首页 > 最新文献

Vol 4 Issue 4最新文献

英文 中文
Usability Evaluation of Facebook and Instagram by Visually Impaired People 视障人士对Facebook和Instagram的可用性评价
Pub Date : 2022-12-28 DOI: 10.33411/ijist/2022040405
Amna Sajid, Muhammad Zafar Ullah, B. Shahzad, Aaqib Adeel, Naveed Ahmad
Introduction/Importance of Study: Social networking websites have become the main medium for communication, information sharing, entertainment, buying/selling, and various other purposes. People of every age use social networking websites, and their usage is increasing daily, especially in current circumstances. People with different abilities also used social networking websites, but each set of users had their requirements forusing these websites. Visually impaired people use computers and the web with the help of screen reading tools e. g.; jaws, NVDA. Screen reading tools read a web page sequentially, which wastime-consuming. The major problem with screen reading tools came while reading visual content. Screen reading tools only read the alternate texts of non-visual contents behind their tag. This research focuses on the usability Usability of social networking websitesfor visually impaired people. Two of the most commonly used social networking websites, Facebook and Instagram, were selected for the usability evaluation. Accessibility, efficiency, and effectiveness were the metrics of Usability, which were evaluated in this study.Novelty statement: A consolidated set of guidelines specific to social networking websites were presented in which some new guidelines were also proposed for Facebook. A mock interface was developed based on the proposed guidelines for Facebook.Material and Method: For the evaluation of Usability, a controlled experiment was conducted with 28 visually impaired people in which 16 participants evaluated Facebook and 12 evaluated Instagram to find the usability problems faced by visually impaired people.Result and Discussion: Results show that Instagram was as easy to use asFacebook when used by visually impaired people with the help of screen reading tools. Concluding Remarks: This research evaluated the Usability of social networking websites Facebook and Instagram by visually impaired people. A controlled experiment was conducted for their evaluation. Results showed that Facebook was difficult to use as Instagram. Thus, new guidelines were proposed for Facebook and based on the guidelines, a prototype was proposed.
学习简介/重要性:社交网站已经成为人们交流、分享信息、娱乐、买卖等各种目的的主要媒介。每个年龄段的人都在使用社交网站,而且它们的使用量每天都在增加,尤其是在当前的情况下。不同能力的人也使用社交网站,但每组用户使用这些网站都有自己的要求。视障人士借助屏幕阅读工具使用电脑和网络,例如;下巴,改良式戏剧活动。屏幕阅读工具按顺序阅读网页,这很耗时。屏幕阅读工具的主要问题出现在阅读视觉内容时。屏幕阅读工具只能读取标签后面的非视觉内容的替代文本。本研究的重点是视障人士社交网站的可用性。两个最常用的社交网站,Facebook和Instagram,被选中进行可用性评估。可访问性、效率和有效性是可用性的度量标准,在本研究中进行了评估。新颖性声明:提出了一套针对社交网站的综合指导方针,其中也提出了一些针对Facebook的新指导方针。一个模拟界面是根据Facebook的建议准则开发的。材料与方法:对于易用性的评估,我们对28名视障人士进行了对照实验,其中16名参与者评估Facebook, 12名参与者评估Instagram,以发现视障人士面临的可用性问题。结果和讨论:结果表明,当视障人士在屏幕阅读工具的帮助下使用Instagram时,Instagram和facebook一样容易使用。结语:本研究评估了视障人士对社交网站Facebook和Instagram的可用性。为了对其进行评价,进行了对照实验。结果显示,Facebook很难像Instagram一样使用。因此,为Facebook提出了新的指导方针,并在此基础上提出了原型。
{"title":"Usability Evaluation of Facebook and Instagram by Visually Impaired People","authors":"Amna Sajid, Muhammad Zafar Ullah, B. Shahzad, Aaqib Adeel, Naveed Ahmad","doi":"10.33411/ijist/2022040405","DOIUrl":"https://doi.org/10.33411/ijist/2022040405","url":null,"abstract":"Introduction/Importance of Study: Social networking websites have become the main medium for communication, information sharing, entertainment, buying/selling, and various other purposes. People of every age use social networking websites, and their usage is increasing daily, especially in current circumstances. People with different abilities also used social networking websites, but each set of users had their requirements forusing these websites. Visually impaired people use computers and the web with the help of screen reading tools e. g.; jaws, NVDA. Screen reading tools read a web page sequentially, which wastime-consuming. The major problem with screen reading tools came while reading visual content. Screen reading tools only read the alternate texts of non-visual contents behind their tag. This research focuses on the usability Usability of social networking websitesfor visually impaired people. Two of the most commonly used social networking websites, Facebook and Instagram, were selected for the usability evaluation. Accessibility, efficiency, and effectiveness were the metrics of Usability, which were evaluated in this study.\u0000Novelty statement: A consolidated set of guidelines specific to social networking websites were presented in which some new guidelines were also proposed for Facebook. A mock interface was developed based on the proposed guidelines for Facebook.\u0000Material and Method: For the evaluation of Usability, a controlled experiment was conducted with 28 visually impaired people in which 16 participants evaluated Facebook and 12 evaluated Instagram to find the usability problems faced by visually impaired people.\u0000Result and Discussion: Results show that Instagram was as easy to use asFacebook when used by visually impaired people with the help of screen reading tools. \u0000Concluding Remarks: This research evaluated the Usability of social networking websites Facebook and Instagram by visually impaired people. A controlled experiment was conducted for their evaluation. Results showed that Facebook was difficult to use as Instagram. Thus, new guidelines were proposed for Facebook and based on the guidelines, a prototype was proposed.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey Paper on ASCII-Based Cryptographic Techniques 基于ascii的密码技术综述
Pub Date : 2022-12-17 DOI: 10.33411/ijist/2022040411
Abid Sultan, Yao Lin, Azhar Mushtaq
With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.
