首页 > 最新文献

International Journal of Innovative Computing Information and Control最新文献

英文 中文
Designing Ray-Pointing using Real hand and Touch-based in Handheld Augmented Reality for Object Selection 手持式增强现实中基于真手和触摸的光线指向设计
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.316
Nur Ameerah Binti Abdul Halim, A. W. Ismail
Augmented Reality (AR) have been widely explored worldwide for their potential as a technology that enhances information representation. As technology progresses, smartphones (handheld devices) now have sophisticated processors and cameras for capturing static photographs and video, as well as a variety of sensors for tracking the user's position, orientation, and motion. Hence, this paper would discuss a finger-ray pointing technique in real-time for interaction in handheld AR and comparing the technique with the conventional technique in handheld, touch-screen interaction. The aim of this paper is to explore the ray pointing interaction in handheld AR for 3D object selection. Previous works in handheld AR and also covers Mixed Reality (MR) have been recapped.
增强现实(AR)作为一种增强信息表示的技术,在世界范围内得到了广泛的探索。随着技术的进步,智能手机(手持设备)现在有复杂的处理器和相机来捕捉静态照片和视频,以及各种传感器来跟踪用户的位置、方向和运动。因此,本文将讨论手持式AR中实时交互的手指射线指向技术,并将该技术与传统的手持式触摸屏交互技术进行比较。本文的目的是探索手持式AR中用于3D物体选择的射线指向交互。之前在手持AR和混合现实(MR)方面的工作已经回顾。
{"title":"Designing Ray-Pointing using Real hand and Touch-based in Handheld Augmented Reality for Object Selection","authors":"Nur Ameerah Binti Abdul Halim, A. W. Ismail","doi":"10.11113/ijic.v11n2.316","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.316","url":null,"abstract":"Augmented Reality (AR) have been widely explored worldwide for their potential as a technology that enhances information representation. As technology progresses, smartphones (handheld devices) now have sophisticated processors and cameras for capturing static photographs and video, as well as a variety of sensors for tracking the user's position, orientation, and motion. Hence, this paper would discuss a finger-ray pointing technique in real-time for interaction in handheld AR and comparing the technique with the conventional technique in handheld, touch-screen interaction. The aim of this paper is to explore the ray pointing interaction in handheld AR for 3D object selection. Previous works in handheld AR and also covers Mixed Reality (MR) have been recapped.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72656407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Attention Deficit Hyperactivity Disorder using Variational Autoencoder 变分自编码器对注意缺陷多动障碍的分类
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.352
Azurah A Samah, Siti Nurul Aqilah Ahmad, Hairudin Abdul Majid, Zuraini Ali Shah, H. Hashim, Nuraina Syaza Azman, Nur Sabrina Azmi, D. Nasien
Attention Deficit Hyperactivity Disorder (ADHD) categorize as one of the typical neurodevelopmental and mental disorders. Over the years, researchers have identified ADHD as a complicated disorder since it is not directly tested with a standard medical test such as a blood or urine test on the early-stage diagnosis. Apart from the physical symptoms of ADHD, clinical data of ADHD patients show that most of them have learning problems. Therefore, functional Magnetic Resonance Imaging (fMRI) is considered the most suitable method to determine functional activity in the brain region to understand brain disorders of ADHD. One of the ways to diagnose ADHD is by using deep learning techniques, which can increase the accuracy of predicting ADHD using the fMRI dataset. Past attempts of classifying ADHD based on functional connectivity coefficient using the Deep Neural Network (DNN) result in 95% accuracy. As Variational Autoencoder (VAE) is the most popular in extracting high-level data, this model is applied in this study. This study aims to enhance the performance of VAE to increase the accuracy in classifying ADHD using fMRI data based on functional connectivity analysis. The preprocessed fMRI dataset is used for decomposition to find the region of interest (ROI), followed by Independent Component Analysis (ICA) that calculates the correlation between brain regions and creates functional connectivity matrices for each subject. As a result, the VAE model achieved an accuracy of 75% on classifying ADHD.
