首页 > 最新文献

East African Journal of Information Technology最新文献

英文 中文
The Mediating Role of Teacher Training and Learner Orientation in ICT Integration for Competence-Based Curriculum Implementation in Kyaka II Refugee Settlement 教师培训和学习者导向在信息与传播技术整合促进基于能力的课程实施中的中介作用
Pub Date : 2024-07-23 DOI: 10.37284/eajit.7.1.2056
Jessica Kabasiita, Edmond Kagambe, Tawheed Kasiita, Maliko Kisembo, Aisha Namubiru, Edith Namutebi
This study explored the impact of teacher training and learner orientation on the integration of Information and Communication Technologies (ICTs) within the Competence-Based Curriculum (CBC) in secondary schools in Kyaka II Refugee Settlement. Despite significant efforts to improve education in refugee contexts, effective ICT integration remains a complex challenge. The research examined how teacher training and learner orientation influence ICT usage, teacher preparedness, and student engagement in this distinctive educational environment. Utilizing a descriptive survey design and questionnaires, data was collected from 455 participants, including 89 purposively selected teachers and 366 randomly selected students. Data was analyzed using SPSS to generate descriptive statistics. The findings indicate that comprehensive teacher training positively affects ICT integration, with trained educators demonstrating enhanced confidence and competence in using ICT tools, as evidenced by a moderate positive correlation coefficient (r = 0.54). Oriented learners exhibited increased interest and engagement in ICT-driven learning. The study identified a gap between training outcomes and practical classroom application, suggesting a need for more hands-on and continuous professional development. Challenges such as inadequate ICT infrastructure, poor internet connectivity, and limited administrative support were significant barriers to optimal ICT integration. The study recommends implementing ongoing, hands-on teacher training programs, improving ICT infrastructure, establishing robust support systems within schools, and enhancing student access to ICT resources to address these challenges and support effective ICT integration in refugee education settings
本研究探讨了教师培训和学生定位对 Kyaka II 难民定居点中学将信息和通信技术(ICTs)纳入能力本位课程(CBC)的影响。尽管为改善难民环境下的教育做出了巨大努力,但有效整合信息和通信技术仍是一项复杂的挑战。本研究探讨了在这一独特的教育环境中,教师培训和学习者导向如何影响信息与传播技术的使用、教师的准备程度以及学生的参与程度。研究采用描述性调查设计和问卷调查的方法,收集了 455 名参与者的数据,其中包括 89 名特意挑选的教师和 366 名随机挑选的学生。使用 SPSS 对数据进行分析,生成描述性统计数据。研究结果表明,全面的教师培训对信息与传播技术的整合产生了积极影响,受训教育工作者在使用信息与传播技术工具方面表现出更强的信心和能力,这一点可以从中等程度的正相关系数(r = 0.54)中得到证明。定向学习者对信息和传播技术驱动的学习表现出更大的兴趣和参与度。研究发现,培训成果与课堂实际应用之间存在差距,表明需要更多的实践和持续的专业发展。信息与传播技术基础设施不足、互联网连接不畅、行政支持有限等挑战是实现信息与传播技术最佳整合的重大障碍。研究建议实施持续的、实践性的教师培训计划,改善信息和通信技术基础设施,在学校内部建立强大的支持系统,并增加学生获取信息和通信技术资源的机会,以应对这些挑战,支持信息和通信技术在难民教育环境中的有效整合。
{"title":"The Mediating Role of Teacher Training and Learner Orientation in ICT Integration for Competence-Based Curriculum Implementation in Kyaka II Refugee Settlement","authors":"Jessica Kabasiita, Edmond Kagambe, Tawheed Kasiita, Maliko Kisembo, Aisha Namubiru, Edith Namutebi","doi":"10.37284/eajit.7.1.2056","DOIUrl":"https://doi.org/10.37284/eajit.7.1.2056","url":null,"abstract":"This study explored the impact of teacher training and learner orientation on the integration of Information and Communication Technologies (ICTs) within the Competence-Based Curriculum (CBC) in secondary schools in Kyaka II Refugee Settlement. Despite significant efforts to improve education in refugee contexts, effective ICT integration remains a complex challenge. The research examined how teacher training and learner orientation influence ICT usage, teacher preparedness, and student engagement in this distinctive educational environment. Utilizing a descriptive survey design and questionnaires, data was collected from 455 participants, including 89 purposively selected teachers and 366 randomly selected students. Data was analyzed using SPSS to generate descriptive