随着时间的推移,网络领域变得越来越先进。由于这种进步,通信方不希望依赖第三方进行通信,因为第三方可能滥用或与其他人共享他们的个人信息。这就是为什么我们需要这样一种可以依赖于安全通信的方法。近年来,人们提出了许多基于ASCII值的加密技术,但从中选择一种高效的加密技术是一项艰巨的任务。在本文中,我们根据一定的参数对几种技术进行了比较,以找出最适合用户使用的技术。
{"title":"A Survey Paper on ASCII-Based Cryptographic Techniques","authors":"Abid Sultan, Yao Lin, Azhar Mushtaq","doi":"10.33411/ijist/2022040411","DOIUrl":"https://doi.org/10.33411/ijist/2022040411","url":null,"abstract":"With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Significance of Cognitive Distortions and Risk Factors Due to Android Games Addictions for Adults 成人Android游戏成瘾的认知扭曲及其风险因素的意义
Pub Date : 2022-11-08 DOI: 10.33411/ijist/2022040410
Imran Hussain, I. Siddiq, Anza Riaz, Abdullah Faisal, Ameer Hamza
Background:The primary purpose of this study is to find out the Significance of Cognitive Distortions and Risk Factors due to Android Game Addiction for Adults.Methods:The research population includes three main parameters Physical Effects, Mental Effects, and, Cognitive Effects each part containing 10 questions. The sample comprises 200 school students (male=150, females=50) between the ages of 8 to 20 years recruited from schools in Lahore, Pakistan. A total of 200 copies of the Questionnaire are distributed among the students. Only 180 copies are received filled so the total response rate of the data collection was 90%. SPSS tool was used to analyze the results of the Questionnaire. It aims to einvestigate the impacts that Android Games have on adults. As most of the researchers have done Quantitative research in this area, so I decided to conduct both Quantitative and Qualitative research designs which can help us get a deeper understanding of Android Game Addiction.Findings:By going through the results, it is revealed that the all above-mentioned three main parameters are found positive in adults. According to the range of the frequency, it is concluded that all three factors are in the medium range not more harmful.There was a strong positive association between the addictions of students to Android mobile games and their physical and mental well-being in terms of physical, mental, and cognitive health.
背景:本研究的主要目的是了解成人Android游戏成瘾导致的认知扭曲及其危险因素的意义。方法:研究人群包括生理效应、心理效应和认知效应三个主要参数,每部分包含10个问题。样本包括200名年龄在8至20岁之间的在校学生(男=150,女=50),他们来自巴基斯坦拉合尔的学校。调查问卷共发放200份给学生。只收到了180个副本,因此数据收集的总响应率为90%。采用SPSS工具对问卷结果进行分析。该调查旨在调查Android游戏对成年人的影响。由于大多数研究人员都在这一领域进行定量研究,所以我决定同时进行定量和定性研究设计,这有助于我们更深入地了解Android游戏成瘾。结果:通过对结果的分析,上述三个主要指标在成人中均呈阳性。根据频率范围,得出三个因素均在中等范围内危害不大的结论。从生理、心理和认知健康的角度来看,学生对Android手机游戏的沉迷与他们的身心健康之间存在着强烈的正相关。
{"title":"The Significance of Cognitive Distortions and Risk Factors Due to Android Games Addictions for Adults","authors":"Imran Hussain, I. Siddiq, Anza Riaz, Abdullah Faisal, Ameer Hamza","doi":"10.33411/ijist/2022040410","DOIUrl":"https://doi.org/10.33411/ijist/2022040410","url":null,"abstract":"Background:\u0000The primary purpose of this study is to find out the Significance of Cognitive Distortions and Risk Factors due to Android Game Addiction for Adults.\u0000Methods:\u0000The research population includes three main parameters Physical Effects, Mental Effects, and, Cognitive Effects each part containing 10 questions. The sample comprises 200 school students (male=150, females=50) between the ages of 8 to 20 years recruited from schools in Lahore, Pakistan. A total of 200 copies of the Questionnaire are distributed among the students. Only 180 copies are received filled so the total response rate of the data collection was 90%. SPSS tool was used to analyze the results of the Questionnaire. It aims to einvestigate the impacts that Android Games have on adults. As most of the researchers have done Quantitative research in this area, so I decided to conduct both Quantitative and Qualitative research designs which can help us get a deeper understanding of Android Game Addiction.\u0000Findings:\u0000By going through the results, it is revealed that the all above-mentioned three main parameters are found positive in adults. According to the range of the frequency, it is concluded that all three factors are in the medium range not more harmful.\u0000There was a strong positive association between the addictions of students to Android mobile games and their physical and mental well-being in terms of physical, mental, and cognitive health.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meme Detection of Journalists from Social Media by Using Data Mining Techniques 基于数据挖掘技术的社交媒体记者模因检测
Pub Date : 2022-11-07 DOI: 10.33411/ijist/2022040402
Sajawal Khan, Adeela Ashraf, Muhammad Shoaib, Muhammad Iftikhar, I. Siddiq, Muhammad Dawood Khan, Abdullah Faisal
