首页 > 最新文献

2020 15th International Conference on Computer Engineering and Systems (ICCES)最新文献

英文 中文
Security Framework for Internet of Things (IoT) 物联网(IoT)安全框架
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334589
Sherif El-Gendy, Marianne A. Azer
The Internet of things technology provides people with new experiences through the interaction between devices, people and networks. Examples include smart grid, smart health, smart home, smart workplace, e-commerce, smart industrial management, and e-governance. More and more devices are connected every day, resulting in greater security threats and problems. An extensive IoT security model is needed in order to aid resource-based IoT devices and end security. In this paper, we focus on the IoT devices applications and networks, in addition to the attack vectors and security requirements for IoT systems, as well as the organizational approach towards IoT security. We also propose a security architecture to provide security enabled IoT services, and provide a baseline for security deployment.
物联网技术通过设备、人和网络之间的交互,为人们提供了新的体验。例子包括智能电网、智能健康、智能家居、智能工作场所、电子商务、智能工业管理和电子政务。每天连接的设备越来越多,带来的安全威胁和问题也越来越大。为了帮助基于资源的物联网设备和终端安全,需要一个广泛的物联网安全模型。在本文中,我们将重点关注物联网设备应用和网络,以及物联网系统的攻击媒介和安全要求,以及物联网安全的组织方法。我们还提出了一个安全架构,以提供安全的物联网服务,并为安全部署提供基线。
{"title":"Security Framework for Internet of Things (IoT)","authors":"Sherif El-Gendy, Marianne A. Azer","doi":"10.1109/ICCES51560.2020.9334589","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334589","url":null,"abstract":"The Internet of things technology provides people with new experiences through the interaction between devices, people and networks. Examples include smart grid, smart health, smart home, smart workplace, e-commerce, smart industrial management, and e-governance. More and more devices are connected every day, resulting in greater security threats and problems. An extensive IoT security model is needed in order to aid resource-based IoT devices and end security. In this paper, we focus on the IoT devices applications and networks, in addition to the attack vectors and security requirements for IoT systems, as well as the organizational approach towards IoT security. We also propose a security architecture to provide security enabled IoT services, and provide a baseline for security deployment.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predicting the Tweet Location Based on KNN-Sentimental Analysis 基于knn -情感分析的推文位置预测
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334566
Aml Mostafa, Walaa K. Gad, T. Abdelkader, N. Badr
Geographical information is important in several applications, such as, advertising and recommending. Despite the availability and the existence of social media, especially twitter, the geographical coordinates are often hidden according to privacy reasons. In this paper, a new model is proposed to predict the tweet location based on the KNN-Sentimental Analysis (KNNSA) model. Predicting the tweet location based on the KNN-sentiment analysis (KNNSA) model extracts text features from the tweet in addition to the date and time features. Then, applying sentimental analysis and classifying the data by K-nearest neighbors (KNN) classifier. The (KNNSA) model is evaluated and compared to the previous work and it achieves better performance in terms of root mean squared error (RMSE) and of the mean absolute error (MAE).
地理信息在许多应用中都很重要,比如广告和推荐。尽管社交媒体,尤其是twitter的存在和可用性,但出于隐私原因,地理坐标通常是隐藏的。本文提出了一种基于KNNSA (knn - sentiment Analysis)模型的推文位置预测模型。基于KNNSA (KNN-sentiment analysis)模型的推文位置预测,除了从推文中提取日期和时间特征外,还提取了文本特征。然后,应用情感分析,采用k近邻分类器对数据进行分类。对(KNNSA)模型进行了评估和比较,发现该模型在均方根误差(RMSE)和平均绝对误差(MAE)方面取得了更好的性能。
{"title":"Predicting the Tweet Location Based on KNN-Sentimental Analysis","authors":"Aml Mostafa, Walaa K. Gad, T. Abdelkader, N. Badr","doi":"10.1109/ICCES51560.2020.9334566","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334566","url":null,"abstract":"Geographical information is important in several applications, such as, advertising and recommending. Despite the availability and the existence of social media, especially twitter, the geographical coordinates are often hidden according to privacy reasons. In this paper, a new model is proposed to predict the tweet location based on the KNN-Sentimental Analysis (KNNSA) model. Predicting the tweet location based on the KNN-sentiment analysis (KNNSA) model extracts text features from the tweet in addition to the date and time features. Then, applying sentimental analysis and classifying the data by K-nearest neighbors (KNN) classifier. The (KNNSA) model is evaluated and compared to the previous work and it achieves better performance in terms of root mean squared error (RMSE) and of the mean absolute error (MAE).","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134035774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Computer Vision-Based Techniques for Autism Symptoms Detection and Recognition 基于计算机视觉的自闭症症状检测与识别技术综述
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334560
E. T. Sadek, Noha A. Seada, S. Ghoniemy
Autism is a mental disorder appearing in children as a delay in their social and communicational skills. ASD causes are still mysterious but scientists believe that they are caused by genetic defects. Diagnosing autism has been an exhaustive process that attracts several researchers’ attentions. In this work, an overall description of autism its classes, signs and diagnosing protocols are covered. As computational technologies helped in assisting almost every field it added advantages in detecting and recognizing autism In this work, deep investigation of computer vision-based protocols in cooperation with machine learning technologies are discussed to propose autism diagnosing solution.
