首页 > 最新文献

i-manager's Journal on Computer Science最新文献

英文 中文
INDIAN SIGN LANGUAGE RECOGNITION SYSTEM USING OPENPOSE 使用openpose的印度手语识别系统
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.2.15993
M. Pooja, K. Chirag, V. Nikhil, R. T. Hardik
{"title":"INDIAN SIGN LANGUAGE RECOGNITION\u0000 SYSTEM USING OPENPOSE","authors":"M. Pooja, K. Chirag, V. Nikhil, R. T. Hardik","doi":"10.26634/jcom.7.2.15993","DOIUrl":"https://doi.org/10.26634/jcom.7.2.15993","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure authentication protocol for IoT applications based on blockchain technology 基于区块链技术的物联网应用安全认证协议
Pub Date : 1900-01-01 DOI: 10.26634/jcom.11.1.19380
Choubey Siddhartha, Choubey Abha, Bajpai Shiwanee, Kumar Bajpai Prageet
The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.
跨不同应用的物联网(IoT)基础设施缺乏安全性,引起了研究人员对物联网安全问题的关注。本文提出了区块链技术与物联网相结合的场景,以提供分散的安全机制。提出了针对物联网节点和对等体的安全认证和密钥协议技术,以确保在通信发生之前进行适当的授权。该协议使用公钥加密技术生成共享对称密钥,用于相互认证和双方对话。使用Scyther对该协议进行了测试,发现它足够健壮,可以抵御所有已知的与身份验证相关的攻击,包括重播和输入攻击。Hyperledger是一种区块链技术,用于为网络上物联网设备的可扩展性提供更高效的物联网基础设施。提出的技术为支持区块链的物联网环境中的设备身份验证提供了一个安全且可扩展的系统。
{"title":"Secure authentication protocol for IoT applications based on blockchain technology","authors":"Choubey Siddhartha, Choubey Abha, Bajpai Shiwanee, Kumar Bajpai Prageet","doi":"10.26634/jcom.11.1.19380","DOIUrl":"https://doi.org/10.26634/jcom.11.1.19380","url":null,"abstract":"The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A HYBRID NETWORK MODEL FOR EFFECTIVE HOUSE PRICE PREDICTION 一种有效预测房价的混合网络模型
Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.4.18150
P. Abarna, R. Archana, M. Kamali, K. Selvabhuvaneshwari
{"title":"A HYBRID NETWORK MODEL FOR EFFECTIVE HOUSE PRICE PREDICTION","authors":"P. Abarna, R. Archana, M. Kamali, K. Selvabhuvaneshwari","doi":"10.26634/jcom.8.4.18150","DOIUrl":"https://doi.org/10.26634/jcom.8.4.18150","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKETFILTERS 基于包过滤器的网络入侵检测系统
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.1.18174
S. Karthikeyan, M. Keerthivasan, A. Lalitha, R. Karan
{"title":"NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKET\u0000FILTERS","authors":"S. Karthikeyan, M. Keerthivasan, A. Lalitha, R. Karan","doi":"10.26634/jcom.9.1.18174","DOIUrl":"https://doi.org/10.26634/jcom.9.1.18174","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131339083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of machine learning techniques for depression in text messages: a survey 在短信中实现抑郁症的机器学习技术:一项调查
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.4.18549
Dewangan Divya, Selot Smita, Panicker Sreejit
Depression is a disease or problem associated with high levels of stress seen in humans. It is uncomfortable in talking to parents, psychologists, and healthcare professionals in general. So a virtual platform is much more suitable for sharing your emotions, for example, a chatbot that provides the user with a comfort zone, acting as a friend or well-wisher. Extracting and identifying emotions from text messages to detect depressive mood is a challenging task because it involves removing natural language ambiguities. Over the past decade, researchers have proposed various state-ofthe- art methods for detecting depressive moods in text. This paper aims to analyze such methods and present a comparison based on detection accuracy. The virtual platform provides an end-user interface for communication. The system understands the meaning and context of a sentence using Natural Language Processing (NLP), word embedding, and machine learning techniques. NLP does the preprocessing and extracts the mental health-related keywords. Word embedding converts the extracted keywords into embedding vectors that can be understood by Machine learning algorithms, it can also analyze and extract users' feelings by examining and calculating levels of depression and classifying the user as depressed or not. This paper showed that the support vector machine is the preferred algorithm over other machine learning algorithms and provides higher accuracy.
