International Journal of Information Engineering and Electronic Business最新文献

筛选
英文 中文
Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute 基于Web的教育学院学生注册与考试填表管理系统
International Journal of Information Engineering and Electronic Business Pub Date : 2022-04-08 DOI: 10.5815/ijieeb.2022.02.04
Md. Tofail Ahmed, Md. Humaun Kabir, Sujit Roy
{"title":"Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute","authors":"Md. Tofail Ahmed, Md. Humaun Kabir, Sujit Roy","doi":"10.5815/ijieeb.2022.02.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.04","url":null,"abstract":"","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of Concept Mapping and Guided Discovery Instructional Strategies on Students’ Achievement in Redox Concept of Chemistry in Oyo State, Nigeria 概念映射和引导发现教学策略对尼日利亚奥约州学生氧化还原化学概念成绩的影响
International Journal of Information Engineering and Electronic Business Pub Date : 2022-04-08 DOI: 10.5815/ijieeb.2022.02.05
A. Tella, T.A. Ogundiya
{"title":"Effects of Concept Mapping and Guided Discovery Instructional Strategies on Students’ Achievement in Redox Concept of Chemistry in Oyo State, Nigeria","authors":"A. Tella, T.A. Ogundiya","doi":"10.5815/ijieeb.2022.02.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.05","url":null,"abstract":": The study determined the effects of concept mapping and guided discovery instructional strategies on student’s learning achievement in Redox concept in Chemistry in Oyo State, Nigeria. The pretest-posttest control group quasi experimental design with 3x2 factorial matrix was adopted, while six schools with one intact class each; two each for experimental groups and two for control group were used. A total of 176 senior secondary school 2 Chemistry students participated in the study. A validated Chemistry Student Achievement Test (r = 0.77) was used for data collection, while Analysis of covariance and Bonferroni post hoc were used to analyze the data collected at 0.05 level of significance. There was a significant main effect of treatment (F (2, 175) =11.84; p<0.05, partial η 2 = 0.13) on student’s achievement. The participants in concept mapping strategy obtained the highest post achievement mean score (12.71), followed by guided discovery instructional strategy (9.24) and conventional strategy (8.60) groups. There was no significant main effect of gender on student’s achievement. There was no significant two- way interaction effect of treatment and gender on student’s achievement in Redox concept of chemistry. Concept mapping and guided discovery instructional strategies enhanced student’s achievement in Redox concept of chemistry. It is therefore recommended that chemistry teachers should adopt these strategies to improve student’s achievement in Chemistry. of concept in moderating effect of of on","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117046368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy 数字经济对信息系统的威胁和损害的复杂评估的科学和方法基础
International Journal of Information Engineering and Electronic Business Pub Date : 2022-04-08 DOI: 10.5815/ijieeb.2022.02.02
Alovsat Garaja Aliyev, R. Shahverdiyeva
{"title":"Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy","authors":"Alovsat Garaja Aliyev, R. Shahverdiyeva","doi":"10.5815/ijieeb.2022.02.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.02","url":null,"abstract":": The article examines the scientific and methodological basis of a comprehensive assessment of threats and damage to information systems of the digital economy. The information infrastructure and tasks of the digital economy have been defined. Sources of information security in the digital economy sectors and their information security requirements have been studied. The results of the analysis of the situation in the countries of the world on the Global Cyber security Index are shown schematically. The graph of the dynamics of cybersecurity expenditures in the ICT segments is shown. It is argued that cybersecurity, which is formed and developed through the use of digital systems, is a priority. Many goals and methods of cyber-attacks are given on the platform of the 4.0 Industrial revolution. Cases of information security violations in the digital economy and the processes of assessing the damage caused by them have been studied. Generalized criteria for assessing information damage in the digital economy have been proposed. Threats to information and communication systems and classification of damage are given. A structural scheme of the conceptual model of threats and damage to information systems and resources in the field of digital economy of Azerbaijan has been proposed. An expert description of the ways in which information threats are disseminated has been developed using a fuzzy approach. The main types of damage caused by threats to the security of information systems are given. The security aspects of the abundance and surplus of information in the digital economy are shown. The directions of increasing the level of security and confidence in the digital economy and the structures to ensure its security are given. The main directions of information