首页 > 最新文献

International Journal of communication and computer Technologies最新文献

英文 中文
Active Low Energy Outlay Routing Algorithm for Wireless Ad Hoc Network  无线自组织网络的主动低能耗路由算法
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/03.01.02
{"title":"Active Low Energy Outlay Routing Algorithm for Wireless Ad Hoc Network ","authors":"","doi":"10.31838/ijccts/03.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128187203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring and Control of Component Transfer and Packing through Conveyors Using PLC, SCADA and Mobile Application 利用PLC, SCADA和移动应用程序监控和控制通过输送机的组件转移和包装
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.sp01.09
S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji
The main objective of the project is to monitor and control the components that are being carried over the belt conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed component that is passed through the conveyer at any specified time. Power reduction and energy utilization is minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). The whole process can be controlled using the Android mobile application in which the conveyer is controlled wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where older automated conveyor systems would use in PLC and SCADA.
该项目的主要目标是使用PLC、SCADA和Android移动应用程序对带式输送机上携带的组件进行监控。通过PLC编程对输送机的控制过程进行控制。SCADA和MOBILE APPLICATION用于监控在任何指定时间通过输送机的已完成组件。通过高效的PLC编程,降低功耗和能源利用率。整个过程通过SCADA进行远程监控。输送机过程的报告生成是用SCADA编程的,如输送机周期时间,输送机空闲时间,这些数据可以自动保存在Excel数据格式(数据记录过程)中。整个过程可以使用Android移动应用程序进行控制,在该应用程序中,输送机在行业的特定区域进行无线控制。使用移动应用程序的输送机的可控范围也可以扩展到一个广泛的范围(除了工业场所)使用多个局域网连接。旧的自动输送系统将使用PLC和SCADA。
{"title":"Monitoring and Control of Component Transfer and Packing through Conveyors Using PLC, SCADA and Mobile Application","authors":"S. Jegandiravianath, A. Ajith, S. DharaniramT, M. Gokulnath, T. Balaji","doi":"10.31838/ijccts/07.sp01.09","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.09","url":null,"abstract":"The main objective of the project is to monitor and control the components that are being carried over the belt \u0000conveyers using PLC, SCADA and Android Mobile Application. The conveyer is controlled through the PLC \u0000programming for its control processes. SCADA and MOBILE APPLICATION are used to monitor the completed \u0000component that is passed through the conveyer at any specified time. Power reduction and energy utilization is \u0000minimized using Efficient PLC Programming. The entire process is Monitored and Controlled remotely using \u0000SCADA. The Report generation for the Conveyer process is programmed in SCADA like Conveyer Cycle time, \u0000Conveyer Idle Time and these data can be automatically saved in the Excel Data format (Data Logging Process). \u0000The whole process can be controlled using the Android mobile application in which the conveyer is controlled \u0000wireless in a Particular region of the Industry. The controllable range of the conveyor using the mobile application \u0000can also be extended to a wide range (apart from the industry premises) using multiple LAN connections. Where \u0000older automated conveyor systems would use in PLC and SCADA.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data Transmission In AODV Routing Protocol  AODV路由协议中的安全数据传输
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.09
K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari
Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.