With regard to today's social media networks, memes have become central. Share a million memes per second on different social media. The detection of memes is a very concentrated and demanding subject in the current field of research. Share about a million memes on various social media. Today's social media (What's App, Twitter, and Facebook) is widespread around the world. Since people in all countries are heavily used, use a set of social media application data (Twitter). As social media has an enormous amount of data overall the world. That will use that data set of Twitter for meme detection of journalists in Pakistan. So, this is done by getting data set from social media (Twitter, What’s App, and Facebook) by using their authenticated APIs. For this analysis use some opinion mining techniques and sentiment analysis like the statistical descriptive and content analysis. In our society, it is the better way to analysis about any journalists because social media can provide very huge amounts of data about any journalist which is true or false but I can make approximate correct perceptions by using sentiment analysis and text mining techniques. It will provide highly wanted and hidden characteristics and perceptions for searchers and demanding people about journalists. Finally use for sentiment analysis by using Python.
就当今的社交媒体网络而言,表情包已经成为核心。在不同的社交媒体上每秒分享一百万个表情包。模因的检测是当前研究领域中一个非常集中和要求很高的课题。在各种社交媒体上分享大约一百万个表情包。今天的社交媒体(What's App、Twitter和Facebook)在世界各地广泛传播。由于所有国家的人都被大量使用,所以使用一套社交媒体应用数据(Twitter)。因为社交媒体在全球范围内拥有大量的数据。这将使用推特的数据集来检测巴基斯坦记者的表情包。所以,这是通过使用他们的认证api从社交媒体(Twitter, What 's App和Facebook)获取数据集来完成的。在此分析中使用了一些观点挖掘技术和情感分析,如统计描述分析和内容分析。在我们的社会中,这是分析任何记者的更好方式,因为社交媒体可以提供关于任何记者的大量数据,这些数据是真的还是假的,但我可以通过使用情感分析和文本挖掘技术做出近似正确的感知。它将为搜索者和对记者有要求的人提供非常需要和隐藏的特征和看法。最后使用Python进行情感分析。
{"title":"Meme Detection of Journalists from Social Media by Using Data Mining Techniques","authors":"Sajawal Khan, Adeela Ashraf, Muhammad Shoaib, Muhammad Iftikhar, I. Siddiq, Muhammad Dawood Khan, Abdullah Faisal","doi":"10.33411/ijist/2022040402","DOIUrl":"https://doi.org/10.33411/ijist/2022040402","url":null,"abstract":"With regard to today's social media networks, memes have become central. Share a million memes per second on different social media. The detection of memes is a very concentrated and demanding subject in the current field of research. Share about a million memes on various social media. Today's social media (What's App, Twitter, and Facebook) is widespread around the world. Since people in all countries are heavily used, use a set of social media application data (Twitter). As social media has an enormous amount of data overall the world. That will use that data set of Twitter for meme detection of journalists in Pakistan. So, this is done by getting data set from social media (Twitter, What’s App, and Facebook) by using their authenticated APIs. For this analysis use some opinion mining techniques and sentiment analysis like the statistical descriptive and content analysis. In our society, it is the better way to analysis about any journalists because social media can provide very huge amounts of data about any journalist which is true or false but I can make approximate correct perceptions by using sentiment analysis and text mining techniques. It will provide highly wanted and hidden characteristics and perceptions for searchers and demanding people about journalists. Finally use for sentiment analysis by using Python.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Agile Methodologies for Ensuring Quality in Complex Systems: A Systematic Literature Review 敏捷方法在复杂系统中确保质量的作用:系统文献综述
Pub Date : 2022-11-05 DOI: 10.33411/ijist/2022040409
Ihsan Ullah, Jaweria Kanwal, Fatima Gillani, Iqra Shahzad
In software development, the selection of a software process model set the base for the success of a software product. An inappropriate selection may lead to a delay in project release, introduce defects and make the project difficult to update. This lack of quality characteristics may lead to the risk of losing customer expectations as well as the failure of the project itself. In the case of complex systems, the problems become more severe. To meet such expectations, agile methodologies are used to ensure quality in software and meet customers’ expectations. There is currently no literature that gives insights into the role of agile methodologies in ensuring quality in complex systems. The purpose of this paper is to evaluate the effectiveness and the impact of agile methodology in achieving the quality of complex systems. For this, we perform a Systematic Literature Review (SLR) and define a review protocol. By performing a thorough search and screening, we selected 39 papers related to agile methods and complex systems. Our analysis shows that complex systems have various requirements of quality attributes some of the complex systems mainly focus on security, reliability, and efficiency whereas other emphasizes safety, response time, and maintainability. Our analysis also shows that agile methodologies are widely used for the development of complex systems because ensuring the quality requirements of complex systems is not possible with the use of traditional methods of software development.
