首页 > 最新文献

International Journal of Vehicle Information and Communication Systems最新文献

英文 中文
Collaboration of UAV and HetNet for better QoS: a comparative study 无人机与HetNet协同提高服务质量的比较研究
Q4 Engineering Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10031861
Akshita Gupta, Shriya Sundhan, S. Gupta, S. Alsamhi, M. Rashid
{"title":"Collaboration of UAV and HetNet for better QoS: a comparative study","authors":"Akshita Gupta, Shriya Sundhan, S. Gupta, S. Alsamhi, M. Rashid","doi":"10.1504/ijvics.2020.10031861","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031861","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach 基于实景地图的车载自组网AODV路由协议的虫洞攻击及其检测与预防方法
Q4 Engineering Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10031863
Shahjahan Ali, P. Nand, S. Tiwari
{"title":"Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach","authors":"Shahjahan Ali, P. Nand, S. Tiwari","doi":"10.1504/ijvics.2020.10031863","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031863","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent traffic light design and control in smart cities: a survey on techniques and methodologies 智慧城市中智能交通灯的设计与控制:技术与方法综述
Q4 Engineering Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10033552
Aditi Agrawal, Rajeev Paulus
{"title":"Intelligent traffic light design and control in smart cities: a survey on techniques and methodologies","authors":"Aditi Agrawal, Rajeev Paulus","doi":"10.1504/ijvics.2020.10033552","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033552","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Range frequency based distance computation technique for positioning in VANET 基于距离频率的VANET定位距离计算技术
Q4 Engineering Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10033540
P. Shakeel, S. Baskar
{"title":"Range frequency based distance computation technique for positioning in VANET","authors":"P. Shakeel, S. Baskar","doi":"10.1504/ijvics.2020.10033540","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033540","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of electric vehicle converter configurations, control methods and charging techniques 概述电动汽车转换器的配置,控制方法和充电技术
Q4 Engineering Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10033551
P. Manimekalai, V. Indragandhi, V. Subramaniyaswamy, Logesh Ravi, V. Vijayakumar
{"title":"An overview of electric vehicle converter configurations, control methods and charging techniques","authors":"P. Manimekalai, V. Indragandhi, V. Subramaniyaswamy, Logesh Ravi, V. Vijayakumar","doi":"10.1504/ijvics.2020.10033551","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033551","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A scheduling heuristic in mobile distributed real-time database systems 移动分布式实时数据库系统中的调度启发式算法
Q4 Engineering Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10031859
P. Singh
{"title":"A scheduling heuristic in mobile distributed real-time database systems","authors":"P. Singh","doi":"10.1504/ijvics.2020.10031859","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031859","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable white list management technique for warned nodes in MANET MANET中告警节点的可靠白名单管理技术
Q4 Engineering Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025630
E. Jayanthi, M. Hussain
Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.
移动自组织网络在许多应用中被广泛使用。MANET面临的挑战之一是安全性。提供身份验证是网络安全的主要原则之一。数字证书被分发到网络中的节点。从行为不端的节点吊销证书。在以前的论文中,节点被插入到基于投票和非投票机制的黑名单和白名单中。白名单中的节点被剥夺了指控网络中恶意节点的权利。为了提高可靠性,我们从白名单中删除了被警告的节点,并使它们有资格使用证书颁发机构和基于信任的机制计算的阈值来指责其他节点。使用网络模拟器-2的白名单管理技术已经实现了网络中正常节点数量的增加。
{"title":"Reliable white list management technique for warned nodes in MANET","authors":"E. Jayanthi, M. Hussain","doi":"10.1504/ijvics.2019.10025630","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025630","url":null,"abstract":"Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42748859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cluster-based secured data transmission protocol for efficient data gathering in WSN 一种用于WSN中高效数据采集的基于集群的安全数据传输协议
Q4 Engineering Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025632
P. Sharmila, A. Priyadharson
Nowadays, Wireless Sensor Networks (WSNs) are widely used in all surveillance and domestic applications. Secure data gathering is a major concern in WSN in the presence of intruders. In existing works, secured data transmission was achieved through symmetric or asymmetric cryptographic schemes. However, it has high overhead and less confidentiality. In the proposed research, Cluster-based Secured Data Transmission Protocol (CSDTP) is developed to provide efficient data gathering. This protocol contains three modules. In the first module, cluster-based secure routing is implemented by route request, route reply and route assign phase. In the second module, data transmission is initiated. High packet delivery is achieved during this module. In the third module, secure data gathering is implemented using symmetric key encryption and decryption algorithm. The results of the simulation show that the CSDTP provides high data gathering ratio, more packet delivery ratio, less end to end delay, high packet integrity ratio and less overhead than existing schemes.