在没有任何基础设施支持的移动和无线节点网络中进行信息交换,这种网络称为自组织网络。移动自组网(MANET)是一种能够独立运行的多跳、移动、无基础设施的无线网络。本文讨论了MANET中的一些基本路由协议,如目的地顺序距离矢量(DSDV)、动态源路由(DSR)、随需应变距离矢量(AODV)和区域路由协议(ZRP)。安全是manet的主要问题之一,因为它们是无基础设施和独立的。因此,在有安全需求的市场中,必须牢记两点:一是进行数据传输。本文的工作重点是实现路由和安全数据交换。在本课程中,我们使用非对称加密算法(如RSA)设计了Ad Hoc随需应变路由协议(AODV)。这是更有效率的,而且我们已经实施了安全技术,这样我们就可以防止数据在传输时丢失。关键词:自组网;密钥管理;移动自组网;
{"title":"Secure Data Transmission In AODV Routing Protocol ","authors":"K. Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari","doi":"10.31838/ijccts/01.02.09","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.09","url":null,"abstract":"Secure Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network (MANET) is multi-hop, mobile, infrastructure less wireless network which is capable of independent operation. In this paper we have been discussing some of the basic routing protocols in MANET like Destination Sequenced Distance Vector(DSDV), Dynamic Source Routing(DSR), Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP). Security is one of the principal issue in MANETs as they are infrastructure-less and independent. Therefore, in manet having security needs, there must be two considerations kept in mind: one to make a data transmission. Our endeavour in this paper would focus on achieving the routing and secure data exchange. In this course, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using asymmetric cryptographic algorithm such as RSA . Which is more efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. KeywordsAdhoc network, key management, mobile adhoc network, routing protocol, security.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An android application for exhibiting Statistical chronicle information  显示统计历史信息的android应用程序
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.01.02
{"title":"An android application for exhibiting Statistical chronicle information ","authors":"","doi":"10.31838/ijccts/07.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing Security of Single Sign on System through Advanced Encryption Standard  用高级加密标准分析单点登录系统的安全性
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.01.04
{"title":"Analyzing Security of Single Sign on System through Advanced Encryption Standard ","authors":"","doi":"10.31838/ijccts/02.01.04","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Data Routing with Security Keys  无线数据路由与安全密钥
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.02.11
{"title":"Wireless Data Routing with Security Keys ","authors":"","doi":"10.31838/ijccts/02.02.11","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.11","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preterm birth prognostic prediction using Cross domain data fusion  基于跨域数据融合的早产预后预测
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.01.03
{"title":"Preterm birth prognostic prediction using Cross domain data fusion ","authors":"","doi":"10.31838/ijccts/07.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform  基于提升小波变换的高速三维DWT VlSI结构图像处理
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.04
Senthilkumar.M, Uma.S
Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.
尽管JPEG标准中使用的基于dct的图像压缩方法近年来取得了很大的成功,但它仍有一些有待改进的特性。随着离散小波变换(DWT)的流行,图像压缩方法发生了根本性的变化,并被应用到新的JPEG 2000标准中,因此为了使其实际应用,必须以一种高效有效的方式存储和检索数字信息。离散小波变换(DWT)基于时间尺度表示。它提供了高效的多分辨率。采用卷积方法实现了小波变换。对于这样的实现,它需要大量的计算和大量的存储特性,这些特性不适合高速或低功耗应用程序。在此基础上,提出了一种基于高速提升的三维(DWT) VLSI架构。基于提升的DWT体系结构具有计算复杂性较低的优点,并且需要较少的内存。该提升方案具有就地计算小波变换、整数到整数小波变换、对称正、逆变换等优点。它使用1D-DWT的组合以及阶段之间的一组内存缓冲区。整个架构以高效的方式安排,以提高速度和实现更高的硬件利用率。它是高速VLSI应用的理想选择。关键词:离散小波变换,VLSI架构,提升,图像压缩,高速。
{"title":"High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform ","authors":"Senthilkumar.M, Uma.S","doi":"10.31838/ijccts/01.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.04","url":null,"abstract":"Although the DCT-based image compression method using in the JPEG standard has been very successful in the several years, it still has some properties to improvement. A fundamental shift in the image compression approach came after the discrete wavelet transform (DWT) became popular, and it is adopted in the new JPEG 2000 standard So the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. The Discrete Wavelet Transform (DWT) was based on time-scale representation. It provides efficient multi-resolution. DWT has been implemented by convolution method. For Such an implementation it requires a large number of computations and a large storage features that are not suitable for either high-speed or low-power applications. Hence the architecture for a high speed lifting based 3D (DWT) VLSI architecture is proposed. