首页 > 最新文献

Applied Computing and Intelligence最新文献

英文 中文
Affective algorithmic composition of music: A systematic review 音乐的情感算法作曲:系统回顾
Pub Date : 1900-01-01 DOI: 10.3934/aci.2023003
Abigail Wiafe, P. Fränti
Affective music composition systems are known to trigger emotions in humans. However, the design of such systems to stimulate users' emotions continues to be a challenge because, studies that aggregate existing literature in the domain to help advance research and knowledge is limited. This study presents a systematic literature review on affective algorithmic composition systems. Eighteen primary studies were selected from IEEE Xplore, ACM Digital Library, SpringerLink, PubMed, ScienceDirect, and Google Scholar databases following a systematic review protocol. The findings revealed that there is a lack of a unique definition that encapsulates the various types of affective algorithmic composition systems. Accordingly, a unique definition is provided. The findings also show that most affective algorithmic composition systems are designed for games to provide background music. The generative composition method was the most used compositional approach. Overall, there was rather a low amount of research in the domain. Possible reasons for these trends are the lack of a common definition for affective music composition systems and also the lack of detailed documentation of the design, implementation and evaluation of the existing systems.
众所周知,情感音乐作曲系统会引发人类的情绪。然而,设计这样的系统来激发用户的情感仍然是一个挑战,因为汇总该领域现有文献以帮助推进研究和知识的研究是有限的。本文对情感算法作文系统进行了系统的文献综述。根据系统审查方案,从IEEE Xplore、ACM数字图书馆、SpringerLink、PubMed、ScienceDirect和Google Scholar数据库中选择了18项主要研究。研究结果表明,缺乏一个独特的定义来概括各种类型的情感算法组成系统。因此,提供了唯一的定义。研究结果还表明,大多数有效的算法作曲系统都是为游戏提供背景音乐而设计的。生成合成法是最常用的合成方法。总体而言,该领域的研究相当少。造成这些趋势的可能原因是缺乏对情感音乐作曲系统的共同定义,以及缺乏现有系统的设计、实施和评估的详细文件。
{"title":"Affective algorithmic composition of music: A systematic review","authors":"Abigail Wiafe, P. Fränti","doi":"10.3934/aci.2023003","DOIUrl":"https://doi.org/10.3934/aci.2023003","url":null,"abstract":"\u0000 Affective music composition systems are known to trigger emotions in humans. However, the design of such systems to stimulate users' emotions continues to be a challenge because, studies that aggregate existing literature in the domain to help advance research and knowledge is limited. This study presents a systematic literature review on affective algorithmic composition systems. Eighteen primary studies were selected from IEEE Xplore, ACM Digital Library, SpringerLink, PubMed, ScienceDirect, and Google Scholar databases following a systematic review protocol. The findings revealed that there is a lack of a unique definition that encapsulates the various types of affective algorithmic composition systems. Accordingly, a unique definition is provided. The findings also show that most affective algorithmic composition systems are designed for games to provide background music. The generative composition method was the most used compositional approach. Overall, there was rather a low amount of research in the domain. Possible reasons for these trends are the lack of a common definition for affective music composition systems and also the lack of detailed documentation of the design, implementation and evaluation of the existing systems.\u0000","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal clustering by merge-based branch-and-bound 基于合并的分支定界最优聚类
Pub Date : 1900-01-01 DOI: 10.3934/aci.2022004
P. Fränti, O. Virmajoki
We present a method to construct optimal clustering via a sequence of merge steps. We formulate the merge-based clustering as a minimum redundancy search tree, and then search the optimal clustering by a branch-and-bound technique. Optimal clustering is found regardless of the objective function used. We also consider two suboptimal polynomial time variants based on the proposed branch-and-bound technique. However, all variants are slow and has merely theoretical interest. We discuss the reasons for the results.
