首页 > 最新文献

Information (Switzerland)最新文献

英文 中文
Weakly Supervised Learning Approach for Implicit Aspect Extraction 隐式方面提取的弱监督学习方法
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-13 DOI: 10.3390/info14110612
Aye Aye Mar, Kiyoaki Shirai, Natthawut Kertkeidkachorn
Aspect-based sentiment analysis (ABSA) is a process to extract an aspect of a product from a customer review and identify its polarity. Most previous studies of ABSA focused on explicit aspects, but implicit aspects have not yet been the subject of much attention. This paper proposes a novel weakly supervised method for implicit aspect extraction, which is a task to classify a sentence into a pre-defined implicit aspect category. A dataset labeled with implicit aspects is automatically constructed from unlabeled sentences as follows. First, explicit sentences are obtained by extracting explicit aspects from unlabeled sentences, while sentences that do not contain explicit aspects are preserved as candidates of implicit sentences. Second, clustering is performed to merge the explicit and implicit sentences that share the same aspect. Third, the aspect of the explicit sentence is assigned to the implicit sentences in the same cluster as the implicit aspect label. Then, the BERT model is fine-tuned for implicit aspect extraction using the constructed dataset. The results of the experiments show that our method achieves 82% and 84% accuracy for mobile phone and PC reviews, respectively, which are 20 and 21 percentage points higher than the baseline.
基于方面的情感分析(ABSA)是一种从客户评论中提取产品方面并识别其极性的过程。以往的研究大多集中在外显方面,而内隐方面尚未受到重视。本文提出了一种新的弱监督隐式方面提取方法,该方法是将句子分类到预定义的隐式方面类别中。使用隐式方面标记的数据集从未标记的句子自动构建,如下所示。首先,通过从未标记的句子中提取显式方面来获得显式句子,而不包含显式方面的句子则作为隐式句子的候选者保留。其次,对具有相同方面的显式和隐含句子进行聚类合并。第三,将显式句的方面与隐式句的方面标签分配给同一簇中的隐式句。然后,使用构建的数据集对BERT模型进行微调,以进行隐式方面提取。实验结果表明,我们的方法在手机评论和PC评论上分别达到82%和84%的准确率,比基线提高了20和21个百分点。
{"title":"Weakly Supervised Learning Approach for Implicit Aspect Extraction","authors":"Aye Aye Mar, Kiyoaki Shirai, Natthawut Kertkeidkachorn","doi":"10.3390/info14110612","DOIUrl":"https://doi.org/10.3390/info14110612","url":null,"abstract":"Aspect-based sentiment analysis (ABSA) is a process to extract an aspect of a product from a customer review and identify its polarity. Most previous studies of ABSA focused on explicit aspects, but implicit aspects have not yet been the subject of much attention. This paper proposes a novel weakly supervised method for implicit aspect extraction, which is a task to classify a sentence into a pre-defined implicit aspect category. A dataset labeled with implicit aspects is automatically constructed from unlabeled sentences as follows. First, explicit sentences are obtained by extracting explicit aspects from unlabeled sentences, while sentences that do not contain explicit aspects are preserved as candidates of implicit sentences. Second, clustering is performed to merge the explicit and implicit sentences that share the same aspect. Third, the aspect of the explicit sentence is assigned to the implicit sentences in the same cluster as the implicit aspect label. Then, the BERT model is fine-tuned for implicit aspect extraction using the constructed dataset. The results of the experiments show that our method achieves 82% and 84% accuracy for mobile phone and PC reviews, respectively, which are 20 and 21 percentage points higher than the baseline.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"58 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Integrated Time Series Prediction Model Based on Empirical Mode Decomposition and Two Attention Mechanisms 基于经验模态分解和两种注意机制的综合时间序列预测模型
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-11 DOI: 10.3390/info14110610
Xianchang Wang, Siyu Dong, Rui Zhang
In the prediction of time series, Empirical Mode Decomposition (EMD) generates subsequences and separates short-term tendencies from long-term ones. However, a single prediction model, including attention mechanism, has varying effects on each subsequence. To accurately capture the regularities of subsequences using an attention mechanism, we propose an integrated model for time series prediction based on signal decomposition and two attention mechanisms. This model combines the results of three networks—LSTM, LSTM-self-attention, and LSTM-temporal attention—all trained using subsequences obtained from EMD. Additionally, since previous research on EMD has been limited to single series analysis, this paper includes multiple series by employing two data pre-processing methods: ‘overall normalization’ and ‘respective normalization’. Experimental results on various datasets demonstrate that compared to models without attention mechanisms, temporal attention improves the prediction accuracy of short- and medium-term decomposed series by 15~28% and 45~72%, respectively; furthermore, it reduces the overall prediction error by 10~17%. The integrated model with temporal attention achieves a reduction in error of approximately 0.3%, primarily when compared to models utilizing only general forms of attention mechanisms. Moreover, after normalizing multiple series separately, the predictive performance is equivalent to that achieved for individual series.
