Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924263
Xinlu Zong, Jiayuan Du, Wei Liu, Lu Zhang, Qian Huang
In order to quickly and efficiently simulate the crowd movement process under the evacuation scene, so as to reduce the casualties in emergency evacuation, this article proposes an indoor emergency evacuation model based on the improved artificial swarm algorithm. In this article, the cellular automata (CA) model is used to establish the evacuation environment, and then the artificial bee colony (ABC) algorithm is used to simulate the crowd evacuation. However, due to too many obstacles existing in the neighboring cells of some position, the individual in that position have to wait. If the distance equation is used to calculate the fitness, it may cause other individuals to choose these positions as new position and repeat the same mistake above. To reduce the occurrence of such cases, we improve the fitness function of the ABC algorithm. In the fitness function, the factors of attraction and repulsion force in social force model are introduced. And on the basis of the ABC algorithm, we propose the visual employed bee. The visual employed bee leads the onlooker bee to evacuate, so as to improve the efficiency of evacuation. The research results of this article can provide ideas for evacuation modeling and useful guidance for formulating evacuation strategies to reduce evacuation time and disaster losses.
{"title":"Indoor Emergency Evacuation Model Based on Artificial Bee Colony Algorithm","authors":"Xinlu Zong, Jiayuan Du, Wei Liu, Lu Zhang, Qian Huang","doi":"10.1109/IDAACS.2019.8924263","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924263","url":null,"abstract":"In order to quickly and efficiently simulate the crowd movement process under the evacuation scene, so as to reduce the casualties in emergency evacuation, this article proposes an indoor emergency evacuation model based on the improved artificial swarm algorithm. In this article, the cellular automata (CA) model is used to establish the evacuation environment, and then the artificial bee colony (ABC) algorithm is used to simulate the crowd evacuation. However, due to too many obstacles existing in the neighboring cells of some position, the individual in that position have to wait. If the distance equation is used to calculate the fitness, it may cause other individuals to choose these positions as new position and repeat the same mistake above. To reduce the occurrence of such cases, we improve the fitness function of the ABC algorithm. In the fitness function, the factors of attraction and repulsion force in social force model are introduced. And on the basis of the ABC algorithm, we propose the visual employed bee. The visual employed bee leads the onlooker bee to evacuate, so as to improve the efficiency of evacuation. The research results of this article can provide ideas for evacuation modeling and useful guidance for formulating evacuation strategies to reduce evacuation time and disaster losses.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924232
Y. E. Ahmed, K. Adjallah, Magdi B.M. Amin
Wireless data communication has a key role in any updated information technology-based project. Mobility, flexibility, scalability, and easy-to-install are the main features of wireless data acquisition systems. While the limited lifetime, availability, failure risk, and reliability are still significant challenges. Inspired by the spider webs, as an attractive natural communication topology, this work proposes using the spider webs topology to design reliable and resilient, intelligent wireless sensor networks to be implemented for wireless data acquisition, aiming to provide promising solutions for such problems. The paper provides several definitions for innovated concepts and relevant notations such as the virtual thread, virtual thread thickness, virtual thread density, sensor nodes and base station deployment, data shortest path, data path resiliency, and reliability, from spider webs point of view. Then, it describes the significant research challenges to be addressed for applicable 3D Virtual spider webs. Also, it illustrates the customization approach of 3D virtual spider webs of wireless data acquisition for service, security, resources planning, and decision making.
{"title":"3D Virtual Biomimetic Network: a Topology for Resilient Intelligent Wireless Sensor Networks","authors":"Y. E. Ahmed, K. Adjallah, Magdi B.M. Amin","doi":"10.1109/IDAACS.2019.8924232","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924232","url":null,"abstract":"Wireless data communication has a key role in any updated information technology-based project. Mobility, flexibility, scalability, and easy-to-install are the main features of wireless data acquisition systems. While the limited lifetime, availability, failure risk, and reliability are still significant challenges. Inspired by the spider webs, as an attractive natural communication topology, this work proposes using the spider webs topology to design reliable and resilient, intelligent wireless sensor networks to be implemented for wireless data acquisition, aiming to provide promising solutions for such problems. The paper provides several definitions for innovated concepts and relevant notations such as the virtual thread, virtual thread thickness, virtual thread density, sensor nodes and base station deployment, data shortest path, data path resiliency, and reliability, from spider webs point of view. Then, it describes the significant research challenges to be addressed for applicable 3D Virtual spider webs. Also, it illustrates the customization approach of 3D virtual spider webs of wireless data acquisition for service, security, resources planning, and decision making.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133358398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924405
R. Voronov, A. Moschevikin, A. Sikora
When designing and installing Indoor Positioning Systems, several interrelated tasks have to be solved to find an optimum placement of the Access Points. For this purpose, a mathematical model for a predefined number of access points indoors is presented. Two iterative algorithms for the minimization of localization error of a mobile object are described. Both algorithms use local search technique and signal level probabilities. Previously registered signal strengths maps were used in computer simulation.