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory. This lifting scheme has several advantages, including in-place computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform. It uses a combination of 1D-DWT along with a set of memory buffers between the stages. The whole architecture was arranged in efficient way to speed up and achieve higher hardware utilization. It is desirable for high-speed VLSI applications. Keywords— Discrete Wavelet Transform, VLSI architecture, lifting, image compression, High-Speed.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A chaos based image encryption algorithm using Shimizu-Morioka system  基于Shimizu-Morioka系统的混沌图像加密算法
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.01.02
{"title":"A chaos based image encryption algorithm using Shimizu-Morioka system ","authors":"","doi":"10.31838/ijccts/04.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SENSOR NODE FAILURE DETECTION USING ROUND TRIP DELAY IN WIRELESS SENSOR NETWORK  无线传感器网络中基于往返时延的传感器节点故障检测
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/05.01.03
E.Sowmiya Dr.V.Chandrasekaran, Thindal, Erode
In these days, the application of Wireless Sensor Networks (WSNs) have been increased .Advance in microelectronic fabrication technology also reduces the manufacturing cost. Detecting node failures in Wireless Sensor Networks is very challenging because the network topology can be highly dynamic, the network may not always connected and the resources are limited . It becomes trend to deploy the large number of portable wireless sensors in Wireless Sensor Networks, in order to increase the Quality of Service (QoS). The QoS is mainly affected by the failure of sensor node .The sensor node failure increases with the increase in number of sensors in Wireless Sensor Networks. In order to maintain better QoS in such failure condition, Identifying and Detaching such faults are essential. In the proposed method the faulty sensor node is detected by measuring the Round Trip Delay (RTD) time of Discrete Round Trip paths and comparing them with threshold value. In proposed method, Scalability is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementation are almost equal, justifying the real time applicability of the investigated method.
近年来,无线传感器网络(WSNs)的应用越来越广泛,微电子制造技术的进步也降低了制造成本。在无线传感器网络中,由于网络拓扑结构是高度动态的,网络可能不总是连接,并且资源有限,因此节点故障检测是一个非常具有挑战性的问题。在无线传感器网络中部署大量便携式无线传感器以提高服务质量已成为趋势。在无线传感器网络中,随着传感器数量的增加,传感器节点的故障也随之增加。为了在这种故障状态下保持更好的QoS,必须对这种故障进行识别和分离。该方法通过测量离散往返路径的RTD (Round Trip Delay)时间并与阈值进行比较来检测故障传感器节点。通过在NS2中模拟具有大量传感器节点的wsn,验证了该方法的可扩展性。硬件和软件实现的RTD时间结果几乎相等,证明了所研究方法的实时适用性。
{"title":"SENSOR NODE FAILURE DETECTION USING ROUND TRIP DELAY IN WIRELESS SENSOR NETWORK ","authors":"E.Sowmiya Dr.V.Chandrasekaran, Thindal, Erode","doi":"10.31838/ijccts/05.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.03","url":null,"abstract":"In these days, the application of Wireless Sensor Networks (WSNs) have been increased .Advance in microelectronic fabrication technology also reduces the manufacturing cost. Detecting node failures in Wireless Sensor Networks is very challenging because the network topology can be highly dynamic, the network may not always connected and the resources are limited . It becomes trend to deploy the large number of portable wireless sensors in Wireless Sensor Networks, in order to increase the Quality of Service (QoS). The QoS is mainly affected by the failure of sensor node .The sensor node failure increases with the increase in number of sensors in Wireless Sensor Networks. In order to maintain better QoS in such failure condition, Identifying and Detaching such faults are essential. In the proposed method the faulty sensor node is detected by measuring the Round Trip Delay (RTD) time of Discrete Round Trip paths and comparing them with threshold value. In proposed method, Scalability is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementation are almost equal, justifying the real time applicability of the investigated method.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of communication and computer Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1