的增强
Pub Date : 2022-01-24 DOI: 10.15282/ijsecs.8.1.2022.1.0092
Ilyana Najwa Aiza Asmad, Al-Fahim Mubarak Ali, Nik Intan Syahiddatul Ilani Jailani
Identical code fragments in different locations are recognized as code clones. There are four native terminologies of code clones concluded as Type-1, Type-2, Type-3 and Type-4. Code clones can be identified using various approaches and models. Generic Code Clone Detection (GCCD) model was created to detect all four terminologies of code clones through five processes. A prototype has been developed to detect code clones in Java programming language that starts with Pre-processing Transformation, Parameterization, Categorization and ends with the Match Detection process. Hence, this work targeted to enhance the prototype using a GCCD model to identify all clone types in Python language. Enhancements are done in the Pre-processing process and parameterization process of the GCCD model to fit the Python language criteria. Results are improved by finding the best constant value and suitable weightage according to Python language. Proposed enhancement results of the Python language clone detection in GCCD model imply that Public as the weightage indicator and def as the best constant value.
在不同位置的相同代码片段被识别为代码克隆。代码克隆有四种本地术语,归纳为Type-1、Type-2、Type-3和Type-4。可以使用各种方法和模型来识别代码克隆。建立了通用代码克隆检测(GCCD)模型,通过五个过程检测所有四种代码克隆术语。已经开发了一个原型来检测Java编程语言中的代码克隆,该原型从预处理转换、参数化、分类开始,以匹配检测过程结束。因此,本工作旨在使用GCCD模型增强原型,以识别Python语言中的所有克隆类型。在GCCD模型的预处理过程和参数化过程中进行了增强,以适应Python语言标准。通过根据Python语言找到最佳常数值和合适的权重来改进结果。提出的Python语言克隆检测在GCCD模型中的增强结果表明Public作为权重指标,并定义为最佳常数值。
{"title":"ENHANCEMENT OF GENERIC CODE CLONE DETECTION MODEL FOR PYTHON APPLICATION","authors":"Ilyana Najwa Aiza Asmad, Al-Fahim Mubarak Ali, Nik Intan Syahiddatul Ilani Jailani","doi":"10.15282/ijsecs.8.1.2022.1.0092","DOIUrl":"https://doi.org/10.15282/ijsecs.8.1.2022.1.0092","url":null,"abstract":"Identical code fragments in different locations are recognized as code clones. There are four native terminologies of code clones concluded as Type-1, Type-2, Type-3 and Type-4. Code clones can be identified using various approaches and models. Generic Code Clone Detection (GCCD) model was created to detect all four terminologies of code clones through five processes. A prototype has been developed to detect code clones in Java programming language that starts with Pre-processing Transformation, Parameterization, Categorization and ends with the Match Detection process. Hence, this work targeted to enhance the prototype using a GCCD model to identify all clone types in Python language. Enhancements are done in the Pre-processing process and parameterization process of the GCCD model to fit the Python language criteria. Results are improved by finding the best constant value and suitable weightage according to Python language. Proposed enhancement results of the Python language clone detection in GCCD model imply that Public as the weightage indicator and def as the best constant value.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"235 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77148977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A QOS ESTIMATION ALGORITHM FROM CALLER RINGTONE ANALYSIS IN GSM NETWORK 基于GSM网络来电铃声分析的qos估计算法
Pub Date : 2022-01-24 DOI: 10.15282/ijsecs.8.1.2022.6.0096
Oluwabukola Ayo-Bello, Abiodun Musa Aibinu, O. Ubadike, Adeiza James Onumanyi, Muyideen Omuya Momoh
Call Setup Time (CST) is one of the key performance indicators (KPIs) that Mobile Network Providers (MNPs) are mostly appertain. It has been established that long CST usually severely affects the user experience. Owing to the limitations associated with gleaning the CST data from MNPs, this paper provides the development of QoS estimation algorithm from various CST parameters. The algorithm involves the determination of CST; Inter-Burst time; Intra-Burst time and Call duration in time domain. The caller Frequency content was also determined by the application of fast Fourier Transform before computing the Mean Square Error (MSE). The eventual QoS rating is done after the computation of the MSE from various individual parameters. Four hourly data consisting of 10 sets each were collected three times in a week for four weeks for each MNP’s for creating Caller Ringtone dataset and testing the developed algorithm. Performance analysis of the system in accurately determining: CST; Intraburst time; Interburst time and Call durations were carried out. Results obtained shows that the proposed technique accurately computes these parameters and maximum error obtained was to the value of 10%. Furthermore, the QoS obtained shows an error margin of less than 5 % was observed when the developed technique was compared to the ground truth. Thus, the proposed algorithm was able to compute the QoS using Caller Ringtone only, thus independent of MNP.
