International Journal of Reliability, Quality and Safety Engineering c World Scientific Pub

合集下载

international journal of plasticity under review

international journal of plasticity under review

international journal of
plasticity under review
《International Journal of Plasticity》是塑性领域的国际顶级期刊,该期刊的审稿周期平均为2.47059个月。

最近,西北工业大学材料学院李金山教授团队与南京航空航天大学赵利果教授团队合作,以单晶和多晶纯镍为研究对象,针对各类晶界对氢原子的加速和捕获行为进行了定量化描述,建立了晶界能依赖的耦合氢扩散的非局部晶体塑性本构模型,相关研究成果在该期刊上发表。

这项研究为介观尺度下预测材料在氢环境下的服役寿命、设计抗氢脆组织合金和晶界工程提供了新思路,具有重要的应用前景。

如果你对《International Journal of Plasticity》期刊感兴趣,可以访问其官方网站了解更多信息。

学术诚信的重要性与实践要求

学术诚信的重要性与实践要求

学术诚信的重要性与实践要求学术诚信是指在学术研究和学风建设中,诚实、正直、守信的态度和行为准则。

在当代学术界,学术诚信已经成为一种重要的价值取向,不仅仅是对个人品格的要求,更是对整个学术社群的责任担当。

本文将探讨学术诚信的重要性,介绍学术诚信的具体实践要求,并举例说明如何在学术研究中践行学术诚信。

1. 学术诚信的重要性学术诚信作为学术活动的基石,具有以下重要性:1.1 维护学术声誉学术界的声誉建立在多年的努力和无数位学者的奉献之上。

如果个别学者缺乏诚信,采用不正当手段获取研究成果或剽窃他人成果,则会导致学术界整体声誉受损,严重时可能触发科研造假等恶劣现象。

因此,遵循学术诚信原则对于维持整个学术界良好形象是至关重要的。

1.2 促进学术合作学术研究需要合作与交流。

只有相互尊重、真诚沟通,才能形成良好的学术合作关系。

而这种合作必须建立在互信基础之上,而互信则依赖于彼此对于各自研究工作的真实性和可靠性进行保证。

因此,保持良好的学术诚信是推动协作与合作的基本条件。

1.3 保障知识传承与创新发展科研活动旨在推动知识传承和创新发展,但这需要建立在对前人工作基础上的认真继承和综合创新之上。

如果没有遵循学术诚信规范,在引用他人成果时故意或无意地抄袭或篡改数据,将严重妨碍知识传承和创新发展。

只有确保每个研究者按照道德规范遵循学术诚信,才能保障知识的真实性、可靠性和稳健性。

2. 学术诚信的实践要求为了践行学术诚信,我们需要遵守以下实践要求:2.1 正确引用他人成果在撰写论文、报告或任何形式的学术出版物时,我们应该正确引用他人成果。

这包括使用适当的引用格式,并清楚注明所采用资料的来源。

同时,在摘录、引述他人文字时应标明出处,以免被误认为抄袭他人成果。

2.2 尊重知识产权知识产权是一种法律规定和公认的权益。

作为一个研究者,我们应该尊重他人创作的知识产权,并遵循相关法律法规。

这包括不剽窃他人成果、不盗用他人数据,并遵守专利和版权规定。

管理科学与工程国际顶级期刊(最新)

管理科学与工程国际顶级期刊(最新)

管理科学与工程国际学术期刊排行榜以下是管理科学与工程国际期刊的按国外顶级商学院的标准的排行榜.其中管理科学与工程是尊重国内的说法,包括国外所说的生产管理,信息管理,管理科学,管理/工业工程.--------------------------------------------------------(1)A+journal A+期刊(排序有先后,前面的难发)MIS QuarterlyManagement ScienceOperations ResearchInformation Systems Research--------------------------------------------------------(2)A-journal A期刊(排序有先后,前面的难发)INFORMS Journal on computingManufacturing and Service Operations ManagementTransportation ScienceIIE TransactionsProduction and Operations ManagementJournal of Management Information SystemsDecision SciencesJournal of Operations Management--------------------------------------------------------(3)B+journal B+期刊(排序有先后,前面的难发)InterfacesNaval Research LogisticsTransportation Research Part B-MethodologicalEuropean Journal of Operational ResearchInternational Journal of Production ResearchCommunications of the ACMDecision Support SystemsEuropean Journal of Information SystemsIEEE Transactions on Knowledge and Data EngineeringInformation and ManagementInternational Journal of Operations and Production ManagementAnnals of Operations ResearchComputers and Operations Research--------------------------------------------------------(4)B-journal B期刊(排序无先后)ACM Transactions on Information SystemsInternational Journal of Electronic CommerceCommunication ResearchComputers and Industrial EngineeringDatabaseIEEE Transactions Systems, Man and Cybernetics B: CybermaticsIEEE Transactions on Intelligent Transportation SystemsIEEE Transactions on Systems Man and Cybernetics A; systems and humans Information Processing and ManagementInformation Systems JournalInformation Systems ManagementInternational Journal of Flexible Manufacturing SystemsInternational Journal of Human-Computer StudiesInternational Journal of Information ManagementInternational Journal of Logistics ManagementInternational Journal of Physical Distribution and Logistics Management International Journal of Project ManagementInternational Journal of Quality and Reliability ManagementInternational Journal of Technology ManagementInternational Transactions in Operational ResearchJournal of Air Transport managementJournal of Behavioral Decision MakingJournal of Business LogisticsJournal of Engineering and Technology ManagementJournal of Global Information ManagementJournal of Information ManagementJournal of Information TechnologyJournal of Intelligent Information SystemsJournal of Intelligent ManufacturingJournal of Manufacturing SystemsJournal of Multi-Criteria Decision AnalysisJournal of Purchasing and Supply Management (formerly European Journal of Purchasing and Supply Management)Journal of SchedulingJournal of Strategic Information SystemsJournal of Supply Chain ManagementJournal of Systems and SoftwareJournal of the Operational Research SocietyMathematical Methods of Operations Research (formerly Zeitschrift für Operations Research)Networks (Wiley)OR SpectrumOmegaOperations Research LettersProduction Planning and ControlProduction and Inventory Management JournalProject Management JournalQuality Management JournalSupply Chain ManagementTotal Quality Management and Business Excellence (formerly Total Quality Management )Transport ReviewsTransportationTransportation JournalTransportation Research D-Transport and EnvironmentTransportation Research Part A , Policy and PracticeTransportation Research. Part E, The Logistics and Transportation Review。

安全评估期刊

安全评估期刊

安全评估期刊
以下是一些国际上知名的安全评估期刊:
1. Journal of Risk and Reliability: 该期刊涵盖了风险评估和可靠性工程的广泛领域。

