首页 > 最新文献

International Conference on IT Convergence and Security最新文献

英文 中文
New Proposed Z-Transform Based Encryption Algorithm 一种新的基于z变换的加密算法
Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740356
Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni
The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.
任何加密算法设计的首要目标都必须是防止非法攻击。然而,性能和实现成本也可能是另一个重要的问题。加密算法应该安全到足以被破解。加密是保护信息安全的一项基本技术。到目前为止,我们有不同的加密算法,如RSA, DES, Triple DES, AES和Blowfish。每种算法在实现数据安全方面都有自己的优势。本文提出了一种新的加密算法,该算法在发送端加密过程中使用异或运算和Z变换的概念。在接收端,我们使用反Z变换和异或操作来获得纯文本。在本文中,我们试图发明一种既安全又快速的新加密模型。
{"title":"New Proposed Z-Transform Based Encryption Algorithm","authors":"Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni","doi":"10.1109/ICITCS.2016.7740356","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740356","url":null,"abstract":"The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Semantic Framework for Software Requirement Specification 设计软件需求规范的语义框架
Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740324
Taimoor Hassan, Shoaib Hassan
In the recent past, domain specific solutions for detailed semantic analysis have got acceptable by natural language processing community and use of applications involving natural language based user interface. Different approaches that has been previously used is focusing on quality of text and improving the text contents by adding semantic information with text then the existing approaches used for semantic analysis can provide better results. In this, an approach was presented to address the problem of non- availability of semantic information required for better semantic analysis. This problem is solved by using semantic technology to annotate text of software requirements expressed in a natural language with their domain specific semantics and investigate the effect of semantic analysis with attached semantics. The presented approach uses a semantic framework specifically designed for interpretation and detailed semantic analysis of natural language software requirement specifications. The used framework is based on semantic technology involves knowledge extracted from existing software requirement documents and knowledge extracted from existing applications. The presented approach shows that by adapting and combing existing ontologies to support knowledge management, developing system and performing experiments on requirement of real world software systems. In this approach start with software requirement specification, after this clean the irrelevant requirements, convert the cleaned requirements into graph that represents inter related different elements. Represent the requirement graph into sparse matrix, after these all steps; we generate ontology with the help of OntoGen tool.
近年来,针对具体语义分析的领域特定解决方案已被自然语言处理社区和涉及基于自然语言的用户界面的应用所接受。现有的语义分析方法侧重于文本的质量,通过在文本中添加语义信息来改进文本内容,从而可以提供更好的结果。在此基础上,提出了一种解决语义信息不可用问题的方法。利用语义技术对用自然语言表达的软件需求文本进行领域特定语义标注,并研究附加语义的语义分析效果,从而解决了这一问题。所提出的方法使用了一个语义框架,专门用于解释和详细的自然语言软件需求规范的语义分析。所使用的框架基于语义技术,涉及从现有软件需求文档中提取的知识和从现有应用程序中提取的知识。该方法通过对现有本体的改编和结合,支持知识管理、系统开发和实际软件系统需求实验。在这种方法中,从软件需求规范开始,在清理不相关的需求之后,将清理后的需求转换成表示相互关联的不同元素的图。将需求图表示成稀疏矩阵,经过这些步骤;在OntoGen工具的帮助下生成本体。
{"title":"Design Semantic Framework for Software Requirement Specification","authors":"Taimoor Hassan, Shoaib Hassan","doi":"10.1109/ICITCS.2016.7740324","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740324","url":null,"abstract":"In the recent past, domain specific solutions for detailed semantic analysis have got acceptable by natural language processing community and use of applications involving natural language based user interface. Different approaches that has been previously used is focusing on quality of text and improving the text contents by adding semantic information with text then the existing approaches used for semantic analysis can provide better results. In this, an approach was presented to address the problem of non- availability of semantic information required for better semantic analysis. This problem is solved by using semantic technology to annotate text of software requirements expressed in a natural language with their domain specific semantics and investigate the effect of semantic analysis with attached semantics. The presented approach uses a semantic framework specifically designed for interpretation and detailed semantic analysis of natural language software requirement specifications. The used framework is based on semantic technology involves knowledge extracted from existing software requirement documents and knowledge extracted from existing applications. The presented approach shows that by adapting and combing existing ontologies to support knowledge management, developing system and performing experiments on requirement of real world software systems. In this approach start with software requirement specification, after this clean the irrelevant requirements, convert the cleaned requirements into graph that represents inter related different elements. Represent the requirement graph into sparse matrix, after these all steps; we generate ontology with the help of OntoGen tool.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique 基于整体特征提取和纠错码的生物识别模板保护技术
Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740341
Suzwani Ismail, Fakariah Hani Mohd Ali, S. A. Aljunid
Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and crossmatching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, Error Correcting Code (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.
