首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
Stochastic Optimization Problem through Particle Swarm Optimization Algorithm 基于粒子群算法的随机优化问题
Fangguo He, Wenlue Chen
In this paper, two classes of stochastic optimization problems, which are expected value models and chance-constrained programming, are introduced. In order to solve the problems, the method of stochastic simulation is used to generate training samples for neural network, and then particle swarm optimization algorithm and neural network are integrated to produce a hybrid intelligent algorithm. Two numerical examples are provided to illustrate the effectiveness of the hybrid particle swarm optimization algorithm.
本文介绍了期望值模型和机会约束规划这两类随机优化问题。为了解决这一问题,采用随机模拟的方法生成神经网络的训练样本,然后将粒子群优化算法与神经网络相结合,生成一种混合智能算法。给出了两个数值算例,说明了混合粒子群优化算法的有效性。
{"title":"Stochastic Optimization Problem through Particle Swarm Optimization Algorithm","authors":"Fangguo He, Wenlue Chen","doi":"10.1109/NSWCTC.2009.355","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.355","url":null,"abstract":"In this paper, two classes of stochastic optimization problems, which are expected value models and chance-constrained programming, are introduced. In order to solve the problems, the method of stochastic simulation is used to generate training samples for neural network, and then particle swarm optimization algorithm and neural network are integrated to produce a hybrid intelligent algorithm. Two numerical examples are provided to illustrate the effectiveness of the hybrid particle swarm optimization algorithm.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1801 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Reciprocity Characteristic of Smart Antennas in CDMA System CDMA系统中智能天线的互易特性
Xiangdong Jia, Haibao Ding
Smart antennas (SA) has not been applied widely in 3G except TD-SCDMA. As to the application of SA in CDMA system, we argued that people hold certain incorrect view, especial the reciprocity characteristic. Generally, people consider that only using a set of SA, we can simultaneously realize multiple CDMA channels directional transmission on a single carrier frequency with the same uplink & downlink SNR gain, and the transmitting beamforming can be realized by amplitude-weight transmitting baseband signal just like the receiving beamforming. For these views about the SA direction-transmission principle in CDMA system, we did careful analysis. We proved that these opinions mentioned above are incorrect. In order to take good use of smart antennas (SA) in the CDMA system, we also proposed a feasible carrier weight method.
除了TD-SCDMA之外,智能天线在3G中还没有得到广泛的应用。对于SA在CDMA系统中的应用,人们持有一些不正确的观点,特别是对其互易性的看法。一般认为,只要使用一组SA,就可以在同一载波频率上同时实现上下行信噪比增益相同的CDMA多信道定向传输,发射波束形成可以像接收波束形成一样,通过幅度加权发射基带信号来实现。针对这些关于CDMA系统中SA方向传输原理的观点,我们做了详细的分析。我们证明了以上这些观点是不正确的。为了在CDMA系统中更好地利用智能天线,我们还提出了一种可行的载波权重方法。
{"title":"The Reciprocity Characteristic of Smart Antennas in CDMA System","authors":"Xiangdong Jia, Haibao Ding","doi":"10.1109/NSWCTC.2009.298","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.298","url":null,"abstract":"Smart antennas (SA) has not been applied widely in 3G except TD-SCDMA. As to the application of SA in CDMA system, we argued that people hold certain incorrect view, especial the reciprocity characteristic. Generally, people consider that only using a set of SA, we can simultaneously realize multiple CDMA channels directional transmission on a single carrier frequency with the same uplink & downlink SNR gain, and the transmitting beamforming can be realized by amplitude-weight transmitting baseband signal just like the receiving beamforming. For these views about the SA direction-transmission principle in CDMA system, we did careful analysis. We proved that these opinions mentioned above are incorrect. In order to take good use of smart antennas (SA) in the CDMA system, we also proposed a feasible carrier weight method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129944303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Network Technology and its Applications 无线网络技术及其应用
Ning Zhang, Hong Bao
In this paper we analyze wireless network and discuss the applications of wireless technology. In wireless network, the wireless devices should be able to operate independently of the broader Internet. In particular, there may be times during which the connection of a wireless device or network to the Internet is not available. During these times, wireless devices should be able to operate stably in modes disconnected from the rest of the infrastructure, as well as be able to opportunistically establish "local" ad-hoc networks using their own native protocols. This will require that devices are capable of discovering each other without the assistance of the broader network, as well as require that devices use local addressing and routing schemes.
