首页 > 最新文献

International Journal of Engineering and Applied Computer Science最新文献

英文 中文
In Vitro Micropropagation Studies Cotyledonary Explants Of Trichosanthes Anguina (L) 栝楼子叶外植体离体微繁研究
Pub Date : 2022-04-30 DOI: 10.24032/ijeacs/0403/003
M. Venkateshwaralu
A method for Invitro Micropropagation Through Cotyledonary Explants of Trichosanthes anguina was exercised from 10-15 days of young stage explants [1, 2]. Developed a protocol for cotyledonary explants cultures, callus induction, and regeneration through cotyledon callus tissue [3, 4]. Multiple shoot formation was promoted by BAP 1.0 mg/l to 3.0 to 5.0 mg/l and higher combination with NAA 3.0 to 4.0 mg/l Kn [5, 6]. Invitro produced small shoots were green callus induced to cotyledonary callus cultures green compact small shoots buds were induced in 16-20 days cultures respectively on Ms. Medium.
从幼年期外植体培养10-15天开始,研究了一种利用三角鱼子叶外植体进行体外微繁的方法[1,2]。制定子叶外植体培养、愈伤组织诱导和通过子叶愈伤组织再生的方案[3,4]。BAP 1.0 ~ 3.0 ~ 5.0 mg/l和NAA 3.0 ~ 4.0 mg/l Kn对多芽形成有促进作用[5,6]。在Ms. Medium培养基上培养16 ~ 20 d分别诱导出绿色致密小芽芽。
{"title":"In Vitro Micropropagation Studies Cotyledonary Explants Of Trichosanthes Anguina (L)","authors":"M. Venkateshwaralu","doi":"10.24032/ijeacs/0403/003","DOIUrl":"https://doi.org/10.24032/ijeacs/0403/003","url":null,"abstract":"A method for Invitro Micropropagation Through Cotyledonary Explants of Trichosanthes anguina was exercised from 10-15 days of young stage explants [1, 2]. Developed a protocol for cotyledonary explants cultures, callus induction, and regeneration through cotyledon callus tissue [3, 4]. Multiple shoot formation was promoted by BAP 1.0 mg/l to 3.0 to 5.0 mg/l and higher combination with NAA 3.0 to 4.0 mg/l Kn [5, 6]. Invitro produced small shoots were green callus induced to cotyledonary callus cultures green compact small shoots buds were induced in 16-20 days cultures respectively on Ms. Medium.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131575734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Literature Review on Energy Healing Techniques and Biofield – Detection and Scientific Analysis 能量治疗技术与生物场检测与科学分析的文献综述
Pub Date : 2022-04-15 DOI: 10.24032/ijeacs/0403/002
Jeo Joy A, Suresh Kumar Rudrahithlu, Molly Joy
Energy Healing techniques are considered as one of the age-old practices dating its origin back to the ancient scriptures, to be precise much earlier than those. Scientific technology has been incorporated on a small scale into these in recent decades, beginning in the twentieth century. Even in the twenty-first century, little progress has been made in this area. This literature review is an eye-opener for the world to get familiarized with various energy healing techniques and their basic functionality. The various technical devices used for the detection and treatment of the biofield are depicted in brief in this review. The modalities in which Artificial Intelligence is used in various energy healing techniques are introduced here. The review culminates with a note on the future scope of the Energy Healing techniques on a wider horizon incorporating Artificial Intelligence wherever necessary.