目前,无线传感器网络(WSN)广泛应用于各种监控和国内应用。在存在入侵者的情况下,安全的数据收集是WSN中的一个主要问题。在现有的工作中,安全的数据传输是通过对称或非对称的加密方案实现的。然而,它具有较高的开销和较少的机密性。在所提出的研究中,开发了基于集群的安全数据传输协议(CSDTP)来提供高效的数据收集。该协议包含三个模块。在第一个模块中,通过路由请求、路由应答和路由分配阶段实现了基于集群的安全路由。在第二模块中,启动数据传输。在该模块中实现了高数据包传递。在第三个模块中,使用对称密钥加解密算法实现了安全的数据采集。仿真结果表明,与现有方案相比,CSDTP提供了较高的数据收集率、较高的数据包传递率、较小的端到端延迟、较高的包完整性和较小的开销。
{"title":"A cluster-based secured data transmission protocol for efficient data gathering in WSN","authors":"P. Sharmila, A. Priyadharson","doi":"10.1504/ijvics.2019.10025632","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025632","url":null,"abstract":"Nowadays, Wireless Sensor Networks (WSNs) are widely used in all surveillance and domestic applications. Secure data gathering is a major concern in WSN in the presence of intruders. In existing works, secured data transmission was achieved through symmetric or asymmetric cryptographic schemes. However, it has high overhead and less confidentiality. In the proposed research, Cluster-based Secured Data Transmission Protocol (CSDTP) is developed to provide efficient data gathering. This protocol contains three modules. In the first module, cluster-based secure routing is implemented by route request, route reply and route assign phase. In the second module, data transmission is initiated. High packet delivery is achieved during this module. In the third module, secure data gathering is implemented using symmetric key encryption and decryption algorithm. The results of the simulation show that the CSDTP provides high data gathering ratio, more packet delivery ratio, less end to end delay, high packet integrity ratio and less overhead than existing schemes.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43349462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity verification-based cryptography for detecting intrusion in wireless sensor networks 基于身份验证的无线传感器网络入侵检测密码学
Q4 Engineering Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025635
D. Rajan, E. R. Naganathan
Identity Verification Based Cryptosystem (IDVBC) mechanism is implemented here for providing a novel and secure data transmission among nodes. Here, token-based node identity verification along with certificates and data encoding mechanism is carried out to reduce the complexity in wireless networks. By applying local identity verification scheme, the communication overheads get reduced and hence the certificate management process is simplified. Each sensor owns a local private key and should get matched with the public key generated by the base station. Encoding process uses hash signature schemes for enhancing the security measures in the network. Source node sends the encrypted or encoded data with the generated local private key and labelled token ID. Once the token ID verification is done and the key matches with the global private key generated by the BS, the decrypted or decoded data is received by the receiver. The proposed IDVBC scheme has the ability to detect malicious activity of the node, to provide high-level security and able to tolerate several security attacks. Proposed scheme is improved with 39% efficiency better than the conventional method in terms of secured data transmission.
