首页 > 最新文献

International Journal of Internet Protocol Technology最新文献

英文 中文
Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking 基于流量截止日期和流量大小的数据中心传输控制机制的研究
IF 0.3 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10054892
Xuesong Qiu, Tianfang Yu
{"title":"Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking","authors":"Xuesong Qiu, Tianfang Yu","doi":"10.1504/ijipt.2023.10054892","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054892","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image 基于图像的分散区块链识别罪犯面部分布与实时位置跟踪
IF 0.3 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10054246
M. Amjad, Sana Zeba
{"title":"Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image","authors":"M. Amjad, Sana Zeba","doi":"10.1504/ijipt.2023.10054246","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054246","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A constant temperature control system for indoor environments in buildings using internet of things 一种基于物联网的建筑室内环境恒温控制系统
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10060176
Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.
{"title":"A constant temperature control system for indoor environments in buildings using internet of things","authors":"Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.","doi":"10.1504/ijipt.2023.10060176","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10060176","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135263017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint 一种基于扰动损失约束的位置数据差分隐私保护方法
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10059167
Shasha Zhang, Ying Li, Haiyan Kang
{"title":"An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint","authors":"Shasha Zhang, Ying Li, Haiyan Kang","doi":"10.1504/ijipt.2023.10059167","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10059167","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVC-MST BWQLB Multicast over Software-Defined Networking 基于软件定义网络的SVC-MST BWQLB组播
IF 0.3 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10058807
Jirawat Thaenthong, Piyawit Tantisarkhornkhet, Jakapan Suaboot, Warodom Werapun
{"title":"SVC-MST BWQLB Multicast over Software-Defined Networking","authors":"Jirawat Thaenthong, Piyawit Tantisarkhornkhet, Jakapan Suaboot, Warodom Werapun","doi":"10.1504/ijipt.2023.10058807","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10058807","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"7 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP TCP拥塞控制算法的性能比较分析:弹性TCP与e-弹性TCP
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.133029
Vivek Kumar Jaiswal, Sanjeev Patel
The Transmission Control Protocol (TCP) is a widely used transport layer protocol for reliable IP networks. To handle congestion in the network due to various reasons many algorithms have been designed. In this paper, we have carried out a detailed analysis of the Elastic TCP congestion control algorithm which is based on delay and independent of Round-Trip Time (RTT). Elastic TCP uses a Window-correlated Weighting Function (WWF) for deciding the update of congestion window size. We have proposed an enhanced Elastic (e-Elastic) for further improvement of performance. These algorithms Elastic and e-Elastic are more suitable for the high and moderate Bandwidth-Delay Product (BDT) while we have tested it for moderate BDT on network simulator-3 (ns-3). Our proposed algorithm improves the average throughput with 5.11%, 10.14%, 10.69% and 11.07% over Elastic, CUBIC, Veno and New Reno, respectively.
TCP (Transmission Control Protocol)是一种广泛应用于可靠IP网络的传输层协议。为了处理由于各种原因引起的网络拥塞,人们设计了许多算法。本文详细分析了基于时延且不依赖于往返时间(RTT)的弹性TCP拥塞控制算法。弹性TCP使用窗口相关加权函数(WWF)来决定拥塞窗口大小的更新。我们提出了一个增强的Elastic (e-Elastic),以进一步提高性能。这些算法Elastic和e-Elastic更适合于高和中等带宽延迟积(BDT),我们已经在网络模拟器-3 (ns-3)上对其进行了中等带宽延迟积(BDT)测试。我们提出的算法比Elastic、CUBIC、Veno和New Reno分别提高了5.11%、10.14%、10.69%和11.07%的平均吞吐量。
{"title":"A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP","authors":"Vivek Kumar Jaiswal, Sanjeev Patel","doi":"10.1504/ijipt.2023.133029","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133029","url":null,"abstract":"The Transmission Control Protocol (TCP) is a widely used transport layer protocol for reliable IP networks. To handle congestion in the network due to various reasons many algorithms have been designed. In this paper, we have carried out a detailed analysis of the Elastic TCP congestion control algorithm which is based on delay and independent of Round-Trip Time (RTT). Elastic TCP uses a Window-correlated Weighting Function (WWF) for deciding the update of congestion window size. We have proposed an enhanced Elastic (e-Elastic) for further improvement of performance. These algorithms Elastic and e-Elastic are more suitable for the high and moderate Bandwidth-Delay Product (BDT) while we have tested it for moderate BDT on network simulator-3 (ns-3). Our proposed algorithm improves the average throughput with 5.11%, 10.14%, 10.69% and 11.07% over Elastic, CUBIC, Veno and New Reno, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cross encryption scheme for data security storage in cloud computing environment 一种云计算环境下数据安全存储的交叉加密方案
