METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi最新文献

筛选
英文 中文
IDENTIFIKASI KEPRIBADIAN DALAM PENDEKATAN PEMBELAJARAN DENGAN MENERAPKAN METODE CERTAINTY FACTOR 通过运用自信方法在学习方法中识别个性
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2020-03-10 DOI: 10.46880/mtk.v6i1.248
Gortap Lumbantoruan, Mufria J. Purba
{"title":"IDENTIFIKASI KEPRIBADIAN DALAM PENDEKATAN PEMBELAJARAN DENGAN MENERAPKAN METODE CERTAINTY FACTOR","authors":"Gortap Lumbantoruan, Mufria J. Purba","doi":"10.46880/mtk.v6i1.248","DOIUrl":"https://doi.org/10.46880/mtk.v6i1.248","url":null,"abstract":"An educator is important to know and understand the personality of a student so that the educational process can take place properly so that it can get maximum results. Because students have different personality types and the personality type of a student shows how students accept the learning material provided by the teacher. In the teaching and learning process, educators who do not understand the personality of students will find it difficult to deliver learning materials that will attract students' interest, which will hamper the knowledge transfer process. In this study, the identification of the personality of students using the certainty factor method and the types of personality analyzed were choleric, melancholic, phlegmatic and sanguinis. Based on the personality traits of each. The goal is to make it easier for educators to find ways to educate according to the personality of students. The results obtained are that by using the certainty factor method, the personality of a student is obtained based on the characteristics of the student with a confidence level of 88.43%.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERANCANGAN SISTEM PAKAR TINGKAT PERSENTASE PENYAKIT ANOREKSIA NERVOSA MENGGUNAKAN METODE DEMPSTER SHAFER 设计系统专家采用了DEMPSTER SHAFER方法
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2020-03-10 DOI: 10.46880/mtk.v6i1.424
E. Harianja, Junika Napitupulu
{"title":"PERANCANGAN SISTEM PAKAR TINGKAT PERSENTASE PENYAKIT ANOREKSIA NERVOSA MENGGUNAKAN METODE DEMPSTER SHAFER","authors":"E. Harianja, Junika Napitupulu","doi":"10.46880/mtk.v6i1.424","DOIUrl":"https://doi.org/10.46880/mtk.v6i1.424","url":null,"abstract":"Anorexia Nervosa (AN) is an eating disorder by making yourself feel hungry (self-starvation). Usually occurs in young women who are stepping on the high school bench (General High School). Their goal is to make themselves hungry so that they have a slim physical appearance and attract the attention of the opposite sex. There are 2 types of Anorexia Nervosa, Restrictive Anorexia Nervosa, people with this type of anorexia greatly limit the amount of food they consume, in fact they often do not eat at all until their bodies become very thin. Anorexia Nervosa Binge-purge, this type of anorexia is almost the same as bulimia. People who suffer from this disorder will eat in large quantities. But after eating, they will tend to feel guilty and then force to vomit back the food they ate. Mahoni Mental Hospital is one of the agencies engaged in health services, as a health agency, it is a must for the agency to improve its services both in terms of speed and timeliness. Mahoni Mental Hospital does not yet have a computerized system or method used to diagnose Anorexia Nervosa. Therefore, there is often a delay in the treatment of anorexia nervosa disorders. This study aims to build an expert system that functions as a tool for the Mahogany Mental Hospital or medical (experts) and medical students in diagnosing Anorexia Nervosa disorders. This study uses the Dempster Shafer method, in diagnosing Anorexia Nervosa disorder, based on the symptoms felt by the patient, then the results of the consultation are how many percent of the patient is affected by Restrictive Anorexia Nervosa or what percentage of the patient is Anorexia Nervosa Bingepurge","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131963313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SISTEM INFORMASI PERPUSTAKAAN BERBASIS WEB PADA SMA SANTO YOSEPH MEDAN 圣约塞夫MEDAN高中的网络信息系统
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2020-03-10 DOI: 10.46880/mtk.v6i1.399
S. Silaen, R. J. Simamora, Mendarissan Aritonang
