首页 > 最新文献

2010 International Conference on Information and Communication Technology Convergence (ICTC)最新文献

英文 中文
Memory reduction of N-LUT method using sub-principle fringe patterns 利用子原理条纹图减少N-LUT方法的内存
Jae-Man Kim, Seung-Cheol Kim, Eun-Soo Kim
In this paper, memory reduction method using the Sub-PFP is proposed. That is, two-dimensional PFPs in conventional N-LUT method can be converted by one-dimensional Sub-PFPs using trigonometric relations. Some experiments with a test 3-D object are carried out and the reduction ratio of LUT is analyzed.
本文提出了一种基于Sub-PFP的内存缩减方法。即传统N-LUT方法中的二维pfp可以通过三角关系转化为一维sub - pfp。在三维测试对象上进行了一些实验,并分析了LUT的压缩率。
{"title":"Memory reduction of N-LUT method using sub-principle fringe patterns","authors":"Jae-Man Kim, Seung-Cheol Kim, Eun-Soo Kim","doi":"10.1109/ICTC.2010.5674659","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674659","url":null,"abstract":"In this paper, memory reduction method using the Sub-PFP is proposed. That is, two-dimensional PFPs in conventional N-LUT method can be converted by one-dimensional Sub-PFPs using trigonometric relations. Some experiments with a test 3-D object are carried out and the reduction ratio of LUT is analyzed.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131683850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methods for practical whitebox cryptography 实用白盒密码的方法
Jong-Yeon Park, Jiwoong Choi, Okyeon Yi
White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against white box attack model [1,2]. However, slower performance by operating too many look up tables is a problem of practical use of white box cryptography. Also key updating on dynamic situations of white box cryptography is much harder than key updating of black box cryptography. Thus, this paper suggests using a specific mode of operation to improve speed of white box implementations, and show concrete examples of enhancement of performance. Also, it suggests a technique of key updating with dynamic and static tables in practically.
白盒密码学是针对白盒攻击环境的新技术。在白盒攻击模型中,攻击者比黑盒攻击模型更强大,攻击者可以监控所有中间值。因此,需要针对所有操作步骤暴露的安全算法。Chow介绍了针对白盒攻击模型的AES DES实现的安全白盒加密[1,2]。然而,由于操作过多的查找表而导致的性能降低是白盒加密在实际使用中的一个问题。此外,动态情况下白盒密码的密钥更新比黑盒密码的密钥更新困难得多。因此,本文建议使用特定的操作模式来提高白盒实现的速度,并展示了增强性能的具体示例。并在实际应用中提出了一种动态表和静态表的键更新技术。
{"title":"Methods for practical whitebox cryptography","authors":"Jong-Yeon Park, Jiwoong Choi, Okyeon Yi","doi":"10.1109/ICTC.2010.5674789","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674789","url":null,"abstract":"White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against white box attack model [1,2]. However, slower performance by operating too many look up tables is a problem of practical use of white box cryptography. Also key updating on dynamic situations of white box cryptography is much harder than key updating of black box cryptography. Thus, this paper suggests using a specific mode of operation to improve speed of white box implementations, and show concrete examples of enhancement of performance. Also, it suggests a technique of key updating with dynamic and static tables in practically.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysis of access delay under high traffic conditions in CATV networks 有线电视网络高流量条件下的接入延迟分析
Joonyoung Jung, Dong-Joon Choi, S. Lee, Jaemin Ahn
In this paper, We present more accurate access delay analysis through the consideration of piggyback request. In our analysis, we derived a formula for access delay introducing a self-similar traffic model to prove the effect of the piggyback request. We also show that the piggyback request can greatly affect the access delay under high traffic conditions.
在本文中,我们通过考虑背带请求提出了更精确的访问延迟分析。在我们的分析中,我们推导了一个访问延迟公式,引入自相似流量模型来证明承载请求的影响。研究还表明,在高流量条件下,承载请求对接入延迟有很大影响。
{"title":"Analysis of access delay under high traffic conditions in CATV networks","authors":"Joonyoung Jung, Dong-Joon Choi, S. Lee, Jaemin Ahn","doi":"10.1109/ICTC.2010.5674777","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674777","url":null,"abstract":"In this paper, We present more accurate access delay analysis through the consideration of piggyback request. In our analysis, we derived a formula for access delay introducing a self-similar traffic model to prove the effect of the piggyback request. We also show that the piggyback request can greatly affect the access delay under high traffic conditions.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BER (Bit Error Rate) performance according to the FFT input bit resolution in WiBro system WiBro系统中根据FFT输入位分辨率的误码率(BER)性能
Y. Lee, Young-il Kim, Cheol-Hye Cho, W. Ryu, Whan-woo Kim
This paper finds the optimum input bit size of FFT engine in WiBro system through the uncoded-BER performances of computer simulation.