2. International Journal of Critical Infrastructure Protection: 该期刊关注关键基础设施的安全评估和保护。

3. IEEE Transactions on Dependable and Secure Computing: 该期刊侧重于可靠和安全计算领域的研究。

4. International Journal of Security and Networks: 该期刊聚焦于安全和网络的交叉领域,如网络安全和信息安全等。

5. Journal of Contingencies and Crisis Management: 该期刊研究与灾难管理、风险评估和危机应对相关的主题。

6. Safety Science: 该期刊关注安全科学和工程的研究,包括安全管理、事故分析和风险评估。

7. Reliability Engineering & System Safety: 该期刊涉及可靠性工程与系统安全领域的研究。

以上仅为一些常见的安全评估期刊,还有许多其他的学术期刊也刊发了相关研究。

在选择期刊时,可以根据自己的研究领域和具体要求进行筛选。

计算机方面核心期刊

计算机方面核心期刊

计算机方面核心期刊计算机方面核心期刊计算机技术1.计算机学报2.软件学报3.计算机研究与发展4.自动化学报5.计算机科学6.控制理论与应用7.计算机辅助设计与图型学学报8.计算机工程与应用9.模式识别与人工智能10.控制与决策11.小型微型计算机系统12.计算机工程13.计算机应用14.信息与控制15.机器人16.中国图象图形学报.A版17.计算机应用研究18.系统仿真学报19.计算机集成制造系统-CIMS20.遥感学报21.中文信息学报22.微计算机信息23.数据采集与处理24.微型机与应用25.传感器技术26.传感技术学报28.计算机应用与软件29.微型计算机30.微电子学与计算机法律1.中国法学2.法学研究3.法学4.法学评论5.中外法学6.现代法学7.法商研究8.法律科学9. 法学家10. 政法论坛11.人民检察12. 河北法学13.法制与社会发展14.政治与法律15.环境法律评论16.比较法研究17.法学杂志18.当代法学19.人民司法20.法律适用21.法学论坛一、程序语言和软件工程权威期刊类:ACM Trans on Programming Languages & SystemsAnnals of Software EngineeringIEEE Trans on Software EngineeringJnl of Functional ProgrammingACM Trans on S/W Eng and MethodologyFormal Methods in System Design著名期刊类:The Jnl of Logic ProgrammingIEEE Procs - SoftwareJnl of Software Maintenance: Research and PracticeHigher-Order and Symbolic Computation (previously known as LISP and Symbolic Computation)Software: Practice and ExperienceJnl of Functional and Logic ProgrammingThe Constraints JournalJournal of Logic and ComputationJournal of Programming LanguagesEmpirical Software EngineeringAutomated Software EngineeringFormal Aspects of ComputingObject-Oriented SystemsTheory and Practice of Object SystemsJournal of Object-Oriented ProgrammingIEEE Transactions on ReliabilityFuture Generations Computer Systems: FGCSProgramming and Computer SoftwareScience of Computer ProgrammingJnl of Systems and SoftwareIntl Jnl on Software Engineering and Knowledge EngNew Generation ComputingSoftware Quality JournalSoftware Testing, Verification and ReliabilityComputer LanguagesRequirements Engineering JournalIEEE Software Engineering Journal其它期刊:Journal of the Interest Group in Pure and Applied LogicNotre Dame Journal of Formal LogicJournal of Computer and Software EngineeringJournal of Structured ProgrammingInternational Journal on Software Tools for Technology TransferChinese Journal of Advanced Software ResearchJournal of Computing Systems in EngineeringJournal of Symbolic LogicProject Management JournalInternational Journal of Reliability, Quality, and SafetyJournal for Applied Nonclassical LogicThe Journal of Defense Software EngineeringComputer & Control Engineering JournalJournal of Logic, Language and InformationComputer Systems Engineering JournalJournal of Automata, Languages and CombinatoricsThe C Users JournalInformation Design JournalJava Developer’s JournalC++ JournalFortran JournalJournal of Scientific ProgrammingLogic Journal of the IGPLJournal of Philosophical LogicJournal of Quality TechnologyInternational Journal of Technology ManagementSoftware Process Modeling and TechnologyJournal of Computers and TranslationJournal of C Language TranslationJournal of Electronic TestingSoftware Engineering Notes二、软件技术权威期刊类:ACM Trans on GraphicsACM Trans on Modeling & Computer SimulationComputer Aided Geometric DesignComputer-Aided DesignIEEE Trans on CAD of Integrated Circuits & SystemsIEEE Trans on Visualization and Computer GraphicsSIAM Jnl on Scientific and Statistical ComputingMultimedia SystemsPerformance EvaluationJournal of Visual Communication and Image Representation 著名期刊类:Computers & EducationACM Trans on Mathematical SoftwareHypermediaIntl Jnl of Modelling & SimulationIntl Jnl of Shape ModellingIntl Jnl on Computational Geometry & AppsSimulation & GamesSimulation & GamingVisual ComputerComputational Geometry - Theory and ApplicationsSimulationMultimedia Tools & ApplicationsIntl Jnl in Computer SimulationIntegrated Computer-Aided EngineeringInformation RetrievalComputer Graphics Forum: Jnl of the Europ As. for CGComputer & GraphicsIntl Jnl of Applied Software TechnologyJnl of Computational and Applied MathematicsMathematical and Computer ModellingMathematics and Computers in SimulationInternational Journal of Computer MathematicsSimulation Practice and TheoryThe New Review of Hypermedia & Multimedia: Apps & ResTrans of the Intl Assoc for Math and Comps in SimulnComputer Simulation: Modeling & AnalysisTrans of the Society for Computer SimulationJournal of Visual Languages and ComputingEngineering ComputationsSoftware - Concepts and ToolsJournal of Visualization and Computer AnimationThe International Journal of The Eurographics Association其它期刊类:Iranian Journal of Electrical and Computer EngineeringJournal of Digital ImagingJournal of Concurrent Engineering: Applications and ResearchDigital Technical JournalInterface Journal of New Music ResearchSPIE Journal of Electronic ImagingThe Journal of Electronic CommerceJournal of Graphics ToolsInternational Journal of Information Processing and ManagementJournal of Library AutomationThe Journal of Computer Game DesignJournal of DocumentationVirtual Prototyping JournalJournal of Computing and Information TechnologySIAM Journal on Scientific Computing.Journal of Computer Aided SurgeryJournal of Computer-Aided Molecular DesignJournal of the Virtual Reality SocietyJournal of Virtual Reality Research, Development and ApplicationsJournal of Computational and Graphical Statistics三、数据库权威期刊:ACM Trans on Database SystemsIEEE Trans on Knowledge & Data EngineeringJnl of Intell. Info Systems: Integrating AI and DB TechVLDB Intl JnlDistributed and Parallel Databases著名期刊:Data & Knowledge EngineeringInformation systemsJnl of Systems IntegrationJnl. of Data Mining & Knowledge DiscoveryIntl Jnl of Computer & Information SciencesIntl Jnl of Cooperative Information SystemsIntl Jnl of Intelligent & Cooperative Info. SystemsIntl Jnl of Geographic Information SystemsJournal of Information Processing and Cybernetics Geoinformatica Journal on Digital LibrariesJournal of the American Society for Information ScienceJournal of Intelligent Information SystemsData EngineeringKnowledge and Information SystemsAdvances in Engineering SoftwareInformation & Software TechnologyData BaseData Base ManagementDatabase and Network JournalJournal of Data WarehousingJournal of Combinatorics, Information and System Sciences International Journal of Information TechnologyTransactions of Information Processing Society of JapanSIGMOD RecordIEICE Data Engineering其它期刊:Journal of Computing Information ScienceJournal of Information Science and EngineeringEuropean Journal of Information SystemsJournal of Databases ManagementDatabase for Advances in Information SystemsData ManagementData mationGovernment Data SystemsJournal of Database AdministrationJournal of the Association for Education Data SystemsInformation Processing and ManagementJournal of Information Science: Principles and PracticeDatabase Programming and DesignScandinavian Journal of Information System。

星期二_16932

星期二_16932

In many practical situations, however, the quality of a process or product is better characterized and summarized by a relationship between a response variable and one or more explanatory variables (Woodall et al. 2004).
INFORMS International, Hong Kong 2006
Dr. Fugee Tsung, HKUST
2
Outline
I.
II.
III.
IV.
SPC for profiles SPC for engineering controlled processes SPC for multistage processes Quality techniques in service industry
SPC: Basic Idea
yi ~ N ( 1 , 12 ) for i 1,2,..., ; yi ~ N ( 2 , ) for i 1,...,n.
2 2
Sample Mean
1.5 1.0 0.5 0.0 -0.5 -1.0 -1.5 0 10 20 30 LCL=-1.342 Mean=0 UCL=1.342
Dr. Fugee Tsung, HKUST
7
SPC: A Different Idea
yi f ( xi )
Sample Mean
1.5 1.0 0.5 0.0 -0.5 -1.0 -1.5 0 10 20 30 LCL=-1.342 Mean=0 UCL=1.342

