首页 > 最新文献

2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)最新文献

英文 中文
Deep Reinforcement Learning for the Capacitated Vehicle Routing Problem with Soft Time Window 带软时间窗的有能力车辆路径问题的深度强化学习
Xiaohe Wang, Xinli Shi
The past decade has seen a rapid development of solving travelling salesman problem (TSP) and vehicle routing problem (VRP) with deep reinforcement learning. In order to solve problems that are closer to life, more researchers turn their attention to the variant VRP. In this article, we tackle the capacitated VRP with soft time window (CVRPSTW). In this problem, the vehicles have capacity limit and will be punished if arriving at the customer outside the time window. We use a deep reinforcement learning (DRL) based on the attention mechanism and point network to solve CVRPSTW. In the training part, we use policy gradient with rollout baseline. The experiment shows that the proposed DRL model can effectively solve this variant VRP.
{"title":"Deep Reinforcement Learning for the Capacitated Vehicle Routing Problem with Soft Time Window","authors":"Xiaohe Wang, Xinli Shi","doi":"10.1109/WCSP55476.2022.10039414","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039414","url":null,"abstract":"The past decade has seen a rapid development of solving travelling salesman problem (TSP) and vehicle routing problem (VRP) with deep reinforcement learning. In order to solve problems that are closer to life, more researchers turn their attention to the variant VRP. In this article, we tackle the capacitated VRP with soft time window (CVRPSTW). In this problem, the vehicles have capacity limit and will be punished if arriving at the customer outside the time window. We use a deep reinforcement learning (DRL) based on the attention mechanism and point network to solve CVRPSTW. In the training part, we use policy gradient with rollout baseline. The experiment shows that the proposed DRL model can effectively solve this variant VRP.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"16 1","pages":"352-355"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86161382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modulation Recognition Method of MAPSK Signal MAPSK信号的调制识别方法
Yingwen Liu, Jing Xu
{"title":"Modulation Recognition Method of MAPSK Signal","authors":"Yingwen Liu, Jing Xu","doi":"10.1109/WCSP52459.2021.9613669","DOIUrl":"https://doi.org/10.1109/WCSP52459.2021.9613669","url":null,"abstract":"","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74797930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Routing Method in Wireless Sensor Network for Sewage Treatment Monitoring 污水处理监测无线传感器网络中的人工智能路由方法
Fang-Mei Zhou, Zhonglou Lu, Zhifeng Zhu, T. Cheng
{"title":"Artificial Intelligence Routing Method in Wireless Sensor Network for Sewage Treatment Monitoring","authors":"Fang-Mei Zhou, Zhonglou Lu, Zhifeng Zhu, T. Cheng","doi":"10.1109/WCSP52459.2021.9613299","DOIUrl":"https://doi.org/10.1109/WCSP52459.2021.9613299","url":null,"abstract":"","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75034025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Interference Solutions Between 5G and Satellite Systems 5G与卫星系统集成干扰解决方案
T. Cheng, Fang Zhou
{"title":"Integrated Interference Solutions Between 5G and Satellite Systems","authors":"T. Cheng, Fang Zhou","doi":"10.1109/WCSP52459.2021.9613464","DOIUrl":"https://doi.org/10.1109/WCSP52459.2021.9613464","url":null,"abstract":"","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"81 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73674085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetically Induced Transparency in a Coupled NV Spin-Mechanical Resonator System 耦合NV自旋-机械谐振器系统的电磁感应透明
Q. Liao, Xiaoqian Wang, Gaoqian He
{"title":"Electromagnetically Induced Transparency in a Coupled NV Spin-Mechanical Resonator System","authors":"Q. Liao, Xiaoqian Wang, Gaoqian He","doi":"10.1109/WCSP52459.2021.9613356","DOIUrl":"https://doi.org/10.1109/WCSP52459.2021.9613356","url":null,"abstract":"","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"75 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83809180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data Protection-Oriented Design Procedure for a Federated Learning Framework 面向数据保护的联邦学习框架设计过程
Yue Yu, Ming-Quan Zeng, Zhijie Qiu, Lei Luo, Hong Chen
Artificial intelligence is a bellwether of today’s new technological revolution. As a branch of artificial intelligence, machine learning faces two main problems in practical application: 1) data owned by most enterprises are difficult to aggregate; and, 2) big data owners pay more and more attention to data privacy and security, which leads to the problem of data island. Federated learning (FL), as a distributed FL paradigm, which can enable all parties to achieve the purpose of co-building models while ensuring data privacy and exposure, provides a possible solution to the mentioned problems of machine learning. The FL takes full advantage of participants’ data and computing power and builds a more robust machine learning model without sharing the data. In an environment with strict data regulation, the FL can effectively solve the key problems, such as those related to data privacy and data rights. However, most of the existing FL-based frameworks do not pay attention to the impact of data source distribution on FL training. Therefore, this paper proposed a data-oriented FL framework called the Federated AI Engine(FAE), which can solve FL problems without leaving the data in control. The proposed framework provides a method that can be used to verify FL quickly for researchers who intend to try federal learning.