本文对无线网络进行了分析,讨论了无线技术的应用。在无线网络中,无线设备应该能够独立于更广泛的互联网运行。特别是,有时无线设备或网络连接到Internet不可用。在此期间,无线设备应该能够在与其他基础设施断开连接的模式下稳定运行,并且能够使用自己的本地协议偶然地建立“本地”ad-hoc网络。这将要求设备能够在没有更广泛的网络帮助的情况下发现彼此,并要求设备使用本地寻址和路由方案。
{"title":"Wireless Network Technology and its Applications","authors":"Ning Zhang, Hong Bao","doi":"10.1109/NSWCTC.2009.255","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.255","url":null,"abstract":"In this paper we analyze wireless network and discuss the applications of wireless technology. In wireless network, the wireless devices should be able to operate independently of the broader Internet. In particular, there may be times during which the connection of a wireless device or network to the Internet is not available. During these times, wireless devices should be able to operate stably in modes disconnected from the rest of the infrastructure, as well as be able to opportunistically establish \"local\" ad-hoc networks using their own native protocols. This will require that devices are capable of discovering each other without the assistance of the broader network, as well as require that devices use local addressing and routing schemes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks 无线自组织网络中最优载波感知距离的研究
Chongqing Zhang, Qiang Xu
Based on a realistic interference model and an effective framework for determining the optimum carrier sensing range. This paper investigates the changing rules of the optimum carrier sensing range of several types of wireless networks. Simulations are also performed using ns-2, and the results validate the effectiveness of the framework.
基于现实的干扰模型和确定最佳载波感知距离的有效框架。研究了几种无线网络中最优载波感知距离的变化规律。利用ns-2进行了仿真,结果验证了该框架的有效性。
{"title":"Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks","authors":"Chongqing Zhang, Qiang Xu","doi":"10.1109/NSWCTC.2009.349","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.349","url":null,"abstract":"Based on a realistic interference model and an effective framework for determining the optimum carrier sensing range. This paper investigates the changing rules of the optimum carrier sensing range of several types of wireless networks. Simulations are also performed using ns-2, and the results validate the effectiveness of the framework.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm 基于贪心算法的感知无线网络路由协议研究
Yuan Xin, Xu Guang-hua, Chen Xiao-jun
In the application of wireless sensor networks (WSN), the balance of energy consumption plays an important role in extending the life cycle of WSN. Aim at energy consumption of Wireless sensors network, a dynamic cluster-based routing protocol based on the greedy algorithm (GDCRP). In the protocol, nodes run for the cluster head according to the energy and location. The elected cluster head has optimal value of energy and location. When the cluster is formed, the sink node initiates the request of routing establishment; the cluster heads choose the nodes that send it the packet as the upper nodes according to energy and hops count to the sink node. After a period of the network operating, then choose nodes according to the energy value and distance as the cluster head once again in order to avoid network failure because of one node failure. The protocol balances energy consumption of the network effectively, and extends the life cycle of the entire network.
在无线传感器网络的应用中,能量消耗的平衡对延长无线传感器网络的生命周期起着重要的作用。针对无线传感器网络的能耗问题,提出了一种基于贪心算法的动态聚类路由协议(GDCRP)。在该协议中,节点根据能量和位置为簇头运行。选出的簇头具有最优的能量和位置值。集群形成后,汇聚节点发起路由建立请求;簇头根据到汇聚节点的能量和跳数选择发送数据包的节点作为上层节点。在网络运行一段时间后,根据能量值和距离再次选择节点作为簇头,避免因一个节点故障导致网络故障。该协议有效地平衡了网络的能耗,延长了整个网络的生命周期。
{"title":"The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm","authors":"Yuan Xin, Xu Guang-hua, Chen Xiao-jun","doi":"10.1109/NSWCTC.2009.159","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.159","url":null,"abstract":"In the application of wireless sensor networks (WSN), the balance of energy consumption plays an important role in extending the life cycle of WSN. Aim at energy consumption of Wireless sensors network, a dynamic cluster-based routing protocol based on the greedy algorithm (GDCRP). In the protocol, nodes run for the cluster head according to the energy and location. The elected cluster head has optimal value of energy and location. When the cluster is formed, the sink node initiates the request of routing establishment; the cluster heads choose the nodes that send it the packet as the upper nodes according to energy and hops count to the sink node. After a period of the network operating, then choose nodes according to the energy value and distance as the cluster head once again in order to avoid network failure because of one node failure. The protocol balances energy consumption of the network effectively, and extends the life cycle of the entire network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of P-code Direct Acquisition Technology p码直接获取技术研究
Qina Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan
The article provides a new design of P-code direct acquisition module based on segmented coherent accumulation at frequency domain. Firstly, realizable solution of acquisition system is given, and its principle is introduced. Subsequently, according to specific environment where navigation terminal works, probability of detection and average acquisition time of acquisition system are deduced. The conclusion is proved by simulation, and average acquisition time and probability of detection are analyzed in different condition. Research shows that the P-code direct acquisition module works effectively at low signal-to-noise rate in high dynamic environment.
本文提出了一种基于频域分段相干积累的p码直接采集模块的新设计。首先给出了采集系统的实现方案,并介绍了采集系统的原理。然后,根据导航终端工作的具体环境,推导出探测概率和捕获系统的平均捕获时间。通过仿真验证了该结论,并对不同条件下的平均捕获时间和检测概率进行了分析。研究表明,该p码直接采集模块在高动态环境下能有效地实现低信噪比的工作。
{"title":"Research of P-code Direct Acquisition Technology","authors":"Qina Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan","doi":"10.1109/NSWCTC.2009.34","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.34","url":null,"abstract":"The article provides a new design of P-code direct acquisition module based on segmented coherent accumulation at frequency domain. Firstly, realizable solution of acquisition system is given, and its principle is introduced. Subsequently, according to specific environment where navigation terminal works, probability of detection and average acquisition time of acquisition system are deduced. The conclusion is proved by simulation, and average acquisition time and probability of detection are analyzed in different condition. Research shows that the P-code direct acquisition module works effectively at low signal-to-noise rate in high dynamic environment.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Remediation Model and Its Realization Based on Trusted Network 基于可信网络的修复模型及其实现研究
J. Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu
Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.
