首页 > 最新文献

International Journal of Future Generation Communication and Networking最新文献

英文 中文
MIMO Interference and Path Loss Reduction using Adaptive Antenna System along with Optimization of Frequency for Zero Path Loss 利用自适应天线系统减少MIMO干扰和路径损耗及零路径损耗的频率优化
Pub Date : 2019-03-31 DOI: 10.33832/ijfgcn.2019.12.1.01
Aritra De, Tirthankar Datta
{"title":"MIMO Interference and Path Loss Reduction using Adaptive Antenna System along with Optimization of Frequency for Zero Path Loss","authors":"Aritra De, Tirthankar Datta","doi":"10.33832/ijfgcn.2019.12.1.01","DOIUrl":"https://doi.org/10.33832/ijfgcn.2019.12.1.01","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41432145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A MapReduce Framework for Detection of Tandem Repeats in DNA Sequences DNA序列串联重复序列检测的MapReduce框架
Pub Date : 2019-03-31 DOI: 10.33832/ijfgcn.2019.12.1.02
T Vandanababu, Raju Bhukya, D. Veeraiah, P. V. Paul
{"title":"A MapReduce Framework for Detection of Tandem Repeats in DNA Sequences","authors":"T Vandanababu, Raju Bhukya, D. Veeraiah, P. V. Paul","doi":"10.33832/ijfgcn.2019.12.1.02","DOIUrl":"https://doi.org/10.33832/ijfgcn.2019.12.1.02","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42854048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Assortment of Routes for Transfer of Packets in Communication Networks 通信网络中数据包传输的早期路由组合
Pub Date : 2019-03-31 DOI: 10.33832/ijfgcn.2019.12.1.03
C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya
{"title":"Early Assortment of Routes for Transfer of Packets in Communication Networks","authors":"C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijfgcn.2019.12.1.03","DOIUrl":"https://doi.org/10.33832/ijfgcn.2019.12.1.03","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46825745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GA GSA-based Energy Efficient Pegasis Protocol for WSN 基于GA-GSA的无线传感器网络节能Pegasis协议
Pub Date : 2018-09-30 DOI: 10.14257/ijfgcn.2018.11.5.04
Suraj Srivastava, Dinesh Grover
WSN is termed as wireless sensor network that consists of very large number of nodes that are connected with each other. These nodes are used to sense large amount of distinct data, interact with each other, and are computationally capable. The sensor nodes deployed in wireless network are light in weight and have constrained battery power. Hence, energy is a main problem of wireless sensor networks. This paper proposes a method for energy minimization with efficient clustering using GSA algorithm in Wireless Sensor Network. To compute cluster head election probability this work uses Genetic Algorithm method. Various parameters are used to evaluate the performance of the proposed technique. Experimental results demonstrate that the proposed technique outperforms existing techniques by various parameters.
WSN被称为无线传感器网络,它由非常大量的节点组成,这些节点相互连接。这些节点用于感知大量不同的数据,彼此交互,并且具有计算能力。部署在无线网络中的传感器节点重量轻,电池电量有限。因此,能量是无线传感器网络的一个主要问题。提出了一种基于GSA算法的无线传感器网络高效聚类能量最小化方法。本文采用遗传算法计算簇头当选概率。使用各种参数来评估所提出的技术的性能。实验结果表明,该方法在多个参数上都优于现有方法。
{"title":"GA GSA-based Energy Efficient Pegasis Protocol for WSN","authors":"Suraj Srivastava, Dinesh Grover","doi":"10.14257/ijfgcn.2018.11.5.04","DOIUrl":"https://doi.org/10.14257/ijfgcn.2018.11.5.04","url":null,"abstract":"WSN is termed as wireless sensor network that consists of very large number of nodes that are connected with each other. These nodes are used to sense large amount of distinct data, interact with each other, and are computationally capable. The sensor nodes deployed in wireless network are light in weight and have constrained battery power. Hence, energy is a main problem of wireless sensor networks. This paper proposes a method for energy minimization with efficient clustering using GSA algorithm in Wireless Sensor Network. To compute cluster head election probability this work uses Genetic Algorithm method. Various parameters are used to evaluate the performance of the proposed technique. Experimental results demonstrate that the proposed technique outperforms existing techniques by various parameters.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42708140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks 低功耗网络中RPL安全机制研究及丢包仿真分析
Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.05
Nikita Malik, Prakash Rao Ragiri, Aarti Jain
A large number of small sensor nodes or motes can be randomly distributed in any environment. These nodes communicate with each other over a low power wireless communication medium since they are severely restricted in their resources. Owing to these constraints, nodes in low power and lossy networks (LLNs) need to collaborate in order to establish a multi-hop network in which data is transmitted over several nodes to reach the sink node(s). Such communications over the radio environment are prone to various attacks, such as the RPL (Routing Protocol for Low Power and Lossy Networks) Packet Drop attack, which participates in the routing process to accept packets from the neighboring motes, only to drop them instead of forwarding in the route to the destination. Such an attack is generally hard to detect and to provide defenses against. In this paper, through simulations on Contiki’s network simulator COOJA, the impact of RPL Packet Drop attack on Contiki RPL is observed for performance based on average power consumption, received packet count, expected transmission count and hop count. Based on the results, several security schemes to tackle RPL in LLN have been studied.