注意缺陷多动障碍(ADHD)是一种典型的神经发育障碍和精神障碍。多年来,研究人员已经确定ADHD是一种复杂的疾病,因为它不能直接通过早期诊断的标准医学测试(如血液或尿液测试)进行测试。ADHD患者的临床资料显示,除了身体上的症状外,大多数ADHD患者都有学习问题。因此,功能性磁共振成像(fMRI)被认为是最合适的方法来确定大脑区域的功能活动,以了解多动症的脑部疾病。诊断ADHD的方法之一是使用深度学习技术,这可以提高使用功能磁共振成像数据集预测ADHD的准确性。过去使用深度神经网络(Deep Neural Network, DNN)基于功能连接系数对ADHD进行分类的尝试准确率为95%。由于变分自编码器(VAE)在高阶数据提取中应用最为广泛,本研究采用了该模型。本研究旨在增强VAE的性能,以提高基于功能连通性分析的fMRI数据对ADHD分类的准确性。预处理的fMRI数据集用于分解以找到感兴趣的区域(ROI),然后进行独立成分分析(ICA),计算大脑区域之间的相关性并为每个受试者创建功能连接矩阵。结果,VAE模型对ADHD的分类准确率达到75%。
{"title":"Classification of Attention Deficit Hyperactivity Disorder using Variational Autoencoder","authors":"Azurah A Samah, Siti Nurul Aqilah Ahmad, Hairudin Abdul Majid, Zuraini Ali Shah, H. Hashim, Nuraina Syaza Azman, Nur Sabrina Azmi, D. Nasien","doi":"10.11113/ijic.v11n2.352","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.352","url":null,"abstract":"Attention Deficit Hyperactivity Disorder (ADHD) categorize as one of the typical neurodevelopmental and mental disorders. Over the years, researchers have identified ADHD as a complicated disorder since it is not directly tested with a standard medical test such as a blood or urine test on the early-stage diagnosis. Apart from the physical symptoms of ADHD, clinical data of ADHD patients show that most of them have learning problems. Therefore, functional Magnetic Resonance Imaging (fMRI) is considered the most suitable method to determine functional activity in the brain region to understand brain disorders of ADHD. One of the ways to diagnose ADHD is by using deep learning techniques, which can increase the accuracy of predicting ADHD using the fMRI dataset. Past attempts of classifying ADHD based on functional connectivity coefficient using the Deep Neural Network (DNN) result in 95% accuracy. As Variational Autoencoder (VAE) is the most popular in extracting high-level data, this model is applied in this study. This study aims to enhance the performance of VAE to increase the accuracy in classifying ADHD using fMRI data based on functional connectivity analysis. The preprocessed fMRI dataset is used for decomposition to find the region of interest (ROI), followed by Independent Component Analysis (ICA) that calculates the correlation between brain regions and creates functional connectivity matrices for each subject. As a result, the VAE model achieved an accuracy of 75% on classifying ADHD.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74743183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraudulent Detection Model Using Machine Learning Techniques for Unstructured Supplementary Service Data 基于机器学习技术的非结构化补充业务数据欺诈检测模型
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.299
Ayorinde O. Akinje, A. Fuad
The increase in mobile phones accessibility and technological advancement in almost every corner of the world has shaped how banks offer financial service. Such services were extended to low-end customers without a smartphone providing Alternative Banking Channels (ABCs) service, rendering regular financial service same as those on smartphones. One of the services of this ABC’s is Unstructured Supplementary Service Data (USSD), two-way communication between mobile phones and applications, which is used to render financial services all from the bank accounts linked for this USSD service. Fraudsters have taken advantage of innocent customers on this channel to carry out fraudulent activities with high impart of fraudulent there is still not an implemented fraud detection model to detect this fraud activities. This paper is an investigation into fraud detection model using machine learning techniques for Unstructured Supplementary Service Data based on short-term memory. Statistical features were derived by aggregating customers activities using a short window size to improve the model performance on selected machine learning classifiers, employing the best set of features to improve the model performance. Based on the results obtained, the proposed Fraudulent detection model demonstrated that with the appropriate machine learning techniques for USSD,  best performance was achieved with Random forest having the best result of 100% across all its performance measure, KNeighbors was second in performance measure having an average of 99% across all its performance measure while Gradient boosting was third in its performance measure, its achieved accuracy is 91.94%, precession is 86%, recall is 100% and f1 score is 92.54%. Result obtained shows two of the selected machine learning random forest and decision tree are best fit for the fraud detection in this model. With the right features derived and an appropriate machine learning algorithm, the proposed model offers the best fraud detection accuracy.
