首页 > 最新文献

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY最新文献

英文 中文
Evaluation of an Intelligent Approach for Semantic Web 语义网智能方法的评价
Pub Date : 2018-06-21 DOI: 10.24297/IJCT.V7I1.3477
V. Rana, Gurdev Singh
The semantic web is a vision which captures information from the web and makes it possible to help machines to understand complex human requests. Such intelligence based understanding requires important sources of information to be structured semantically so that the meaningful information can be accessed and provided to the users. The main outcome of the current idea is to derive the development of search engines to provide the users with artificial intelligence experience. The achievement of this idea requires integration of autonomous tools and standards. The technology can be realized to its task potentially by incorporating/deploying intelligent agents in semantic web.
语义网是一种从网络中获取信息并帮助机器理解复杂的人类请求的愿景。这种基于智能的理解需要对重要的信息源进行语义结构化,以便能够访问有意义的信息并将其提供给用户。当前思想的主要成果是推导出搜索引擎的发展,为用户提供人工智能体验。实现这个想法需要集成自主工具和标准。通过在语义web中集成/部署智能代理,可以潜在地实现该技术的任务。
{"title":"Evaluation of an Intelligent Approach for Semantic Web","authors":"V. Rana, Gurdev Singh","doi":"10.24297/IJCT.V7I1.3477","DOIUrl":"https://doi.org/10.24297/IJCT.V7I1.3477","url":null,"abstract":"The semantic web is a vision which captures information from the web and makes it possible to help machines to understand complex human requests. Such intelligence based understanding requires important sources of information to be structured semantically so that the meaningful information can be accessed and provided to the users. The main outcome of the current idea is to derive the development of search engines to provide the users with artificial intelligence experience. The achievement of this idea requires integration of autonomous tools and standards. The technology can be realized to its task potentially by incorporating/deploying intelligent agents in semantic web.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121609493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TAXONOMY FOR WSN SECURITY-A SURVEY WSN安全分类——一项调查
Pub Date : 2018-06-21 DOI: 10.24297/IJCT.V4I2C1.4175
K. A. Chaple
WSN is one of the dominant and emerging technology that shows great promise for  various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.
无线传感器网络是一项具有主导地位的新兴技术,在军事、生态和健康等领域有着广阔的应用前景forÂ。无线传感器网络极易受到攻击,无线通信技术的加入会带来各种安全威胁。由于数据敏感,传感器可能在无人值守的恶劣环境中工作,因此需要采取安全措施。无线传感器网络存在计算能力低、内存小、能源有限、物理捕获易感性和无线通信信道不安全等限制。这些都给无线传感器网络的安全性带来了挑战。本文对无线传感器网络的安全性进行了概述。概述了无线传感器网络的约束条件、安全要求、攻击及其防范措施。
{"title":"TAXONOMY FOR WSN SECURITY-A SURVEY","authors":"K. A. Chaple","doi":"10.24297/IJCT.V4I2C1.4175","DOIUrl":"https://doi.org/10.24297/IJCT.V4I2C1.4175","url":null,"abstract":"WSN is one of the dominant and emerging technology that shows great promise for  various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Singular Value Decomposition Algorithm for Unique Faces 独特人脸的鲁棒奇异值分解算法
Pub Date : 2018-06-21 DOI: 10.24297/ijct.v4i2c1.4178
I. Patel, R. Kulkarni, D. N. Rao
It has been read and also seen by physical encounters that there found to be seven near resembling humans by appearance .Many a times one becomes confused with respect to identification of  such near resembling faces when one encounters them. The  recognition  of  familiar  faces  plays  a  fundamental  role  in  our  social interactions. Humans  are  able  to  identify  reliably  a  large  number  of  faces  and psychologists  are  interested  in  understanding  the  perceptual  and  cognitive mechanisms  at  the  base  of  the  face  recognition  process. As it is needed that an automated face recognition system should be faces specific, it should effectively use features that discriminate a face from others by preferably amplifying distinctive characteristics of face. Face recognition has drawn wide attention from researchers in areas of machine learning, computer vision, pattern recognition, neural networks, access control, information security, law enforcement and surveillance, smart cards etc. The paper shows that the most resembling faces can be recognized by having a unique value per face under different variations. Certain image transformations, such as intensity negation, strange viewpoint changes,  and  changes  in  lighting  direction  can  severely  disrupt  human  face recognition. It has been said again and again by research scholars that SVD algorithm is not good enough to classify faces under large variations but this paper proves that the SVD algorithm is most robust algorithm and can be proved effective in identifying faces under large variations as applicable to unique faces. This paper works on these aspects and tries to recognize the unique faces by applying optimized SVD algorithm.