工程学科ESI前50%期刊

工程学科ESI前50%期刊

ESI排名期刊全称1JOURNAL OF POWER SOURCES2JOURNAL OF HAZARDOUS MATERIALS3INTERNATIONAL JOURNAL OF HYDROGEN ENERGY4CHEMICAL ENGINEERING JOURNAL5ENERGY & FUELS6JOURNAL OF HYDROLOGY7FUEL8IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS9INTERNATIONAL JOURNAL OF HEAT AND MASS TRANSFER10EUROPEAN JOURNAL OF OPERATIONAL RESEARCH11EXPERT SYSTEMS WITH APPLICATIONS12JOURNAL OF FLUID MECHANICS13ENERGY14APPLIED ENERGY15IEEE TRANSACTIONS ON SIGNAL PROCESSING16JOURNAL OF NUCLEAR MATERIALS17IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION18ENERGY CONVERSION AND MANAGEMENT19JOURNAL OF LIGHTWAVE TECHNOLOGY20JOURNAL OF SOUND AND VIBRATION21AUTOMATICA22IEEE TRANSACTIONS ON AUTOMATIC CONTROL23IEEE TRANSACTIONS ON ELECTRON DEVICES24IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLI25IEEE TRANSACTIONS ON POWER ELECTRONICS26RENEWABLE ENERGY27IEEE ELECTRON DEVICE LETTERS28IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES29INTERNATIONAL JOURNAL OF SOLIDS AND STRUCTURES30APPLIED THERMAL ENGINEERING31SENSORS AND ACTUATORS A-PHYSICAL32IEEE TRANSACTIONS ON IMAGE PROCESSING33IEEE JOURNAL OF SOLID-STATE CIRCUITS34JOURNAL OF MICROMECHANICS AND MICROENGINEERING35COMBUSTION AND FLAME36ELECTRONICS LETTERS37WASTE MANAGEMENT38IEEE TRANSACTIONS ON POWER SYSTEMS39MICROELECTRONIC ENGINEERING40INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOG41ENERGY AND BUILDINGS42IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING43JOURNAL OF CLEANER PRODUCTION44PROCEEDINGS OF THE IEEE45SOLAR ENERGY46INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERI 47INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS48PROCEEDINGS OF THE COMBUSTION INSTITUTE49BUILDING AND ENVIRONMENT50PATTERN RECOGNITION51Progress in Electromagnetics Research-PIER52MEASUREMENT SCIENCE & TECHNOLOGY53ENGINEERING STRUCTURES54IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY55JOURNAL OF THE MECHANICS AND PHYSICS OF SOLIDS56IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPER 57IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS5859INTERNATIONAL JOURNAL OF PLASTICITY60INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH61IEEE TRANSACTIONS ON POWER DELIVERY62ADVANCES IN WATER RESOURCES63IEEE TRANSACTIONS ON ULTRASONICS FERROELECTRICS AND FREQU 64APPLIED MATHEMATICAL MODELLING65IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS66INTERNATIONAL JOURNAL OF THERMAL SCIENCES67FUSION ENGINEERING AND DESIGN6869ENGINEERING FRACTURE MECHANICS70FUZZY SETS AND SYSTEMS71MICROWAVE AND OPTICAL TECHNOLOGY LETTERS72IEEE TRANSACTIONS ON FUZZY SYSTEMS73IEEE SENSORS JOURNAL74INTERNATIONAL JOURNAL OF MACHINE TOOLS & MANUFACTURE75PROGRESS IN PHOTOVOLTAICS76IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT77NONLINEAR DYNAMICS78PATTERN RECOGNITION LETTERS79MECHANICAL SYSTEMS AND SIGNAL PROCESSING80MARINE TECHNOLOGY SOCIETY JOURNAL81AIAA JOURNAL82SIGNAL PROCESSING83TRIBOLOGY INTERNATIONAL84JOURNAL OF MICROELECTROMECHANICAL SYSTEMS85INTERNATIONAL COMMUNICATIONS IN HEAT AND MASS TRANSFER86CHEMICAL ENGINEERING AND PROCESSING87EXPERIMENTS IN FLUIDS88IEEE Antennas and Wireless Propagation Letters89International Journal of Greenhouse Gas Control90PROGRESS IN ENERGY AND COMBUSTION SCIENCE91INTERNATIONAL JOURNAL OF REFRIGERATION-REVUE INTERNATIONA 92Microfluidics and Nanofluidics93IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHN 94RELIABILITY ENGINEERING & SYSTEM SAFETY95INTERNATIONAL JOURNAL OF COMPUTER VISION96IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS97NUCLEAR ENGINEERING AND DESIGN98IEEE TRANSACTIONS ON ENERGY CONVERSION99INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEM 100DRYING TECHNOLOGY101TRANSPORTATION RESEARCH RECORD102INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN FLUIDS 103IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIE 104MICROELECTRONICS RELIABILITY105IEEE Transactions on Robotics106IEEE SIGNAL PROCESSING MAGAZINE107IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING108JOURNAL OF BIOMECHANICAL ENGINEERING-TRANSACTIONS OF THE 109IEEE SIGNAL PROCESSING LETTERS110JOURNAL OF HEAT TRANSFER-TRANSACTIONS OF THE ASME111JOURNAL OF THE AIR & WASTE MANAGEMENT ASSOCIATION112IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY113ELECTRIC POWER SYSTEMS RESEARCH114TRIBOLOGY LETTERS115IEEE TRANSACTIONS ON DIELECTRICS AND ELECTRICAL INSULATIO 116JOURNAL OF GEOTECHNICAL AND GEOENVIRONMENTAL ENGINEERING 117INTERNATIONAL JOURNAL OF IMPACT ENGINEERING118CIRP ANNALS-MANUFACTURING TECHNOLOGY119JOURNAL OF NON-NEWTONIAN FLUID MECHANICS120121JOURNAL OF ELECTROMAGNETIC WAVES AND APPLICATIONS122INTERNATIONAL JOURNAL OF HEAT AND FLUID FLOW123OPTICAL ENGINEERING124TRANSPORTATION RESEARCH PART B-METHODOLOGICAL125OPERATIONS RESEARCH126127OPTICS AND LASER TECHNOLOGY128SYSTEMS & CONTROL LETTERS129EXPERIMENTAL THERMAL AND FLUID SCIENCE130COMPUTATIONAL MECHANICS131JOURNAL OF GUIDANCE CONTROL AND DYNAMICS132OPTICS AND LASERS IN ENGINEERING133JOURNAL OF PROCESS CONTROL134IET Control Theory and Applications135ERGONOMICS136INTERNATIONAL JOURNAL OF MECHANICAL SCIENCES137INTERNATIONAL JOURNAL OF ENERGY RESEARCH138INTERNATIONAL JOURNAL OF LIFE CYCLE ASSESSMENT139IEEE TRANSACTIONS ON NANOTECHNOLOGY140CONTROL ENGINEERING PRACTICE140MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING142COASTAL ENGINEERING143IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION EN 144JOURNAL OF CONSTRUCTIONAL STEEL RESEARCH145IEEE-ASME TRANSACTIONS ON MECHATRONICS146147OCEAN ENGINEERING148EARTHQUAKE ENGINEERING & STRUCTURAL DYNAMICS148IEEE TRANSACTIONS ON CONSUMER ELECTRONICS150FUSION SCIENCE AND TECHNOLOGY151TECHNOVATION152153SIAM JOURNAL ON CONTROL AND OPTIMIZATION154ARCHIVE FOR RATIONAL MECHANICS AND ANALYSIS155INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE156DISCRETE APPLIED MATHEMATICS157INTERNATIONAL JOURNAL OF NON-LINEAR MECHANICS158159STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION160SAFETY SCIENCE161IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 162INDOOR AIR163IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 164THIN-WALLED STRUCTURES165INTERNATIONAL JOURNAL OF MULTIPHASE FLOW166INTERNATIONAL JOURNAL OF NONLINEAR SCIENCES AND NUMERICAL 167JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY168IMAGE AND VISION COMPUTING169170ENGINEERING ANALYSIS WITH BOUNDARY ELEMENTS171JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS172173MICROELECTRONICS JOURNAL174Desalination and Water Treatment175IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED 176INTERNATIONAL JOURNAL OF FRACTURE177ANNALS OF NUCLEAR ENERGY178JOURNAL OF FLUIDS AND STRUCTURES179INTERNATIONAL JOURNAL OF CONTROL180JOURNAL OF GLOBAL OPTIMIZATION181MECHANISM AND MACHINE THEORY182JOURNAL OF MECHANICAL DESIGN183JOURNAL OF HYDROLOGIC ENGINEERING184AUTOMATION IN CONSTRUCTION185APPLIED ERGONOMICS186BIOPROCESS AND BIOSYSTEMS ENGINEERING187NUMERICAL HEAT TRANSFER PART A-APPLICATIONS188INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH189METROLOGIA190INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL 191IEEE Journal of Selected Topics in Signal Processing192SOIL DYNAMICS AND EARTHQUAKE ENGINEERING193ACTA ASTRONAUTICA194TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATI 195JOURNAL OF VIBRATION AND CONTROL196ACTA MECHANICA197IEEE Transactions on Industrial Informatics198ANNALS OF OPERATIONS RESEARCH199JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED 200JOURNAL OF PROPULSION AND POWER201MEASUREMENT202203MATHEMATICS AND COMPUTERS IN SIMULATION204EUROPEAN JOURNAL OF MECHANICS A-SOLIDS205JOURNAL OF ENGINEERING MECHANICS206IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) 207JOURNAL OF WIND ENGINEERING AND INDUSTRIAL AERODYNAMICS 208JOURNAL OF AIRCRAFT209210IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY211Journal of Mechanical Science and Technology212ENGINEERING FAILURE ANALYSIS213JOURNAL OF APPLIED MECHANICS-TRANSACTIONS OF THE ASME 214EXPERIMENTAL MECHANICS215INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE216Journal of Display Technology217CANADIAN GEOTECHNICAL JOURNAL218JOURNAL OF MATERIALS IN CIVIL ENGINEERING219GEOTECHNIQUE220PRODUCTION AND OPERATIONS MANAGEMENT221MATHEMATICAL PROBLEMS IN ENGINEERING222COLD REGIONS SCIENCE AND TECHNOLOGY223PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 224JOURNAL OF ELECTROSTATICS225ENVIRONMENTAL ENGINEERING SCIENCE226HEAT AND MASS TRANSFER227FINITE ELEMENTS IN ANALYSIS AND DESIGN228IIE TRANSACTIONS229ROBOTICS AND AUTONOMOUS SYSTEMS230STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT 231COMBUSTION SCIENCE AND TECHNOLOGY232JOURNAL OF NUCLEAR SCIENCE AND TECHNOLOGY233TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES234235IEEE Transactions on Smart Grid236WASTE MANAGEMENT & RESEARCH237238MECHANICS RESEARCH COMMUNICATIONS239INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING240JOURNAL OF FLUIDS ENGINEERING-TRANSACTIONS OF THE ASME 241COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING242INTERNATIONAL JOURNAL OF INDUSTRIAL ERGONOMICS243ACI STRUCTURAL JOURNAL244IEEE TRANSACTIONS ON RELIABILITY245INDUSTRIAL MANAGEMENT & DATA SYSTEMS246IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY 247Energies248MECHATRONICS249Science China-Technological Sciences250ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING251IET Microwaves Antennas & Propagation252Energy Sources Part A-Recovery Utilization and Environmen 253IEEE Transactions on Automation Science and Engineering 254NUMERICAL METHODS FOR PARTIAL DIFFERENTIAL EQUATIONS255PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 256IET Generation Transmission & Distribution257PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 258HEAT TRANSFER ENGINEERING259JOURNAL OF HYDRAULIC RESEARCH260JOURNAL OF TRIBOLOGY-TRANSACTIONS OF THE ASME261FIRE SAFETY JOURNAL262DIGITAL SIGNAL PROCESSING263JOURNAL OF SPACECRAFT AND ROCKETS264JOURNAL OF ENGINEERING FOR GAS TURBINES AND POWER-TRANSAC 265INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS266WIND ENERGY267JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING-TRANSACT 268OPERATIONS RESEARCH LETTERS269IET Communications270MACHINE LEARNING271Journal of the Society for Information Display272IEICE TRANSACTIONS ON ELECTRONICS273TUNNELLING AND UNDERGROUND SPACE TECHNOLOGY274275STRUCTURAL ENGINEERING AND MECHANICS276VEHICLE SYSTEM DYNAMICS277IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNI 278International Journal of Precision Engineering and Manufa 279JOURNAL OF TRANSPORTATION ENGINEERING280PROGRESS IN NUCLEAR ENERGY281JOURNAL OF INTELLIGENT MANUFACTURING282NEURAL COMPUTING & APPLICATIONS283EUROPEAN JOURNAL OF MECHANICS B-FLUIDS284MECCANICA285IEEE ANTENNAS AND PROPAGATION MAGAZINE286287SPE JOURNAL288ARCHIVE OF APPLIED MECHANICS289PRECISION ENGINEERING-JOURNAL OF THE INTERNATIONAL SOCIET 290COMPUTATIONAL OPTIMIZATION AND APPLICATIONS291IEEE JOURNAL OF OCEANIC ENGINEERING292JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH293CANADIAN JOURNAL OF CIVIL ENGINEERING294JOURNAL OF TURBOMACHINERY-TRANSACTIONS OF THE ASME295PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 296COMPTES RENDUS MECANIQUE297IEEE CONTROL SYSTEMS MAGAZINE298299AEROSPACE SCIENCE AND TECHNOLOGY300INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS 301Journal of Hydrodynamics302Structural Control & Health Monitoring303JOURNAL OF THERMOPHYSICS AND HEAT TRANSFER304NUMERICAL HEAT TRANSFER PART B-FUNDAMENTALS305QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL306NUCLEAR TECHNOLOGY307JOURNAL OF ATMOSPHERIC CHEMISTRY308INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS309ACTA MECHANICA SINICA310ASIAN JOURNAL OF CONTROL311SIAM JOURNAL ON DISCRETE MATHEMATICS312Oil & Gas Science and Technology-Revue d IFP Energies nou 313APPLIED MATHEMATICS AND MECHANICS-ENGLISH EDITION313BUILDING RESEARCH AND INFORMATION315NAVAL RESEARCH LOGISTICS316TRIBOLOGY TRANSACTIONS317Journal of Bridge Engineering318STRUCTURAL SAFETY319IET Power Electronics320ADVANCED ENGINEERING INFORMATICS321322PROBABILISTIC ENGINEERING MECHANICS323JOURNAL OF VIBRATION AND ACOUSTICS-TRANSACTIONS OF THE A 324ISA TRANSACTIONS325IEEE Transactions on Biomedical Circuits and Systems326ENGINEERING OPTIMIZATION327FLOW TURBULENCE AND COMBUSTION328JOURNAL OF DYNAMIC SYSTEMS MEASUREMENT AND CONTROL-TRANSA 329JOURNAL OF SOLAR ENERGY ENGINEERING-TRANSACTIONS OF THE A 330IEEE ROBOTICS & AUTOMATION MAGAZINE331PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 332COMBUSTION THEORY AND MODELLING333Journal of Field Robotics334EURASIP Journal on Advances in Signal Processing335JOURNAL OF ENGINEERING MATHEMATICS336DISCRETE & COMPUTATIONAL GEOMETRY337INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS 338339JOURNAL OF THERMAL STRESSES340JOURNAL OF EARTHQUAKE ENGINEERING341PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 342CIRCUITS SYSTEMS AND SIGNAL PROCESSING343ROBOTICA344IET Renewable Power Generation345OPTICAL AND QUANTUM ELECTRONICS346INTERNATIONAL JOURNAL OF AUTOMOTIVE TECHNOLOGY347PROGRESS IN AEROSPACE SCIENCES348JOURNAL OF ENGINEERING EDUCATION349APPLIED INTELLIGENCE350MULTIBODY SYSTEM DYNAMICS351INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURIN 352JOURNAL AMERICAN WATER WORKS ASSOCIATION353Journal of Fuel Cell Science and Technology354JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS355JOURNAL OF COMPUTING IN CIVIL ENGINEERING356PETROLEUM SCIENCE AND TECHNOLOGY357IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING358IEICE