在软件开发中,软件过程模型的选择为软件产品的成功奠定了基础。不适当的选择可能导致项目发布的延迟,引入缺陷并使项目难以更新。缺乏质量特征可能会导致失去客户期望的风险以及项目本身的失败。在复杂系统的情况下,问题变得更加严重。为了满足这样的期望,敏捷方法被用来确保软件的质量并满足客户的期望。目前还没有关于敏捷方法在确保复杂系统质量方面的作用的文献。本文的目的是评估敏捷方法在实现复杂系统质量方面的有效性和影响。为此,我们进行了系统文献综述(SLR)并定义了一个综述方案。通过进行彻底的搜索和筛选,我们选择了39篇与敏捷方法和复杂系统相关的论文。我们的分析表明,复杂系统对质量属性有不同的要求,一些复杂系统主要关注安全性、可靠性和效率,而另一些则强调安全性、响应时间和可维护性。我们的分析还表明,敏捷方法被广泛用于复杂系统的开发,因为使用传统的软件开发方法无法确保复杂系统的质量需求。
{"title":"Role of Agile Methodologies for Ensuring Quality in Complex Systems: A Systematic Literature Review","authors":"Ihsan Ullah, Jaweria Kanwal, Fatima Gillani, Iqra Shahzad","doi":"10.33411/ijist/2022040409","DOIUrl":"https://doi.org/10.33411/ijist/2022040409","url":null,"abstract":"In software development, the selection of a software process model set the base for the success of a software product. An inappropriate selection may lead to a delay in project release, introduce defects and make the project difficult to update. This lack of quality characteristics may lead to the risk of losing customer expectations as well as the failure of the project itself. In the case of complex systems, the problems become more severe. To meet such expectations, agile methodologies are used to ensure quality in software and meet customers’ expectations. There is currently no literature that gives insights into the role of agile methodologies in ensuring quality in complex systems. The purpose of this paper is to evaluate the effectiveness and the impact of agile methodology in achieving the quality of complex systems. \u0000For this, we perform a Systematic Literature Review (SLR) and define a review protocol. By performing a thorough search and screening, we selected 39 papers related to agile methods and complex systems. Our analysis shows that complex systems have various requirements of quality attributes some of the complex systems mainly focus on security, reliability, and efficiency whereas other emphasizes safety, response time, and maintainability. Our analysis also shows that agile methodologies are widely used for the development of complex systems because ensuring the quality requirements of complex systems is not possible with the use of traditional methods of software development.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Key Distribution for Secure Communications 用于安全通信的量子密钥分发
Pub Date : 2022-10-30 DOI: 10.33411/ijist/2022040406
Mahira Najeeb, Dr. Ammar Masood, Dr. Adnan Fazil
Data protection and information security have been the essence of communication in today's digital era. Authentication and secrecy of secure communication are achieved using key-based cryptographic primitives; the security of which significantly relies upon the underlying computationally complex mathematics. Moreover, these existing cryptographic primitives are considered to be non-deterministic on the basis of the existing computational capabilities. However, the considerable advancements in the development of quantum computers have significantly enhanced parallel computations; thereby, posing a great threat to these existing encryption primitives. Thus, in the future, the physical manifestation of a large successful quantum computer is likely to break all the existing public-key encryption algorithms in no time. This has led to a remarkable surge of interest in propelling quantum mechanics into existence; subsequently, leading cryptographers to research various viable domains to offer quantum-resistant secure communications. Resultantly, quantum cryptography/quantum key distribution has emerged as a futuristic replacement for classical cryptography as it offers unconditionally secure communication along with the inherent detection of any unintended user. Thus, keeping in view the significance of this relatively newer domain of cryptography, this research focuses on presenting a consolidated review of the various Quantum Key Distribution (QKD) protocols. A comparative analysis of the working mechanism of the prominent QKD protocols is presented along with an overview of the various emerging trends that have been proposed to optimize the implementational efficiency of the BB84 protocol.
