首页 > 最新文献

Historical research in the context of data science: Information resources, analytical methods and digital technologies最新文献

英文 中文
CRYPTOGRAPHIC AUTHENTICATION PROTOCOL ZERO-KNOWLEDGE SECRET ON ELLIPTIC CURVES USING PUBLIC KEYS AND RANDOM MESSAGES 椭圆曲线上使用公钥和随机消息的零知识密码认证协议
A. Onatskiy
We propose a cryptographic protocol with zero-knowledge proof (ZKP) on elliptic curves (EC) using public keys and random messages, allowing to establish the truth of a statement not conveying any additional information about the statement itself. The cryptographic protocols based on zero-knowledge proof allow identification, key exchange and other cryptographic operations to be performed without leakage of sensitive information during the information exchange. The implementation of the cryptographic protocol of the zero-knowledge proof on the basis of the mathematical apparatus of elliptic curves allows to significantly reduce the size of the protocol parameters and increase its cryptographic strength (computational complexity of the breaking). The security of cryptosystems involving elliptic curves is based on the difficulty of solving the elliptic curve discrete logarithm problem. We determine the completeness and correctness of the protocol and give an example of the calculation is given. The cryptographic protocol was modeled in the High-Level Protocol Specification Language, the model validation and verification of the protocol were also performed. The software verification of the cryptographic protocol was performed using the software modules On the Fly Model Checker and Constraint Logic based Attack Searcher. In order to validate the cryptographic protocol resistance to intruder attacks, we used the Security Protocol Animator package for Automated Validation of Internet Security Protocols and Applications. The security of the proposed cryptographic protocol ZKP EC is based on the difficulty of solving the elliptic curve discrete logarithm problem). The recommended elliptical curves according to DSTU 4145-2002 may be used to implement such cryptographic protocol.
我们提出了一种使用公钥和随机消息在椭圆曲线(EC)上具有零知识证明(ZKP)的加密协议,允许在不传递任何关于陈述本身的额外信息的情况下建立陈述的真实性。基于零知识证明的密码协议允许在信息交换过程中不泄露敏感信息的情况下进行身份识别、密钥交换等密码操作。基于椭圆曲线的数学装置实现零知识证明的密码协议,可以显著减小协议参数的大小,提高其密码强度(破解的计算复杂度)。椭圆曲线离散对数问题求解的难易程度决定了椭圆曲线密码系统的安全性。我们确定了协议的完备性和正确性,并给出了计算实例。采用高级协议规范语言对加密协议进行了建模,并对协议进行了模型验证和验证。利用On The Fly模型检查器和基于约束逻辑的攻击搜索器软件模块对加密协议进行了软件验证。为了验证加密协议对入侵者攻击的抵抗力,我们使用了安全协议动画器包来自动验证互联网安全协议和应用程序。所提出的加密协议ZKP - EC的安全性基于求解椭圆曲线离散对数问题的难易程度。根据DSTU 4145-2002推荐的椭圆曲线可以用来实现这种加密协议。
{"title":"CRYPTOGRAPHIC AUTHENTICATION PROTOCOL ZERO-KNOWLEDGE SECRET ON ELLIPTIC CURVES USING PUBLIC KEYS AND RANDOM MESSAGES","authors":"A. Onatskiy","doi":"10.33243/2313-7010-26-22-28","DOIUrl":"https://doi.org/10.33243/2313-7010-26-22-28","url":null,"abstract":"We propose a cryptographic protocol with zero-knowledge proof (ZKP) on elliptic curves (EC) using public keys and random messages, allowing to establish the truth of a statement not conveying any additional information about the statement itself. The cryptographic protocols based on zero-knowledge proof allow identification, key exchange and other cryptographic operations to be performed without leakage of sensitive information during the information exchange. The implementation of the cryptographic protocol of the zero-knowledge proof on the basis of the mathematical apparatus of elliptic curves allows to significantly reduce the size of the protocol parameters and increase its cryptographic strength (computational complexity of the breaking). The security of cryptosystems involving elliptic curves is based on the difficulty of solving the elliptic curve discrete logarithm problem. We determine the completeness and correctness of the protocol and give an example of the calculation is given. The cryptographic protocol was modeled in the High-Level Protocol Specification Language, the model validation and verification of the protocol were also performed. The software verification of the cryptographic protocol was performed using the software modules On the Fly Model Checker and Constraint Logic based Attack Searcher. In order to validate the cryptographic protocol resistance to intruder attacks, we used the Security Protocol Animator package for Automated Validation of Internet Security Protocols and Applications. The security of the proposed cryptographic protocol ZKP EC is based on the difficulty of solving the elliptic curve discrete logarithm problem). The recommended elliptical curves according to DSTU 4145-2002 may be used to implement such cryptographic protocol.","PeriodicalId":13026,"journal":{"name":"Historical research in the context of data science: Information resources, analytical methods and digital technologies","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88453106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE DYNAMICS OF THE INTERFERENCE SITUATION IN THE DOWNLINK DIRECTION OF THE MOBILE COMMUNICATION NETWORK WITH CDMA TECHNOLOGY 采用cdma技术的移动通信网络下行方向干扰情况的动态分析