在任何环境中都可以随机分布大量的小传感器节点或微点。由于这些节点的资源受到严格限制,因此它们通过低功率无线通信介质相互通信。由于这些限制,低功耗和有损网络(lln)中的节点需要协作以建立一个多跳网络,其中数据通过多个节点传输以到达汇聚节点。这种无线环境下的通信容易受到各种攻击,例如RPL (Routing Protocol for Low Power and Lossy Networks)丢包攻击(Packet Drop attack,低功耗网络路由协议),这种攻击是指在路由过程中接受来自相邻节点的报文,而不是在到达目的地的路由中转发这些报文。这种攻击通常很难检测到,也很难提供防御。本文通过在Contiki的网络模拟器COOJA上进行仿真,从平均功耗、接收包数、期望传输数和跳数四个方面观察RPL丢包攻击对Contiki RPL性能的影响。在此基础上,研究了几种解决LLN中RPL的安全方案。
{"title":"Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks","authors":"Nikita Malik, Prakash Rao Ragiri, Aarti Jain","doi":"10.14257/IJFGCN.2018.11.5.05","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.05","url":null,"abstract":"A large number of small sensor nodes or motes can be randomly distributed in any environment. These nodes communicate with each other over a low power wireless communication medium since they are severely restricted in their resources. Owing to these constraints, nodes in low power and lossy networks (LLNs) need to collaborate in order to establish a multi-hop network in which data is transmitted over several nodes to reach the sink node(s). Such communications over the radio environment are prone to various attacks, such as the RPL (Routing Protocol for Low Power and Lossy Networks) Packet Drop attack, which participates in the routing process to accept packets from the neighboring motes, only to drop them instead of forwarding in the route to the destination. Such an attack is generally hard to detect and to provide defenses against. In this paper, through simulations on Contiki’s network simulator COOJA, the impact of RPL Packet Drop attack on Contiki RPL is observed for performance based on average power consumption, received packet count, expected transmission count and hop count. Based on the results, several security schemes to tackle RPL in LLN have been studied.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41338279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of RN-LEACH Protocol over LEACH Protocol RN-LEACH协议与LEACH协议的性能分析
Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.01
Piyush Rawat, S. Chauhan
The network lifetime is considered as the major concern in the area of WSN because of the huge quantity of sensor nodes and their distribution in the network. When the size of the network gets expanded the selection of the routing protocol become a crucial issue. A good routing protocol can help in enhancing the network lifetime. In this article, we are exhibiting a routing protocol which is based on existing LEACH protocol named as Random Number based LEACH (RN-LEACH) protocol. The results generated through simulation illustrate that the RN-LEACH algorithm has enhanced the working of the network in terms of energy consumption, network lifetime and packet received compared to existing LEACH protocol. The RN-LEACH protocol has increased the network lifetime by approximately more than 90% as compared to LEACH which shows the good agreement of RN-LEACH algorithm as contrasted to the previous technique.