我们读到过,也亲眼看到过,有七个人在外表上与人类相似。很多时候,当人们遇到他们时,人们会对识别感到困惑ofÂ如此相似的面孔。The recognition of familiar faces plays a fundamental role in ourÂ社会互动。Humans are able to identify reliably a large number of facesÂ和psychologists are interested in understanding the perceptual andÂ认知mechanisms at the base of the face recognitionÂ过程。由于需要自动人脸识别系统应该是特定于人脸的,因此它应该通过更好地放大人脸的显著特征来有效地利用区分人脸的特征。人脸识别已经引起了机器学习、计算机视觉、模式识别、神经网络、访问控制、信息安全、执法监控、智能卡等领域研究人员的广泛关注。本文表明,在不同的变化条件下,每张脸都有一个唯一的值,可以识别出最相似的脸。某些图像变换,如强度否定,奇怪的视点变化, and changes in lighting direction can severely disrupt humanÂ人脸识别。研究学者们一再指出,SVD算法对于大变化情况下的人脸分类不够好,但本文证明了SVD算法是最鲁棒的算法,适用于唯一的人脸,可以有效识别大变化情况下的人脸。本文从这些方面进行了研究,并尝试采用优化的奇异值分解算法进行独特人脸的识别。
{"title":"Robust Singular Value Decomposition Algorithm for Unique Faces","authors":"I. Patel, R. Kulkarni, D. N. Rao","doi":"10.24297/ijct.v4i2c1.4178","DOIUrl":"https://doi.org/10.24297/ijct.v4i2c1.4178","url":null,"abstract":"It has been read and also seen by physical encounters that there found to be seven near resembling humans by appearance .Many a times one becomes confused with respect to identification of  such near resembling faces when one encounters them. The  recognition  of  familiar  faces  plays  a  fundamental  role  in  our  social interactions. Humans  are  able  to  identify  reliably  a  large  number  of  faces  and psychologists  are  interested  in  understanding  the  perceptual  and  cognitive mechanisms  at  the  base  of  the  face  recognition  process. As it is needed that an automated face recognition system should be faces specific, it should effectively use features that discriminate a face from others by preferably amplifying distinctive characteristics of face. Face recognition has drawn wide attention from researchers in areas of machine learning, computer vision, pattern recognition, neural networks, access control, information security, law enforcement and surveillance, smart cards etc. The paper shows that the most resembling faces can be recognized by having a unique value per face under different variations. Certain image transformations, such as intensity negation, strange viewpoint changes,  and  changes  in  lighting  direction  can  severely  disrupt  human  face recognition. It has been said again and again by research scholars that SVD algorithm is not good enough to classify faces under large variations but this paper proves that the SVD algorithm is most robust algorithm and can be proved effective in identifying faces under large variations as applicable to unique faces. This paper works on these aspects and tries to recognize the unique faces by applying optimized SVD algorithm.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of MAC Protocol for Reliable Broadcast 可靠广播的MAC协议分析
Pub Date : 2018-06-21 DOI: 10.24297/IJCT.V4I2C1.4180
S. Savita, A. Anjali, Gurpal Singh
In wireless communication It is important to find a reliable broadcasting protocol that is especially designed for an optimum performance of public-safety and data travelling related applications. Using RSU and OBU, there are four novel ideas presented in this research work, namely choosing the nearest following node as the network probe node, headway-based segmentation, non-uniform segmentation and application adaptive. The integration of these ideas results in a protocol that possesses minimum latency, minimum probability of collision in the acknowledgment messages and unique robustness at different speeds and traffic volumes. Wireless communications are becoming the dominant form of transferring information,and the most active research field. In this dissertation, we will present one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc Networks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides, between mobile vehicles and roadside units.