E. Sukachev
The work is devoted to the investigation of inter-cell interference in the radio access network, provided that subscribers are moving in cells along the route indicated earlier. Very often, the trajectory of the movement of mobile stations coincides with the grid of city streets, where subscribers are moving in public transport. For a network where the cluster dimension is K = 1, the proposed methodology for studying changes in the level of intra-system interference at the input of the receiver of a mobile station when a subscriber is moving along the given path. The features of the situation where the control mode of the transmitter power of the base station is used in each cell, which provides a constant power level of the input signal when the subscriber is moving within the cell, are analyzed. The level of inter-cell interference is estimated as one of the factors on which the quality of services depends, namely, the signal-to-interference ratio at the input of the receiver of the mobile station. For specific trajectories of the movement of subscribers in neighboring cells, a law of changing the transmitter power of the base station was found, which interferes with the receiver of the mobile station in the neighboring cell. Estimated ratios are obtained for determining the level of interference when subscribers in neighboring cells are moving along parallel streets. This assessment of the dependence of the signal / interference ratio at the input of the subscriber's receiver on the speed and direction of its movement. This dependence shows that serious problems with the quality of service provided by the operator will not arise. Such an investigation allows modeling the cellular network in order to optimize the work on improving the services provided to mobile subscribers.
这项工作致力于研究无线接入网中的小区间干扰,前提是用户沿着前面指出的路线在小区内移动。通常情况下,移动基站的移动轨迹与城市街道的网格相吻合,用户乘坐公共交通工具在城市街道上移动。对于聚类维数为K = 1的网络,所提出的方法用于研究当用户沿着给定路径移动时移动台接收器输入处系统内干扰水平的变化。分析了用户在小区内移动时,各小区采用基站发射机功率控制方式提供恒定功率水平的输入信号的情况特点。小区间干扰的水平被估计为服务质量所依赖的因素之一,即移动台接收机输入端的信号干扰比。对于相邻小区用户的特定运动轨迹,发现了基站发射功率的变化规律,这种变化规律会对相邻小区移动台的接收机产生干扰。当相邻小区的用户沿平行街道移动时,获得了用于确定干扰水平的估计比率。对用户接收机输入信号/干扰比对其移动速度和方向的依赖性的评估。这种依赖性表明,运营商提供的服务质量不会出现严重问题。这样的调查允许对蜂窝网络进行建模,以便优化改进提供给移动用户的服务的工作。
{"title":"THE DYNAMICS OF THE INTERFERENCE SITUATION IN THE DOWNLINK DIRECTION OF THE MOBILE COMMUNICATION NETWORK WITH CDMA TECHNOLOGY","authors":"E. Sukachev","doi":"10.33243/2313-7010-26-61-68","DOIUrl":"https://doi.org/10.33243/2313-7010-26-61-68","url":null,"abstract":"The work is devoted to the investigation of inter-cell interference in the radio access network, provided that subscribers are moving in cells along the route indicated earlier. Very often, the trajectory of the movement of mobile stations coincides with the grid of city streets, where subscribers are moving in public transport. For a network where the cluster dimension is K = 1, the proposed methodology for studying changes in the level of intra-system interference at the input of the receiver of a mobile station when a subscriber is moving along the given path. The features of the situation where the control mode of the transmitter power of the base station is used in each cell, which provides a constant power level of the input signal when the subscriber is moving within the cell, are analyzed. The level of inter-cell interference is estimated as one of the factors on which the quality of services depends, namely, the signal-to-interference ratio at the input of the receiver of the mobile station. For specific trajectories of the movement of subscribers in neighboring cells, a law of changing the transmitter power of the base station was found, which interferes with the receiver of the mobile station in the neighboring cell. Estimated ratios are obtained for determining the level of interference when subscribers in neighboring cells are moving along parallel streets. This assessment of the dependence of the signal / interference ratio at the input of the subscriber's receiver on the speed and direction of its movement. This dependence shows that serious problems with the quality of service provided by the operator will not arise. Such an investigation allows modeling the cellular network in order to optimize the work on improving the services provided to mobile subscribers.","PeriodicalId":13026,"journal":{"name":"Historical research in the context of data science: Information resources, analytical methods and digital technologies","volume":"758 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78806967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FRACTAL GRAPHICS FOR VIRTUAL ENVIRONMENT GENERATION 分形图形的虚拟环境生成
