首页 > 最新文献

International Journal of Computer Science and Applications最新文献

英文 中文
Location Based Security and Message Authentication Services in Vehicular Ad Hoc Network (VANET) 车载自组织网络(VANET)中基于位置的安全和消息认证服务
Q4 Computer Science Pub Date : 2014-05-01 DOI: 10.14355/IJCSA.2014.0302.04
P. Chandrasekar, A. Arul Lawrence Selvakumar
This work presents an XML-based authoring methodology that facilitates the different tasks associated with the development of standards-compliant e-learning content development. The idea is to support a unified authoring process of adaptive e-learning content by adopting the manual writing metaphor. According to this metaphor, which is specially well-suited for technical domains, instructors are compelled to view e-learning material as the manuals normally written and used to teach a particular subject. The methodology is supported by the DocBook document model (an XML application) which has a number of tools associated that facilitate the implementation of the methodology. Other tasks such as the packaging of contents or publishing in the Learning Management System (LMS) can be automated from these manuals.
这项工作提出了一种基于xml的创作方法,可以促进与开发符合标准的电子学习内容开发相关的不同任务。其想法是通过采用手工写作隐喻来支持自适应电子学习内容的统一创作过程。根据这个特别适合于技术领域的比喻,教师被迫将电子学习材料视为通常编写并用于教授特定主题的手册。该方法由DocBook文档模型(一个XML应用程序)支持,该模型有许多相关的工具来促进该方法的实现。其他任务,如内容打包或在学习管理系统(LMS)中发布,可以从这些手册中自动完成。
{"title":"Location Based Security and Message Authentication Services in Vehicular Ad Hoc Network (VANET)","authors":"P. Chandrasekar, A. Arul Lawrence Selvakumar","doi":"10.14355/IJCSA.2014.0302.04","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0302.04","url":null,"abstract":"This work presents an XML-based authoring methodology that facilitates the different tasks associated with the development of standards-compliant e-learning content development. The idea is to support a unified authoring process of adaptive e-learning content by adopting the manual writing metaphor. According to this metaphor, which is specially well-suited for technical domains, instructors are compelled to view e-learning material as the manuals normally written and used to teach a particular subject. The methodology is supported by the DocBook document model (an XML application) which has a number of tools associated that facilitate the implementation of the methodology. Other tasks such as the packaging of contents or publishing in the Learning Management System (LMS) can be automated from these manuals.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"50 1","pages":"91-108"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Theoretical Model for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine (FAST-VM) 利用有限角状态速度机(FAST-VM)检测网络和系统中高级持续威胁的理论模型
Q4 Computer Science Pub Date : 2014-05-01 DOI: 10.14355/IJCSA.2014.0302.01
G. Vert, Bilal Gonen, J. Brown
Intrusion detection systems have undergone numerous years of study and yet a great deal of problems remain; primarily a high percentage of false alarms and abysmal detection rates. A new type of threat has emerged that of Advanced Persistent Threat. This type of attack is known for being sophisticated and slow moving over a long period of time and is found in networked systems. Such threats may be detected by evaluation of large numbers of state variables describing complex system operation and state transitions over time. Analysis of such large numbers of variables is computationally inefficient especially if it is meant to be done in real time. The paper develops a completely new theoretical model that appears to be able to distill high order state variable data sets down to the essence of analytic changes in a system with APT operating. The model is based on the computationally efficient use of integer vectors. This approach has the capability to analyze threat over time, and has potential to detect, predict and classify new threat as being similar to threat already detected. The model presented is highly theoretical at this point with some initial prototype work demonstrated and some initial performance data.