在时间序列预测中,经验模态分解(EMD)产生子序列,将短期趋势与长期趋势分离。然而,单一的预测模型,包括注意机制,对每个子序列的影响是不同的。为了利用注意机制准确捕捉子序列的规律,提出了一种基于信号分解和两种注意机制的时间序列预测集成模型。该模型结合了lstm、lstm -自注意和lstm -时间注意三个网络的结果,它们都使用从EMD中获得的子序列进行训练。此外,由于以往对EMD的研究仅限于单序列分析,本文采用“整体归一化”和“各自归一化”两种数据预处理方法,将多序列纳入其中。在不同数据集上的实验结果表明,与不考虑注意机制的模型相比,时间注意对短期和中期分解序列的预测精度分别提高了15~28%和45~72%;此外,该方法可使总体预测误差降低10~17%。与仅使用一般形式的注意机制的模型相比,具有时间注意的集成模型实现了大约0.3%的误差减少。而且,对多个序列分别进行归一化后,其预测性能与对单个序列的预测性能相当。
{"title":"An Integrated Time Series Prediction Model Based on Empirical Mode Decomposition and Two Attention Mechanisms","authors":"Xianchang Wang, Siyu Dong, Rui Zhang","doi":"10.3390/info14110610","DOIUrl":"https://doi.org/10.3390/info14110610","url":null,"abstract":"In the prediction of time series, Empirical Mode Decomposition (EMD) generates subsequences and separates short-term tendencies from long-term ones. However, a single prediction model, including attention mechanism, has varying effects on each subsequence. To accurately capture the regularities of subsequences using an attention mechanism, we propose an integrated model for time series prediction based on signal decomposition and two attention mechanisms. This model combines the results of three networks—LSTM, LSTM-self-attention, and LSTM-temporal attention—all trained using subsequences obtained from EMD. Additionally, since previous research on EMD has been limited to single series analysis, this paper includes multiple series by employing two data pre-processing methods: ‘overall normalization’ and ‘respective normalization’. Experimental results on various datasets demonstrate that compared to models without attention mechanisms, temporal attention improves the prediction accuracy of short- and medium-term decomposed series by 15~28% and 45~72%, respectively; furthermore, it reduces the overall prediction error by 10~17%. The integrated model with temporal attention achieves a reduction in error of approximately 0.3%, primarily when compared to models utilizing only general forms of attention mechanisms. Moreover, after normalizing multiple series separately, the predictive performance is equivalent to that achieved for individual series.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"24 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135087043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Science Mapping of Meta-Analysis in Agricultural Science 农业科学中元分析的科学映射
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-11 DOI: 10.3390/info14110611
Weiting Ding, Jialu Li, Heyang Ma, Yeru Wu, Hailong He
As a powerful statistical method, meta-analysis has been applied increasingly in agricultural science with remarkable progress. However, meta-analysis research reports in the agricultural discipline still need to be systematically combed. Scientometrics is often used to quantitatively analyze research on certain themes. In this study, the literature from a 30-year period (1992–2021) was retrieved based on the Web of Science database, and a quantitative analysis was performed using the VOSviewer and CiteSpace visual analysis software packages. The objective of this study was to investigate the current application of meta-analysis in agricultural sciences, the latest research hotspots, and trends, and to identify influential authors, research institutions, countries, articles, and journal sources. Over the past 30 years, the volume of the meta-analysis literature in agriculture has increased rapidly. We identified the top three authors (Sauvant D, Kebreab E, and Huhtanen P), the top three contributing organizations (Chinese Academy of Sciences, National Institute for Agricultural Research, and Northwest A&F University), and top three productive countries (the USA, China, and France). Keyword cluster analysis shows that the meta-analysis research in agricultural sciences falls into four categories: climate change, crop yield, soil, and animal husbandry. Jeffrey (2011) is the most influential and cited research paper, with the highest utilization rate for the Journal of Dairy Science. This paper objectively evaluates the development of meta-analysis in the agricultural sciences using bibliometrics analysis, grasps the development frontier of agricultural research, and provides insights into the future of related research in the agricultural sciences.