I. Tregubova
Progress in hardware and software development is impressively fast. The main reason of computer graphics fast improvement is a full experience that can be reached though visual representation of our world. Therefore, the most interesting problem of it is a realistic image with high quality and resolution, which often requires procedural graphics generation. The article analyzes simplicity of a fractal and mathematics abstraction. Mathematics describes not only accuracy and logic but also beauty of the Universe. Mountains, clouds, trees, cells do not fit into the world of Euclidean geometry. They cannot be described by its methods. But fractals and fractal geometry solve that problem. Fractals are fairly simple equations on a sheet of paper with bright, unusual images, and, above all, they explain things. Fractal is a figure in the space, which consists of statistical character as the whole. It is self-similar, and therefore looks ‘roughly’ same and does not depend on its scale. So, any complex object can be called a fractal, if it has the same shape, as the parts it consists of. Fractal is abstract, and it helps to translate any algebraic problem into geometric, where solution is always obvious. A lot of researches in the field of fractal graphics has been carried out, but there are still issues that deserve considerable attention and more perfect solutions. The main purpose of the work is codes development with object-oriented programming languages for fractal graphics rendering. The article analyzes simplicity of a fractal and mathematics abstraction. Procedural generation was described as a method of algorithmic data generation for 3D models and textures creation. Code was written with general-purpose programming language Python, which renders step by step creation of fractal composition and variations of fractal images. Fractal generation used for modeling is part of realism in computer graphics In summary, procedural generation is very important for video games, as it can be used to automatically create large amount of game content. The random generation of natural looking landscapes is based on geometric computer generated images Created compositions can be used in computer science for image compression, in medicine for the study of the cellular level of organs, etc.
硬件和软件开发的进展令人印象深刻。计算机图形学快速发展的主要原因是通过视觉表现我们的世界可以达到完整的体验。因此,它最有趣的问题是高质量和高分辨率的逼真图像,这往往需要程序化的图形生成。本文分析了分形的简单性和数学抽象。数学不仅描述了精确性和逻辑性,还描述了宇宙之美。山、云、树、细胞都不适合欧几里得几何的世界。它们不能用它的方法来描述。但是分形和分形几何解决了这个问题。分形是相当简单的方程式,写在一张纸上,上面有明亮、不寻常的图像,最重要的是,它们解释了事情。分形是空间中的一种图形,它是由统计特征整体构成的。它是自相似的,因此看起来“大致”相同,不依赖于它的规模。所以,任何复杂的物体都可以被称为分形,如果它和它的组成部分具有相同的形状。分形是抽象的,它有助于将任何代数问题转化为几何问题,其解决方案总是显而易见的。在分形图领域已经进行了大量的研究,但仍存在值得重视和完善的问题。本工作的主要目的是用面向对象的编程语言进行分形图形绘制的代码开发。本文分析了分形的简单性和数学抽象。程序生成被描述为一种用于3D模型和纹理创建的算法数据生成方法。代码采用通用编程语言Python编写,实现分形构图的逐步生成和分形图像的变化。总之,程序生成对于电子游戏来说非常重要,因为它可以用来自动创建大量的游戏内容。自然景观的随机生成是基于几何计算机生成的图像,创建的组合可以用于计算机科学中的图像压缩,在医学中用于器官细胞水平的研究等。
{"title":"FRACTAL GRAPHICS FOR VIRTUAL ENVIRONMENT GENERATION","authors":"I. Tregubova","doi":"10.33243/2313-7010-26-29-35","DOIUrl":"https://doi.org/10.33243/2313-7010-26-29-35","url":null,"abstract":"Progress in hardware and software development is impressively fast. The main reason of computer graphics fast improvement is a full experience that can be reached though visual representation of our world. Therefore, the most interesting problem of it is a realistic image with high quality and resolution, which often requires procedural graphics generation. The article analyzes simplicity of a fractal and mathematics abstraction. Mathematics describes not only accuracy and logic but also beauty of the Universe. Mountains, clouds, trees, cells do not fit into the world of Euclidean geometry. They cannot be described by its methods. But fractals and fractal geometry solve that problem. Fractals are fairly simple equations on a sheet of paper with bright, unusual images, and, above all, they explain things. Fractal is a figure in