IF 0.3 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10054903
Jie Deng, Haiyan Kang
{"title":"A cross encryption scheme for data security storage in cloud computing environment","authors":"Jie Deng, Haiyan Kang","doi":"10.1504/ijipt.2023.10054903","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054903","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks 基于雾计算的高效物联网路由协议和低功耗网络路由协议
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.133031
Ankit Verma, Suman Deswal
The Internet of Things (IoT) is prevalent in the modern era because of its versatile application in every field. IoT solves real word problems through the connectivity of the internet. Smart devices in IoT control the environment and provide diverse utilities. IoT networks make human life easy by using next-generation technology. Even after various studies on IoT still, the major challenge is routing. Various algorithms are proposed but still remarkable performance is not achieved. The standard algorithm for low-power lossy network (RPL) protocol does not work well in parent selection for bulky networks. FOG-RPL is based on fog computing with an innovative objective function. In this paper, FOG-RPL is proposed and tested on the Cooja simulator with Contiki OS with quality parameters. The simulation of FOG-RPL is performed with performance parameters and results show that the packet loss ratio is 6% and the energy consumption is 0.6 mw, which is 11% more efficient than the existing algorithm.
物联网(IoT)因其在各个领域的广泛应用而在现代流行。物联网通过互联网的连接来解决现实世界的问题。物联网中的智能设备控制环境并提供各种实用程序。物联网网络通过使用下一代技术使人类的生活变得轻松。即使在对物联网进行了各种研究之后,主要的挑战仍然是路由。提出了各种算法,但仍然没有取得显著的性能。低功耗损耗网络(RPL)协议的标准算法在大容量网络中不能很好地选择父节点。fog - rpl基于具有创新目标函数的雾计算。本文提出了fogg - rpl,并在带有质量参数的Contiki OS的Cooja模拟器上进行了测试。采用性能参数对fogg - rpl进行仿真,结果表明,该算法丢包率为6%,能耗为0.6 mw,比现有算法效率提高11%。
{"title":"Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks","authors":"Ankit Verma, Suman Deswal","doi":"10.1504/ijipt.2023.133031","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133031","url":null,"abstract":"The Internet of Things (IoT) is prevalent in the modern era because of its versatile application in every field. IoT solves real word problems through the connectivity of the internet. Smart devices in IoT control the environment and provide diverse utilities. IoT networks make human life easy by using next-generation technology. Even after various studies on IoT still, the major challenge is routing. Various algorithms are proposed but still remarkable performance is not achieved. The standard algorithm for low-power lossy network (RPL) protocol does not work well in parent selection for bulky networks. FOG-RPL is based on fog computing with an innovative objective function. In this paper, FOG-RPL is proposed and tested on the Cooja simulator with Contiki OS with quality parameters. The simulation of FOG-RPL is performed with performance parameters and results show that the packet loss ratio is 6% and the energy consumption is 0.6 mw, which is 11% more efficient than the existing algorithm.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid encryption model for managing the data security in medical internet of things 用于医疗物联网数据安全管理的混合加密模型
IF 0.3 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-02-06 DOI: 10.1504/ijipt.2020.10026701
P. Jyotheeswari, N. Jeyanthi
Internet of things (IoT) creates communication between the sensor nodes and smart devices through the internet to collect the data. The utilisation of IoT in the medical field brings more advantage to the patients and doctors for effective monitoring. The confidentiality of the medical data is a crucial factor need to be taken care of by the medical- IoT (M-IoT). This paper concentrates on developing a secure mechanism for medical data management. In this paper, we develop an architecture for managing the large volumes of medical data generated by the sensor nodes. This architecture will provide secure communication for data sharing among doctors and patients in normal and emergency conditions. As a next step, we propose the security mechanism for improving the data integrity and confidentiality. The proposed mechanism uses symmetric encryption and attribute-based encryption to achieve the performance. The simulation results prove the efficiency of the proposed system.