本文实现了基于身份验证的加密系统(IDVBC)机制,以提供一种新颖、安全的节点间数据传输。在这里,基于令牌的节点身份验证以及证书和数据编码机制被执行,以降低无线网络中的复杂性。通过应用本地身份验证方案,降低了通信开销,简化了证书管理过程。每个传感器都拥有一个本地私钥,并且应该与基站生成的公钥相匹配。编码过程使用散列签名方案来增强网络中的安全措施。源节点发送具有生成的本地私钥和标记的令牌ID的加密或编码数据。一旦完成了令牌ID验证并且密钥与BS生成的全局私钥匹配,则接收器接收解密或解码的数据。所提出的IDVBC方案能够检测节点的恶意活动,提供高级别的安全性,并能够容忍多次安全攻击。在安全数据传输方面,所提出的方案比传统方法提高了39%的效率。
{"title":"Identity verification-based cryptography for detecting intrusion in wireless sensor networks","authors":"D. Rajan, E. R. Naganathan","doi":"10.1504/ijvics.2019.10025635","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025635","url":null,"abstract":"Identity Verification Based Cryptosystem (IDVBC) mechanism is implemented here for providing a novel and secure data transmission among nodes. Here, token-based node identity verification along with certificates and data encoding mechanism is carried out to reduce the complexity in wireless networks. By applying local identity verification scheme, the communication overheads get reduced and hence the certificate management process is simplified. Each sensor owns a local private key and should get matched with the public key generated by the base station. Encoding process uses hash signature schemes for enhancing the security measures in the network. Source node sends the encrypted or encoded data with the generated local private key and labelled token ID. Once the token ID verification is done and the key matches with the global private key generated by the BS, the decrypted or decoded data is received by the receiver. The proposed IDVBC scheme has the ability to detect malicious activity of the node, to provide high-level security and able to tolerate several security attacks. Proposed scheme is improved with 39% efficiency better than the conventional method in terms of secured data transmission.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42508361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective utilisation of cloud data centre and allocating user demands to virtual machines using LMRO algorithm 有效利用云数据中心,并使用LMRO算法将用户需求分配给虚拟机
Q4 Engineering Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025631
D. Banu, S. Aranganathan
Cloud computing is a recent trend for modifying the computing technique strongly. The cloud storage assets will be recurrently accessed. The method works based on a black box method that has difficulty to correlate acquired data for internal resource management techniques. The simulation is not permitted to conduct comparative analysis due to huge amount of features required. The Load Maintenance and Resource Optimisation (LMRO) algorithm proposes utilisation of cloud data centres and allocates user demands to Virtual Machines (VMs). The load balancer keeps track of cloudlets processed by every virtual machine and tries to balance the active load. The method has a main data centre controller and load balancers to collect and analyse the information. Based on experimental evaluation, proposed LMRO techniques reduces 0.065 seconds Task Request Time (TRT), 0.20 seconds Data centre Processing Time (DPT), 0.0125 $ Virtual Machine Cost (VMC) and improves 19.25% Throughput (TRP) as compared to the conventional techniques.
云计算是最近的一种趋势,它强烈地改变了计算技术。云存储资产将被频繁访问。该方法基于黑盒方法,难以将获取的数据与内部资源管理技术相关联。由于需要大量的特征,模拟不允许进行比较分析。负载维护和资源优化(LMRO)算法建议利用云数据中心,并将用户需求分配给虚拟机(vm)。负载平衡器跟踪每个虚拟机处理的cloudlet,并尝试平衡活动负载。该方法有一个主数据中心控制器和负载平衡器来收集和分析信息。基于实验评估,LMRO技术与传统技术相比,任务请求时间(TRT)减少0.065秒,数据中心处理时间(DPT)减少0.20秒,虚拟机成本(VMC)减少0.0125美元,吞吐量(TRP)提高19.25%。
{"title":"Effective utilisation of cloud data centre and allocating user demands to virtual machines using LMRO algorithm","authors":"D. Banu, S. Aranganathan","doi":"10.1504/ijvics.2019.10025631","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025631","url":null,"abstract":"Cloud computing is a recent trend for modifying the computing technique strongly. The cloud storage assets will be recurrently accessed. The method works based on a black box method that has difficulty to correlate acquired data for internal resource management techniques. The simulation is not permitted to conduct comparative analysis due to huge amount of features required. The Load Maintenance and Resource Optimisation (LMRO) algorithm proposes utilisation of cloud data centres and allocates user demands to Virtual Machines (VMs). The load balancer keeps track of cloudlets processed by every virtual machine and tries to balance the active load. The method has a main data centre controller and load balancers to collect and analyse the information. Based on experimental evaluation, proposed LMRO techniques reduces 0.065 seconds Task Request Time (TRT), 0.20 seconds Data centre Processing Time (DPT), 0.0125 $ Virtual Machine Cost (VMC) and improves 19.25% Throughput (TRP) as compared to the conventional techniques.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47929400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Vehicle Information and Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1