移动电话的普及和技术的进步几乎遍及世界的每个角落,这影响了银行提供金融服务的方式。向没有智能手机的低端客户提供替代银行渠道(ABCs)服务,提供与智能手机一样的常规金融服务。该ABC的服务之一是非结构化补充服务数据(USSD),这是移动电话和应用程序之间的双向通信,用于提供所有来自该USSD服务链接的银行账户的金融服务。欺诈者利用这一渠道上的无辜客户进行欺诈活动,欺诈的可能性很高,目前还没有一个实施的欺诈检测模型来检测这种欺诈活动。本文研究了基于短期记忆的非结构化补充业务数据的机器学习欺诈检测模型。统计特征是通过使用短窗口大小聚合客户活动来获得的,以提高所选机器学习分类器上的模型性能,采用最佳特征集来提高模型性能。根据所获得的结果,所提出的欺诈检测模型表明,使用适当的USSD机器学习技术,随机森林在其所有性能度量中获得了100%的最佳结果,KNeighbors在性能度量中排名第二,在其所有性能度量中平均为99%,而梯度增强在其性能度量中排名第三,其实现的准确性为91.94%,进差为86%。召回率为100%,f1得分为92.54%。结果表明,选择的机器学习随机森林和决策树最适合该模型中的欺诈检测。通过正确的特征推导和适当的机器学习算法,该模型提供了最佳的欺诈检测精度。
{"title":"Fraudulent Detection Model Using Machine Learning Techniques for Unstructured Supplementary Service Data","authors":"Ayorinde O. Akinje, A. Fuad","doi":"10.11113/ijic.v11n2.299","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.299","url":null,"abstract":"The increase in mobile phones accessibility and technological advancement in almost every corner of the world has shaped how banks offer financial service. Such services were extended to low-end customers without a smartphone providing Alternative Banking Channels (ABCs) service, rendering regular financial service same as those on smartphones. One of the services of this ABC’s is Unstructured Supplementary Service Data (USSD), two-way communication between mobile phones and applications, which is used to render financial services all from the bank accounts linked for this USSD service. Fraudsters have taken advantage of innocent customers on this channel to carry out fraudulent activities with high impart of fraudulent there is still not an implemented fraud detection model to detect this fraud activities. This paper is an investigation into fraud detection model using machine learning techniques for Unstructured Supplementary Service Data based on short-term memory. Statistical features were derived by aggregating customers activities using a short window size to improve the model performance on selected machine learning classifiers, employing the best set of features to improve the model performance. Based on the results obtained, the proposed Fraudulent detection model demonstrated that with the appropriate machine learning techniques for USSD,  best performance was achieved with Random forest having the best result of 100% across all its performance measure, KNeighbors was second in performance measure having an average of 99% across all its performance measure while Gradient boosting was third in its performance measure, its achieved accuracy is 91.94%, precession is 86%, recall is 100% and f1 score is 92.54%. Result obtained shows two of the selected machine learning random forest and decision tree are best fit for the fraud detection in this model. With the right features derived and an appropriate machine learning algorithm, the proposed model offers the best fraud detection accuracy.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73652642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pre-define Rotation Amplitudes Object Rotation in Handheld Augmented Reality 在手持增强现实中预定义旋转幅度对象旋转
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.315
Goh Eg Su, A. W. Ismail
Interaction is one of the important topics to be discussed since it includes the interface where the end-user communicates with the augmented reality (AR) system. In handheld AR interface, the traditional interaction techniques are not suitable for some AR applications due to the different attributes of handheld devices that always refer to smartphones and tablets. Currently interaction techniques in handheld AR are known as touch-based technique, mid-air gesture-based technique and device-based technique that can led to a wide discussion in related research areas. However, this paper will focus to discover the device-based interaction technique because it has proven in the previous studies to be more suitable and robust in several aspects. A novel device-based 3D object rotation technique is proposed to solve the current problem in performing 3DOF rotation of 3D object. The goal is to produce a precise and faster 3D object rotation. Therefore, the determination of the rotation amplitudes per second is required before the fully implementation. This paper discusses the implementation in depth and provides a guideline for those who works in related to device-based interaction.
交互是要讨论的重要主题之一,因为它包括最终用户与增强现实(AR)系统通信的接口。在手持AR界面中,由于手持设备的属性不同,通常指的是智能手机和平板电脑,传统的交互技术并不适合某些AR应用。目前手持式增强现实中的交互技术主要有基于触摸的技术、基于空中手势的技术和基于设备的技术,这些技术在相关研究领域引起了广泛的讨论。然而,本文将重点探索基于设备的交互技术,因为在以往的研究中,基于设备的交互技术在几个方面都被证明是更适合和鲁棒的。针对目前三维物体三维旋转中存在的问题,提出了一种基于器件的三维物体旋转技术。目标是产生精确和更快的3D对象旋转。因此,在完全实现之前,需要确定每秒的旋转幅度。本文深入讨论了实现,并为从事基于设备的交互相关工作的人员提供了指导方针。
{"title":"Pre-define Rotation Amplitudes Object Rotation in Handheld Augmented Reality","authors":"Goh Eg Su, A. W. Ismail","doi":"10.11113/ijic.v11n2.315","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.315","url":null,"abstract":"Interaction is one of the important topics to be discussed since it includes the interface where the end-user communicates with the augmented reality (AR) system. In handheld AR interface, the traditional interaction techniques are not suitable for some AR applications due to the different attributes of handheld devices that always refer to smartphones and tablets. Currently interaction techniques in handheld AR are known as touch-based technique, mid-air gesture-based technique and device-based technique that can led to a wide discussion in related research areas. However, this paper will focus to discover the device-based interaction technique because it has proven in the previous studies to be more suitable and robust in several aspects. A novel device-based 3D object rotation technique is proposed to solve the current problem in performing 3DOF rotation of 3D object. The goal is to produce a precise and faster 3D object rotation. Therefore, the determination of the rotation amplitudes per second is required before the fully implementation. This paper discusses the implementation in depth and provides a guideline for those who works in related to device-based interaction.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82002696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual Analytics Design for Students Assessment Representation based on Supervised Learning Algorithms 基于监督学习算法的学生评价表示可视化分析设计
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.346
Adlina Abdul Samad, Marina Md Arshad, M. Md. Siraj, Nur Aishah Shamsudin
Visual Analytics is very effective in many applications especially in education field and improved the decision making on enhancing the student assessment. Student assessment has become very important and is identified as a systematic process that measures and collects data such as marks and scores in a manner that enables the educator to analyze the achievement of the intended learning outcomes. The objective of this study is to investigate the suitable visual analytics design to represent the student assessment data with the suitable interaction techniques of the visual analytics approach. sheet. There are six types of analytical models, such as the Generalized Linear Model, Deep Learning, Decision Tree Model, Random Forest Model, Gradient Boosted Model, and Support Vector Machine were used to conduct this research. Our experimental results show that the Decision Tree Models were the fastest way to optimize the result. The Gradient Boosted Model was the best performance to optimize the result.