我们提出了一种通过一系列合并步骤来构造最优聚类的方法。我们将基于合并的聚类构造为最小冗余搜索树,然后利用分支定界技术搜索最优聚类。无论使用何种目标函数,都能找到最优聚类。我们还考虑了基于所提出的分支定界技术的两个次优多项式时间变量。然而,所有的变体都是缓慢的,只是理论上的兴趣。我们讨论了结果的原因。
{"title":"Optimal clustering by merge-based branch-and-bound","authors":"P. Fränti, O. Virmajoki","doi":"10.3934/aci.2022004","DOIUrl":"https://doi.org/10.3934/aci.2022004","url":null,"abstract":"\u0000 We present a method to construct optimal clustering via a sequence of merge steps. We formulate the merge-based clustering as a minimum redundancy search tree, and then search the optimal clustering by a branch-and-bound technique. Optimal clustering is found regardless of the objective function used. We also consider two suboptimal polynomial time variants based on the proposed branch-and-bound technique. However, all variants are slow and has merely theoretical interest. We discuss the reasons for the results.\u0000","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combining statistical, structural, and linguistic features for keyword extraction from web pages 结合统计、结构和语言特征,从网页中提取关键字
Pub Date : 1900-01-01 DOI: 10.3934/aci.2022007
H. Shah, P. Fränti
Keywords are commonly used to summarize text documents. In this paper, we perform a systematic comparison of methods for automatic keyword extraction from web pages. The methods are based on three different types of features: statistical, structural and linguistic. Statistical features are the most common, but there are other clues in web documents that can also be used. Structural features utilize styling codes like header tags and links, but also the structure of the web page. Linguistic features can be based on detecting synonyms, semantic similarity of the words and part-of-speech tagging, but also concept hierarchy or a concept graph derived from Wikipedia. We compare different types of features to find out the importance of each of them. One of the key results is that stop word removal and other pre-processing steps are the most critical. The most successful linguistic feature was a pre-constructed list of words that had no synonyms in WordNet. A new method called ACI‑rank is also compiled from the best working combination.
关键词通常用于总结文本文档。在本文中,我们进行了一个系统的比较方法自动关键字提取从网页。这些方法基于三种不同类型的特征:统计、结构和语言。统计特征是最常见的,但在web文档中也可以使用其他线索。结构特性利用样式代码,如标题标签和链接,以及网页的结构。语言特征可以基于同义词检测、词的语义相似性和词性标注,也可以基于概念层次或来自维基百科的概念图。我们比较不同类型的特征,找出每一个特征的重要性。其中一个关键的结果是,停止词删除和其他预处理步骤是最关键的。最成功的语言特征是一个预先构建的单词列表,这些单词在WordNet中没有同义词。一种称为ACI - rank的新方法也是从最佳工作组合中编译出来的。
{"title":"Combining statistical, structural, and linguistic features for keyword extraction from web pages","authors":"H. Shah, P. Fränti","doi":"10.3934/aci.2022007","DOIUrl":"https://doi.org/10.3934/aci.2022007","url":null,"abstract":"\u0000\u0000Keywords are commonly used to summarize text documents. In this paper, we perform a systematic comparison of methods for automatic keyword extraction from web pages. The methods are based on three different types of features: statistical, structural and linguistic. Statistical features are the most common, but there are other clues in web documents that can also be used. Structural features utilize styling codes like header tags and links, but also the structure of the web page. Linguistic features can be based on detecting synonyms, semantic similarity of the words and part-of-speech tagging, but also concept hierarchy or a concept graph derived from Wikipedia. We compare different types of features to find out the importance of each of them. One of the key results is that stop word removal and other pre-processing steps are the most critical. The most successful linguistic feature was a pre-constructed list of words that had no synonyms in WordNet. A new method called ACI‑rank is also compiled from the best working combination.\u0000\u0000","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131602211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Definition modeling: literature review and dataset analysis 定义建模:文献综述和数据集分析
Pub Date : 1900-01-01 DOI: 10.3934/aci.2022005
Noah Gardner, Hafiz Khan, Chih-Cheng Hung
Definition modeling, the task of generating a definition for a given term, is a relatively new area of research applied in evaluating word embeddings. Automatic generation of dictionary quality definitions has many applications in natural language processing, such as sentiment analysis, machine translation, and word sense disambiguation. Additionally, definition modeling is also helpful for evaluating the quality of word embeddings. As more research is done in this field, the need for a summary of different applications, approaches, and obstacles grows apparent. This review provides an overview of the current research in definition modeling and a list of future directions and trends.