security in the digital economy have been identified, the directions of ensuring its security and increasing its confidence have been identified. Commonly used universal base technologies have been proposed in the digital economy sectors. Some methodological approaches to integrated risk and damage assessment in the digital economy have been explored. A scientific-methodological approach based on fuzzy methods has been proposed for the implementation of complex risk and damage assessment in the digital economy. Generalized ICT-based Big artificial sustainable of Industry payment innovation","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hindrance to Requirements Engineering During Software Development with Globally Distributed Teams 在全球分布式团队的软件开发过程中对需求工程的阻碍
International Journal of Information Engineering and Electronic Business Pub Date : 2022-04-08 DOI: 10.5815/ijieeb.2022.02.03
Waqas Mahmood, Syed Shaharyar Rizvi, Siraj Munir
{"title":"Hindrance to Requirements Engineering During Software Development with Globally Distributed Teams","authors":"Waqas Mahmood, Syed Shaharyar Rizvi, Siraj Munir","doi":"10.5815/ijieeb.2022.02.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.02.03","url":null,"abstract":": With the increase in the availability of skilled software engineers, the process of global software development is being increasingly adopted by organizations, at a relatively lesser cost. This has led to software processes being more viable in a progressive manner for several reasons that include better communication technologies and the levels of maturity seen in the software industry. That being said, Organizations that undertake the decision of adopting Global software development should realize that this process isn't exactly a risk-free action and there have been many failures reported with regard to it. The existing bools of globally distributed projects portray a number of challenges. During the interactive phase, the need for particular consideration towards the requirements of the client and the globally dispersed distributed software provider teams has been indicated. This paper makes use of surveys collected from IT professionals and people working in the software industry in order to present realistic insights gathered from them.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115725116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Secure Electronic Cybercrime Cases Database System for the Judiciary 为司法机构开发安全的电子网络犯罪案件资料库系统
International Journal of Information Engineering and Electronic Business Pub Date : 2022-02-08 DOI: 10.5815/ijieeb.2022.01.01
Olawale Surajudeen Adebayo, Joshua Bulus Micah, Ganiyu Shefiu Olusegun, Ishaq O. Alabi, Lateefah Abdulazeez
{"title":"Development of Secure Electronic Cybercrime Cases Database System for the Judiciary","authors":"Olawale Surajudeen Adebayo, Joshua Bulus Micah, Ganiyu Shefiu Olusegun, Ishaq O. Alabi, Lateefah Abdulazeez","doi":"10.5815/ijieeb.2022.01.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.01","url":null,"abstract":"The recent covid-19 pandemic created a barrier to every activity that needed physical interaction and involvement, especially in the judiciary. Careful research of some courts in Nigeria shown that case records are still been manually processed and stored and some courts operate a semi-digital and semi-manual processing pattern, which also has its own shortcoming of preprocessing manual records and converting them into digital records and physical presence is required to access court records. This research develops a secure electronic Cybercrime Cases Database System (eCCDBS), for prosecuted cybercrime in the judicial service in Nigeria. The system will provide an efficient method for collecting, retrieving, preserving, and management of court case records. The Rapid Application Development (RAD) methodology is used for the system development, because of its speed and time friendliness and can be easily restructured to meet the client's requirement at any point in time during the development life span. RAD can also present a prototype of the final system software to the client. Access control mechanism and secure password hashing were used to ensure the security of the system. The system was implemented and evaluated through deployment and found to have functioned according to the specification. The application subunits of records' creation, submission, modification, deletion, retrieval, and storage functioned effectively. Hence this system provides a secure online repository specifically for cybercrime case records that have elements of confidentiality, integrity and availability.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development and Evaluation of a Web Based System for Students’ Appraisal on Teaching Performance of Lecturers 基于Web的学生评教系统的开发与评价
International Journal of Information Engineering and Electronic Business Pub Date : 2022-02-08 DOI: 10.5815/ijieeb.2022.01.03
Joseph O. ADIGUN, Eric A. IRUNOKHAI, John O. ONIHUNWA, Yusuf A. SADA, Caleb A. JEJE, Yetunde M. AREO, Abolaji O. ILORI
