首页 > 最新文献

i-manager's Journal on Computer Science最新文献

英文 中文
TWITTER SENTIMENT ANALYSIS 推特情绪分析
Pub Date : 2023-06-19 DOI: 10.26634/jcom.8.4.18269
Vedurumudi Priyanka, June
In this report, address the problem of sentiment classi�cation on twitter dataset. used a number of machine learning and deep learning methods to perform sentiment analysis. In the end, used a majority vote ensemble method with 5 of our best models to achieve the classi�cation accuracy of 83.58% on kaggle public leaderboard.
在本报告中,解决了twitter数据集上的情感分类问题。使用多种机器学习和深度学习方法进行情感分析。最后,利用我们的5个最佳模型的多数投票集成方法,在kaggle公共排行榜上实现了83.58%的分类准确率。
{"title":"TWITTER SENTIMENT ANALYSIS","authors":"Vedurumudi Priyanka, June","doi":"10.26634/jcom.8.4.18269","DOIUrl":"https://doi.org/10.26634/jcom.8.4.18269","url":null,"abstract":"In this report, address the problem of sentiment classi�cation on twitter dataset. used a number of machine learning and deep learning methods to perform sentiment analysis. In the end, used a majority vote ensemble method with 5 of our best models to achieve the classi�cation accuracy of 83.58% on kaggle public leaderboard.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVM-Based Stock Market Price Prediction Methods: An Advanced Review 基于支持向量机的股票市场价格预测方法综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.3.19183
Kumar Vishwakarma Vijay, P. Narayan
This paper offers a concise analysis of the strategies currently in use for stock price prediction by retail investors. The price may increase or decrease according to the quarterly results, financial news flow, technical behavior, or market sentiment resulting from recent developments worldwide. This paper discussed the accuracy of many proposed approaches and methodologies for predicting stock price movement. The Support Vector Machine (SVM) is the foundation of the approaches, with additional parameters and variables.
本文简要分析了目前散户投资者用于股票价格预测的策略。价格可能会根据季度业绩、金融新闻流、技术行为或全球近期发展导致的市场情绪而上涨或下跌。本文讨论了许多提出的预测股票价格变动的方法和方法的准确性。支持向量机(SVM)是这些方法的基础,具有额外的参数和变量。
{"title":"SVM-Based Stock Market Price Prediction Methods: An Advanced Review","authors":"Kumar Vishwakarma Vijay, P. Narayan","doi":"10.26634/jcom.10.3.19183","DOIUrl":"https://doi.org/10.26634/jcom.10.3.19183","url":null,"abstract":"This paper offers a concise analysis of the strategies currently in use for stock price prediction by retail investors. The price may increase or decrease according to the quarterly results, financial news flow, technical behavior, or market sentiment resulting from recent developments worldwide. This paper discussed the accuracy of many proposed approaches and methodologies for predicting stock price movement. The Support Vector Machine (SVM) is the foundation of the approaches, with additional parameters and variables.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122662615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techniques for Detecting Video Shot Boundaries: A Review 视频镜头边界检测技术综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.3.19111
S. Sharma, P. Malakar
Due to the Corona Virus Diseases (COVID-19) pandemic, education is completely dependent on digital platforms, so recent advances in technology have made a tremendous amount of video content available. Due to the huge amount of video content, content-based information retrieval has become more and more important. Video content retrieval, just like information retrieval, requires some pre-processing such as indexing, key frame selection, and, most importantly, accurate detection of video shots. This gives the way for video information to be stored in a manner that will allow easy access. Video processing plays a vital role in many large applications. The applications required to perform the various manipulations on video streams (as on frames or say shots). The high definition of video can take a lot of memory to store, so compression techniques are huge in demand. Also, object tracking or object identification is an area where much considerable research has taken place and it is in progress.