呼叫建立时间(CST)是移动网络运营商(MNPs)最为关注的关键绩效指标之一。已经确定的是,长时间的CST通常严重影响用户体验。由于从MNPs中收集CST数据存在局限性,本文提供了基于各种CST参数的QoS估计算法的发展。该算法涉及到CST的确定;Inter-Burst时间;域内突发时间和呼叫持续时间。在计算均方误差(MSE)之前,应用快速傅里叶变换确定了呼叫者的频率内容。最终的QoS评级是在各种单独参数的MSE计算之后完成的。每个MNP每周收集三次每小时10组的数据,为期四周,用于创建来电铃声数据集并测试开发的算法。性能分析系统在准确确定:CST;Intraburst时间;计算突发时间和呼叫持续时间。结果表明,该方法能准确地计算这些参数,最大误差在10%以内。此外,所获得的QoS表明,当将所开发的技术与实际情况进行比较时,观察到的误差范围小于5%。因此,该算法能够仅使用来电铃声计算QoS,从而独立于MNP。
{"title":"A QOS ESTIMATION ALGORITHM FROM CALLER RINGTONE ANALYSIS IN GSM NETWORK","authors":"Oluwabukola Ayo-Bello, Abiodun Musa Aibinu, O. Ubadike, Adeiza James Onumanyi, Muyideen Omuya Momoh","doi":"10.15282/ijsecs.8.1.2022.6.0096","DOIUrl":"https://doi.org/10.15282/ijsecs.8.1.2022.6.0096","url":null,"abstract":"Call Setup Time (CST) is one of the key performance indicators (KPIs) that Mobile Network Providers (MNPs) are mostly appertain. It has been established that long CST usually severely affects the user experience. Owing to the limitations associated with gleaning the CST data from MNPs, this paper provides the development of QoS estimation algorithm from various CST parameters. The algorithm involves the determination of CST; Inter-Burst time; Intra-Burst time and Call duration in time domain. The caller Frequency content was also determined by the application of fast Fourier Transform before computing the Mean Square Error (MSE). The eventual QoS rating is done after the computation of the MSE from various individual parameters. Four hourly data consisting of 10 sets each were collected three times in a week for four weeks for each MNP’s for creating Caller Ringtone dataset and testing the developed algorithm. Performance analysis of the system in accurately determining: CST; Intraburst time; Interburst time and Call durations were carried out. Results obtained shows that the proposed technique accurately computes these parameters and maximum error obtained was to the value of 10%. Furthermore, the QoS obtained shows an error margin of less than 5 % was observed when the developed technique was compared to the ground truth. Thus, the proposed algorithm was able to compute the QoS using Caller Ringtone only, thus independent of MNP.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74707284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECRS TEMPLATE TO AID NOVICE DEVELOPERS IN SECURITY REQUIREMENTS IDENTIFICATION AND DOCUMENTATION Secrs模板帮助新手开发人员进行安全需求识别和文档编制
Pub Date : 2022-01-24 DOI: 10.15282/ijsecs.8.1.2022.5.0095
Nuzhat Qadir, R. Ahmad
The security requirements are one of the non-functional requirements (NFR) which acts as a constraint on the functions of the system to be built. Security requirements are important and may affect the entire quality of the system. Unfortunately, many organizations do not pay much attention to it. The security problems should be focused on the early phases of the development process i.e. in the requirements phase to stop the problems spreading down in the later phases and in turn to avoid the rework. Subsequently, when security requirements are to be focused, proper guidance should be provided which should assist requirements engineers. Many security requirements engineering methods were developed in the past which require different level of expertise such as SQUARE process which requires requirements engineer to have a certain level of security expertise. Moreover, it lacks proper guidance especially for novice developers in applying the existing security requirements engineering (SecRE) methods to identify security requirements. Hence, this study intends to address the gap by developing a guided template to assist novice developers in the security requirements identification and documentation. The main objectives of the research are: 1) to study and investigate the existing security requirements engineering (SecRE) methods. 2) To develop a template to aid novice developers in identifying and documenting security requirements. The developed template is applied to two case studies of software projects to determine its usability and applicability. The results of the case studies evaluation show that both the usability and applicability of the template is good. The template is also evaluated by several experts and software practitioners. The evaluation results show that the SecRS template is found to be satisfying the usability and applicability factors; thereby confirming that the proposed template achieves its desired objective of aiding the novice developers to identify and document security requirements correctly.