Electronics Express359OR SPECTRUM360IEEE MICROWAVE MAGAZINE360INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS362IEEE TRANSACTIONS ON EDUCATION363FLOW MEASUREMENT AND INSTRUMENTATION364365AUTONOMOUS ROBOTS366ELECTRIC POWER COMPONENTS AND SYSTEMS367Bioinspiration & Biomimetics368PRODUCTION PLANNING & CONTROL369INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROC 370INTEGRATED FERROELECTRICS371JOURNAL OF ELASTICITY372HVAC&R RESEARCH372OPTICAL FIBER TECHNOLOGY374THEORETICAL AND APPLIED FRACTURE MECHANICS375SIGNAL PROCESSING-IMAGE COMMUNICATION376IET Electric Power Applications377INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION378IEEE INTELLIGENT SYSTEMS379NUCLEAR SCIENCE AND ENGINEERING380JOURNAL OF SYMBOLIC COMPUTATION381ANNUAL REVIEWS IN CONTROL382383ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING384PACKAGING TECHNOLOGY AND SCIENCE385JOURNAL OF SCHEDULING386Journal of Zhejiang University-SCIENCE A387COMBUSTION EXPLOSION AND SHOCK WAVES388Applied Mechanics Reviews389Journal of Mechanics of Materials and Structures390Journal of Infrared Millimeter and Terahertz Waves391ALGORITHMICA392393JOURNAL OF QUALITY TECHNOLOGY394International Journal of Green Energy395FLUID DYNAMICS RESEARCH396Thermal Science397ZAMM-Zeitschrift fur Angewandte Mathematik und Mechanik 398ADVANCED ROBOTICS399400STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL 401RAPID PROTOTYPING JOURNAL402Environmental Progress & Sustainable Energy403INTERNATIONAL JOURNAL OF NUMERICAL METHODS FOR HEAT & FLU 404Elektronika Ir Elektrotechnika405ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING406Structure and Infrastructure Engineering407QUEUEING SYSTEMS408Journal of Civil Engineering and Management409PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 410IEEE Power & Energy Magazine411IEEE Transactions on Sustainable Energy412JOURNAL OF STRAIN ANALYSIS FOR ENGINEERING DESIGN413ENGINEERING COMPUTATIONS414PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PA 415APPLIED OCEAN RESEARCH416417Journal of Bionic Engineering418Journal of Infrastructure Systems418MACHINE VISION AND APPLICATIONS420Biomedical Signal Processing and Control421SHOCK WAVES422Smart Structures and Systems423IEEE Journal of Photovoltaics424425INTERNATIONAL JOURNAL OF DAMAGE MECHANICS426DESIGN STUDIES427Journal of Industrial and Management Optimization428JOURNAL OF FUSION ENERGY429GEOSYNTHETICS INTERNATIONAL430OPTO-ELECTRONICS REVIEW431MATHEMATICAL METHODS OF OPERATIONS RESEARCH431433ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING434INTERNATIONAL JOURNAL OF APPLIED ELECTROMAGNETICS AND MEC 435WATER INTERNATIONAL436JOURNAL OF POROUS MEDIA437438439Energy for Sustainable Development440INTERNATIONAL JOURNAL OF CRASHWORTHINESS441JOURNAL OF ELECTRONIC PACKAGING442INVERSE PROBLEMS IN SCIENCE AND ENGINEERING443INTERNATIONAL JOURNAL OF ELECTRONICS444Radioengineering444Transport446APPLIED COMPUTATIONAL ELECTROMAGNETICS SOCIETY JOURNAL 447CONTINUUM MECHANICS AND THERMODYNAMICS448449ADVANCES IN STRUCTURAL ENGINEERING450IEEE Transactions on Components Packaging and Manufacturi 451KYBERNETES452453COMPEL-THE INTERNATIONAL JOURNAL FOR COMPUTATION AND MATH 454International Journal of Chemical Reactor Engineering 455Journal of Renewable and Sustainable Energy456457Journal of Computational and Nonlinear Dynamics458Scientia Iranica459JOURNAL OF PERFORMANCE OF CONSTRUCTED FACILITIES460INTERNATIONAL JOURNAL OF COMPUTATIONAL FLUID DYNAMICS 461Journal of Computational Electronics462NETWORKS & SPATIAL ECONOMICS463ATOMIZATION AND SPRAYS464MICROGRAVITY SCIENCE AND TECHNOLOGY465466PROGRESS IN QUANTUM ELECTRONICS467468ACTA MECHANICA SOLIDA SINICA469STRUCTURAL DESIGN OF TALL AND SPECIAL BUILDINGS470JOURNAL OF PRESSURE VESSEL TECHNOLOGY-TRANSACTIONS OF THE 471PROCEEDINGS OF THE INSTITUTION OF CIVIL ENGINEERS-WATER M 472INSTRUMENTS AND EXPERIMENTAL TECHNIQUES473MATHEMATICS AND MECHANICS OF SOLIDS474JOURNAL OF ELECTRONIC IMAGING475COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS476Journal of Micro-Nanolithography MEMS and MOEMS477JOURNAL OF THE AUDIO ENGINEERING SOCIETY478JOURNAL OF TERRAMECHANICS479International Journal of Computational Methods480Nuclear Engineering and Technology481Road Materials and Pavement Design482QUARTERLY JOURNAL OF ENGINEERING GEOLOGY AND HYDROGEOLOGY 483Bulletin of the Polish Academy of Sciences-Technical Scie 484JOURNAL OF ENGINEERING DESIGN485Chinese Journal of Aeronautics485MARINE STRUCTURES487IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE488Energy Sources Part B-Economics Planning and Policy489JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARD 490JOURNAL OF AEROSPACE ENGINEERING491GEOTECHNICAL TESTING JOURNAL492EUROPEAN JOURNAL OF CONTROL493AUTOMATION AND REMOTE CONTROL493JOURNAL OF ENGINEERING AND TECHNOLOGY MANAGEMENT495ESI简称JCR简称ISSN eissn ESI学科J POWER SOURCES J POWER SOURCES0378-********-2755ENGINEERING J HAZARD MATER J HAZARD MATER0304-38941873-3336ENGINEERING INT J HYDROGEN ENERG INT J HYDROGEN ENERG0360-31991879-3487ENGINEERING CHEM ENG J CHEM ENG J1385-89471873-3212ENGINEERING ENERG FUEL ENERG FUEL0887-********-5029ENGINEERING J HYDROL J HYDROL0022-16941879-2707ENGINEERING FUEL FUEL0016-23611873-7153ENGINEERING IEEE TRANS IND ELECTRON IEEE T IND ELECTRON0278-00461557-9948ENGINEERING INT J HEAT MASS TRANSFER INT J HEAT MASS TRAN0017-93101879-2189ENGINEERING EUR J OPER RES EUR J OPER RES0377-********-6860ENGINEERING EXPERT SYST APPL EXPERT SYST APPL0957-41741873-6793ENGINEERING J FLUID MECH J FLUID MECH0022-11201469-7645ENGINEERING ENERGY ENERGY0360-54421873-6785ENGINEERING APPL ENERG APPL ENERG0306-26191872-9118ENGINEERING IEEE TRANS SIGNAL PROCESS IEEE T SIGNAL PROCES1053-587X1941-0476ENGINEERING J NUCL MATER J NUCL MATER0022-31151873-4820ENGINEERINGIEEE T ANTENN PROPAG0018-926X1558-2221ENGINEERING IEEE TRANS ANTENNAS PROPAGENERG CONV MANAGE ENERG CONVERS MANAGE0196-89041879-2227ENGINEERING J LIGHTWAVE TECHNOL J LIGHTWAVE TECHNOL0733-********-2213ENGINEERING J SOUND VIB J SOUND VIB0022-460X1095-8568ENGINEERING AUTOMATICA AUTOMATICA0005-10981873-2836ENGINEERING IEEE TRANS AUTOMAT CONTR IEEE T AUTOMAT CONTR0018-92861558-2523ENGINEERING IEEE TRANS ELECTRON DEVICE IEEE T ELECTRON DEV0018-93831557-9646ENGINEERINGIEEE T PATTERN ANAL0162-88281939-3539ENGINEERING IEEE TRANS PATT ANAL MACH INIEEE TRANS POWER ELECT IEEE T POWER ELECTR0885-89931941-0107ENGINEERING RENEWABLE ENERGY RENEW ENERG0960-1481null ENGINEERING IEEE ELECTRON DEV LETT IEEE ELECTR DEVICE L0741-31061558-0563ENGINEERING IEEE TRANS MICROWAVE THEO IEEE T MICROW THEORY0018-94801557-9670ENGINEERING INT J SOLIDS STRUCT INT J SOLIDS STRUCT0020-76831879-2146ENGINEERING APPL THERM ENG APPL THERM ENG1359-4311null ENGINEERING SENSOR ACTUATOR A-PHYS SENSOR ACTUAT A-PHYS0924-4247null ENGINEERING IEEE TRANS IMAGE PROCESSIN IEEE T IMAGE PROCESS1057-71491941-0042ENGINEERING IEEE J SOLID-STATE CIRCUITS IEEE J SOLID-ST CIRC0018-92001558-173X ENGINEERING J MICROMECHANIC MICROENGI J MICROMECH MICROENG0960-13171361-6439ENGINEERING COMBUST FLAME COMBUST FLAME0010-21801556-2921ENGINEERING ELECTRON LETT ELECTRON LETT0013-51941350-911X ENGINEERING WASTE MANAGEMENT WASTE MANAGE0956-053X null ENGINEERING IEEE TRANS POWER SYST IEEE T POWER SYST0885-89501558-0679ENGINEERING MICROELECTRON ENG MICROELECTRON ENG0167-93171873-5568ENGINEERING INT J ADV MANUF TECHNOL INT J ADV MANUF TECH0268-37681433-3015ENGINEERING ENERG BLDG ENERG BUILDINGS0378-********-6178ENGINEERING IEEE TRANS BIOMED ENG IEEE T BIO-MED ENG0018-92941558-2531ENGINEERING J CLEAN PROD J CLEAN PROD0959-65261879-1786ENGINEERING PROC IEEE P IEEE0018-92191558-2256ENGINEERINGSOLAR ENERG SOL ENERGY0038-092X null ENGINEERING INT J NUMER METHOD ENG INT J NUMER METH ENG0029-59811097-0207ENGINEERING INT J PROD ECON INT J PROD ECON0925-52731873-7579ENGINEERING PROC COMBUST INST P COMBUST INST1540-74891873-2704ENGINEERING BLDG ENVIRON BUILD ENVIRON0360-13231873-684X ENGINEERING PATT RECOG PATTERN RECOGN0031-32031873-5142ENGINEERING PROG ELECTROMAGN RES PROG ELECTROMAGN RES1559-89851559-8985ENGINEERING MEAS SCI TECHNOL MEAS SCI TECHNOL0957-02331361-6501ENGINEERING ENG STRUCT ENG STRUCT0141-02961873-7323ENGINEERING IEEE TRANS VEH TECHNOL IEEE T VEH TECHNOL0018-95451939-9359ENGINEERING J MECH PHYS SOLIDS J MECH PHYS SOLIDS0022-50961873-4782ENGINEERING IEEE TRANS CIRCUIT SYST-I IEEE T CIRCUITS-I1549-83281558-0806ENGINEERINGIEEE J SEL TOP QUANT1077-260X1558-4542ENGINEERING IEEE J SEL TOP QUANTUM ELECIEEE TRANS NEURAL NETWORKS ENGINEERING INT J PLASTICITY INT J PLASTICITY0749-64191879-2154ENGINEERING INT J PROD RES INT J PROD RES0020-75431366-588X ENGINEERING IEEE TRANS POWER DELIVERY IEEE T POWER DELIVER0885-89771937-4208ENGINEERING ADV WATER RESOUR ADV WATER RESOUR0309-17081872-9657ENGINEERINGIEEE T ULTRASON FERR0885-30101525-8955ENGINEERING IEEE T ULTRASON FERROELECTAPPL MATH MODEL APPL MATH MODEL0307-904X1872-8480ENGINEERINGIEEE MICROW WIREL CO1531-13091558-1764ENGINEERING IEEE MICROW WIREL COMPON LINT J THERM SCI INT J THERM SCI1290-07291778-4166ENGINEERING FUSION ENG DES FUSION ENG DES0920-37961873-7196ENGINEERING IEEE TRANS SYST MAN CYBERN B ENGINEERING ENG FRACTURE MECH ENG FRACT MECH0013-79441873-7315ENGINEERING FUZZY SET SYSTEM FUZZY SET SYST0165-01141872-6801ENGINEERINGMICROW OPT TECHN LET0895-24771098-2760ENGINEERING MICROWAVE OPT TECHNOL LETIEEE TRANS FUZZY SYST IEEE T FUZZY SYST1063-67061941-0034ENGINEERING IEEE SENS J IEEE SENS J1530-437X1558-1748ENGINEERING INT J MACH TOOL MANUF INT J MACH TOOL MANU0890-********-2170ENGINEERING PROG PHOTOVOLTAICS PROG PHOTOVOLTAICS1062-79951099-159X ENGINEERING IEEE TRANS INSTRUM MEAS IEEE T INSTRUM MEAS0018-94561557-9662ENGINEERING NONLINEAR DYNAMICS NONLINEAR DYNAM0924-090X1573-269X ENGINEERING PATTERN RECOGNITION LETT PATTERN RECOGN LETT0167-86551872-7344ENGINEERING MECH SYST SIGNAL PROCESS MECH SYST SIGNAL PR0888-3270null ENGINEERING MAR TECHNOL SOC J MAR TECHNOL SOC J0025-33241948-1209ENGINEERING AIAA J AIAA J0001-14521533-385X ENGINEERING SIGNAL PROCESS SIGNAL PROCESS0165-16841879-2677ENGINEERING TRIBOL INT TRIBOL INT0301-679X1879-2464ENGINEERING J MICROELECTROMECHANICAL J MICROELECTROMECH S1057-71571941-0158ENGINEERING INT COMMUN HEAT MASS TRAN INT COMMUN HEAT MASS0735-********-0178ENGINEERING CHEM ENG PROCESS CHEM ENG PROCESS0255-27011873-3204ENGINEERING EXP FLUID EXP FLUIDS0723-48641432-1114ENGINEERING IEEE ANTENN WIREL PROPAG L IEEE ANTENN WIREL PR1536-12251548-5757ENGINEERING INT J GREENH GAS CONTROL INT J GREENH GAS CON1750-58361878-0148ENGINEERINGPROG ENERG COMBUST SCI PROG ENERG COMBUST0360-1285null ENGINEERING INT J REFRIG INT J REFRIG0140-70071879-2081ENGINEERING MICROFLUID NANOFLUID MICROFLUID NANOFLUID1613-49821613-4990ENGINEERINGIEEE T CIRC SYST VID1051-82151558-2205ENGINEERING IEEE TRANS CIRC SYST VIDEO TRELIAB ENG SYST SAFETY RELIAB ENG SYST SAFE0951-********-0836ENGINEERING INT J COMPUT VISION INT J COMPUT VISION0920-56911573-1405ENGINEERING IEEE TRANS IND APPL IEEE T IND APPL0093-99941939-9367ENGINEERING NUCL ENG DES NUCL ENG DES0029-5493null ENGINEERING IEEE TRANS ENERGY CONVERS IEEE T ENERGY CONVER0885-89691558-0059ENGINEERING INT J ELEC POWER ENERG SYS INT J ELEC POWER0142-06151879-3517ENGINEERING DRY TECHNOL DRY TECHNOL0737-********-2300ENGINEERING TRANSP RES RECORD TRANSPORT RES REC0361-19812169-4052ENGINEERING INT J NUMER METHOD FLUID INT J NUMER METH FL0271-20911097-0363ENGINEERING IEEE TRANS CIRCUIT SYST-II IEEE T CIRCUITS-II1549-77471558-3791ENGINEERING MICROELECTRON REL MICROELECTRON RELIAB0026-2714null ENGINEERING IEEE TRANS ROBOT IEEE T ROBOT1552-30981941-0468ENGINEERING IEEE SIGNAL PROCESS MAG IEEE SIGNAL PROC MAG1053-58881558-0792ENGINEERING IEEE TRANS KNOWL DATA ENG IEEE T KNOWL DATA EN1041-43471558-2191ENGINEERING J BIOMECH ENG J BIOMECH ENG-T ASME0148-07311528-8951ENGINEERING IEEE SIGNAL PROCESS LETT IEEE SIGNAL PROC LET1070-99081558-2361ENGINEERING J HEAT TRANSFER J HEAT TRANS-T ASME0022-14811528-8943ENGINEERING J AIR WASTE MANAGE ASSOC J AIR WASTE MANAGE1096-22472162-2906ENGINEERING IEEE TRANS CONTROL SYST TE IEEE T CONTR SYST T1063-65361558-0865ENGINEERING ELEC POWER SYST RES ELECTR POW SYST RES0378-********-2046ENGINEERING TRIBOL LETT TRIBOL LETT1023-88831573-2711ENGINEERINGIEEE T DIELECT EL IN1070-98781558-4135ENGINEERING IEEE TRANS DIELECT ELECTR INJ GEOTECH GEOENVIRON ENG J GEOTECH GEOENVIRON1090-02411943-5606ENGINEERING INT J IMPACT ENG INT J IMPACT ENG0734-743X1879-3509ENGINEERING CIRP ANN-MANUF TECHNOL CIRP ANN-MANUF TECHN0007-85061726-0604ENGINEERINGJ NON-NEWTON FLUID0377-********-2631ENGINEERING J NON-NEWTONIAN FLUID MECHJ STRUCT ENG-ASCE ENGINEERINGJ ELECTROMAGNET WAVE0920-50711569-3937ENGINEERING J ELECTROMAGNET WAVE APPLINT J HEAT FLUID FLOW INT J HEAT FLUID FL0142-727X1879-2278ENGINEERING OPT ENG OPT ENG0091-32861560-2303ENGINEERING TRANSP RES PT B-METHOD TRANSPORT RES B-METH0191-2615null ENGINEERING OPER RES OPER RES0030-364X null ENGINEERING IEEE TRANS AUDIO SPEECH LANG ENGINEERING OPT LASER TECHNOL OPT LASER TECHNOL0030-39921879-2545ENGINEERING SYST CONTROL LETT SYST CONTROL LETT0167-69111872-7956ENGINEERING EXP THERM FLUID SCI EXP THERM FLUID SCI0894-17771879-2286ENGINEERING COMPUTATION MECH COMPUT MECH0178-76751432-0924ENGINEERING J GUID CONTROL DYNAM J GUID CONTROL DYNAM0731-********-3884ENGINEERING OPT LASER ENG OPT LASER ENG0143-81661873-0302ENGINEERING J PROCESS CONTROL J PROCESS CONTR0959-15241873-2771ENGINEERING IET CONTR THEORY APPL IET CONTROL THEORY A1751-86441751-8652ENGINEERING。

