首页 > 最新文献

IEEE Internet Things Mag.最新文献

英文 中文
Guest Editorial: Internet of Drones: Novel Applications, Recent Deployments, and Integration 嘉宾评论:无人机互联网:新应用、最新部署和集成
Pub Date : 2021-12-01 DOI: 10.1109/miot.2021.9712460
V. Chamola, F. Yu, B. Sikdar, S. Kanhere, M. Guizani
{"title":"Guest Editorial: Internet of Drones: Novel Applications, Recent Deployments, and Integration","authors":"V. Chamola, F. Yu, B. Sikdar, S. Kanhere, M. Guizani","doi":"10.1109/miot.2021.9712460","DOIUrl":"https://doi.org/10.1109/miot.2021.9712460","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mentor's Musings on Standardization Landscape & Imperatives for the Internet of Drones 导师对无人机互联网的标准化景观和必要性的思考
Pub Date : 2021-12-01 DOI: 10.1109/miot.2021.9712395
N. Narang
{"title":"Mentor's Musings on Standardization Landscape & Imperatives for the Internet of Drones","authors":"N. Narang","doi":"10.1109/miot.2021.9712395","DOIUrl":"https://doi.org/10.1109/miot.2021.9712395","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GUEST EDITORIAL: Internet of Things for e-Health Applications 嘉宾评论:电子健康应用的物联网
Pub Date : 2021-09-01 DOI: 10.1109/MIOT.2021.9548995
Deepak Gupta, V. Albuquerque, Sheng-Lung Peng, Ashish Khanna, G. Nguyen, Oscar Castillo
{"title":"GUEST EDITORIAL: Internet of Things for e-Health Applications","authors":"Deepak Gupta, V. Albuquerque, Sheng-Lung Peng, Ashish Khanna, G. Nguyen, Oscar Castillo","doi":"10.1109/MIOT.2021.9548995","DOIUrl":"https://doi.org/10.1109/MIOT.2021.9548995","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mentor's Musings on Artificial Computational Intelligence and the Internet of Everything 导师对人工计算智能和万物互联的思考
Pub Date : 2020-12-01 DOI: 10.1109/MIOT.2020.9319622
N. Narang
IoT Standards Matters will look at different segments of the IoT market as it relates to implementation and use of standards. Each column will select a particular vertical, and lay out the relevant standards and technologies that affect the evolving IoT hyperspace. The pace of the columns will start broadly with the vision of narrowing the subject of subsequent articles toward more specific applications of standards, whether in the development, application, test, or commissioning of IoT technologies.
物联网标准事务将着眼于物联网市场的不同部分,因为它与标准的实施和使用有关。每个专栏将选择一个特定的垂直领域,并列出影响不断发展的物联网超空间的相关标准和技术。专栏的节奏将从广泛的角度开始,将后续文章的主题缩小到更具体的标准应用,无论是在物联网技术的开发、应用、测试还是调试中。
{"title":"Mentor's Musings on Artificial Computational Intelligence and the Internet of Everything","authors":"N. Narang","doi":"10.1109/MIOT.2020.9319622","DOIUrl":"https://doi.org/10.1109/MIOT.2020.9319622","url":null,"abstract":"IoT Standards Matters will look at different segments of the IoT market as it relates to implementation and use of standards. Each column will select a particular vertical, and lay out the relevant standards and technologies that affect the evolving IoT hyperspace. The pace of the columns will start broadly with the vision of narrowing the subject of subsequent articles toward more specific applications of standards, whether in the development, application, test, or commissioning of IoT technologies.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125353671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT Technologies and Privacy in a Data-Bloated Society: Where Do We Stand in the Fight to Prepare for the Next Pandemic? 数据膨胀社会中的物联网技术和隐私:我们在为下一次大流行做准备的斗争中处于什么位置?
Pub Date : 2020-12-01 DOI: 10.1109/MIOT.2020.9319621
R. Giaffreda, Mattia Antonini
In this column we plan to take a tour around different physical locations in the world with the objective of highlighting the peculiarities of the trendiest IoT-related applications in selected regions. Thus, the “IoT World” will certainly be physical, but traveling around it shall also expose to the readers how different application domains have been addressed, with particular attention to business sustainability.