可视化分析在许多方面的应用都是非常有效的,特别是在教育领域,它在提高学生评价方面改进了决策。学生评估已经变得非常重要,并且被认为是一个系统的过程,它测量和收集分数和分数等数据,使教育者能够分析预期学习成果的实现情况。本研究的目的是研究合适的视觉分析设计,以视觉分析方法的合适交互技术来表示学生评估数据。床单本文使用了广义线性模型、深度学习模型、决策树模型、随机森林模型、梯度提升模型和支持向量机等六种分析模型进行研究。实验结果表明,决策树模型是优化结果的最快方法。梯度增强模型是优化结果的最佳性能。
{"title":"Visual Analytics Design for Students Assessment Representation based on Supervised Learning Algorithms","authors":"Adlina Abdul Samad, Marina Md Arshad, M. Md. Siraj, Nur Aishah Shamsudin","doi":"10.11113/ijic.v11n2.346","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.346","url":null,"abstract":"Visual Analytics is very effective in many applications especially in education field and improved the decision making on enhancing the student assessment. Student assessment has become very important and is identified as a systematic process that measures and collects data such as marks and scores in a manner that enables the educator to analyze the achievement of the intended learning outcomes. The objective of this study is to investigate the suitable visual analytics design to represent the student assessment data with the suitable interaction techniques of the visual analytics approach. sheet. There are six types of analytical models, such as the Generalized Linear Model, Deep Learning, Decision Tree Model, Random Forest Model, Gradient Boosted Model, and Support Vector Machine were used to conduct this research. Our experimental results show that the Decision Tree Models were the fastest way to optimize the result. The Gradient Boosted Model was the best performance to optimize the result.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Genetic Algorithm Ensemble Filter Methods on Kidney Disease Classification 遗传算法集成滤波在肾脏疾病分类中的应用
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.345
S. Huspi, Chong Ke Ting
Kidney failure will give effect to the human body, and it can lead to a series of seriously illness and even causing death. Machine learning plays important role in disease classification with high accuracy and shorter processing time as compared to clinical lab test. There are 24 attributes in the Chronic K idney Disease (CKD) clinical dataset, which is considered as too much of attributes. To improve the performance of the classification, filter feature selection methods used to reduce the dimensions of the feature and then the ensemble algorithm is used to identify the union features that selected from each filter feature selection. The filter feature selection that implemented in this research are Information Gain (IG), Chi-Squares, ReliefF and Fisher Score. Genetic Algorithm (GA) is used to select the best subset from the ensemble result of the filter feature selection. In this research, Random Forest (RF), XGBoost, Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Naïve Bayes classification techniques were used to diagnose the CKD. The features subset that selected are different and specialised for each classifier. By implementing the proposed method irrelevant features through filter feature selection able to reduce the burden and computational cost for the genetic algorithm. Then, the genetic algorithm able to perform better and select the best subset that able to improve the performance of the classifier with less attributes. The proposed genetic algorithm union filter feature selections improve the performance of the classification algorithm. The accuracy of RF, XGBoost, KNN and SVM can achieve to 100% and NB can achieve to 99.17%. The proposed method successfully improves the performance of the classifier by using less features as compared to other previous work.