由于冠状病毒病(COVID-19)大流行,教育完全依赖于数字平台,因此最近的技术进步使大量视频内容成为可能。由于视频内容的庞大,基于内容的信息检索变得越来越重要。视频内容检索和信息检索一样,需要进行索引、关键帧选择等预处理,最重要的是对视频镜头进行准确检测。这为视频信息的存储提供了一种方便访问的方式。视频处理在许多大型应用中起着至关重要的作用。在视频流(如帧或镜头)上执行各种操作所需的应用程序。高清晰度的视频需要大量的内存来存储,因此对压缩技术的需求很大。此外,目标跟踪或目标识别是一个已经进行并正在进行大量研究的领域。
{"title":"Techniques for Detecting Video Shot Boundaries: A Review","authors":"S. Sharma, P. Malakar","doi":"10.26634/jcom.10.3.19111","DOIUrl":"https://doi.org/10.26634/jcom.10.3.19111","url":null,"abstract":"Due to the Corona Virus Diseases (COVID-19) pandemic, education is completely dependent on digital platforms, so recent advances in technology have made a tremendous amount of video content available. Due to the huge amount of video content, content-based information retrieval has become more and more important. Video content retrieval, just like information retrieval, requires some pre-processing such as indexing, key frame selection, and, most importantly, accurate detection of video shots. This gives the way for video information to be stored in a manner that will allow easy access. Video processing plays a vital role in many large applications. The applications required to perform the various manipulations on video streams (as on frames or say shots). The high definition of video can take a lot of memory to store, so compression techniques are huge in demand. Also, object tracking or object identification is an area where much considerable research has taken place and it is in progress.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SWITCHING AMONG DIFFERENT CLUSTERSIZES USING 'C' LANGUAGE 使用' c '语言在不同的集群大小之间切换
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.2.14594
P. Rajesh
{"title":"SWITCHING AMONG DIFFERENT CLUSTER\u0000SIZES USING 'C' LANGUAGE","authors":"P. Rajesh","doi":"10.26634/jcom.9.2.14594","DOIUrl":"https://doi.org/10.26634/jcom.9.2.14594","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRID CRYPTOSYSTEM USING HOMOMORPHIC ENCRYPTION AND ELLIPTIC CURVE CRYPTOGRAPHY ALGORITHM 采用同态加密和椭圆曲线密码算法的混合密码系统
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.1.15667
S. Prabakeran, K. Hemanth, T. Arvind, N. Bharath
{"title":"HYBRID CRYPTOSYSTEM USING HOMOMORPHIC ENCRYPTION\u0000 AND ELLIPTIC CURVE CRYPTOGRAPHY ALGORITHM","authors":"S. Prabakeran, K. Hemanth, T. Arvind, N. Bharath","doi":"10.26634/jcom.7.1.15667","DOIUrl":"https://doi.org/10.26634/jcom.7.1.15667","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of things in low-power wide area network and short range network: A review 低功耗广域网和短距离网络中的物联网:综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.4.19273
Senthilkumar S. Poorana, B. Subramani
In the digital age, people may not be able to live without smart devices because they easily adopt them. IoT has made smart devices possible, which consist of sensors, connectivity, the cloud, and user interfaces. IoT research places sensors at the forefront of smart devices. IoT sensors are efficiently used in different IoT applications to develop smart environments in all fields. These sensors act like human sensing organs that collect real-time information from physical objects or the environment and convert it into electronic signals for processing in the IoT. Normally, two types of networks are applied in IoT: long-range low-power wide area networks and short-range networks. This review aims to assist researchers in understanding IoT applications and protocol classifications using short-range and long-range wireless technology that can communicate wirelessly within regions that facilitate IoT communication from a minimum distance of one millimeter to a few kilometers. This paper presents the types of sensors and various applications of IoT, as well as the energy requirements of different protocols and applications. Each network type has its own unique characteristics regarding energy consumption in the IoT network.