the space, which consists of statistical character as the whole. It is self-similar, and therefore looks ‘roughly’ same and does not depend on its scale. So, any complex object can be called a fractal, if it has the same shape, as the parts it consists of. Fractal is abstract, and it helps to translate any algebraic problem into geometric, where solution is always obvious. A lot of researches in the field of fractal graphics has been carried out, but there are still issues that deserve considerable attention and more perfect solutions. The main purpose of the work is codes development with object-oriented programming languages for fractal graphics rendering. The article analyzes simplicity of a fractal and mathematics abstraction. Procedural generation was described as a method of algorithmic data generation for 3D models and textures creation. Code was written with general-purpose programming language Python, which renders step by step creation of fractal composition and variations of fractal images. Fractal generation used for modeling is part of realism in computer graphics In summary, procedural generation is very important for video games, as it can be used to automatically create large amount of game content. The random generation of natural looking landscapes is based on geometric computer generated images Created compositions can be used in computer science for image compression, in medicine for the study of the cellular level of organs, etc.","PeriodicalId":13026,"journal":{"name":"Historical research in the context of data science: Information resources, analytical methods and digital technologies","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77706568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FEATURES OF DIAGNOSTIC ARTIFICIAL NEURAL NETWORKS FOR HYBRID EXPERT SYSTEMS 混合专家系统诊断人工神经网络的特点
S. Konovalov
In the proposed article, various methods of constructing an artificial neural network as one of the components of a hybrid expert system for diagnosis were investigated. A review of foreign literature in recent years was conducted, where hybrid expert systems were considered as an integral part of complex technical systems in the field of security. The advantages and disadvantages of artificial neural networks are listed, and the main problems in creating hybrid expert systems for diagnostics are indicated, proving the relevance of further development of artificial neural networks for hybrid expert systems. The approaches to the analysis of natural language sentences, which are used for the work of hybrid expert systems with artificial neural networks, are considered. A bulletin board is shown, its structure and principle of operation are described. The structure of the bulletin board is divided into levels and sublevels. At sublevels, a confidence factor is applied. The dependence of the values of the confidence factor on the fulfillment of a particular condition is shown. The links between the levels and sublevels of the bulletin board are also described. As an artificial neural network architecture, the «key-threshold» model is used, the rule of neuron operation is shown. In addition, an artificial neural network has the property of training, based on the application of the penalty property, which is able to calculate depending on the accident situation. The behavior of a complex technical system, as well as its faulty states, are modeled using a model that describes the structure and behavior of a given system. To optimize the data of a complex technical system, an evolutionary algorithm is used to minimize the objective function. Solutions to the optimization problem consist of Pareto solution vectors. Optimization and training tasks are solved by using the Hopfield network. In general, a hybrid expert system is described using semantic networks, which consist of vertices and edges. The reference model of a complex technical system is stored in the knowledge base and updated during the acquisition of new knowledge. In an emergency, or about its premise, with the help of neural networks, a search is made for the cause and the control action necessary to eliminate the accident. The considered approaches, interacting with each other, can improve the operation of diagnostic artificial neural networks in the case of emergency management, showing more accurate data in a short time. In addition, the use of such a network for analyzing the state of health, as well as forecasting based on diagnostic data using the example of a complex technical system, is presented.