自闭症是儿童的一种精神障碍,表现为社交和沟通能力的延迟。自闭症的病因仍然是个谜,但科学家们认为是由遗传缺陷引起的。自闭症的诊断一直是一个详尽的过程,吸引了许多研究人员的注意。在这项工作中,对自闭症的分类、症状和诊断方案进行了全面的描述。由于计算技术在自闭症的检测和识别方面几乎可以帮助到每一个领域,它为自闭症的检测和识别增加了优势。本研究将深入研究基于计算机视觉的协议,并与机器学习技术合作,提出自闭症诊断的解决方案。
{"title":"A Review on Computer Vision-Based Techniques for Autism Symptoms Detection and Recognition","authors":"E. T. Sadek, Noha A. Seada, S. Ghoniemy","doi":"10.1109/ICCES51560.2020.9334560","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334560","url":null,"abstract":"Autism is a mental disorder appearing in children as a delay in their social and communicational skills. ASD causes are still mysterious but scientists believe that they are caused by genetic defects. Diagnosing autism has been an exhaustive process that attracts several researchers’ attentions. In this work, an overall description of autism its classes, signs and diagnosing protocols are covered. As computational technologies helped in assisting almost every field it added advantages in detecting and recognizing autism In this work, deep investigation of computer vision-based protocols in cooperation with machine learning technologies are discussed to propose autism diagnosing solution.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plenary Talk I : Energy Harvesting and Management Techniques for Wireless Sensor Networks 全体会议报告一:无线传感器网络的能量收集和管理技术
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334677
H. Fahmy
Networking is a field of integration, hardware and software, protocols and standards, simulation and testbeds, wired and wireless, VLSI and communication, energy harvesting and management, an orchestrated harmony that collaborates dependably, all for the good of a connected well-performing network.To tackle the limited energy resources in Wireless Sensor Networks (WSNs), two approaches may be used separately or jointly to maintain or increase network lifetime; specifically, energy harvesting and/or energy management:Energy harvesting refers to harnessing energy from the surrounding nature or other energy sources such as human body and subsequently converting it to electrical energy. The harnessed electrical energy powers the sensor nodes.Energy management schemes take into account several interacting factors that jointly effect the power consumption of a wireless sensor node. Typically, these factors are the specific sensor type, data transmission, radio energy consumption and the sensing subsystem.Based on the WSN architecture and power expenditure, several approaches for energy management have to be embraced, even simultaneously, to reduce power consumption. Generally, three main techniques might be identified; explicitly, duty-cycling, data-driven, and mobility approaches.This talk provides an insight into the highly important topic of increasing or maintaining the lifetime of WSNs through managing the energy reservoir of sensor nodes.