在无线通信中,找到一种可靠的广播协议是非常重要的,它是专门为公共安全和数据传输相关应用的最佳性能而设计的。利用RSU和OBU,本研究提出了选择最近的跟随节点作为网络探测节点、基于前边的分割、非均匀分割和应用自适应四个新颖的思路。这些思想的整合使协议具有最小的延迟,最小的确认消息碰撞概率和在不同速度和流量下独特的鲁棒性。无线通信正在成为信息传输的主要形式,也是最活跃的研究领域。在本文中,我们将介绍一种最适用的Ad-Hoc网络形式;车辆自组织网络(vanet)。VANET是在移动车辆之间以及移动车辆与路边单元之间建立健壮的Ad-Hoc网络的技术。
{"title":"Analysis of MAC Protocol for Reliable Broadcast","authors":"S. Savita, A. Anjali, Gurpal Singh","doi":"10.24297/IJCT.V4I2C1.4180","DOIUrl":"https://doi.org/10.24297/IJCT.V4I2C1.4180","url":null,"abstract":"In wireless communication It is important to find a reliable broadcasting protocol that is especially designed for an optimum performance of public-safety and data travelling related applications. Using RSU and OBU, there are four novel ideas presented in this research work, namely choosing the nearest following node as the network probe node, headway-based segmentation, non-uniform segmentation and application adaptive. The integration of these ideas results in a protocol that possesses minimum latency, minimum probability of collision in the acknowledgment messages and unique robustness at different speeds and traffic volumes. Wireless communications are becoming the dominant form of transferring information,and the most active research field. In this dissertation, we will present one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc Networks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides, between mobile vehicles and roadside units.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130454226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shape Matching and Recognition using Hybrid Features from Skeleton and Boundary 基于骨架和边界混合特征的形状匹配与识别
Pub Date : 2018-06-21 DOI: 10.24297/IJCT.V7I2.3457
Rama Mohan Babu Gatram, B. Babu, A. Srikrishna, N. V. Rao
This paper presents a novel approach for effective matching of similar shapes from skeleton and boundary features. The features identified from the shape are the junction points, end points, and maximum length from single pixel pruned skeleton of the shape. Another two features identified from the boundary are junctions and boundary length of the shape. These five features are then used for shape matching. We tested these features on Kimia shapes dataset and tools dataset. The matching process from these features has produced good results, showing the probable of the developed method in a variety of computer vision and pattern recognition domains. The results demonstrate these features are rotational and transform invariant.
本文提出了一种从骨架和边界特征中有效匹配相似形状的新方法。从形状中识别的特征是形状的连接点、端点和单像素修剪骨架的最大长度。从边界确定的另外两个特征是形状的连接处和边界长度。然后将这五个特征用于形状匹配。我们在Kimia形状数据集和工具数据集上测试了这些功能。这些特征的匹配过程产生了良好的效果,显示了所开发的方法在各种计算机视觉和模式识别领域的可能性。结果表明,这些特征是旋转不变性和变换不变性的。
{"title":"Shape Matching and Recognition using Hybrid Features from Skeleton and Boundary","authors":"Rama Mohan Babu Gatram, B. Babu, A. Srikrishna, N. V. Rao","doi":"10.24297/IJCT.V7I2.3457","DOIUrl":"https://doi.org/10.24297/IJCT.V7I2.3457","url":null,"abstract":"This paper presents a novel approach for effective matching of similar shapes from skeleton and boundary features. The features identified from the shape are the junction points, end points, and maximum length from single pixel pruned skeleton of the shape. Another two features identified from the boundary are junctions and boundary length of the shape. These five features are then used for shape matching. We tested these features on Kimia shapes dataset and tools dataset. The matching process from these features has produced good results, showing the probable of the developed method in a variety of computer vision and pattern recognition domains. The results demonstrate these features are rotational and transform invariant.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122656055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground Structures 利用图像参数法实现与缺陷地面结构相结合的复合低通滤波器
Pub Date : 2018-06-21 DOI: 10.24297/IJCT.V4I2C1.4176
C. Ghosh, A. Roy, S. K. Parui
An asymmetric DGS consisting of two square headed slots connected transversely with a rectangular slot is etched in the ground plane underneath a high-low impedance microstrip line.  It provides a band-reject filtering characteristics with sharp transition. Thus, it may be modeled as m-derived filter section. Accordingly, T-type LC equivalent circuit is proposed and LC parameters are extracted. A planar composite lowpass filter is designed by image parameter method and implemented by different DGS units. A composite filter requires at least three filter sections, of which two m-derived sections and one constant k-section. In proposed scheme, one such m-derived section is directly replaced by proposed DGS unit, whose cut-off frequency is same as that of designed m-derived section. The other m-derived section implemented by proposed DGS unit divided into equivalent two L-sections which will act as a termination for impedance matching. A constant k-section has been realized by a dumbbell shaped DGS having same cutoff frequency. Here lumped LC parameters are directly replaced by the equivalent LC values of the DGSs and therefore, produce almost ideal filter characteristics by overcoming the limitations of microstrip technology.
