首页 > 最新文献

International Journal of Computing, Communications and Networking最新文献

英文 中文
Cumulative Hazard Intensity Based on Sequential Preventive Maintenance Strategy for Ensuring Minimum Reliability 基于最小可靠性顺序预防性维护策略的累积危害强度研究
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/01722018
Juhyun Lee, Jihyun Park, Suneung Ahn
— In designing a preventive maintenance policy, considering only either system reliability or cost may not ensure sustainable system operation because the biased design of a PM policy can result in high maintenance cost and short system life. A PM policy should thus be designed considering a trade-off between system reliability and maintenance costs. PM actions in condition-based maintenance policies are commonly performed at a fixed reliability threshold, which is set high to prevent severe breakdowns. However, it may be difficult to establish cost-effectiveness of a model when the reliability threshold is constrained to be fixed. In this study, a cost-effective PM policy based on a reliability threshold that decreases as the frequency of PM actions increases, is developed, which considers a fixed cumulative hazard threshold while keeping the reliability above an acceptable level. The developed policy was analyzed in two cases; one where the cumulative hazard threshold and one where the predetermined minimum reliability were given as the condition variable, respectively. The results were compared to the model of the fixed reliability threshold, which showed that the proposed PM model led to a lower expected maintenance cost and longer system lifespan. Finally, sensitivity analyses of the condition variables and the maintenance costs were conducted.
—在设计预防性维护策略时,只考虑系统可靠性或成本可能无法确保系统的可持续运行,因为有偏见的PM策略设计可能导致高维护成本和短系统寿命。因此,在设计PM策略时应该考虑系统可靠性和维护成本之间的权衡。基于状态的维护策略中的PM操作通常在固定的可靠性阈值下执行,该阈值设置较高以防止严重故障。然而,当可靠性阈值被限制为固定时,可能难以建立模型的成本效益。在本研究中,提出了一种基于可靠性阈值的具有成本效益的PM策略,该策略考虑固定的累积危害阈值,同时保持可靠性高于可接受水平。在两个案例中分析了已制定的政策;其中一个是累积危险阈值,另一个是预先确定的最小可靠性作为条件变量。结果与固定可靠性阈值模型进行了比较,结果表明所提出的PM模型具有较低的预期维护成本和较长的系统寿命。最后,对工况变量和维修费用进行了敏感性分析。
{"title":"Cumulative Hazard Intensity Based on Sequential Preventive Maintenance Strategy for Ensuring Minimum Reliability","authors":"Juhyun Lee, Jihyun Park, Suneung Ahn","doi":"10.30534/ijccn/2018/01722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/01722018","url":null,"abstract":"— In designing a preventive maintenance policy, considering only either system reliability or cost may not ensure sustainable system operation because the biased design of a PM policy can result in high maintenance cost and short system life. A PM policy should thus be designed considering a trade-off between system reliability and maintenance costs. PM actions in condition-based maintenance policies are commonly performed at a fixed reliability threshold, which is set high to prevent severe breakdowns. However, it may be difficult to establish cost-effectiveness of a model when the reliability threshold is constrained to be fixed. In this study, a cost-effective PM policy based on a reliability threshold that decreases as the frequency of PM actions increases, is developed, which considers a fixed cumulative hazard threshold while keeping the reliability above an acceptable level. The developed policy was analyzed in two cases; one where the cumulative hazard threshold and one where the predetermined minimum reliability were given as the condition variable, respectively. The results were compared to the model of the fixed reliability threshold, which showed that the proposed PM model led to a lower expected maintenance cost and longer system lifespan. Finally, sensitivity analyses of the condition variables and the maintenance costs were conducted.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Wireless Early Prediction System of Cardiac Arrest through fog enabled IoT 通过雾启用物联网的心脏骤停无线早期预测系统
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/08722018
Ewit
{"title":"A Wireless Early Prediction System of Cardiac Arrest through fog enabled IoT","authors":"Ewit","doi":"10.30534/ijccn/2018/08722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/08722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Types of Leukemia Influenced Cells and it's Classification 白血病影响细胞类型的鉴定及分类
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/12722018
Ewit
{"title":"Identification of Types of Leukemia Influenced Cells and it's Classification","authors":"Ewit","doi":"10.30534/ijccn/2018/12722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/12722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING 两个云安全数据库的数字范围SQL查询与隐私保护
Pub Date : 2018-06-15 DOI: 10.30534/IJCCN/2018/39722018
Ewit
{"title":"TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING","authors":"Ewit","doi":"10.30534/IJCCN/2018/39722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/39722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOFTWARE PREDICTIVE CLASSIFICATION USING RELATIONAL ASSOCIATION RULES AND NAIVE BAYES APPROACH 基于关系关联规则和朴素贝叶斯方法的软件预测分类
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/51722018
Ewit
1. ABSTRACT Software quality is taken into account to be of nice importance within the space of software system engineering and development. so as to extend the potency and also the quality of software system modules, software system defect prediction is employed to spot defect prone modules and this helps in achieving high software system responsibility. Software fault prediction is usually a posh space of analysis and software system practitioners and researchers have applied various ways that to predict wherever the fault is probably going to occur within the software system module and their variable degrees of success. These prediction studies ends up in fault prediction models and it permits software system personnel to target the defect free software system code, thereby leading to software system quality improvement and using the higher utility of the resources. During this Paper style Approach for software system Defect Prediction is adopted.