数据保护和信息安全已成为当今数字时代通信的本质。使用基于密钥的密码原语实现安全通信的认证和保密;其安全性很大程度上依赖于底层复杂的计算数学。此外,根据现有的计算能力,这些现有的密码原语被认为是不确定的。然而,量子计算机的发展取得了相当大的进步,大大增强了并行计算;因此,对这些现有的加密原语构成了巨大的威胁。因此,在未来,一台大型成功的量子计算机的物理表现很可能会在短时间内打破现有的所有公钥加密算法。这使得人们对推动量子力学的存在产生了极大的兴趣;随后,领先的密码学家研究各种可行的领域,以提供抗量子安全通信。因此,量子密码学/量子密钥分发已经成为经典密码学的未来替代品,因为它提供无条件的安全通信以及对任何非预期用户的固有检测。因此,考虑到这个相对较新的密码学领域的重要性,本研究的重点是对各种量子密钥分发(QKD)协议进行综合审查。本文对主要QKD协议的工作机制进行了比较分析,并概述了为优化BB84协议的实施效率而提出的各种新兴趋势。
{"title":"Quantum Key Distribution for Secure Communications","authors":"Mahira Najeeb, Dr. Ammar Masood, Dr. Adnan Fazil","doi":"10.33411/ijist/2022040406","DOIUrl":"https://doi.org/10.33411/ijist/2022040406","url":null,"abstract":"Data protection and information security have been the essence of communication in today's digital era. Authentication and secrecy of secure communication are achieved using key-based cryptographic primitives; the security of which significantly relies upon the underlying computationally complex mathematics. Moreover, these existing cryptographic primitives are considered to be non-deterministic on the basis of the existing computational capabilities. However, the considerable advancements in the development of quantum computers have significantly enhanced parallel computations; thereby, posing a great threat to these existing encryption primitives. Thus, in the future, the physical manifestation of a large successful quantum computer is likely to break all the existing public-key encryption algorithms in no time. This has led to a remarkable surge of interest in propelling quantum mechanics into existence; subsequently, leading cryptographers to research various viable domains to offer quantum-resistant secure communications. Resultantly, quantum cryptography/quantum key distribution has emerged as a futuristic replacement for classical cryptography as it offers unconditionally secure communication along with the inherent detection of any unintended user. Thus, keeping in view the significance of this relatively newer domain of cryptography, this research focuses on presenting a consolidated review of the various Quantum Key Distribution (QKD) protocols. A comparative analysis of the working mechanism of the prominent QKD protocols is presented along with an overview of the various emerging trends that have been proposed to optimize the implementational efficiency of the BB84 protocol.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Job Failure Prediction in a Cloud Environment by Applying Machine Learning Techniques 应用机器学习技术分析云环境下作业失效预测
Pub Date : 2022-10-30 DOI: 10.33411/ijist/2022040407
Faraz Bashir, Farrukh Zeeshan Khan
Cloud services are the on-demand availability of resources like storage, data, and computing power. Nowadays, cloud computing and storage systems are continuing to expand; there is an imperative requirement for CSPs (Cloud Service providers) to ensure a reliable and consistent supply of resources to users and businesses in case of any failure. Consequently, large cloud service providers are concentrating on mitigating any losses in a cloud system environment. In this research, we examined the bit brains dataset for job failure prediction, which keeps traces of 3 years of cloud system VMs. The dataset contains data about the resources used in a cloud environment. We proposed the performance of two machine learning algorithms: Logistic-Regression and KNN. The performance of these ML algorithms has been assessed using cross-validation. KNN and Logistic Regression give optimal results with an accuracy of 99% and 95%. Our research shows that using KNN and Logistic Regression increases the detection accuracy of job failures and will relieve cloud-service providers from diminishing future losses in cloud resources. Thus, we believe our approach is feasible and can be transformed to apply in an existing cloud environment.