本文通过对WiBro系统中FFT引擎的无编码误码率性能进行计算机仿真,找到了FFT引擎的最佳输入位大小。
{"title":"BER (Bit Error Rate) performance according to the FFT input bit resolution in WiBro system","authors":"Y. Lee, Young-il Kim, Cheol-Hye Cho, W. Ryu, Whan-woo Kim","doi":"10.1109/ICTC.2010.5674270","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674270","url":null,"abstract":"This paper finds the optimum input bit size of FFT engine in WiBro system through the uncoded-BER performances of computer simulation.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126271027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design for management software of desktop virtualization solutions 桌面虚拟化解决方案的管理软件设计
Hyung-Jik Lee, Jeunwoo Lee
Desktop virtualization allows IT developments to reduce management and support costs, along with capital expenses for desktop hardware. Therefore, a user uses virtualization services using management tools, but they are not compatible with each other. As a result, t he O VF i s used as t he standard for the virtual machine image in order to provide virtualization solution for companies. Therefore, in this paper, we suggest the management software can generalize a management API and a user interface used in the management tool and can be used even in the virtualization solutions of any companies.
桌面虚拟化允许IT开发人员减少管理和支持成本,以及桌面硬件的资本支出。因此,用户通过管理工具使用虚拟化服务,但两者之间不兼容。因此,ovf被用作虚拟机映像的标准,以便为企业提供虚拟化解决方案。因此,在本文中,我们建议管理软件可以概括管理工具中使用的管理API和用户界面,甚至可以在任何公司的虚拟化解决方案中使用。
{"title":"Design for management software of desktop virtualization solutions","authors":"Hyung-Jik Lee, Jeunwoo Lee","doi":"10.1109/ICTC.2010.5674779","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674779","url":null,"abstract":"Desktop virtualization allows IT developments to reduce management and support costs, along with capital expenses for desktop hardware. Therefore, a user uses virtualization services using management tools, but they are not compatible with each other. As a result, t he O VF i s used as t he standard for the virtual machine image in order to provide virtualization solution for companies. Therefore, in this paper, we suggest the management software can generalize a management API and a user interface used in the management tool and can be used even in the virtualization solutions of any companies.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis of cooperative multi-hop transmission protocols 协同多跳传输协议的性能分析
Tran Trung Duy, H. Kong
In this paper, we propose and evaluate the performance of two cooperative multi-hop transmission protocols. We derive expressions of packet error rate (PER) and average number of transmissions for the proposed protocols. The Monte-Carlo simulations are presented to verify the theoretical analyses.
本文提出并评价了两种多跳协作传输协议的性能。我们推导了所提出协议的包错误率(PER)和平均传输数的表达式。通过蒙特卡罗仿真验证了理论分析的正确性。
{"title":"Performance analysis of cooperative multi-hop transmission protocols","authors":"Tran Trung Duy, H. Kong","doi":"10.1109/ICTC.2010.5674819","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674819","url":null,"abstract":"In this paper, we propose and evaluate the performance of two cooperative multi-hop transmission protocols. We derive expressions of packet error rate (PER) and average number of transmissions for the proposed protocols. The Monte-Carlo simulations are presented to verify the theoretical analyses.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A revised Mint-Route protocol in wireless sensor networks 一种改进的无线传感器网络薄荷路由协议
Min-Jung Baek, Ki-Il Kim, Sunghyun Cho
The Mint-Route routing protocol was proposed to enhance reliability by choosing adjacent link with the smallest number of lost packets as next hop in wireless sensor networks. However, since packets are transmitted over unstable wireless link, physical distance between nodes can mostly affect the reliability. So, long path with many hops is usually established between source and destination while considering current metrics. To solve this problem, we develop a revised Mint-Route protocol by considering the received packet as well as distance together while deciding parent node toward the sink. Simulations and their analysis are followed to validate the suitability of reduced end-to-end delay and enhanced reliability.
为了提高无线传感器网络的可靠性,提出了薄荷路由协议,在无线传感器网络中选择丢包数最少的相邻链路作为下一跳。然而,由于数据包是在不稳定的无线链路上传输的,节点之间的物理距离往往会影响可靠性。因此,在考虑当前指标的情况下,通常在源和目标之间建立具有多跳点的长路径。为了解决这个问题,我们开发了一种改进的薄荷路由协议,在确定父节点到接收器的方向时,考虑了接收到的数据包和在一起的距离。通过仿真和分析,验证了降低端到端延迟和提高可靠性的适用性。
{"title":"A revised Mint-Route protocol in wireless sensor networks","authors":"Min-Jung Baek, Ki-Il Kim, Sunghyun Cho","doi":"10.1109/ICTC.2010.5674674","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674674","url":null,"abstract":"The Mint-Route routing protocol was proposed to enhance reliability by choosing adjacent link with the smallest number of lost packets as next hop in wireless sensor networks. However, since packets are transmitted over unstable wireless link, physical distance between nodes can mostly affect the reliability. So, long path with many hops is usually established between source and destination while considering current metrics. To solve this problem, we develop a revised Mint-Route protocol by considering the received packet as well as distance together while deciding parent node toward the sink. Simulations and their analysis are followed to validate the suitability of reduced end-to-end delay and enhanced reliability.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The effect of ETX measurement on routing performance in underwater sensor networks ETX测量对水下传感器网络路由性能的影响
Sungwon Lee, Dongseung Shin, Dongkyun Kim
Communications in underwater wireless sensor networks have a lot of limitations as compared to those in terrestrial sensor networks. In wireless sensor networks, a routing protocol finds a path between the source and sink nodes according to a routing metric. The hop count is the most widely used routing metric, however, it cannot reflect the quality of a link. It is expected that a link quality aware metric such as ETX can contribute to improving the performance, especially in underwater sensor networks (UWSNs). However, the direct adoption of ETX in UWSNs may not provide expected performance. In this paper, we investigate the effect of ETX measurement on the performance in UWSNs through NS-2 simulations.