{"title":"SISTEM INFORMASI PERPUSTAKAAN BERBASIS WEB PADA SMA SANTO YOSEPH MEDAN","authors":"S. Silaen, R. J. Simamora, Mendarissan Aritonang","doi":"10.46880/mtk.v6i1.399","DOIUrl":"https://doi.org/10.46880/mtk.v6i1.399","url":null,"abstract":"The library is very important in supporting the knowledge and information of students in school because the library is part of the learning resources that must be owned by the school; hence the library is often referred to as the heart of education. At present, the Santo Yoseph Medan High School Library, which is currently processing its library, has not been computerized, making it difficult to process loan transactions and return books, and register as a member and award fines. For this reason, SMA Santo Yoseph Medan requires a library that has a web-based library system. The tool used to design this library information system is to use the PHP and MySql programming languages. The results of this web-based library information system design are expected to help library administrators in the process of borrowing and returning books, processing book data and members, and making library data reports.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126455099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI ALGORITMA GENETIKA DALAM PENJADWALAN KERJA DAN PENGAJUAN CUTI PEGAWAI DI PT.MEDAN SUGAR INDUSTRI 基因算法在PT.MEDAN industries的工作安排和雇员请假中得到实现
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-09-10 DOI: 10.46880/mtk.v5i2.423
Yolanda Tua Parulian Simbolon, Asaziduhu Gea
{"title":"IMPLEMENTASI ALGORITMA GENETIKA DALAM PENJADWALAN KERJA DAN PENGAJUAN CUTI PEGAWAI DI PT.MEDAN SUGAR INDUSTRI","authors":"Yolanda Tua Parulian Simbolon, Asaziduhu Gea","doi":"10.46880/mtk.v5i2.423","DOIUrl":"https://doi.org/10.46880/mtk.v5i2.423","url":null,"abstract":"The key to success in achieving the company's vision and mission is not only determined by the availability of technology and the availability of materials owned by the company. However, the potential of human resources is one of the capital that plays an important role in achieving company goals. However, the productivity of human resources can decrease due to various influencing factors. In addition to individual factors that come from the employees themselves, the excessive workload is a factor that can cause a decrease in employee productivity. Therefore, employees need to get good treatment in terms of the division of working hours, so that employees can work more optimally. The division of work shifts is one solution that can be carried out by the company. The problem with the existing leave application system at PT. Medan Sugar Industry is still done manually. Checking the remaining leave, submitting leave, and leaving approval are carried out in stages and still relies on the left card contained in each employee file data. With the Scheduling and Submission System for employee leave using the Genetic Algorithm Method at PT. Medan Sugar Industry, the employee scheduling process can be computerized and more effective.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI 使用CHIPER transpositcation算法进行局域网数据安全
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-09-10 DOI: 10.46880/mtk.v5i2.421
Sanco Simanullang
{"title":"PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI","authors":"Sanco Simanullang","doi":"10.46880/mtk.v5i2.421","DOIUrl":"https://doi.org/10.46880/mtk.v5i2.421","url":null,"abstract":"Data security is important in the implementation of information technology, especially in the field of computers, which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace or the internet. This can create new challenges and demands for the availability of a data security system that is as sophisticated as the advances in computer technology itself. In cryptography, data sent over the network will be disguised in such a way that even if the data can be read by third parties, it should not be understood by unauthorized parties. Data to be sent and has not been encrypted which produces ChipperTtext. The implementation of the transposition algorithm for securing data flowing in the Local Area Network (LAN), the transposition process changes the arrangement of letters from the source text (plaintext), with a column transposition cipher, to obtain the words in a barred manner. In the transposition cipher, the plaintext is the same, but the sequence is changed. . This algorithm transposes a series of characters in the text. Another name for this method is permutation because transpose each character in the text is the same as permutating the characters so that this application generates encrypted data on the network stream and returns it to plaintext at the final destination. So that it can be ensured that the information and data sent to other parties are safe from unauthorized parties.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123456154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN ALGORITMA BLOWFISH Studi Kasus DI DOTA CAFE