元分析作为一种强大的统计方法,在农业科学中的应用日益广泛,取得了显著进展。然而,农业学科的meta分析研究报告仍需系统梳理。科学计量学通常用于定量分析某些主题的研究。本研究基于Web of Science数据库检索近30年(1992-2021)的文献,利用VOSviewer和CiteSpace可视化分析软件包进行定量分析。本研究的目的是调查meta分析在农业科学中的应用现状、最新研究热点和趋势,并确定有影响力的作者、研究机构、国家、文章和期刊来源。在过去的30年里,农业荟萃分析文献的数量迅速增加。我们确定了前三位作者(Sauvant D, Kebreab E和Huhtanen P),前三位贡献机构(中国科学院,国家农业研究所和西北农林科技大学)和前三位生产国家(美国,中国和法国)。关键词聚类分析表明,农业科学的元分析研究可分为气候变化、作物产量、土壤和畜牧业四类。Jeffrey(2011)是《Journal of Dairy Science》最具影响力和被引率最高的研究论文。本文运用文献计量学分析客观评价农业科学元分析的发展,把握农业研究的发展前沿,展望农业科学相关研究的未来。
{"title":"Science Mapping of Meta-Analysis in Agricultural Science","authors":"Weiting Ding, Jialu Li, Heyang Ma, Yeru Wu, Hailong He","doi":"10.3390/info14110611","DOIUrl":"https://doi.org/10.3390/info14110611","url":null,"abstract":"As a powerful statistical method, meta-analysis has been applied increasingly in agricultural science with remarkable progress. However, meta-analysis research reports in the agricultural discipline still need to be systematically combed. Scientometrics is often used to quantitatively analyze research on certain themes. In this study, the literature from a 30-year period (1992–2021) was retrieved based on the Web of Science database, and a quantitative analysis was performed using the VOSviewer and CiteSpace visual analysis software packages. The objective of this study was to investigate the current application of meta-analysis in agricultural sciences, the latest research hotspots, and trends, and to identify influential authors, research institutions, countries, articles, and journal sources. Over the past 30 years, the volume of the meta-analysis literature in agriculture has increased rapidly. We identified the top three authors (Sauvant D, Kebreab E, and Huhtanen P), the top three contributing organizations (Chinese Academy of Sciences, National Institute for Agricultural Research, and Northwest A&F University), and top three productive countries (the USA, China, and France). Keyword cluster analysis shows that the meta-analysis research in agricultural sciences falls into four categories: climate change, crop yield, soil, and animal husbandry. Jeffrey (2011) is the most influential and cited research paper, with the highest utilization rate for the Journal of Dairy Science. This paper objectively evaluates the development of meta-analysis in the agricultural sciences using bibliometrics analysis, grasps the development frontier of agricultural research, and provides insights into the future of related research in the agricultural sciences.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"39 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135086865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polarizing Topics on Twitter in the 2022 United States Elections 2022年美国大选中推特上两极分化的话题
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3390/info14110609
Josip Katalinić, Ivan Dunđer, Sanja Seljan
Politically polarizing issues are a growing concern around the world, creating divisions along ideological lines, which was also confirmed during the 2022 United States midterm elections. The purpose of this study was to explore the relationship between the results of the 2022 U.S. midterm elections and the topics that were covered during the campaign. A dataset consisting of 52,688 tweets in total was created by collecting tweets of senators, representatives and governors who participated in the elections one month before the start of the elections. Using unsupervised machine learning, topic modeling is built on the collected data and visualized to represent topics. Furthermore, supervised machine learning is used to classify tweets to the corresponding political party, whereas sentiment analysis is carried out in order to detect polarity and subjectivity. Tweets from participating politicians, U.S. states and involved parties were found to correlate with polarizing topics. This study hereby explored the relationship between the topics that were creating a divide between Democrats and Republicans during their campaign and the 2022 U.S. midterm election outcomes. This research found that polarizing topics permeated the Twitter (today known as X) campaign, and that all elections were classified as highly subjective. In the Senate and House elections, this classification analysis showed significant misclassification rates of 21.37% and 24.15%, respectively, indicating that Republican tweets often aligned with traditional Democratic narratives.
