首页 > 最新文献

2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)最新文献

英文 中文
Pedestrian tracking algorithm in NLOS environments NLOS环境下的行人跟踪算法
Chirag Gupta, Deepanjan Biswas
This paper presents a cellular network based positioning algorithm in an urban environment characterized by multipath and severe non line of sight (NLOS) errors. The proposed algorithm mitigates localization error up to 75% as shown by the simulation results. The algorithm involves an initial averaging step followed by a prediction step for optimization, confining the estimated location close to the actual location. The proposed algorithm doesn't require additional hardware like sensors, accelerometers, gyroscopes etc. for localization as used in traditional cellular network based positioning methods. This approach can also be utilized in indoor positioning system (IPS) and global positioning systems (GPS) when at most three satellites are available. Low computational complexity of the algorithm is an added advantage. Utilization of orthogonal sources of information for improving accuracy is also explored.
提出了一种基于蜂窝网络的多路径、严重非视距误差的城市环境定位算法。仿真结果表明,该算法可将定位误差降低75%。该算法包括一个初始平均步骤,然后是一个优化的预测步骤,将估计的位置限制在接近实际位置的范围内。该算法不像传统的基于蜂窝网络的定位方法那样需要额外的硬件,如传感器、加速度计、陀螺仪等。这种方法也可用于室内定位系统(IPS)和全球定位系统(GPS),当最多有三颗卫星可用时。该算法的另一个优点是计算复杂度低。本文还探讨了利用正交信息源提高精度的方法。
{"title":"Pedestrian tracking algorithm in NLOS environments","authors":"Chirag Gupta, Deepanjan Biswas","doi":"10.1109/ANTS.2012.6524231","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524231","url":null,"abstract":"This paper presents a cellular network based positioning algorithm in an urban environment characterized by multipath and severe non line of sight (NLOS) errors. The proposed algorithm mitigates localization error up to 75% as shown by the simulation results. The algorithm involves an initial averaging step followed by a prediction step for optimization, confining the estimated location close to the actual location. The proposed algorithm doesn't require additional hardware like sensors, accelerometers, gyroscopes etc. for localization as used in traditional cellular network based positioning methods. This approach can also be utilized in indoor positioning system (IPS) and global positioning systems (GPS) when at most three satellites are available. Low computational complexity of the algorithm is an added advantage. Utilization of orthogonal sources of information for improving accuracy is also explored.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient data collection with directional antenna and network coding in wireless sensor networks 无线传感器网络中定向天线和网络编码的高效数据采集
R. R. Rout, Saswati Ghosh, S. Ghosh
In wireless sensor networks (WSNs), with converge-cast, the data flow pattern forms a funnel structure and converges at the Sink. Reduction of traffic flow to the Sink cuts down the funneling effect and improves the efficiency of the network. This paper presents an energy Efficient Triangular (regular) Deployment strategy with Directional Antenna (ETD-DA) while analyzing the directivity of antenna beam in the network. A triangular deployment strategy, where nodes are placed at different layers, has been adopted in view of the funneling effect of traffic in a single Sink network. A particular layer of ETD-DA involves in sensing and generating data for an event in WSN. On the proposed pattern, ETD-DA, the inter-level communication has been analyzed. The 2-connectivity pattern of communication has been achieved by orienting the directional antenna beam of a sensor in a particular direction towards the Sink. For the improvement of reliability (protection of data against path failure) of the network, a network coding based forwarding strategy has also been proposed for inter level communication in the ETD-DA with 2-connectivity pattern. The energy consumption has been significantly reduced due to the combination of directional beam and network coding. A detailed theoretical analysis and simulation have been performed to show the efficacy of the proposed approach.