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-09-10 DOI: 10.46880/mtk.v5i2.420
D. Hasibuan, J. Naibaho, Christian P. Simanjuntak
{"title":"IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN ALGORITMA BLOWFISH Studi Kasus DI DOTA CAFE","authors":"D. Hasibuan, J. Naibaho, Christian P. Simanjuntak","doi":"10.46880/mtk.v5i2.420","DOIUrl":"https://doi.org/10.46880/mtk.v5i2.420","url":null,"abstract":"Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. In everyday life, fraud is often found in important data, one of which is cashier system data. To prevent and overcome this, the concept of network security with the Blowfish Algorithm will be applied. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Unexpected things often occur such as foreign parties who want to enter the system by repeatedly trying the possible username and password, or foreign parties changing the data in the cash register at Dota Café. This system will function to monitor system activity, in this case if the system feels a threat or system disturbance is found.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISIS QUALITY OF SERVICE (QoS) LIVE STREAMING WIRELESS IP CAMERA XONZ BERBASIS SMARTPHONE ANDROID 分析服务质量(QoS)直播无线网络摄像机XONZ BERBASIS智能手机ANDROID
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-09-10 DOI: 10.46880/mtk.v5i2.422
Fati Gratianus Nafiri Larosa, Ofelius Laia
{"title":"ANALISIS QUALITY OF SERVICE (QoS) LIVE STREAMING WIRELESS IP CAMERA XONZ BERBASIS SMARTPHONE ANDROID","authors":"Fati Gratianus Nafiri Larosa, Ofelius Laia","doi":"10.46880/mtk.v5i2.422","DOIUrl":"https://doi.org/10.46880/mtk.v5i2.422","url":null,"abstract":"Quality of Service (QoS) on Live Streaming has the main parameters, namely bandwidth, jitter, loss and delay, which are measured on the implementation of Wireless IP Camera based on Android Smartphone. The test tools used iperf and ping software, to capture data packets. The network design in this study uses Xonz Wireless IP Camera, wifi router, Server/Laptop and Android Smartphone to monitor or access the services provided. Surveillance/reconnaissance or surveillance by accessing live streaming can be done from anywhere as long as there is still an intranet network. wifi router provides DHCP service, Server/Laptop provides a Virtual Machine using MS Windows Server 2003 Operating System. Web Server is not installed on Real Machine but on Virtual Machine. The smartphone used has the Android Operating System version 4.4.2. IP Camera Xonz model XZ-12Z-HR/W has one major drawback that it can only be accessed via Internet Explorer Browser which can only run on MS Windows Operating System. Some applications that are already available on Google Play and installed on Android Smartphones cannot detect the Wireless IP Camera. The outcome or impact of this research is the creation of a simple Live Streaming application that can be accessed by all browsers on all platforms including Android Smartphones. Measurements were made using iperf and ping. The results showed that the Xonz IP Camera can still be used for mobile room monitoring as far as a maximum of about 20 m from the wifi router and still meets the standard QoS values ​​set by TIPHON and ITU-T G.114.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERANCANGAN SISTEM INFORMASI PENGELOLAAN BARANG DI GUDANG RPX DOMESTIC STUDI KASUS : PT. ANTAREJA PRIMA ANTARAN 案例研究RPX仓库货物管理信息系统
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-09-10 DOI: 10.46880/mtk.v5i2.419
Zahrah Nurlaila, Febri Diandari, S. Supono