生物特征模板保护是生物特征认证系统中的一个重要问题。这一点至关重要,因为一旦生物识别模板受到攻击,入侵者可以在不遵循适当注册程序的情况下将他/她引入系统。以往的生物特征模板研究存在精度低、模板间相关性高的局限性。这两个问题可能导致对这些模板的假接受攻击和交叉匹配攻击。为了解决这些问题,本研究旨在通过减少生物特征模板的误差来提高精度水平,通过生成不相关的特征向量来降低生物特征模板之间的相关性,以减少生物特征模板的误差,从而提高精度水平,并生成不相关的特征向量。为了减少误差和生成不相关的特征向量,分别设计了基于LDPC和RS结合的纠错码(Error Correcting Code, ECC)和基于LDA、PCA和ICA的基于整体的特征提取。概念验证在Iris生物识别模板上进行测试,使用来自Y基准图像存储库的X个样本。结果表明,所提出的模板保护技术能够将生物特征模板之间的相关性降低到B%,准确度提高A%。因此,该技术在不降低虹膜识别性能的前提下,是一种可行的、实用的模板保护技术。
{"title":"Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique","authors":"Suzwani Ismail, Fakariah Hani Mohd Ali, S. A. Aljunid","doi":"10.1109/ICITCS.2016.7740341","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740341","url":null,"abstract":"Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and crossmatching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, Error Correcting Code (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain 巴林王国项目管理软件的功能与复杂性分析
Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740339
Sarmad Mohammad
Abstract- Arab Open University conducted an online survey to determine the degree of usage for specific project management software to develop and enhance the project management process in Kingdom of Bahrain. The main purpose of this study is to find out new approach to make the use of project management more effective and efficient as possible. It's started with overview of the framework of project management and the current way to deal with project software. Functionality versus complexity and SWOT analysis conducted to find out the weak point in the current process; to check for the chance of enhancement and "new opportunity" to empower the current strength and to construct an effective metrics for these significant issues of most frequently software implemented in kingdom of Bahrain. The problem mainly stated that the users of project management software not take the full advantage of the information technology which raises the questions: how much users rely on the project management software and degree to measure user's satisfaction with the current project management software.
摘要-阿拉伯开放大学进行了一项在线调查,以确定巴林王国特定项目管理软件的使用程度,以开发和加强项目管理过程。本研究的主要目的是找出新的方法,使项目管理的使用更有效和高效。首先概述了项目管理的框架和当前处理项目软件的方法。功能性与复杂性,并进行SWOT分析,找出当前流程中的薄弱环节;检查增强的机会和“新机会”,以增强当前的实力,并为巴林王国实施的最常见的软件的这些重大问题构建有效的度量标准。问题主要表现为项目管理软件的用户没有充分利用信息技术的优势,这就提出了用户对项目管理软件的依赖程度和衡量用户对现有项目管理软件满意程度的问题。
{"title":"Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain","authors":"Sarmad Mohammad","doi":"10.1109/ICITCS.2016.7740339","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740339","url":null,"abstract":"Abstract- Arab Open University conducted an online survey to determine the degree of usage for specific project management software to develop and enhance the project management process in Kingdom of Bahrain. The main purpose of this study is to find out new approach to make the use of project management more effective and efficient as possible. It's started with overview of the framework of project management and the current way to deal with project software. Functionality versus complexity and SWOT analysis conducted to find out the weak point in the current process; to check for the chance of enhancement and \"new opportunity\" to empower the current strength and to construct an effective metrics for these significant issues of most frequently software implemented in kingdom of Bahrain. The problem mainly stated that the users of project management software not take the full advantage of the information technology which raises the questions: how much users rely on the project management software and degree to measure user's satisfaction with the current project management software.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems 求解高度多模态问题的快速收敛的斥力-推进萤火虫算法
Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740365
Abhijit Banerjee, D. Ghosh, Suvrojit Das
This paper proposes a modified firefly algorithm (PropFA) to solve highly multimodal problems with fast convergence. In this algorithm every firefly is fitted with a short term memory which facilitates the "Repulsion" force acting on every firefly whereas the introduction of brightness of the best firefly in the movement equation facilitates "Propulsion" force acting on the firefly. Furthermore; no firefly is allowed to move beyond its maximum stride parameter to prevent premature convergence. All other parameters α,β and γ and are designed to be adaptive to suite to almost all multimodal problems without setting them to any a-priori values. Efficiency of PropFA is then verified over six standard test functions. In all of them it is observed that PropFA converges faster than FA and PSO.
