首页 > 最新文献

Open International Journal of Informatics最新文献

英文 中文
Predictive Analytics on Scheduled Surgery Cases in Forecasting the Operating Theatre Utilisation 计划手术病例预测分析在预测手术室使用率中的应用
Pub Date : 2021-06-26 DOI: 10.11113/oiji2021.9n1.20
Nurul Atiekah Ab Rashid, Suraya Ya'acob
The scheduled surgery cases, allocation of clinical provider, machine, equipment, preparation time, surgery performance, and patient recovery give the big impact on OT utilization. Low OT utilization due to no show patient and scheduling bottleneck interrupt patient flow in clinical process. It also decreases the admission to the OT and wastage of resources. In order to improve the capacity of OT, the logical solution need to be carried out is utilization audit. The trend of scheduled surgery cases has identified, and element affect the OT capacity have used to predict the OT optimization for future planning. The purpose of this study is to investigate efficiency of operating theatre (OT) utilization in healthcare institution and the application predictive analytics on its daily operational data. OT contribute to the revenue for the hospital and workload.  This project use machine learning in identify which model can use to predict the decision of admission to which facility after the surgery. The model has been going through a few mathematical reasoning to getting the usage efficiency on the dataset. The result shows that Support Vector Machine (SVM) got the highest accuracy in test data rather than Logistic Regression (LR) and Random Forest Classifier. SVM used to predict the admission decision, which contribute to the surgery scheduling in OT. This project can be extended to the admission decision with the factor or severity of patient condition to undergo any intervention in outpatient.
手术安排的病例、临床医师的配置、机器、设备、准备时间、手术效果、患者康复等因素对OT的利用有较大影响。由于无诊病人和调度瓶颈导致的低门诊利用率中断了临床流程中的病人流。它还减少了OT的准入和资源浪费。为了提高OT的能力,需要执行的逻辑解决方案是利用率审计。确定了手术排期的趋势,并利用影响手术容量的因素预测手术排期的优化,为未来的手术规划提供依据。摘要本研究旨在探讨医疗机构手术室的使用效率,以及预测分析在手术室日常营运资料上的应用。OT为医院的收入和工作量做出了贡献。该项目使用机器学习来确定可以使用哪个模型来预测手术后进入哪个设施的决定。该模型通过一些数学推理来获得数据集的使用效率。结果表明,支持向量机(SVM)在测试数据上的准确率高于逻辑回归(LR)和随机森林分类器。利用支持向量机预测住院决策,为门诊手术调度提供依据。该项目可根据患者病情的因素或严重程度扩展到门诊接受任何干预的入院决定。
{"title":"Predictive Analytics on Scheduled Surgery Cases in Forecasting the Operating Theatre Utilisation","authors":"Nurul Atiekah Ab Rashid, Suraya Ya'acob","doi":"10.11113/oiji2021.9n1.20","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.20","url":null,"abstract":"The scheduled surgery cases, allocation of clinical provider, machine, equipment, preparation time, surgery performance, and patient recovery give the big impact on OT utilization. Low OT utilization due to no show patient and scheduling bottleneck interrupt patient flow in clinical process. It also decreases the admission to the OT and wastage of resources. In order to improve the capacity of OT, the logical solution need to be carried out is utilization audit. The trend of scheduled surgery cases has identified, and element affect the OT capacity have used to predict the OT optimization for future planning. The purpose of this study is to investigate efficiency of operating theatre (OT) utilization in healthcare institution and the application predictive analytics on its daily operational data. OT contribute to the revenue for the hospital and workload.  This project use machine learning in identify which model can use to predict the decision of admission to which facility after the surgery. The model has been going through a few mathematical reasoning to getting the usage efficiency on the dataset. The result shows that Support Vector Machine (SVM) got the highest accuracy in test data rather than Logistic Regression (LR) and Random Forest Classifier. SVM used to predict the admission decision, which contribute to the surgery scheduling in OT. This project can be extended to the admission decision with the factor or severity of patient condition to undergo any intervention in outpatient.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pilot Analysis of Factors Affecting Defense Against Social Engineering Attacks in the Armed Forces Environment 武装部队环境下社会工程攻击防御影响因素试点分析
Pub Date : 2021-06-26 DOI: 10.11113/oiji2021.9n1.28
Muhammad Farhan Shahrom, N. Maarop, Ganthan Narayana Samy, N. H. Hassan, Fiza Abdul Rahim, Pritheega Magalingam, N. Kamaruddin