03载运工具 专业博士研究生培养方案

03载运工具 专业博士研究生培养方案

载运工具运用工程专业博士研究生培养方案学科专业名称:载运工具运用工程专业代码:082304 学位授权类别:工学一、学科简介水路运输、铁路运输、公路运输、航空运输和管道运输是现代社会中五大交通运输方式。

信息技术、电子技术、材料技术、现代控制技术和环境工程技术等现代工程技术和高新技术又为交通运输的发展注入了新的活力。

在此过程中,交通运输工程已形成为一个独立的学科门类。

上海海事大学交通运输工程载运工具运用工程与交通信息工程及控制学科主要涉及船舶运用工程和水上交通信息工程及控制等。

船舶运用工程主要研究船舶的运行品质、安全可靠度、与交通环境的相互影响以及船舶的检测维修等理论和技术,以适应重载、高速和高效船舶以及安全水上运输发展的需要。

水上交通信息工程及控制主要研究水路交通信息的采集、传输、处理与控制的基本理论,并研究建设智能化、综合化的港口和水道交通信息控制系统,以保障交通运输安全、提高运输效益和效率。

交通运输工程载运工具运用工程与交通信息工程及控制的主要相关学科有信息与通信系统、控制理论与控制工程、计算机应用技术及信号与信息处理、系统科学与技术等。

与这些学科相互交叉、渗透,并派生出一些新兴的边缘学科与新的研究方向。

二、培养目标应具有严谨求实的科学态度和作风,在船舶运用工程、水上交通信息工程及控制以及航海科学等方面具有坚实而宽广的基础理论,深入系统的专门知识。

深入了解本学科发展趋势、动向和学术研究前沿,具备本学科领域内的独立分析和研究能力,能主持和组织实施科研和生产所需要的实验、检测、分析和研究,并取得创造性研究成果。