网络是一个集成、硬件和软件、协议和标准、仿真和测试平台、有线和无线、超大规模集成电路和通信、能量收集和管理的领域,是一个协调和谐、可靠协作的领域,所有这些都是为了连接一个性能良好的网络。为了解决无线传感器网络(WSNs)中有限的能量资源,可以单独或联合使用两种方法来维持或延长网络寿命;具体来说,能量收集和/或能量管理:能量收集是指利用周围自然或其他能量来源(如人体)的能量,然后将其转化为电能。利用的电能为传感器节点供电。能量管理方案考虑了几个相互作用的因素,这些因素共同影响无线传感器节点的功耗。通常,这些因素是特定的传感器类型,数据传输,无线电能量消耗和传感子系统。基于WSN架构和功耗,必须采用几种能源管理方法,甚至同时采用,以降低功耗。一般来说,可以确定三种主要技术;明确地说,职责循环、数据驱动和移动性方法。通过管理传感器节点的能量库来增加或维持wsn的生命周期,这是一个非常重要的话题。
{"title":"Plenary Talk I : Energy Harvesting and Management Techniques for Wireless Sensor Networks","authors":"H. Fahmy","doi":"10.1109/ICCES51560.2020.9334677","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334677","url":null,"abstract":"Networking is a field of integration, hardware and software, protocols and standards, simulation and testbeds, wired and wireless, VLSI and communication, energy harvesting and management, an orchestrated harmony that collaborates dependably, all for the good of a connected well-performing network.To tackle the limited energy resources in Wireless Sensor Networks (WSNs), two approaches may be used separately or jointly to maintain or increase network lifetime; specifically, energy harvesting and/or energy management:Energy harvesting refers to harnessing energy from the surrounding nature or other energy sources such as human body and subsequently converting it to electrical energy. The harnessed electrical energy powers the sensor nodes.Energy management schemes take into account several interacting factors that jointly effect the power consumption of a wireless sensor node. Typically, these factors are the specific sensor type, data transmission, radio energy consumption and the sensing subsystem.Based on the WSN architecture and power expenditure, several approaches for energy management have to be embraced, even simultaneously, to reduce power consumption. Generally, three main techniques might be identified; explicitly, duty-cycling, data-driven, and mobility approaches.This talk provides an insight into the highly important topic of increasing or maintaining the lifetime of WSNs through managing the energy reservoir of sensor nodes.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic All-Digital Phase-Locked Loop System Design and optimization Tool 自动全数字锁相环系统设计与优化工具
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334613
Abdelrahman S. Moustafa, H. Omran, K. Sharaf
An automated design and optimization tool for all digital phase locked-loop (ADPLL) system is presented in this paper. The ADPLL system design goal is to determine the digital loop filter (DLF) coefficients using analytic noise models and phase noise simulation results for each ADPLL block, then the DLF coefficients are optimized using evolutionary optimization method to achieve the optimum locking time and phase noise of the ADPLL. The system simulation results of the ADPLL designed by the tool show good agreement with the system’s required specifications.
介绍了一种全数字锁相环(ADPLL)系统的自动化设计与优化工具。ADPLL系统的设计目标是利用解析噪声模型和相位噪声仿真结果确定ADPLL各模块的数字环路滤波器(DLF)系数,然后采用进化优化方法对DLF系数进行优化,以实现ADPLL的最佳锁相时间和相位噪声。用该工具设计的ADPLL的系统仿真结果表明,该ADPLL符合系统的要求。
{"title":"Automatic All-Digital Phase-Locked Loop System Design and optimization Tool","authors":"Abdelrahman S. Moustafa, H. Omran, K. Sharaf","doi":"10.1109/ICCES51560.2020.9334613","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334613","url":null,"abstract":"An automated design and optimization tool for all digital phase locked-loop (ADPLL) system is presented in this paper. The ADPLL system design goal is to determine the digital loop filter (DLF) coefficients using analytic noise models and phase noise simulation results for each ADPLL block, then the DLF coefficients are optimized using evolutionary optimization method to achieve the optimum locking time and phase noise of the ADPLL. The system simulation results of the ADPLL designed by the tool show good agreement with the system’s required specifications.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-To-End Driver Distraction Recognition Using Novel Low Lighting Support Dataset 基于新型低光照支持数据集的端到端驾驶员分心识别
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334619
M. H. Saad, M. Khalil, Hazem M. Abbas
In this paper, seven End-To-End deep learning models, including three sequence models, were trained for driver distractions recognition. One of these models (Convolutional GRU) achieved 95.48% test-accuracy. The performance of each model was analyzed using different techniques like confusion matrix, t-SNE representation, and saliency map. In addition, the largest driver distractions dataset, to date, was presented. This dataset contains ten classes and comes with temporal information. Using the NoIR technology the dataset was captured, that makes the dataset to be able to contain samples at different lighting conditions in case of using IR LEDs. The dataset contains 70 drivers either males or females.