入侵检测系统经过了多年的研究,但仍存在许多问题;主要是高误报率和低检出率。一种新的威胁类型已经出现,即高级持续威胁。这种类型的攻击以复杂和长时间缓慢移动而闻名,并在网络系统中发现。这种威胁可以通过对描述复杂系统操作和状态随时间变化的大量状态变量的评估来检测。对如此大量的变量进行分析在计算上效率低下,尤其是在需要实时完成的情况下。本文提出了一个全新的理论模型,该模型似乎能够将高阶状态变量数据集提炼到具有APT操作的系统的解析变化的本质。该模型基于整数向量的高效计算使用。这种方法具有随时间分析威胁的能力,并且有可能检测、预测和分类与已检测到的威胁相似的新威胁。在这一点上,所提出的模型具有高度的理论性,并展示了一些初步的原型工作和一些初步的性能数据。
{"title":"A Theoretical Model for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine (FAST-VM)","authors":"G. Vert, Bilal Gonen, J. Brown","doi":"10.14355/IJCSA.2014.0302.01","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0302.01","url":null,"abstract":"Intrusion detection systems have undergone numerous years of study and yet a great deal of problems remain; primarily a high percentage of false alarms and abysmal detection rates. A new type of threat has emerged that of Advanced Persistent Threat. This type of attack is known for being sophisticated and slow moving over a long period of time and is found in networked systems. Such threats may be detected by evaluation of large numbers of state variables describing complex system operation and state transitions over time. Analysis of such large numbers of variables is computationally inefficient especially if it is meant to be done in real time. The paper develops a completely new theoretical model that appears to be able to distill high order state variable data sets down to the essence of analytic changes in a system with APT operating. The model is based on the computationally efficient use of integer vectors. This approach has the capability to analyze threat over time, and has potential to detect, predict and classify new threat as being similar to threat already detected. The model presented is highly theoretical at this point with some initial prototype work demonstrated and some initial performance data.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"76 1","pages":"63"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76351542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving User Adherence to a Reminder: a Model and Methodology 提高用户对提醒的依从性:一个模型和方法
Q4 Computer Science Pub Date : 2014-05-01 DOI: 10.14355/ijcsa.2014.0302.03
Lei Tang, Zongtao Duan, Hanbo Wang, Zhiwen Yu
Various reminder systems have emerged to promote users’ health. However, it is hard to say such systems by which person is passively following the instructions can truly meet the goal. This means researchers are under pressure to find the ways of persuading a user to accept the instructions. Seeking the best time to provide the prompts is important to improve user adherence. A methodology is proposed by a following idea where the full benefit of the acceptable reminder will be achieved only if the user is open-minded to an interruption caused by it reasonably and closely. The time for prompting is thus evaluated before a decision on when a user is most receptive. We describe our experience in delivering the attention-sensitive reminders for elder adults to take their medication. Experimental results show that the approach can improve user adherence in an efficient and flexible way.
各种提醒系统已经出现,以促进用户的健康。然而,这种人们被动地听从指令的系统很难说能真正达到目标。这意味着研究人员面临着寻找说服用户接受指示的方法的压力。寻找提供提示的最佳时间对于提高用户依从性非常重要。下面的想法提出了一种方法,只有当用户对由它引起的合理和密切的中断持开放态度时,才能实现可接受提醒的全部好处。因此,在决定用户最容易接受的时间之前,需要评估提示时间。我们描述我们的经验,提供注意力敏感的提醒,为老年人服用他们的药物。实验结果表明,该方法可以有效、灵活地提高用户的依从性。
{"title":"Improving User Adherence to a Reminder: a Model and Methodology","authors":"Lei Tang, Zongtao Duan, Hanbo Wang, Zhiwen Yu","doi":"10.14355/ijcsa.2014.0302.03","DOIUrl":"https://doi.org/10.14355/ijcsa.2014.0302.03","url":null,"abstract":"Various reminder systems have emerged to promote users’ health. However, it is hard to say such systems by which person is passively following the instructions can truly meet the goal. This means researchers are under pressure to find the ways of persuading a user to accept the instructions. Seeking the best time to provide the prompts is important to improve user adherence. A methodology is proposed by a following idea where the full benefit of the acceptable reminder will be achieved only if the user is open-minded to an interruption caused by it reasonably and closely. The time for prompting is thus evaluated before a decision on when a user is most receptive. We describe our experience in delivering the attention-sensitive reminders for elder adults to take their medication. Experimental results show that the approach can improve user adherence in an efficient and flexible way.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"79"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83107821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation, Tracking And Feature Extraction For Indian Sign Language Recognition 印度手语识别的分割、跟踪与特征提取
Q4 Computer Science Pub Date : 2014-04-30 DOI: 10.5121/IJCSA.2014.4207
D. S, K. S., Nivin Anton A L, P. S.
Sign Language is a meansof communication between audibly challenged people. To provide an interface between the audibly challenged community and the rest of the world we need Sign Language translators. A sign language recognition system computerizes the work of a sign language trEvery Sign Language Recognition (SLR) System is trained to recognizespecific sets of signs and they correspondingly output the sign in the required format. These SLR systems are built with powerful image processing techniques. The sign language recognition systems are capable of recognizing a specific set of signing gestures and output the corresponding text/audio. Most of these systems involve the techniques of detection, segmentation, tracking, gesture recognition and classification. This paperproposes a design for a SLR System.
