首页 > 最新文献

2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments 用于网络基础设施监控的统计数据分析,以识别系统本地段的异常行为
M. Sukhoparov, Alexander Davydov, I. Lebedev, Nurzhan Bazhayev
Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.
无线网络的低功耗设备“智能家居”、“物联网”得到了考虑。许多安全攻击的迹象代表潜在的信息入侵者已被确定。我们分析了一个基于无线技术的系统的特征,该系统是通过被动监视和主动轮询组成网络基础设施的设备而获得的。提出了一种基于识别、定量、频率、时序特征的信息安全状态分析模型。鉴于提供网络基础设施的设备的特殊性,信息安全状态的评估侧重于分析系统的正常功能概况,而不是寻找各种攻击过程中的异常特征和特征。公开了一项实验,通过比较来自叶节点的被动和主动模式的统计信号消息,提供获取用于决策目的的数据采集的无线网络远程设备运行的统计信息。给出了对标准系统进行信息冲击的实验结果。所提出的模型可用于确定WLAN自组织网络设备的技术特征,并为IS状态分析提出建议。
{"title":"Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments","authors":"M. Sukhoparov, Alexander Davydov, I. Lebedev, Nurzhan Bazhayev","doi":"10.1109/ICAICT.2016.7991834","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991834","url":null,"abstract":"Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis for bank service quality: A rule-based classifier 银行服务质量的情感分析:基于规则的分类器
Yuliya Bidulya, Elena G. Brunova
The paper considers the analysis of the subjective information from user-generated content. The purpose of this research is to develop a rule-based classifier for the sentiment analysis within the bank service quality domain. Our sentiment lexicon includes 286 positive and 385 negative words. Besides, three more lexicon classes are added; they are required to apply the rule-based algorithm. To test the algorithm, 200 reviews in Russian are analyzed. The experiment demonstrates that the efficiency of the rule-based classifier is higher as compared to the Naïve Bayes classifier. It is determined that the system generally detects positive reviews better than negative ones.
本文考虑对用户生成内容中的主观信息进行分析。本研究的目的是开发一个基于规则的分类器,用于银行服务质量领域的情感分析。我们的情感词汇包括286个积极词汇和385个消极词汇。此外,还增加了三个词汇类;它们需要应用基于规则的算法。为了测试该算法,我们分析了200条俄语评论。实验表明,与Naïve贝叶斯分类器相比,基于规则的分类器的效率更高。可以确定的是,系统通常会更好地检测正面评论而不是负面评论。
{"title":"Sentiment analysis for bank service quality: A rule-based classifier","authors":"Yuliya Bidulya, Elena G. Brunova","doi":"10.1109/ICAICT.2016.7991688","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991688","url":null,"abstract":"The paper considers the analysis of the subjective information from user-generated content. The purpose of this research is to develop a rule-based classifier for the sentiment analysis within the bank service quality domain. Our sentiment lexicon includes 286 positive and 385 negative words. Besides, three more lexicon classes are added; they are required to apply the rule-based algorithm. To test the algorithm, 200 reviews in Russian are analyzed. The experiment demonstrates that the efficiency of the rule-based classifier is higher as compared to the Naïve Bayes classifier. It is determined that the system generally detects positive reviews better than negative ones.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1651 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129293895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
E-services security assessment model 电子服务安全评估模型
Y. Imamverdiyev
Information security plays an extremely important role in e-services, as the e-services are vulnerable to various kinds of security and privacy threats on the Internet. The paper presents a formal model of e-services considering four different abstraction levels: application, middleware, operating system and network. Various security threats to e-services and security services to prevent these threats are described. The security level of e-services is determined by the weighted sum of security ratings of individual security services.
