首页 > 最新文献

Journal of Artificial Intelligence Practice最新文献

英文 中文
On Data Analysis and Design and Implementation of Data Preprocessing Scheme Based on Low-quality Rock Datasets 基于低质量岩石数据集的数据分析与预处理方案的设计与实现
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2022.050208
Quan Hao
: With fast progress of deep learning technology, breakthroughs are achieved in many industries by virtue of efficient artificial intelligence models. In addition, computer hardware is cheaper, which makes it easier to acquire an excellent deep learning model. However, output of a model with good generalization rests with not only powerful hardware computing speed, but also quality of dataset involved in the calculation. Unfortunately, high-quality dataset is probably more expensive than high-end hardware, and this forces deep learning engineers or practitioners to use lower-quality dataset. Anyway, it doesn’t mean excellent deep learning programs can’t be created by such dataset. In particular, dataset preprocessing is equally important, and even engineers need to spend most of time elaborately formulating preprocessing strategies. This study mainly analyzes data and formulates preprocessing schemes of low-quality rock datasets. It aims to make deep learning programs more efficient and general-purpose at the lowest possible cost.
:随着深度学习技术的快速发展,借助高效的人工智能模型,许多行业都取得了突破。此外,计算机硬件更便宜,这使得它更容易获得一个优秀的深度学习模型。然而,一个好的泛化模型的输出不仅取决于强大的硬件计算速度,还取决于计算所涉及的数据集的质量。不幸的是,高质量的数据集可能比高端硬件更昂贵,这迫使深度学习工程师或从业者使用低质量的数据集。无论如何,这并不意味着优秀的深度学习程序不能由这样的数据集创建。特别是数据集预处理同样重要,甚至工程师也需要花费大量时间精心制定预处理策略。本研究主要对低质量岩石数据集进行数据分析,制定预处理方案。它旨在以尽可能低的成本使深度学习程序更高效、更通用。
{"title":"On Data Analysis and Design and Implementation of Data Preprocessing Scheme Based on Low-quality Rock Datasets","authors":"Quan Hao","doi":"10.23977/jaip.2022.050208","DOIUrl":"https://doi.org/10.23977/jaip.2022.050208","url":null,"abstract":": With fast progress of deep learning technology, breakthroughs are achieved in many industries by virtue of efficient artificial intelligence models. In addition, computer hardware is cheaper, which makes it easier to acquire an excellent deep learning model. However, output of a model with good generalization rests with not only powerful hardware computing speed, but also quality of dataset involved in the calculation. Unfortunately, high-quality dataset is probably more expensive than high-end hardware, and this forces deep learning engineers or practitioners to use lower-quality dataset. Anyway, it doesn’t mean excellent deep learning programs can’t be created by such dataset. In particular, dataset preprocessing is equally important, and even engineers need to spend most of time elaborately formulating preprocessing strategies. This study mainly analyzes data and formulates preprocessing schemes of low-quality rock datasets. It aims to make deep learning programs more efficient and general-purpose at the lowest possible cost.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Performance of Space Time Coding in MIMO System—Analysis of Alamouti Space Time Coding Scheme 空时编码在MIMO系统中的应用与性能——Alamouti空时编码方案分析
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060401
Lijun Han, A. Weay, S. Palaniappan
: This research first intuitively shows the implementation diagram of a MIMO system, and then introduces transmission diversity and space-time coding technology, with space-time coding technology belonging to the category of spatial diversity technology. The earliest and most classical Alamouti space-time coding scheme is then applied to MIMO wireless communication systems. The principle of the Alamouti space-time coding scheme is demonstrated, and a theoretical demonstration is carried out in a MIMO diversity system with two transmitters and one receiver. Finally, the Alamouti space-time coding scheme is simulated using MATLAB, and it is verified that the diversity gain and coding gain are obtained by using the Alamouti space-time coding scheme in the MIMO system.