{"title":"A Data Protection-Oriented Design Procedure for a Federated Learning Framework","authors":"Yue Yu, Ming-Quan Zeng, Zhijie Qiu, Lei Luo, Hong Chen","doi":"10.1109/WCSP49889.2020.9299730","DOIUrl":"https://doi.org/10.1109/WCSP49889.2020.9299730","url":null,"abstract":"Artificial intelligence is a bellwether of today’s new technological revolution. As a branch of artificial intelligence, machine learning faces two main problems in practical application: 1) data owned by most enterprises are difficult to aggregate; and, 2) big data owners pay more and more attention to data privacy and security, which leads to the problem of data island. Federated learning (FL), as a distributed FL paradigm, which can enable all parties to achieve the purpose of co-building models while ensuring data privacy and exposure, provides a possible solution to the mentioned problems of machine learning. The FL takes full advantage of participants’ data and computing power and builds a more robust machine learning model without sharing the data. In an environment with strict data regulation, the FL can effectively solve the key problems, such as those related to data privacy and data rights. However, most of the existing FL-based frameworks do not pay attention to the impact of data source distribution on FL training. Therefore, this paper proposed a data-oriented FL framework called the Federated AI Engine(FAE), which can solve FL problems without leaving the data in control. The proposed framework provides a method that can be used to verify FL quickly for researchers who intend to try federal learning.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"43 1","pages":"968-974"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80109885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low Complexity Iterative Combining-Equalization Algorithm Based on SIC 基于SIC的低复杂度迭代组合均衡算法
Mei Gao, Zhongwei Liu, Feng Jing, Haodan Ran, Shuyin Zhang
{"title":"Low Complexity Iterative Combining-Equalization Algorithm Based on SIC","authors":"Mei Gao, Zhongwei Liu, Feng Jing, Haodan Ran, Shuyin Zhang","doi":"10.1109/WCSP.2019.8928039","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928039","url":null,"abstract":"","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"54 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76885996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Enhancement In Bitcoin Protocol 比特币协议中的安全增强
R. Bala, R. Manoharan
The radical growth of Bitcoin revolutionized the field of digital currencies by offering a secure replacement for online electronic payments like card payments and Internet banking. Notably, Bitcoin has become popular since it maintains the anonymity of the users and enables peer-to-peer instant payments across the world. It is a decentralized money transfer protocol that does transactions without exposing user credentials and does verifications without any third-party intervention. Though it maintains anonymity, decentralization concept introduced vulnerabilities leading to severe security issues like double spending, block withholding and 51% attacks. These issues necessitate security specific enhancements in Bitcoin protocol. Therefore, this paper proposes a method of incorporating criteria check for miners to participate in mining process and a verification process to join the mining pool. The proposed idea mitigates double spending, block withholding, and 51% attacks. Further, a new approach is proposed namely, refining block creation and verification strategy for improving transaction rate without compromising security.