资讯保安在电子服务中扮演极为重要的角色,因为电子服务容易受到互联网上各种保安及私隐威胁。本文提出了一个考虑应用程序、中间件、操作系统和网络四个不同抽象层次的电子服务形式化模型。介绍了电子服务面临的各种安全威胁以及防范这些威胁的安全服务。电子服务的保安等级由个别保安服务的保安等级加权和而定。
{"title":"E-services security assessment model","authors":"Y. Imamverdiyev","doi":"10.1109/ICAICT.2016.7991772","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991772","url":null,"abstract":"Information security plays an extremely important role in e-services, as the e-services are vulnerable to various kinds of security and privacy threats on the Internet. The paper presents a formal model of e-services considering four different abstraction levels: application, middleware, operating system and network. Various security threats to e-services and security services to prevent these threats are described. The security level of e-services is determined by the weighted sum of security ratings of individual security services.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A memory efficient distributed fuzzy joint points clustering algorithm 一种高效内存的分布式模糊节点聚类算法
C. Atilgan, E. Nasibov
The fuzzy joint points (FJP) is a method that uses a fuzzy neighborhood notion to deal with neighborhood parameter selection issue of classical density-based clustering and offers an unsupervised clustering tool. Recent works improved the method in terms of speed to enable the method for big data applications. However, space efficiency of the method is still a limiting factor. In this work, we discuss techniques to improve the space efficiency of the method, so that FJP is applicable regardless of the size of data and offer a distributed version of the algorithm.
模糊结合点(FJP)是一种利用模糊邻域概念处理经典密度聚类邻域参数选择问题的方法,提供了一种无监督聚类工具。最近的工作在速度方面改进了该方法,使该方法能够用于大数据应用。然而,该方法的空间效率仍然是一个限制因素。在这项工作中,我们讨论了提高该方法的空间效率的技术,使FJP适用于任何数据大小,并提供了算法的分布式版本。
{"title":"A memory efficient distributed fuzzy joint points clustering algorithm","authors":"C. Atilgan, E. Nasibov","doi":"10.1109/ICAICT.2016.7991729","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991729","url":null,"abstract":"The fuzzy joint points (FJP) is a method that uses a fuzzy neighborhood notion to deal with neighborhood parameter selection issue of classical density-based clustering and offers an unsupervised clustering tool. Recent works improved the method in terms of speed to enable the method for big data applications. However, space efficiency of the method is still a limiting factor. In this work, we discuss techniques to improve the space efficiency of the method, so that FJP is applicable regardless of the size of data and offer a distributed version of the algorithm.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125990855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MATLAB and heat transfer in solid state MATLAB与固态传热
M. Vozár, Peter Kuna
The article deals with the problems of heat transfer through solids. The calculation of the thermal resistance of the system consisting of several layers of solid materials having different thermal resistances on the intensive calculations and the time. In the first part we law of calorimetry equation. On this basis, we can build a theory of one-dimensional and multi-dimensional differential equation of thermal diffusion. The derived equations are then used to simulate the heat transfer in building applications. We had to adjust the thermal diffusion equation in such a shape that it can be addressed by using PDE toolbox.
本文讨论了固体传热问题。由多层不同热阻的固体材料组成的体系的热阻计算,对其进行了密集的计算和时间上的耗费。第一部分是量热法方程。在此基础上,我们可以建立一维和多维热扩散微分方程的理论。推导出的方程随后用于模拟建筑应用中的传热。我们必须调整热扩散方程,使其可以通过PDE工具箱来解决。
{"title":"MATLAB and heat transfer in solid state","authors":"M. Vozár, Peter Kuna","doi":"10.1109/ICAICT.2016.7991814","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991814","url":null,"abstract":"The article deals with the problems of heat transfer through solids. The calculation of the thermal resistance of the system consisting of several layers of solid materials having different thermal resistances on the intensive calculations and the time. In the first part we law of calorimetry equation. On this basis, we can build a theory of one-dimensional and multi-dimensional differential equation of thermal diffusion. The derived equations are then used to simulate the heat transfer in building applications. We had to adjust the thermal diffusion equation in such a shape that it can be addressed by using PDE toolbox.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126811646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence and role of CAD and computer mathematics in engineering education CAD与计算机数学在工程教育中的影响与作用
S. T. Huseynov
The paper mainly has devoted to the important fields of modern engineering education in the aerospace fields, particularly in such disciplines as structural mechanics and application of computer modeling there. The author shares his experience in teaching and scientific research on some important issues about the role of modern software, which are concern to two different fields: CAD and computer algebra. In the paper it has been showed relevant original graphical results of computer modeling in aerospace structural mechanics via Ansys CAD software and number of examples with original cods in Maple computer mathematics system for analytical researches in theory of mechanical equilibrium.
