2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)最新文献

筛选
英文 中文
Constructs for Artificial Intelligence Customer Service in E-commerce 电子商务中人工智能客服的构建
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073486
Ng Lian Ping, Ab Razak Che Hussin, N. M. Ali
{"title":"Constructs for Artificial Intelligence Customer Service in E-commerce","authors":"Ng Lian Ping, Ab Razak Che Hussin, N. M. Ali","doi":"10.1109/ICRIIS48246.2019.9073486","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073486","url":null,"abstract":"The emergence of electronic commerce (Ecommerce) has changed the way of people buying as well as experience in online customer services. E-commerce is adopted as strategy to enhance business competitiveness but success in the online business world usually starts with providing the best customer service. Although organizations are struggling on improving their performance on customer service, some issues of traditional customer service continue to appear such as limited availability, inefficiency and costly. In order to overcome the limitation of traditional customer service, artificial intelligence (AI) is increasingly utilized in service nowadays to act as an assistant for human beings. Along with the integration of AI in customer service, human agents and AI can work together to provide perfect services to customers and increase productivity. Hence, this study aims to identify the constructs and characteristics of AI customer service in Ecommerce. This paper started with formulating research questions, setting up objectives and proposing an AI customer service model. The proposed model was derived based on the understanding of traditional and AI customer service in ecommerce as well as the related models and papers from prior research. Finally, overall conclusions, limitations and future works will be presented with regard to AI customer service in E-commerce.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128479511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review of Cybersecurity Audit Management and Execution Approaches 网络安全审计管理和执行方法综述
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073641
Khairun Nisyak Zakaria, S. H. Othman, A. Zainal
{"title":"Review of Cybersecurity Audit Management and Execution Approaches","authors":"Khairun Nisyak Zakaria, S. H. Othman, A. Zainal","doi":"10.1109/ICRIIS48246.2019.9073641","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073641","url":null,"abstract":"The management and execution of good cybersecurity audits help organizations to strengthen their cybersecurity operations by detecting and mitigating cyberattacks and threats from attacking and destroying organizational assets based on the result of audit findings. However, the objectives of this audit cannot be fully achieved because of the various problems prevalent in audit management and execution. This paper aims to review issues that motivate the research of cybersecurity audit and the approaches to manage and execute it. Previous works in this area of interest are discussed by classifying and analyzing the current approaches. Models, scopes, strengths and limitations are studied and the most effective and accurate synthesis that can improve the quality of cybersecurity audits is highlighted. Various approaches to manage and execute cybersecurity audit with their objectives and advantages are classified. From this literature review, it is clear that cybersecurity audits can be improved by addressing the highlighted issues and create a well-rounded approach to improve the management and execution of auditing. Timeliness, accuracy and measurement in regards of cybersecurity auditing are not included in this review and shall be discussed in future study as they have significant impact on the audits.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Copy-Move Image Forgery Detection Using Deep Learning Methods: A Review 基于深度学习方法的复制-移动图像伪造检测综述
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073569
Arfa Binti Zainal Abidin, H. Majid, Azurah A. Samah, H. Hashim
{"title":"Copy-Move Image Forgery Detection Using Deep Learning Methods: A Review","authors":"Arfa Binti Zainal Abidin, H. Majid, Azurah A. Samah, H. Hashim","doi":"10.1109/ICRIIS48246.2019.9073569","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073569","url":null,"abstract":"In recent years, the manipulation of digital images can be done with relative ease. This can be attributed to the technological advancement in the field of computing specifically with advanced, sophisticated image editing tool software. A majority of these software are user-friendly which results in its widespread use. However, this also presents a new problem where anyone with access to the software can easily manipulate an image and can use it for nefarious purposes such as spreading fake news. Due to this development of sophistication of tools and software like Adobe Photoshop, Pixir, and Affinity, digital images content is often simply manipulated and thus forged images are produced. Therefore, the process authenticating a digital image becomes difficult such as to distinguish between manipulated images and actual images through the naked eyes. Therefore, the importance of digital image forensics has attracted many researchers who are deeply involved in this area and has established many techniques for forgery detection in image forensics. Recently, deep learning approach has a high interest among researchers across the field and has shown good result in its application. Thus, forensic researchers attempt to apply deep learning approach as a method for detecting forgery image. This paper presents the understanding and extensive literature review of state-of-the-art techniques of deep learning in the detection of copy-move image forgery.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124019390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Analysis on Online Learning Environment using Process Mining Technique for Personal Knowledge Management Mapping 基于过程挖掘技术的个人知识管理映射在线学习环境分析
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073269
S. Ismail, Faes Tumin