物联网(IoT)通过互联网在传感器节点和智能设备之间创建通信,以收集数据。物联网在医疗领域的应用为患者和医生的有效监测带来了更多优势。医疗数据的保密性是医疗物联网(M-IoT)需要注意的一个关键因素。本文致力于开发一种安全的医疗数据管理机制。在本文中,我们开发了一种用于管理传感器节点生成的大量医疗数据的架构。该架构将在正常和紧急情况下为医生和患者之间的数据共享提供安全通信。作为下一步,我们提出了提高数据完整性和机密性的安全机制。所提出的机制使用对称加密和基于属性的加密来实现性能。仿真结果证明了该系统的有效性。
{"title":"Hybrid encryption model for managing the data security in medical internet of things","authors":"P. Jyotheeswari, N. Jeyanthi","doi":"10.1504/ijipt.2020.10026701","DOIUrl":"https://doi.org/10.1504/ijipt.2020.10026701","url":null,"abstract":"Internet of things (IoT) creates communication between the sensor nodes and smart devices through the internet to collect the data. The utilisation of IoT in the medical field brings more advantage to the patients and doctors for effective monitoring. The confidentiality of the medical data is a crucial factor need to be taken care of by the medical- IoT (M-IoT). This paper concentrates on developing a secure mechanism for medical data management. In this paper, we develop an architecture for managing the large volumes of medical data generated by the sensor nodes. This architecture will provide secure communication for data sharing among doctors and patients in normal and emergency conditions. As a next step, we propose the security mechanism for improving the data integrity and confidentiality. The proposed mechanism uses symmetric encryption and attribute-based encryption to achieve the performance. The simulation results prove the efficiency of the proposed system.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2020-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41646092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bio-inspired Approaches for OFDM Based Cognitive Radio 基于OFDM认知无线电的仿生方法
IF 0.3 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-05-09 DOI: 10.1504/IJIPT.2019.10019368
N. A. Saoucha, B. Benmammar
Link adaptation algorithms design for OFDM-based cognitive radio networks is a challenging task. The main concern is to provide a high quality of service for the secondary user while the mutual interference between this last and the primary user persists within a tolerable range. This issue can be formulated as a multiobjective optimisation constraint problem. To tackle this optimisation problem in a multiobjective constraint framework, in this paper we exploit three of the most recent powerful bio-inspired algorithms: firefly, bat, and cuckoo search. Simulation results revealed that, in contrast to the classical genetic algorithm and particle swarm optimisation-based link adaptation, our proposed algorithms exhibit better performance in terms of convergence speed and solution quality with saving rates reaching over 98.93% and 46.60%, respectively.
基于OFDM的认知无线电网络的链路自适应算法设计是一项具有挑战性的任务。主要关注的是为第二用户提供高质量的服务,同时该最后用户和主要用户之间的相互干扰保持在可容忍的范围内。这个问题可以表述为一个多目标优化约束问题。为了在多目标约束框架中解决这个优化问题,在本文中,我们利用了三种最新的强大的生物启发算法:萤火虫、蝙蝠和杜鹃搜索。仿真结果表明,与经典的遗传算法和基于粒子群优化的链路自适应算法相比,我们提出的算法在收敛速度和求解质量方面表现出更好的性能,节约率分别达到98.93%和46.60%以上。
{"title":"Bio-inspired Approaches for OFDM Based Cognitive Radio","authors":"N. A. Saoucha, B. Benmammar","doi":"10.1504/IJIPT.2019.10019368","DOIUrl":"https://doi.org/10.1504/IJIPT.2019.10019368","url":null,"abstract":"Link adaptation algorithms design for OFDM-based cognitive radio networks is a challenging task. The main concern is to provide a high quality of service for the secondary user while the mutual interference between this last and the primary user persists within a tolerable range. This issue can be formulated as a multiobjective optimisation constraint problem. To tackle this optimisation problem in a multiobjective constraint framework, in this paper we exploit three of the most recent powerful bio-inspired algorithms: firefly, bat, and cuckoo search. Simulation results revealed that, in contrast to the classical genetic algorithm and particle swarm optimisation-based link adaptation, our proposed algorithms exhibit better performance in terms of convergence speed and solution quality with saving rates reaching over 98.93% and 46.60%, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":" ","pages":""},"PeriodicalIF":0.3,"publicationDate":"2019-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Internet Protocol Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1