手语是听觉障碍人士之间的一种交流方式。为了在听觉障碍群体和世界其他地方之间提供一个接口,我们需要手语翻译。手语识别系统将手语的工作电脑化,所有的手语识别系统都经过训练,能够识别特定的一组手势,并相应地以所需的格式输出这些手势。这些单反系统采用强大的图像处理技术。手语识别系统能够识别一组特定的手势,并输出相应的文本/音频。这些系统大多涉及检测、分割、跟踪、手势识别和分类等技术。本文提出了一种单反系统的设计方案。
{"title":"Segmentation, Tracking And Feature Extraction For Indian Sign Language Recognition","authors":"D. S, K. S., Nivin Anton A L, P. S.","doi":"10.5121/IJCSA.2014.4207","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4207","url":null,"abstract":"Sign Language is a meansof communication between audibly challenged people. To provide an interface between the audibly challenged community and the rest of the world we need Sign Language translators. A sign language recognition system computerizes the work of a sign language trEvery Sign Language Recognition (SLR) System is trained to recognizespecific sets of signs and they correspondingly output the sign in the required format. These SLR systems are built with powerful image processing techniques. The sign language recognition systems are capable of recognizing a specific set of signing gestures and output the corresponding text/audio. Most of these systems involve the techniques of detection, segmentation, tracking, gesture recognition and classification. This paperproposes a design for a SLR System.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"38 1","pages":"57-72"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73605080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Decreasing of Quantity of Radiation De-Fects in Implanted-Junction Heterorec-Tifiers by Using Overlayers 用覆盖层降低植入结异质二极管中辐射缺陷的数量
Q4 Computer Science Pub Date : 2014-04-30 DOI: 10.5121/IJCSA.2014.4203
E. Pankratov, E. Bulaeva
Recently we introduced an approach to increase sharpness of diffusion-junction and implanted-junction heterorectifiers. The heterorectifiers could by single and as a part of heterobipolar transistors. However manufacturing p-n-junctions by ion implantation leads to generation of radiation defects in materials of heterostructure. In this paper we introduce an approach to use an overlayer and optimization of annealing of radiation defects to decrease quantity of radiation defects.
最近我们介绍了一种提高扩散结和植入结异质整流器锐度的方法。异质整流器可以单独使用,也可以作为异质双极晶体管的一部分。然而,通过离子注入制造p-n结会导致异质结构材料产生辐射缺陷。本文介绍了一种利用辐射缺陷的覆盖层和优化退火来减少辐射缺陷数量的方法。
{"title":"Decreasing of Quantity of Radiation De-Fects in Implanted-Junction Heterorec-Tifiers by Using Overlayers","authors":"E. Pankratov, E. Bulaeva","doi":"10.5121/IJCSA.2014.4203","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4203","url":null,"abstract":"Recently we introduced an approach to increase sharpness of diffusion-junction and implanted-junction heterorectifiers. The heterorectifiers could by single and as a part of heterobipolar transistors. However manufacturing p-n-junctions by ion implantation leads to generation of radiation defects in materials of heterostructure. In this paper we introduce an approach to use an overlayer and optimization of annealing of radiation defects to decrease quantity of radiation defects.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"141 1","pages":"21-29"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80130552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feed Forward Neural Network For Sine Function With Symmetric Table Addition Method Using Labview And Matlab Code 用Labview和Matlab编写的正弦函数对称表加法前馈神经网络
Q4 Computer Science Pub Date : 2014-04-30 DOI: 10.5121/IJCSA.2014.4201
Fadhil A. Ali
This work is proposed thefeed forward neural network with symmetric table addition methodto design the neuron synapses algorithm of the sine function approximations, and according to theTaylor series expansion. Matlab code and LabVIEW are used to build and create the neural network , which has been designed and traineddatabase set to improve its performance, and gets the besta global convergence with small value of MSE errors and 97.22% accuracy.
