首页 > 最新文献

2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
The implementation of a knowledge management system model 实现了一个知识管理系统模型
Zhomartkyzy Gulnaz, Balova Tatiana
This paper presents some information support methods and models of the university's scientific knowledge management processes. Some management tools of the university's scientific knowledge are presented and the developed information model of the university's scientific knowledge is described. The paper proposes the model of the university's specialist for the specialist's profile description and the concept of the university's scientific knowledge semantic portal. The concept of the semantic portal is based on the ontological information model and the SemanticWeb technology.
提出了高校科学知识管理过程中的信息支持方法和模型。介绍了高校科学知识的一些管理工具,并对建立的高校科学知识信息模型进行了描述。提出了大学专家的形象描述模型和大学科学知识语义门户的概念。语义门户的概念是基于本体信息模型和语义web技术提出的。
{"title":"The implementation of a knowledge management system model","authors":"Zhomartkyzy Gulnaz, Balova Tatiana","doi":"10.1109/ICAICT.2014.7035945","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035945","url":null,"abstract":"This paper presents some information support methods and models of the university's scientific knowledge management processes. Some management tools of the university's scientific knowledge are presented and the developed information model of the university's scientific knowledge is described. The paper proposes the model of the university's specialist for the specialist's profile description and the concept of the university's scientific knowledge semantic portal. The concept of the semantic portal is based on the ontological information model and the SemanticWeb technology.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Solving the bi-dimensional two-way number partitioning problem with heuristic algorithms 用启发式算法求解二维双向数划分问题
M. Hacibeyoglu, Vahit Tongur, K. Alaykiran
The two-way number partitioning problem is to divide set of numbers into two subsets. As a result of the dividing process the sums of numbers in subsets must be as nearly equal as possible. The two-way number partitioning problem problem is NP-complete. The bi-dimensional two-way number partitioning problem is a kind of number partitioning problem. The sets have only two coordinates and the aim is minimized the differences of the sum of the numbers for both coordinates. This work presents two heuristic algorithm for solving bi-dimensional two-way number partitioning problem. Fist algorithm is best known and most used greedy algorithm. The other one is a novel genetic algorithm approach. These algorithms are analyzed, implemented and tested on randomly different 20 datasets.
双向数字划分问题是将一组数字划分为两个子集。作为划分过程的结果,子集中的数的和必须尽可能接近相等。双向数字划分问题是np完全问题。二维双向数字划分问题是数字划分问题的一种。该集合只有两个坐标,目标是最小化两个坐标的数字和的差异。本文提出了求解二维双向数划分问题的两种启发式算法。第一个算法是最著名和最常用的贪婪算法。另一个是一种新的遗传算法方法。这些算法在随机不同的20个数据集上进行了分析、实现和测试。
{"title":"Solving the bi-dimensional two-way number partitioning problem with heuristic algorithms","authors":"M. Hacibeyoglu, Vahit Tongur, K. Alaykiran","doi":"10.1109/ICAICT.2014.7035916","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035916","url":null,"abstract":"The two-way number partitioning problem is to divide set of numbers into two subsets. As a result of the dividing process the sums of numbers in subsets must be as nearly equal as possible. The two-way number partitioning problem problem is NP-complete. The bi-dimensional two-way number partitioning problem is a kind of number partitioning problem. The sets have only two coordinates and the aim is minimized the differences of the sum of the numbers for both coordinates. This work presents two heuristic algorithm for solving bi-dimensional two-way number partitioning problem. Fist algorithm is best known and most used greedy algorithm. The other one is a novel genetic algorithm approach. These algorithms are analyzed, implemented and tested on randomly different 20 datasets.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Support system for QR-code-based educational processes 基于qr码的教育过程支持系统
A. Lezhebokov, Y. Kravchenko, V. Bova
This work is concerned with operating and implementing state-of-the-art IT solutions into an educational, process, creating content to support the storage and access to the data required for education. Various QR code application methods to support the educational process in educational institutions are reviewed and discussed. Operation algorithms and architecture of an information system are developed.
这项工作涉及到在教育过程中操作和实现最先进的IT解决方案,创建内容以支持对教育所需数据的存储和访问。对支持教育机构教育过程的各种二维码应用方法进行了回顾和讨论。开发了信息系统的操作算法和体系结构。
{"title":"Support system for QR-code-based educational processes","authors":"A. Lezhebokov, Y. Kravchenko, V. Bova","doi":"10.1109/ICAICT.2014.7036011","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036011","url":null,"abstract":"This work is concerned with operating and implementing state-of-the-art IT solutions into an educational, process, creating content to support the storage and access to the data required for education. Various QR code application methods to support the educational process in educational institutions are reviewed and discussed. Operation algorithms and architecture of an information system are developed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Organization of standard cubes and algorithms in TOFI technology TOFI技术中标准立方体的组织与算法
T. Kuanov, N. S. Turganbayev, Zh N. Abilkayeva, F. Ismagulova
Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes the key capabilities of this technology, such as the use of standard cubes and algorithms.