定义建模,即为给定术语生成定义的任务,是用于评估词嵌入的一个相对较新的研究领域。字典质量定义的自动生成在自然语言处理中有许多应用,例如情感分析、机器翻译和词义消歧。此外,定义建模也有助于评估词嵌入的质量。随着这一领域的研究越来越多,对不同的应用、方法和障碍进行总结的需求也越来越明显。本文综述了目前在定义建模方面的研究,并提出了未来的发展方向和趋势。
{"title":"Definition modeling: literature review and dataset analysis","authors":"Noah Gardner, Hafiz Khan, Chih-Cheng Hung","doi":"10.3934/aci.2022005","DOIUrl":"https://doi.org/10.3934/aci.2022005","url":null,"abstract":"Definition modeling, the task of generating a definition for a given term, is a relatively new area of research applied in evaluating word embeddings. Automatic generation of dictionary quality definitions has many applications in natural language processing, such as sentiment analysis, machine translation, and word sense disambiguation. Additionally, definition modeling is also helpful for evaluating the quality of word embeddings. As more research is done in this field, the need for a summary of different applications, approaches, and obstacles grows apparent. This review provides an overview of the current research in definition modeling and a list of future directions and trends.","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"799 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey COVID-19大流行对计算智能和网络安全的影响:调查
Pub Date : 1900-01-01 DOI: 10.3934/aci.2022010
Mohamed Wiem Mkaouer, T. Gaber, and Zaineb Chelly Dagdia
In late December 2019, the World Health Organization (WHO) announced the outbreak of a new type of coronavirus, named the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), also known as COVID-19. The deadliness of the virus has forced governments and countries to socially isolate their populations, causing a worldwide impact on the economy. Pandemic management has stressed health systems to work beyond their limits, adding more to the tragedy of losing millions of lives. As a natural response to such disasters, intelligent systems have been developed for various reasons related to virus detection, tracking and control. The social lockdown created a record level of online platforms and applications being used to resume professional and educational activities in a virtual environment. This has triggered an unprecedented growth in cybercrime. This paper presents the effects of the pandemic on computational intelligence and cybersecurity.
2019年12月下旬,世界卫生组织(世卫组织)宣布爆发了一种新型冠状病毒,称为严重急性呼吸综合征冠状病毒2 (SARS-CoV-2),也称为COVID-19。这种病毒的致命性迫使各国政府和国家对其人口进行社会隔离,对全球经济造成影响。大流行管理强调卫生系统必须超越其极限,这加剧了数百万人失去生命的悲剧。作为对此类灾难的自然反应,智能系统因各种原因被开发出来,与病毒检测、跟踪和控制有关。社交封锁创造了用于在虚拟环境中恢复专业和教育活动的在线平台和应用程序的创纪录水平。这引发了网络犯罪空前的增长。本文介绍了疫情对计算智能和网络安全的影响。
{"title":"Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey","authors":"Mohamed Wiem Mkaouer, T. Gaber, and Zaineb Chelly Dagdia","doi":"10.3934/aci.2022010","DOIUrl":"https://doi.org/10.3934/aci.2022010","url":null,"abstract":"In late December 2019, the World Health Organization (WHO) announced the outbreak of a new type of coronavirus, named the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), also known as COVID-19. The deadliness of the virus has forced governments and countries to socially isolate their populations, causing a worldwide impact on the economy. Pandemic management has stressed health systems to work beyond their limits, adding more to the tragedy of losing millions of lives. As a natural response to such disasters, intelligent systems have been developed for various reasons related to virus detection, tracking and control. The social lockdown created a record level of online platforms and applications being used to resume professional and educational activities in a virtual environment. This has triggered an unprecedented growth in cybercrime. This paper presents the effects of the pandemic on computational intelligence and cybersecurity.","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115551915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of eleven measures for estimating difficulty of open-loop TSP instances 估计开环TSP实例难度的11种方法的比较
Pub Date : 1900-01-01 DOI: 10.3934/aci.2021001
Lahari Sengupta, P. Fränti
From the theory of algorithms, we know that the time complexity of finding the optimal solution for a traveling salesman problem (TSP) grows exponentially with the number of targets. However, the size of the problem instance is not the only factor that affects its difficulty. In this paper, we review existing measures to estimate the difficulty of a problem instance. We also introduce MST branches and two other measures called greedy path and greedy gap. The idea of MST branches is to generate minimum spanning tree (MST) and then calculate the number of branches in the tree. A branch is a target, which is connected to at least two other targets. We perform an extensive comparison of 11 measures to see how well they correlate to human and computer performance. We evaluate the measures based on time complexity, prediction capability, suitability, and practicality. The results show that while the MST branches measure is simple, fast to compute, and does not need to have the optimal solution as a reference unlike many other measures. It correlates equally good or even better than the best of the previous measures ‑ the number of targets, and the number of targets on the convex hull.