Social engineering is a technique of deceiving people into giving away confidential information that could be useful to gain unauthorized access to an information system. Even to the most secured system, social engineering is a formidable threat. It is one of the most devastating threats to organizations and businesses. Unlike traditional hacking, social engineering is less or non-technological. It manipulates characteristics of human nature, exploiting people’s desire to be kind and helpful. The psychology leverage makes social engineering hard to defend against. This paper presents the identification of factors related to social engineering in the context of armed forces through a review of related literature. Prior works from previous studies are discussed, and factors have been identified based on certain criterion. This study executed a pilot analysis on 30 samples of respondents among Malaysian armed forces personnel. As a result, nine factors are identified that may affect defense against social engineering in the armed forces: Authority, Reciprocation, Commitment and Consistency, Diffusion of Responsibility, Scarcity, Friendliness and Liking, Awareness, Social Proof, and Trust.
社会工程是一种欺骗人们泄露机密信息的技术,这些信息可能有助于获得对信息系统的未经授权的访问。即使对最安全的系统来说,社会工程也是一个可怕的威胁。它是对组织和企业最具破坏性的威胁之一。与传统的黑客攻击不同,社会工程较少或非技术。它操纵人性的特征,利用人们善良和乐于助人的愿望。心理杠杆使得社会工程难以抵御。本文通过对相关文献的回顾,提出了在武装部队背景下与社会工程相关的因素的识别。讨论了前人的研究成果,并根据一定的标准确定了影响因素。这项研究对马来西亚武装部队人员中的30个答复样本进行了试点分析。结果,确定了可能影响武装部队防御社会工程的九个因素:权威、回报、承诺和一致性、责任扩散、稀缺性、友好和喜爱、意识、社会认同和信任。
{"title":"A Pilot Analysis of Factors Affecting Defense Against Social Engineering Attacks in the Armed Forces Environment","authors":"Muhammad Farhan Shahrom, N. Maarop, Ganthan Narayana Samy, N. H. Hassan, Fiza Abdul Rahim, Pritheega Magalingam, N. Kamaruddin","doi":"10.11113/oiji2021.9n1.28","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.28","url":null,"abstract":"Social engineering is a technique of deceiving people into giving away confidential information that could be useful to gain unauthorized access to an information system. Even to the most secured system, social engineering is a formidable threat. It is one of the most devastating threats to organizations and businesses. Unlike traditional hacking, social engineering is less or non-technological. It manipulates characteristics of human nature, exploiting people’s desire to be kind and helpful. The psychology leverage makes social engineering hard to defend against. This paper presents the identification of factors related to social engineering in the context of armed forces through a review of related literature. Prior works from previous studies are discussed, and factors have been identified based on certain criterion. This study executed a pilot analysis on 30 samples of respondents among Malaysian armed forces personnel. As a result, nine factors are identified that may affect defense against social engineering in the armed forces: Authority, Reciprocation, Commitment and Consistency, Diffusion of Responsibility, Scarcity, Friendliness and Liking, Awareness, Social Proof, and Trust.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy consumption in wireless IoT- A Review 无线物联网中的能源消耗-综述
Pub Date : 2021-06-26 DOI: 10.11113/oiji2021.9n1.2
Abduurrahim H El Hejjaji, Suriani Mohd Sam, Norliza Mohamed, K. Kamardin, N. Ahmad, Y. Md Yusof
The Internet of Things (IoT) is a rising innovation, including a wide range of uses identified with modern control, savvy metering, home mechanization, horticulture, health, etc. For these applications to run independent the IoT gadgets are required to make do for a considerable length of time and years under severe vitality imperatives. When growing such applications, it is significant for the application to think about its own energy consumption. In this work, we propose and assess an energy consumption estimation approach for occasional detecting applications running on the IoT gadgets. Our methodology depends on three stages. In the main stage, we distinguish the unmistakable exercises, for example, rest, transmit, detect and process in a detecting cycle. In the subsequent stage, we measure the power consumption of these exercises before the IoT gadget has been conveyed in the arrange. The third stage happens at run-time once the IoT gadget has been sent, to convey the energy consumption of a detecting cycle. The energy consumption is determined by utilizing the exercises control and their spans acquired at run-time. The proposed methodology is basic and conventional on the grounds that it doesn’t include any intricate equipment for runtime control estimation. Besides, this methodology likewise consolidates the dynamic idea of detecting applications by run-time estimation of energy consumption.