复杂系统的建模和监测技术,TOFI用于开发信息和分析系统,以支持几乎任何学科领域的决策过程。本文描述了该技术的关键功能,例如标准多维数据集和算法的使用。
{"title":"Organization of standard cubes and algorithms in TOFI technology","authors":"T. Kuanov, N. S. Turganbayev, Zh N. Abilkayeva, F. Ismagulova","doi":"10.1109/ICAICT.2014.7035960","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035960","url":null,"abstract":"Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes the key capabilities of this technology, such as the use of standard cubes and algorithms.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122039291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive auditorium response and student progress evaluation system 互动观众席反应及学生进度评估系统
Yashar Hajiyev, Khatira Salimova
For last ten years ICT based contemporary teaching technologies has been developed into fast evolving segment of state-of-the-art applications. Newest teaching technologies enable to move from lecture-driven classes with chalk and chalkboards to comprehensive class environment that meets learning needs of every student and provide thorough conditions for teaching. Auditorium response technology offers exceptional opportunities for cost-effective automation of computer-based testing of students' responses with low infrastructure demands, provides a variety of reports including participant score reports, roster report and scores analysis report. The paper systemized good experience and best practices accumulated in employing of response technologies.
近十年来,基于信息通信技术的当代教学技术已经发展成为一个快速发展的前沿应用领域。最新的教学技术使课堂从粉笔和黑板的讲课驱动到全面的课堂环境,满足每个学生的学习需求,为教学提供彻底的条件。礼堂响应技术为低基础设施要求的学生响应的计算机自动化测试提供了经济有效的机会,提供各种报告,包括参与者分数报告,花名册报告和分数分析报告。本文整理了在采用响应技术方面积累的良好经验和最佳做法。
{"title":"Interactive auditorium response and student progress evaluation system","authors":"Yashar Hajiyev, Khatira Salimova","doi":"10.1109/ICAICT.2014.7036002","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036002","url":null,"abstract":"For last ten years ICT based contemporary teaching technologies has been developed into fast evolving segment of state-of-the-art applications. Newest teaching technologies enable to move from lecture-driven classes with chalk and chalkboards to comprehensive class environment that meets learning needs of every student and provide thorough conditions for teaching. Auditorium response technology offers exceptional opportunities for cost-effective automation of computer-based testing of students' responses with low infrastructure demands, provides a variety of reports including participant score reports, roster report and scores analysis report. The paper systemized good experience and best practices accumulated in employing of response technologies.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks 认知无线电(CR)网络安全漏洞分析与威胁评估
Syed Rizvi, John Mitchell, N. Showan
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.
无线通信的最新进展每天都在造成频谱短缺的问题。最近,认知无线电(CR)试图通过动态利用自由频谱,允许次要用户与主要用户共存,而不会对其通信造成干扰,从而最大限度地减少这一问题。CR提供了许多有希望的好处,包括动态频谱共享、健壮的跨层自适应和协作网络。预计CR技术将成为信息通信技术创新的下一波浪潮。尽管人们正在大力探索CR的操作方面,但其安全方面却很少受到关注。由于CR网络的动态性以及它们相对更多地暴露于无线网络的事实,引入了全新类型的安全威胁和挑战,例如许可用户仿真,自私的不当行为和未经授权的频谱使用。为了在实践中成功部署CR技术,迫切需要提高对这些全新类型的安全威胁和挑战的理论理解。因此,在本文中,我们的主要目标是识别和调查CR网络(CRN)中已知的主要安全威胁。我们的第二个目标是强调潜在威胁如何利用通信堆栈不同层上存在的漏洞。
{"title":"Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks","authors":"Syed Rizvi, John Mitchell, N. Showan","doi":"10.1109/ICAICT.2014.7035911","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035911","url":null,"abstract":"Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129541918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Software module "Virtual Physics Laboratory" in Higher Education 高等教育中的虚拟物理实验室软件模块
Y. Daineko, V. Dmitriyev
The results of the software module "Virtual Physics Laboratory" were presented in the Higher Education system of the International University of Information Technologies (IITU). The information technology design and development, the structure of the virtual laboratory and its place in the system of Higher Education of IITU were described the same way as the principal regimes of operation of the program module in the system and methods for its use in the educational process.