肾衰竭会对人体产生影响,可导致一系列严重疾病,甚至导致死亡。与临床实验室测试相比,机器学习在疾病分类中具有很高的准确性和更短的处理时间。慢性肾病(Chronic K idney Disease, CKD)临床数据集中有24个属性,被认为属性过多。为了提高分类的性能,首先采用滤波器特征选择方法对特征进行降维,然后采用集成算法对从每个滤波器特征选择中选择的联合特征进行识别。本研究实现的滤波器特征选择有信息增益(Information Gain, IG)、卡方、ReliefF和Fisher Score。利用遗传算法从滤波器特征选择的综合结果中选择最优子集。本研究采用随机森林(Random Forest, RF)、XGBoost、支持向量机(Support Vector Machine, SVM)、k -最近邻(K-Nearest Neighbor, KNN)和Naïve贝叶斯分类技术对CKD进行诊断。所选择的特征子集对于每个分类器是不同的和专门的。通过对不相关特征进行滤波特征选择,可以减少遗传算法的负担和计算量。然后,遗传算法能够更好地执行并选择能够提高分类器性能的属性较少的最佳子集。提出的遗传算法联合滤波特征选择提高了分类算法的性能。RF、XGBoost、KNN和SVM的准确率可以达到100%,NB可以达到99.17%。与以往的工作相比,该方法通过使用更少的特征,成功地提高了分类器的性能。
{"title":"Genetic Algorithm Ensemble Filter Methods on Kidney Disease Classification","authors":"S. Huspi, Chong Ke Ting","doi":"10.11113/ijic.v11n2.345","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.345","url":null,"abstract":"Kidney failure will give effect to the human body, and it can lead to a series of seriously illness and even causing death. Machine learning plays important role in disease classification with high accuracy and shorter processing time as compared to clinical lab test. There are 24 attributes in the Chronic K idney Disease (CKD) clinical dataset, which is considered as too much of attributes. To improve the performance of the classification, filter feature selection methods used to reduce the dimensions of the feature and then the ensemble algorithm is used to identify the union features that selected from each filter feature selection. The filter feature selection that implemented in this research are Information Gain (IG), Chi-Squares, ReliefF and Fisher Score. Genetic Algorithm (GA) is used to select the best subset from the ensemble result of the filter feature selection. In this research, Random Forest (RF), XGBoost, Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Naïve Bayes classification techniques were used to diagnose the CKD. The features subset that selected are different and specialised for each classifier. By implementing the proposed method irrelevant features through filter feature selection able to reduce the burden and computational cost for the genetic algorithm. Then, the genetic algorithm able to perform better and select the best subset that able to improve the performance of the classifier with less attributes. The proposed genetic algorithm union filter feature selections improve the performance of the classification algorithm. The accuracy of RF, XGBoost, KNN and SVM can achieve to 100% and NB can achieve to 99.17%. The proposed method successfully improves the performance of the classifier by using less features as compared to other previous work.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89950209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervised Machine Learning Algorithms for Sentiment Analysis of Bangla Newspaper 孟加拉语报纸情感分析的监督机器学习算法
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.321
Sabrina Jahan Maisha, Nuren Nafisa, Abdul Kadar Muhammad Masum
We can state undoubtedly that Bangla language is rich enough to work with and implement various Natural Language Processing (NLP) tasks. Though it needs proper attention, hardly NLP field has been explored with it. In this age of digitalization, large amount of Bangla news contents are generated in online platforms. Some of the contents are inappropriate for the children or aged people. With the motivation to filter out news contents easily, the aim of this work is to perform document level sentiment analysis (SA) on Bangla online news. In this respect, the dataset is created by collecting news from online Bangla newspaper archive.  Further, the documents are manually annotated into positive and negative classes. Composite process technique of “Pipeline” class including Count Vectorizer, transformer (TF-IDF) and machine learning (ML) classifiers are employed to extract features and to train the dataset. Six supervised ML classifiers (i.e. Multinomial Naive Bayes (MNB), K-Nearest Neighbor (K-NN), Random Forest (RF), (C4.5) Decision Tree (DT), Logistic Regression (LR) and Linear Support Vector Machine (LSVM)) are used to analyze the best classifier for the proposed model. There has been very few works on SA of Bangla news. So, this work is a small attempt to contribute in this field. This model showed remarkable efficiency through better results in both the validation process of percentage split method and 10-fold cross validation. Among all six classifiers, RF has outperformed others by 99% accuracy. Even though LSVM has shown lowest accuracy of 80%, it is also considered as good output. However, this work has also exhibited surpassing outcome for recent and critical Bangla news indicating proper feature extraction to build up the model.