能量治疗技术被认为是一种古老的做法,其起源可以追溯到古代经文,准确地说,比那些要早得多。从20世纪开始,近几十年来,科学技术已被小规模地纳入其中。即使在二十一世纪,这方面也没有取得什么进展。这篇文献综述是一个大开眼界的世界去熟悉各种能量治疗技术和他们的基本功能。本文简要介绍了用于生物场检测和处理的各种技术设备。这里介绍了人工智能在各种能量治疗技术中使用的方式。这篇综述最后提到了能量治疗技术的未来范围,在更广阔的视野中,在必要的时候结合人工智能。
{"title":"A Literature Review on Energy Healing Techniques and Biofield – Detection and Scientific Analysis","authors":"Jeo Joy A, Suresh Kumar Rudrahithlu, Molly Joy","doi":"10.24032/ijeacs/0403/002","DOIUrl":"https://doi.org/10.24032/ijeacs/0403/002","url":null,"abstract":"Energy Healing techniques are considered as one of the age-old practices dating its origin back to the ancient scriptures, to be precise much earlier than those. Scientific technology has been incorporated on a small scale into these in recent decades, beginning in the twentieth century. Even in the twenty-first century, little progress has been made in this area. This literature review is an eye-opener for the world to get familiarized with various energy healing techniques and their basic functionality. The various technical devices used for the detection and treatment of the biofield are depicted in brief in this review. The modalities in which Artificial Intelligence is used in various energy healing techniques are introduced here. The review culminates with a note on the future scope of the Energy Healing techniques on a wider horizon incorporating Artificial Intelligence wherever necessary.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Framework for Selecting Elicitation Technique based on Attribute Mapping 一种基于属性映射的启发技术选择框架
Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/001
Attique Ahmed, M. Naeem
The software development process is completely based on the requirements of stakeholders. If the requirements of stakeholders are being integrated into the proposed system, then it can be assumed that the end product is going to be optimal and successful. To achieve a successful product, different Requirement Elicitation Techniques (RET) are being practiced. The selection of a suitable RET is based on the nature of the product being developed. So, a single RET doesn’t fit all products. In this paper, we differentiate all RETs from each other which makes it easier for an analyst to choose suitable RET from the available ones. We further designed a novel mapping framework that extracts the best suited RET to any software based on its attributes. We have further implemented the proposed framework by using an online vehicle booking system as a running example.
软件开发过程完全基于涉众的需求。如果涉众的需求被集成到提议的系统中,那么可以假设最终产品将是最优的和成功的。为了获得一个成功的产品,需要使用不同的需求引出技术(RET)。选择合适的RET是基于正在开发的产品的性质。所以,单一的RET并不适用于所有的产品。在本文中,我们将所有RET彼此区分开来,这使得分析师更容易从可用的RET中选择合适的RET。我们进一步设计了一个新的映射框架,该框架可以根据任何软件的属性提取最适合的RET。我们以网上车辆预约系统为例,进一步落实建议的架构。
{"title":"A Novel Framework for Selecting Elicitation Technique based on Attribute Mapping","authors":"Attique Ahmed, M. Naeem","doi":"10.24032/ijeacs/0402/001","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/001","url":null,"abstract":"The software development process is completely based on the requirements of stakeholders. If the requirements of stakeholders are being integrated into the proposed system, then it can be assumed that the end product is going to be optimal and successful. To achieve a successful product, different Requirement Elicitation Techniques (RET) are being practiced. The selection of a suitable RET is based on the nature of the product being developed. So, a single RET doesn’t fit all products. In this paper, we differentiate all RETs from each other which makes it easier for an analyst to choose suitable RET from the available ones. We further designed a novel mapping framework that extracts the best suited RET to any software based on its attributes. We have further implemented the proposed framework by using an online vehicle booking system as a running example.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126793467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of the Bus Topology Network for Effectual Data Distribution 有效数据分发的总线拓扑网络性能分析
Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/007
Ojo Jayeola Adaramola, Jamiu Olasina
Stability, reliability, efficiency, and dependability necessitate a higher performance feature-based system in Ethernet LAN to meet the prevalent emergent technology of 5G and beyond 5G in the domain of networking. LAN technology has experienced the most progression since it came to reality. Despite its ability to achieve promising performance, the technology still keeps some topology characteristics that have a greater influence on its performance. This paper, therefore, addresses the high packet loss experienced in bus topology by investigating the performance of bus topology in four practical scenarios consisting of 10, 20, 30, and 40 nodes. In some applications, traffic was cautiously selected and configured in the application configuration to generate traffic for the modeling. These include HTTP, FTP, email, and databases before they were finally defined in the profile configuration. Substantial global and object statistics such as delay (sec), traffic-sent (bits/sec), traffic-received (bits/sec) for global, and throughput (bits/sec) for global were considered as network metrics for simulation in the OPNET environment. The results obtained proved that as the number of nodes increased, more traffic (bits/sec) were sent and received, more messages were delivered (bits/sec), the delay (sec) was lowered, but greater bit errors per packet were experienced in the network, thus making the bus topology not very suitable for a larger network.