在本文中,研究了构建人工神经网络作为混合诊断专家系统组成部分的各种方法。本文综述了近年来国外有关混合专家系统的研究进展,认为混合专家系统是安全领域复杂技术系统的重要组成部分。列举了人工神经网络的优点和缺点,指出了建立用于诊断的混合专家系统的主要问题,证明了人工神经网络在混合专家系统中的进一步发展的相关性。研究了用于人工神经网络混合专家系统的自然语言句子分析方法。介绍了电子公告板的结构和工作原理。布告栏的结构分为层和子层。在子级别上,应用置信度因子。给出了置信因子值对满足特定条件的依赖关系。还描述了公告板的级别和子级别之间的链接。作为一种人工神经网络结构,采用了“键-阈值”模型,揭示了神经元的运行规律。此外,人工神经网络具有训练性质,基于处罚性质的应用,能够根据事故情况进行计算。一个复杂技术系统的行为,以及它的故障状态,是用一个描述给定系统的结构和行为的模型来建模的。为了对复杂技术系统的数据进行优化,采用进化算法使目标函数最小化。优化问题的解由帕累托解向量组成。利用Hopfield网络解决了优化和训练任务。通常,混合专家系统是用由顶点和边组成的语义网络来描述的。复杂技术系统的参考模型存储在知识库中,并在获取新知识的过程中不断更新。在紧急情况下,或在其前提下,借助神经网络,搜索原因和必要的控制行动,以消除事故。所考虑的方法相互作用,可以改善诊断人工神经网络在应急管理情况下的运行,在短时间内显示更准确的数据。此外,还以一个复杂的技术系统为例,介绍了利用这种网络分析健康状况以及根据诊断数据进行预测。
{"title":"FEATURES OF DIAGNOSTIC ARTIFICIAL NEURAL NETWORKS FOR HYBRID EXPERT SYSTEMS","authors":"S. Konovalov","doi":"10.33243/2313-7010-26-36-46","DOIUrl":"https://doi.org/10.33243/2313-7010-26-36-46","url":null,"abstract":"In the proposed article, various methods of constructing an artificial neural network as one of the components of a hybrid expert system for diagnosis were investigated. A review of foreign literature in recent years was conducted, where hybrid expert systems were considered as an integral part of complex technical systems in the field of security. The advantages and disadvantages of artificial neural networks are listed, and the main problems in creating hybrid expert systems for diagnostics are indicated, proving the relevance of further development of artificial neural networks for hybrid expert systems. The approaches to the analysis of natural language sentences, which are used for the work of hybrid expert systems with artificial neural networks, are considered. A bulletin board is shown, its structure and principle of operation are described. The structure of the bulletin board is divided into levels and sublevels. At sublevels, a confidence factor is applied. The dependence of the values of the confidence factor on the fulfillment of a particular condition is shown. The links between the levels and sublevels of the bulletin board are also described. As an artificial neural network architecture, the «key-threshold» model is used, the rule of neuron operation is shown. In addition, an artificial neural network has the property of training, based on the application of the penalty property, which is able to calculate depending on the accident situation. The behavior of a complex technical system, as well as its faulty states, are modeled using a model that describes the structure and behavior of a given system. To optimize the data of a complex technical system, an evolutionary algorithm is used to minimize the objective function. Solutions to the optimization problem consist of Pareto solution vectors. Optimization and training tasks are solved by using the Hopfield network. In general, a hybrid expert system is described using semantic networks, which consist of vertices and edges. The reference model of a complex technical system is stored in the knowledge base and updated during the acquisition of new knowledge. In an emergency, or about its premise, with the help of neural networks, a search is made for the cause and the control action necessary to eliminate the accident. The considered approaches, interacting with each other, can improve the operation of diagnostic artificial neural networks in the case of emergency management, showing more accurate data in a short time. In addition, the use of such a network for analyzing the state of health, as well as forecasting based on diagnostic data using the example of a complex technical system, is presented.","PeriodicalId":13026,"journal":{"name":"Historical research in the context of data science: Information resources, analytical methods and digital technologies","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82954842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Historical research in the context of data science: Information resources, analytical methods and digital technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1