安全性需求是非功能需求(NFR)中的一种,它对要构建的系统的功能起约束作用。安全需求很重要,可能会影响整个系统的质量。不幸的是,许多组织并没有注意到这一点。安全问题应该集中在开发过程的早期阶段,即在需求阶段,以防止问题在后期阶段蔓延,从而避免返工。随后,当需要关注安全性需求时,应该提供适当的指导,以帮助需求工程师。过去开发的许多安全需求工程方法需要不同水平的专业知识,例如要求需求工程师具有一定水平的安全专业知识的SQUARE过程。此外,它缺乏适当的指导,特别是对于新手开发人员在应用现有的安全需求工程(SecRE)方法来识别安全需求方面。因此,本研究打算通过开发一个指导模板来解决这一差距,以帮助新手开发人员进行安全需求识别和文档编制。研究的主要目的是:1)研究和调查现有的安全需求工程(SecRE)方法。2)开发一个模板,帮助新手开发人员识别和记录安全需求。将所开发的模板应用于两个软件项目的案例研究,以确定其可用性和适用性。实例评价结果表明,该模板具有良好的可用性和适用性。该模板还由几位专家和软件从业者进行评估。评价结果表明,SecRS模板满足可用性和适用性因素;从而确认所建议的模板实现了帮助新手开发人员正确识别和记录安全需求的预期目标。
{"title":"SECRS TEMPLATE TO AID NOVICE DEVELOPERS IN SECURITY REQUIREMENTS IDENTIFICATION AND DOCUMENTATION","authors":"Nuzhat Qadir, R. Ahmad","doi":"10.15282/ijsecs.8.1.2022.5.0095","DOIUrl":"https://doi.org/10.15282/ijsecs.8.1.2022.5.0095","url":null,"abstract":"The security requirements are one of the non-functional requirements (NFR) which acts as a constraint on the functions of the system to be built. Security requirements are important and may affect the entire quality of the system. Unfortunately, many organizations do not pay much attention to it. The security problems should be focused on the early phases of the development process i.e. in the requirements phase to stop the problems spreading down in the later phases and in turn to avoid the rework. Subsequently, when security requirements are to be focused, proper guidance should be provided which should assist requirements engineers. Many security requirements engineering methods were developed in the past which require different level of expertise such as SQUARE process which requires requirements engineer to have a certain level of security expertise. Moreover, it lacks proper guidance especially for novice developers in applying the existing security requirements engineering (SecRE) methods to identify security requirements. Hence, this study intends to address the gap by developing a guided template to assist novice developers in the security requirements identification and documentation. The main objectives of the research are: 1) to study and investigate the existing security requirements engineering (SecRE) methods. 2) To develop a template to aid novice developers in identifying and documenting security requirements. The developed template is applied to two case studies of software projects to determine its usability and applicability. The results of the case studies evaluation show that both the usability and applicability of the template is good. The template is also evaluated by several experts and software practitioners. The evaluation results show that the SecRS template is found to be satisfying the usability and applicability factors; thereby confirming that the proposed template achieves its desired objective of aiding the novice developers to identify and document security requirements correctly.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75316331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OPTIMAL RESOURCE SCHEDULING ALGORITHM FOR OFDMA-BASED MULTICAST TRAFFIC DELIVERY OVER WIMAX NETWORKS USING PARTICLE SWARM OPTIMIZATION 基于粒子群算法的ofdma组播业务wimax网络资源调度优化算法
Pub Date : 2021-10-21 DOI: 10.15282/ijsecs.7.2.2021.6.0089
D. Aliu, M. O. Momoh
Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on the performance evaluation of the enhanced algorithm for ADR and CDR, the results for the various layers and uniform distribution of users over the full layers were 350Mbps, 525Mbps, 700Mbps, 1050Mbps, 1050Mbps, 1400Mbps, 1575Mbps, and 1398Mbps. 6.98Mbps, 10.48Mbps, 13.97Mbps, 20.95Mbps, 20.95Mbps, 27.94Mbps, 31.5Mbps, and 28Mbps were also achieved for CDR. The significance of optimal resource allocation is to achieved a maximum ADR and CDR. The results showed a fair distribution of resources within the coverage area of the network .
研究人员还没有完全规划出为移动微波接入全球互操作性(WiMAX)用户分配最佳资源的困难。提出了一种基于粒子群算法的WiMAX资源分配优化调度算法。在这项工作中,子组创建用于提供基于pso的技术,用于向移动WiMAX客户分配子载波和正交频分复用(OFDM)符号。WiMAX网络环境被组织成七层,每一层有七种不同的调制和编码算法,用于向用户发送数据包。采用改进的基于pso的WiMAX资源分配方法,实现了吞吐量最大化和信道数据速率的增强模型。通过对几种WiMAX多播业务场景的模拟,得到了各场景下的聚合数据速率(ADR)和信道数据速率(CDR)。通过对ADR和CDR增强算法的性能评估,各层和全层用户均匀分布的结果分别为350Mbps、525Mbps、700Mbps、1050Mbps、1050Mbps、1400Mbps、1575Mbps和1398Mbps。话单速率分别为6.98Mbps、10.48Mbps、13.97Mbps、20.95Mbps、20.95Mbps、27.94Mbps、31.5Mbps和28Mbps。资源优化配置的意义在于实现ADR和CDR的最大化。结果表明,在网络覆盖范围内,资源分配是公平的。
{"title":"OPTIMAL RESOURCE SCHEDULING ALGORITHM FOR OFDMA-BASED MULTICAST TRAFFIC DELIVERY OVER WIMAX NETWORKS USING PARTICLE SWARM OPTIMIZATION","authors":"D. Aliu, M. O. Momoh","doi":"10.15282/ijsecs.7.2.2021.6.0089","DOIUrl":"https://doi.org/10.15282/ijsecs.7.2.2021.6.0089","url":null,"abstract":"Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on the performance evaluation of the enhanced algorithm for ADR and CDR, the results for the various layers and uniform distribution of users over the full layers were 350Mbps, 525Mbps, 700Mbps, 1050Mbps, 1050Mbps, 1400Mbps, 1575Mbps, and 1398Mbps. 6.98Mbps, 10.48Mbps, 13.97Mbps, 20.95Mbps, 20.95Mbps, 27.94Mbps, 31.5Mbps, and 28Mbps were also achieved for CDR. The significance of optimal resource allocation is to achieved a maximum ADR and CDR. The results showed a fair distribution of resources within the coverage area of the network .","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82124529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
REDESIGNING POST-OPERATIVE PROCESSES USING DATA MINING CLASSIFICATION TECHNIQUES 使用数据挖掘分类技术重新设计术后流程
Pub Date : 2021-10-21 DOI: 10.15282/ijsecs.7.2.2021.7.0090
Hayder Ghazi Alwattar
Data mining classification models are developed and investigated in this paper. These models are adopted to develop and redesign several business processes based on post-operative data. Post-operative data were collected and used via the Waikato Environment for Knowledge Analysis (WEKA), to investigate the factors influencing patients’ admission after surgery and compare the developed DM classification models. The results reveal that each implemented DM technique entails different attributes affecting patients’ post-surgery admission status. The comparison suggests that neural networks outperform other classification techniques. Further, the optimal number of beds required to accommodate post-operative patients is investigated. The simulation was conducted using queuing theory software to compute the expected number of beds required to achieve zero waiting time. The results indicate that the number of beds required to accommodate post-surgery patients waiting in the queue is the length of 1, which means that one bed will be available due to patient discharge.