至少掌握一门外国语,能熟练地阅读本专业的外文资料,具有外文科技文章写作能力和进行国际学术交流的能力。

三、主要研究方向四、课程设置五、本学科专业文献阅读的主要书目与主要期刊目录。

国外著名土木工程相关期刊列表SCIEI

国外著名土木工程相关期刊列表SCIEI

国外着名土木工程相关期刊列表SCI/EI国际重要学术期刊推荐表序号国际重要学术期刊名称SCI、EI检索源1 Advances in Structural Engineering2 ACI Journal of Materials3 ACI Structural Journal4 Automation in Construction 5 Buildings and Structures6 Canadian Geotechnical Journal ISSN: 0008-36747 Canadian Journal of Civil Engineering 8 Computational Mechanics9 Computers and Structures 10 Computers and Geotechnics ISSN:0266-352X11 Cement and Concrete Research12 Computer Methods in Applied Mechanics and Engineering13 Communications in Numerical Methods in Engineering14 Earthquake Engineering and Structural Dynamics15 Earthquake Spectrum16 Engineering Geology17 Engineering Analysis with Boundary Elements18 Engineering Structures19 Geotechnique ISSN:0016-850520 Ground Engineering21 Geotextiles and Geomembranes 22 International Journal of Impact Engineering ISSN: 0734-743X23 International Journal for Numerical and Analytical Methods in Geomechanics ISSN: 0363-906124 International Journal for Numerical Methods in Engineering25 International Journal of Rock Mechanics and Mining Sciences ISSN: 1365-160926 International Journal of Solids and Structures27 International Journal of Steel Structures28 International Journal of Space Structures29 International Journal of the Geotechnical Structures30 Journal of Applied Mechanics, ASME31 Journal of Bridge Engineering , ASCE32 Journal of Computing in Civil Engineering, ASCE33 Journal of Composites for Engineering, ASCE34 Journal of Constructional Steel Research35 Journal of Engineering Mechanics, ASCE36 Journal of Geodynamics ISSN: 0264-370737 Journal of Geotechnical and Geoenvironmental Engineering, ASCE ISSN: 1019-24138 Journal of Sound and Vibration39 Journal of Steel & Composite Structures 40 Journal of Structural Engineering, ASCE41 Journal of Wind Engineering & Industrial Aerodynamics Wind and Structures42 Journal of Construction and Management43 Preceding of Civil Engineering Bailing and Bridge Structures44 Reliability Engineering & System Safety ISSN: 0951-832045 Rock Mechanics and Rock Engineering ISSN: 0723-263246 Shock and Vibration ISSN: 1070-962247 Soils and Foundations ISSN: 0038-080648 Soil Dynamics and Earthquake Engineering 49 Structural Engineers50 Structural Engineering and Mechanics51 The Structural Design of Tall Buildings 52 Thin-walled Structures53 The Magazine of Concrete Research 54 Tunnelling and Underground Space Technology55 Wind and Structures-An International Journal56 Finite Elements in Analysis and Design 注:1.以上是否被SCI、EI检索期刊为准; 2.除以上学术期刊外,学科认为是国际重要学术期刊,且被SCI、EI检索,专家组可认定为国际重要学术期刊;。

湖南省优秀党员蒋仁言

湖南省优秀党员蒋仁言

三尺讲台育桃李,一支粉笔写春秋-------中共党员蒋仁言先进事迹简介蒋仁言,男,汉族,1956年9月出生,1985年7月参加工作,1991年7月入党。

长沙理工大学汽车与机械工程学院教授,"质量、可靠性与维修"研究所所长。

分别于1982年7月和1985年7月获武汉理工大学学士和硕士学位(机械工程),于1996年获澳大利亚昆士兰大学博士学位(机械工程)。

先后在香港城市大学(1997-1998)、加拿大Saskatchewan大学(1998-2000)、香港理工大学(2000-2002)、加拿大多伦多大学(2002-2005)和澳大利亚昆士兰工业大学(2007年11月)从事可靠性建模与维修理论等方面的研究。

现今长沙理工大学为本科生和研究生讲授"可靠性工程","质量工程"和"维修理论"三门课程。

另外还担任国际杂志"Reliability Engineering & System Safety","International Journal of Reliability andApplications","International Journal ofPerformability Engineering"编委;33家国际杂志或出版商的稿件评阅人;10个国际会议学术委员会成员;全国汽车行业设备管理理事会顾问,中国机械工程学会高级会员,中国机械工程学会可靠性工程分会第四届委员会委员,中国运筹学会可靠性分会理事,中国设备工程专家库高级专家,2013年被选为教学奉献奖,2014、2015年中国高被引学者,2016年学院推荐其参加享受国务院政府特殊津贴的选拔。

常言道“师者,传道,授业,解惑也”,教师的任务是教书育人,做的是为国家和社会培养人才的巨大工程。

在31年的教学生涯中,蒋仁言同志几十年如一日,坚守共产党员的信仰,他始终把党和群众的利益放在个人利益前面,始终淡泊名利、地位,始终公而忘私、廉洁奉公,一直以三寸讲台为阵地,三寸粉笔为钢枪,尽情挥洒人生,用三寸粉笔写下信仰,三寸讲台谋求发展,力求拿稳三寸粉笔,站稳三尺讲台,用心血与汗水去浇灌祖国的花朵,让种子发芽,让小鸡出壳,使得信仰在发展中谋求辉煌。

心理学专业英语词汇(I3)

心理学专业英语词汇(I3)