{"title":"PERANCANGAN SISTEM INFORMASI PENGELOLAAN BARANG DI GUDANG RPX DOMESTIC STUDI KASUS : PT. ANTAREJA PRIMA ANTARAN","authors":"Zahrah Nurlaila, Febri Diandari, S. Supono","doi":"10.46880/mtk.v5i2.419","DOIUrl":"https://doi.org/10.46880/mtk.v5i2.419","url":null,"abstract":"At this time PT. Antareja Prima Antaran or RPX often experience problems in warehousing such as calculating the time span of stored goods. It takes control of the activity of moving goods and documents to increase the efficiency of warehouse use so that the number and time span of goods are stored at a minimum value or according to the plan. In addition, based on the above problems, a warehouse checking system is made, the Early Warning feature to overcome overload in the warehouse, which is expected by customers not to need to be afraid and worried about the goods in the warehouse that will be sent through the RPX freight forwarder because there will be a checking facility for the goods arriving at the warehouse and the goods to be sent starting from the time the goods are entered and then processed to the place. Business Process Modeling Notation (BPMN) is a technique that enables all parties involved in the process to communicate clearly, correctly, and efficiently. In this way, BPMN defines the semantic notation of the Business Process Diagram (DPB). DPB is a chart based on the 'Flowchart' technique.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115866861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RANCANG BANGUN SISTEM PAKAR MENDIAGNOSA PENYAKIT OBSESSIVE COMPULSIVE DISORDER DENGAN METODE DEMPSTER SHAFER
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-03-10 DOI: 10.46880/mtk.v5i1.412
Nidia Enjelita, R. adawiyah
{"title":"RANCANG BANGUN SISTEM PAKAR MENDIAGNOSA PENYAKIT OBSESSIVE COMPULSIVE DISORDER DENGAN METODE DEMPSTER SHAFER","authors":"Nidia Enjelita, R. adawiyah","doi":"10.46880/mtk.v5i1.412","DOIUrl":"https://doi.org/10.46880/mtk.v5i1.412","url":null,"abstract":"Anxiety is a normal reaction to stress and can be beneficial in some situations. It can alert us to dangers and help us prepare and pay attention. Anxiety disorders differ from normal feelings of nervousness or anxiousness and involve excessive fear or anxiety. Anxiety disorders can cause people to try to avoid situations that trigger or worsen their symptoms. There are several types of anxiety disorders, including Obsessive-Compulsive Disorder. Obsessive-Compulsive Disorder (OCD) is a disorder in which people have recurring, unwanted thoughts, ideas, or sensations (obsessions) that make them feel driven to do something repetitively (compulsions). Repetitive behaviors, such as hand washing, checking on things, or cleaning, can significantly interfere with a person’s daily activities and social interactions. This Expert system which implements Dempster Shafer Method can help anyone to make sure that they have OCD and need psychologist help to prevent this distress from becoming worst.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132779112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ANALISIS DAN IMPLEMENTASI JARINGAN THIN CLIENT MENGGUNAKAN LINUX TERMINAL SERVER PROJECT PADA JARINGAN LAN
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-03-10 DOI: 10.46880/mtk.v5i1.417
D. Hasibuan, F. G. Larosa, Rico V. A. Simanjuntak
{"title":"ANALISIS DAN IMPLEMENTASI JARINGAN THIN CLIENT MENGGUNAKAN LINUX TERMINAL SERVER PROJECT PADA JARINGAN LAN","authors":"D. Hasibuan, F. G. Larosa, Rico V. A. Simanjuntak","doi":"10.46880/mtk.v5i1.417","DOIUrl":"https://doi.org/10.46880/mtk.v5i1.417","url":null,"abstract":"The development of computer technology both in software and hardware is very fast. These two aspects are interrelated with each other and cannot be separated. LTSP, Linux Terminal Server Project is a project started by James A McQuillan as a diskless networking project based on the GNU/Linux operating system. Called a diskless network, because the client is not equipped with a hard disk. All application software and operating systems needed by the client computer are served and managed by the server computer. In this design, a laptop with an Intel processor is used as a server and a PC as a client. LTSP will be integrated into the Linux operating system ubuntu 16.04, and as a provider of diskless thin client service platforms is LTSP (Linux Terminal Server Project). With LTSP, the construction of a diskless network is expected to be more efficient. Diskless network technology is one solution that can be applied in dealing with the problem of investing in computer technology hardware with predetermined specifications.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115138483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信