云服务是存储、数据和计算能力等资源的按需可用性。如今,云计算和存储系统正在不断扩展;csp(云服务提供商)必须确保在任何故障情况下向用户和企业提供可靠和一致的资源供应。因此,大型云服务提供商正致力于减轻云系统环境中的任何损失。在这项研究中,我们检查了比特大脑数据集的作业失败预测,它保留了3年的云系统虚拟机的痕迹。数据集包含云环境中使用的资源的数据。我们提出了两种机器学习算法的性能:逻辑回归和KNN。使用交叉验证对这些ML算法的性能进行了评估。KNN和Logistic回归给出了最优结果,准确率分别为99%和95%。我们的研究表明,使用KNN和逻辑回归提高了作业故障的检测精度,并将减轻云服务提供商减少云资源的未来损失。因此,我们相信我们的方法是可行的,并且可以转换为应用于现有的云环境。
{"title":"Analysis of Job Failure Prediction in a Cloud Environment by Applying Machine Learning Techniques","authors":"Faraz Bashir, Farrukh Zeeshan Khan","doi":"10.33411/ijist/2022040407","DOIUrl":"https://doi.org/10.33411/ijist/2022040407","url":null,"abstract":"Cloud services are the on-demand availability of resources like storage, data, and computing power. Nowadays, cloud computing and storage systems are continuing to expand; there is an imperative requirement for CSPs (Cloud Service providers) to ensure a reliable and consistent supply of resources to users and businesses in case of any failure. Consequently, large cloud service providers are concentrating on mitigating any losses in a cloud system environment. In this research, we examined the bit brains dataset for job failure prediction, which keeps traces of 3 years of cloud system VMs. The dataset contains data about the resources used in a cloud environment. We proposed the performance of two machine learning algorithms: Logistic-Regression and KNN. The performance of these ML algorithms has been assessed using cross-validation. KNN and Logistic Regression give optimal results with an accuracy of 99% and 95%. Our research shows that using KNN and Logistic Regression increases the detection accuracy of job failures and will relieve cloud-service providers from diminishing future losses in cloud resources. Thus, we believe our approach is feasible and can be transformed to apply in an existing cloud environment.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arsenic (v) Adsorption by Using Synthesized Iron Oxide Nanoparticles (Fe2O3-NPs) and Aluminum Oxide Nanoparticles (Al2O3-NPs) 合成氧化铁纳米粒子(Fe2O3-NPs)和氧化铝纳米粒子(Al2O3-NPs)对砷(v)的吸附
Pub Date : 2022-10-30 DOI: 10.33411/ijist/2022040408
Muhammad Tahir Turi, Ma Wei, Ittehad Hussain, Javid Hussain
Arsenic, is one of the most harmful elements to humans, health of chronic diseases, and continuously causing a threat to the world. Arsenic is found in combined form in rocks under the earth's surface and when it dissolves, it contaminates groundwater. In the current research study synthesized iron oxide nanoparticles (Fe2O3-NPs) and aluminum oxide nanoparticles (Al2O3-NPs) for the removal of arsenic (As) (˅) from an aqueous medium and characterized the synthesized material by different analytical techniques such as FT-IR spectroscopy and XRD spectroscopy. The results show successful synthesis of Fe2O3-NPs and Al2O3-NPs. Furthermore, the synthesized material was used as an adsorbent for extraction of as (V) from water. The effect of different parameters such as pH, temperature, contact time, and adsorbent dose on the adsorption process was investigated. The adsorption efficiency was determined by Fe2O3-NPs at about 20 mg/g and Al2O3-NPs at 19.5 mg/g. The quantitative removal of as (V) from industrial water required a minimum amount (0.2 g) of Fe2O3-NPs and Al2O3-NPs. various kinetic and isotherms were investigated in the current study. The result showed that the obtained data for Fe2O3-NPs was more fitted to Pseudo second order kinetic and Freundlich equation, while for Al2O3-NPs the data was more fitted to Pseudo second order kinetic and Elovich model equation, which confirms the interaction among as (V) and adsorbents. Thermodynamic parameters were also investigated which shows the process is spontaneous and endothermic. This model was used to estimate the site energy distribution for each adsorbent. Thermodynamic parameters were also investigated which shows the non-spontaneous and endothermic nature of the adsorbent. According to the results of the analysis of the approximate site energy distribution, adding Fe2O3 and Al2O3-NPs to arsenic decreased the area under the frequency distribution curve of the sorption site energies, which in turn decreased the number of sorption sites that were open to arsenic. This might be explained by the hydrophobic interaction between synthesized materials and arsenic being reduced due to the blocking of the Fe2O3 and Al2O3-NPs hydrophobic surface.
砷,是对人类健康危害最大的元素之一,是慢性疾病,并不断对世界造成威胁。砷以化合形式存在于地表下的岩石中,当它溶解时,会污染地下水。在本研究中,合成了氧化铁纳米颗粒(Fe2O3-NPs)和氧化铝纳米颗粒(Al2O3-NPs)用于去除水中介质中的砷(As),并通过FT-IR光谱和XRD光谱等不同的分析技术对合成材料进行了表征。结果表明,Fe2O3-NPs和Al2O3-NPs合成成功。并将合成的材料作为吸附剂用于水中砷(V)的萃取。考察了pH、温度、接触时间、吸附剂用量等参数对吸附过程的影响。Fe2O3-NPs的吸附效率为20 mg/g, Al2O3-NPs的吸附效率为19.5 mg/g。从工业水中定量去除as (V)需要最少量(0.2 g)的Fe2O3-NPs和Al2O3-NPs。本研究考察了各种动力学和等温线。结果表明,所得Fe2O3-NPs数据更符合拟二级动力学和Freundlich方程,而Al2O3-NPs数据更符合拟二级动力学和Elovich模型方程,证实了as (V)与吸附剂之间的相互作用。热力学参数的研究表明,该过程是自发的吸热过程。该模型用于估计每个吸附剂的位置能量分布。研究了吸附剂的热力学参数,表明吸附剂具有吸热和非自发性质。根据近似位置能量分布的分析结果,在砷中加入Fe2O3和Al2O3-NPs使吸附位置能量频率分布曲线下的面积减小,从而减少了对砷开放的吸附位置的数量。这可能是由于Fe2O3和Al2O3-NPs疏水表面的阻断,减少了合成材料与砷之间的疏水相互作用。