本文对数据挖掘分类模型进行了开发和研究。采用这些模型来开发和重新设计基于术后数据的几个业务流程。通过Waikato Environment for Knowledge Analysis (WEKA)收集术后数据,探讨影响患者术后入院的因素,并比较已建立的糖尿病分类模型。结果表明,每种实施的DM技术都包含不同的属性,影响患者术后入院状态。比较表明,神经网络优于其他分类技术。此外,研究了容纳术后患者所需的最佳床位数量。利用排队理论软件进行仿真,计算达到零等待时间所需的期望床位数量。结果表明,等待队列的术后患者所需床位数为1,即由于患者出院,将有1张床位可用。
{"title":"REDESIGNING POST-OPERATIVE PROCESSES USING DATA MINING CLASSIFICATION TECHNIQUES","authors":"Hayder Ghazi Alwattar","doi":"10.15282/ijsecs.7.2.2021.7.0090","DOIUrl":"https://doi.org/10.15282/ijsecs.7.2.2021.7.0090","url":null,"abstract":"Data mining classification models are developed and investigated in this paper. These models are adopted to develop and redesign several business processes based on post-operative data. Post-operative data were collected and used via the Waikato Environment for Knowledge Analysis (WEKA), to investigate the factors influencing patients’ admission after surgery and compare the developed DM classification models. The results reveal that each implemented DM technique entails different attributes affecting patients’ post-surgery admission status. The comparison suggests that neural networks outperform other classification techniques. Further, the optimal number of beds required to accommodate post-operative patients is investigated. The simulation was conducted using queuing theory software to compute the expected number of beds required to achieve zero waiting time. The results indicate that the number of beds required to accommodate post-surgery patients waiting in the queue is the length of 1, which means that one bed will be available due to patient discharge.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91033506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF SINGLE AND ENSEMBLE MACHINE LEARNING CLASSIFIERS FOR PHISHING ATTACKS DETECTION 用于网络钓鱼攻击检测的单个和集成机器学习分类器分析
Pub Date : 2021-10-11 DOI: 10.15282/ijsecs.7.2.2021.5.0088
Oyelakin A. M, Alimi O. M, Mustapha I. O, Ajiboye I. K
Phishing attacks have been used in different ways to harvest the confidential information of unsuspecting internet users. To stem the tide of phishing-based attacks, several machine learning techniques have been proposed in the past. However, fewer studies have considered investigating single and ensemble machine learning-based models for the classification of phishing attacks. This study carried out performance analysis of selected single and ensemble machine learning (ML) classifiers in phishing classification.The focus is to investigate how these algorithms behave in the classification of phishing attacks in the chosen dataset. Logistic Regression and Decision Trees were chosen as single learning classifiers while simple voting techniques and Random Forest were used as the ensemble machine learning algorithms. Accuracy, Precision, Recall and F1-score were used as performance metrics. Logistic Regression algorithm recorded 0.86 as accuracy, 0.89 as precision, 0.87 as recall and 0.81 as F1-score. Similarly, the Decision Trees classifier achieved an accuracy of 0.87, 0.83 for precision, 0.88 for recall and 0.81 for F1-score. In the voting ensemble, accuracy of 0.92 was achieved. 0.90 was obtained for precision, 0.92 for recall and 0.92 for F1-score. Random Forest algorithm recorded 0.98, 0.97, 0.98 and 0.97 as accuracy, precision, recall and F1-score respectively. From the experimental analyses, Random Forest algorithm outperformed simple averaging classifier and the two single algorithms used for phishing url detection. The study established that the ensemble techniques that were used for the experimentations are more efficient for phishing url identification compared to the single classifiers. 