{"title":"A Method for Optimum Placement of Access Points in Indoor Positioning Systems","authors":"R. Voronov, A. Moschevikin, A. Sikora","doi":"10.1109/IDAACS.2019.8924405","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924405","url":null,"abstract":"When designing and installing Indoor Positioning Systems, several interrelated tasks have to be solved to find an optimum placement of the Access Points. For this purpose, a mathematical model for a predefined number of access points indoors is presented. Two iterative algorithms for the minimization of localization error of a mobile object are described. Both algorithms use local search technique and signal level probabilities. Previously registered signal strengths maps were used in computer simulation.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"112 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/idaacs.2019.8924298
Mahboobeh Ramezani Farokhad, J. Otegi-Olaso, Leonardo Sastoque Pinilla, N. Toledo, L. N. L. Lacalle
The success of R&D projects and innovation projects have a significant effect on technology enhancement and new product development, while developing project success criteria and customizing methods to measure the project success for R&D projects and innovation projects is a demanding task. In addition, the late assessment of project success in R&D projects and innovation projects has been associated with noticeable waste in time and budget. This research is based on previous studies of the authors that customized the new hybrid methodology to manage R&D&I projects in CFAA and validated the project success dimensions and criteria. In the previous researches of authors the hybrid project management methodology for R&D&I projects was developed and the project success dimensions and criteria were defined. This research aimed to answer the following question regarding the R&D&I project success evaluation. When is an appropriate time to assess the project success? Apparently the late assessment of project success is associated with significant drawbacks, therefore, the assessment of project success during the project management life cycle is the purpose of this research. The research methodology is based on the survey regarding the assessment of the project success from the project manager's perspective. The project's success criteria in the survey were translated into qualitative questions ranked through Likert scale and the survey was constructed through reviewing the literature regarding the project success criteria. The validity and reliability of survey were confirmed through smart PLS software to validate the relevancy of questions to measure the contribution of each project success dimensions in the project's success. Finally, the extension of the Hybrid R&D&I project management methodology is proposed which contains the gates to assess the project success criteria by means of this survey in each gate during the project management life cycle.
{"title":"Assessing the Success of R&D Projects and Innovation Projects through Project Management Life Cycle","authors":"Mahboobeh Ramezani Farokhad, J. Otegi-Olaso, Leonardo Sastoque Pinilla, N. Toledo, L. N. L. Lacalle","doi":"10.1109/idaacs.2019.8924298","DOIUrl":"https://doi.org/10.1109/idaacs.2019.8924298","url":null,"abstract":"The success of R&D projects and innovation projects have a significant effect on technology enhancement and new product development, while developing project success criteria and customizing methods to measure the project success for R&D projects and innovation projects is a demanding task. In addition, the late assessment of project success in R&D projects and innovation projects has been associated with noticeable waste in time and budget. This research is based on previous studies of the authors that customized the new hybrid methodology to manage R&D&I projects in CFAA and validated the project success dimensions and criteria. In the previous researches of authors the hybrid project management methodology for R&D&I projects was developed and the project success dimensions and criteria were defined. This research aimed to answer the following question regarding the R&D&I project success evaluation. When is an appropriate time to assess the project success? Apparently the late assessment of project success is associated with significant drawbacks, therefore, the assessment of project success during the project management life cycle is the purpose of this research. The research methodology is based on the survey regarding the assessment of the project success from the project manager's perspective. The project's success criteria in the survey were translated into qualitative questions ranked through Likert scale and the survey was constructed through reviewing the literature regarding the project success criteria. The validity and reliability of survey were confirmed through smart PLS software to validate the relevancy of questions to measure the contribution of each project success dimensions in the project's success. Finally, the extension of the Hybrid R&D&I project management methodology is proposed which contains the gates to assess the project success criteria by means of this survey in each gate during the project management life cycle.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115655988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924464
Xinlu Zong, Lu Zhang, Jiayuan Du, Liu Wei, Qian Huang
Abnormal event detection, as a hot research field in intelligent video monitoring system, has attracted many researchers' attention in recent years. In order to overcome the shortcomings of the semi-supervised model, namely the training sample is difficult to contain all possible situations, leading to the occurrence of error detection, we propose a method based on support vector data description (SVDD). The principle of the method is to train the model with normal data and abnormal data respectively to obtain two SVDD models, and then judge whether there are abnormal events according to the results of the two models. This method has been tested by existing data sets and achieved good results.