物联网(IoT)是一项新兴的创新,包括现代控制、精明的计量、家庭机械化、园艺、健康等方面的广泛用途。为了使这些应用程序独立运行,物联网设备需要在严格的生命力要求下工作相当长的时间和数年。在开发此类应用程序时,应用程序考虑其自身的能耗是非常重要的。在这项工作中,我们提出并评估了一种用于偶尔检测在物联网设备上运行的应用程序的能耗估计方法。我们的方法取决于三个阶段。在主阶段,我们在一个检测周期中区分出休息、传输、检测和处理等明确无误的练习。在随后的阶段,我们测量这些练习的功耗,然后将物联网小工具在安排中传输。第三阶段发生在运行时,一旦物联网设备被发送,就会传达检测周期的能耗。能量消耗是利用在运行时获得的练习控制和它们的跨度来确定的。所提出的方法是基本的和常规的,因为它不包括任何复杂的运行时控制估计设备。此外,该方法同样巩固了通过运行时估计能耗来检测应用程序的动态思想。
{"title":"Energy consumption in wireless IoT- A Review","authors":"Abduurrahim H El Hejjaji, Suriani Mohd Sam, Norliza Mohamed, K. Kamardin, N. Ahmad, Y. Md Yusof","doi":"10.11113/oiji2021.9n1.2","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.2","url":null,"abstract":"The Internet of Things (IoT) is a rising innovation, including a wide range of uses identified with modern control, savvy metering, home mechanization, horticulture, health, etc. For these applications to run independent the IoT gadgets are required to make do for a considerable length of time and years under severe vitality imperatives. When growing such applications, it is significant for the application to think about its own energy consumption. In this work, we propose and assess an energy consumption estimation approach for occasional detecting applications running on the IoT gadgets. Our methodology depends on three stages. In the main stage, we distinguish the unmistakable exercises, for example, rest, transmit, detect and process in a detecting cycle. In the subsequent stage, we measure the power consumption of these exercises before the IoT gadget has been conveyed in the arrange. The third stage happens at run-time once the IoT gadget has been sent, to convey the energy consumption of a detecting cycle. The energy consumption is determined by utilizing the exercises control and their spans acquired at run-time. The proposed methodology is basic and conventional on the grounds that it doesn’t include any intricate equipment for runtime control estimation. Besides, this methodology likewise consolidates the dynamic idea of detecting applications by run-time estimation of energy consumption.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127605342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Literature Review of Crime Prevention Through Environmental Design Principles Against Banks ATM Physical Security Effectiveness 环境设计原则预防犯罪对银行ATM物理安全有效性的系统文献综述
Pub Date : 2021-06-26 DOI: 10.11113/oiji2021.9n1.19
H. Tan, H. Abas, N. Shafie
  Technology development never sleeps, humans creating more high-tech devices for society to use.  Swift movement of technology growth has changed the conceptual design of the physical security control, location landscape, human behaviors factor, and perimeter controls are the factors to determine the security posture of the location. Hence, the rise of the new financial digital banking ecosystem has raised significant new concerns to bank consumers. In order to study the control measurement of current banking industry effectiveness by using the systematic literature review (SLR) to conduct the research that published in the digital library through world wide web. In short, maintaining the principle, policy guideline, and standard framework shall continue review periodically to identify the control measurement effectiveness.  
