首页 > 最新文献

2013 International Conference on Green High Performance Computing (ICGHPC)最新文献

英文 中文
An integrated clustering approach for high dimensional categorical data 高维分类数据的集成聚类方法
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533920
K. Kalaivani, A. Raghavendra
Clustering is an attractive and important task in data mining which is used in many applications. However earlier work on clustering focused on only categorical data which is based on attribute values for grouping similar kind of data items thus will leads to convergence problem of clustering process. This proposed work is to enhance the existing k-means clustering process based on the categorical and mixed data types in efficient manner. The goal is to use integrated clustering approach based on high dimensional categorical data that works well for data with mixed continuous and categorical features. The experimental results of the proposed method on several data sets are suggest that the link based cluster ensemble algorithm integrate with proposed k-means algorithm to produce accurate clustering results. In this proposed algorithm prove the convergence property of clustering process, thus will improve the accuracy of clustering results. The scope of this proposed work is used to provide the accurate and efficient results, whenever the user wants to access the data from the database.
聚类是数据挖掘中的一项重要任务,具有广泛的应用前景。然而,早期的聚类研究只关注基于属性值对相似类型数据进行分组的分类数据,这将导致聚类过程的收敛性问题。本文提出的工作是有效地改进现有的基于分类和混合数据类型的k-means聚类过程。目标是使用基于高维分类数据的集成聚类方法,该方法可以很好地处理具有混合连续和分类特征的数据。在多个数据集上的实验结果表明,基于链接的聚类集成算法与本文提出的k-means算法相结合,可以得到准确的聚类结果。该算法证明了聚类过程的收敛性,从而提高了聚类结果的准确性。当用户想要访问数据库中的数据时,这个建议工作的范围用于提供准确和有效的结果。
{"title":"An integrated clustering approach for high dimensional categorical data","authors":"K. Kalaivani, A. Raghavendra","doi":"10.1109/ICGHPC.2013.6533920","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533920","url":null,"abstract":"Clustering is an attractive and important task in data mining which is used in many applications. However earlier work on clustering focused on only categorical data which is based on attribute values for grouping similar kind of data items thus will leads to convergence problem of clustering process. This proposed work is to enhance the existing k-means clustering process based on the categorical and mixed data types in efficient manner. The goal is to use integrated clustering approach based on high dimensional categorical data that works well for data with mixed continuous and categorical features. The experimental results of the proposed method on several data sets are suggest that the link based cluster ensemble algorithm integrate with proposed k-means algorithm to produce accurate clustering results. In this proposed algorithm prove the convergence property of clustering process, thus will improve the accuracy of clustering results. The scope of this proposed work is used to provide the accurate and efficient results, whenever the user wants to access the data from the database.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing the performance in cognitive network 增强认知网络的性能
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533934
J. Bino, A. Macriga
In the next generation of wireless networks, the entire network operating on different radio frequencies under wireless mode will be available for communication. Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple Output (MIMO) technique is used for the transmission of signals in Cognitive Network. In this paper, the performance of MIMO in a scattered environment is analyzed and water filling algorithm is used to maximize the capacity of MIMO channels. We also propose an optimum beamforming algorithm to design beamforming vectors such that, interference caused by the primary transmitter to the cognitive receiver and the interference caused by the cognitive transmitter to the primary receiver is completely nullified while maximizing the rate of both primary and secondary links. The proposed technique does not require any changes in the existing environment between the primary and secondary user. The secondary user will be allowed to transmit concurrently to the primary user. Since the primary user is a licensed one it need not to have any knowledge about the resources utilized and performance of the secondary user and it transmits independently. Further it is also proved that the rate of Cognitive Multiple Input Multiple Output (MIMO) link implemented by the proposed beamforming algorithms is equal to interference free Multiple Input Single Output (MISO) link.