statistics. The findings indicate that comprehensive teacher training positively affects ICT integration, with trained educators demonstrating enhanced confidence and competence in using ICT tools, as evidenced by a moderate positive correlation coefficient (r = 0.54). Oriented learners exhibited increased interest and engagement in ICT-driven learning. The study identified a gap between training outcomes and practical classroom application, suggesting a need for more hands-on and continuous professional development. Challenges such as inadequate ICT infrastructure, poor internet connectivity, and limited administrative support were significant barriers to optimal ICT integration. The study recommends implementing ongoing, hands-on teacher training programs, improving ICT infrastructure, establishing robust support systems within schools, and enhancing student access to ICT resources to address these challenges and support effective ICT integration in refugee education settings","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141813058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya 利用技术提供政府服务:确保肯尼亚电子公民服务的建议
Pub Date : 2024-02-14 DOI: 10.37284/eajit.7.1.1757
Lucy W. Maina, Godfred Ohndyl Otieno
Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals
世界各国政府在提供公共服务时越来越多地采用电子政务。这一发展大大减少了官僚主义,提高了效率,减少了腐败,并从根本上改变了公共服务的提供。然而,采用这些由国际公司、非国家行为者(主要是跨国公司)拥有的版权技术解决方案,同样使肯尼亚等用户政府面临重大的网络空间安全威胁、服务中断、国家安全受到威胁、国家独立受到干扰以及国家主权丧失。这些威胁来自攻击性国家、非国家和个人利用集成和依赖性互联网连接网络的活动。本文摘自一项关于肯尼亚电子公民服务面临的信息安全威胁的研究。该研究介绍了肯尼亚为确保电子公民服务安全而采取的信息安全措施。 案例研究采用了描述性研究设计,以全国 51 个 Huduma 中心的 12,000 名受访者(用户)为对象。研究采用了有目的的抽样方法来选择 Huduma 中心和每个中心 10%的受访者。 共发放了约 1200 份调查问卷,回收率为 966 份,回收率为 80%。研究采用定量和定性技术进行分析。假设检验的显著性水平为 5%。研究确定了 10 类安全措施,本文将讨论其中的 6 类,即国家能力、机构政策、能力 发展、备份、物理访问、专业认证、频繁的信息和通信技术审计、防火墙和管理安全 审查。研究建议采用本地模式的技术解决方案、互惠互利的网络安全合作、频繁的基础设施安全审计、用户能力培训和重组国家安全机构,以建立网络空间人员配备能力。这些部门变革将加强预防、防御和进攻能力,以应对地缘政治、技术、经济和安全竞争以及全球各国、非国家行为者和恶意个人之间的竞争所带来的网络空间威胁。
{"title":"Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya","authors":"Lucy W. Maina, Godfred Ohndyl Otieno","doi":"10.37284/eajit.7.1.1757","DOIUrl":"https://doi.org/10.37284/eajit.7.1.1757","url":null,"abstract":"Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139778638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya 利用技术提供政府服务:确保肯尼亚电子公民服务的建议
Pub Date : 2024-02-14 DOI: 10.37284/eajit.7.1.1757
Lucy W. Maina, Godfred Ohndyl Otieno
Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals
世界各国政府在提供公共服务时越来越多地采用电子政务。这一发展大大减少了官僚主义,提高了效率,减少了腐败,并从根本上改变了公共服务的提供。然而,采用这些由国际公司、非国家行为者(主要是跨国公司)拥有的版权技术解决方案,同样使肯尼亚等用户政府面临重大的网络空间安全威胁、服务中断、国家安全受到威胁、国家独立受到干扰以及国家主权丧失。这些威胁来自攻击性国家、非国家和个人利用集成和依赖性互联网连接网络的活动。本文摘自一项关于肯尼亚电子公民服务面临的信息安全威胁的研究。该研究介绍了肯尼亚为确保电子公民服务安全而采取的信息安全措施。 案例研究采用了描述性研究设计,以全国 51 个 Huduma 中心的 12,000 名受访者(用户)为对象。研究采用了有目的的抽样方法来选择 Huduma 中心和每个中心 10%的受访者。 共发放了约 1200 份调查问卷,回收率为 966 份,回收率为 80%。研究采用定量和定性技术进行分析。假设检验的显著性水平为 5%。研究确定了 10 类安全措施,本文将讨论其中的 6 类,即国家能力、机构政策、能力 发展、备份、物理访问、专业认证、频繁的信息和通信技术审计、防火墙和管理安全 审查。研究建议采用本地模式的技术解决方案、互惠互利的网络安全合作、频繁的基础设施安全审计、用户能力培训和重组国家安全机构,以建立网络空间人员配备能力。这些部门变革将加强预防、防御和进攻能力,以应对地缘政治、技术、经济和安全竞争以及全球各国、非国家行为者和恶意个人之间的竞争所带来的网络空间威胁。
{"title":"Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya","authors":"Lucy W. Maina, Godfred Ohndyl Otieno","doi":"10.37284/eajit.7.1.1757","DOIUrl":"https://doi.org/10.37284/eajit.7.1.1757","url":null,"abstract":"Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139838285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions 指导设计高等院校通过活动进行交流的互动系统的框架
Pub Date : 2024-01-05 DOI: 10.37284/eajit.7.1.1671
Anthony Mwombeki, N. Shidende, Leornard Mselle
