首页 > 最新文献

International Journal of Interactive Mobile Technologies最新文献

英文 中文
Artificial Intelligence-Based Chatbot to Support Public Health Services in Indonesia 基于人工智能的聊天机器人将支持印度尼西亚的公共卫生服务
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.36263
Rudi Setiawan, Rossi Iskandar, Nadilla Madjid, Ridwan Kusumawardani
The aim of this study is to build an artificial intelligence chatbot application to support public health services. The chatbot acts as an information service that can replace the role of humans. The analysis of functional needs was obtained from information submitted by one of the heads of public health centers in Indonesia. This study uses the Scrum method with pregame stages to produce a plan consisting of functional and non-functional requirements analysis and conceptual design of the chatbot, which will be developed using Unified Modeling Language (UML) diagrams. The process of finding answers uses the matching graph master technique, which is a backtrack matching that utilizes a depth-first search strategy. There are 6 topics of chatbot services, including service schedules, health information, registration, diseases, drugs, and early care services for chatbot users. Tests conducted on these 6 topics showed an average correct answer ratio of 93.1% out of a total of 251 questions. The result of the usability measurement on the chatbot application that has been built obtained a system usability scale value of 80.1, indicating that the developed chatbots are acceptable for use.
本研究的目的是建立一个人工智能聊天机器人应用程序,以支持公共卫生服务。聊天机器人作为一种信息服务,可以取代人类的角色。对功能需求的分析是根据印度尼西亚公共卫生中心的一位负责人提交的信息进行的。本研究使用游戏前阶段的Scrum方法来生成一个由功能和非功能需求分析以及聊天机器人概念设计组成的计划,该计划将使用统一建模语言(UML)图进行开发。寻找答案的过程使用匹配图大师技术,这是一种利用深度优先搜索策略的回溯匹配。聊天机器人服务有6个主题,包括服务日程、健康信息、注册、疾病、药物和聊天机器人用户的早期护理服务。对这6个主题进行的测试显示,在总共251个问题中,平均正确率为93.1%。对已构建的聊天机器人应用进行可用性测量的结果,系统可用性量表值为80.1,表明开发的聊天机器人可以接受使用。
{"title":"Artificial Intelligence-Based Chatbot to Support Public Health Services in Indonesia","authors":"Rudi Setiawan, Rossi Iskandar, Nadilla Madjid, Ridwan Kusumawardani","doi":"10.3991/ijim.v17i19.36263","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.36263","url":null,"abstract":"The aim of this study is to build an artificial intelligence chatbot application to support public health services. The chatbot acts as an information service that can replace the role of humans. The analysis of functional needs was obtained from information submitted by one of the heads of public health centers in Indonesia. This study uses the Scrum method with pregame stages to produce a plan consisting of functional and non-functional requirements analysis and conceptual design of the chatbot, which will be developed using Unified Modeling Language (UML) diagrams. The process of finding answers uses the matching graph master technique, which is a backtrack matching that utilizes a depth-first search strategy. There are 6 topics of chatbot services, including service schedules, health information, registration, diseases, drugs, and early care services for chatbot users. Tests conducted on these 6 topics showed an average correct answer ratio of 93.1% out of a total of 251 questions. The result of the usability measurement on the chatbot application that has been built obtained a system usability scale value of 80.1, indicating that the developed chatbots are acceptable for use.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application 基于Dex CRC和Blake2算法的签名验证防止Android应用的逆向工程攻击
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.42575
None Ilham, None Muhammad Niswar, None Ady Wahyudi Paundu
The rapid growth of Android applications has led to more cybercrime cases, specifically Reverse Engineering attacks, on Android apps. One of the most common cases of reverse engineering is application repackaging, where the application is downloaded via the Play Store or the official website and then repackaged with various additions or changes. One of the ways to avoid Application Repackaging attacks is to check the signature of an application. However, hackers can manipulate the application by adding a hook, i.e., replacing the original function for getting signatures with a new modified function in the application. In this research, the development of a verification method for Android applications is carried out by utilizing Dex CRC and the Blake2 algorithm, which will be written in C using the Java Native Interface (JNI). The results of this study indicate that the verification method using Dex CRC and the Blake2 algorithm can effectively protect Android applications from Application Repackaging attacks without burdening application performance.