政治两极化问题在世界范围内日益受到关注,在意识形态上产生分歧,这在2022年美国中期选举中也得到了证实。本研究的目的是探讨2022年美国中期选举结果与竞选期间所涉及的主题之间的关系。在选举开始前一个月,通过收集参加选举的参议员、众议员、州长的推文,建立了52688条推文的数据集。使用无监督机器学习,主题建模建立在收集的数据上,并可视化地表示主题。此外,使用监督机器学习将推文分类到相应的政党,而进行情感分析以检测极性和主观性。来自参与的政治家、美国各州和相关政党的推文被发现与两极分化的话题相关。因此,本研究探讨了在竞选期间造成民主党和共和党之间分歧的话题与2022年美国中期选举结果之间的关系。这项研究发现,两极分化的话题充斥着Twitter(今天被称为X)的竞选活动,所有的选举都被归类为高度主观的。在参议院和众议院选举中,这种分类分析显示,错误分类率分别为21.37%和24.15%,这表明共和党的推文往往与民主党的传统叙事保持一致。
{"title":"Polarizing Topics on Twitter in the 2022 United States Elections","authors":"Josip Katalinić, Ivan Dunđer, Sanja Seljan","doi":"10.3390/info14110609","DOIUrl":"https://doi.org/10.3390/info14110609","url":null,"abstract":"Politically polarizing issues are a growing concern around the world, creating divisions along ideological lines, which was also confirmed during the 2022 United States midterm elections. The purpose of this study was to explore the relationship between the results of the 2022 U.S. midterm elections and the topics that were covered during the campaign. A dataset consisting of 52,688 tweets in total was created by collecting tweets of senators, representatives and governors who participated in the elections one month before the start of the elections. Using unsupervised machine learning, topic modeling is built on the collected data and visualized to represent topics. Furthermore, supervised machine learning is used to classify tweets to the corresponding political party, whereas sentiment analysis is carried out in order to detect polarity and subjectivity. Tweets from participating politicians, U.S. states and involved parties were found to correlate with polarizing topics. This study hereby explored the relationship between the topics that were creating a divide between Democrats and Republicans during their campaign and the 2022 U.S. midterm election outcomes. This research found that polarizing topics permeated the Twitter (today known as X) campaign, and that all elections were classified as highly subjective. In the Senate and House elections, this classification analysis showed significant misclassification rates of 21.37% and 24.15%, respectively, indicating that Republican tweets often aligned with traditional Democratic narratives.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135191850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-Aware Personalization: A Systems Engineering Framework 上下文感知个性化:一个系统工程框架
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3390/info14110608
Olurotimi Oguntola, Steven Simske
This study proposes a framework for a systems engineering-based approach to context-aware personalization, which is applied to e-commerce through the understanding and modeling of user behavior from their interactions with sales channels and media. The framework is practical and built on systems engineering principles. It combines three conceptual components to produce signals that provide content relevant to the users based on their behavior, thus enhancing their experience. These components are the ‘recognition and knowledge’ of the users and their behavior (persona); the awareness of users’ current contexts; and the comprehension of their situation and projection of their future status (intent prediction). The persona generator is implemented by leveraging an unsupervised machine learning algorithm to assign users into cohorts and learn cohort behavior while preserving their privacy in an ethical framework. The component of the users’ current context is fulfilled as a microservice that adopts novel e-commerce data interpretations. The best result of 97.3% accuracy for the intent prediction component was obtained by tokenizing categorical features with a pre-trained BERT (bidirectional encoder representations from transformers) model and passing these, as the contextual embedding input, to an LSTM (long short-term memory) neural network. Paired cohort-directed prescriptive action is generated from learned behavior as a recommended alternative to users’ shopping steps. The practical implementation of this e-commerce personalization framework is demonstrated in this study through the empirical evaluation of experimental results.
本研究提出了一个基于系统工程的情境感知个性化方法框架,通过理解和建模用户与销售渠道和媒体的互动行为,将其应用于电子商务。该框架是实用的,并且建立在系统工程原理之上。它结合了三个概念组件来产生信号,根据用户的行为提供与用户相关的内容,从而增强他们的体验。这些组件是用户及其行为(角色)的“识别和知识”;对用户当前语境的认知;以及对自己处境的理解和对未来状态的预测(意图预测)。角色生成器是通过利用无监督机器学习算法将用户分配到队列并学习队列行为来实现的,同时在道德框架中保护他们的隐私。用户当前上下文的组件作为采用新颖电子商务数据解释的微服务来实现。通过使用预训练的BERT(来自变压器的双向编码器表示)模型对分类特征进行标记,并将这些特征作为上下文嵌入输入传递给LSTM(长短期记忆)神经网络,获得了97.3%的意图预测组件准确率的最佳结果。配对队列导向的规定行动是从学习行为中生成的,作为用户购物步骤的推荐替代方案。本研究通过对实验结果的实证评价,论证了该电子商务个性化框架的实际实施。
{"title":"Context-Aware Personalization: A Systems Engineering Framework","authors":"Olurotimi Oguntola, Steven Simske","doi":"10.3390/info14110608","DOIUrl":"https://doi.org/10.3390/info14110608","url":null,"abstract":"This study proposes a framework for a systems engineering-based approach to context-aware personalization, which is applied to e-commerce through the understanding and modeling of user behavior from their interactions with sales channels and media. The framework is practical and built on systems engineering principles. It combines three conceptual components to produce signals that provide content relevant to the users based on their behavior, thus enhancing their experience. These components are the ‘recognition and knowledge’ of the users and their behavior (persona); the awareness of users’ current contexts; and the comprehension of their situation and projection of their future status (intent prediction). The persona generator is implemented by leveraging an unsupervised machine learning algorithm to assign users into cohorts and learn cohort behavior while preserving their privacy in an ethical framework. The component of the users’ current context is fulfilled as a microservice that adopts novel e-commerce data interpretations. The best result of 97.3% accuracy for the intent prediction component was obtained by tokenizing categorical features with a pre-trained BERT (bidirectional encoder representations from transformers) model and passing these, as the contextual embedding input, to an LSTM (long short-term memory) neural network. Paired cohort-directed prescriptive action is generated from learned behavior as a recommended alternative to users’ shopping steps. The practical implementation of this e-commerce personalization framework is demonstrated in this study through the empirical evaluation of experimental results.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135190888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small and Medium-Sized Enterprises in the Digital Age: Understanding Characteristics and Essential Demands 数字时代的中小企业:认识特征与基本需求