抑郁症是一种与人类高水平压力相关的疾病或问题。一般来说,与父母、心理学家和医疗保健专业人员交谈是不舒服的。因此,虚拟平台更适合分享你的情绪,例如,一个聊天机器人,为用户提供一个舒适的区域,扮演朋友或祝福者的角色。从短信中提取和识别情绪以检测抑郁情绪是一项具有挑战性的任务,因为它涉及消除自然语言的模糊性。在过去的十年里,研究人员提出了各种最先进的方法来检测文本中的抑郁情绪。本文旨在对这些方法进行分析,并在检测精度的基础上进行比较。虚拟平台为通信提供了终端用户界面。该系统使用自然语言处理(NLP)、词嵌入和机器学习技术来理解句子的含义和上下文。NLP进行预处理,提取与心理健康相关的关键词。词嵌入将提取的关键词转换为机器学习算法可以理解的嵌入向量,还可以通过检查和计算用户的抑郁程度,并对用户进行抑郁或不抑郁的分类,来分析和提取用户的感受。本文表明,与其他机器学习算法相比,支持向量机是首选算法,并且具有更高的精度。
{"title":"Implementation of machine learning techniques for depression in text messages: a survey","authors":"Dewangan Divya, Selot Smita, Panicker Sreejit","doi":"10.26634/jcom.9.4.18549","DOIUrl":"https://doi.org/10.26634/jcom.9.4.18549","url":null,"abstract":"Depression is a disease or problem associated with high levels of stress seen in humans. It is uncomfortable in talking to parents, psychologists, and healthcare professionals in general. So a virtual platform is much more suitable for sharing your emotions, for example, a chatbot that provides the user with a comfort zone, acting as a friend or well-wisher. Extracting and identifying emotions from text messages to detect depressive mood is a challenging task because it involves removing natural language ambiguities. Over the past decade, researchers have proposed various state-ofthe- art methods for detecting depressive moods in text. This paper aims to analyze such methods and present a comparison based on detection accuracy. The virtual platform provides an end-user interface for communication. The system understands the meaning and context of a sentence using Natural Language Processing (NLP), word embedding, and machine learning techniques. NLP does the preprocessing and extracts the mental health-related keywords. Word embedding converts the extracted keywords into embedding vectors that can be understood by Machine learning algorithms, it can also analyze and extract users' feelings by examining and calculating levels of depression and classifying the user as depressed or not. This paper showed that the support vector machine is the preferred algorithm over other machine learning algorithms and provides higher accuracy.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123522559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NOVEL TECHNIQUE FOR SECURE KEYLESS CAR AUTHENTICATION USING BLOCK-CHAIN FRAMEWORK 基于区块链框架的安全无钥匙汽车认证新技术
Pub Date : 1900-01-01 DOI: 10.26634/jcom.8.4.18297
Hussain Rashid, Khan Rabia, K. Rajesh
{"title":"NOVEL TECHNIQUE FOR SECURE KEYLESS CAR AUTHENTICATION USING BLOCK-CHAIN FRAMEWORK","authors":"Hussain Rashid, Khan Rabia, K. Rajesh","doi":"10.26634/jcom.8.4.18297","DOIUrl":"https://doi.org/10.26634/jcom.8.4.18297","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MULTI-DEFENSE FRAMEWORK FOR MITIGATING MAN IN THE CLOUD ATTACK (MITC) 减轻云中人攻击(mitc)的多重防御框架
Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.2.15674
S. Prabakeran, K. Swarnapriya, Agnes Priscilla Remina
{"title":"MULTI-DEFENSE FRAMEWORK FOR MITIGATING\u0000 MAN IN THE CLOUD ATTACK (MITC)","authors":"S. Prabakeran, K. Swarnapriya, Agnes Priscilla Remina","doi":"10.26634/jcom.7.2.15674","DOIUrl":"https://doi.org/10.26634/jcom.7.2.15674","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine learning modelling based on smartphone sensor data of human activity recognition 基于智能手机传感器数据的人类活动识别机器学习建模
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.4.19341
H. Rashid, Khan Rabia, Kumar Tyagi Rajesh
Smartphone sensors produce high-dimensional feature vectors that can be utilized to recognize different human activities. However, the contribution of each vector in the identification process is different, and several strategies have been examined over time to develop a procedure that yields favorable results. This paper presents the latest Machine Learning algorithms proposed for human activity classification, which include data acquisition, data preprocessing, data segmentation, feature selection, and dataset classification into training and testing sets. The solutions are compared and thoroughly analyzed by highlighting the respective advantages and disadvantages. The results show that the Support Vector Machine (SVM) algorithm achieved an accuracy rate of 95%.