Android应用程序的快速增长导致了更多的网络犯罪案件,特别是针对Android应用程序的逆向工程攻击。最常见的逆向工程案例之一是应用程序重新打包,即通过Play Store或官方网站下载应用程序,然后通过各种添加或更改重新打包。避免应用程序重新打包攻击的方法之一是检查应用程序的签名。然而,黑客可以通过添加钩子来操纵应用程序,即用应用程序中修改过的新函数替换用于获取签名的原始函数。在本研究中,利用Dex CRC和Blake2算法开发了一种Android应用程序的验证方法,该方法将使用Java Native Interface (JNI)用C语言编写。研究结果表明,采用Dex CRC和Blake2算法的验证方法可以有效地保护Android应用程序免受应用程序重新包装攻击,而不会增加应用程序性能的负担。
{"title":"Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application","authors":"None Ilham, None Muhammad Niswar, None Ady Wahyudi Paundu","doi":"10.3991/ijim.v17i19.42575","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.42575","url":null,"abstract":"The rapid growth of Android applications has led to more cybercrime cases, specifically Reverse Engineering attacks, on Android apps. One of the most common cases of reverse engineering is application repackaging, where the application is downloaded via the Play Store or the official website and then repackaged with various additions or changes. One of the ways to avoid Application Repackaging attacks is to check the signature of an application. However, hackers can manipulate the application by adding a hook, i.e., replacing the original function for getting signatures with a new modified function in the application. In this research, the development of a verification method for Android applications is carried out by utilizing Dex CRC and the Blake2 algorithm, which will be written in C using the Java Native Interface (JNI). The results of this study indicate that the verification method using Dex CRC and the Blake2 algorithm can effectively protect Android applications from Application Repackaging attacks without burdening application performance.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-cost Wireless Lamp Socket and Power Plug for Smart Homes and Its Comparison with Available Commercial Competitors 智能家居的低成本无线灯插座和电源插头及其与现有商业竞争对手的比较
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.41145
Syifaul Fuada, None Hendriyana, None Subashri Duttagupta, None Nuur Wachid Abdul Majid
Smart home manufacturers widely produce Wireless Lamp Socket and Power Plug devices, which offer various features ranging from basic on/off control to more complex functionalities such as monitoring energy consumption, power losses, and harmonics. However, these devices tend to be expensive, as indicated by market surveys. To address this issue, the current study aimed to develop low-cost wireless control nodes for smart homes that operate using relays. The two nodes consisted of lamp socket and power plug built with lowcost electronic components, including a Wi-Fi built-in Microcontroller ESP8266 (Wemos D1 mini model) as the backbone to create ESP-Mesh wireless network and to provide control ports for high/low logic, a relay module, an AC-to-DC converter module, and terminals (E27 screw for lamp socket node and C-type plug for the power plug node). This paper primarily focuses on the hardware aspects. In order to evaluate the effectiveness of the nodes, the following tests are conducted: (1) product demonstration to assess the product functions, (2) power measurement in idle and active conditions, (3) ESP-Mesh connection testing, and (4) RSSI measurement. Functional testing is done using a smartphone with the UPISmartHome version 2.0 Android application, which successfully controlled the nodes wirelessly. In idle conditions, power plug and lamp socket nodes consume 426.36 mWatt and 418.275 mWatt of power, respectively. Further, in active conditions, power plug and lamp socket nodes consume 435.704 mWatt and 440.583 mWatt of power, respectively. RSSI testing results show that both nodes can be controlled within an optimal range of 60 meters (with reference to RSSI below –85 dBm) without the Internet, utilizing the ESP-Mesh feature of ESP8266. This range is deemed reasonable for smart homes of 21, 36, or 45 square meters. Both nodes could be controlled under the ESP-Mesh network that gets build. We also present the comparison with other products of competitors in this paper.
智能家居制造商广泛生产无线灯插座和电源插头设备,这些设备提供各种功能,从基本的开/关控制到更复杂的功能,如监控能耗、功率损耗和谐波。然而,正如市场调查所表明的那样,这些设备往往很昂贵。为了解决这个问题,目前的研究旨在为使用继电器操作的智能家居开发低成本无线控制节点。这两个节点由灯插座和电源插头组成,采用低成本电子元件,其中Wi-Fi内置微控制器ESP8266 (Wemos D1迷你型号)作为骨干,创建ESP-Mesh无线网络,并提供高低逻辑控制端口,继电器模块,交直流转换器模块和端子(灯插座节点E27螺钉和电源插头节点c型插头)。本文主要从硬件方面进行研究。为了评估节点的有效性,进行了以下测试:(1)产品演示以评估产品功能,(2)空闲和有源状态下的功率测量,(3)ESP-Mesh连接测试,(4)RSSI测量。功能测试是使用带有UPISmartHome 2.0版Android应用程序的智能手机完成的,该应用程序成功地无线控制了节点。在空闲状态下,电源插头和灯插座节点的功耗分别为426.36 mWatt和418.275 mWatt。在有功工况下,电源插头和灯座节点的功耗分别为435.704 mWatt和4400.583 mWatt。RSSI测试结果表明,在没有互联网的情况下,利用ESP8266的ESP-Mesh特性,两个节点都可以控制在60米的最佳范围内(参考RSSI低于-85 dBm)。对于21,36或45平方米的智能家居来说,这个范围被认为是合理的。这两个节点都可以在正在构建的ESP-Mesh网络下进行控制。本文还与竞争对手的其他产品进行了比较。