本文主要论述了航空航天领域现代工程教育的重要领域,特别是结构力学和计算机建模的应用等学科。作者就现代软件在计算机辅助设计和计算机代数两个不同领域中所起作用的一些重要问题,分享了自己的教学和科研经验。本文给出了利用Ansys CAD软件对航天结构力学进行计算机建模的相关原始图形结果,以及在Maple计算机数学系统中使用原始图形进行力学平衡理论分析研究的实例。
{"title":"The influence and role of CAD and computer mathematics in engineering education","authors":"S. T. Huseynov","doi":"10.1109/ICAICT.2016.7991797","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991797","url":null,"abstract":"The paper mainly has devoted to the important fields of modern engineering education in the aerospace fields, particularly in such disciplines as structural mechanics and application of computer modeling there. The author shares his experience in teaching and scientific research on some important issues about the role of modern software, which are concern to two different fields: CAD and computer algebra. In the paper it has been showed relevant original graphical results of computer modeling in aerospace structural mechanics via Ansys CAD software and number of examples with original cods in Maple computer mathematics system for analytical researches in theory of mechanical equilibrium.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130312686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Approaches for interactive browsing of large image datasets 大型图像数据集的交互式浏览方法
G. Schaefer
With the number of digital images growing at a rapid rate, effective approaches for organising large image repositories are highly sought after. In this paper, we summarise a number of such approaches that allow for intuitive browsing of image databases. Based on visual features extracted from the images, complete image libraries can be visualised in such a way that similar images are located close to each other in the visualisation. This, coupled with appropriate browsing operations, allows for interactive exploration of even large scale image collections as demonstrated by the Hue Sphere Image Browser and Honeycomb Image Browser approaches.
随着数字图像数量的快速增长,组织大型图像库的有效方法备受追捧。在本文中,我们总结了一些这样的方法,允许直观地浏览图像数据库。基于从图像中提取的视觉特征,可以可视化完整的图像库,在可视化中相似的图像彼此靠近。这与适当的浏览操作相结合,允许交互式探索,甚至大规模的图像集合,如Hue球体图像浏览器和蜂窝图像浏览器方法所示。
{"title":"Approaches for interactive browsing of large image datasets","authors":"G. Schaefer","doi":"10.1109/ICAICT.2016.7991830","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991830","url":null,"abstract":"With the number of digital images growing at a rapid rate, effective approaches for organising large image repositories are highly sought after. In this paper, we summarise a number of such approaches that allow for intuitive browsing of image databases. Based on visual features extracted from the images, complete image libraries can be visualised in such a way that similar images are located close to each other in the visualisation. This, coupled with appropriate browsing operations, allows for interactive exploration of even large scale image collections as demonstrated by the Hue Sphere Image Browser and Honeycomb Image Browser approaches.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The crosstalk compensator for fiber-optic data transmission systems with division multiplexing 分复用光纤数据传输系统的串扰补偿器
D. Kiesewetter, V. Malyugin
The possibility of compensation crosstalk for different types of division multiplexing in fiber optical transmission lines is discussed. The principle of operation of the crosstalk compensator is described. An example of creating of fiber optic mode division multiplexing transmission line and electronic compensation of crosstalk is analyzed.