{"title":"Development and Evaluation of a Web Based System for Students’ Appraisal on Teaching Performance of Lecturers","authors":"Joseph O. ADIGUN, Eric A. IRUNOKHAI, John O. ONIHUNWA, Yusuf A. SADA, Caleb A. JEJE, Yetunde M. AREO, Abolaji O. ILORI","doi":"10.5815/ijieeb.2022.01.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.03","url":null,"abstract":"Appraisal of lecturers’ effectiveness on teaching performance is an administrative duty of educational administrators which is intended to ascertain whether or not lecturers are performing their duty adequately. Most existing appraisal systems (especially in Nigeria) are superior based thus preventing the students that are direct recipients of lecturers’ output to evaluate the teaching competencies of their lecturers. Also, appraisal results that are students’ based are reported questionable in terms of its validity and reliability as the outcome of the evaluation reported biased assessment due to lecturers’ coercion of students into giving falsified evaluation reports or intentional falsification of judgements about a lecturer by sets of students. This study developed a system for students’ appraisal on teaching performance of lecturers (SATP) characterised by support for reduction of students’ partiality and prejudice during appraisal on lecturers’ effectiveness. Domain Driven Design was employed in designing the SATP client-server architecture and its framework. The SATP was programmed using HTML, CSS, JavaScript and PHP. Afterwards, 60 students were allowed to use the system to evaluate 6 lecturers in computer science department, Federal College of Wildlife Management which serves as the purposively selected research domain. The evaluation data obtained from the system were statistically evaluated to determine SATP performance (suitability, effectiveness and ability to detect falsified evaluation) using t-test at 0.10 level of significance. The results of performance evaluation revealed that SATP was found to be visually suitable and effective for lecturers’ evaluation. More so, evaluation data reported as not been falsified by SATP also recorded insignificant differences (∆μ = 0.36, p>0.10) in first and second evaluation while evaluation data reported as been falsified by SATP recorded significant differences (∆μ = 12.22, p<0.10) in first and second appraisal (evaluation). The study concluded that the result of evaluation of lecturers retrieved from the 26 Development and Evaluation of a Web Based System for Students’ Appraisal on Teaching Performance of Lecturers Copyright © 2022 MECS I.J. Information Engineering and Electronic Business, 2022, 1, 25-36 developed SATP is valid and recommend the adoption of the system in tertiary institutions as it will improve the excellence of educators and academics in tertiary institutions.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124117749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USSD System for Monitoring and Management of Employee Leave in Higher Educational Institution USSD高校员工休假监测与管理系统
International Journal of Information Engineering and Electronic Business Pub Date : 2022-02-08 DOI: 10.5815/ijieeb.2022.01.04
Adamu Abubakar, A. Mishra, Aliyu Yahaya Badeggi, A. Abdulkadir
{"title":"USSD System for Monitoring and Management of Employee Leave in Higher Educational Institution","authors":"Adamu Abubakar, A. Mishra, Aliyu Yahaya Badeggi, A. Abdulkadir","doi":"10.5815/ijieeb.2022.01.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.04","url":null,"abstract":": Unstructured supplementary service data also referred to as feature code or quick code has become a monumental part of services and products offered by Telecommunication Operators, and its application to various areas of telecommunication and real-world scenarios. It is a protocol of communication utilized by global system for mobile communications cell phones to communicate with mobile telecommunication network operators and applicable to various areas of trend in modern information technology sectors such as Wireless Application Protocol browsing, mobile-money services, prepaid call back services, menu-based information services, location-based content services, paid content portal, voting surveys","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"69 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development "Acep the Explorer" an Educational Game Introduction Animal Ecosystem 开发“接受探索者”教育游戏介绍动物生态系统
International Journal of Information Engineering and Electronic Business Pub Date : 2022-02-08 DOI: 10.5815/ijieeb.2022.01.02
Heny Pratiwi, Ita Arfyanti, Asep Nurhuda