网络钓鱼攻击以不同的方式被用来获取毫无戒心的互联网用户的机密信息。为了阻止基于网络钓鱼的攻击浪潮,过去已经提出了几种机器学习技术。然而,很少有研究考虑调查基于单一和集成机器学习的网络钓鱼攻击分类模型。本研究对所选的单个和集成机器学习(ML)分类器在网络钓鱼分类中的性能进行了分析。重点是研究这些算法在所选数据集中如何对网络钓鱼攻击进行分类。选择逻辑回归和决策树作为单一学习分类器,而简单投票技术和随机森林作为集成机器学习算法。准确性、精密度、召回率和f1得分作为绩效指标。Logistic回归算法的准确率为0.86,精密度为0.89,召回率为0.87,f1得分为0.81。同样,决策树分类器的准确率为0.87,精密度为0.83,召回率为0.88,F1-score为0.81。在投票集合中,准确率达到0.92。精密度为0.90,召回率为0.92,f1评分为0.92。随机森林算法的准确率为0.98,精密度为0.97,召回率为0.98,f1得分为0.97。从实验分析来看,随机森林算法优于简单平均分类器和用于网络钓鱼url检测的两种单一算法。研究表明,与单一分类器相比,用于实验的集成技术对于网络钓鱼url识别更有效。
{"title":"ANALYSIS OF SINGLE AND ENSEMBLE MACHINE LEARNING CLASSIFIERS FOR PHISHING ATTACKS DETECTION","authors":"Oyelakin A. M, Alimi O. M, Mustapha I. O, Ajiboye I. K","doi":"10.15282/ijsecs.7.2.2021.5.0088","DOIUrl":"https://doi.org/10.15282/ijsecs.7.2.2021.5.0088","url":null,"abstract":"Phishing attacks have been used in different ways to harvest the confidential information of unsuspecting internet users. To stem the tide of phishing-based attacks, several machine learning techniques have been proposed in the past. However, fewer studies have considered investigating single and ensemble machine learning-based models for the classification of phishing attacks. This study carried out performance analysis of selected single and ensemble machine learning (ML) classifiers in phishing classification.The focus is to investigate how these algorithms behave in the classification of phishing attacks in the chosen dataset. Logistic Regression and Decision Trees were chosen as single learning classifiers while simple voting techniques and Random Forest were used as the ensemble machine learning algorithms. Accuracy, Precision, Recall and F1-score were used as performance metrics. Logistic Regression algorithm recorded 0.86 as accuracy, 0.89 as precision, 0.87 as recall and 0.81 as F1-score. Similarly, the Decision Trees classifier achieved an accuracy of 0.87, 0.83 for precision, 0.88 for recall and 0.81 for F1-score. In the voting ensemble, accuracy of 0.92 was achieved. 0.90 was obtained for precision, 0.92 for recall and 0.92 for F1-score. Random Forest algorithm recorded 0.98, 0.97, 0.98 and 0.97 as accuracy, precision, recall and F1-score respectively. From the experimental analyses, Random Forest algorithm outperformed simple averaging classifier and the two single algorithms used for phishing url detection. The study established that the ensemble techniques that were used for the experimentations are more efficient for phishing url identification compared to the single classifiers.\u0000 ","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86726947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACHINE LEARNING AND DEEP LEARNING-BASED APPROACHES ON VARIOUS BIOMARKERS FOR ALZHEIMER’S DISEASE EARLY DETECTION: A REVIEW 基于机器学习和深度学习的各种生物标志物在阿尔茨海默病早期检测中的应用综述
Pub Date : 2021-10-08 DOI: 10.15282/ijsecs.7.2.2021.4.0087
Ghada M. Alqubati, Ghaleb H. Algaphari
Alzheimer’s disease (AD) is a progressive neurodegenerative disorder. It can cause a massive impact on a patient's memory and mobility. As this disease is irreversible, early diagnosis is crucial for delaying the symptoms and adjusting the patient's lifestyle. Many machine learning (ML) and deep learning (DL) based-approaches have been proposed to accurately predict AD before its symptoms onset. However, finding the most effective approach for AD early prediction is still challenging. This review explored 24 papers published from 2018 until 2021. These papers have proposed different approaches using state of the art machine