比特币的迅猛发展为信用卡支付和网上银行等在线电子支付提供了一种安全的替代品,彻底改变了数字货币领域。值得注意的是,比特币之所以变得流行,是因为它保持了用户的匿名性,并在全球范围内实现了点对点的即时支付。它是一种去中心化的资金转移协议,在不暴露用户凭证的情况下进行交易,在没有任何第三方干预的情况下进行验证。虽然它保持了匿名性,但去中心化概念引入了漏洞,导致严重的安全问题,如双重支出、区块扣留和51%攻击。这些问题需要在比特币协议中进行特定的安全增强。因此,本文提出了一种结合矿工参与挖矿过程的标准检查和加入矿池的验证过程的方法。提出的想法减轻了双重支出,区块扣留和51%攻击。在此基础上,提出了一种改进区块创建和验证策略的新方法,在不影响安全性的前提下提高交易率。
{"title":"Security Enhancement In Bitcoin Protocol","authors":"R. Bala, R. Manoharan","doi":"10.1109/WISPNET.2018.8538578","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538578","url":null,"abstract":"The radical growth of Bitcoin revolutionized the field of digital currencies by offering a secure replacement for online electronic payments like card payments and Internet banking. Notably, Bitcoin has become popular since it maintains the anonymity of the users and enables peer-to-peer instant payments across the world. It is a decentralized money transfer protocol that does transactions without exposing user credentials and does verifications without any third-party intervention. Though it maintains anonymity, decentralization concept introduced vulnerabilities leading to severe security issues like double spending, block withholding and 51% attacks. These issues necessitate security specific enhancements in Bitcoin protocol. Therefore, this paper proposes a method of incorporating criteria check for miners to participate in mining process and a verification process to join the mining pool. The proposed idea mitigates double spending, block withholding, and 51% attacks. Further, a new approach is proposed namely, refining block creation and verification strategy for improving transaction rate without compromising security.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"8 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75251208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effect of Modulation Techniques on the Performance of Voice and Video Service for WiMAX Networks in Baghdad 调制技术对巴格达地区WiMAX网络话视频业务性能的影响
H. M. T. Al-Hilfi, Shatha k. Jasim Al hummadi, M. Mustafa
With the growing and widespread variety of wireless networking technologies such as “Worldwide Interoperability for Microwave Access” (WiMAX) the number of users of internet devices continues to grow. For WiMAX, network stability is highly dependent on the “Quality of Service” (QoS) and connection with the internet requires adequate bandwidth, especially for voice and video services. The quality of service for voice and video services is a problem in internet communication as a whole. One way to maintain the stability of the service quality is to use a modulation technique, where the modulation technique enables adjustment of a signal modulation pattern which depends on the signal to noise ratio (SNR) condition. In this article, we study and compare the types of modulation QPSK, 16QAM, and 64QAM for WiMAX Network in Baghdad. The obtained test results are compared in terms of the delay, throughput, Block error rate (BLER) and signal to noise ratio (SNR) for different modulation techniques.