{"title":"Arsenic (v) Adsorption by Using Synthesized Iron Oxide Nanoparticles (Fe2O3-NPs) and Aluminum Oxide Nanoparticles (Al2O3-NPs)","authors":"Muhammad Tahir Turi, Ma Wei, Ittehad Hussain, Javid Hussain","doi":"10.33411/ijist/2022040408","DOIUrl":"https://doi.org/10.33411/ijist/2022040408","url":null,"abstract":"Arsenic, is one of the most harmful elements to humans, health of chronic diseases, and continuously causing a threat to the world. Arsenic is found in combined form in rocks under the earth's surface and when it dissolves, it contaminates groundwater. In the current research study synthesized iron oxide nanoparticles (Fe2O3-NPs) and aluminum oxide nanoparticles (Al2O3-NPs) for the removal of arsenic (As) (˅) from an aqueous medium and characterized the synthesized material by different analytical techniques such as FT-IR spectroscopy and XRD spectroscopy. The results show successful synthesis of Fe2O3-NPs and Al2O3-NPs. Furthermore, the synthesized material was used as an adsorbent for extraction of as (V) from water. The effect of different parameters such as pH, temperature, contact time, and adsorbent dose on the adsorption process was investigated. The adsorption efficiency was determined by Fe2O3-NPs at about 20 mg/g and Al2O3-NPs at 19.5 mg/g. The quantitative removal of as (V) from industrial water required a minimum amount (0.2 g) of Fe2O3-NPs and Al2O3-NPs. various kinetic and isotherms were investigated in the current study. The result showed that the obtained data for Fe2O3-NPs was more fitted to Pseudo second order kinetic and Freundlich equation, while for Al2O3-NPs the data was more fitted to Pseudo second order kinetic and Elovich model equation, which confirms the interaction among as (V) and adsorbents. Thermodynamic parameters were also investigated which shows the process is spontaneous and endothermic. This model was used to estimate the site energy distribution for each adsorbent. Thermodynamic parameters were also investigated which shows the non-spontaneous and endothermic nature of the adsorbent. According to the results of the analysis of the approximate site energy distribution, adding Fe2O3 and Al2O3-NPs to arsenic decreased the area under the frequency distribution curve of the sorption site energies, which in turn decreased the number of sorption sites that were open to arsenic. This might be explained by the hydrophobic interaction between synthesized materials and arsenic being reduced due to the blocking of the Fe2O3 and Al2O3-NPs hydrophobic surface.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soil Classification & Prediction of Crop Status with Supervised Learning Algorithm: Random Forest 基于监督学习算法的土壤分类与作物状况预测:随机森林
Pub Date : 2022-10-27 DOI: 10.33411/ijist/2022040403
Bakhtawer 1, Bushra Naz, Sanam Narejo, N. Din, Waqar Ahmed
Crop Management System (CMS) as developed in an Ionic framework with a Real-Time Firebase database for loop backing and decision support. The main two features were; Soil classification where the soil classified based on temperature, humidity, and soil properties such as soil moisture, soil nutrients, and soil PH level using Random Forest Algorithm. By Bootstrap method using Random Forest, samples from the dataset were selected & then classification trees was generated. The other feature was crop precision where the condition of the crop was and examined using temperature, humidity, soil moisture, soil PH levels, and soil nutrients (N, P, K). IoT device was used to fetch data from the field and then compare with already stored ideal values, suitable for optimal yield, in CMS database then process using the application to suggest the crop for cultivation and to optimize the usage of water and fertilizers. Currently, we classify the soil using Random Forest Algorithm & suggest the suitable crop for the classified type of soil & also measure the soil moisture and soil nutrients of agricultural field Acre based on the reading results we are suggesting the crop to is cultivated and pre-requisite which would be needed in future. The proposed method gives an accuracy of 96.5% as compared to existing methods of Artificial Neural Networks and Support Vector Machines
作物管理系统(CMS)是在Ionic框架中开发的,具有实时Firebase数据库,用于循环支持和决策支持。主要的两个特点是;土壤分类,根据温度、湿度和土壤水分、土壤养分、土壤PH等土壤特性,使用随机森林算法对土壤进行分类。采用随机森林的Bootstrap方法,从数据集中选取样本,生成分类树。另一个特征是作物的精度,在作物的条件下,使用温度、湿度、土壤湿度、土壤PH值和土壤养分(N、P、K)进行检查。物联网设备从田间获取数据,然后与CMS数据库中已经存储的理想值进行比较,适合最佳产量,然后使用应用程序进行处理,以建议种植作物并优化水和肥料的使用。目前,我们使用随机森林算法对土壤进行分类,并建议适合分类土壤类型的作物,并根据读取结果测量农田英亩的土壤水分和土壤养分,我们建议种植的作物和未来需要的先决条件。与现有的人工神经网络和支持向量机方法相比,该方法的准确率为96.5%