本研究首先直观地展示了MIMO系统的实现图,然后介绍了传输分集和空时编码技术,其中空时编码技术属于空间分集技术的范畴。然后将最早、最经典的Alamouti空时编码方案应用于MIMO无线通信系统。阐述了Alamouti空时编码方案的原理,并在一个双发单收MIMO分集系统中进行了理论验证。最后,利用MATLAB对Alamouti空时编码方案进行仿真,验证了在MIMO系统中使用Alamouti空时编码方案可以获得分集增益和编码增益。
{"title":"Application and Performance of Space Time Coding in MIMO System—Analysis of Alamouti Space Time Coding Scheme","authors":"Lijun Han, A. Weay, S. Palaniappan","doi":"10.23977/jaip.2023.060401","DOIUrl":"https://doi.org/10.23977/jaip.2023.060401","url":null,"abstract":": This research first intuitively shows the implementation diagram of a MIMO system, and then introduces transmission diversity and space-time coding technology, with space-time coding technology belonging to the category of spatial diversity technology. The earliest and most classical Alamouti space-time coding scheme is then applied to MIMO wireless communication systems. The principle of the Alamouti space-time coding scheme is demonstrated, and a theoretical demonstration is carried out in a MIMO diversity system with two transmitters and one receiver. Finally, the Alamouti space-time coding scheme is simulated using MATLAB, and it is verified that the diversity gain and coding gain are obtained by using the Alamouti space-time coding scheme in the MIMO system.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discussion of Practical Application of Virtualization Technology in Computer System 浅谈虚拟化技术在计算机系统中的实际应用
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060207
{"title":"Discussion of Practical Application of Virtualization Technology in Computer System","authors":"","doi":"10.23977/jaip.2023.060207","DOIUrl":"https://doi.org/10.23977/jaip.2023.060207","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Inversion of Damage Incentives of High Pile Wharf in Inland River Based on SEResNet 基于SEResNet的内河高桩码头损伤诱因反演研究
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060409
L. Jia, Cai Fenglin, Zhu Qitao, Yang Tongxin, Zhang Qian
: Based on SEResNet neural network algorithm, the inversion model of damage incentives of inland high-piled wharf is constructed. The stress data of pile foundation under the action of damage incentives of high-piled wharf are obtained by using solid element finite element model calculation and indoor model test methods. The parameterized finite element calculation model of high-piled wharf is established by using subprocess in Python program to call MANSYS module, and verified with solid element model. The parameterized simplified finite element model meets the needs of inversion calculation. Based on the stress data samples of the pile foundation of the high-piled wharf obtained from the model test, the inversion analysis of single and multiple damage incentives is carried out. The model can identify the location, size and type of injury causative agent with good generalization ability.
基于SEResNet神经网络算法,建立了内陆高桩码头损伤激励的反演模型。采用实体单元有限元模型计算和室内模型试验方法,获得了高桩码头在损伤激励作用下桩基的应力数据。利用Python程序中的子过程调用MANSYS模块,建立了高桩码头参数化有限元计算模型,并用实体单元模型进行了验证。参数化简化有限元模型满足反演计算的需要。基于模型试验获得的高桩码头桩基应力数据样本,进行了单损伤和多损伤激励的反演分析。该模型能够识别损伤病原体的位置、大小和类型,具有较好的泛化能力。
{"title":"Study on Inversion of Damage Incentives of High Pile Wharf in Inland River Based on SEResNet","authors":"L. Jia, Cai Fenglin, Zhu Qitao, Yang Tongxin, Zhang Qian","doi":"10.23977/jaip.2023.060409","DOIUrl":"https://doi.org/10.23977/jaip.2023.060409","url":null,"abstract":": Based on SEResNet neural network algorithm, the inversion model of damage incentives of inland high-piled wharf is constructed. The stress data of pile foundation under the action of damage incentives of high-piled wharf are obtained by using solid element finite element model calculation and indoor model test methods. The parameterized finite element calculation model of high-piled wharf is established by using subprocess in Python program to call MANSYS module, and verified with solid element model. The parameterized simplified finite element model meets the needs of inversion calculation. Based on the stress data samples of the pile foundation of the high-piled wharf obtained from the model test, the inversion analysis of single and multiple damage incentives is carried out. The model can identify the location, size and type of injury causative agent with good generalization ability.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Application of Campus Sports Competition System 校园体育竞赛系统的开发与应用