{"title":"Analysis on Online Learning Environment using Process Mining Technique for Personal Knowledge Management Mapping","authors":"S. Ismail, Faes Tumin","doi":"10.1109/ICRIIS48246.2019.9073269","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073269","url":null,"abstract":"As proven in recent research on personal knowledge management (PKM) processes in online learning environment, this study took the initiative to prove that these processes happen in the said platform by reducing the biasness in respondents’ feedbacks. This paper proposes the usage of process mining technique to discover the PKM model in real online learning platform, by analysing the event logs data retrieved from two-semester duration of academic calendar. The focus of this paper is on how the online activities being mapped to the PKM processes, in which the GUSC Model has been used as the appropriate model to represent PKM. GUSC Model is based on the common processes of get knowledge, understand knowledge, share knowledge and connect to knowledge source, as proven to be construed at granular level in intelligent multi-agent system. Since there was a gap between the unconfirmed reality of the GUSC processes in online platform and the construed GUSC processes at intelligent software level, this study significantly contributes to the closure of this gap with its results and findings. It is discovered that PKM model does exist in online learning environment, with the right mapping of the online activities to the GUSC processes.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessing the instrument reliability and validity of risk mitigation for anti software ageing model during software maintenance 评估软件维护过程中抗软件老化模型风险缓解的仪器可靠性和有效性
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073279
Thamaratul Izzah Azman, Noraini Che Pa, R. Nor, Y. Y. Jusoh
{"title":"Assessing the instrument reliability and validity of risk mitigation for anti software ageing model during software maintenance","authors":"Thamaratul Izzah Azman, Noraini Che Pa, R. Nor, Y. Y. Jusoh","doi":"10.1109/ICRIIS48246.2019.9073279","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073279","url":null,"abstract":"Longer software lifecycle is important to ensure its ability to provide on-going function and services. However, software relevancy and importance may reduce once its performance and quality degrades through inevitable ageing progress. Even though software ageing is inevitable, the progress of ageing in software could be slowed down and delayed. To achieve this, we may need to determine and understand the causes contributing to this phenomenon. Little attention had been paid to address software ageing from software engineering perspective, ageing caused by failures to modify the software or from the results of software changes. Hence, this motivate the study to determine the risks of performing software changes that influence software ageing occurrences and propose a method to tackle software ageing from software engineering perspective to reduce risks impact before it become apparent through risk mitigation. This paper discusses on the reliability and validity of instrument designed to conduct a study among software practitioners in order to gain insight on the risks of performing changes to software influencing software ageing and determine risk mitigation effect on the relationship between software ageing and anti software ageing. Preliminary study was conducted through content validity interview and pilot study. The results from pilot study conducted shows the items in the questionnaire has a good level of reliability to measure each variable in the model, hence the instrument can be used for further studies.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Benefits of Computational Thinking in Entrepreneurship 计算思维在创业中的好处
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073671
Ahmad Najmi Amer Haider Nuar, M. Z. A. Rozan
{"title":"Benefits of Computational Thinking in Entrepreneurship","authors":"Ahmad Najmi Amer Haider Nuar, M. Z. A. Rozan","doi":"10.1109/ICRIIS48246.2019.9073671","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073671","url":null,"abstract":"Computational thinking is an essential skill that allows humans to solve a complex problem that later on can be understood by computers and humans. Abstraction and automation are the core of computational thinking. Therefore, CT is the key skill in Industry 4.0. However, in Malaysia's manufacturing, only 50 percent of SMEs deploy automation. Automation can make the company more efficient, more accurate and decrease human error. CT was built based on 4 basic pillars which are abstraction, decomposition, algorithm and pattern recognition. These pillars will encourage automation, efficiency, and innovation. Moreover, one of the benefits of CT for nonprogrammer is the formulated problem can be passed on to information-processing agents such as third-party companies or freelancers who can create the solution. In this paper, we review the benefits of computational thinking in entrepreneurship in the context of Industry 4.0.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open Government Data Use by Malaysian Researchers. Some empirical evidence 马来西亚研究人员开放政府数据的使用。一些经验证据
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073640
Noor Zalina Zainal, H. Hussin, Noorlizawati Abd Rahim, Mior Nasir Mior Nazri, M. Suhaimi
{"title":"Open Government Data Use by Malaysian Researchers. Some empirical evidence","authors":"Noor Zalina Zainal, H. Hussin, Noorlizawati Abd Rahim, Mior Nasir Mior Nazri, M. Suhaimi","doi":"10.1109/ICRIIS48246.2019.9073640","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073640","url":null,"abstract":"Sharing data by the government with citizens will lead to a more transparent and trustworthy government. Open Government Data (OGD) has been initiated by many governments worldwide aiming to publicly and freely share government data via online. In a similar effort, the government of Malaysia has launched an OGD portal in 2014 and currently more than 12,000 data sets are available for citizens and businesses to access. However, there is a concern on the level of usage of these datasets. Additionally, there is lack of empirical studies done to understand this issue. The purpose of this study is to fill this gap. Based on a questionnaire survey method, data was collected from Malaysian researchers and academicians to understand their use of OGD. Despite a rather small sample of 62 responses, the findings shed light on the access and purposes of using OGD in the Malaysia context.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review of Success/Failure Factors Influencing Healthcare Personnel for Telerehabilitation 影响医护人员远程康复的成功/失败因素综述
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073677
M. Bahari, Tiara Izrinda Jafni, S. Miskon, W. Ismail
