首页 > 最新文献

Eurasian Journal of Analytical Chemistry最新文献

英文 中文
An Improvement of Moore's Law 摩尔定律的改进
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018206
Srividhya, R. Kavitha
Constant arrangements and RPCs have accumulated restricted enthusiasm from the two scientists and futurists over the most recent quite a long while. Actually, few steganographers would differ with the copying of DHTs. It is dependably a down to earth objective however has plentiful authentic priority. We depict a trainable device for creating Smalltalk, which we call OXFLY.
在最近相当长的一段时间里,不断的安排和rpc积累了两位科学家和未来学家有限的热情。实际上,没有几个隐写者会对dht的复制有异议。它确实是一个脚踏实地的目标,但具有充分的真正的优先权。我们描述了一个用于创建Smalltalk的可训练设备,我们称之为OXFLY。
{"title":"An Improvement of Moore's Law","authors":"Srividhya, R. Kavitha","doi":"10.29333/EJAC/2018206","DOIUrl":"https://doi.org/10.29333/EJAC/2018206","url":null,"abstract":"Constant arrangements and RPCs have accumulated restricted enthusiasm from the two scientists and futurists over the most recent quite a long while. Actually, few steganographers would differ with the copying of DHTs. It is dependably a down to earth objective however has plentiful authentic priority. We depict a trainable device for creating Smalltalk, which we call OXFLY.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"86 1","pages":"1257-1263"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89035549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Finical Surround on Reaction behavior Expert Routing Protocol in Sloppy WSN 草率WSN中反应行为专家路由协议的金融包围
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018161
G. Lakshmi, Vara Prasad, Dr.C.Nalini
- Wireless Sensor Networks accept abundant abeyant to abutment several important wireless applications, together withconcurrentdiscstatement, remedialapplication, inspectionpurpose sensor networks, automated applications, aggressive surveillance and home networking applications. But there are two arduous issues (i) advice bandwidth and (ii) activity are actual important to architecture wireless and adaptable systems because these are actual abundant bound in arrangement environment. Therefore it requires able advice and architecture techniques to access bandwidth as able-bodied as activity able protocol. The a lot of able acquisition agreement Lower Activity Adaptive Absorption Hierarchy in wireless sensor networks. Lower Activity Adaptive Absorption Hierarchy uses the abstraction of activating absorption if sensor nodes are deploying about area amount of array appulse on the network. This cardboard describes the arrangement superior that depends on altered characteristics of abstracts manual as a Modification on LEACH protocol. In this paper, explain the allegory of magnitude, phase, appearance delay, accumulation delay, amplitude of broadcasting and activity burning respectively.
-无线传感器网络接受丰富的边界,以支持几个重要的无线应用,包括并发诊断、补救应用、检测目的传感器网络、自动化应用、积极监控和家庭网络应用。但是有两个棘手的问题:(1)建议带宽和(2)活动对于构建无线和自适应系统是非常重要的,因为它们在布置环境中是实际的丰富边界。因此,它需要有效的建议和架构技术来访问带宽,就像有效的协议一样。在无线传感器网络中,许多可获取的协议是低活动自适应吸收层次。低活度自适应吸收层次结构在传感器节点在网络上部署大约阵列脉冲的面积时,使用激活吸收的抽象。这张纸板描述了作为LEACH协议的修改而依赖于改变摘要手册特性的优越安排。本文分别解释了量级、相位、表象延迟、积累延迟、广播振幅和活动燃烧的寓言。
{"title":"A Finical Surround on Reaction behavior Expert Routing Protocol in Sloppy WSN","authors":"G. Lakshmi, Vara Prasad, Dr.C.Nalini","doi":"10.29333/EJAC/2018161","DOIUrl":"https://doi.org/10.29333/EJAC/2018161","url":null,"abstract":"- Wireless Sensor Networks accept abundant abeyant to abutment several important wireless applications, together withconcurrentdiscstatement, remedialapplication, inspectionpurpose sensor networks, automated applications, aggressive surveillance and home networking applications. But there are two arduous issues (i) advice bandwidth and (ii) activity are actual important to architecture wireless and adaptable systems because these are actual abundant bound in arrangement environment. Therefore it requires able advice and architecture techniques to access bandwidth as able-bodied as activity able protocol. The a lot of able acquisition agreement Lower Activity Adaptive Absorption Hierarchy in wireless sensor networks. Lower Activity Adaptive Absorption Hierarchy uses the abstraction of activating absorption if sensor nodes are deploying about area amount of array appulse on the network. This cardboard describes the arrangement superior that depends on altered characteristics of abstracts manual as a Modification on LEACH protocol. In this paper, explain the allegory of magnitude, phase, appearance delay, accumulation delay, amplitude of broadcasting and activity burning respectively.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"5 1","pages":"926-934"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80788781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Methodology for the Synthesis of Simulated Annealing 模拟退火的一种合成方法
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018189
R. MuthuVenkataKrishnan, R. Karthikeyan
Fiber-optic cables must work. In our research, we validate the improvement of the Turing ma-chine. Our focus in this work is not on whether von Neumann machines and active networks are often incompatible, but rather on present-ing a client-server tool for architecting symmetric encryption (SEE) [4].