本文采用7个端到端深度学习模型(包括3个序列模型)进行驾驶员分心识别训练。其中一个模型(卷积GRU)的测试准确率达到95.48%。使用不同的技术(如混淆矩阵、t-SNE表示和显著性图)分析每个模型的性能。此外,还展示了迄今为止最大的驾驶员分心数据集。该数据集包含十个类,并附带时间信息。使用NoIR技术捕获数据集,这使得数据集能够在使用IR led的情况下包含不同照明条件下的样本。该数据集包含70名男性或女性司机。
{"title":"End-To-End Driver Distraction Recognition Using Novel Low Lighting Support Dataset","authors":"M. H. Saad, M. Khalil, Hazem M. Abbas","doi":"10.1109/ICCES51560.2020.9334619","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334619","url":null,"abstract":"In this paper, seven End-To-End deep learning models, including three sequence models, were trained for driver distractions recognition. One of these models (Convolutional GRU) achieved 95.48% test-accuracy. The performance of each model was analyzed using different techniques like confusion matrix, t-SNE representation, and saliency map. In addition, the largest driver distractions dataset, to date, was presented. This dataset contains ten classes and comes with temporal information. Using the NoIR technology the dataset was captured, that makes the dataset to be able to contain samples at different lighting conditions in case of using IR LEDs. The dataset contains 70 drivers either males or females.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel Multi-hop Routing Protocol for 5G Backhauling Network Using HPC Platform 基于HPC平台的5G回程网络并行多跳路由协议
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334567
Somaya A. Aboulrous, A. El-Moursy, M. Saad, Amany Abdelsamea, S. Nassar, Hazem M. Abbas
Fifth generation (5G) systems are considered as the future of telecommunications and data processing. 5G systems are envisaged to increase current network capacity by 1000-fold. In addition to increasing spectral efficiency and utilizing wider bandwidths, ultra network densification with wireless small cells is considered a significant capacity-enhancing method for meeting the ever-increasing demand of 5G data traffic requirements. The enormous amounts of data traffic generated in inter-small-cell 5G backhaul networks require efficient routing protocols to speed up the routing decisions, while ensuring high data rates, low latency, and low power consumption requirements. Therefore, a parallel routing protocol is proposed to speed up routing decisions in 5G backhaul networks, using high performance computing (HPC). We explore the efficiency of utilizing HPC to manage and speed up the parallel routing protocol using different communication network sizes. Our numerical results indicate that our HPC implementation achieves a routing speed-up of 37x for large network size (2048).
第五代(5G)系统被认为是电信和数据处理的未来。预计5G系统将使目前的网络容量增加1000倍。除了提高频谱效率和利用更宽的带宽外,无线小蜂窝的超网络密度被认为是满足日益增长的5G数据流量需求的重要容量增强方法。小蜂窝间5G回程网络中产生的大量数据流量需要高效的路由协议来加快路由决策,同时确保高数据速率、低延迟和低功耗要求。因此,提出一种并行路由协议,利用高性能计算(HPC)加快5G回程网络的路由决策速度。探讨了在不同通信网络规模下,利用高性能计算对并行路由协议进行管理和加速的效率。我们的数值结果表明,我们的HPC实现在大型网络规模(2048)下实现了37倍的路由加速。
{"title":"Parallel Multi-hop Routing Protocol for 5G Backhauling Network Using HPC Platform","authors":"Somaya A. Aboulrous, A. El-Moursy, M. Saad, Amany Abdelsamea, S. Nassar, Hazem M. Abbas","doi":"10.1109/ICCES51560.2020.9334567","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334567","url":null,"abstract":"Fifth generation (5G) systems are considered as the future of telecommunications and data processing. 5G systems are envisaged to increase current network capacity by 1000-fold. In addition to increasing spectral efficiency and utilizing wider bandwidths, ultra network densification with wireless small cells is considered a significant capacity-enhancing method for meeting the ever-increasing demand of 5G data traffic requirements. The enormous amounts of data traffic generated in inter-small-cell 5G backhaul networks require efficient routing protocols to speed up the routing decisions, while ensuring high data rates, low latency, and low power consumption requirements. Therefore, a parallel routing protocol is proposed to speed up routing decisions in 5G backhaul networks, using high performance computing (HPC). We explore the efficiency of utilizing HPC to manage and speed up the parallel routing protocol using different communication network sizes. Our numerical results indicate that our HPC implementation achieves a routing speed-up of 37x for large network size (2048).","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page] (标题页)
Pub Date : 2020-12-15 DOI: 10.1109/icces51560.2020.9334681
{"title":"[Title page]","authors":"","doi":"10.1109/icces51560.2020.9334681","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334681","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[ICCES 2020 Copyright notice] [ICCES 2020版权声明]
Pub Date : 2020-12-15 DOI: 10.1109/icces51560.2020.9334617
{"title":"[ICCES 2020 Copyright notice]","authors":"","doi":"10.1109/icces51560.2020.9334617","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334617","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICCES 2020 Paper Statistics ICCES 2020论文统计
Pub Date : 2020-12-15 DOI: 10.1109/icces51560.2020.9334602
{"title":"ICCES 2020 Paper Statistics","authors":"","doi":"10.1109/icces51560.2020.9334602","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334602","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 15th International Conference on Computer Engineering and Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1