{"title":"Low-cost Wireless Lamp Socket and Power Plug for Smart Homes and Its Comparison with Available Commercial Competitors","authors":"Syifaul Fuada, None Hendriyana, None Subashri Duttagupta, None Nuur Wachid Abdul Majid","doi":"10.3991/ijim.v17i19.41145","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.41145","url":null,"abstract":"Smart home manufacturers widely produce Wireless Lamp Socket and Power Plug devices, which offer various features ranging from basic on/off control to more complex functionalities such as monitoring energy consumption, power losses, and harmonics. However, these devices tend to be expensive, as indicated by market surveys. To address this issue, the current study aimed to develop low-cost wireless control nodes for smart homes that operate using relays. The two nodes consisted of lamp socket and power plug built with lowcost electronic components, including a Wi-Fi built-in Microcontroller ESP8266 (Wemos D1 mini model) as the backbone to create ESP-Mesh wireless network and to provide control ports for high/low logic, a relay module, an AC-to-DC converter module, and terminals (E27 screw for lamp socket node and C-type plug for the power plug node). This paper primarily focuses on the hardware aspects. In order to evaluate the effectiveness of the nodes, the following tests are conducted: (1) product demonstration to assess the product functions, (2) power measurement in idle and active conditions, (3) ESP-Mesh connection testing, and (4) RSSI measurement. Functional testing is done using a smartphone with the UPISmartHome version 2.0 Android application, which successfully controlled the nodes wirelessly. In idle conditions, power plug and lamp socket nodes consume 426.36 mWatt and 418.275 mWatt of power, respectively. Further, in active conditions, power plug and lamp socket nodes consume 435.704 mWatt and 440.583 mWatt of power, respectively. RSSI testing results show that both nodes can be controlled within an optimal range of 60 meters (with reference to RSSI below –85 dBm) without the Internet, utilizing the ESP-Mesh feature of ESP8266. This range is deemed reasonable for smart homes of 21, 36, or 45 square meters. Both nodes could be controlled under the ESP-Mesh network that gets build. We also present the comparison with other products of competitors in this paper.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136294662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory 基于深度信念网络和长短期记忆的移动自组网入侵检测
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.27663
Abdulfatai Shola Hanafi, Yakub Kayode Saheed, Micheal Olaolu Arowolo
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulnerable to numerous attacks that wreak havoc on their performance than any network. Traditional cryptography techniques cannot entirely defend MANETs in terms of fresh attacks and vulnerabilities due to the distributed architecture of MANETs; however, these issues can be overcome by using machine learning approaches-based intrusion detection systems (IDS). IDS, typically screening system processes and identifying intrusions, are commonly employed to supplement existing security methods because preventative techniques are never enough. Because MANETs are continually evolving, their highly limited nodes, and the lack of central observation stations, intrusion detection is a complex and tough process. Conventional IDSs are difficult to apply to them. Existing methodologies must be updated for MANETs or new approaches must be created. This paper aims to present a novel concept founded on deep belief networks (DBN) and long shortterm memory (LSTM) for MANET attack detection. The experimental analysis was performed on the probe, root to local, user to root, and denial of service (DoS) attacks. In the first phase of this paper, particle swarm optimization was used for feature selection, and subsequently, the DBN and LSTM were used for the classification of attacks in the MANET. The experimental results gave an accuracy reaching 99.46%, a sensitivity of 99.52%, and a recall of 99.52% for DBN and LSTM accuracy reaching 99.75%, a sensitivity of 99.79%, and a recall of 99.79%.