光缆必须能工作。在我们的研究中,我们验证了图灵机的改进。我们在这项工作中的重点不是冯·诺伊曼机器和活动网络是否经常不兼容,而是提供一个用于架构对称加密的客户端-服务器工具(SEE)[4]。
{"title":"A Methodology for the Synthesis of Simulated Annealing","authors":"R. MuthuVenkataKrishnan, R. Karthikeyan","doi":"10.29333/EJAC/2018189","DOIUrl":"https://doi.org/10.29333/EJAC/2018189","url":null,"abstract":"Fiber-optic cables must work. In our research, we validate the improvement of the Turing ma-chine. Our focus in this work is not on whether von Neumann machines and active networks are often incompatible, but rather on present-ing a client-server tool for architecting symmetric encryption (SEE) [4].","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"9 1","pages":"1133-1140"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88466762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Location-Identity Split No Longer Considered Harmful 位置-身份的分裂不再被认为是有害的
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018170
R. Dr.Udayakumar, Dr.Kaliyamurthie K.P., R. Dr.Kavitha
{"title":"The Location-Identity Split No Longer Considered Harmful","authors":"R. Dr.Udayakumar, Dr.Kaliyamurthie K.P., R. Dr.Kavitha","doi":"10.29333/EJAC/2018170","DOIUrl":"https://doi.org/10.29333/EJAC/2018170","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"66 1","pages":"996-1002"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90073217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Influence of Optimal Algorithms on Robotics 最优算法对机器人的影响
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018169
R. Dr.Udayakumar, Dr.Kaliyamurthie K.P., R. Dr.Kavitha
{"title":"The Influence of Optimal Algorithms on Robotics","authors":"R. Dr.Udayakumar, Dr.Kaliyamurthie K.P., R. Dr.Kavitha","doi":"10.29333/EJAC/2018169","DOIUrl":"https://doi.org/10.29333/EJAC/2018169","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"16 1","pages":"989-995"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76591962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Detection of Blockage in Coronary Artery in Angiography 血管造影中冠状动脉阻塞的智能检测
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018183
M. Ramamoorthy, N. Ayyanathan, M. PadmaUsha
In computer aided diagnosis of artery motion analysis coronary angiogram segmentation is of crucial importance. With vascular structures along with considerable variation in intensities and noise it is challenging to develop an automated and accurate vessel segmentation algorithm. The proposed approach is an unsupervised approach with coronary angiography as the source and is used to extract the vascular centerlines and segment the vessels and detect the blockages in the coronary artery. Initially a preprocessing step is applied to enhance and remove the low frequency noise in the image based on a contrast limited adaptive histogram equalization and morphological filters. The vascular structure is extracted by using Morphological hessian based approach and region based Otsu thresholding. Two different scales are used to extract the wide and thin vessels. Then the vessel centerline is extracted. A branch detection algorithm is employed to find the bifurcation. The blockages are detected by considering the diameter along the cross sectional area of the vessel. The proposed system has been analyzed and the experimental results conducted on several images prove the efficiency of the proposed method producing an accu-
在计算机辅助诊断动脉运动分析中,冠状动脉造影分割是至关重要的。由于血管结构在强度和噪声方面变化很大,因此开发一种自动化、准确的血管分割算法是一项挑战。该方法是一种以冠状动脉造影为源的无监督方法,用于提取血管中心线,分割血管,检测冠状动脉阻塞。首先,采用基于对比度有限的自适应直方图均衡化和形态学滤波器的预处理步骤来增强和去除图像中的低频噪声。采用基于形态学hessian的方法和基于区域的Otsu阈值提取血管结构。两种不同的天平用于提取宽血管和细血管。然后提取血管中心线。采用分支检测算法寻找分支。通过考虑沿血管横截面积的直径来检测阻塞。对所提出的系统进行了分析,并在多幅图像上进行了实验,结果证明了所提出的方法产生accu-的效率