本文提出了一种改进的萤火虫算法(PropFA),用于求解高度多模态问题,收敛速度快。在该算法中,每只萤火虫都具有短期记忆,这有利于作用于每只萤火虫的“斥力”,而在运动方程中引入最佳萤火虫的亮度,则有利于作用于萤火虫的“推进力”。此外;不允许任何萤火虫移动超过其最大步幅参数,以防止过早收敛。所有其他参数α,β和γ和被设计为自适应套件几乎所有的多模态问题,而无需设置任何先验值。然后通过六个标准测试功能验证PropFA的效率。在所有这些算法中,profa的收敛速度都快于FA和PSO。
{"title":"Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems","authors":"Abhijit Banerjee, D. Ghosh, Suvrojit Das","doi":"10.1109/ICITCS.2016.7740365","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740365","url":null,"abstract":"This paper proposes a modified firefly algorithm (PropFA) to solve highly multimodal problems with fast convergence. In this algorithm every firefly is fitted with a short term memory which facilitates the \"Repulsion\" force acting on every firefly whereas the introduction of brightness of the best firefly in the movement equation facilitates \"Propulsion\" force acting on the firefly. Furthermore; no firefly is allowed to move beyond its maximum stride parameter to prevent premature convergence. All other parameters α,β and γ and are designed to be adaptive to suite to almost all multimodal problems without setting them to any a-priori values. Efficiency of PropFA is then verified over six standard test functions. In all of them it is observed that PropFA converges faster than FA and PSO.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127122033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Agent Based Architecture for Resource Allocation in Cloud Computing 云计算中基于安全代理的资源分配体系结构
Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740307
Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim
Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.
资源分配是云计算中最具挑战性的任务,服务提供商寻求找到一种有效和高效的资源分配,以满足用户的所有需求并保持服务质量。本文提出了一种基于agent的动态环境资源分配体系结构,通过对各个层次的角色进行定义。所建议的体系结构具有与分布式环境中的资源分配相关的各种策略,例如可靠性、性能、可伸缩性以及与安全性相关的问题。本文还介绍了研究者提出的各种架构及其局限性。所提出的架构克服了先前研究人员提出的所有限制。
{"title":"A Secure Agent Based Architecture for Resource Allocation in Cloud Computing","authors":"Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim","doi":"10.1109/ICITCS.2016.7740307","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740307","url":null,"abstract":"Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131631337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market 为赞助搜索市场设计的增强TAC/AA竞争模型
Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021731
Bing Li, Xin Fang, R. Sun, Xue Luo, Wei-Hao Chang
This article describes an improved competition model named NightMare Agent for Trading Agent Competition Ad Auction which simulate the real Sponsored Search Market. The experiment result shows that the proposed model had satisfactory performance, especially fitted with the high capacity situation. Furthermore, this article also evaluates the results with other classic models, and discusses the future works.
本文提出了一种基于交易代理竞争广告拍卖的改进竞争模型——梦魇代理,以模拟真实的赞助搜索市场。实验结果表明,该模型具有良好的性能,特别适合于高容量情况。此外,本文还对其他经典模型的结果进行了评价,并对今后的工作进行了讨论。
{"title":"An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market","authors":"Bing Li, Xin Fang, R. Sun, Xue Luo, Wei-Hao Chang","doi":"10.1109/ICITCS.2014.7021731","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021731","url":null,"abstract":"This article describes an improved competition model named NightMare Agent for Trading Agent Competition Ad Auction which simulate the real Sponsored Search Market. The experiment result shows that the proposed model had satisfactory performance, especially fitted with the high capacity situation. Furthermore, this article also evaluates the results with other classic models, and discusses the future works.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Identity-Based Ring Signcryption Scheme 基于身份的环签名加密方案
Pub Date : 2013-04-01 DOI: 10.1007/978-94-007-5860-5_18
G. Sharma, S. Bala, A. Verma
{"title":"An Identity-Based Ring Signcryption Scheme","authors":"G. Sharma, S. Bala, A. Verma","doi":"10.1007/978-94-007-5860-5_18","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_18","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Full-Scaled Experiment for Behavior Investigation of Reinforced Concrete Columns with High-Strength Wire Ropes as Lateral Spiral Reinforcement 高强钢丝绳作横向螺旋配筋钢筋混凝土柱性能研究的实尺试验
Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_136
Kyu Won Kim, J. Won, S. Jung, Jung Won Park, Moonok Kim
{"title":"Full-Scaled Experiment for Behavior Investigation of Reinforced Concrete Columns with High-Strength Wire Ropes as Lateral Spiral Reinforcement","authors":"Kyu Won Kim, J. Won, S. Jung, Jung Won Park, Moonok Kim","doi":"10.1007/978-94-007-5860-5_136","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_136","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory 基于先天免疫和危险理论的新型恶意软件检测框架
Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_4
M. Ali, M. A. Maarof
{"title":"A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory","authors":"M. Ali, M. A. Maarof","doi":"10.1007/978-94-007-5860-5_4","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_4","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on IT Convergence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1