{"title":"Soil Classification & Prediction of Crop Status with Supervised Learning Algorithm: Random Forest","authors":"Bakhtawer 1, Bushra Naz, Sanam Narejo, N. Din, Waqar Ahmed","doi":"10.33411/ijist/2022040403","DOIUrl":"https://doi.org/10.33411/ijist/2022040403","url":null,"abstract":"Crop Management System (CMS) as developed in an Ionic framework with a Real-Time Firebase database for loop backing and decision support. The main two features were; Soil classification where the soil classified based on temperature, humidity, and soil properties such as soil moisture, soil nutrients, and soil PH level using Random Forest Algorithm. By Bootstrap method using Random Forest, samples from the dataset were selected & then classification trees was generated. The other feature was crop precision where the condition of the crop was and examined using temperature, humidity, soil moisture, soil PH levels, and soil nutrients (N, P, K). IoT device was used to fetch data from the field and then compare with already stored ideal values, suitable for optimal yield, in CMS database then process using the application to suggest the crop for cultivation and to optimize the usage of water and fertilizers. Currently, we classify the soil using Random Forest Algorithm & suggest the suitable crop for the classified type of soil & also measure the soil moisture and soil nutrients of agricultural field Acre based on the reading results we are suggesting the crop to is cultivated and pre-requisite which would be needed in future. The proposed method gives an accuracy of 96.5% as compared to existing methods of Artificial Neural Networks and Support Vector Machines","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Qualified review of ML and DL algorithms for Bearing Fault Diagnosis 轴承故障诊断的ML和DL算法的合格评审
Pub Date : 2022-10-26 DOI: 10.33411/ijist/2022040401
Asma Bibi, Bushra Naz, Shahnawaz Talpur, Shahzad Hyder Soomro, Yusrah Bablani
Moving machinery is the backbone of socio-economic development. The use of machines helps in increasing the production of everyday used items, and tools, that generate electricity and mechanical energy, and provides easy and fast transportation and help by saving human efforts, energy, and time. The mechanical industry is totally dependent on the bearing and it is considered bread and butter of the system. Bearing failure is about 40% of the total failures of induction motors which is why it is a crucial challenge to predict the failure and helps prevent future downtime events through maintenance schedules with the latest techniques and tools of. This paper presents a review of how DL techniques and algorithms outsmarted ML for bearing fault detection and diagnosis and summarizes the accuracy results generated by most common DL algorithms over classical ML algorithms. Additionally this paper reasons different criteria for which DL algorithms have been proved efficient for building productive model in the field of bearing fault detection. Furthermore, some of the most famous datasets by different universities have been discussed and accuracy results are provided by reviewing algorithms on the CWRU dataset by different researchers and comparison chart is listed in the results section.
移动机械是社会经济发展的支柱。机器的使用有助于增加日常使用的物品和工具的生产,这些物品和工具产生电力和机械能,并通过节省人力、能源和时间提供方便快捷的运输和帮助。机械工业完全依赖于轴承,它被认为是系统的面包和黄油。轴承故障约占感应电机总故障的40%,这就是为什么预测故障是一个至关重要的挑战,并有助于通过使用最新技术和工具的维护计划防止未来的停机事件。本文综述了深度学习技术和算法如何在轴承故障检测和诊断方面胜过ML,并总结了最常见的深度学习算法比经典ML算法产生的精度结果。此外,本文还分析了在轴承故障检测领域中,深度学习算法在建立生产模型时所遵循的不同准则。此外,本文还讨论了不同大学的一些最著名的数据集,并通过不同研究者对CWRU数据集的评审算法提供了准确性结果,结果部分列出了对比图。
{"title":"A Qualified review of ML and DL algorithms for Bearing Fault Diagnosis","authors":"Asma Bibi, Bushra Naz, Shahnawaz Talpur, Shahzad Hyder Soomro, Yusrah Bablani","doi":"10.33411/ijist/2022040401","DOIUrl":"https://doi.org/10.33411/ijist/2022040401","url":null,"abstract":"Moving machinery is the backbone of socio-economic development. The use of machines helps in increasing the production of everyday used items, and tools, that generate electricity and mechanical energy, and provides easy and fast transportation and help by saving human efforts, energy, and time. The mechanical industry is totally dependent on the bearing and it is considered bread and butter of the system. Bearing failure is about 40% of the total failures of induction motors which is why it is a crucial challenge to predict the failure and helps prevent future downtime events through maintenance schedules with the latest techniques and tools of. This paper presents a review of how DL techniques and algorithms outsmarted ML for bearing fault detection and diagnosis and summarizes the accuracy results generated by most common DL algorithms over classical ML algorithms. Additionally this paper reasons different criteria for which DL algorithms have been proved efficient for building productive model in the field of bearing fault detection. Furthermore, some of the most famous datasets by different universities have been discussed and accuracy results are provided by reviewing algorithms on the CWRU dataset by different researchers and comparison chart is listed in the results section.","PeriodicalId":354463,"journal":{"name":"Vol 4 Issue 4","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133913538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vol 4 Issue 4
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1