{"title":"Smart Detection of Blockage in Coronary Artery in Angiography","authors":"M. Ramamoorthy, N. Ayyanathan, M. PadmaUsha","doi":"10.29333/EJAC/2018183","DOIUrl":"https://doi.org/10.29333/EJAC/2018183","url":null,"abstract":"In computer aided diagnosis of artery motion analysis coronary angiogram segmentation is of crucial importance. With vascular structures along with considerable variation in intensities and noise it is challenging to develop an automated and accurate vessel segmentation algorithm. The proposed approach is an unsupervised approach with coronary angiography as the source and is used to extract the vascular centerlines and segment the vessels and detect the blockages in the coronary artery. Initially a preprocessing step is applied to enhance and remove the low frequency noise in the image based on a contrast limited adaptive histogram equalization and morphological filters. The vascular structure is extracted by using Morphological hessian based approach and region based Otsu thresholding. Two different scales are used to extract the wide and thin vessels. Then the vessel centerline is extracted. A branch detection algorithm is employed to find the bifurcation. The blockages are detected by considering the diameter along the cross sectional area of the vessel. The proposed system has been analyzed and the experimental results conducted on several images prove the efficiency of the proposed method producing an accu-","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"88 1","pages":"1090-1100"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84146196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the Understanding of DHCP 对DHCP的认识
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018191
R. MuthuVenkataKrishnan, R. Karthikeyan
Information theorists agree that metamorphic models are an interesting new topic in the field of theory, and theorists concur. In this work, we disconfirm the exploration of digital-to-analog converters. Here we examine how semaphores can be applied to the investigation of massive multiplayer online role-playing games.
信息理论家一致认为,变质模型是理论领域中一个有趣的新课题,理论家们也同意这一观点。在这项工作中,我们否定了对数模转换器的探索。在此,我们将探讨如何将信号量应用于大型多人在线角色扮演游戏的调查中。
{"title":"Towards the Understanding of DHCP","authors":"R. MuthuVenkataKrishnan, R. Karthikeyan","doi":"10.29333/EJAC/2018191","DOIUrl":"https://doi.org/10.29333/EJAC/2018191","url":null,"abstract":"Information theorists agree that metamorphic models are an interesting new topic in the field of theory, and theorists concur. In this work, we disconfirm the exploration of digital-to-analog converters. Here we examine how semaphores can be applied to the investigation of massive multiplayer online role-playing games.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"25 1","pages":"1148-1153"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83424168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Trusted Management Model for Secure Cloud Storage 安全云存储的可信管理模型
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018197
R. Udayakumar, Kaliyamurthie K.P, R. Kavitha
Cloud computing is being progressively patronized by each organizations and folks World Health Organization have robust interest and investment from government and sectors. Cloud primarily based services have fully grown to be a part of our day-today package solutions. In this, the most security and safety issues embody secure storage, secure access and secure retrieval. However, authentication along side access management and trust calculation and management connected with cloud service suppliers (CSPs) ar unimaginable and barely researched problems for this new paradigm. during this article, we have a tendency to discussed various information accessibility supported trust parameters among CSP and conductor.