在本专栏中,我们计划环游世界不同的物理地点,目的是突出在选定地区最流行的物联网相关应用的特点。因此,“物联网世界”肯定是物理的,但在它周围旅行也将向读者展示不同的应用领域是如何解决的,特别关注业务可持续性。
{"title":"IoT Technologies and Privacy in a Data-Bloated Society: Where Do We Stand in the Fight to Prepare for the Next Pandemic?","authors":"R. Giaffreda, Mattia Antonini","doi":"10.1109/MIOT.2020.9319621","DOIUrl":"https://doi.org/10.1109/MIOT.2020.9319621","url":null,"abstract":"In this column we plan to take a tour around different physical locations in the world with the objective of highlighting the peculiarities of the trendiest IoT-related applications in selected regions. Thus, the “IoT World” will certainly be physical, but traveling around it shall also expose to the readers how different application domains have been addressed, with particular attention to business sustainability.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart IoT Solutions for Combating the COVID-19 Pandemic 应对COVID-19大流行的智能物联网解决方案
Pub Date : 2020-06-01 DOI: 10.1109/mwc.2020.9116082
Z. Fadlullah, M. Fouda, A. Pathan, N. Nasser, A. Benslimane, Ying-Dar Lin
The articles in this special issue that focuses on smart Internet of Things (IoT) solutions for combating the COVID-19 pandemic.
本期特刊关注的是应对COVID-19大流行的智能物联网(IoT)解决方案。
{"title":"Smart IoT Solutions for Combating the COVID-19 Pandemic","authors":"Z. Fadlullah, M. Fouda, A. Pathan, N. Nasser, A. Benslimane, Ying-Dar Lin","doi":"10.1109/mwc.2020.9116082","DOIUrl":"https://doi.org/10.1109/mwc.2020.9116082","url":null,"abstract":"The articles in this special issue that focuses on smart Internet of Things (IoT) solutions for combating the COVID-19 pandemic.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Off-Chain Trusted Computing 链下可信计算
Pub Date : 2020-06-01 DOI: 10.1109/miot.2020.9125420
Lei Zhang, Sanjay Bakshi, J. Zao
Trustworthiness and privacy are of primary concern as companies connect their manufacturing and logistic infrastructures to the Internet of Things (IoT). They want to reap the benefit of automated asset management, process control and predictive maintenance. However, to do so effectively, companies need to facilitate information sharing among trustworthy partners while complying with data protection and privacy preserving regulations. In this respect, Distributed Ledgers (a.k.a. Blockchains) offer a viable solution by enabling their participants to discover one another and establish peer-to-peer trust relations without a centralized intermediary. Nonetheless, this approach comes with a caveat: Blockchains may not scale well. Since each Blockchain-based transaction must be attested by multiple Blockchain participants, it may take time to complete a transaction. Besides, since each transaction is processed by multiple participants, information privacy is sacrificed in exchange for Byzantine fault tolerance and trustworthiness of the results. To overcome these shortcomings of on-chain computing, OffChain Trusted Computing was devised to offload the bulk of transaction workload to the Trusted Execution Environments (TEEs) established in the off-chain computing nodes that are trusted by the Blockchain participants, leaving only the execution of business logic to on-chain computing. This hybrid approach greatly increases the efficiency and speed of the transactions. Moreover, by concealing the input and output of the TEEs with data encryption and verifying the states of transaction execution in the TEEs through remote attestation, Off-Chain Trusted Computing can preserve the information privacy of data providers and confirm the proper execution of the business logic. This column provides an introduction to this new technology by explaining its operation, surveying its standardized application programming interfaces (APIs) and mentioning an example application.