本工作提出了前馈神经网络用对称表加法法设计神经元突触的正弦函数逼近算法,并根据泰勒级数展开。利用Matlab代码和LabVIEW构建和创建神经网络,设计并训练了数据库集,提高了神经网络的性能,得到了最佳的全局收敛性,MSE误差值较小,准确率为97.22%。
{"title":"Feed Forward Neural Network For Sine Function With Symmetric Table Addition Method Using Labview And Matlab Code","authors":"Fadhil A. Ali","doi":"10.5121/IJCSA.2014.4201","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4201","url":null,"abstract":"This work is proposed thefeed forward neural network with symmetric table addition methodto design the neuron synapses algorithm of the sine function approximations, and according to theTaylor series expansion. Matlab code and LabVIEW are used to build and create the neural network , which has been designed and traineddatabase set to improve its performance, and gets the besta global convergence with small value of MSE errors and 97.22% accuracy.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"75 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84172016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Issues in Grid Computing 网格计算中的安全问题
Q4 Computer Science Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4118
N. Mishra, Ritu Yadav, S. Maheshwari
{"title":"Security Issues in Grid Computing","authors":"N. Mishra, Ritu Yadav, S. Maheshwari","doi":"10.5121/IJCSA.2014.4118","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4118","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"179-187"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90262531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Model Based Testing of Website 基于模型的网站测试
Q4 Computer Science Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4114
Sumit Machra, Narendra Khatri
{"title":"Model Based Testing of Website","authors":"Sumit Machra, Narendra Khatri","doi":"10.5121/IJCSA.2014.4114","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4114","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"11 1","pages":"143-152"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84309326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Augmented Split –protocol; An Ultimate DDoS Defender 增强型分割协议;终极DDoS防御器
Q4 Computer Science Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4107
B. Rawal, H. Ramcharan, Anthony K. Tsetse
{"title":"Augmented Split –protocol; An Ultimate DDoS Defender","authors":"B. Rawal, H. Ramcharan, Anthony K. Tsetse","doi":"10.5121/IJCSA.2014.4107","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4107","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"43 1","pages":"65-81"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88481777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOME ALTERNATIVE WAYS TO FIND M -AMBIGUOUS BINARY WORDS CORRESP ONDING TO A PARIKH MATRIX 寻找与parikh矩阵相对应的m -二义性二进制词的一些替代方法
Q4 Computer Science Pub Date : 2014-02-28 DOI: 10.5121/IJCSA.2014.4106
Amrita Bhattacharjee, B. S. Purkayastha
Parikh matrix of a word gives numerical information of the word in terms of its subwords.In this Paper an algorithm for finding Parikh matrix of a binary wordis introduced. With the help of this algorithm Parikh matrix of a binary word, however large it may be can be found out. M-ambiguous words are the problem of Parikh matrix. In this paper an algorithm is shown to find the M - ambiguous words of a binary ordered word instantly. We have introduced a system to represent binary words in a two dimensional field. We see that there are some relations among the representations of M -ambiguous words in the two dimensional field. We have also introduced a set of equations which will help us to calculate the M - ambiguous words.
一个词的帕里克矩阵给出了这个词的子词的数值信息。本文介绍了一种求二元词的Parikh矩阵的算法。利用该算法可以求出二进制词的帕里克矩阵,无论该矩阵有多大。m -二义字是Parikh矩阵的问题。本文给出了一种快速查找二进制有序词中M个二义字的算法。我们介绍了一个在二维场中表示二进制词的系统。我们发现M -二义词在二维域的表示之间存在一定的关系。我们还介绍了一组方程,它将帮助我们计算M -歧义词。
{"title":"SOME ALTERNATIVE WAYS TO FIND M -AMBIGUOUS BINARY WORDS CORRESP ONDING TO A PARIKH MATRIX","authors":"Amrita Bhattacharjee, B. S. Purkayastha","doi":"10.5121/IJCSA.2014.4106","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4106","url":null,"abstract":"Parikh matrix of a word gives numerical information of the word in terms of its subwords.In this Paper an algorithm for finding Parikh matrix of a binary wordis introduced. With the help of this algorithm Parikh matrix of a binary word, however large it may be can be found out. M-ambiguous words are the problem of Parikh matrix. In this paper an algorithm is shown to find the M - ambiguous words of a binary ordered word instantly. We have introduced a system to represent binary words in a two dimensional field. We see that there are some relations among the representations of M -ambiguous words in the two dimensional field. We have also introduced a set of equations which will help us to calculate the M - ambiguous words.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"41 1","pages":"53-64"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72688130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1