可信计算组虽然提出了可信修复的概念,但没有给出具体的实现方法,也没有涉及如何构建隔离环境。提出了一种新的可信修复模型——TRNM。并给出了模型的具体实现。此外,还讨论了模型的通信和认证过程。仿真结果表明,该模型不仅能够保证网络的安全性和可靠性,而且能够为不符合本地网络安全策略的终端提供方便可靠的修复服务。
{"title":"Research on Remediation Model and Its Realization Based on Trusted Network","authors":"J. Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu","doi":"10.1109/NSWCTC.2009.101","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.101","url":null,"abstract":"Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method of Breadth-first Searches with AI-Properties of VCN 一种基于VCN ai特性的宽度优先搜索新方法
Qiusun Ye
This paper makes an analyzing and discussing of Breadth-first Search technology of both FCN and VCN in searching without information, and points out that, merits and demerits of two Numbers on searching without information. And then, it gives a novel realization method of Breadth-first Search in problem-solving which sometimes we should think simultaneously over the intelligent properties of VCN, and gives out an example of the problem-solving method, i.e. the problem-solving such as catching fish with casting a net or boy-herder picks peaches by climbing up a tree.
对FCN和VCN在无信息搜索中的广度优先搜索技术进行了分析和讨论,指出了两种数字搜索技术在无信息搜索中的优缺点。然后,给出了一种新的宽度优先搜索在解决问题时的实现方法,有时我们需要同时考虑VCN的智能特性,并给出了该方法的一个实例,即撒网捕鱼或牧童爬树摘桃等问题。
{"title":"A Novel Method of Breadth-first Searches with AI-Properties of VCN","authors":"Qiusun Ye","doi":"10.1109/NSWCTC.2009.121","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.121","url":null,"abstract":"This paper makes an analyzing and discussing of Breadth-first Search technology of both FCN and VCN in searching without information, and points out that, merits and demerits of two Numbers on searching without information. And then, it gives a novel realization method of Breadth-first Search in problem-solving which sometimes we should think simultaneously over the intelligent properties of VCN, and gives out an example of the problem-solving method, i.e. the problem-solving such as catching fish with casting a net or boy-herder picks peaches by climbing up a tree.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Programs Behaviors on Context Dependency
Pan Jianjing, Peng Xinguang
Anomaly detection of privileged program behaviors is one of the most important means to ensure the system security. An alternative modeling method is proposed based on the BP neural network classifier, which builds upon the concept of the context dependency short sequences and the specially designed m-nearest algorithm. It is because that the neural network classifiers have the advantages of high generalization capability on unknown data, and the context dependency can more accurately determine the nature of local behaviors for the short sequences, behavior detection performance of program traces was evidently improved as compared with the previous modeling method.
特权程序行为异常检测是保证系统安全的重要手段之一。提出了一种基于BP神经网络分类器的替代建模方法,该方法基于上下文依赖短序列的概念和专门设计的m-nearest算法。由于神经网络分类器对未知数据具有较高的泛化能力,并且上下文依赖可以更准确地确定短序列的局部行为性质,因此与之前的建模方法相比,程序轨迹的行为检测性能得到了明显提高。
{"title":"Detection of Programs Behaviors on Context Dependency","authors":"Pan Jianjing, Peng Xinguang","doi":"10.1109/NSWCTC.2009.143","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.143","url":null,"abstract":"Anomaly detection of privileged program behaviors is one of the most important means to ensure the system security. An alternative modeling method is proposed based on the BP neural network classifier, which builds upon the concept of the context dependency short sequences and the specially designed m-nearest algorithm. It is because that the neural network classifiers have the advantages of high generalization capability on unknown data, and the context dependency can more accurately determine the nature of local behaviors for the short sequences, behavior detection performance of program traces was evidently improved as compared with the previous modeling method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Analysis of Intelligent Network System 智能网络系统脆弱性分析
Danfeng Yan, Fangchun Yang
All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.
所有的攻击都来自于攻击者成功利用电信网络或系统的漏洞。因此,清除某个网络或系统的漏洞是重中之重。该理论方法可用于分析网络拓扑和动作的不足。在实际工作中发现了许多漏洞。本文从实现应用案例入手,分析总结了智能网络系统存在的漏洞。这对父亲的研发工作是有价值的。
{"title":"Vulnerability Analysis of Intelligent Network System","authors":"Danfeng Yan, Fangchun Yang","doi":"10.1109/NSWCTC.2009.27","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.27","url":null,"abstract":"All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123262163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1