我们可以毫无疑问地说,孟加拉语足够丰富,可以处理和实现各种自然语言处理(NLP)任务。虽然值得重视,但在自然语言处理领域却鲜有涉足。在这个数字化的时代,大量的孟加拉语新闻内容在网络平台上产生。有些内容不适合儿童或老年人。为了方便地过滤新闻内容,本工作的目的是对孟加拉在线新闻进行文档级情感分析(SA)。在这方面,数据集是通过收集在线孟加拉报纸档案中的新闻来创建的。此外,文档被手工标注为正类和负类。采用“Pipeline”类的复合处理技术,包括计数矢量器(Count Vectorizer)、变压器(TF-IDF)和机器学习(ML)分类器来提取特征并对数据集进行训练。使用六个监督机器学习分类器(即多项朴素贝叶斯(MNB), k -近邻(K-NN),随机森林(RF), (C4.5)决策树(DT),逻辑回归(LR)和线性支持向量机(LSVM))来分析所提出模型的最佳分类器。关于孟加拉新闻SA的作品很少。因此,这项工作是在这个领域做出贡献的一个小小的尝试。该模型在百分比分割法的验证过程和10倍交叉验证过程中均取得了较好的结果,显示了显著的效率。在所有六个分类器中,RF的准确率超过其他分类器99%。尽管LSVM的准确率最低,只有80%,但它也被认为是一个很好的输出。然而,这项工作也为最近和关键的孟加拉国新闻展示了超越的结果,表明适当的特征提取来建立模型。
{"title":"Supervised Machine Learning Algorithms for Sentiment Analysis of Bangla Newspaper","authors":"Sabrina Jahan Maisha, Nuren Nafisa, Abdul Kadar Muhammad Masum","doi":"10.11113/ijic.v11n2.321","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.321","url":null,"abstract":"We can state undoubtedly that Bangla language is rich enough to work with and implement various Natural Language Processing (NLP) tasks. Though it needs proper attention, hardly NLP field has been explored with it. In this age of digitalization, large amount of Bangla news contents are generated in online platforms. Some of the contents are inappropriate for the children or aged people. With the motivation to filter out news contents easily, the aim of this work is to perform document level sentiment analysis (SA) on Bangla online news. In this respect, the dataset is created by collecting news from online Bangla newspaper archive.  Further, the documents are manually annotated into positive and negative classes. Composite process technique of “Pipeline” class including Count Vectorizer, transformer (TF-IDF) and machine learning (ML) classifiers are employed to extract features and to train the dataset. Six supervised ML classifiers (i.e. Multinomial Naive Bayes (MNB), K-Nearest Neighbor (K-NN), Random Forest (RF), (C4.5) Decision Tree (DT), Logistic Regression (LR) and Linear Support Vector Machine (LSVM)) are used to analyze the best classifier for the proposed model. There has been very few works on SA of Bangla news. So, this work is a small attempt to contribute in this field. This model showed remarkable efficiency through better results in both the validation process of percentage split method and 10-fold cross validation. Among all six classifiers, RF has outperformed others by 99% accuracy. Even though LSVM has shown lowest accuracy of 80%, it is also considered as good output. However, this work has also exhibited surpassing outcome for recent and critical Bangla news indicating proper feature extraction to build up the model.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90424836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion Alert Reduction Based on Unsupervised and Supervised Learning Algorithms 基于无监督和监督学习算法的入侵警报降低
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.331
Oyinkansola Oluwapelumi Kemi Afolabi-B, M. Md. Siraj
Security and protection of information is an ever-evolving process in the field of information security. One of the major tools of protection is the Intrusion Detection Systems (IDS). For so many years, IDS have been developed for use in computer networks, they have been widely used to detect a range of network attacks; but one of its major drawbacks is that attackers, with the evolution of time and technology make it harder for IDS systems to cope. A sub-branch of IDS-Intrusion Alert Analysis was introduced into the research system to combat these problems and help support IDS by analyzing the alert triggered by the IDS. Intrusion Alert analysis has served as a good support for IDS systems for many years but also has its own short comings which are the amount of the voluminous number of alerts produced by IDS systems. From years of research, it has been observed that majority of the alerts produced are undesirables such as duplicates, false alerts, etc., leading to huge amounts of alerts causing alert flooding. This research proposed the reduction alert by targeting these undesirable alerts through the integration of supervised and unsupervised algorithms and approach. The research first selects significant features by comparing two feature ranking techniques this targets duplicates, low priority and irrelevant alert. To achieve further reduction, the research proposed the integration of supervised and unsupervised algorithms to filter out false alerts. Based on this, an effective model was gotten which achieved 94.02% reduction rate of alerts. Making use of the dataset ISCX 2012, experiments were conducted and the model with the highest reduction rate was chosen. The model was evaluated against other experimental results and benchmarked against a related work, it also improved on the said related work.