移动自组织网络(MANET)是移动设备的自组织集合,这些设备以分布式方式跨多个跳进行通信。manet是一项具有吸引力的技术,适用于许多应用,包括救援行动、环境监测、战术行动等,因为它可以让人们在不使用永久性基础设施的情况下进行通信。然而,这种灵活性会产生额外的安全漏洞。由于它的好处和不断扩大的需求,MANETs吸引了科学界的很多兴趣。然而,它们似乎比任何网络都更容易受到大量攻击,这些攻击会严重破坏它们的性能。由于manet的分布式结构,传统的加密技术不能完全防御新的攻击和漏洞;然而,这些问题可以通过使用基于机器学习方法的入侵检测系统(IDS)来克服。IDS通常用于筛选系统进程和识别入侵,通常用于补充现有的安全方法,因为预防性技术是远远不够的。由于manet不断发展,节点高度受限,缺乏中心观测站,入侵检测是一个复杂而艰难的过程。传统的入侵防御系统很难适用于他们。现有的方法必须针对MANETs进行更新,或者必须创建新的方法。本文旨在提出一种基于深度信念网络(DBN)和长短期记忆(LSTM)的MANET攻击检测新概念。实验分析了探针、根到本地、用户到根和拒绝服务(DoS)攻击。在本文的第一阶段,使用粒子群优化进行特征选择,随后使用DBN和LSTM对MANET中的攻击进行分类。实验结果表明,DBN和LSTM的准确率为99.75%,灵敏度为99.79%,召回率为99.79%,准确率为99.46%,灵敏度为99.52%,召回率为99.52%。
{"title":"An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory","authors":"Abdulfatai Shola Hanafi, Yakub Kayode Saheed, Micheal Olaolu Arowolo","doi":"10.3991/ijim.v17i19.27663","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.27663","url":null,"abstract":"A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulnerable to numerous attacks that wreak havoc on their performance than any network. Traditional cryptography techniques cannot entirely defend MANETs in terms of fresh attacks and vulnerabilities due to the distributed architecture of MANETs; however, these issues can be overcome by using machine learning approaches-based intrusion detection systems (IDS). IDS, typically screening system processes and identifying intrusions, are commonly employed to supplement existing security methods because preventative techniques are never enough. Because MANETs are continually evolving, their highly limited nodes, and the lack of central observation stations, intrusion detection is a complex and tough process. Conventional IDSs are difficult to apply to them. Existing methodologies must be updated for MANETs or new approaches must be created. This paper aims to present a novel concept founded on deep belief networks (DBN) and long shortterm memory (LSTM) for MANET attack detection. The experimental analysis was performed on the probe, root to local, user to root, and denial of service (DoS) attacks. In the first phase of this paper, particle swarm optimization was used for feature selection, and subsequently, the DBN and LSTM were used for the classification of attacks in the MANET. The experimental results gave an accuracy reaching 99.46%, a sensitivity of 99.52%, and a recall of 99.52% for DBN and LSTM accuracy reaching 99.75%, a sensitivity of 99.79%, and a recall of 99.79%.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Practicality of Web-Based Mobile Learning in Operating System Course: A Developmental Study 提高网络移动学习在操作系统课程中的实用性:一项发展性研究
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.42389
Muhammad Hakiki, Herman Dwi Surjono, None Wagiran, Radinal Fadli, Ridho Dedy Arief Budiman, Witri Ramadhani, Zulqoidi R. Habibie, Sani Suhardiman, Yayuk Hidayah
Web-based Mobile Learning can enhance the learning experience in various educational contexts. However, in operating system courses, practical challenges arise when implementing a web-based mobile learning platform, which impacts the effectiveness and accessibility of learning materials for students. To overcome these challenges, this research and development (R&D) aims to improve the practicality of web-based mobile learning in operating system courses. The research adopts a systematic 4D (Define, Design, Develop, Disseminate) model to identify and explore strategies to optimize the practicality of the platform. Data collected from lecturers and students showed a high average value of practicality, 88.33% and 88.35%, respectively. This research contributes to improving the practical aspects of web-based mobile learning, thereby enhancing students’ learning experience and outcomes in the context of operating system courses.
基于网络的移动学习可以增强各种教育环境下的学习体验。然而,在操作系统课程中,在实施基于网络的移动学习平台时出现了实际挑战,这影响了学生学习材料的有效性和可访问性。为了克服这些挑战,这项研究和开发(R&D)旨在提高基于网络的移动学习在操作系统课程中的实用性。本研究采用系统的4D(定义、设计、开发、传播)模型,识别和探索优化平台实用性的策略。从讲师和学生中收集的数据显示,实用性的平均值较高,分别为88.33%和88.35%。本研究有助于改进基于网络的移动学习的实践方面,从而提高学生在操作系统课程背景下的学习体验和成果。
{"title":"Enhancing Practicality of Web-Based Mobile Learning in Operating System Course: A Developmental Study","authors":"Muhammad Hakiki, Herman Dwi Surjono, None Wagiran, Radinal Fadli, Ridho Dedy Arief Budiman, Witri Ramadhani, Zulqoidi R. Habibie, Sani Suhardiman, Yayuk Hidayah","doi":"10.3991/ijim.v17i19.42389","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.42389","url":null,"abstract":"Web-based Mobile Learning can enhance the learning experience in various educational contexts. However, in operating system courses, practical challenges arise when implementing a web-based mobile learning platform, which impacts the effectiveness and accessibility of learning materials for students. To overcome these challenges, this research and development (R&D) aims to improve the practicality of web-based mobile learning in operating system courses. The research adopts a systematic 4D (Define, Design, Develop, Disseminate) model to identify and explore strategies to optimize the practicality of the platform. Data collected from lecturers and students showed a high average value of practicality, 88.33% and 88.35%, respectively. This research contributes to improving the practical aspects of web-based mobile learning, thereby enhancing students’ learning experience and outcomes in the context of operating system courses.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136255218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development and Creation of Ancient Sandstone Carvings Using 3D Software Tools and Mobile/Tablet Devices 使用3D软件工具和移动/平板设备开发和创造古代砂岩雕刻