Human-computer interaction is paramount in the process of designing interactive-computer systems with high capabilities of guaranteeing users’ satisfaction. However, lack of suitable frameworks complicates their effective design. This study investigated suitable frameworks capable of guiding appropriate design of interactive systems for communication through activities (ISCA) in higher learning institutions in Tanzania. These systems are necessary for augmenting communication thereby overcoming persistent challenges related to their reliance on face-to-face, phone-based, and social networking websites communications. This study used a thorough user centred design approach where a framework for human activity design-centred (HADC) was employed. Authors qualitatively analysed data on communication and interaction issues from participants involved. Design science research was then combined with activity theory to develop a four-phased methodology which was used to design an intended human activity interactive communication (HAIC) framework. The findings confirmed that interactions design techniques based on human-activities undertaken are fundamental in designing communication frameworks capable of guiding suitable design of interactive systems in a particular setting. In the context of this study, and with ISCA need, the obtained HAIC framework was found to be appropriate. This study found out that the current user-centred design approach does not explain precisely how designers can employ activity-based interaction design techniques into the design process. Thus, the study contributes to the literature on users’ involvement in interactive systems’ design through the HADC framework provided
在设计交互式计算机系统的过程中,人机交互是最重要的。然而,由于缺乏合适的框架,这些系统的有效设计变得更加复杂。本研究调查了能够指导坦桑尼亚高等院校适当设计通过活动进行交流的交互系统(ISCA)的合适框架。这些系统对于增强交流是必要的,可以克服长期以来依赖面对面、电话和社交网站交流所带来的挑战。本研究采用了以用户为中心的全面设计方法,其中使用了以人类活动设计为中心(HADC)的框架。作者对参与者提供的有关交流和互动问题的数据进行了定性分析。然后,将设计科学研究与活动理论相结合,开发出一种四阶段方法,用于设计一个预期的人类活动互动交流(HAIC)框架。研究结果证实,以人类活动为基础的互动设计技术是设计交流框架的基础,能够指导特定环境中互动系统的适当设计。在本研究的背景下,结合国际空间合作协会的需要,所获得的 HAIC 框架被认为是合适的。本研究发现,目前以用户为中心的设计方法并不能准确解释设计师如何在设计过程中采用基于活动的交互设计技术。因此,本研究通过提供 HAIC 框架,为有关用户参与交互系统设计的文献做出了贡献。
{"title":"A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions","authors":"Anthony Mwombeki, N. Shidende, Leornard Mselle","doi":"10.37284/eajit.7.1.1671","DOIUrl":"https://doi.org/10.37284/eajit.7.1.1671","url":null,"abstract":"Human-computer interaction is paramount in the process of designing interactive-computer systems with high capabilities of guaranteeing users’ satisfaction. However, lack of suitable frameworks complicates their effective design. This study investigated suitable frameworks capable of guiding appropriate design of interactive systems for communication through activities (ISCA) in higher learning institutions in Tanzania. These systems are necessary for augmenting communication thereby overcoming persistent challenges related to their reliance on face-to-face, phone-based, and social networking websites communications. This study used a thorough user centred design approach where a framework for human activity design-centred (HADC) was employed. Authors qualitatively analysed data on communication and interaction issues from participants involved. Design science research was then combined with activity theory to develop a four-phased methodology which was used to design an intended human activity interactive communication (HAIC) framework. The findings confirmed that interactions design techniques based on human-activities undertaken are fundamental in designing communication frameworks capable of guiding suitable design of interactive systems in a particular setting. In the context of this study, and with ISCA need, the obtained HAIC framework was found to be appropriate. This study found out that the current user-centred design approach does not explain precisely how designers can employ activity-based interaction design techniques into the design process. Thus, the study contributes to the literature on users’ involvement in interactive systems’ design through the HADC framework provided","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139380989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
East African Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1