当企业将其制造和物流基础设施连接到物联网(IoT)时,可靠性和隐私是首要考虑的问题。他们希望从自动化资产管理、过程控制和预测性维护中获益。然而,为了有效地做到这一点,公司需要促进值得信赖的合作伙伴之间的信息共享,同时遵守数据保护和隐私保护法规。在这方面,分布式账本(又名区块链)提供了一个可行的解决方案,使参与者能够在没有集中中介的情况下发现彼此并建立点对点信任关系。尽管如此,这种方法有一个警告:区块链可能无法很好地扩展。由于每个基于区块链的交易必须由多个区块链参与者验证,因此完成交易可能需要时间。此外,由于每笔交易都是由多个参与者处理的,因此牺牲了信息隐私,以换取拜占庭式的容错性和结果的可信度。为了克服链上计算的这些缺点,OffChain Trusted computing被设计出来,将大量的事务工作负载卸载到受区块链参与者信任的链下计算节点上建立的Trusted Execution Environments (tee),只将业务逻辑的执行留给链上计算。这种混合方法大大提高了事务的效率和速度。此外,通过数据加密隐藏tee的输入和输出,并通过远程认证验证tee中的事务执行状态,链下可信计算可以保护数据提供者的信息隐私,并确认业务逻辑的正确执行。本专栏通过解释这种新技术的操作、考察其标准化应用程序编程接口(api)并提到一个示例应用程序,介绍了这种新技术。
{"title":"Off-Chain Trusted Computing","authors":"Lei Zhang, Sanjay Bakshi, J. Zao","doi":"10.1109/miot.2020.9125420","DOIUrl":"https://doi.org/10.1109/miot.2020.9125420","url":null,"abstract":"Trustworthiness and privacy are of primary concern as companies connect their manufacturing and logistic infrastructures to the Internet of Things (IoT). They want to reap the benefit of automated asset management, process control and predictive maintenance. However, to do so effectively, companies need to facilitate information sharing among trustworthy partners while complying with data protection and privacy preserving regulations. In this respect, Distributed Ledgers (a.k.a. Blockchains) offer a viable solution by enabling their participants to discover one another and establish peer-to-peer trust relations without a centralized intermediary. Nonetheless, this approach comes with a caveat: Blockchains may not scale well. Since each Blockchain-based transaction must be attested by multiple Blockchain participants, it may take time to complete a transaction. Besides, since each transaction is processed by multiple participants, information privacy is sacrificed in exchange for Byzantine fault tolerance and trustworthiness of the results. To overcome these shortcomings of on-chain computing, OffChain Trusted Computing was devised to offload the bulk of transaction workload to the Trusted Execution Environments (TEEs) established in the off-chain computing nodes that are trusted by the Blockchain participants, leaving only the execution of business logic to on-chain computing. This hybrid approach greatly increases the efficiency and speed of the transactions. Moreover, by concealing the input and output of the TEEs with data encryption and verifying the states of transaction execution in the TEEs through remote attestation, Off-Chain Trusted Computing can preserve the information privacy of data providers and confirm the proper execution of the business logic. This column provides an introduction to this new technology by explaining its operation, surveying its standardized application programming interfaces (APIs) and mentioning an example application.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Standards Matters/Mentor's Musings on a Standardization Conundrum: Blockchain vs. DLTs 标准问题/导师对标准化难题的思考:区块链与dlt
Pub Date : 2020-06-01 DOI: 10.1109/miot.2020.9125422
N. Narang
{"title":"Standards Matters/Mentor's Musings on a Standardization Conundrum: Blockchain vs. DLTs","authors":"N. Narang","doi":"10.1109/miot.2020.9125422","DOIUrl":"https://doi.org/10.1109/miot.2020.9125422","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standards Matters/Mentor's Musings on IoT 2.0: IoT Coming of Age 标准事项/导师对物联网2.0的思考:物联网时代的到来
Pub Date : 2020-06-01 DOI: 10.1109/miot.2020.9125421
N. Narang
{"title":"Standards Matters/Mentor's Musings on IoT 2.0: IoT Coming of Age","authors":"N. Narang","doi":"10.1109/miot.2020.9125421","DOIUrl":"https://doi.org/10.1109/miot.2020.9125421","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123641087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spectrum Vulnerabilities - Part II : Recommendations for Identifying and Understanding Spectrum Vulnerabilities 频谱漏洞-第二部分:识别和理解频谱漏洞的建议
Pub Date : 2020-03-01 DOI: 10.1109/miot.2020.9063396
Chris Laughlin