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.39007
Jirawat Sookkaew, Wisoot Kaenmueang, Nakarin Chaikaew
In the area of Phayao Province that used to be part of the ancient Lanna Kingdom, there are unique works of art that can be found until today, which are sandstone carvings caused by religious beliefs resulting in works such as Buddha statues. These are art related to religion. Nowadays, these works of art have started to fade away and receive less and less attention from people. The creation of art objects in this research therefore uses the interpretation of the creative objects in line with people’s lifestyles by selecting the lotus, which is a plant related to rivers, and is important in religion. In the lotus, which is interconnected and aligned with Buddhism, and in harmony with a way of life that aligns with the river, creative works are found in various forms, connecting people in Buddhism, including sandstone carving. In this creation, digital technology tools and methods are used to collect data to create a 3D work piece. Photogrammetry is used to record detailed proportions and information and customization of 3D work pieces. In these steps, mobile phone-type tools are used to collect image data to create the 3D work or an application is used to customize 3D work pieces from a tablet device to create prototypes of sandstone sculptures from the artisans that remain today. This can be seen in creating, maintaining, and recording digital data, creation, and the integration of knowledge. This demonstrates that today’s tools and portable devices can help create more creative pieces of work and preserve art and culture.
在曾经是古代兰纳王国一部分的帕瑶省地区,直到今天还能找到独特的艺术品,这些艺术品是由宗教信仰造成的砂岩雕刻,导致了佛像等作品。这些都是与宗教有关的艺术。如今,这些艺术作品已经开始消失,越来越少受到人们的关注。因此,本研究的艺术品创作采用了符合人们生活方式的对创作对象的诠释,选择了莲花,这是一种与河流有关的植物,在宗教中具有重要意义。在莲花中,与佛教相连,与河流相连的生活方式和谐相处,在佛教中,有各种形式的创造性作品,包括砂岩雕刻,将人们联系在一起。在这个创作中,使用数字技术工具和方法来收集数据以创建一个3D工件。摄影测量用于记录三维工件的详细比例和信息以及定制。在这些步骤中,使用手机类型的工具来收集图像数据以创建3D作品,或者使用应用程序从平板设备定制3D作品,以创建今天仍然存在的工匠砂岩雕塑的原型。这可以在创建、维护和记录数字数据、创建和知识集成中看到。这表明,今天的工具和便携式设备可以帮助创造更多的创造性作品,并保护艺术和文化。
{"title":"Development and Creation of Ancient Sandstone Carvings Using 3D Software Tools and Mobile/Tablet Devices","authors":"Jirawat Sookkaew, Wisoot Kaenmueang, Nakarin Chaikaew","doi":"10.3991/ijim.v17i19.39007","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.39007","url":null,"abstract":"In the area of Phayao Province that used to be part of the ancient Lanna Kingdom, there are unique works of art that can be found until today, which are sandstone carvings caused by religious beliefs resulting in works such as Buddha statues. These are art related to religion. Nowadays, these works of art have started to fade away and receive less and less attention from people. The creation of art objects in this research therefore uses the interpretation of the creative objects in line with people’s lifestyles by selecting the lotus, which is a plant related to rivers, and is important in religion. In the lotus, which is interconnected and aligned with Buddhism, and in harmony with a way of life that aligns with the river, creative works are found in various forms, connecting people in Buddhism, including sandstone carving. In this creation, digital technology tools and methods are used to collect data to create a 3D work piece. Photogrammetry is used to record detailed proportions and information and customization of 3D work pieces. In these steps, mobile phone-type tools are used to collect image data to create the 3D work or an application is used to customize 3D work pieces from a tablet device to create prototypes of sandstone sculptures from the artisans that remain today. This can be seen in creating, maintaining, and recording digital data, creation, and the integration of knowledge. This demonstrates that today’s tools and portable devices can help create more creative pieces of work and preserve art and culture.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136352903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Microservices-based Framework for Scalable Data Analysis in Agriculture with IoT Integration 基于微服务的农业可扩展数据分析框架与物联网集成
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.40457
Othmane Aitlmoudden, Mohamed Housni, Nisrine Safeh, Abdelwahed Namir
We propose a microservices-based framework for scalable data analysis in agriculture with IoT integration, leveraging the flexibility and modularity of microservices architecture to build a highly adaptable, maintainable, and efficient data analysis system. This framework allows for faster data processing and carry a diversity of agricultural data analysis tasks while maintaining scalability and fault tolerance. Despite the potential benefits, several challenges and obstacles need to be addressed, such as data integration and standardization, the development of agricultural-specific analytical microservices, and ensuring data security and privacy. Practical application and real-world validation are required to assess the impact of the proposed framework on the agricultural sector and inform future research directions.