{"title":"Abnormal Event Detection in Video Based on SVDD","authors":"Xinlu Zong, Lu Zhang, Jiayuan Du, Liu Wei, Qian Huang","doi":"10.1109/IDAACS.2019.8924464","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924464","url":null,"abstract":"Abnormal event detection, as a hot research field in intelligent video monitoring system, has attracted many researchers' attention in recent years. In order to overcome the shortcomings of the semi-supervised model, namely the training sample is difficult to contain all possible situations, leading to the occurrence of error detection, we propose a method based on support vector data description (SVDD). The principle of the method is to train the model with normal data and abnormal data respectively to obtain two SVDD models, and then judge whether there are abnormal events according to the results of the two models. This method has been tested by existing data sets and achieved good results.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114369283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924276
A. Lagunov, A. Orlov
The article describes the mathematical apparatus of the inertial navigation system, developed algorithms for the functioning of the navigation system, in particular, motion detection and correction of inertial navigation system readings, which allow to improve the accuracy of coordinates, as well as the method of integrating data from a strapless inertial navigation system and tachometers based on Kalman filter. Based on the mathematical model, we built a flowchart of the navigation system operating in the form of functional diagrams by the DFD methodology. Based on the algorithm, we created a prototype of a robot with an inertial navigation system. The tests of the robot were successful.
{"title":"Mathematical Model of the Compact Inertial Navigation System of the Robot","authors":"A. Lagunov, A. Orlov","doi":"10.1109/IDAACS.2019.8924276","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924276","url":null,"abstract":"The article describes the mathematical apparatus of the inertial navigation system, developed algorithms for the functioning of the navigation system, in particular, motion detection and correction of inertial navigation system readings, which allow to improve the accuracy of coordinates, as well as the method of integrating data from a strapless inertial navigation system and tachometers based on Kalman filter. Based on the mathematical model, we built a flowchart of the navigation system operating in the form of functional diagrams by the DFD methodology. Based on the algorithm, we created a prototype of a robot with an inertial navigation system. The tests of the robot were successful.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117173395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924369
T. Polhul, A. Yarovyi
This study aimed to develop a method of fraudster fingerprint formation during mobile application installations, based on a fuzzy model for fraudster fingerprint formation and algorithms of its use for fraudster fingerprint formation. This method allows determining the reason of labeling user by a particular class during fraud detection. The use of the developed method in fraud detection tasks makes it possible to correctly identify 99.56% of users in general and 80.43% of correctly determined fraudsters in particular and speed up the fraud detection process.
{"title":"Method of Fraudster Fingerprint Formation During Mobile Application Installations","authors":"T. Polhul, A. Yarovyi","doi":"10.1109/IDAACS.2019.8924369","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924369","url":null,"abstract":"This study aimed to develop a method of fraudster fingerprint formation during mobile application installations, based on a fuzzy model for fraudster fingerprint formation and algorithms of its use for fraudster fingerprint formation. This method allows determining the reason of labeling user by a particular class during fraud detection. The use of the developed method in fraud detection tasks makes it possible to correctly identify 99.56% of users in general and 80.43% of correctly determined fraudsters in particular and speed up the fraud detection process.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924393
G. Markowsky, L. Markowsky
Automated and semi-automated systems that derive actionable information from massive, heterogeneous datasets are essential for many applications. The reasoning of such systems must be as clear as possible in order to earn our trust. Lattices have begun to play a key role in computer science finding applications in distributed computing, programming languages, concurrency theory, and data mining, thereby justifying G. C. Rota's belief that lattice theory will play an important role in 21st Century mathematics [1]. In some instances, researchers must deal with posets that are not necessarily lattices and the question arises how these posets can be embedded in lattices. A classic way to answer this question is to construct the MacNeille completion of the lattice, which is the most compact way to embed a poset into a lattice. In 1973 G. Markowsky introduced the poset of irreducibles construction in his dissertation and demonstrated that this was a very compact way to represent a lattice. In addition, the poset of irreducibles has many of the properties of the poset of join-irreducibles of distributive lattices that was introduced by G. Birkhoff and described in his book [2]. In this paper, we show how to construct the poset of irreducibles for the MacNeille completion of a poset efficiently. We conclude with some applications of these ideas.