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-09 DOI: 10.3390/info14110606
Barbara Bradač Hojnik, Ivona Huđek
The article explores the implementation of digital technology in small and medium-sized Slovenian enterprises (SMEs), with a focus on understanding existing trends, obstacles, and necessary support measures during their digitalization progress. The surveyed companies mainly rely on conventional technologies like websites and teamwork platforms, emphasizing the significance of strong online communication and presence in the modern business world. The adoption of advanced technologies such as blockchain is limited due to the perceived complexity and relevance to specific sectors. This study uses variance analysis to identify potential differences in the digitalization challenges faced by companies of different sizes. The results indicate that small companies face different financial constraints and require more differentiated support mechanisms than their larger counterparts, with a particular focus on improving digital competencies among employees. Despite obtaining enhancements such as elevated operational standards and uninterrupted telecommuting via digitalization, companies still face challenges of differentiation and organizational culture change. The study emphasizes the importance of recognizing and addressing the different challenges and support needs of different-sized companies to promote comprehensive progress in digital transformation. Our findings provide important insights for policymakers, industry stakeholders, and SMEs to formulate comprehensive strategies and policies that effectively address the diverse needs and challenges of the digital transformation landscape.
本文探讨了数字技术在斯洛文尼亚中小型企业(sme)中的实施,重点是了解数字化进程中的现有趋势、障碍和必要的支持措施。受访公司主要依赖网站和团队合作平台等传统技术,强调了强大的在线沟通和存在感在现代商业世界中的重要性。由于感知到的复杂性和与特定部门的相关性,采用区块链等先进技术受到限制。本研究使用方差分析来识别不同规模的公司所面临的数字化挑战的潜在差异。结果表明,与大型企业相比,小公司面临不同的财务约束,需要更差异化的支持机制,尤其注重提高员工的数字能力。尽管通过数字化获得了诸如提高运营标准和不间断远程办公等增强功能,但公司仍然面临差异化和组织文化变革的挑战。该研究强调了认识和应对不同规模企业的不同挑战和支持需求的重要性,以促进数字化转型的全面进展。我们的研究结果为政策制定者、行业利益相关者和中小企业制定全面的战略和政策提供了重要见解,以有效应对数字化转型领域的各种需求和挑战。
{"title":"Small and Medium-Sized Enterprises in the Digital Age: Understanding Characteristics and Essential Demands","authors":"Barbara Bradač Hojnik, Ivona Huđek","doi":"10.3390/info14110606","DOIUrl":"https://doi.org/10.3390/info14110606","url":null,"abstract":"The article explores the implementation of digital technology in small and medium-sized Slovenian enterprises (SMEs), with a focus on understanding existing trends, obstacles, and necessary support measures during their digitalization progress. The surveyed companies mainly rely on conventional technologies like websites and teamwork platforms, emphasizing the significance of strong online communication and presence in the modern business world. The adoption of advanced technologies such as blockchain is limited due to the perceived complexity and relevance to specific sectors. This study uses variance analysis to identify potential differences in the digitalization challenges faced by companies of different sizes. The results indicate that small companies face different financial constraints and require more differentiated support mechanisms than their larger counterparts, with a particular focus on improving digital competencies among employees. Despite obtaining enhancements such as elevated operational standards and uninterrupted telecommuting via digitalization, companies still face challenges of differentiation and organizational culture change. The study emphasizes the importance of recognizing and addressing the different challenges and support needs of different-sized companies to promote comprehensive progress in digital transformation. Our findings provide important insights for policymakers, industry stakeholders, and SMEs to formulate comprehensive strategies and policies that effectively address the diverse needs and challenges of the digital transformation landscape.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":" 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135286570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interoperability-Enhanced Knowledge Management in Law Enforcement: An Integrated Data-Driven Forensic Ontological Approach to Crime Scene Analysis 执法中互操作性增强的知识管理:犯罪现场分析的综合数据驱动的法医本体论方法
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-09 DOI: 10.3390/info14110607
Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou, Vassilis Tsiantos
Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increases, so does human subjectivism, which often leads to wrong conclusions and, consequently, to bad judgments. From the above arises the need to create a single information system that will be fed with scientific evidence such as fingerprints, genetic material, digital data, forensic photographs, information from the forensic report, etc., and also investigative data such as information from witnesses’ statements, the apology of the accused, etc., from various crime scenes that will be able, through formal reasoning procedure, to conclude possible perpetrators. The present study examines a proposal for developing an information system that can be a basis for creating a forensic ontology—a semantic representation of the crime scene—through descriptive logic in the owl semantic language. The Interoperability-Enhanced information system to be developed could assist law enforcement authorities in solving crimes. At the same time, it would promote closer cooperation between academia, civil society, and state institutions by fostering a culture of engagement for the common good.