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060108
{"title":"Development and Application of Campus Sports Competition System","authors":"","doi":"10.23977/jaip.2023.060108","DOIUrl":"https://doi.org/10.23977/jaip.2023.060108","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122856839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A rapid simulation development platform for autonomous driving based on CARLA and ROS 基于CARLA和ROS的自动驾驶快速仿真开发平台
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060303
{"title":"A rapid simulation development platform for autonomous driving based on CARLA and ROS","authors":"","doi":"10.23977/jaip.2023.060303","DOIUrl":"https://doi.org/10.23977/jaip.2023.060303","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Impact of Federated and Transfer Learning on Network Management Systems with Fuzzy DEMATEL Approach 模糊DEMATEL方法下联邦学习和迁移学习对网络管理系统安全性的影响
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060404
S. Turgay, Suat Erdoğan
: Everyday using of the big data, machine learning algorithms, and related studies, ensuring data privacy and security have become a critical necessity. These features make them more vulnerable to cyber-attacks. The security of the stored data is also critical, and evaluating the processing of information in the autonomous network management of these systems. The criteria considers the account in the processing and security of data entering every field from the widespread industry examined. It is necessary to increase their awareness of negative and attack problems while these systems are working. Applications such as traditional machine learning and the use of cloud computing also involve risks regarding data security and personal data leakage. Cooperative learning pays due attention to the confidentiality of sensitive information by keeping the original training data hidden. By collecting, combining, and integrating heterogeneous data with collaborative learning together with a federated learning structure, data produced and stored. This study discusses the effect of federated and transfer learning on autonomous network management analyzes the security status parameters. The fuzzy DEMATEL method was preferred in exploring the parameters affecting the system state according to the degree of importance. Situational scenarios evaluated by considering the structure in which the features of cyber-physical systems examined together with federated learning. Data security factors discussed with the fuzzy DEMATEL
大数据、机器学习算法以及相关研究的日常使用,确保数据隐私和安全已成为至关重要的必要性。这些特点使它们更容易受到网络攻击。存储数据的安全性也至关重要,并评估这些系统的自治网络管理中的信息处理。该标准考虑了从广泛的行业进入每个领域的数据的处理和安全性。在这些系统工作时,有必要提高他们对负面和攻击问题的认识。传统机器学习和云计算的使用等应用也涉及数据安全和个人数据泄露方面的风险。合作学习注重敏感信息的保密性,将原始训练数据隐藏起来。通过收集、组合和集成异构数据与协作学习以及联邦学习结构,生成和存储数据。本文讨论了联邦学习和迁移学习对自主网络管理的影响,分析了安全状态参数。根据重要程度优选模糊DEMATEL方法来探索影响系统状态的参数。通过考虑网络物理系统的特征与联邦学习一起检查的结构来评估情景情景。用模糊DEMATEL讨论数据安全因素
{"title":"Security Impact of Federated and Transfer Learning on Network Management Systems with Fuzzy DEMATEL Approach","authors":"S. Turgay, Suat Erdoğan","doi":"10.23977/jaip.2023.060404","DOIUrl":"https://doi.org/10.23977/jaip.2023.060404","url":null,"abstract":": Everyday using of the big data, machine learning algorithms, and related studies, ensuring data privacy and security have become a critical necessity. These features make them more vulnerable to cyber-attacks. The security of the stored data is also critical, and evaluating the processing of information in the autonomous network management of these systems. The criteria considers the account in the processing and security of data entering every field from the widespread industry examined. It is necessary to increase their awareness of negative and attack problems while these systems are working. Applications such as traditional machine learning and the use of cloud computing also involve risks regarding data security and personal data leakage. Cooperative learning pays due attention to the confidentiality of sensitive information by keeping the original training data hidden. By collecting, combining, and integrating heterogeneous data with collaborative learning together with a