“虚拟物理实验室”软件模块的开发成果已在国际信息技术大学(IITU)高等教育系统中展示。信息技术的设计和开发,虚拟实验室的结构及其在IITU高等教育系统中的地位,以相同的方式描述了系统中程序模块的主要运行机制及其在教育过程中的使用方法。
{"title":"Software module \"Virtual Physics Laboratory\" in Higher Education","authors":"Y. Daineko, V. Dmitriyev","doi":"10.1109/ICAICT.2014.7036005","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036005","url":null,"abstract":"The results of the software module \"Virtual Physics Laboratory\" were presented in the Higher Education system of the International University of Information Technologies (IITU). The information technology design and development, the structure of the virtual laboratory and its place in the system of Higher Education of IITU were described the same way as the principal regimes of operation of the program module in the system and methods for its use in the educational process.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Preprocessing of experimental seismic data 实验地震资料的预处理
N. Allakhverdiyeva
In this work two methods of seismic data preprocessing for cleaning them from the noise are discussed. The first method is based on the method of decomposition of seismic signal. The second method is based on the spectral analysis with the use of low-pass filtering of data.
本文讨论了地震数据的两种预处理方法,以去除地震数据中的噪声。第一种方法是基于地震信号的分解方法。第二种方法是在谱分析的基础上对数据进行低通滤波。
{"title":"Preprocessing of experimental seismic data","authors":"N. Allakhverdiyeva","doi":"10.1109/ICAICT.2014.7035944","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035944","url":null,"abstract":"In this work two methods of seismic data preprocessing for cleaning them from the noise are discussed. The first method is based on the method of decomposition of seismic signal. The second method is based on the spectral analysis with the use of low-pass filtering of data.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The method of an audit of software containing in digital drives 一种对包含在数字驱动器中的软件进行审计的方法
V. Shved, Pavel Kuzmich, V. Korzhuk
The audit of digital drives content, including hard disks, is an essential part of the audit in automated systems, including an aim to ensure the integrity of the software, and also with a view to establish the facts of use of third-party software. In this article we propose a method that allows identifying executable files compiled from the same source code for different versions of operating systems and also with minor changes to the source code.
对包括硬盘在内的数字驱动器内容的审计是自动化系统审计的重要组成部分,其目的是确保软件的完整性,并以确定使用第三方软件的事实为目的。在本文中,我们提出了一种方法,该方法允许识别从不同版本的操作系统的相同源代码编译的可执行文件,并且对源代码也进行了微小的更改。
{"title":"The method of an audit of software containing in digital drives","authors":"V. Shved, Pavel Kuzmich, V. Korzhuk","doi":"10.1109/ICAICT.2014.7035927","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035927","url":null,"abstract":"The audit of digital drives content, including hard disks, is an essential part of the audit in automated systems, including an aim to ensure the integrity of the software, and also with a view to establish the facts of use of third-party software. In this article we propose a method that allows identifying executable files compiled from the same source code for different versions of operating systems and also with minor changes to the source code.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133655954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The integrated model of representation of problem-oriented knowledge in information systems 信息系统中面向问题的知识表示的集成模型
V. Bova, V. Kureichik, A. Lezhebokov
The integrated model, covered mutually complementary methods and knowledge representation tools, is discussed. On the basis on the analysis of knowledge management information component under uncertainty the integrated model is introduced as an assembly of elements of a formal representation system for heterogeneous knowledge. In conformity with the present model the knowledge representation and processing language, as well as tools covering the total volume of the existing development requirements for knowledge databases of problem-oriented intelligent systems, are constructed.
讨论了集成模型,涵盖了相互补充的方法和知识表示工具。在分析不确定条件下知识管理信息组成的基础上,引入了集成模型,将其作为异构知识形式化表示系统的要素集合。根据该模型,构建了涵盖面向问题的智能系统知识库开发需求总量的知识表示和处理语言以及工具。
{"title":"The integrated model of representation of problem-oriented knowledge in information systems","authors":"V. Bova, V. Kureichik, A. Lezhebokov","doi":"10.1109/ICAICT.2014.7035923","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035923","url":null,"abstract":"The integrated model, covered mutually complementary methods and knowledge representation tools, is discussed. On the basis on the analysis of knowledge management information component under uncertainty the integrated model is introduced as an assembly of elements of a formal representation system for heterogeneous knowledge. In conformity with the present model the knowledge representation and processing language, as well as tools covering the total volume of the existing development requirements for knowledge databases of problem-oriented intelligent systems, are constructed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1