1. 软件质量在软件系统工程和开发领域中具有非常重要的地位。为了扩展软件系统模块的效力和质量,软件系统缺陷预测被用于发现容易出现缺陷的模块,这有助于实现高软件系统责任。软件故障预测通常是一个高级的分析领域,软件系统从业者和研究人员已经应用了各种方法来预测软件系统模块中故障可能发生的位置及其不同程度的成功。这些预测研究最终以故障预测模型结束,它允许软件系统人员针对无缺陷的软件系统代码,从而导致软件系统质量改进并使用更高的资源效用。在此过程中,采用了论文式的软件系统缺陷预测方法。
{"title":"SOFTWARE PREDICTIVE CLASSIFICATION USING RELATIONAL ASSOCIATION RULES AND NAIVE BAYES APPROACH","authors":"Ewit","doi":"10.30534/ijccn/2018/51722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/51722018","url":null,"abstract":"1. ABSTRACT Software quality is taken into account to be of nice importance within the space of software system engineering and development. so as to extend the potency and also the quality of software system modules, software system defect prediction is employed to spot defect prone modules and this helps in achieving high software system responsibility. Software fault prediction is usually a posh space of analysis and software system practitioners and researchers have applied various ways that to predict wherever the fault is probably going to occur within the software system module and their variable degrees of success. These prediction studies ends up in fault prediction models and it permits software system personnel to target the defect free software system code, thereby leading to software system quality improvement and using the higher utility of the resources. During this Paper style Approach for software system Defect Prediction is adopted.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Optimized Genetic based Clustering Algorithm in Mobile Ad hoc Network 移动Ad hoc网络中一种优化的遗传聚类算法
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/53722018
Ewit
{"title":"An Approach to Optimized Genetic based Clustering Algorithm in Mobile Ad hoc Network","authors":"Ewit","doi":"10.30534/ijccn/2018/53722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/53722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ALIVE HUMAN DETECTION USING PIR SENSORS 利用pir传感器进行活体检测
Pub Date : 2018-06-15 DOI: 10.30534/IJCCN/2018/54722018
Ewit
This project is to find out the human being survival in War field and during natural disaster like earthquake. The project consists of a robot with an IR based human radiation sensor, which picks up signals from human radiations and gives a signal output. Whenever any human being comes in the vicinity of the system the IR system gives a signal. The movement of the robot can be controlled through an RF transmitter. The Robot can be controlled through mobile withWiFi.
这个项目是为了探索人类在战场和地震等自然灾害中的生存。该项目包括一个带有红外人体辐射传感器的机器人,该传感器可以从人体辐射中获取信号并输出信号。每当有人靠近该系统时,红外系统就会发出信号。机器人的运动可以通过射频发射器来控制。机器人可以通过带有wifi的移动设备进行控制。
{"title":"ALIVE HUMAN DETECTION USING PIR SENSORS","authors":"Ewit","doi":"10.30534/IJCCN/2018/54722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/54722018","url":null,"abstract":"This project is to find out the human being survival in War field and during natural disaster like earthquake. The project consists of a robot with an IR based human radiation sensor, which picks up signals from human radiations and gives a signal output. Whenever any human being comes in the vicinity of the system the IR system gives a signal. The movement of the robot can be controlled through an RF transmitter. The Robot can be controlled through mobile withWiFi.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Web Security Mechanisms Using Vulnerabilities and Attack Injection 基于漏洞和攻击注入的Web安全机制评估
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/40722018
Syeda Sheeba Tabassum, Dr. Arun Biradar
The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.