在数字时代,人们可能无法没有智能设备,因为他们很容易采用它们。物联网使智能设备成为可能,智能设备包括传感器、连接、云和用户界面。物联网研究将传感器置于智能设备的最前沿。物联网传感器被有效地用于不同的物联网应用中,以开发所有领域的智能环境。这些传感器就像人类的传感器官,从物理对象或环境中收集实时信息,并将其转换为电子信号,以便在物联网中进行处理。通常,物联网中应用的网络类型有两种:远程低功耗广域网和短程网络。本综述旨在帮助研究人员了解使用短距离和远程无线技术的物联网应用和协议分类,这些技术可以在促进物联网通信的区域内进行无线通信,最小距离为一毫米到几公里。本文介绍了物联网传感器的类型和各种应用,以及不同协议和应用的能量需求。在物联网网络的能耗方面,每种网络类型都有自己独特的特点。
{"title":"Internet of things in low-power wide area network and short range network: A review","authors":"Senthilkumar S. Poorana, B. Subramani","doi":"10.26634/jcom.10.4.19273","DOIUrl":"https://doi.org/10.26634/jcom.10.4.19273","url":null,"abstract":"In the digital age, people may not be able to live without smart devices because they easily adopt them. IoT has made smart devices possible, which consist of sensors, connectivity, the cloud, and user interfaces. IoT research places sensors at the forefront of smart devices. IoT sensors are efficiently used in different IoT applications to develop smart environments in all fields. These sensors act like human sensing organs that collect real-time information from physical objects or the environment and convert it into electronic signals for processing in the IoT. Normally, two types of networks are applied in IoT: long-range low-power wide area networks and short-range networks. This review aims to assist researchers in understanding IoT applications and protocol classifications using short-range and long-range wireless technology that can communicate wirelessly within regions that facilitate IoT communication from a minimum distance of one millimeter to a few kilometers. This paper presents the types of sensors and various applications of IoT, as well as the energy requirements of different protocols and applications. Each network type has its own unique characteristics regarding energy consumption in the IoT network.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114750821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ON THE USE OF EXTREME LEARNING MACHINES FOR DETECTING ANOMALIES IN STUDENTS' RESULTS 关于使用极限学习机来检测学生成绩中的异常情况
Pub Date : 1900-01-01 DOI: 10.26634/jcom.6.4.15724
O. Hamza, O. Mohammed
{"title":"ON THE USE OF EXTREME LEARNING MACHINES FOR\u0000 DETECTING ANOMALIES IN STUDENTS' RESULTS","authors":"O. Hamza, O. Mohammed","doi":"10.26634/jcom.6.4.15724","DOIUrl":"https://doi.org/10.26634/jcom.6.4.15724","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121947788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ANALYSIS OF HARDWARE CRYPTOGRAPHY FOR SECURING INSTANT MESSAGING APPLICATIONS 分析用于保护即时通讯应用程序的硬件加密技术
Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.4.18082
R. Hemalatha, K. Pooja, P. Gayathri, K. SelvaBhuvaneswari, Kancheepuram Tamil Nadu India. Ucek
{"title":"ANALYSIS OF HARDWARE CRYPTOGRAPHY FOR SECURING INSTANT MESSAGING APPLICATIONS","authors":"R. Hemalatha, K. Pooja, P. Gayathri, K. SelvaBhuvaneswari, Kancheepuram Tamil Nadu India. Ucek","doi":"10.26634/jcom.8.4.18082","DOIUrl":"https://doi.org/10.26634/jcom.8.4.18082","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133792350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Colorization of images using soft colour capsule networks 使用软色彩胶囊网络的图像着色
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.4.19313
Ch. Swapnapriya, G. Josemoses, K. V. Ramana
Perceiving and interpreting color phenomena is a complex process for the human brain. Obtaining the true color of an object requires different experimental, physical, and theoretical results. By examining image features, color, and other aspects, individuals can study techniques for applying full-color images. In this context, color chemistry has been used in crime investigations to detect the time of death. It can be challenging for police to physically examine decomposed dead bodies, especially if they have been unknown for days, weeks, or even months. This makes the task much harder for law enforcement officials. An innovative approach has been developed to assist the police in investigating cases more efficiently. This approach enables them to solve crimes from the convenience of their offices, thereby enhancing their productivity.