在下一代无线网络中,整个网络在无线模式下运行在不同的无线电频率上进行通信。认知网络是一种新兴的新型网络技术,它可以同时利用无线电频谱和无线站。根据从过去的经验中收集到的这种资源的可用性的知识,可以有效地利用这些资源。信号是认知网络中的主要问题。认知网络中的信号传输采用多输入多输出(MIMO)技术。本文分析了MIMO在分散环境下的性能,采用充水算法使MIMO信道容量最大化。我们还提出了一种最佳波束形成算法来设计波束形成矢量,使得主发射机对认知接收机的干扰和认知发射机对主接收机的干扰完全无效,同时最大限度地提高主链路和副链路的速率。所建议的技术不需要对主用户和辅助用户之间的现有环境进行任何更改。允许从用户并发传输到主用户。由于主用户是一个授权用户,因此它不需要了解从用户所使用的资源和性能,并且它独立传输。进一步证明了该波束形成算法实现的认知多输入多输出(MIMO)链路速率等于无干扰多输入单输出(MISO)链路速率。
{"title":"Enhancing the performance in cognitive network","authors":"J. Bino, A. Macriga","doi":"10.1109/ICGHPC.2013.6533934","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533934","url":null,"abstract":"In the next generation of wireless networks, the entire network operating on different radio frequencies under wireless mode will be available for communication. Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple Output (MIMO) technique is used for the transmission of signals in Cognitive Network. In this paper, the performance of MIMO in a scattered environment is analyzed and water filling algorithm is used to maximize the capacity of MIMO channels. We also propose an optimum beamforming algorithm to design beamforming vectors such that, interference caused by the primary transmitter to the cognitive receiver and the interference caused by the cognitive transmitter to the primary receiver is completely nullified while maximizing the rate of both primary and secondary links. The proposed technique does not require any changes in the existing environment between the primary and secondary user. The secondary user will be allowed to transmit concurrently to the primary user. Since the primary user is a licensed one it need not to have any knowledge about the resources utilized and performance of the secondary user and it transmits independently. Further it is also proved that the rate of Cognitive Multiple Input Multiple Output (MIMO) link implemented by the proposed beamforming algorithms is equal to interference free Multiple Input Single Output (MISO) link.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient code converters using reversible logic gates 使用可逆逻辑门的节能代码转换器
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533921
Mr M Saravanan, K Suresh Manic
In this technological world development in the field of nanometer technology leads to minimize the power consumption of logic circuits. Reversible logic design has been one of the promising technologies gaining greater interest due to less dissipation of heat and low power consumption. In digital systems code conversion is a widely used process for reasons such as enhancing security of data, reducing the complexity of arithmetic operations and thereby reducing the hardware required, dropping the level of switching activity leading to more speed of operation and power saving etc. This paper proposes novel Reversible logic design for code conversion such as Binary to Gray code, Gray to Binary code, BCD to Excess 3 code, Excess 3 to BCD code.
在这个技术世界中,纳米技术领域的发展导致了逻辑电路功耗的最小化。可逆逻辑设计由于其散热小、功耗低,已成为一种很有前途的技术。在数字系统中,代码转换是一种广泛使用的过程,因为它可以提高数据的安全性,降低算术运算的复杂性,从而减少所需的硬件,降低切换活动的水平,从而提高操作速度和节省电力等。针对二进制码到格雷码、格雷码到二进制码、BCD码到超3码、超3码到BCD码的转换,提出了一种新的可逆逻辑设计。
{"title":"Energy efficient code converters using reversible logic gates","authors":"Mr M Saravanan, K Suresh Manic","doi":"10.1109/ICGHPC.2013.6533921","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533921","url":null,"abstract":"In this technological world development in the field of nanometer technology leads to minimize the power consumption of logic circuits. Reversible logic design has been one of the promising technologies gaining greater interest due to less dissipation of heat and low power consumption. In digital systems code conversion is a widely used process for reasons such as enhancing security of data, reducing the complexity of arithmetic operations and thereby reducing the hardware required, dropping the level of switching activity leading to more speed of operation and power saving etc. This paper proposes novel Reversible logic design for code conversion such as Binary to Gray code, Gray to Binary code, BCD to Excess 3 code, Excess 3 to BCD code.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Development of high performance wireless sensor node for acoustic applications 用于声学应用的高性能无线传感器节点的开发
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533933
A. Prabahar
This paper describes a design of wireless sensor network node (WSN node) for the purpose of voice based applications. For implementing voice based WSN, wireless sensor nodes should be capable of capturing voice, processing it and transmitting it over RF (Radio Frequency) channel. Common WSN applications handle few bytes of data over wireless network. Acoustic WSN applications deal with high data rate voice. Acoustic WSN applications require high performance WSN nodes to accomplish capturing and processing voice. This paper explains how to make high performance WSN nodes by incorporating Digital Signal Processing (DSP) chip with the WSN node and how to implement suitable speech processing algorithm on it. The bottle neck arisen due to usage of DSP chip on WSN node is high power consumption. The techniques which are adopted to reduce the power consumption of DSP chip are described in this paper. The design of hardware is based on ultra low power DSP chip to improve the battery operating time of the WSN node.