在无线传感器网络(WSNs)中,采用收敛投射,数据流模式形成漏斗结构,并在Sink处收敛。减少流向Sink的流量可以减少漏斗效应,提高网络效率。在分析网络中天线波束方向性的基础上,提出了一种节能的定向天线三角形(规则)部署策略。考虑到单个Sink网络中流量的漏斗效应,采用三角形部署策略,将节点放置在不同的层。ETD-DA的一个特殊层涉及感知和生成WSN中的事件数据。在提出的ETD-DA模式下,对层间通信进行了分析。通过将传感器的定向天线波束定向到接收器的特定方向,实现了通信的2连接模式。为了提高网络的可靠性(保护数据不受路径故障的影响),提出了一种基于网络编码的2连通性ETD-DA层间通信转发策略。由于定向波束和网络编码的结合,大大降低了系统的能耗。详细的理论分析和仿真表明了该方法的有效性。
{"title":"Efficient data collection with directional antenna and network coding in wireless sensor networks","authors":"R. R. Rout, Saswati Ghosh, S. Ghosh","doi":"10.1109/ANTS.2012.6524233","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524233","url":null,"abstract":"In wireless sensor networks (WSNs), with converge-cast, the data flow pattern forms a funnel structure and converges at the Sink. Reduction of traffic flow to the Sink cuts down the funneling effect and improves the efficiency of the network. This paper presents an energy Efficient Triangular (regular) Deployment strategy with Directional Antenna (ETD-DA) while analyzing the directivity of antenna beam in the network. A triangular deployment strategy, where nodes are placed at different layers, has been adopted in view of the funneling effect of traffic in a single Sink network. A particular layer of ETD-DA involves in sensing and generating data for an event in WSN. On the proposed pattern, ETD-DA, the inter-level communication has been analyzed. The 2-connectivity pattern of communication has been achieved by orienting the directional antenna beam of a sensor in a particular direction towards the Sink. For the improvement of reliability (protection of data against path failure) of the network, a network coding based forwarding strategy has also been proposed for inter level communication in the ETD-DA with 2-connectivity pattern. The energy consumption has been significantly reduced due to the combination of directional beam and network coding. A detailed theoretical analysis and simulation have been performed to show the efficacy of the proposed approach.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126949114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
intelliSENSE: Location-based Wi-Fi sensing for energy efficiency in smart mobile devices intelliSENSE:基于位置的Wi-Fi传感,用于智能移动设备的能源效率
Saigopal Thota, Raghu Anantharangachar, S. Dixit, B. Mukherjee
Today, we use smart mobile devices to browse content, stream media, etc., in addition to making voice calls. Most smart devices are equipped with IEEE 802.11 (WiFi) interface to connect to the Internet using wireless access points (APs), as WiFi provides cost-effective connectivity to users. Wireless interfaces in smart devices drain high energy while searching for network connectivity and transition into power saving mode (PSM) after connecting to an AP. Hence, we need intelligent and energy-efficient mechanisms to scan and connect to wireless networks. In this work, we propose and investigate the characteristics of intelliSENSE, a location-based WiFi sensing mechanism for energy efficiency in smart mobile devices. We also propose adaptive polling mechanisms to further reduce the energy spent in WiFi sensing.
今天,除了打电话,我们还使用智能移动设备浏览内容、流媒体等。大多数智能设备都配备了IEEE 802.11 (WiFi)接口,通过无线接入点(ap)连接到互联网,因为WiFi为用户提供了经济实惠的连接。智能设备的无线接口在寻找网络连接的过程中会消耗大量能量,并且在接入AP后会转换为PSM模式,因此需要智能节能的机制来扫描和连接无线网络。在这项工作中,我们提出并研究了智能感知的特点,智能感知是一种基于位置的WiFi感知机制,用于智能移动设备的能源效率。我们还提出了自适应轮询机制,以进一步减少WiFi传感的能量消耗。
{"title":"intelliSENSE: Location-based Wi-Fi sensing for energy efficiency in smart mobile devices","authors":"Saigopal Thota, Raghu Anantharangachar, S. Dixit, B. Mukherjee","doi":"10.1109/ANTS.2012.6524220","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524220","url":null,"abstract":"Today, we use smart mobile devices to browse content, stream media, etc., in addition to making voice calls. Most smart devices are equipped with IEEE 802.11 (WiFi) interface to connect to the Internet using wireless access points (APs), as WiFi provides cost-effective connectivity to users. Wireless interfaces in smart devices drain high energy while searching for network connectivity and transition into power saving mode (PSM) after connecting to an AP. Hence, we need intelligent and energy-efficient mechanisms to scan and connect to wireless networks. In this work, we propose and investigate the characteristics of intelliSENSE, a location-based WiFi sensing mechanism for energy efficiency in smart mobile devices. We also propose adaptive polling mechanisms to further reduce the energy spent in WiFi sensing.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Group key establishment (GKE): Two/three party key exchange to GKE 组密钥建立(GKE):向GKE交换两方/三方密钥
S. Vivek, S. S. D. Selvi, Deepanshu Shukla, C. Rangan
This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE) and the third one is a compiler that constructs a GKE from 3-KE for circular topology. Our compilers 2-TGKE and 3-TGKE are first of their kind and are efficient due to the underlying tree topology. For the circular topology, we design a compiler called 3-CGKE. By extending the compilers 2-TGKE and 3-TGKE using the techniques in [?], scalable compilers for tree based authenticated group key exchange protocols (2-TAGKE/3-TAGKE), that are secure against active adversaries can be constructed. As an added advantage our compilers can be used in a setting where there is asymmetric distribution of computing power and hence applicable for low power devices such as PDA's, palmtops, sensor network nodes and mobile phones.