科技发展从不停歇,人类创造了更多的高科技设备供社会使用。技术的快速发展改变了物理安全控制的概念设计,地点景观、人的行为因素和周界控制是决定地点安全态势的因素。因此,新的金融数字银行生态系统的兴起给银行消费者带来了重大的新担忧。为了研究当前银行业有效性的控制度量,采用系统文献回顾法(SLR)通过万维网对数字图书馆发表的研究进行了研究。简而言之,维护原则、政策方针和标准框架应继续定期评审,以识别控制度量的有效性。
{"title":"Systematic Literature Review of Crime Prevention Through Environmental Design Principles Against Banks ATM Physical Security Effectiveness","authors":"H. Tan, H. Abas, N. Shafie","doi":"10.11113/oiji2021.9n1.19","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.19","url":null,"abstract":"  \u0000Technology development never sleeps, humans creating more high-tech devices for society to use.  Swift movement of technology growth has changed the conceptual design of the physical security control, location landscape, human behaviors factor, and perimeter controls are the factors to determine the security posture of the location. Hence, the rise of the new financial digital banking ecosystem has raised significant new concerns to bank consumers. In order to study the control measurement of current banking industry effectiveness by using the systematic literature review (SLR) to conduct the research that published in the digital library through world wide web. In short, maintaining the principle, policy guideline, and standard framework shall continue review periodically to identify the control measurement effectiveness. \u0000 ","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Literature Review: Factor For Physical Security And Access Control in Maximun Security Protection 系统文献综述:最大安全保护中的物理安全因素与访问控制
Pub Date : 2021-06-26 DOI: 10.11113/oiji2021.9n1.5
Roslinda Mohamed, H. Abas, N. H. Hassan, Saiful Adli Ismail
Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget pertinent to the transformation of the world today.  Through a very humane approach of natural surveillance, access control, maintenance, and reinforcements of territory, this strategy will contribute to the field of physical security as a whole. The purpose of this paper is to recognize the features that regulate taking for perimeter protection and access control in maximum were identified and analysed. The findings have revealed that five categories of features can be used to study the taking for perimeter protection and access control in maximum security protection: physical security; access control; security standard and policy; security awareness program and security training and security protection. A Systematic Literature Review (SLR) was accepted since it uses a more rigorous and well-defined method to swotting the study indication pertinent to the study. Initially, 62 papers were retrieved by a manual search in six databases and 17 primary studies were finally included. Consequently, 5 factors education. 
物理安全和访问控制作为其中一个安装应该进行升级,以确认属于该集团的资产的安全性和准备情况,以便继续安全运行。随着技术的快速发展,为办公室的物理安全和访问控制提供了无限的防御水平,每个组织都必须提供与当今世界转型相关的可通过的预算。通过一种非常人性化的自然监视、访问控制、维护和加强领土的方法,这一战略将为整个物理安全领域做出贡献。本文的目的是识别和分析最大限度的周界保护和访问控制的调节采取的特点。研究结果表明,在最大安全保护中,可以使用五类特征来研究周界保护和访问控制:物理安全;访问控制;安全标准和政策;安全意识规划、安全培训和安全防护。系统文献综述(Systematic Literature Review,简称SLR)采用了一种更为严格和定义明确的方法来确定与研究相关的研究指征,因此被接受。最初,在6个数据库中通过人工检索检索了62篇论文,最终纳入了17项主要研究。因此,教育有5个因素。
{"title":"Systematic Literature Review: Factor For Physical Security And Access Control in Maximun Security Protection","authors":"Roslinda Mohamed, H. Abas, N. H. Hassan, Saiful Adli Ismail","doi":"10.11113/oiji2021.9n1.5","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.5","url":null,"abstract":"Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget pertinent to the transformation of the world today.  Through a very humane approach of natural surveillance, access control, maintenance, and reinforcements of territory, this strategy will contribute to the field of physical security as a whole. The purpose of this paper is to recognize the features that regulate taking for perimeter protection and access control in maximum were identified and analysed. The findings have revealed that five categories of features can be used to study the taking for perimeter protection and access control in maximum security protection: physical security; access control; security standard and policy; security awareness program and security training and security protection. A Systematic Literature Review (SLR) was accepted since it uses a more rigorous and well-defined method to swotting the study indication pertinent to the study. Initially, 62 papers were retrieved by a manual search in six databases and 17 primary studies were finally included. Consequently, 5 factors education.