我们提出了一个基于微服务的框架,用于农业物联网集成的可扩展数据分析,利用微服务架构的灵活性和模块化来构建一个高适应性、可维护和高效的数据分析系统。该框架允许更快的数据处理和承载多样化的农业数据分析任务,同时保持可伸缩性和容错性。尽管有潜在的好处,但仍有一些挑战和障碍需要解决,例如数据集成和标准化,农业专用分析微服务的开发,以及确保数据安全和隐私。需要实际应用和真实世界的验证来评估拟议框架对农业部门的影响,并为未来的研究方向提供信息。
{"title":"A Microservices-based Framework for Scalable Data Analysis in Agriculture with IoT Integration","authors":"Othmane Aitlmoudden, Mohamed Housni, Nisrine Safeh, Abdelwahed Namir","doi":"10.3991/ijim.v17i19.40457","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.40457","url":null,"abstract":"We propose a microservices-based framework for scalable data analysis in agriculture with IoT integration, leveraging the flexibility and modularity of microservices architecture to build a highly adaptable, maintainable, and efficient data analysis system. This framework allows for faster data processing and carry a diversity of agricultural data analysis tasks while maintaining scalability and fault tolerance. Despite the potential benefits, several challenges and obstacles need to be addressed, such as data integration and standardization, the development of agricultural-specific analytical microservices, and ensuring data security and privacy. Practical application and real-world validation are required to assess the impact of the proposed framework on the agricultural sector and inform future research directions.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Clustering Approaches in Cloud Environments 优化云环境中的集群方法
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.42029
Abdel-Rahman Al-Ghuwairi, Dimah Al-Fraihat, Yousef Sharrab, Yazeed Kreishan, Ayoub Alsarhan, Hasan Idhaim, Ayman Qahmash
This study focuses on the challenge of developing abstract models to differentiate various cloud resources. It explores the advancements in cloud products that offer specialized services to meet specific external needs. The study proposes a new approach to request processing in clusters, improving downtime, load distribution, and overall performance. A comparison of three clustering approaches is conducted: local single cluster, local multiple clusters, and multiple cloud clusters. Performance, scalability, fault tolerance, resource allocation, availability, and cost-effectiveness are evaluated through experiments with 50 requests. All three approaches achieve a 100% success rate, but processing times vary. The local single cluster has the longest duration, while the local multiple clusters and multiple cloud clusters perform better and offer faster processing, scalability, fault tolerance, and availability. From a cost perspective, the local single cluster and local multiple clusters incur capital and operational expenses, while the multiple cloud clusters follow a pay-as-you-go model. Overall, the local multiple clusters and multiple cloud clusters outperform the local single cluster in terms of performance, scalability, fault tolerance, resource allocation, availability, and cost-effectiveness. These findings provide valuable insights for selecting appropriate clustering strategies in cloud environments.
本研究的重点是开发抽象模型来区分各种云资源的挑战。它探讨了提供专门服务以满足特定外部需求的云产品的进步。该研究提出了一种在集群中处理请求的新方法,可以改善停机时间、负载分配和整体性能。对本地单集群、本地多集群和多云集群三种聚类方法进行了比较。性能、可伸缩性、容错性、资源分配、可用性和成本效益通过50个请求的实验进行评估。这三种方法都实现了100%的成功率,但处理时间各不相同。本地单个集群的持续时间最长,而本地多个集群和多个云集群的性能更好,并提供更快的处理、可伸缩性、容错和可用性。从成本角度来看,本地单个集群和本地多个集群会产生资本和运营费用,而多个云集群则遵循按需付费的模式。总体而言,本地多集群和多个云集群在性能、可伸缩性、容错性、资源分配、可用性和成本效益方面都优于本地单集群。这些发现为在云环境中选择适当的集群策略提供了有价值的见解。
{"title":"Optimizing Clustering Approaches in Cloud Environments","authors":"Abdel-Rahman Al-Ghuwairi, Dimah Al-Fraihat, Yousef Sharrab, Yazeed Kreishan, Ayoub Alsarhan, Hasan Idhaim, Ayman Qahmash","doi":"10.3991/ijim.v17i19.42029","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.42029","url":null,"abstract":"This study focuses on the challenge of developing abstract models to differentiate various cloud resources. It explores the advancements in cloud products that offer specialized services to meet specific external needs. The study proposes a new approach to request processing in clusters, improving downtime, load distribution, and overall performance. A comparison of three clustering approaches is conducted: local single cluster, local multiple clusters, and multiple cloud clusters. Performance, scalability, fault tolerance, resource allocation, availability, and cost-effectiveness are evaluated through experiments with 50 requests. All three approaches achieve a 100% success rate, but processing times vary. The local single cluster has the longest duration, while the local multiple clusters and multiple cloud clusters perform better and offer faster processing, scalability, fault tolerance, and availability. From a cost perspective, the local single cluster and local multiple clusters incur capital and operational expenses, while the multiple cloud clusters follow a pay-as-you-go model. Overall, the local multiple clusters and multiple cloud clusters outperform the local single cluster in terms of performance, scalability, fault tolerance, resource allocation, availability, and cost-effectiveness. These findings provide valuable insights for selecting appropriate clustering strategies in cloud environments.