稳定、可靠、高效、可靠要求以太网局域网系统具有更高的性能特征,以满足网络领域流行的5G及5G以上新兴技术。局域网技术自问世以来经历了最大的进步。尽管该技术能够实现有希望的性能,但该技术仍然保留了一些对其性能有较大影响的拓扑特征。因此,本文通过研究总线拓扑在由10、20、30和40个节点组成的四种实际场景中的性能,解决了总线拓扑中遇到的高丢包问题。在一些应用程序中,在应用程序配置中谨慎地选择和配置流量,以生成用于建模的流量。这些包括HTTP、FTP、电子邮件和数据库,然后在配置文件配置中最终定义它们。大量的全局和对象统计数据,如延迟(秒)、发送流量(位/秒)、接收流量(位/秒)(全局)和吞吐量(位/秒)(全局),被认为是OPNET环境中仿真的网络指标。得到的结果证明,随着节点数量的增加,发送和接收的流量(bits/sec)增加,传递的消息(bits/sec)增加,延迟(sec)降低,但网络中每个数据包的误码较大,使得总线拓扑不太适合较大的网络。
{"title":"Performance Analysis of the Bus Topology Network for Effectual Data Distribution","authors":"Ojo Jayeola Adaramola, Jamiu Olasina","doi":"10.24032/ijeacs/0402/007","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/007","url":null,"abstract":"Stability, reliability, efficiency, and dependability necessitate a higher performance feature-based system in Ethernet LAN to meet the prevalent emergent technology of 5G and beyond 5G in the domain of networking. LAN technology has experienced the most progression since it came to reality. Despite its ability to achieve promising performance, the technology still keeps some topology characteristics that have a greater influence on its performance. This paper, therefore, addresses the high packet loss experienced in bus topology by investigating the performance of bus topology in four practical scenarios consisting of 10, 20, 30, and 40 nodes. In some applications, traffic was cautiously selected and configured in the application configuration to generate traffic for the modeling. These include HTTP, FTP, email, and databases before they were finally defined in the profile configuration. Substantial global and object statistics such as delay (sec), traffic-sent (bits/sec), traffic-received (bits/sec) for global, and throughput (bits/sec) for global were considered as network metrics for simulation in the OPNET environment. The results obtained proved that as the number of nodes increased, more traffic (bits/sec) were sent and received, more messages were delivered (bits/sec), the delay (sec) was lowered, but greater bit errors per packet were experienced in the network, thus making the bus topology not very suitable for a larger network.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130331019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secured Text Encryption with Near Field Communication (NFC) using Huffman Compression 基于哈夫曼压缩的近场通信安全文本加密
Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/002
Adeniji Oluwashola David, Akinola Olaniyan Eliais
There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card’s information can be traced to another card or an electronic device. These issues allow for unauthorized access to the data on the Mifare classic 1k‐enabled device data which are transmitted between the device and reader. The information produced by a Mifare classic 1k enabled credential system for a stated status is also a concern. The focus of the study is to develop an algorithm to secure information written to the Near Field Communication tag. The performance of the system shows that when n=50, with elapse time of 1.2ms the unique character was 64, likewise at optimal when n=200, the elapse time was 1ms with the unique character of 62. This result shows a decline of the symbol-by-symbol restriction with elapses time which can secure the information of the unique character.
由于Mifare classic 1k - a射频识别卡的脆弱性,对写入该卡的信息安全性提出了很多挑战。该卡的信息可以追踪到另一张卡或电子设备上。这些问题允许未经授权访问Mifare经典1k启用设备上的数据,这些数据在设备和阅读器之间传输。启用Mifare classic 1k的凭据系统为声明的状态生成的信息也是一个问题。研究的重点是开发一种算法来保护写入近场通信标签的信息。系统性能表明,当n=50时,运行时间为1.2ms,唯一字符数为64;当n=200时,运行时间为1ms,唯一字符数为62。结果表明,随着时间的推移,符号对符号的限制逐渐减小,可以保证唯一字符信息的安全。
{"title":"A Secured Text Encryption with Near Field Communication (NFC) using Huffman Compression","authors":"Adeniji Oluwashola David, Akinola Olaniyan Eliais","doi":"10.24032/ijeacs/0402/002","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/002","url":null,"abstract":"There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card’s information can be traced to another card or an electronic device. These issues allow for unauthorized access to the data on the Mifare classic 1k‐enabled device data which are transmitted between the device and reader. The information produced by a Mifare classic 1k enabled credential system for a stated status is also a concern. The focus of the study is to develop an algorithm to secure information written to the Near Field Communication tag. The performance of the system shows that when n=50, with elapse time of 1.2ms the unique character was 64, likewise at optimal when n=200, the elapse time was 1ms with the unique character of 62. This result shows a decline of the symbol-by-symbol restriction with elapses time which can secure the information of the unique character.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Most Common Encryption Algorithms 最常用的加密算法分析
Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/003
Attiq Ahmed, Muhammad Naeem
As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.