由于网络中存在大量的传感器节点及其分布,网络生存期一直是无线传感器网络研究的重点。随着网络规模的不断扩大,路由协议的选择成为一个关键问题。一个好的路由协议可以帮助提高网络的生存期。在本文中,我们将展示一种基于现有LEACH协议的路由协议,称为基于随机数的LEACH (RN-LEACH)协议。仿真结果表明,与现有的LEACH协议相比,RN-LEACH算法在能耗、网络生存时间和数据包接收方面都提高了网络的工作效率。与LEACH相比,RN-LEACH协议将网络生存期提高了约90%以上,这表明RN-LEACH算法与以前的技术相比具有良好的一致性。
{"title":"Performance Analysis of RN-LEACH Protocol over LEACH Protocol","authors":"Piyush Rawat, S. Chauhan","doi":"10.14257/IJFGCN.2018.11.5.01","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.01","url":null,"abstract":"The network lifetime is considered as the major concern in the area of WSN because of the huge quantity of sensor nodes and their distribution in the network. When the size of the network gets expanded the selection of the routing protocol become a crucial issue. A good routing protocol can help in enhancing the network lifetime. In this article, we are exhibiting a routing protocol which is based on existing LEACH protocol named as Random Number based LEACH (RN-LEACH) protocol. The results generated through simulation illustrate that the RN-LEACH algorithm has enhanced the working of the network in terms of energy consumption, network lifetime and packet received compared to existing LEACH protocol. The RN-LEACH protocol has increased the network lifetime by approximately more than 90% as compared to LEACH which shows the good agreement of RN-LEACH algorithm as contrasted to the previous technique.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42215238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
FPGA Implementation of Secure Internet of Things (SIT) Algorithm for High Throughput Area Ratio 高吞吐量区域比的安全物联网(SIT)算法的FPGA实现
Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.06
U. Rabab, Irfan Uddin Ahmed, M. Aslam, Muhammad Usman
In this paper, we present the results of hardware implementation of our previously proposed lightweight encryption algorithm named as Secure Internet of Things (SIT). By virtue of its low cost and computational simplicity, SIT can be a good candidate to meet the needs of resource constraint applications related to the futuristic demands of Internet of Things. In this work, we have implemented our proposed SIT algorithm on Field Programmable Gate Array (FPGA) and compared the results with the similar implementations reported in the literature. During the hardware implementation, we focused on obtaining high throughput area ratio which is essential parameter for the applications focusing on internet of things. Our implementation of the SIT algorithm on FPGA achieved a throughput of 4899 Mbps with encryption while using only 711 logic elements resulting in throughput area ratio of 6.89.
在本文中,我们展示了我们之前提出的称为安全物联网(SIT)的轻量级加密算法的硬件实现结果。凭借其低成本和计算简单性,SIT可以很好地满足与物联网未来需求相关的资源约束应用的需求。在这项工作中,我们在现场可编程门阵列(FPGA)上实现了我们提出的SIT算法,并将结果与文献中报道的类似实现进行了比较。在硬件实现过程中,我们着重于获得高吞吐量面积比,这是物联网应用的重要参数。我们在FPGA上实现的SIT算法在加密时实现了4899 Mbps的吞吐量,同时仅使用711个逻辑元件,导致吞吐量面积比为6.89。
{"title":"FPGA Implementation of Secure Internet of Things (SIT) Algorithm for High Throughput Area Ratio","authors":"U. Rabab, Irfan Uddin Ahmed, M. Aslam, Muhammad Usman","doi":"10.14257/IJFGCN.2018.11.5.06","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.06","url":null,"abstract":"In this paper, we present the results of hardware implementation of our previously proposed lightweight encryption algorithm named as Secure Internet of Things (SIT). By virtue of its low cost and computational simplicity, SIT can be a good candidate to meet the needs of resource constraint applications related to the futuristic demands of Internet of Things. In this work, we have implemented our proposed SIT algorithm on Field Programmable Gate Array (FPGA) and compared the results with the similar implementations reported in the literature. During the hardware implementation, we focused on obtaining high throughput area ratio which is essential parameter for the applications focusing on internet of things. Our implementation of the SIT algorithm on FPGA achieved a throughput of 4899 Mbps with encryption while using only 711 logic elements resulting in throughput area ratio of 6.89.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46623150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Scheme of Mobility Management in UDN Based on PPP 一种基于PPP的UDN移动管理方案