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136352754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks 机器学习方法在物联网僵尸网络攻击检测中的性能评估
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.41379
Ashraf Hamdan Aljammal, Ahmad Qawasmeh, Ala Mughaid, Salah Taamneh, Fadi I. Wedyan, Mamoon Obiedat
Botnets are today recognized as one of the most advanced vulnerability threats. Botnets control a huge percentage of network traffic and PCs. They have the ability to remotely control PCs (zombie machines) by their creator (BotMaster) via Command and Control (C&C) framework. They are the keys to a variety of Internet attacks such as spams, DDOS, and spreading malwares. This study proposes a number of machine learning techniques for detecting botnet assaults via IoT networks to help researchers in choosing the suitable ML algorithm for their applications. Using the BoT-IoT dataset, six different machine learning methods were evaluated: REPTree, RandomTree, RandomForest, J48, metaBagging, and Naive Bayes. Several measures, including accuracy, TPR, FPR, and many more, have been used to evaluate the algorithms’ performance. The six algorithms were evaluated using three different testing situations. Scenario-1 tested the algorithms utilizing all of the parameters presented in the BoT-IoT dataset, scenario-2 used the IG feature reduction approach, and scenario-3 used extracted features from the attacker’s received packets. The results revealed that the assessed algorithms performed well in all three cases with slight differences.
僵尸网络是当今公认的最先进的漏洞威胁之一。僵尸网络控制了很大比例的网络流量和pc。他们有能力远程控制电脑(僵尸机)由他们的创造者(BotMaster)通过命令和控制(C&C)框架。它们是各种互联网攻击(如垃圾邮件、DDOS和传播恶意软件)的关键。本研究提出了许多通过物联网网络检测僵尸网络攻击的机器学习技术,以帮助研究人员为其应用选择合适的机器学习算法。使用BoT-IoT数据集,评估了六种不同的机器学习方法:REPTree, RandomTree, RandomForest, J48, metaBagging和朴素贝叶斯。包括精度、TPR、FPR等在内的几个指标已被用于评估算法的性能。使用三种不同的测试情况对这六种算法进行了评估。场景1利用BoT-IoT数据集中提供的所有参数测试算法,场景2使用IG特征约简方法,场景3使用从攻击者收到的数据包中提取的特征。结果显示,所评估的算法在所有三种情况下都表现良好,略有差异。
{"title":"Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks","authors":"Ashraf Hamdan Aljammal, Ahmad Qawasmeh, Ala Mughaid, Salah Taamneh, Fadi I. Wedyan, Mamoon Obiedat","doi":"10.3991/ijim.v17i19.41379","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.41379","url":null,"abstract":"Botnets are today recognized as one of the most advanced vulnerability threats. Botnets control a huge percentage of network traffic and PCs. They have the ability to remotely control PCs (zombie machines) by their creator (BotMaster) via Command and Control (C&C) framework. They are the keys to a variety of Internet attacks such as spams, DDOS, and spreading malwares. This study proposes a number of machine learning techniques for detecting botnet assaults via IoT networks to help researchers in choosing the suitable ML algorithm for their applications. Using the BoT-IoT dataset, six different machine learning methods were evaluated: REPTree, RandomTree, RandomForest, J48, metaBagging, and Naive Bayes. Several measures, including accuracy, TPR, FPR, and many more, have been used to evaluate the algorithms’ performance. The six algorithms were evaluated using three different testing situations. Scenario-1 tested the algorithms utilizing all of the parameters presented in the BoT-IoT dataset, scenario-2 used the IG feature reduction approach, and scenario-3 used extracted features from the attacker’s received packets. The results revealed that the assessed algorithms performed well in all three cases with slight differences.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive M-Learning Usability Model for Facilitating M-Learning for Slow Learners 促进慢学习者移动学习的适应性移动学习可用性模型
Q2 Computer Science Pub Date : 2023-10-10 DOI: 10.3991/ijim.v17i19.42153
Jawad Ul Hassan, None Malik Muhammad Saad Missen, None Amnah Firdous, None Arfa Maham, None Amna Ikram