如今,越来越多的科学参与到加强执法部门的工作中。科学文献是法院在执行司法时高度尊重的证据。随着科学在破案中的作用越来越大,人类的主观主义也在增加,这往往导致错误的结论,从而导致错误的判断。综上所述,需要建立一个单一的信息系统,该系统将提供科学证据,如指纹、遗传物质、数字数据、法医照片、法医报告信息等,以及调查数据,如证人的陈述、被告的道歉等,这些数据来自各种犯罪现场,通过正式的推理程序,将能够断定可能的肇事者。本研究探讨了一项关于开发信息系统的建议,该系统可以作为通过猫头鹰语义语言的描述性逻辑创建法医本体(犯罪现场的语义表示)的基础。将开发的互操作性增强信息系统可协助执法当局破案。与此同时,它将通过培养一种为共同利益而参与的文化,促进学术界、民间社会和国家机构之间更密切的合作。
{"title":"Interoperability-Enhanced Knowledge Management in Law Enforcement: An Integrated Data-Driven Forensic Ontological Approach to Crime Scene Analysis","authors":"Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou, Vassilis Tsiantos","doi":"10.3390/info14110607","DOIUrl":"https://doi.org/10.3390/info14110607","url":null,"abstract":"Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increases, so does human subjectivism, which often leads to wrong conclusions and, consequently, to bad judgments. From the above arises the need to create a single information system that will be fed with scientific evidence such as fingerprints, genetic material, digital data, forensic photographs, information from the forensic report, etc., and also investigative data such as information from witnesses’ statements, the apology of the accused, etc., from various crime scenes that will be able, through formal reasoning procedure, to conclude possible perpetrators. The present study examines a proposal for developing an information system that can be a basis for creating a forensic ontology—a semantic representation of the crime scene—through descriptive logic in the owl semantic language. The Interoperability-Enhanced information system to be developed could assist law enforcement authorities in solving crimes. At the same time, it would promote closer cooperation between academia, civil society, and state institutions by fostering a culture of engagement for the common good.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135286573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms 基于卷积神经网络和多尺度直方图的车载网络入侵检测系统
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-08 DOI: 10.3390/info14110605
Gianmarco Baldini
Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel implementation of an IDS for in-vehicle security networks based on the concept of multi-scale histograms, which capture the frequencies of message identifiers in CAN-bus in-vehicle networks. In comparison to existing approaches in the literature based on a single histogram, the proposed approach widens the informative context used by the IDS for traffic analysis by taking into consideration sequences of two and three CAN-bus messages to create multi-scale dictionaries. The histograms are created from windows of in-vehicle network traffic. A preliminary multi-scale histogram model is created using only legitimate traffic. Against this model, the IDS performs traffic analysis to create a feature space based on the correlation of the histograms. Then, the created feature space is given in input to a Convolutional Neural Network (CNN) for the identification of the windows of traffic where the attack is present. The proposed approach has been evaluated on two different public data sets achieving a very competitive performance in comparison to the literature.