在高低阻抗微带线下的地平面上蚀刻了由两个方头槽与一个矩形槽横向连接组成的非对称DGS。Â它具有锐利过渡的带阻滤波特性。因此,可以将其建模为m派生的滤波段。据此,提出了t型LC等效电路,并提取了LC参数。采用图像参数法设计了一种平面复合低通滤波器,并由不同的DGS单元实现。一个复合滤波器至少需要三个滤波器段,其中两个m-导数段和一个常数k-段。在本方案中,直接用设计的DGS单元代替其中一个m-导数截面,其截止频率与设计的m-导数截面相同。另一个由DGS单元实现的m衍生段分为等效的两个l段,它们将作为阻抗匹配的终端。用相同截止频率的哑铃形DGS实现了恒定的k截面。在这里,集总LC参数直接被dgs的等效LC值所取代,因此,克服了微带技术的局限性,产生了几乎理想的滤波器特性。
{"title":"Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground Structures","authors":"C. Ghosh, A. Roy, S. K. Parui","doi":"10.24297/IJCT.V4I2C1.4176","DOIUrl":"https://doi.org/10.24297/IJCT.V4I2C1.4176","url":null,"abstract":"An asymmetric DGS consisting of two square headed slots connected transversely with a rectangular slot is etched in the ground plane underneath a high-low impedance microstrip line.  It provides a band-reject filtering characteristics with sharp transition. Thus, it may be modeled as m-derived filter section. Accordingly, T-type LC equivalent circuit is proposed and LC parameters are extracted. A planar composite lowpass filter is designed by image parameter method and implemented by different DGS units. A composite filter requires at least three filter sections, of which two m-derived sections and one constant k-section. In proposed scheme, one such m-derived section is directly replaced by proposed DGS unit, whose cut-off frequency is same as that of designed m-derived section. The other m-derived section implemented by proposed DGS unit divided into equivalent two L-sections which will act as a termination for impedance matching. A constant k-section has been realized by a dumbbell shaped DGS having same cutoff frequency. Here lumped LC parameters are directly replaced by the equivalent LC values of the DGSs and therefore, produce almost ideal filter characteristics by overcoming the limitations of microstrip technology.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Aggregation Operator for Triangular Fuzzy Numbers based on the Geometric Means of the Slopes of the L- and R- Membership Functions 基于 L 和 R 成员函数斜率几何平均值的三角模糊数新聚合运算符
Pub Date : 2012-04-30 DOI: 10.24297/IJCT.V2I2A.6783
Manju Pandey, N. Khare
In recent work authors have proposed four new aggregation operators for triangular and trapezoidal fuzzy numbers based on means of apex angles [1][2][3][4]. Subsequently authors have proposed [5] a new aggregation operator for TFNs based on the arithmetic mean of slopes of the L- and R- membership lines. In this paper the work is extended and a new aggregation operator for TFNs is proposed in which the L- and R- membership function lines of the aggregate TFN have slopes which are the geometric means of the corresponding L- and R- slopes of the individual TFNs. Computation of the aggregate is demonstrated with a numerical example. Corresponding arithmetic and geometric aggregates as well as results from the recent work of the authors on TFN aggregates have also been computed.
在最近的工作中,作者们根据顶角的平均值为三角形和梯形模糊数提出了四个新的聚合算子[1][2][3][4]。随后,作者又提出了 [5] 基于 L 和 R 成员线斜率算术平均值的 TFN 新聚合算子。本文对这项工作进行了扩展,提出了一种新的 TFN 聚合算子,其中聚合 TFN 的 L- 和 R- 成员函数线的斜率是单个 TFN 对应的 L- 和 R- 斜率的几何平均数。通过一个数字示例演示了集合的计算。此外,还计算了相应的算术和几何集合,以及作者最近关于 TFN 集合的研究成果。
{"title":"New Aggregation Operator for Triangular Fuzzy Numbers based on the Geometric Means of the Slopes of the L- and R- Membership Functions","authors":"Manju Pandey, N. Khare","doi":"10.24297/IJCT.V2I2A.6783","DOIUrl":"https://doi.org/10.24297/IJCT.V2I2A.6783","url":null,"abstract":"In recent work authors have proposed four new aggregation operators for triangular and trapezoidal fuzzy numbers based on means of apex angles [1][2][3][4]. Subsequently authors have proposed [5] a new aggregation operator for TFNs based on the arithmetic mean of slopes of the L- and R- membership lines. In this paper the work is extended and a new aggregation operator for TFNs is proposed in which the L- and R- membership function lines of the aggregate TFN have slopes which are the geometric means of the corresponding L- and R- slopes of the individual TFNs. Computation of the aggregate is demonstrated with a numerical example. Corresponding arithmetic and geometric aggregates as well as results from the recent work of the authors on TFN aggregates have also been computed.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132398192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1