心理学专业英语词汇(I3)interim evaluation tests 中期评鉴测验中期评鉴测验interindividual 不同个体间的interindividual difference 个别间差异interindividual variation 个人间变异interiorization 内部化interiorization theory of intellectual activity 智力活动的内部说interjudge reliability 评分者间信度interlist intrusion 系列间侵入interlocking schedule 交接间时刻表intermale aggression 雄性间攻击intermarriage 近族通婚intermedial agent 媒介intermediary 媒介intermediate mechanism 中间机制intermediate memory 中期记忆intermediate needs 中间需求intermediate type 中间型intermediate value 中间值intermission 间歇期intermittence 间歇intermittence reinforcement 间断强化intermittence tone 间歇声intermittent 间歇的intermittent insomnia 间歇失眠intermittent noise 间歇噪声intermittent processing 间断处理intermittent reinforcement 间断强化intermittent schedule 间歇时间表intermittent sound 间歇音intermittent tone 间歇声intermittentence 间歇intermodal effect 通道间效应intermodality phenomena 通道间现象internal 内在的internal activity 内部活动internal attribution 内向归因internal capsule 内囊internal cause 内因internal character 内在性格internal clock 生物钟internal conflict 内在冲突internal consistency 内部一致性internal consistency reliability 内部一致性信度internal control 内控internal conversion 内变换internal counter 内部计数器internal counting 内心计量internal diversity 内部差异internal ear 内耳internal environment 内环境internal experience 内在经验internal factor 内部因素internal health locus of control 内部健康控制点internal imagery 内部表象internal inhibition 内抑制internal intelligibility 内在可理解性internal load 内部负荷internal locus of control 内控点internal logic 内在逻辑internal mental process 内在心理过程internal milieu 内环境internal model 内部模式internal motivation 内在动机internal need 内在需求internal noise 内部噪声internal perfecting principle 内在完善原理internal rectus 内直肌internal reinforcement 内在强化internal relation 内在联系internal representation 内在表征internal reward 内在奖赏internal secretion 内分泌internal secretory gland 内分泌腺internal sensation 内部感觉internal sense 内部感觉internal speech 内部言语internal stimulus 内部刺激internal validation 内在效度法internal validity 内在效度internal world 内在世界internalization 内化internalization of intellectual activity 智力活动的内化internalization theory of values 价值内化论internalized norms 内化规范internalizing syndrome 内化综合症internals 内控者internal external control scale 内外控量表internal external locus of control 内外控制点internal external scale 内外控量表international association for cross cultural psychology 国际跨文化心理学会international association of applied psychology 国际应用心理学会国际应用心理学会international center of genetic epistemology 发生认识论国际中心international classification of diseases 国际疾病分类international council of psychologists 国际心理学家协会international joint ventures 国际合资企业international journal of aviation psychology 国际航空心理学杂志international journal of cognitive ergonomics 国际认知工效学杂志international journal of comparative psychology 国际比较心理学杂志international journal of mental health 国际心理卫生杂志international man 国际人international management 国际化管理international neurological association 国际神经病学会international pitch 国际音高international psychoanalytical association 国际精神分析学会international psychology 国际心理学international society of sports psychology 国际运动心理学会international standardization organization 国际标准化组织international testing commission 国际测验委员会international union of psychological science 国际心理科学联合会internecine 自相残杀的interneuron 中间神经元interneuronal 神经元间的internment 拘留internship 实习生internuncial 联络的internuncial neuron 中间神经元interobserver reliability 观察者间信度interoception 内感作用interoceptive 内受的interoceptive reflex 内感受反射interoceptive stimulus 内感受刺激interoceptive system 内受系统interoceptor 内感受器interocular distance 目间距interocular transfer 眼间迁移interofection 对内反应作用interofective 对内反应的interolivary 脑橄榄体间的interorganizational field 组织间的场interorganizational network 组织间网络组织间网络interorganizational network commitment 组织间网络承诺interosculate 联系interparoxysmal 发作期间的interpenetrating 相互渗透interpenetration 思维渗透interpenetrative 相互渗透的interpersonal 人际的interpersonal accommodation 人际关系调适interpersonal attraction 人际吸引interpersonal behavior 人际行为interpersonal checklist 人际检核表interpersonal choice 人际选择interpersonal choice motive 人际选择动机interpersonal cognition 人际认知interpersonal communication 人际沟通interpersonal comparison process 人际比较过程interpersonal competence 人际能力interpersonal concordance 人际和谐interpersonal conflict 人际冲突interpersonal consumption 人际内耗interpersonal distance 人际距离interpersonal exclusion 人际排斥interpersonal expectancy effect 人际期待效应interpersonal fusion 人际融合interpersonal interaction 人际相互作用人际相互作用interpersonal maturity scale 人际成熟度人际成熟度interpersonal perception 人际知觉interpersonal psychotherapy 人际关系心理治疗interpersonal relation 人际关系interpersonal relation disturbance 人际关系障碍interpersonal relation psychology 人际关系心理学interpersonal relation study 人际关系研究interpersonal relationship 人际关系interpersonal roles of management 管理的人际角色interpersonal roles of managers 管理者的人际角色interpersonal skill 社交技巧interpersonal skills 人际技能interpersonal theory 人际关系理论interpersonal therapy 人际关系治疗interpersonal trust 人际信任interphase 中间期interplay 相互作用interplexiform cell 网状层间细胞interpolated activity 插入活动interpolation 内插法interposition 内插interpret 解析interpret apprehensive level of teaching 教学的讲解水平interpretability 可解释性interpretation 释义interpretation of dreams 释梦interpretation delusion 释义妄想interpreter reliability 解释者间信度interpretive therapy 解说性治疗interproblem learning 问题间学习interpsychological 心理之间的interpsychology 人际心理学interpupillary distance 瞳孔间距interquartile range 四分位数间距interrater agreement 评判间一致性interrater reliability 评判间信度interrelation analysis 相互关系分析interrelationship study 相互关系研究interresponse time 反应间距interrogate 审讯interrogation 审讯interrogation posture 审讯态势interrogational 审讯的interrogator 审讯者interrogatory 讯问的interrogatrix 女审讯者interrogee 被审讯者interrole conflict 角色间冲突interrupt 间断interrupted induced shock 断续速应电震interrupted time series design 断续时间系列设计interrupter 断续器interruption tone 间歇音intersensory perception 多感官知觉interseptal 隔间interserial intrusion 系列间侵入intersex 雌雄间体intersexuality 雌雄间性intersexuality 阴阳人intersignal interval 信号间距interspace 间隙interspecies aggression 种间侵犯行为interspike interval 峰电位间距interstimulus interval 刺激间距刺激间距interstitial 间隙的intertone 中间音intertribal interval 练习间距intertribal interval effect 试验间隔效应试验间隔效应interval 间距interval analysis 区间分析interval between generations 代沟interval effect 间隔效应interval estimation 区间估计interval measure 区间测量interval of time 时段interval of uncertainty 不肯定间距interval reinforcement 时距强化interval reinforcement schedule 时距强化方式interval sampling 间隔抽样interval scale 等距量表interval timer 间隔报时器intervene 干预intervening 中介intervening mechanism 中介机制intervening variable 中介变量intervention 干预intervention capacity 干预能力intervention level 干预水平interview 访谈interview 面谈interview bias 调查偏误interview counseling 面谈咨询interview group psychotherapy 面谈团体心理治疗法interview method 交谈法interview survey 访问调查interview techniques 面谈技巧interview therapy 面谈治疗法interviewee 受访者interviewer 访谈员interviewer bias 访谈员偏差interviewer effect 访谈员效应interviewing manual 访谈手册interviewing method 访谈法inter group dynamics 组间动力inter individual difference 个体间差异个体间差inter individual variation 个体间变异个体间变inter item associative strength 项目间联想强度inter personal contact 人际关系inter ratter reliability 评等者间信度inter role conflict 角色间冲突inter stimulus interval 刺激时距刺激时距inter trial interval 赏试时距intima 内膜intimacy 亲密intimacy disorder 亲密感失常intimacy distance 亲近距离intimacy vs isolation conflict 亲密与孤单的矛盾intimate distance 亲近距离intimate speech 亲昵话语intimate zone 亲密区intimation 告知intimidate 威胁intimidator 威吓者intolerance 不容忍intolerance of ambiguity 缺暧昧容忍力缺暧昧容忍力intolerance style 偏执型intonation 语调intonation pattern 语调模式intoxication 中毒intracellular 细胞内的intracephalic 脑内的intraception 内感受作用intracerebellar 小脑内的intracerebral 大脑内的intrachordal 脊索内的intraclass correlation 组内相关intraconscious personality 意识内人格intracranial 颅内的intracranial infection 颅内感染症intractable 难控制的intradermoreaction 皮内反应intradimensional shift 维度内转移intradural 硬膜内的intragroup 群体内的intragyral 脑回内的intraindividual 个体内的intraindividual difference 个别内差intraindividual variation 自身内在变异自身内在变intralaminar nuclei 髓板内核髓板内核intralist intrusion 系统内侵入intramedullary 髓内的intrameningeal 脑脊膜内的intramundane 物质世界的intrant 入会者intranuclear 核内的intranueral 神经内的intraparenchymatous 实质内的intrapontine 脑桥内的intraproblem learning 问题内学习intrapsychic 内心的intrapsychic ataxia 内心运作失调intrapsychic conflict 内心冲突intrapsychic event 内心事件intrapsychical 内心的intrapsychological 心理内的intraretinal 视网膜内的intrarole conflict 角色内冲突intraserial intrusion 系统内侵入intraspinal 脊柱内的intratympanic 鼓室内的intrauterine 子宫内intrauterine device 子宫内装置intrauterine live 出生前生活intravenous injection 静脉内注射intravertebral 脊柱内的intravital 生活期内的intra arachnoid 蛛网膜内的intra attitude organization 态度内组织态度内组织intra aural 耳内的intra generational mobility 代内移动intra ocular 眼内的intra oral 口内的intra orbital 眼眶内的intricacy 错综复杂intrigant 阴谋者intrigue 阴谋intriguing 引起兴趣的intrinsic 内部的intrinsic behavior 内在行为intrinsic change 内在变化intrinsic factor 内在因素intrinsic functional 内在功能intrinsic interest 内发兴趣intrinsic meaning 内在意义intrinsic motivation 内在激励intrinsic motivation of learning 学习的内在动机intrinsic necessity 内在必然性intrinsic reward 内在奖励intrinsic reward satisfaction 内在奖励满足intrinsic validity 内在效度intrinsic variability 固有变异性introception 内感受作用introcontrol 内控introductory 引导的introgression 渐渗现象introjection 投入作用introjection 心力内投introperception 内感受作用intropunitive 自责型intropunitive response 自责反应intropunitiveness 自责introspecies aggression 种间侵犯行为introspection 内省introspectionism 内省主义introspective method 内省法introspective psychology 内省心理学introspective type 内省型introversion 内向性introversion feeling 内倾情绪introversion extroversion 内外倾introversion extroversion questionnaires 内外倾问卷introversive type 内倾型introvert 内向性格introvert type 内向型introvertive 内倾的intrusion 侵入intrusion error 侵扰误差intrusion of personal space 个人空间的侵入intrusion response 侵扰反应intrusive mood 侵入式intuition 直观intuition 直觉intuition leaps 直觉飞跃intuition of subject matter 教材的直观intuition prediction 直觉论断intuition thinking 直觉思维intuition type 直觉型intuitional 直觉的intuitional experience 直觉体验intuitional instruction 直观教学intuitional type of personality 直觉型人格intuitionalism 直觉主义intuition art 直觉艺术intuition expression 直觉表现intuitive activity 直观活动intuitive concept of number 数字直觉观数字直觉观intuitive decision making 直觉决策intuitive forecasting technique 直观预测法intuitive judgment 直观判断intuitive knowledge 直观知识intuitive learning 直观学习intuitive perception 直观知觉intuitive phase 直觉期intuitive thinking 直观思维intuitive thought 直觉思想inutility 无益invade 侵入invalid 无效invalid child 无能儿童invalidism 病残invalidity 缺效度invariability 不变性invariance 不变性invariant 不变的invariant color 不变色invariant factor 不变因素invariant relation 不变关系invasion 侵入invasion of personal space 个人空间入侵invasiveness 侵入力invective 抨击inveigh 申斥invention 创造力invention 发明inventory 调查inventory 量表inventory of personality 人格量表inventory of piaget s development task 青少年认知测验inventory test 调查测验inveracity 不诚实inverse 反的inverse astigmatism 反规性散光inverse correlation 逆相关inverse factor analysis 逆因素分析inverse probability 逆概率inverse proportion 反比例inverse relationship 逆相关inverse sampling 逆抽样inverse temperature 体温颠倒inversion 逆向转化inversion of affect 情感颠倒inversion of affective 情感逆转invert goggles 倒视护目镜invertebrate 无脊椎动物inverted oedipus complex 转换型恋亲情结inverted sadism 逆转施暴狂inverted u hypothesis 逆u型假设inverting lens 逆转眼镜investigating period 调查期间investigation 调查研究investigation group 调查团investigation method 调查法investigation of family budget 家庭收支调查investigation report 调查报告investigation team 调查组investigative assumption 侦查假设investigative experiment 侦查实验investigative psychology 侦查心理学investigative reasoning 侦查推理investigator 调查员investigatory reaction 探究反射investment 投资investment in brains 智力投资investment in education 教育投资investment plan 投资计划investment priority 投资重点investor 投资者inveteracy 根深蒂固invidious 诽谤的invigilate 监考invisible 无形的invisible displacement 隐蔽位移invisible playmate 隐形游伴invitation 邀请invite danger 引起危险inviting 吸引人的invoke 祈求involuntary 不随意的involuntary 非志愿involuntary attention 不随意注意involuntary behavior 非自主行为involuntary contraction 不随意收缩involuntary hospitalization 非自主住院非自主住院involuntary imagination 不随意想象involuntary movement 不随意运动involuntary muscle 不随意肌involuntary reflex 不随意反射involution 衰退involutional 更年期的involutional depression 更年期抑郁involutional melancholia 更年期忧郁症更年期郁病involutional neurosis 更年期神经官能症involutional paranoid psychosis 更年期妄想狂精神病involutional paranoid state 更年期妄想狂状态involutional psychosis 更年期精神病involutional psychotic reaction 更年期忧郁症involvement 投入inward 内在的inward intuition 内心直觉inward world 内心世界inwardness 内在性in basket method 实务法in basket test 实务测试in depth analysis 深入分析in depth investigation 深入调查in group 内群体in serve teacher 在职教师in service 在职的在职的in service training 在职训练iodopsin 视紫蓝质ion 赫尔概念形成实验ion 离子ion 沙利文的人际关系理论ionic event 离子事件ionic flux 离子通量ionizing 离子化iophobia 毒物恐怖症iowa silent reading tests 衣阿华默读测验iowa stuttering scale 衣阿华口吃量表爱阿华口吃量表iowa test of basic skill 衣阿华基本技能测验iowa test of educational development 衣阿华教育发展测验ipat anxiety battery ipat焦虑成套测验ipat humor test of personality ipat性格幽默测验ipsation 自淫ipsative 自比的ipsative approach 自比性研究ipsative measure 自模测量ipsative measurement 自模测量ipsative questionnaire 自比问卷ipsative scale 自比量表ipsative score 自比分数ipsative test 自比测验ipsilateral 同侧的ipsp 抑制性突触后电位iq 智商ir 信息检索irascible 性情暴躁的ireful 愤怒的iridis akinesia 虹膜运动不能iridization 虹晕感觉iris 虹膜irm 先天释放机制ironfisted 残酷的ironic 冷嘲的ironic remarks 讽刺的话irradiance 辐照度irradiation 辐照irradiation 扩散irradiation of excitation 兴奋扩散irradiation of excitatory process 兴奋过程的扩散irradiation of inhibition 抑制扩散irradiation of reflex 反射扩散irrational 无理的irrational fear 非理性恐惧irrational type 非理性型irrationality 无理性irreality 不真实irreality level 非现实水平irreciprocal conductivity 单性传导性irrecognizable 不能认识的irreconcilable 难和解的irrecoverable 不能挽回的irreducible minimum 不可减少的最小值irregular 不规则的irregular astigmatism 不规则散光irregular variation 不正常变动irregularity 不规则irregularity 误差irrelative 无关系的irrelevant 无关系irrelevant cue 无关连线索irrelevant data 无关资料irrelevant dimension 无关连维度irrelevant drive 多余驱力irrelevant factor 无关因素irrelevant variable 无关变量irremediable 不可医治的irremissible 不能原谅的irreparable 不可弥补的irreplaceable 不可替代的irrepressible 压抑不住的irresistible 不可抗拒的irresistible impulse 不可抗拒的冲动irresolution 犹豫不决的irrespective 不顾的irresponsibility 无责任性irretentive 不能保持的irreversibility 不可逆性irreversibility of conduction 传导的不可逆性irreversible 不可逆的irreversible process 不可逆过程irreversible reaction 不可逆反应irritability 兴奋性irritable 应激性的irritable aggression 应激性攻击irritant 刺激性irritate 刺激irritating 使人不愉快的irritation 激怒irt 项目反应理论ishihara test 石原氏色盲测验isi 刺激间距刺激间距isi 刺激时距刺激时距isi 信号间距island of hearing 听岛isobolism 均等兴奋性isochronism 等时性isocortex 新脑皮层isolate 隔离isolated area 孤立区域isolated encephalon 隔离脑isolated forebrain 隔离前脑isolated item 孤立项isolated pathological point 孤立病点isolated star 孤星isolated verbal unit 孤立语isolates 孤立者isolating abstraction 分离的抽象作用isolation 隔离isolation 孤独isolation amentia 隔离性痴愚isolation aphasia 隔离失语症isolation area 隔离区isolation barrier 隔离隔栅isolation effect 孤立效应isolation experiment 隔离实验isolator 隔离者isolux curve 等照度曲线isomerization 同分异构化作用isomers 同分异构体isomorphic 同型的isomorphism 心物同形论isomorphy 同形体isophoria 两眼视线等平isopia 两眼视力相等isopreference curve 等选好曲线isosensitive 等感受性isosensitivity curve 等感受性曲线isosensitivity function 等感受性函数isothermognosis 等温感觉isotope 同位素isotropic 均等的isotropism 均等性isplaysissuable 可争论的issue 争论点issueless 无结果的ist 胰岛素休克治疗法isthmus 峡itch 痒itching 痒item 题目item analysis 项目分析item characteristic curve 项目特征曲线item characteristic function 项目特征函数item content 题目内容item development 题目编写item difficulty 项目难度item difficulty index 试题难度指数item discriminating power 项目辨别力item discrimination 项目辨别度item discrimination index 试题鉴别指数item moderation 试题调整item pool 题库item response theory 项目反应理论item sampling 题目抽样item scaling 量表试题定位item selection 试题选择item validity 试题效度item validity 项目效度item weighting 试题加权itemized record 详细记录item and arrangement 项目和配列item total correlation 项目总分相关item total reliability 项目总分信度iterate 重复iteration 重复iteration technique 反复研究法iterative 重复的iterative estimation 重复渐进估计法iterative maximum likelihood estimation 重复最大相似性估计iterative search techniques 叠代法iterative solution 重复解答iti 赏试时距itln 髓板内核itv 教学电视ity 内外之合说iv 自变量ivi 重要值指数ivity 智力活动内化说iv×sv design自变量×被试变量设计i e scale 内外控量表i thou confrontation 你我对抗i thou relationship 你我关系。