讨论了光纤传输线中不同类型的分复用中补偿串扰的可能性。介绍了串扰补偿器的工作原理。分析了光纤模分复用传输线的建立及串扰的电子补偿实例。
{"title":"The crosstalk compensator for fiber-optic data transmission systems with division multiplexing","authors":"D. Kiesewetter, V. Malyugin","doi":"10.1109/ICAICT.2016.7991753","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991753","url":null,"abstract":"The possibility of compensation crosstalk for different types of division multiplexing in fiber optical transmission lines is discussed. The principle of operation of the crosstalk compensator is described. An example of creating of fiber optic mode division multiplexing transmission line and electronic compensation of crosstalk is analyzed.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Existence of repetitions of digits in the construction of periodic sequences related to 3x+1 problem: Proof of the theorem on the periods in the 3-adic representation of terms of periodic sequences that appear in Collatz problem 与3x+1问题相关的周期序列构造中数字重复的存在性:Collatz问题中周期序列项的三进表示周期定理的证明
Y. Aliyev
The paper is the continuation of the previous paper on this topic. We first review some of the recent developments on 3x+1 problem. In the remaining part of the paper we prove the result announced at the end of the first paper. The proof uses the finite version of the method of mathematical induction.
这篇论文是上一篇关于这个主题的论文的延续。我们首先回顾一下最近关于3x+1问题的一些进展。在本文的剩余部分,我们证明了第一篇论文最后公布的结果。这个证明使用了数学归纳法的有限版本。
{"title":"Existence of repetitions of digits in the construction of periodic sequences related to 3x+1 problem: Proof of the theorem on the periods in the 3-adic representation of terms of periodic sequences that appear in Collatz problem","authors":"Y. Aliyev","doi":"10.1109/ICAICT.2016.7991714","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991714","url":null,"abstract":"The paper is the continuation of the previous paper on this topic. We first review some of the recent developments on 3x+1 problem. In the remaining part of the paper we prove the result announced at the end of the first paper. The proof uses the finite version of the method of mathematical induction.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A statistical approach to mining the DM strategy for OWA operators 一种挖掘OWA运营商DM策略的统计方法
Resmiye Nasiboglu, Baris Tekin Tezel
The most important thing in using the ordered weighted averaging (OWA) operator which can easily describe the mental model of an Decision Maker (DM), is to characterize OWA weights. Determination of OWA weights cannot provide a characterization by itself. If we want to generalization and reusability of the OWA weights to aggregate various sized objects, we have to be determine more general form. In this paper, we propose a new approach for learning a stress function, which can be characterized as a DM strategy of OWA operator. For this aim the Kolmogorov-Smirnov test for similarity probability density functions is used.
有序加权平均(OWA)算子可以很容易地描述决策者的心理模型,在使用OWA算子时,最重要的是表征OWA的权重。OWA权重的确定本身不能提供表征。如果我们想要泛化和重用OWA权重来聚合各种大小的对象,我们必须确定更通用的形式。本文提出了一种新的应力函数学习方法,可将其描述为OWA算子的DM策略。为此目的,使用相似性概率密度函数的Kolmogorov-Smirnov检验。
{"title":"A statistical approach to mining the DM strategy for OWA operators","authors":"Resmiye Nasiboglu, Baris Tekin Tezel","doi":"10.1109/ICAICT.2016.7991675","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991675","url":null,"abstract":"The most important thing in using the ordered weighted averaging (OWA) operator which can easily describe the mental model of an Decision Maker (DM), is to characterize OWA weights. Determination of OWA weights cannot provide a characterization by itself. If we want to generalization and reusability of the OWA weights to aggregate various sized objects, we have to be determine more general form. In this paper, we propose a new approach for learning a stress function, which can be characterized as a DM strategy of OWA operator. For this aim the Kolmogorov-Smirnov test for similarity probability density functions is used.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124327994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1