Pub Date : 2018-09-30 DOI: 10.14257/ijfgcn.2018.11.5.07
Junxuan Wang, Ruixin Li, Tianxiang Ji
{"title":"A Scheme of Mobility Management in UDN Based on PPP","authors":"Junxuan Wang, Ruixin Li, Tianxiang Ji","doi":"10.14257/ijfgcn.2018.11.5.07","DOIUrl":"https://doi.org/10.14257/ijfgcn.2018.11.5.07","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41328270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management 用集中式信誉管理隔离分布式软件定义网络中的恶意控制器
Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.02
Bilal Karim Mughal, S. Hameed, B. Hameed
Although software-defined networks have seen a sharp increase in their deployment around the world, with big tech companies including Microsoft and Google, to name a few, tapping into the enormous potential that these networks offer, there are still various security loopholes that need to be plugged. One such security-related issues is that of a rogue controller bringing down an entire network. As we shall see in this paper, this problem is still short of any definitive solutions, especially when it comes to distributed software-defined networks. We attempt to resolve this issue by developing a centrally managed trust and reputation scheme. By proactively comparing the policies/flow rules that need to be installed in the switches with those that are actually installed, our scheme singles out a malicious controller. We have evaluated the scheme for scalability, message overhead, and for bad-mouthing attacks. Our results suggest that using trust and reputation system can greatly enhance the network security in this scenario as demonstrated by rigorous evaluations in Emulab network emulation testbed.
尽管软件定义网络在世界各地的部署急剧增加,包括微软和谷歌在内的大型科技公司利用了这些网络提供的巨大潜力,但仍有各种安全漏洞需要堵塞。其中一个与安全相关的问题是流氓控制器导致整个网络瘫痪。正如我们将在本文中看到的,这个问题仍然缺乏任何明确的解决方案,尤其是当涉及到分布式软件定义网络时。我们试图通过制定一个集中管理的信托和声誉计划来解决这个问题。通过主动比较需要安装在交换机中的策略/流规则与实际安装的策略/流程规则,我们的方案挑出了一个恶意控制器。我们已经评估了该方案的可扩展性、消息开销和恶意攻击。我们的研究结果表明,在这种情况下,使用信任和信誉系统可以大大提高网络安全性,Emulab网络仿真试验台的严格评估证明了这一点。
{"title":"Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management","authors":"Bilal Karim Mughal, S. Hameed, B. Hameed","doi":"10.14257/IJFGCN.2018.11.5.02","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.02","url":null,"abstract":"Although software-defined networks have seen a sharp increase in their deployment around the world, with big tech companies including Microsoft and Google, to name a few, tapping into the enormous potential that these networks offer, there are still various security loopholes that need to be plugged. One such security-related issues is that of a rogue controller bringing down an entire network. As we shall see in this paper, this problem is still short of any definitive solutions, especially when it comes to distributed software-defined networks. We attempt to resolve this issue by developing a centrally managed trust and reputation scheme. By proactively comparing the policies/flow rules that need to be installed in the switches with those that are actually installed, our scheme singles out a malicious controller. We have evaluated the scheme for scalability, message overhead, and for bad-mouthing attacks. Our results suggest that using trust and reputation system can greatly enhance the network security in this scenario as demonstrated by rigorous evaluations in Emulab network emulation testbed.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46515942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Parallel Interference Mitigation Technique using Artificial Neural Network in Complementary Coded MC-CDMA 互补编码MC-CDMA中一种基于人工神经网络的自适应并行干扰抑制技术
Pub Date : 2018-07-31 DOI: 10.14257/IJFGCN.2018.11.4.06
Supreeti Bal, M. Rai, Hye-jin Kim, R. Saha
{"title":"An Adaptive Parallel Interference Mitigation Technique using Artificial Neural Network in Complementary Coded MC-CDMA","authors":"Supreeti Bal, M. Rai, Hye-jin Kim, R. Saha","doi":"10.14257/IJFGCN.2018.11.4.06","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.4.06","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJFGCN.2018.11.4.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47895431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Future Generation Communication and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1