Mobile devices have evolved from communication tools to versatile platforms for various purposes, including learning. Usability is crucial for practical mobile learning applications, ensuring ease of use and expected performance. However, existing research on mobile educational apps has primarily focused on typical learners, neglecting the specific requirements of slow learners who face cognitive limitations. In this work, we fill this research gap by proposing an adaptable learning-oriented usability model (ALUM) for mobile learning apps specifically tailored to support slow learners. The research conducts a detailed usability analysis and systematic review to identify the problems users face and investigate how slow learners respond to learning apps in terms of efficiency, effectiveness, satisfaction, and learning outcomes. Twenty-four participants classified as slow learners evaluated the usability of 25 HTML-based learning apps. The evaluation revealed critical deficiencies in existing learning apps concerning the needs of slow learners, particularly in user-friendliness and learnability, leading to their dissatisfaction. We propose a model that leverages a hybrid recommendation system to address these challenges. The model incorporates a navigational graph, ontology, and item matrix to provide personalized topic recommendations, tailoring the content and delivery of educational materials based on individual needs and preferences. By enhancing the learning experience for slow learners, the proposed model aims to improve their learning outcomes. This research bridges the gap between academic research and practical applications in interactive mobile technologies. The adaptable learning-oriented usability model presented in this paper offers a framework for supporting slow learners, emphasizing its essential components and their interactions to enhance the learning outcomes for this user group.
移动设备已经从通信工具发展成为多种用途的多功能平台,包括学习。可用性对于实际的移动学习应用程序至关重要,确保易用性和预期性能。然而,现有的移动教育应用的研究主要集中在典型的学习者身上,忽视了面临认知限制的慢学习者的具体需求。在这项工作中,我们提出了一种针对移动学习应用程序的适应性学习导向可用性模型(ALUM),专门为慢学习者提供支持,从而填补了这一研究空白。该研究进行了详细的可用性分析和系统审查,以确定用户面临的问题,并调查慢学习者在效率、有效性、满意度和学习成果方面对学习应用程序的反应。24名被归类为慢学习者的参与者评估了25个基于html的学习应用程序的可用性。评估显示,现有的学习应用程序在满足慢学习者的需求方面存在严重缺陷,特别是在用户友好性和易学性方面,导致他们的不满。我们提出了一个利用混合推荐系统来解决这些挑战的模型。该模型结合了导航图、本体和项目矩阵,以提供个性化的主题推荐,根据个人需求和偏好定制教育材料的内容和交付。通过提高慢学习者的学习体验,本模型旨在提高慢学习者的学习效果。这项研究弥合了交互式移动技术的学术研究和实际应用之间的差距。本文提出的适应性学习导向可用性模型提供了一个支持慢学习者的框架,强调其基本组件及其相互作用,以增强该用户群体的学习成果。
{"title":"An Adaptive M-Learning Usability Model for Facilitating M-Learning for Slow Learners","authors":"Jawad Ul Hassan, None Malik Muhammad Saad Missen, None Amnah Firdous, None Arfa Maham, None Amna Ikram","doi":"10.3991/ijim.v17i19.42153","DOIUrl":"https://doi.org/10.3991/ijim.v17i19.42153","url":null,"abstract":"Mobile devices have evolved from communication tools to versatile platforms for various purposes, including learning. Usability is crucial for practical mobile learning applications, ensuring ease of use and expected performance. However, existing research on mobile educational apps has primarily focused on typical learners, neglecting the specific requirements of slow learners who face cognitive limitations. In this work, we fill this research gap by proposing an adaptable learning-oriented usability model (ALUM) for mobile learning apps specifically tailored to support slow learners. The research conducts a detailed usability analysis and systematic review to identify the problems users face and investigate how slow learners respond to learning apps in terms of efficiency, effectiveness, satisfaction, and learning outcomes. Twenty-four participants classified as slow learners evaluated the usability of 25 HTML-based learning apps. The evaluation revealed critical deficiencies in existing learning apps concerning the needs of slow learners, particularly in user-friendliness and learnability, leading to their dissatisfaction. We propose a model that leverages a hybrid recommendation system to address these challenges. The model incorporates a navigational graph, ontology, and item matrix to provide personalized topic recommendations, tailoring the content and delivery of educational materials based on individual needs and preferences. By enhancing the learning experience for slow learners, the proposed model aims to improve their learning outcomes. This research bridges the gap between academic research and practical applications in interactive mobile technologies. The adaptable learning-oriented usability model presented in this paper offers a framework for supporting slow learners, emphasizing its essential components and their interactions to enhance the learning outcomes for this user group.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Interactive Mobile Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1