随着技术的出现,一切都尘埃落定,而就技术而言,这是专业的十年,数据的安全是这场竞赛的主要障碍。这是一个数据离用户只需点击一下的时代,因此数据需要更加安全,以避免未经授权的访问。为此,不同的数据安全领域也应运而生,以确保数据的安全性和保密性。在本调查报告中,我们将查找用于数据加密的所有技术,然后,我们比较这些技术,以提供最佳算法,以确保数据安全。在大多数情况下,我们都明确地说,对称加密技术是适用的,在少数情况下,建议使用非对称加密技术。首先,在我们的研究中,我们将两种技术相互比较,然后比较在上述类别下工作的所有算法的时间,效率,内存使用,延迟,密钥大小和几轮,这将导致根据输入数据显示最佳算法。
{"title":"Analysis of Most Common Encryption Algorithms","authors":"Attiq Ahmed, Muhammad Naeem","doi":"10.24032/ijeacs/0402/003","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/003","url":null,"abstract":"As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mangrove Ecotourism Information System Based on Digital Book and Online Reservations 基于数字图书和在线预订的红树林生态旅游信息系统
Pub Date : 2022-03-30 DOI: 10.24032/ijeacs/0402/005
I. E. Putra
Bali's tourism sector has faced serious challenges since the pandemic, with Bali's economic growth rate of -12.28% in the third quarter of 2020. Kampoeng Kepiting Mangrove Ecotourism located in Tuban, Kuta Badung district, Bali province is one of the tourism sectors which suffered a heavy impact. Before the pandemic, ecotourism visitors increased however during the pandemic, the number of visits decreased significantly. This study aims to develop a mangrove ecotourism information system, based on digital books and online reservations. The ecotourism digital book outlines the catalog of tour packages offered along with information on the mangrove tour packages for conservation and education. Based on the information from a digital book, potential visitors can use an online reservation application to make a reservation for tour packages and do payment by bank transfer. Once the payment process is done, visitors get digital vouchers to use the tour packages they have been reserved. The E-Voucher was used to visit the ecotourism of Kampoeng Kepiting. The development of a mangrove information system is expected to support the promotion of ecotourism in the recovery of ecotourism during the COVID-19 pandemic.
自疫情以来,巴厘岛旅游业面临严峻挑战,2020年第三季度巴厘岛经济增长率为-12.28%。Kampoeng Kepiting红树林生态旅游位于巴厘岛省库塔巴东区图班,是受到严重影响的旅游部门之一。疫情前生态旅游游客数量有所增加,疫情期间生态旅游游客数量明显减少。本研究旨在开发一个基于电子书和在线预订的红树林生态旅游信息系统。生态旅游电子书概述了旅游套餐的目录,以及红树林旅游套餐的保护和教育信息。根据电子图书的信息,潜在的游客可以使用在线预订应用程序预订旅游套餐,并通过银行转账付款。一旦付款流程完成,游客就会获得数字代金券,可以使用他们预订的旅游套餐。电子代金券被用来参观甘榜克宾亭的生态旅游。红树林信息系统的开发有望在2019冠状病毒病大流行期间支持促进生态旅游,恢复生态旅游。
{"title":"Mangrove Ecotourism Information System Based on Digital Book and Online Reservations","authors":"I. E. Putra","doi":"10.24032/ijeacs/0402/005","DOIUrl":"https://doi.org/10.24032/ijeacs/0402/005","url":null,"abstract":"Bali's tourism sector has faced serious challenges since the pandemic, with Bali's economic growth rate of -12.28% in the third quarter of 2020. Kampoeng Kepiting Mangrove Ecotourism located in Tuban, Kuta Badung district, Bali province is one of the tourism sectors which suffered a heavy impact. Before the pandemic, ecotourism visitors increased however during the pandemic, the number of visits decreased significantly. This study aims to develop a mangrove ecotourism information system, based on digital books and online reservations. The ecotourism digital book outlines the catalog of tour packages offered along with information on the mangrove tour packages for conservation and education. Based on the information from a digital book, potential visitors can use an online reservation application to make a reservation for tour packages and do payment by bank transfer. Once the payment process is done, visitors get digital vouchers to use the tour packages they have been reserved. The E-Voucher was used to visit the ecotourism of Kampoeng Kepiting. The development of a mangrove information system is expected to support the promotion of ecotourism in the recovery of ecotourism during the COVID-19 pandemic.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Engineering and Applied Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1