Exploited spectrum vulnerabilities can result in a range of consequences. At their most inconsequential, they may disrupt an individual or small group from communicating. More significantly, they can facilitate large-scale disruptions to communications, resulting in social, economic, and perhaps even unintended physical harm. At their worst, spectrum vulnerabilities can be used to cause intentional physical injuries. For example, individual and small-scale bad actors could use GPS spoofing to direct a person into harm’s way, disrupt vehicle-to-vehicle communications to cause accidents, or hack automated medical devices, such as insulin pumps or heart defibrillators, with fatal results. In a military setting, techniques like spectral herding can force enemies to communicate on chosen spectrum bands with greater vulnerabilities that can then be used to locate targets or send conflicting communications, as is thought to have occurred to Ukrainian forces during Russia’s 2014 annexation of Crimea. Despite these risks, most spectrum vulnerabilities remain unaddressed. In Part I of this column, I discussed the systematic and technological challenges to identifying and understanding spectrum vulnerabilities. These challenges were identified at a roundtable discussion convened by Silicon Flatirons, which included experts from government, academia, and industry. I was permitted to report on conclusions reached from the discussion. In Part II, I reveal some of the solutions offered by the roundtable participants to the challenges they identified. These solutions are a starting point, they are not fully developed, nor do they fully address each challenge. Nevertheless, I take a similar approach to presenting the solutions as I did in Part I, beginning with those that address systematic challenges and concluding with those that address technological challenges.1
利用频谱漏洞可能导致一系列后果。在最无关紧要的情况下,它们可能会干扰个人或小组的交流。更重要的是,它们可能导致大规模的通信中断,造成社会、经济甚至意外的人身伤害。在最糟糕的情况下,频谱漏洞可能被用来造成故意的身体伤害。例如,个人和小规模的不法分子可以利用GPS欺骗将人引向危险的道路,破坏车对车的通信造成事故,或者侵入胰岛素泵或心脏除颤器等自动化医疗设备,造成致命的后果。在军事环境中,像频谱放牧这样的技术可以迫使敌人在选定的频谱频段上进行通信,这些频段的脆弱性更大,然后可以用来定位目标或发送相互冲突的通信,就像2014年俄罗斯吞并克里米亚期间乌克兰军队所发生的那样。尽管存在这些风险,但大多数频谱漏洞仍未得到解决。在本专栏的第一部分中,我讨论了识别和理解频谱漏洞的系统和技术挑战。在Silicon flatiron召集的圆桌讨论会上,来自政府、学术界和工业界的专家确定了这些挑战。我获准就讨论得出的结论作报告。在第二部分中,我将揭示圆桌会议参与者针对他们确定的挑战提出的一些解决方案。这些解决方案只是一个起点,它们还没有完全开发出来,也没有完全解决每一个挑战。尽管如此,我还是采用了与第一部分类似的方法来呈现解决方案,从解决系统挑战的方法开始,以解决技术挑战的方法结束
{"title":"Spectrum Vulnerabilities - Part II : Recommendations for Identifying and Understanding Spectrum Vulnerabilities","authors":"Chris Laughlin","doi":"10.1109/miot.2020.9063396","DOIUrl":"https://doi.org/10.1109/miot.2020.9063396","url":null,"abstract":"Exploited spectrum vulnerabilities can result in a range of consequences. At their most inconsequential, they may disrupt an individual or small group from communicating. More significantly, they can facilitate large-scale disruptions to communications, resulting in social, economic, and perhaps even unintended physical harm. At their worst, spectrum vulnerabilities can be used to cause intentional physical injuries. For example, individual and small-scale bad actors could use GPS spoofing to direct a person into harm’s way, disrupt vehicle-to-vehicle communications to cause accidents, or hack automated medical devices, such as insulin pumps or heart defibrillators, with fatal results. In a military setting, techniques like spectral herding can force enemies to communicate on chosen spectrum bands with greater vulnerabilities that can then be used to locate targets or send conflicting communications, as is thought to have occurred to Ukrainian forces during Russia’s 2014 annexation of Crimea. Despite these risks, most spectrum vulnerabilities remain unaddressed. In Part I of this column, I discussed the systematic and technological challenges to identifying and understanding spectrum vulnerabilities. These challenges were identified at a roundtable discussion convened by Silicon Flatirons, which included experts from government, academia, and industry. I was permitted to report on conclusions reached from the discussion. In Part II, I reveal some of the solutions offered by the roundtable participants to the challenges they identified. These solutions are a starting point, they are not fully developed, nor do they fully address each challenge. Nevertheless, I take a similar approach to presenting the solutions as I did in Part I, beginning with those that address systematic challenges and concluding with those that address technological challenges.1","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Internet Things Mag.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1