从海量异构数据集中获取可操作信息的自动化和半自动化系统对于许多应用程序至关重要。为了赢得我们的信任,这些系统的推理必须尽可能清晰。格已经开始在计算机科学中发挥关键作用,在分布式计算、编程语言、并发理论和数据挖掘中得到应用,从而证明了G. C. Rota关于格理论将在21世纪数学中发挥重要作用的信念[1]。在某些情况下,研究人员必须处理不一定是格的偏序集,问题是如何将这些偏序集嵌入到格中。回答这个问题的一个经典方法是构造晶格的MacNeille补全,这是将偏序集嵌入晶格的最紧凑的方法。1973年,G. Markowsky在他的论文中引入了不可约构造的序集,并证明了这是一种非常紧凑的表示格的方法。此外,不可约偏集具有G. Birkhoff在其著作[2]中引入的分配格的联合不可约偏集的许多性质。在本文中,我们给出了如何有效地构造一个微集的不可约微集的MacNeille补全。最后给出了这些思想的一些应用。
{"title":"Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion","authors":"G. Markowsky, L. Markowsky","doi":"10.1109/IDAACS.2019.8924393","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924393","url":null,"abstract":"Automated and semi-automated systems that derive actionable information from massive, heterogeneous datasets are essential for many applications. The reasoning of such systems must be as clear as possible in order to earn our trust. Lattices have begun to play a key role in computer science finding applications in distributed computing, programming languages, concurrency theory, and data mining, thereby justifying G. C. Rota's belief that lattice theory will play an important role in 21st Century mathematics [1]. In some instances, researchers must deal with posets that are not necessarily lattices and the question arises how these posets can be embedded in lattices. A classic way to answer this question is to construct the MacNeille completion of the lattice, which is the most compact way to embed a poset into a lattice. In 1973 G. Markowsky introduced the poset of irreducibles construction in his dissertation and demonstrated that this was a very compact way to represent a lattice. In addition, the poset of irreducibles has many of the properties of the poset of join-irreducibles of distributive lattices that was introduced by G. Birkhoff and described in his book [2]. In this paper, we show how to construct the poset of irreducibles for the MacNeille completion of a poset efficiently. We conclude with some applications of these ideas.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IDAACS.2019.8924242
N. Yehorchenkova, Iurii Teslia, Oleksii Yehorchenkov, Liubov Kubiavka, T. Latysheva, Yevheniia Kataieva, V. Olena
In the article authors present model of management of project and operational production what base on using of Monte-Carlo method. The main feature of the model is providing the ability to effective manage every stage of creating and using of resources in project activity of project-oriented enterprise.
{"title":"Model Of Management Of Resources Production In 4P-Environment Of Project-Oriented Enterprise","authors":"N. Yehorchenkova, Iurii Teslia, Oleksii Yehorchenkov, Liubov Kubiavka, T. Latysheva, Yevheniia Kataieva, V. Olena","doi":"10.1109/IDAACS.2019.8924242","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924242","url":null,"abstract":"In the article authors present model of management of project and operational production what base on using of Monte-Carlo method. The main feature of the model is providing the ability to effective manage every stage of creating and using of resources in project activity of project-oriented enterprise.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/idaacs.2019.8924445
Conference Co-Chairmen, A. Sachenko, F. Guerriero, Carsten Wolff
{"title":"Conference Co-Chairmen","authors":"Conference Co-Chairmen, A. Sachenko, F. Guerriero, Carsten Wolff","doi":"10.1109/idaacs.2019.8924445","DOIUrl":"https://doi.org/10.1109/idaacs.2019.8924445","url":null,"abstract":"","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122982447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}