与陆地传感器网络相比,水下无线传感器网络中的通信存在许多局限性。在无线传感器网络中,路由协议根据路由度量找到源节点和接收节点之间的路径。跳数是应用最广泛的路由度量,但它不能反映链路的质量。期望像ETX这样的链路质量感知度量有助于提高性能,特别是在水下传感器网络(UWSNs)中。然而,在uwsn中直接采用ETX可能无法提供预期的性能。在本文中,我们通过NS-2仿真研究了ETX测量对UWSNs性能的影响。
{"title":"The effect of ETX measurement on routing performance in underwater sensor networks","authors":"Sungwon Lee, Dongseung Shin, Dongkyun Kim","doi":"10.1109/ICTC.2010.5674703","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674703","url":null,"abstract":"Communications in underwater wireless sensor networks have a lot of limitations as compared to those in terrestrial sensor networks. In wireless sensor networks, a routing protocol finds a path between the source and sink nodes according to a routing metric. The hop count is the most widely used routing metric, however, it cannot reflect the quality of a link. It is expected that a link quality aware metric such as ETX can contribute to improving the performance, especially in underwater sensor networks (UWSNs). However, the direct adoption of ETX in UWSNs may not provide expected performance. In this paper, we investigate the effect of ETX measurement on the performance in UWSNs through NS-2 simulations.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122464224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal energy management over solar based energy harvesting sensor network 基于太阳能的能量收集传感器网络的最优能量管理
Sungjin Lee, Taewan Kim, Jongrok Park, Sanghoon Lee, Hyukmin Son, Sanghoon Lee
In this paper, we build a framework for maximizing the utilization of solar-based harvesting energy in sensor networks. For this goal, we analyze the required power at each relay node and give the queueing framework for the power management. In the simulation, our proposed algorithm shows a superior performance than conventional ones in terms of the PRR (Packet Reception Rate) for a day according to the recharging efficiency.
在本文中,我们建立了一个框架,以最大限度地利用基于太阳能的收集能量在传感器网络。为此,我们分析了每个中继节点所需的功率,并给出了用于电源管理的排队框架。在仿真中,根据充电效率,我们提出的算法在一天的包接收率(PRR)方面表现出优于传统算法的性能。
{"title":"Optimal energy management over solar based energy harvesting sensor network","authors":"Sungjin Lee, Taewan Kim, Jongrok Park, Sanghoon Lee, Hyukmin Son, Sanghoon Lee","doi":"10.1109/ICTC.2010.5674794","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674794","url":null,"abstract":"In this paper, we build a framework for maximizing the utilization of solar-based harvesting energy in sensor networks. For this goal, we analyze the required power at each relay node and give the queueing framework for the power management. In the simulation, our proposed algorithm shows a superior performance than conventional ones in terms of the PRR (Packet Reception Rate) for a day according to the recharging efficiency.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Functional architecture for countering IP multimedia spam 对抗IP多媒体垃圾邮件的功能架构
Soyoung Park, Shingak Kang
IP multimedia spam poses a threat to the users of various IP applications as well as email spam and SMS spam does. Considering this circumstances, we suggest functional architecture for countering IP multimedia spam. Specifically, we first propose functional architecture for countering IP multimedia spam. We then describe functionalities and interactions between functional components in the architecture. Finally, considerations for adoption of the anti-spam framework on telecommunications networks are provided.
IP多媒体垃圾邮件与电子邮件、短信垃圾邮件一样,对各种IP应用的用户构成威胁。考虑到这种情况,我们建议使用功能架构来对抗IP多媒体垃圾邮件。具体来说,我们首先提出了对抗IP多媒体垃圾邮件的功能架构。然后我们描述架构中功能组件之间的功能和交互。最后,提出了在电信网络中采用反垃圾邮件框架的考虑。
{"title":"Functional architecture for countering IP multimedia spam","authors":"Soyoung Park, Shingak Kang","doi":"10.1109/ICTC.2010.5674755","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674755","url":null,"abstract":"IP multimedia spam poses a threat to the users of various IP applications as well as email spam and SMS spam does. Considering this circumstances, we suggest functional architecture for countering IP multimedia spam. Specifically, we first propose functional architecture for countering IP multimedia spam. We then describe functionalities and interactions between functional components in the architecture. Finally, considerations for adoption of the anti-spam framework on telecommunications networks are provided.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133366256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 International Conference on Information and Communication Technology Convergence (ICTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1