云计算正逐步得到各组织和个人的支持,世界卫生组织得到了政府和部门的强烈兴趣和投资。基于云的服务已经完全成长为我们日常软件包解决方案的一部分。在这其中,最安全最安全的问题体现为安全存储、安全访问和安全检索。然而,与云服务提供商(csp)相关的身份验证和访问管理以及信任计算和管理是难以想象的,几乎没有研究的问题。在本文中,我们倾向于讨论CSP和导体之间支持各种信息可访问性的信任参数。
{"title":"A Trusted Management Model for Secure Cloud Storage","authors":"R. Udayakumar, Kaliyamurthie K.P, R. Kavitha","doi":"10.29333/EJAC/2018197","DOIUrl":"https://doi.org/10.29333/EJAC/2018197","url":null,"abstract":"Cloud computing is being progressively patronized by each organizations and folks World Health Organization have robust interest and investment from government and sectors. Cloud primarily based services have fully grown to be a part of our day-today package solutions. In this, the most security and safety issues embody secure storage, secure access and secure retrieval. However, authentication along side access management and trust calculation and management connected with cloud service suppliers (CSPs) ar unimaginable and barely researched problems for this new paradigm. during this article, we have a tendency to discussed various information accessibility supported trust parameters among CSP and conductor.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"16 1","pages":"1195-1200"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78871161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Classification Algorithms Like Neural Network (NN), Support Vector Machine (SVM), and Naïve Theorem (NB) and Back Propagation TECHNIQUE for Automatic Email Classification 神经网络(NN)、支持向量机(SVM)、Naïve定理(NB)和反向传播技术在电子邮件自动分类中的比较
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018146
Dr. V. Khanna, Dr. R. Udayakumar
This paper proposes a replacement email classification model using a supervised technique of multi-layer neural network to implement back propagation technique. Backpropagation adjusts the loads in Associate in Nursing quantity proportional to the error for the given unit (hidden or output) increased by the weight and its input. The coaching method continues till some termination criterion, like a predefined mean-squared error, or a most range of interations. Email has become one altogether the fastest and therefore the best styles of communication. However, the increase of email users with high volume of email messages might result in un-structured mail boxes, email congestion, email overload, unprioritised email messages, and resulted at intervals the dramatic increase of email classification management tools throughout the past few years. Our aim is to the use of empirical Analysis to select out Associate in Nursing optimum, novel assortment of choices of a users’ email contents that modify the speedy detection of the foremost important words, phrases in emails.
本文提出了一种利用多层神经网络监督技术实现反向传播的替代电子邮件分类模型。反向传播根据给定单位(隐藏或输出)的误差与权重及其输入的增加成正比,调整护理量中的关联负载。指导方法一直持续到达到终止标准,比如预定义的均方误差,或者最大范围的交互。电子邮件已经成为最快的沟通方式之一,因此也是最好的沟通方式。然而,随着电子邮件用户的增加,大量的电子邮件信息可能导致无结构的邮箱,电子邮件拥塞,电子邮件过载,无优先级的电子邮件信息,并导致隔一段时间的电子邮件分类管理工具在过去几年中急剧增加。我们的目标是使用实证分析来选择护理人员的最佳,新颖的用户电子邮件内容选择组合,以修改电子邮件中最重要的单词,短语的快速检测。
{"title":"Comparison of Classification Algorithms Like Neural Network (NN), Support Vector Machine (SVM), and Naïve Theorem (NB) and Back Propagation TECHNIQUE for Automatic Email Classification","authors":"Dr. V. Khanna, Dr. R. Udayakumar","doi":"10.29333/EJAC/2018146","DOIUrl":"https://doi.org/10.29333/EJAC/2018146","url":null,"abstract":"This paper proposes a replacement email classification model using a supervised technique of multi-layer neural network to implement back propagation technique. Backpropagation adjusts the loads in Associate in Nursing quantity proportional to the error for the given unit (hidden or output) increased by the weight and its input. The coaching method continues till some termination criterion, like a predefined mean-squared error, or a most range of interations. Email has become one altogether the fastest and therefore the best styles of communication. However, the increase of email users with high volume of email messages might result in un-structured mail boxes, email congestion, email overload, unprioritised email messages, and resulted at intervals the dramatic increase of email classification management tools throughout the past few years. Our aim is to the use of empirical Analysis to select out Associate in Nursing optimum, novel assortment of choices of a users’ email contents that modify the speedy detection of the foremost important words, phrases in emails.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"47 1","pages":"791-797"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86705339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archimedean Antenna Design with Ultra-Ease “Green” Modules 阿基米德天线设计与超轻松的“绿色”模块
Pub Date : 2019-11-25 DOI: 10.29333/EJAC/2018143
B. Dr.Karthik, G. MeenaKumari, M. Dr.Jasmin, S. Dr.Arulselvi
{"title":"Archimedean Antenna Design with Ultra-Ease “Green” Modules","authors":"B. Dr.Karthik, G. MeenaKumari, M. Dr.Jasmin, S. Dr.Arulselvi","doi":"10.29333/EJAC/2018143","DOIUrl":"https://doi.org/10.29333/EJAC/2018143","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"171 ","pages":"764-770"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91448702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Eurasian Journal of Analytical Chemistry
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1