智能手机传感器产生高维特征向量,可以用来识别不同的人类活动。然而,每个载体在识别过程中的贡献是不同的,随着时间的推移,已经研究了几种策略,以制定一种产生有利结果的程序。本文介绍了用于人类活动分类的最新机器学习算法,包括数据采集、数据预处理、数据分割、特征选择和数据集分类为训练集和测试集。通过对不同方案的优缺点进行比较和深入分析。结果表明,支持向量机(SVM)算法的准确率达到95%。
{"title":"Machine learning modelling based on smartphone sensor data of human activity recognition","authors":"H. Rashid, Khan Rabia, Kumar Tyagi Rajesh","doi":"10.26634/jcom.10.4.19341","DOIUrl":"https://doi.org/10.26634/jcom.10.4.19341","url":null,"abstract":"Smartphone sensors produce high-dimensional feature vectors that can be utilized to recognize different human activities. However, the contribution of each vector in the identification process is different, and several strategies have been examined over time to develop a procedure that yields favorable results. This paper presents the latest Machine Learning algorithms proposed for human activity classification, which include data acquisition, data preprocessing, data segmentation, feature selection, and dataset classification into training and testing sets. The solutions are compared and thoroughly analyzed by highlighting the respective advantages and disadvantages. The results show that the Support Vector Machine (SVM) algorithm achieved an accuracy rate of 95%.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMART AGRICULTURE USING ARTIFICIAL INTELLIGENCE: A REVIEW 使用人工智能的智能农业:综述
Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.2.17741
Subhalaxmi
{"title":"SMART AGRICULTURE USING ARTIFICIAL INTELLIGENCE: A REVIEW","authors":"Subhalaxmi","doi":"10.26634/jcom.9.2.17741","DOIUrl":"https://doi.org/10.26634/jcom.9.2.17741","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127912335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An automated examination system for evaluation of descriptive test 一种用于评价描述性考试的自动考试系统
Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.1.18866
CH. Sekhar, P. Deekshita, Rao M. Srinivasa
An Automated examination system for evaluation and descriptive test is an online based examination system in which exams are conducted online. The primary purpose of this Smart Examination system is to build an automated examination system. There is no need of paper and pen. Here students can write exam using internet or intranet. We will mainly use Machine Learning, Natural language processing (NLP) that generates a descriptive test automatically. The main objectives are analyzing sentence and find the semantic meaning of student answer and compare with actual answer defined by instructor and then assigns final scores. Now compare the automated evaluated score with the manual evaluated score with a specific threshold if threshold is deviated then with use of machine learning algorithm can improve the automated evaluation process. It saves lot of valuable time of teachers, reduce work, and complete the evaluation on time.
评价和描述测试自动化考试系统是一种基于在线的考试系统,考试在网上进行。本智能考试系统的主要目的是建立一个自动化的考试系统。不需要纸和笔。在这里,学生可以使用互联网或内部网参加考试。我们将主要使用自动生成描述性测试的机器学习、自然语言处理(NLP)。主要目的是分析句子,找出学生答案的语义,并与教师定义的实际答案进行比较,然后给出最终分数。现在将自动评估分数与特定阈值的人工评估分数进行比较,如果阈值偏离,则使用机器学习算法可以改进自动评估过程。它节省了教师大量宝贵的时间,减少了工作量,按时完成了评估。
{"title":"An automated examination system for evaluation of descriptive test","authors":"CH. Sekhar, P. Deekshita, Rao M. Srinivasa","doi":"10.26634/jcom.10.1.18866","DOIUrl":"https://doi.org/10.26634/jcom.10.1.18866","url":null,"abstract":"An Automated examination system for evaluation and descriptive test is an online based examination system in which exams are conducted online. The primary purpose of this Smart Examination system is to build an automated examination system. There is no need of paper and pen. Here students can write exam using internet or intranet. We will mainly use Machine Learning, Natural language processing (NLP) that generates a descriptive test automatically. The main objectives are analyzing sentence and find the semantic meaning of student answer and compare with actual answer defined by instructor and then assigns final scores. Now compare the automated evaluated score with the manual evaluated score with a specific threshold if threshold is deviated then with use of machine learning algorithm can improve the automated evaluation process. It saves lot of valuable time of teachers, reduce work, and complete the evaluation on time.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
i-manager's Journal on Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1