该方法基于在web应用程序中注入实际漏洞并自动攻击它们的想法,可以用于支持自定义设置场景中现有安全机制和工具的评估。为了提供逼真的结果,所提出的漏洞和攻击注入方法依赖于对真实web应用程序中大量漏洞的研究。除了通用方法之外,本文还描述了漏洞和攻击注入器工具(VAIT)的实现,该工具允许整个过程的自动化。我们使用该工具运行了一组实验,以证明所提出方法的可行性和有效性。实验包括评估SQL注入攻击的入侵检测系统的覆盖率和误报率,以及评估两种顶级商业web应用程序漏洞扫描器的有效性。结果表明,注入漏洞和攻击确实是评估安全机制的有效方法,不仅可以指出其弱点,还可以指出其改进方法。
{"title":"Evaluation of Web Security Mechanisms Using Vulnerabilities and Attack Injection","authors":"Syeda Sheeba Tabassum, Dr. Arun Biradar","doi":"10.30534/ijccn/2018/40722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/40722018","url":null,"abstract":"The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SMART SHOPPING USING QR CODE AND RFID SYSTEM 使用二维码和rfid系统的智能购物
Pub Date : 2018-06-15 DOI: 10.30534/IJCCN/2018/50722018
Ewit
RFID generally encompasses any wireless (or partially wireless) communication that allows for remote retrieval of information associated with a particular commodity, product, component, or other item. In RFID environments, each suitable item is tagged with an RFID tag that includes and (actively or passively) transmits one or more pieces of information including, for example, a unique identifier and such. These pieces of information are requested or retrieved by an RFID reader. Moreover, the RFID often must be manually docked or interfaced with a port such that the collected RFID information can be processed. In many circumstances, RFID technology allows the two devices (the tag and reader) to communicate with one another while not maintaining a line-of-sight in various weather conditions. Extensive research has been carried out on vision based automatic identification technology that recognizes images codes using smart phones to provide various services that can recognize the authenticity of any product We are using Multiplexing and De multiplexing algorithm for recognizing QR code image using smart phones to provide various services that can recognize the authenticity of any product.
RFID通常包括任何无线(或部分无线)通信,允许远程检索与特定商品、产品、组件或其他项目相关的信息。在RFID环境中,每个合适的物品都标有RFID标签,该标签包括并(主动或被动)传输一条或多条信息,例如,唯一标识符等。这些信息由RFID读取器请求或检索。此外,RFID通常必须手动停靠或与端口接口,以便可以处理收集到的RFID信息。在许多情况下,RFID技术允许两个设备(标签和读取器)相互通信,同时在各种天气条件下不保持视线。基于视觉的自动识别技术已经进行了广泛的研究,利用智能手机识别图像代码,提供各种可以识别任何产品真伪的服务。我们正在使用复用和解复用算法识别QR码图像,利用智能手机提供各种可以识别任何产品真伪的服务。
{"title":"SMART SHOPPING USING QR CODE AND RFID SYSTEM","authors":"Ewit","doi":"10.30534/IJCCN/2018/50722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/50722018","url":null,"abstract":"RFID generally encompasses any wireless (or partially wireless) communication that allows for remote retrieval of information associated with a particular commodity, product, component, or other item. In RFID environments, each suitable item is tagged with an RFID tag that includes and (actively or passively) transmits one or more pieces of information including, for example, a unique identifier and such. These pieces of information are requested or retrieved by an RFID reader. Moreover, the RFID often must be manually docked or interfaced with a port such that the collected RFID information can be processed. In many circumstances, RFID technology allows the two devices (the tag and reader) to communicate with one another while not maintaining a line-of-sight in various weather conditions. Extensive research has been carried out on vision based automatic identification technology that recognizes images codes using smart phones to provide various services that can recognize the authenticity of any product We are using Multiplexing and De multiplexing algorithm for recognizing QR code image using smart phones to provide various services that can recognize the authenticity of any product.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"33 Pt 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Palm vein recognition scheme based on an adaptive Gabor filter 基于自适应Gabor滤波器的手掌静脉识别方案
Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/13722018
Ewit
{"title":"Palm vein recognition scheme based on an adaptive Gabor filter","authors":"Ewit","doi":"10.30534/ijccn/2018/13722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/13722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
International Journal of Computing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1