federated learning structure, data produced and stored. This study discusses the effect of federated and transfer learning on autonomous network management analyzes the security status parameters. The fuzzy DEMATEL method was preferred in exploring the parameters affecting the system state according to the degree of importance. Situational scenarios evaluated by considering the structure in which the features of cyber-physical systems examined together with federated learning. Data security factors discussed with the fuzzy DEMATEL","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Method for Pedestrian Recognition Based on Generative Adversarial Networks 基于生成对抗网络的行人识别改进方法
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060204
{"title":"Improved Method for Pedestrian Recognition Based on Generative Adversarial Networks","authors":"","doi":"10.23977/jaip.2023.060204","DOIUrl":"https://doi.org/10.23977/jaip.2023.060204","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Enhancement with Perturbation Method for Multidimensional Grid 多维网格的摄动法隐私增强
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060405
Ilker Ilter, S. Turgay
: With the development of technology, the use of big data is spreading at an increasing rate. The issues of storing, analysing and securing data have brought along the methods that need to be developed. Ensuring data privacy and data security is the case of partial separation and processing of data with the perturbation method of data with the block chain approach. Within the scope of this study, data analysis performed using normalization, geometric rotation, linear regression and scalar data multiplication and comparative classification in precision data mining.
随着科技的发展,大数据的应用正以越来越快的速度蔓延。存储、分析和保护数据的问题带来了需要开发的方法。确保数据隐私和数据安全是用区块链方法对数据进行局部分离和处理的情况。在本研究的范围内,使用归一化、几何旋转、线性回归和精确数据挖掘中的标量数据乘法和比较分类进行数据分析。
{"title":"Privacy Enhancement with Perturbation Method for Multidimensional Grid","authors":"Ilker Ilter, S. Turgay","doi":"10.23977/jaip.2023.060405","DOIUrl":"https://doi.org/10.23977/jaip.2023.060405","url":null,"abstract":": With the development of technology, the use of big data is spreading at an increasing rate. The issues of storing, analysing and securing data have brought along the methods that need to be developed. Ensuring data privacy and data security is the case of partial separation and processing of data with the perturbation method of data with the block chain approach. Within the scope of this study, data analysis performed using normalization, geometric rotation, linear regression and scalar data multiplication and comparative classification in precision data mining.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The significance and scope of application of the principle of legality in criminal law 罪刑法定原则在刑法中的意义和适用范围
Pub Date : 1900-01-01 DOI: 10.23977/jaip.2023.060406
Yubin Li
: This article discusses the significance and scope of application of the principle of legality for crimes and punishments in China. With the development of China's reform and opening up, as well as the socialist market economy, and the strengthening of the foundation of the market economy, it is necessary to further establish and improve the principle of legality in criminal law from the perspective of protecting human rights and limiting the country's punishment power.
本文论述了罪刑法定原则在中国适用的意义和范围。随着中国改革开放和社会主义市场经济的发展,以及市场经济基础的加强,有必要从保障人权和限制国家处罚权的角度进一步确立和完善刑法法定原则。
{"title":"The significance and scope of application of the principle of legality in criminal law","authors":"Yubin Li","doi":"10.23977/jaip.2023.060406","DOIUrl":"https://doi.org/10.23977/jaip.2023.060406","url":null,"abstract":": This article discusses the significance and scope of application of the principle of legality for crimes and punishments in China. With the development of China's reform and opening up, as well as the socialist market economy, and the strengthening of the foundation of the market economy, it is necessary to further establish and improve the principle of legality in criminal law from the perspective of protecting human rights and limiting the country's punishment power.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Artificial Intelligence Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1