对人类大脑来说,感知和解释色彩现象是一个复杂的过程。获得物体的真实颜色需要不同的实验、物理和理论结果。通过检查图像特征、颜色和其他方面,个人可以学习应用全彩图像的技术。在这种情况下,颜色化学已被用于犯罪调查,以确定死亡时间。对警方来说,对腐烂的尸体进行物理检查可能是一项挑战,特别是如果他们已经失踪了几天、几周甚至几个月。这使得执法人员的任务更加困难。为协助警方更有效地调查案件,已制订了一项创新办法。这种方法使他们能够在办公室方便地破案,从而提高他们的工作效率。
{"title":"Colorization of images using soft colour capsule networks","authors":"Ch. Swapnapriya, G. Josemoses, K. V. Ramana","doi":"10.26634/jcom.10.4.19313","DOIUrl":"https://doi.org/10.26634/jcom.10.4.19313","url":null,"abstract":"Perceiving and interpreting color phenomena is a complex process for the human brain. Obtaining the true color of an object requires different experimental, physical, and theoretical results. By examining image features, color, and other aspects, individuals can study techniques for applying full-color images. In this context, color chemistry has been used in crime investigations to detect the time of death. It can be challenging for police to physically examine decomposed dead bodies, especially if they have been unknown for days, weeks, or even months. This makes the task much harder for law enforcement officials. An innovative approach has been developed to assist the police in investigating cases more efficiently. This approach enables them to solve crimes from the convenience of their offices, thereby enhancing their productivity.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toxic comment classifier on social media platform 社交媒体平台上的有毒评论分类器
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.4.19307
Savad N. Muhammad, K. H. Hasna
The objective of the paper is to mitigate internet negativity by identifying and blocking toxic comments related to a particular topic or product. The detrimental effects of social media abuse and harassment can cause people to refrain from expressing themselves. Although some platforms disable user comments altogether, this method is not efficient. The presence of toxicity in comments can assist platforms in taking appropriate measures. The paper aims to classify comments according to their toxicity levels for future blockage. The dataset comprises comments classified into six types, toxic, severe toxic, threat, obscene, identity hate, and insult. Multiple classification techniques will be employed to determine the most accurate one for the data. The authors will employ four types of classification and select the most precise one for each dataset. This methodology enables the authors to choose various datasets for the problem and select the most accurate classifier for each dataset.
本文的目的是通过识别和阻止与特定主题或产品相关的有毒评论来减轻互联网的消极性。社交媒体滥用和骚扰的有害影响可能导致人们不愿表达自己。虽然有些平台完全禁止用户评论,但这种方法效率不高。评论中存在的毒性可以帮助平台采取适当的措施。本文的目的是根据评论的毒性等级对其进行分类,以备将来堵塞。该数据集包括六种类型的评论,分别是有毒的、严重有毒的、威胁的、淫秽的、身份仇恨的和侮辱的。将采用多种分类技术来确定最准确的数据。作者将采用四种类型的分类,并为每个数据集选择最精确的分类。这种方法使作者能够为问题选择不同的数据集,并为每个数据集选择最准确的分类器。
{"title":"Toxic comment classifier on social media platform","authors":"Savad N. Muhammad, K. H. Hasna","doi":"10.26634/jcom.10.4.19307","DOIUrl":"https://doi.org/10.26634/jcom.10.4.19307","url":null,"abstract":"The objective of the paper is to mitigate internet negativity by identifying and blocking toxic comments related to a particular topic or product. The detrimental effects of social media abuse and harassment can cause people to refrain from expressing themselves. Although some platforms disable user comments altogether, this method is not efficient. The presence of toxicity in comments can assist platforms in taking appropriate measures. The paper aims to classify comments according to their toxicity levels for future blockage. The dataset comprises comments classified into six types, toxic, severe toxic, threat, obscene, identity hate, and insult. Multiple classification techniques will be employed to determine the most accurate one for the data. The authors will employ four types of classification and select the most precise one for each dataset. This methodology enables the authors to choose various datasets for the problem and select the most accurate classifier for each dataset.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
i-manager's Journal on Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1