\u0000 ","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT in Banking: The trends, threats, and solution 银行业物联网:趋势、威胁和解决方案
Pub Date : 2021-06-26 DOI: 10.11113/oiji2021.9n1.25
N. A. Abu Bakar, Mardiana Abu Hassan, N. H. Hassan
The Internet of Things is the next step of the digital revolution that will change consumers' lives. The Internet of Things promises to be a worthy representative of an open course in technology, economics, and culture. IoT, without a doubt, has a promising future. The modern consumer actions and uses represent inescapable digital transformations for banking institutions. Emerging digital world developments guide all banking services' digital transformation. However, the security threats of using IoT in banking are increasing. Cybercriminals such as hacking, corruption, and financial violence, data breaches, and financial expenditure risks will continue to trouble the use of IoT in banking. Therefore, this research aims to study the banking industry's existing IoT uses, issues, and challenges in adopting the IoT in the banking industry. IoT threats are highlighted in this paper. This article sets out a model dimension of the process monitoring framework for IoT security risk management. Other than that, this paper also studies the existing security risk management model of IoT in banking. Moreover, preventive IoT protection initiatives and approaches to enhance  IoT protection by implementing blockchain technology and Control Model Information Structure are addressed in this article
物联网是数字革命的下一步,它将改变消费者的生活。物联网有望成为技术、经济和文化开放课程的一个有价值的代表。毫无疑问,物联网有着光明的未来。现代消费者的行为和使用代表着银行机构不可避免的数字化转型。新兴数字世界的发展指引着所有银行服务的数字化转型。然而,在银行中使用物联网的安全威胁正在增加。黑客、腐败、金融暴力、数据泄露和金融支出风险等网络犯罪将继续困扰物联网在银行业的应用。因此,本研究旨在研究银行业在采用物联网方面存在的物联网用途、问题和挑战。本文重点介绍了物联网威胁。本文提出了物联网安全风险管理过程监控框架的模型维度。除此之外,本文还对现有的银行物联网安全风险管理模式进行了研究。此外,本文还讨论了通过实施区块链技术和控制模型信息结构来增强物联网保护的预防性物联网保护举措和方法
{"title":"IoT in Banking: The trends, threats, and solution","authors":"N. A. Abu Bakar, Mardiana Abu Hassan, N. H. Hassan","doi":"10.11113/oiji2021.9n1.25","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.25","url":null,"abstract":"The Internet of Things is the next step of the digital revolution that will change consumers' lives. The Internet of Things promises to be a worthy representative of an open course in technology, economics, and culture. IoT, without a doubt, has a promising future. The modern consumer actions and uses represent inescapable digital transformations for banking institutions. Emerging digital world developments guide all banking services' digital transformation. However, the security threats of using IoT in banking are increasing. Cybercriminals such as hacking, corruption, and financial violence, data breaches, and financial expenditure risks will continue to trouble the use of IoT in banking. Therefore, this research aims to study the banking industry's existing IoT uses, issues, and challenges in adopting the IoT in the banking industry. IoT threats are highlighted in this paper. This article sets out a model dimension of the process monitoring framework for IoT security risk management. Other than that, this paper also studies the existing security risk management model of IoT in banking. Moreover, preventive IoT protection initiatives and approaches to enhance  IoT protection by implementing blockchain technology and Control Model Information Structure are addressed in this article","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Open International Journal of Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1