在信息安全领域,信息安全与保护是一个不断发展的过程。入侵检测系统(IDS)是主要的防护工具之一。多年来,IDS被开发用于计算机网络,它们已被广泛用于检测一系列网络攻击;但它的主要缺点之一是攻击者,随着时间和技术的发展,使IDS系统更难应对。为了解决这些问题,研究系统引入了入侵防御的分支——入侵警报分析,并通过分析入侵防御触发的警报来支持入侵防御。入侵警报分析多年来一直为入侵检测系统提供良好的支持,但也有其自身的不足,即入侵检测系统产生的警报数量庞大。从多年的研究中可以观察到,产生的大多数警报都是不希望的,如重复警报,假警报等,导致大量警报,造成警报泛滥。本研究通过整合监督与无监督的算法和方法,针对这些不良警报提出了减少警报的方法。本研究首先通过对比两种特征排序技术筛选出重要特征,分别针对重复、低优先级和无关警报。为了进一步减少错误警报,研究提出了整合监督和无监督算法来过滤虚假警报。在此基础上,得到了一个有效的模型,该模型的告警减少率达到了94.02%。利用数据集ISCX 2012进行实验,选择了还原率最高的模型。该模型与其他实验结果进行了评估,并与相关工作进行了基准测试,并对该相关工作进行了改进。
{"title":"Intrusion Alert Reduction Based on Unsupervised and Supervised Learning Algorithms","authors":"Oyinkansola Oluwapelumi Kemi Afolabi-B, M. Md. Siraj","doi":"10.11113/ijic.v11n2.331","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.331","url":null,"abstract":"Security and protection of information is an ever-evolving process in the field of information security. One of the major tools of protection is the Intrusion Detection Systems (IDS). For so many years, IDS have been developed for use in computer networks, they have been widely used to detect a range of network attacks; but one of its major drawbacks is that attackers, with the evolution of time and technology make it harder for IDS systems to cope. A sub-branch of IDS-Intrusion Alert Analysis was introduced into the research system to combat these problems and help support IDS by analyzing the alert triggered by the IDS. Intrusion Alert analysis has served as a good support for IDS systems for many years but also has its own short comings which are the amount of the voluminous number of alerts produced by IDS systems. From years of research, it has been observed that majority of the alerts produced are undesirables such as duplicates, false alerts, etc., leading to huge amounts of alerts causing alert flooding. This research proposed the reduction alert by targeting these undesirable alerts through the integration of supervised and unsupervised algorithms and approach. The research first selects significant features by comparing two feature ranking techniques this targets duplicates, low priority and irrelevant alert. To achieve further reduction, the research proposed the integration of supervised and unsupervised algorithms to filter out false alerts. Based on this, an effective model was gotten which achieved 94.02% reduction rate of alerts. Making use of the dataset ISCX 2012, experiments were conducted and the model with the highest reduction rate was chosen. The model was evaluated against other experimental results and benchmarked against a related work, it also improved on the said related work.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86616851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems 基于soe的物联网服务系统中消息机密性的混合加密
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.292
M. Ahmed
Internet of Things (IOT) is an essential paradigm where devices are interconnected into network. The operations of these devices can be through service-oriented software engineering (SOSE) principles for efficient service provision. SOSE is an important software development method for flexible, agile, loose-coupled, heterogeneous and interoperable applications. Despite all these benefits, its adoption for IOT services is slow due to security challenges. The security challenge of integration of IOT with service-oriented architecture (SOA) is man-in-the-middle attack on the messages exchanged. The transport layer security (TLS) creates a secured socket channel between the client and server. This is efficient in securing messages exchanged at the transport layer only. SOSE-based IOT systems needs an end-to-end security to handle its vulnerabilities. This integration enables interoperability of heterogeneous devices, but renders the system vulnerable to passive attacks. The confidentiality problem is hereby addressed by message level hybrid encryption. This is by encrypting the messages by AES for efficiency. However, to enable end-to-end security, the key sharing problem of advanced encryption standard (AES) is handled by RSA public key encryption. The results shows that this solution addressed data contents security and credentials security privacy issues. Furthermore, the solution enables end-to- end security of interaction in SOSE-based IOT systems.