{"title":"Development \"Acep the Explorer\" an Educational Game Introduction Animal Ecosystem","authors":"Heny Pratiwi, Ita Arfyanti, Asep Nurhuda","doi":"10.5815/ijieeb.2022.01.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.02","url":null,"abstract":"Acep the Explorer is a game about animal ecosystem, this lesson is a must-know lesson for elementary school children who aim to introduce to children who are just beginning to know animals that are foreign to them, so that children can recognize the animals and place them according to their own ecology. Educational games are games designed or created to stimulate thought including increasing concentration and problem solving. This game developed by multimedia development system, start form concept, design, until testing. AI development is also carried out in this game, we use a finite state automata to create enemies that annoy players The result of this research, an educational game about animal ecosystem and the children's response to the use of educational games know animals according to ecosystem is good, children can get to know animals according to their ecosystem. And the AI, the Finite state automata in this game makes the game more challenging, interesting and fun. Because in this game they can learn while playing games and face some obstacles and destroy the enemy hunting device and complete the game. This research contributes to combining AI technology with educational games to make students learning about animal ecosystems more interesting and challenging","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Using Histogram of Oriented Gradients with TensorFlow in Surveillance Camera on Raspberry Pi 基于面向梯度直方图的TensorFlow在树莓派监控摄像机中的人脸识别
International Journal of Information Engineering and Electronic Business Pub Date : 2022-02-08 DOI: 10.5815/ijieeb.2022.01.05
Reza Andrea, N. Ikhsan, Zulkarnain Sudirman
{"title":"Face Recognition Using Histogram of Oriented Gradients with TensorFlow in Surveillance Camera on Raspberry Pi","authors":"Reza Andrea, N. Ikhsan, Zulkarnain Sudirman","doi":"10.5815/ijieeb.2022.01.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2022.01.05","url":null,"abstract":"The implementation of face recognition with TensorFlow deep learning uses the webcam as a surveillance camera on the Raspberry Pi, aiming to provide a sense of security to the requiring party. A frequent surveillance camera problem is that crimes are performed at certain hours, the absence of early warning features, and there is no application of facial recognition on surveillance cameras. The function of this system is to perform facial recognition on every face captured by the webcam. Use the Histogram of the Oriented Gradient (HOG) method for the extraction process of deep learning. The image that is input from the camera will undergo a gray scaling process, then it will be taken the extraction value and classified by deep learning framework with TensorFlow. The system will send notifications when faces are not recognized. Based on the analysis of the data is done, the conclusion that the implementation of face recognition is built on the Raspberry Pi using a Python programming language with the help of TensorFlow so that the training process of the sample is much faster and more accurate. It uses a Graphical User Interface (GUI) as the main display and is built using Python designer, using email as an initial warning delivery medium to the user as well as using the webcam as the main camera to capture image.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133471723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Framework of Healthcare Supports System for the Treatment of Dementia Cases 一种改进的治疗痴呆病例的医疗支持系统框架
International Journal of Information Engineering and Electronic Business Pub Date : 2021-12-08 DOI: 10.5815/ijieeb.2021.06.04
Akaninyene Udo Ntuen, John Edet Efiong, E. Ogwo, Edward O. Uche-Nwachi
{"title":"An Improved Framework of Healthcare Supports System for the Treatment of Dementia Cases","authors":"Akaninyene Udo Ntuen, John Edet Efiong, E. Ogwo, Edward O. Uche-Nwachi","doi":"10.5815/ijieeb.2021.06.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2021.06.04","url":null,"abstract":"This research proposes an improved framework that would support the healthcare services and attention given to dementia patients. The paper shows the design and implementation of a web-based application that demonstrates the proposed framework. This study was necessitated by the observed flaws and weaknesses in the current manual technique of handling dementia cases in care homes which are plagued with loss of records, time wastage in retrieving records, data insecurity, user entry and data management errors, among others. The system design was realized using the unified modeling language (UML) on EdrawMax. The frontend implementation was done using HTML5, CSS3, and JavaScript, while the business logic was achieved using PHP, and the Database was designed with MySQL and managed through PHPMyAdmin. The system was tested by medical practitioners and dementia patients in a select care home. Other tests on browsers’ compatibility and platform interoperability were successful. The result of the study advances technical knowledge in developing medical expert systems using web 2.0 technologies, and promotes academic inquiry in the domain. The demonstration of the framework shows an improvement on the existing techniques which use quasi-automated approach. The proposed model is suitable for supporting efficient management of data of dementia patients.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信