这项工作提出了第一个可扩展的、高效的和通用的编译器,用于从两/三方密钥交换(2-KE/3-KE)协议构建组密钥交换(GKE)协议。我们提出了三种不同的编译器,其中第一个是树形拓扑的2-KE到GKE编译器(2-TGKE),第二个也是树形拓扑,但从3-KE到GKE (3-TGKE),第三个是编译器,从3-KE构造一个圆形拓扑的GKE。我们的编译器2-TGKE和3-TGKE是同类中的第一个,并且由于底层树拓扑结构而高效。对于圆形拓扑,我们设计了一个名为3-CGKE的编译器。通过使用[?]中的技术扩展编译器2-TGKE和3-TGKE],可扩展的编译器,用于基于树的认证组密钥交换协议(2-TAGKE/3-TAGKE),可以构建安全的主动对手。作为一个额外的优势,我们的编译器可以在计算能力不对称分布的环境中使用,因此适用于低功耗设备,如PDA,掌上电脑,传感器网络节点和移动电话。
{"title":"Group key establishment (GKE): Two/three party key exchange to GKE","authors":"S. Vivek, S. S. D. Selvi, Deepanshu Shukla, C. Rangan","doi":"10.1109/ANTS.2012.6524229","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524229","url":null,"abstract":"This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE) and the third one is a compiler that constructs a GKE from 3-KE for circular topology. Our compilers 2-TGKE and 3-TGKE are first of their kind and are efficient due to the underlying tree topology. For the circular topology, we design a compiler called 3-CGKE. By extending the compilers 2-TGKE and 3-TGKE using the techniques in [?], scalable compilers for tree based authenticated group key exchange protocols (2-TAGKE/3-TAGKE), that are secure against active adversaries can be constructed. As an added advantage our compilers can be used in a setting where there is asymmetric distribution of computing power and hence applicable for low power devices such as PDA's, palmtops, sensor network nodes and mobile phones.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132878001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity driven capability based access control (ICAC) scheme for the Internet of Things 基于身份驱动能力的物联网访问控制(ICAC)方案
P. Mahalle, Bayu Anggorojati, N. Prasad, R. Prasad
Internet of Things (IoT) is becoming integral and mandatory part of everyday life. Scalability and manageability is intimidating due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is important to establish secure communication between multiple devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related to the complexity and dynamics of device identities. ICAC is implemented for Wi-Fi and results shows that ICAC is scalable and performs better compared to other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against man-in-the-middle attack, especially eavesdropping and replay attacks.
物联网(IoT)正在成为日常生活中不可或缺的一部分。由于设备和服务的数量无限,可伸缩性和可管理性令人生畏。物联网中权限最小的访问控制和授权对于在多个设备和服务之间建立安全通信非常重要。本文引入了访问控制能力的概念,其中所涉及设备的身份在访问能力中根深蒂固。本文提出的基于身份驱动能力的访问控制(ICAC)方案有助于缓解与设备身份复杂性和动态性相关的问题。廉署在Wi-Fi环境下实施廉署系统,结果显示廉署系统具有可扩展性,较其他的访问控制系统表现更佳。廉署使用安全协议验证工具进行的评估显示,廉署可有效抵御中间人攻击,特别是窃听和重放攻击。
{"title":"Identity driven capability based access control (ICAC) scheme for the Internet of Things","authors":"P. Mahalle, Bayu Anggorojati, N. Prasad, R. Prasad","doi":"10.1109/ANTS.2012.6524227","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524227","url":null,"abstract":"Internet of Things (IoT) is becoming integral and mandatory part of everyday life. Scalability and manageability is intimidating due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is important to establish secure communication between multiple devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related to the complexity and dynamics of device identities. ICAC is implemented for Wi-Fi and results shows that ICAC is scalable and performs better compared to other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against man-in-the-middle attack, especially eavesdropping and replay attacks.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"105 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120898106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Adaptive sub channel grouping in MC-CDMA systems for 4G networks 4G网络MC-CDMA系统中的自适应子信道分组
Hema R. Kale, C. Dethe, M. Mushrif
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. In this paper an adaptive sub channel grouping (ASG) scheme is proposed. In this scheme channels are allocated to the users according to the CSI obtained, a channel will be allocated to that user who experiences least fading on that channel. In similar way all the channels are allocated to users and total number of channels allocated to one user forms one group. The total number of groups is equal to number of users and number of channels per group are different. The proposed algorithm reduces the required transmit power and yields a solution that maximizes the throughput. Simulations results are presented for 4G environment and it is found that the proposed ASG algorithm can significantly improve the system throughput as compared to conventional schemes of group formation where neighboring channels forms groups and number of channels per groups are same.