近年来,现代车辆的网络安全问题越来越受到研究界的关注。入侵检测系统(ids)是一种用于检测和减轻网络安全风险的技术。本文提出了一种基于多尺度直方图的车载安全网络入侵检测系统的实现方法,该方法可以捕获can总线车载网络中消息标识符的频率。与现有文献中基于单一直方图的方法相比,本文提出的方法通过考虑两个和三个can总线消息序列来创建多尺度字典,从而扩大了IDS用于流量分析的信息上下文。直方图是从车载网络流量窗口创建的。仅使用合法流量创建初步的多尺度直方图模型。针对该模型,IDS执行流量分析,根据直方图的相关性创建特征空间。然后,将创建的特征空间作为输入输入给卷积神经网络(CNN),用于识别存在攻击的流量窗口。所提出的方法已经在两个不同的公共数据集上进行了评估,与文献相比,实现了非常有竞争力的性能。
{"title":"In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms","authors":"Gianmarco Baldini","doi":"10.3390/info14110605","DOIUrl":"https://doi.org/10.3390/info14110605","url":null,"abstract":"Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel implementation of an IDS for in-vehicle security networks based on the concept of multi-scale histograms, which capture the frequencies of message identifiers in CAN-bus in-vehicle networks. In comparison to existing approaches in the literature based on a single histogram, the proposed approach widens the informative context used by the IDS for traffic analysis by taking into consideration sequences of two and three CAN-bus messages to create multi-scale dictionaries. The histograms are created from windows of in-vehicle network traffic. A preliminary multi-scale histogram model is created using only legitimate traffic. Against this model, the IDS performs traffic analysis to create a feature space based on the correlation of the histograms. Then, the created feature space is given in input to a Convolutional Neural Network (CNN) for the identification of the windows of traffic where the attack is present. The proposed approach has been evaluated on two different public data sets achieving a very competitive performance in comparison to the literature.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135392609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POSS-CNN: An Automatically Generated Convolutional Neural Network with Precision and Operation Separable Structure Aiming at Target Recognition and Detection POSS-CNN:一种针对目标识别和检测的具有精度和操作可分结构的自动生成卷积神经网络
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-07 DOI: 10.3390/info14110604
Jia Hou, Jingyu Zhang, Qi Chen, Siwei Xiang, Yishuo Meng, Jianfei Wang, Cimang Lu, Chen Yang
Artificial intelligence is changing and influencing our world. As one of the main algorithms in the field of artificial intelligence, convolutional neural networks (CNNs) have developed rapidly in recent years. Especially after the emergence of NASNet, CNNs have gradually pushed the idea of AutoML to the public’s attention, and large numbers of new structures designed by automatic searches are appearing. These networks are usually based on reinforcement learning and evolutionary learning algorithms. However, sometimes, the blocks of these networks are complex, and there is no small model for simpler tasks. Therefore, this paper proposes POSS-CNN aiming at target recognition and detection, which employs a multi-branch CNN structure with PSNC and a method of automatic parallel selection for super parameters based on a multi-branch CNN structure. Moreover, POSS-CNN can be broken up. By choosing a single branch or the combination of two branches as the “benchmark”, as well as the overall POSS-CNN, we can achieve seven models with different precision and operations. The test accuracy of POSS-CNN for a recognition task tested on a CIFAR10 dataset can reach 86.4%, which is equivalent to AlexNet and VggNet, but the operation and parameters of the whole model in this paper are 45.9% and 45.8% of AlexNet, and 29.5% and 29.4% of VggNet. The mAP of POSS-CNN for a detection task tested on the LSVH dataset is 45.8, inferior to the 62.3 of YOLOv3. However, compared with YOLOv3, the operation and parameters of the model in this paper are reduced by 57.4% and 15.6%, respectively. After being accelerated by WRA, POSS-CNN for a detection task tested on an LSVH dataset can achieve 27 fps, and the energy efficiency is 0.42 J/f, which is 5 times and 96.6 times better than GPU 2080Ti in performance and energy efficiency, respectively.
人工智能正在改变和影响我们的世界。卷积神经网络(convolutional neural networks, cnn)作为人工智能领域的主要算法之一,近年来发展迅速。特别是在NASNet出现之后,cnn逐渐将AutoML的思想推向了大众的视野,大量由自动搜索设计的新结构正在出现。这些网络通常基于强化学习和进化学习算法。然而,有时候,这些网络的块是复杂的,对于更简单的任务没有小的模型。因此,本文提出了针对目标识别和检测的POSS-CNN,该方法采用了一种带有PSNC的多分支CNN结构和一种基于多分支CNN结构的超参数自动并行选择方法。此外,POSS-CNN可以被分解。通过选择单个分支或两个分支的组合作为“基准”,以及整体POSS-CNN,我们可以得到7个精度和操作不同的模型。POSS-CNN在CIFAR10数据集上测试的一个识别任务的测试准确率可以达到86.4%,与AlexNet和VggNet相当,但本文整个模型的运算和参数分别为AlexNet的45.9%和45.8%,VggNet的29.5%和29.4%。POSS-CNN在LSVH数据集上测试的检测任务mAP为45.8,低于YOLOv3的62.3。但与YOLOv3相比,本文模型的运算和参数分别减少了57.4%和15.6%。经过WRA加速后,在LSVH数据集上测试的POSS-CNN检测任务可以达到27 fps,能量效率为0.42 J/f,性能和能量效率分别是GPU 2080Ti的5倍和96.6倍。