随着诸如“全球微波接入互操作性”(WiMAX)等无线网络技术的不断发展和广泛应用,互联网设备的用户数量不断增长。对于WiMAX来说,网络稳定性高度依赖于“服务质量”(QoS),与互联网的连接需要足够的带宽,尤其是语音和视频服务。语音和视频服务的服务质量是整个互联网通信中的一个问题。保持服务质量稳定的一种方法是使用调制技术,其中调制技术可以根据信噪比(SNR)条件调整信号调制模式。在本文中,我们研究和比较了巴格达WiMAX网络的调制类型QPSK、16QAM和64QAM。从时延、吞吐量、分组误码率和信噪比等方面对不同调制技术的测试结果进行了比较。
{"title":"Effect of Modulation Techniques on the Performance of Voice and Video Service for WiMAX Networks in Baghdad","authors":"H. M. T. Al-Hilfi, Shatha k. Jasim Al hummadi, M. Mustafa","doi":"10.1109/WISPNET.2018.8538693","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538693","url":null,"abstract":"With the growing and widespread variety of wireless networking technologies such as “Worldwide Interoperability for Microwave Access” (WiMAX) the number of users of internet devices continues to grow. For WiMAX, network stability is highly dependent on the “Quality of Service” (QoS) and connection with the internet requires adequate bandwidth, especially for voice and video services. The quality of service for voice and video services is a problem in internet communication as a whole. One way to maintain the stability of the service quality is to use a modulation technique, where the modulation technique enables adjustment of a signal modulation pattern which depends on the signal to noise ratio (SNR) condition. In this article, we study and compare the types of modulation QPSK, 16QAM, and 64QAM for WiMAX Network in Baghdad. The obtained test results are compared in terms of the delay, throughput, Block error rate (BLER) and signal to noise ratio (SNR) for different modulation techniques.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"79 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75336898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reinforcement Learning Based Decision Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radios 基于强化学习的认知无线电协同频谱感知决策融合方案
V. Balaji
Spectrum Sensing is a key module in Cognitive Radios (CR) for detecting spectrum holes. The performance of spectrum sensing algorithms is compromised due to channel impairments, such as, multi-path fading and shadowing. Cooperative Spectrum Sensing (CSS) scheme mitigates the above issues and improves the spatial diversity gain of Secondary Users (SUs). In this paper, we present Reinforcement Learning (RL) based CSS scheme with the objective of improving cooperative sensing accuracy by maximizing expected cumulative reward. Using reinforcement learning, the Fusion Center(FC) makes a global decision by interacting with the radio environment which consists of cooperative SUs and primary transmitter. The cooperative SUs are deployed randomly in a fading wireless channel environment modeled as a Markov Decision Process (MDP). The optimal solution of RL based CSS algorithm is formulated using policy iteration to meet the requirements of IEEE 802.22 Wireless Regional Area Network (WRAN) standard. The simulation results show that the RL based CSS scheme improves the detection performance under channel fading/shadowing and overall cooperative learning capability.
频谱感知是认知无线电中检测频谱空洞的关键模块。频谱感知算法的性能受到信道损伤的影响,如多径衰落和阴影。CSS (Cooperative Spectrum Sensing)解决了上述问题,提高了辅助用户的空间分集增益。在本文中,我们提出了基于强化学习(RL)的CSS方案,其目标是通过最大化期望累积奖励来提高协作感知的准确性。融合中心(FC)采用强化学习的方法,通过与由协作单元和主发射机组成的无线电环境相互作用,做出全局决策。协作单元随机部署在衰落无线信道环境中,该环境被建模为马尔可夫决策过程(MDP)。为了满足IEEE 802.22无线区域网络(WRAN)标准的要求,采用策略迭代的方法给出了基于RL的CSS算法的最优解。仿真结果表明,基于RL的CSS方案提高了信道衰落/阴影下的检测性能和整体合作学习能力。
{"title":"Reinforcement Learning Based Decision Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radios","authors":"V. Balaji","doi":"10.1109/WISPNET.2018.8538528","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538528","url":null,"abstract":"Spectrum Sensing is a key module in Cognitive Radios (CR) for detecting spectrum holes. The performance of spectrum sensing algorithms is compromised due to channel impairments, such as, multi-path fading and shadowing. Cooperative Spectrum Sensing (CSS) scheme mitigates the above issues and improves the spatial diversity gain of Secondary Users (SUs). In this paper, we present Reinforcement Learning (RL) based CSS scheme with the objective of improving cooperative sensing accuracy by maximizing expected cumulative reward. Using reinforcement learning, the Fusion Center(FC) makes a global decision by interacting with the radio environment which consists of cooperative SUs and primary transmitter. The cooperative SUs are deployed randomly in a fading wireless channel environment modeled as a Markov Decision Process (MDP). The optimal solution of RL based CSS algorithm is formulated using policy iteration to meet the requirements of IEEE 802.22 Wireless Regional Area Network (WRAN) standard. The simulation results show that the RL based CSS scheme improves the detection performance under channel fading/shadowing and overall cooperative learning capability.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78472924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1