多载波码分多址(MC-CDMA)正在成为第四代无线通信系统中重要的高速数据传输下行多址技术。提出了一种自适应子信道分组(ASG)方案。在该方案中,根据获得的CSI为用户分配信道,将信道分配给在该信道上衰落最少的用户。以类似的方式将所有信道分配给用户,分配给一个用户的信道总数形成一个组。组的总数等于用户的数量,每个组的通道数是不同的。该算法降低了所需的传输功率,并产生了最大吞吐量的解决方案。在4G环境下的仿真结果表明,与传统的相邻信道组成分组、每组信道数相同的分组分组方案相比,本文提出的ASG算法能够显著提高系统吞吐量。
{"title":"Adaptive sub channel grouping in MC-CDMA systems for 4G networks","authors":"Hema R. Kale, C. Dethe, M. Mushrif","doi":"10.1109/ANTS.2012.6524238","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524238","url":null,"abstract":"The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. In this paper an adaptive sub channel grouping (ASG) scheme is proposed. In this scheme channels are allocated to the users according to the CSI obtained, a channel will be allocated to that user who experiences least fading on that channel. In similar way all the channels are allocated to users and total number of channels allocated to one user forms one group. The total number of groups is equal to number of users and number of channels per group are different. The proposed algorithm reduces the required transmit power and yields a solution that maximizes the throughput. Simulations results are presented for 4G environment and it is found that the proposed ASG algorithm can significantly improve the system throughput as compared to conventional schemes of group formation where neighboring channels forms groups and number of channels per groups are same.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128195066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Link datarate based admission control in wireless networks 无线网络中基于链路数据的准入控制
K. Narendran, R. Karthik, K. Sivalingam
This paper presents a link data-rate based admission control mechanism for a wireless network using a transmit power allocation algorithm. The admission control mechanism uses the nodes' link datarate requirements as an input parameter. Transmit power control enables the nodes to set their power levels such that the required link datarate requirements are met while minimizing the interference caused to other transmissions. The link datarate requirement of a node is converted to its signal strength requirement that is subsequently used for admission control. We establish the relationship between key parameters in admission control such as signal strength requirement, link datarate requirement, number of nodes in the system etc. The proposed algorithm is studied using analytic and simulation techniques to show that it enables the nodes to meet their respective link datarate requirements.
提出了一种基于链路数据速率的无线网络接收控制机制,该机制采用发射功率分配算法。接纳控制机制使用节点的链路数据要求作为输入参数。传输功率控制使节点能够设置其功率水平,以便满足所需的链路数据要求,同时尽量减少对其他传输造成的干扰。节点的链路数据要求被转换为随后用于接纳控制的信号强度要求。建立了接收控制中信号强度要求、链路数据要求、系统节点数等关键参数之间的关系。利用分析和仿真技术对该算法进行了研究,结果表明该算法能够满足节点各自的链路数据要求。
{"title":"Link datarate based admission control in wireless networks","authors":"K. Narendran, R. Karthik, K. Sivalingam","doi":"10.1109/ANTS.2012.6524225","DOIUrl":"https://doi.org/10.1109/ANTS.2012.6524225","url":null,"abstract":"This paper presents a link data-rate based admission control mechanism for a wireless network using a transmit power allocation algorithm. The admission control mechanism uses the nodes' link datarate requirements as an input parameter. Transmit power control enables the nodes to set their power levels such that the required link datarate requirements are met while minimizing the interference caused to other transmissions. The link datarate requirement of a node is converted to its signal strength requirement that is subsequently used for admission control. We establish the relationship between key parameters in admission control such as signal strength requirement, link datarate requirement, number of nodes in the system etc. The proposed algorithm is studied using analytic and simulation techniques to show that it enables the nodes to meet their respective link datarate requirements.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121647146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1