{"title":"A Review of Success/Failure Factors Influencing Healthcare Personnel for Telerehabilitation","authors":"M. Bahari, Tiara Izrinda Jafni, S. Miskon, W. Ismail","doi":"10.1109/ICRIIS48246.2019.9073677","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073677","url":null,"abstract":"Telerehabilitation or known as TeleRehab offers better cost-effectiveness in healthcare service delivery over distance for patients with disabilities. Most of the TeleRehab studies focused on its benefits, applications, and methods in delivering services. However, there is still a limited number of studies discussing the significance of success/failure factors that influence the healthcare personnel for TeleRehab. The identification of these factors that affect TeleRehab may avert project failure. A systematic review was conducted from five digital databases including ScienceDirect, Scopus, IEEE, Springer, and PubMed. The manual type of searching also conducted. There are 1283 of total potential papers were identified. 735 papers have gone through the inclusive and exclusive criteria, and quality assessment process which leaves 12 papers for further review. The result shows that there are three success factors and nine failure factors that can be considered as important. The success factors include satisfaction and willingness, cost/ financial benefits, and e-healthcare knowledge. The failure factors include resistance to change, lack of knowledge, financial limitation, lack of awareness, less use of hardware and software, lack of skill optimizing, connectivity issues, less involvement in planning, and less of training. This review provides a synthesis of the literature of success/failure factors among healthcare personnel for TeleRehab.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of Patents according to Industry 4.0 Pillars using Machine Learning Algorithms 使用机器学习算法根据工业4.0支柱进行专利分类
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073669
Wan Ain Zubaidah Wan Chek Jafery, M. S. S. Omar, Noor Azurati Ahmad, Hafizah Ithnin
{"title":"Classification of Patents according to Industry 4.0 Pillars using Machine Learning Algorithms","authors":"Wan Ain Zubaidah Wan Chek Jafery, M. S. S. Omar, Noor Azurati Ahmad, Hafizah Ithnin","doi":"10.1109/ICRIIS48246.2019.9073669","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073669","url":null,"abstract":"Industry 4.0 is on the horizon. Therefore, it is crucial to analyze the patterns and trends of intellectual property (IP) information to determine the readiness of stakeholders to adapt to the changing industrial evolution. Patent bibliography documents consist of structured and unstructured data, so text mining or machine learning must be employed for the data analysis. This paper established a patent trend by analyzing the patent data of Intellectual Property Corporations of Malaysia (MyIPO) to identify the institution’s readiness to face the fourth industrial revolution. To achieve this aim, a patent classification method was used to classify MyIPO patent data based on the pillars of Industry 4.0. Furthermore, the patents data were drawn from MyIPO Online Search and Filing System was used as the datasets in this study. However, the dataset consists of the title of the patent and the publication year only. Since short text data in the title has fewer semantic information and high sparseness, this issue was a challenge for this study. In this paper, five common classifiers were used for text classification. Support Vector Machine (SVM) was proven to be the machine learning classifier with the highest accuracy in classifying the training and testing datasets. The findings of this paper present the patent trend for each pillar of Industry 4.0 including the patents related to Industry 4.0 where Autonomous Robot is the pillar with the highest innovation.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Proposed Cloud Based Solution for Customer Satisfaction in Telecommunication Industry 基于云的电信行业客户满意度解决方案
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073658
N. Mustafa, Lew Sook Ling, S. F. A. Razak
{"title":"A Proposed Cloud Based Solution for Customer Satisfaction in Telecommunication Industry","authors":"N. Mustafa, Lew Sook Ling, S. F. A. Razak","doi":"10.1109/ICRIIS48246.2019.9073658","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073658","url":null,"abstract":"Research demonstrates that the success of a service provider does not rely solely on sales volume but also in retaining existing customers. This research aims to propose a conceptual framework for improving customer satisfaction and thus facilitate service providers in retaining existing customers, specifically in the telecommunication industry in Malaysia. The Malaysian telecommunication and broadband industry is continuing growing each year and the demand for a better service and customer experience is increasing. All providers fight against each other to provide competitive packages with a good pricing plan. There are about 87% Internet users and 118% broadband penetration rate in Malaysia. It is not only good pricing plan that should be offered, it is crucial to know how to maintain the existing subscriber and to gain more trust among customers for increasing new subscribers. The main goal is to create better understanding of customer buying habits, good interaction (reactions or responses to something/helpful returned information) given during customer service and good experience during subscribing the product or services. A cloud-based customer support solution will be designed based on the proposed framework in order to offer a high quality service which satisfies customers in the said industry. Hence, this research focuses customer loyalty and retention marketing. Focus group study will be conducted to identify key determinants which influence customer satisfaction, followed by a survey and statistical analysis in order to determine the relationship between customer satisfaction (effect), existing services and customer experience (cause). The participants for this research will be obtained from one of the leading and largest broadband service provider in Malaysia – Telekom Malaysia (TM (M)) Berhad. As an empirical study, data of customer feedback about faulty restoration will be obtained from Voice of Customer (VOC) using questionnaire from a conducted survey. By providing a cloud-based customer support solution, it is believed that the customer satisfaction level will be lifted and negative feedback will be reduced.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信