从算法理论可知,寻找旅行推销员问题(TSP)最优解的时间复杂度随着目标数量的增加呈指数增长。然而,问题实例的大小并不是影响其难度的唯一因素。在本文中,我们回顾了现有的估计问题实例难度的方法。我们还引入了MST分支以及贪心路径和贪心间隙这两个度量。MST分支的思想是先生成最小生成树(minimum spanning tree, MST),然后计算树中分支的个数。分支是一个目标,它连接到至少两个其他目标。我们对11项措施进行了广泛的比较,以了解它们与人类和计算机性能的关系。我们根据时间复杂性、预测能力、适用性和实用性来评估这些措施。结果表明,虽然MST分支度量简单,计算速度快,并且不需要像许多其他度量一样有最优解作为参考。它与之前最好的测量方法——目标数量和凸壳上的目标数量——之间的相关性同样好,甚至更好。
{"title":"Comparison of eleven measures for estimating difficulty of open-loop TSP instances","authors":"Lahari Sengupta, P. Fränti","doi":"10.3934/aci.2021001","DOIUrl":"https://doi.org/10.3934/aci.2021001","url":null,"abstract":"\u0000 From the theory of algorithms, we know that the time complexity of finding the optimal solution for a traveling salesman problem (TSP) grows exponentially with the number of targets. However, the size of the problem instance is not the only factor that affects its difficulty. In this paper, we review existing measures to estimate the difficulty of a problem instance. We also introduce MST branches and two other measures called greedy path and greedy gap. The idea of MST branches is to generate minimum spanning tree (MST) and then calculate the number of branches in the tree. A branch is a target, which is connected to at least two other targets. We perform an extensive comparison of 11 measures to see how well they correlate to human and computer performance. We evaluate the measures based on time complexity, prediction capability, suitability, and practicality. The results show that while the MST branches measure is simple, fast to compute, and does not need to have the optimal solution as a reference unlike many other measures. It correlates equally good or even better than the best of the previous measures ‑ the number of targets, and the number of targets on the convex hull.\u0000","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measurement data intrusion detection in industrial control systems based on unsupervised learning 基于无监督学习的工业控制系统测量数据入侵检测
Pub Date : 1900-01-01 DOI: 10.3934/aci.2021004
S. Mokhtari, K. Yen
Anomaly detection strategies in industrial control systems mainly investigate the transmitting network traffic called network intrusion detection system. However, The measurement intrusion detection system inspects the sensors data integrated into the supervisory control and data acquisition center to find any abnormal behavior. An approach to detect anomalies in the measurement data is training supervised learning models that can learn to classify normal and abnormal data. But, a labeled dataset consisting of abnormal behavior, such as attacks, or malfunctions is extremely hard to achieve. Therefore, the unsupervised learning strategy that does not require labeled data for being trained can be helpful to tackle this problem. This study evaluates the performance of unsupervised learning strategies in anomaly detection using measurement data in control systems. The most accurate algorithms are selected to train unsupervised learning models, and the results show an accuracy of 98% in stealthy attack detection.
工业控制系统中的异常检测策略主要研究传输网络的流量,称为网络入侵检测系统。而测量入侵检测系统通过检测集成到监控和数据采集中心的传感器数据,发现任何异常行为。检测测量数据异常的一种方法是训练监督学习模型,该模型可以学习对正常和异常数据进行分类。但是,包含异常行为(如攻击或故障)的标记数据集是非常难以实现的。因此,不需要标记数据进行训练的无监督学习策略可以帮助解决这个问题。本研究利用控制系统中的测量数据评估无监督学习策略在异常检测中的性能。选择最准确的算法来训练无监督学习模型,结果表明,隐身攻击检测的准确率达到98%。
{"title":"Measurement data intrusion detection in industrial control systems based on unsupervised learning","authors":"S. Mokhtari, K. Yen","doi":"10.3934/aci.2021004","DOIUrl":"https://doi.org/10.3934/aci.2021004","url":null,"abstract":"Anomaly detection strategies in industrial control systems mainly investigate the transmitting network traffic called network intrusion detection system. However, The measurement intrusion detection system inspects the sensors data integrated into the supervisory control and data acquisition center to find any abnormal behavior. An approach to detect anomalies in the measurement data is training supervised learning models that can learn to classify normal and abnormal data. But, a labeled dataset consisting of abnormal behavior, such as attacks, or malfunctions is extremely hard to achieve. Therefore, the unsupervised learning strategy that does not require labeled data for being trained can be helpful to tackle this problem. This study evaluates the performance of unsupervised learning strategies in anomaly detection using measurement data in control systems. The most accurate algorithms are selected to train unsupervised learning models, and the results show an accuracy of 98% in stealthy attack detection.","PeriodicalId":414924,"journal":{"name":"Applied Computing and Intelligence","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Applied Computing and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1