learning and deep learning algorithms on different biomarkers to early detect AD. The review explored them from different perspectives to derive potential research gaps and draw conclusions and recommendations. It classified these recent approaches in terms of the learning technique used and AD biomarkers. It summarized and compared their findings, and defined their strengths and limitations. It also provided a summary of the common AD biomarkers. From this review, it was found that some approaches strove to increase the prediction accuracy regardless of their complexity such as using heterogeneous datasets, while others sought to find the most practical and affordable ways to predict the disease and yet achieve good accuracy such as using audio data. It was also noticed that DL based-approaches with image biomarkers remarkably surpassed ML based-approaches. However, they achieved poorly with genetic variants data. Despite the great importance of genetic variants biomarkers, their large variance and complexity could lead to a complex approach or poor accuracy. These data are crucial to discover the underlying structure of AD and detect it at early stages. However, an effective pre-processing approach is still needed to refine these data and employ them efficiently using the powerful DL algorithms.
阿尔茨海默病(AD)是一种进行性神经退行性疾病。它会对病人的记忆和行动能力造成巨大的影响。由于这种疾病是不可逆转的,早期诊断对于延缓症状和调整患者的生活方式至关重要。已经提出了许多基于机器学习(ML)和深度学习(DL)的方法,以便在症状出现之前准确预测AD。然而,寻找最有效的阿尔茨海默病早期预测方法仍然具有挑战性。本综述探讨了2018年至2021年发表的24篇论文。这些论文提出了不同的方法,利用最先进的机器学习和深度学习算法对不同的生物标志物进行早期检测。本综述从不同的角度对它们进行了探讨,以得出潜在的研究差距,并得出结论和建议。它根据所使用的学习技术和AD生物标志物对这些最近的方法进行了分类。它总结和比较了他们的发现,并定义了他们的优势和局限性。它还提供了常见的AD生物标志物的总结。从这篇综述中,我们发现一些方法努力提高预测精度,而不考虑其复杂性,如使用异构数据集,而另一些方法则试图找到最实用和负担得起的方法来预测疾病,但仍能达到良好的准确性,如使用音频数据。我们还注意到,基于图像生物标志物的深度学习方法明显优于基于机器学习的方法。然而,他们在遗传变异数据方面取得的成绩很差。尽管遗传变异生物标志物非常重要,但它们的巨大差异和复杂性可能导致方法复杂或准确性差。这些数据对于发现阿尔茨海默病的潜在结构并在早期发现它至关重要。然而,仍然需要一种有效的预处理方法来细化这些数据,并使用强大的深度学习算法有效地利用它们。
{"title":"MACHINE LEARNING AND DEEP LEARNING-BASED APPROACHES ON VARIOUS BIOMARKERS FOR ALZHEIMER’S DISEASE EARLY DETECTION: A REVIEW","authors":"Ghada M. Alqubati, Ghaleb H. Algaphari","doi":"10.15282/ijsecs.7.2.2021.4.0087","DOIUrl":"https://doi.org/10.15282/ijsecs.7.2.2021.4.0087","url":null,"abstract":"Alzheimer’s disease (AD) is a progressive neurodegenerative disorder. It can cause a massive impact on a patient's memory and mobility. As this disease is irreversible, early diagnosis is crucial for delaying the symptoms and adjusting the patient's lifestyle. Many machine learning (ML) and deep learning (DL) based-approaches have been proposed to accurately predict AD before its symptoms onset. However, finding the most effective approach for AD early prediction is still challenging. This review explored 24 papers published from 2018 until 2021. These papers have proposed different approaches using state of the art machine learning and deep learning algorithms on different biomarkers to early detect AD. The review explored them from different perspectives to derive potential research gaps and draw conclusions and recommendations. It classified these recent approaches in terms of the learning technique used and AD biomarkers. It summarized and compared their findings, and defined their strengths and limitations. It also provided a summary of the common AD biomarkers. From this review, it was found that some approaches strove to increase the prediction accuracy regardless of their complexity such as using heterogeneous datasets, while others sought to find the most practical