{"title":"POSS-CNN: An Automatically Generated Convolutional Neural Network with Precision and Operation Separable Structure Aiming at Target Recognition and Detection","authors":"Jia Hou, Jingyu Zhang, Qi Chen, Siwei Xiang, Yishuo Meng, Jianfei Wang, Cimang Lu, Chen Yang","doi":"10.3390/info14110604","DOIUrl":"https://doi.org/10.3390/info14110604","url":null,"abstract":"Artificial intelligence is changing and influencing our world. As one of the main algorithms in the field of artificial intelligence, convolutional neural networks (CNNs) have developed rapidly in recent years. Especially after the emergence of NASNet, CNNs have gradually pushed the idea of AutoML to the public’s attention, and large numbers of new structures designed by automatic searches are appearing. These networks are usually based on reinforcement learning and evolutionary learning algorithms. However, sometimes, the blocks of these networks are complex, and there is no small model for simpler tasks. Therefore, this paper proposes POSS-CNN aiming at target recognition and detection, which employs a multi-branch CNN structure with PSNC and a method of automatic parallel selection for super parameters based on a multi-branch CNN structure. Moreover, POSS-CNN can be broken up. By choosing a single branch or the combination of two branches as the “benchmark”, as well as the overall POSS-CNN, we can achieve seven models with different precision and operations. The test accuracy of POSS-CNN for a recognition task tested on a CIFAR10 dataset can reach 86.4%, which is equivalent to AlexNet and VggNet, but the operation and parameters of the whole model in this paper are 45.9% and 45.8% of AlexNet, and 29.5% and 29.4% of VggNet. The mAP of POSS-CNN for a detection task tested on the LSVH dataset is 45.8, inferior to the 62.3 of YOLOv3. However, compared with YOLOv3, the operation and parameters of the model in this paper are reduced by 57.4% and 15.6%, respectively. After being accelerated by WRA, POSS-CNN for a detection task tested on an LSVH dataset can achieve 27 fps, and the energy efficiency is 0.42 J/f, which is 5 times and 96.6 times better than GPU 2080Ti in performance and energy efficiency, respectively.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"174 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135480459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage 通过随机排列掩蔽增强可验证计算中的隐私保护以防止泄漏
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-06 DOI: 10.3390/info14110603
Yang Yang, Guanghua Song
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing (VC) has emerged as a secure approach, ensuring that the cloud cannot discern users’ input and output. Random permutation masking (RPM) is a widely adopted technique in VC protocols to provide robust privacy protection. This work presents a precise definition of the privacy-preserving property of RPM by employing indistinguishability experiments. Moreover, an innovative attack exploiting the greatest common divisor and the least common multiple of each row and column in the encrypted matrices is introduced against RPM. Unlike previous density-based attacks, this novel approach offers a significant advantage by allowing the reconstruction of matrix values from the ciphertext based on RPM. A comprehensive demonstration was provided to illustrate the failure of protocols based on RPM in maintaining the privacy-preserving property under this proposed attack. Furthermore, an extensive series of experiments is conducted to thoroughly validate the effectiveness and advantages of the attack against RPM. The findings of this research highlight vulnerabilities in RPM-based VC protocols and underline the pressing need for further enhancements and alternative privacy-preserving mechanisms in outsourcing computation.
外包计算由于其成本效益而变得越来越流行,它使资源有限的用户能够在可能不受信任的云平台上进行大规模计算。为了保护隐私,可验证计算(VC)作为一种安全的方法出现了,它确保云无法识别用户的输入和输出。随机排列掩蔽(RPM)是VC协议中广泛采用的一种技术,用于提供健壮的隐私保护。这项工作提出了一个精确的定义的隐私保护性质的RPM采用不可区分实验。此外,针对RPM引入了一种利用加密矩阵中每行和列的最大公约数和最小公倍数的创新攻击。与以前基于密度的攻击不同,这种新颖的方法提供了一个显著的优势,它允许基于RPM从密文中重建矩阵值。通过一个全面的演示来说明基于RPM的协议在这种攻击下无法保持隐私保护特性。此外,还进行了一系列广泛的实验,以彻底验证针对RPM攻击的有效性和优势。本研究的发现突出了基于rpm的VC协议的漏洞,并强调了在外包计算中进一步增强和替代隐私保护机制的迫切需要。
{"title":"Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage","authors":"Yang Yang, Guanghua Song","doi":"10.3390/info14110603","DOIUrl":"https://doi.org/10.3390/info14110603","url":null,"abstract":"Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing (VC) has emerged as a secure approach, ensuring that the cloud cannot discern users’ input and output. Random permutation masking (RPM) is a widely adopted technique in VC protocols to provide robust privacy protection. This work presents a precise definition of the privacy-preserving property of RPM by employing indistinguishability experiments. Moreover, an innovative attack exploiting the greatest common divisor and the least common multiple of each row and column in the encrypted matrices is introduced against RPM. Unlike previous density-based attacks, this novel approach offers a significant advantage by allowing the reconstruction of matrix values from the ciphertext based on RPM. A comprehensive demonstration was provided to illustrate the failure of protocols based on RPM in maintaining the privacy-preserving property under this proposed attack. Furthermore, an extensive series of experiments is conducted to thoroughly validate the effectiveness and advantages of the attack against RPM. The findings of this research highlight vulnerabilities in RPM-based VC protocols and underline the pressing need for further enhancements and alternative privacy-preserving mechanisms in outsourcing computation.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"16 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135589137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information (Switzerland)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1