物联网(IOT)是将设备连接到网络中的基本范例。这些设备的操作可以通过面向服务的软件工程(service-oriented software engineering, SOSE)原则来高效地提供服务。soe是实现灵活、敏捷、松耦合、异构和互操作应用的重要软件开发方法。尽管有这些好处,但由于安全挑战,它在物联网服务中的采用速度很慢。物联网与面向服务的体系结构(SOA)集成的安全挑战是对交换消息的中间人攻击。传输层安全性(TLS)在客户机和服务器之间创建一个安全的套接字通道。这在保护仅在传输层交换的消息方面非常有效。基于soe的物联网系统需要端到端的安全性来处理其漏洞。这种集成实现了异构设备的互操作性,但使系统容易受到被动攻击。因此,通过消息级混合加密解决了机密性问题。这是通过使用AES加密消息来提高效率。而为了实现端到端的安全性,采用RSA公钥加密来处理高级加密标准AES的密钥共享问题。结果表明,该解决方案解决了数据内容安全和凭证安全隐私问题。此外,该解决方案在基于soe的物联网系统中实现了端到端交互安全。
{"title":"Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems","authors":"M. Ahmed","doi":"10.11113/ijic.v11n2.292","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.292","url":null,"abstract":"Internet of Things (IOT) is an essential paradigm where devices are interconnected into network. The operations of these devices can be through service-oriented software engineering (SOSE) principles for efficient service provision. SOSE is an important software development method for flexible, agile, loose-coupled, heterogeneous and interoperable applications. Despite all these benefits, its adoption for IOT services is slow due to security challenges. The security challenge of integration of IOT with service-oriented architecture (SOA) is man-in-the-middle attack on the messages exchanged. The transport layer security (TLS) creates a secured socket channel between the client and server. This is efficient in securing messages exchanged at the transport layer only. SOSE-based IOT systems needs an end-to-end security to handle its vulnerabilities. This integration enables interoperability of heterogeneous devices, but renders the system vulnerable to passive attacks. The confidentiality problem is hereby addressed by message level hybrid encryption. This is by encrypting the messages by AES for efficiency. However, to enable end-to-end security, the key sharing problem of advanced encryption standard (AES) is handled by RSA public key encryption. The results shows that this solution addressed data contents security and credentials security privacy issues. Furthermore, the solution enables end-to- end security of interaction in SOSE-based IOT systems.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75305299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Blockchain Technique for Secure Land Registration Data Records 一种用于安全土地注册数据记录的改进区块链技术
IF 1 Q2 Computer Science Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.291
Salman Humdullah, S. H. Othman, Muhammad Najib Razali, Hazinah Kutty Mammi, R. Javed
The land is a very valuable asset for any government. It’s government job to ensure that the land registration and transfer are done without any fraud, good speed and transparency. The current land registration method employed by the governments are not open to frauds, hacks, and corruption of land records. Fraud is one of the major problems in land registration methods. In this study, the goal is to develop the framework by incorporating the blockchain technique that secures the land data during the land registration and transfer phases by preventing the fraud. The use of blockchain gives us the transparent, decentralized and robust infrastructure to build our framework upon. The blockchain technology is implemented with the asymmetric keys encryption/decryption that securely stores the land registration/transfer data. The data is held using encrypting with the public key of the landowner and storing a hash of the data. The use of the cryptographic function of hashing using SHA. The comparison of using SHA 256 and SHA 512 is given and discussed. The dataset used to compare results is created using 200 records of JSON objects with each object being identical for both SHA256 and SHA512 to remove data bias. The proposed framework with the SHA 512 performed 29% faster than the SHA 256. The results indicate our proposed framework performing better than the works proposed in current research land registration techniques.
土地对任何政府来说都是非常宝贵的资产。政府的工作是确保土地注册和转让没有欺诈,速度快,透明度高。政府目前采用的土地登记方法不允许欺诈、黑客和土地记录腐败。欺诈是土地登记方法中的主要问题之一。在本研究中,目标是通过结合区块链技术来开发框架,该技术通过防止欺诈,在土地注册和转让阶段保护土地数据。区块链的使用为我们提供了透明、分散和强大的基础设施来构建我们的框架。区块链技术通过非对称密钥加密/解密实现,安全存储土地注册/转让数据。使用土地所有者的公钥加密并存储数据的哈希值来保存数据。使用SHA散列的加密功能。对使用SHA 256和SHA 512进行了比较和讨论。用于比较结果的数据集是使用200条JSON对象记录创建的,每个对象对于SHA256和SHA512都是相同的,以消除数据偏差。提出的SHA 512框架比SHA 256执行速度快29%。结果表明,我们提出的框架比目前研究土地登记技术中提出的工作表现更好。
{"title":"An Improved Blockchain Technique for Secure Land Registration Data Records","authors":"Salman Humdullah, S. H. Othman, Muhammad Najib Razali, Hazinah Kutty Mammi, R. Javed","doi":"10.11113/ijic.v11n2.291","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.291","url":null,"abstract":"The land is a very valuable asset for any government. It’s government job to ensure that the land registration and transfer are done without any fraud, good speed and transparency. The current land registration method employed by the governments are not open to frauds, hacks, and corruption of land records. Fraud is one of the major problems in land registration methods. In this study, the goal is to develop the framework by incorporating the blockchain technique that secures the land data during the land registration and transfer phases by preventing the fraud. The use of blockchain gives us the transparent, decentralized and robust infrastructure to build our framework upon. The blockchain technology is implemented with the asymmetric keys encryption/decryption that securely stores the land registration/transfer data. The data is held using encrypting with the public key of the landowner and storing a hash of the data. The use of the cryptographic function of hashing using SHA. The comparison of using SHA 256 and SHA 512 is given and discussed. The dataset used to compare results is created using 200 records of JSON objects with each object being identical for both SHA256 and SHA512 to remove data bias. The proposed framework with the SHA 512 performed 29% faster than the SHA 256. The results indicate our proposed framework performing better than the works proposed in current research land registration techniques.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84174187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Innovative Computing Information and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1