本文介绍了一种基于语音应用的无线传感器网络节点(WSN节点)的设计。为了实现基于语音的WSN,无线传感器节点应该能够捕获语音,对其进行处理并通过RF(射频)信道传输。普通的WSN应用程序通过无线网络处理几个字节的数据。声学无线传感器网络应用处理高数据速率语音。声学WSN应用需要高性能的WSN节点来完成语音的捕获和处理。本文阐述了如何将数字信号处理(DSP)芯片集成到无线传感器网络节点中来制作高性能的无线传感器网络节点,以及如何在其上实现合适的语音处理算法。在无线传感器网络节点上使用DSP芯片所带来的瓶颈是高功耗。本文介绍了降低DSP芯片功耗所采用的技术。硬件设计基于超低功耗DSP芯片,以提高无线传感器网络节点的电池工作时间。
{"title":"Development of high performance wireless sensor node for acoustic applications","authors":"A. Prabahar","doi":"10.1109/ICGHPC.2013.6533933","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533933","url":null,"abstract":"This paper describes a design of wireless sensor network node (WSN node) for the purpose of voice based applications. For implementing voice based WSN, wireless sensor nodes should be capable of capturing voice, processing it and transmitting it over RF (Radio Frequency) channel. Common WSN applications handle few bytes of data over wireless network. Acoustic WSN applications deal with high data rate voice. Acoustic WSN applications require high performance WSN nodes to accomplish capturing and processing voice. This paper explains how to make high performance WSN nodes by incorporating Digital Signal Processing (DSP) chip with the WSN node and how to implement suitable speech processing algorithm on it. The bottle neck arisen due to usage of DSP chip on WSN node is high power consumption. The techniques which are adopted to reduce the power consumption of DSP chip are described in this paper. The design of hardware is based on ultra low power DSP chip to improve the battery operating time of the WSN node.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data confidentiality and integrity verification using user authenticator scheme in cloud 云环境下基于用户身份验证方案的数据保密性和完整性验证
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533902
V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi
Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.
云计算是一种利用互联网技术以按使用付费的模式向客户提供基础设施的技术。由于该模型描述了电费账单,因此通常称为效用计算。它根据客户的需要为客户提供各种服务。资源的需求可以根据需求增加或减少。IT部门开始使用云服务模式。随着云的使用日益增加,对云的关注也越来越多。每天都有许多影响云增长的数据泄露事件发生。采用云计算的主要关注点是其安全性。公司拥有的大量数据每天都在增加,这加大了数据隐私和安全的复杂性。我们谈论的数据可以分为停滞的数据,即Amazon的简单存储服务(S3)提供的简单存储,也可以是经常变化的动态数据。保护停滞数据的可用解决方案是在数据存储到服务器之前对其进行加密。为了解决动态数据的问题,人们提出了对加密数据进行处理的技术。本文对影响云环境的不同安全问题以及在完整性领域开展的相关工作进行了调查。该技术将加密机制与数据完整性校验机制相结合。数据是双重包装的,以确保在服务器端不会发生数据泄漏。数据还可以通过适当的访问机制与用户共享。
{"title":"Data confidentiality and integrity verification using user authenticator scheme in cloud","authors":"V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi","doi":"10.1109/ICGHPC.2013.6533902","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533902","url":null,"abstract":"Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N UOSPR:使用B.A.T.M.A.N实现快速安全传输的不可观察安全主动路由协议
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533931
S. Balaji, M. Prabha
USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.
USOR通过组合组签名和基于id的加密进行路由发现,处理了不可链接性、不可观察性和匿名性的概念。在传输中,除了安全性之外,还有一个要求是数据的有效和高效的传递。USOR使用普通的距离计算来获得关于邻居节点的知识。同时,我们不能将整个网络的信息整合到单个节点或每个节点中。我们知道,自组织网络中的节点存储和电池电量有限。已经有一半的电力用于安全,剩余的电力必须用于计算路线和数据传输。为此,我们将上述USOR与更好的移动自组织网络方法(Better Approach To Mobile Ad-hoc Networking,简称b.a.t.m.a.n)合并在一起。b.a.t.m.a.n是一种路由协议,它只知道最佳路由——没有一个节点拥有所有数据。这种技术避免了将有关网络更改的信息扩展到网络中的每个节点。每个节点只维护最佳跳的详细信息,而不是整个网络拓扑。由此,我们以最小的节点故障率以安全的方式实现了数据的快速传输。
{"title":"UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N","authors":"S. Balaji, M. Prabha","doi":"10.1109/ICGHPC.2013.6533931","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533931","url":null,"abstract":"USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"59 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2013 International Conference on Green High Performance Computing (ICGHPC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1