and affordable ways to predict the disease and yet achieve good accuracy such as using audio data. It was also noticed that DL based-approaches with image biomarkers remarkably surpassed ML based-approaches. However, they achieved poorly with genetic variants data. Despite the great importance of genetic variants biomarkers, their large variance and complexity could lead to a complex approach or poor accuracy. These data are crucial to discover the underlying structure of AD and detect it at early stages. However, an effective pre-processing approach is still needed to refine these data and employ them efficiently using the powerful DL algorithms.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85176671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BLOCKCHAIN ADOPTION: APPLICATIONS AND CHALLENGES 区块链采用:应用和挑战
Pub Date : 2021-08-30 DOI: 10.15282/ijsecs.7.2.2021.3.0086
M. O. Momoh, P. Chinedu, W. Nwankwo, D. Aliu, M.S. Shaba
In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed.  This is because, any change made to any record in a given block automatically initiates and enforces a corresponding change in all other blocks in the chain hence tampering or breach is almost impossible.  Owing to its impressive prospects in the socioeconomic and political ecosystem, this paper was conceived to examine the current developments around this novel technology with particular emphasis on its benefits and proposed  challenges and needs to fill the gap created in the vital socioeconomic domains. The paper concludes that the blockchain technology is a plausible approach to restoring the trust, confidentiality, availability and integrity in transactions in the cyberspace and the world at large as majority of the global economy thrives in the cloud.
近年来,b区块链及其分布式账本系统机制受到了越来越多的学术界和社会关注。这种不断增加的关注的原因并不牵强:区块链现在在当今经济、数字化和“数字社会”的做事方式中占据了丰富的地位。区块链可以被描述为一个分布式账本系统,它允许在没有中央管理系统的情况下进行安全交易。在这个分布式账本系统中,交易被编码成块,这些块以链的形式相互链接。区块链的第一个应用是在比特币加密货币中。虽然不限于比特币,但区块链在安全和信任方面发现了有用之处,例如,数字资产可以被编码成块,以确保和加强信任的质量。基于区块链对数字资产的信任质量,参与节点之间的透明度得到了保证。这是因为,对给定块中的任何记录进行的任何更改都会自动启动并强制执行链中所有其他块的相应更改,因此篡改或破坏几乎是不可能的。由于其在社会经济和政治生态系统中的令人印象深刻的前景,本文旨在研究围绕这项新技术的当前发展,特别强调其好处,提出的挑战和填补重要社会经济领域所产生的差距的需求。该论文的结论是,区块链技术是一种可信的方法,可以在网络空间和整个世界的交易中恢复信任、保密性、可用性和完整性,因为全球大部分经济都在云计算中蓬勃发展。
{"title":"BLOCKCHAIN ADOPTION: APPLICATIONS AND CHALLENGES","authors":"M. O. Momoh, P. Chinedu, W. Nwankwo, D. Aliu, M.S. Shaba","doi":"10.15282/ijsecs.7.2.2021.3.0086","DOIUrl":"https://doi.org/10.15282/ijsecs.7.2.2021.3.0086","url":null,"abstract":"In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed.  This is because, any change made to any record in a given block automatically initiates and enforces a corresponding change in all other blocks in the chain hence tampering or breach is almost impossible.  Owing to its impressive prospects in the socioeconomic and political ecosystem, this paper was conceived to examine the current developments around this novel technology with particular emphasis on its benefits and proposed  challenges and needs to fill the gap created in the vital socioeconomic domains. The paper concludes that the blockchain technology is a plausible approach to restoring the trust, confidentiality, availability and integrity in transactions in the cyberspace and the world at large as majority of the global economy thrives in the cloud.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85123103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Software Engineering and Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1