international journal of educational research格式

international journal of educational research格式

international journal of educational research格式摘要:1.介绍国际教育研究杂志2.杂志的内容和范围3.杂志的审稿流程和要求4.杂志的影响力和评价5.对教育研究领域的贡献正文:国际教育研究杂志(International Journal of Educational Research)是一本知名的教育类学术期刊,致力于发布高质量的教育研究成果,以推动全球教育领域的发展。

本杂志接收来自世界各地的作者投稿,内容涵盖了教育领域的各个方面,包括教育理论、教育实践、教育政策、教育心理学等。

本杂志的内容和范围非常广泛,不仅包括教育领域的实证研究,也包括理论研究、教育评论、案例研究等。

我们欢迎各种研究方法的应用,包括定量研究、定性研究、混合研究等。

本杂志接收的文章必须是原创的,并且未曾在其他地方发表过。

本杂志的审稿流程严格,但公平公正。

所有投稿的文章都会经过至少两名匿名审稿人的评审,以确保文章的质量和公正性。

我们鼓励作者在投稿前详细阅读我们的投稿指南,以确保文章符合我们的要求。

国际教育研究杂志的影响力非常大,被世界各地的教育研究者和机构广泛引用。

本杂志也被多个学术数据库收录,包括Web of Science、Scopus等,进一步提高了本杂志的影响力。

本杂志对教育研究领域做出了重大贡献。

我们发布的文章不仅推动了教育理论的发展,也为教育实践提供了宝贵的参考。

同时,本杂志也为世界各地的教育研究者提供了一个交流和合作的平台,促进了教育研究的国际化。

总的来说,国际教育研究杂志是一本重要的教育类学术期刊,对教育研究领域做出了重大贡献。

international journal of educational research投稿经验

international journal of educational research投稿经验

international journal of educationalresearch投稿经验引言概述:在教育研究领域,国际教育研究期刊(International Journal of Educational Research)是一本备受学术界认可的期刊。

本文将从投稿经验的角度出发,介绍国际教育研究期刊的特点和要求,并分享一些投稿的经验和技巧,以帮助读者更好地进行研究论文的投稿。

正文内容:1. 国际教育研究期刊的特点1.1 国际影响力:国际教育研究期刊是国际知名期刊,具有广泛的读者群体和影响力。

1.2 学术严谨性:国际教育研究期刊注重学术质量,对论文的要求较高,需要具备独立性、创新性和科学性。

2. 投稿经验和技巧2.1 主题选择:选择与国际教育研究领域相关的热点话题,关注当前的研究趋势和问题。

2.2 文献综述:在投稿前进行充分的文献综述,了解已有研究,找到自己的研究切入点,并与现有研究进行对比和分析。

2.3 研究方法:合理选择适合自己研究的方法和数据分析工具,确保研究方法的科学性和可靠性。

2.4 结果呈现:清晰地呈现研究结果,使用图表和数据来支持研究结论,提高论文的可读性和说服力。

2.5 论文写作:注意论文的结构和语言表达,确保逻辑清晰、准确无误,并遵循国际教育研究期刊的格式和要求。

3. 投稿注意事项3.1 作者须知:仔细阅读国际教育研究期刊的作者须知,了解投稿的具体要求和流程。

3.2 学术道德:遵守学术道德规范,确保研究的真实性和可信度,不涉及抄袭和数据造假等不端行为。

3.3 审稿意见:认真对待审稿人的意见和建议,及时进行修改和完善,以提高论文的质量和通过率。

总结:综上所述,国际教育研究期刊是一本具有国际影响力和学术严谨性的期刊。

在投稿过程中,我们需要选择合适的主题,进行充分的文献综述,合理选择研究方法,清晰呈现研究结果,并注意论文的结构和语言表达。

此外,我们还需要遵守学术道德规范,认真对待审稿意见。

international journal of disaster risk science投稿经验

international journal of disaster risk science投稿经验

international journal of disaster riskscience投稿经验引言概述:国际灾害风险科学期刊(International Journal of Disaster Risk Science)是一本以灾害风险科学为主题的学术期刊。

本文旨在分享我在投稿该期刊的经验,包括准备投稿前的准备工作、投稿流程、审稿过程以及一些建议。

正文内容:1. 准备工作1.1 研究期刊主题:在投稿前,了解国际灾害风险科学期刊的主题范围和研究方向,确保自己的研究内容与该期刊的定位相符。

1.2 查阅期刊要求:仔细阅读期刊的投稿指南和要求,包括格式、字数、参考文献等,确保投稿材料符合期刊的要求。

2. 投稿流程2.1 选择合适的稿件类型:国际灾害风险科学期刊接受原创研究论文、综述、研究报告等多种类型的稿件,根据自己的研究内容选择合适的稿件类型进行投稿。

2.2 在线投稿系统:使用期刊提供的在线投稿系统提交稿件,按照系统的指引逐步完成投稿过程,包括填写作者信息、上传稿件、选择编辑等。

2.3 跟踪投稿状态:在投稿后,定期登录投稿系统查看稿件状态,包括审核、审稿、修改等环节,及时了解稿件的处理进度。

3. 审稿过程3.1 审稿周期:国际灾害风险科学期刊的审稿周期一般较长,需要耐心等待。

通常,审稿周期在1个月到3个月之间,具体时间根据稿件的复杂性和审稿人的反馈而定。

3.2 审稿意见:一般情况下,审稿人会提出一些修改意见和建议,作者需要认真阅读审稿意见,并根据意见进行修改和完善稿件。

3.3 回复审稿人:在修改稿件后,作者需要撰写一份回复审稿人的信件,详细解释对审稿意见的回应和修改措施。

4. 建议和注意事项4.1 研究创新性:国际灾害风险科学期刊注重研究的创新性和学术价值,作者在投稿时应确保自己的研究具有一定的创新性和前瞻性。

4.2 语言表达:文章的语言表达要准确、清晰,避免使用过于复杂的术语和句式,以确保读者能够理解和接受作者的观点。

international journal of disaster risk reduction缩写

international journal of disaster risk reduction缩写

international journal of disaster risk reduction缩写
"International Journal of Disaster Risk Reduction"(国际灾害风险减少杂志)的缩写通常为"IJDRR"。

这个缩写在学术出版、科研领域以及灾害风险管理相关的专业环境中广泛使用。

"IJDRR" 是一个专注于灾害风险减少领域的学术期刊,它发表关于如何识别、评估、减少和管理各种灾害风险的研究论文。

这些灾害可能包括自然灾害(如地震、洪水、飓风),也可能包括人为灾害(如工业事故、恐怖袭击)。

该杂志的目标是提供一个平台,让科研人员、政策制定者和实践者可以分享最新的研究成果、最佳实践和创新方法,以更好地应对和减少灾害风险。

"IJDRR" 的内容可能涵盖多个学科领域,包括地理学、环境科学、工程学、社会学、心理学和经济学等。

这是因为灾害风险管理是一个跨学科领域,需要多方面的知识和方法来解决。

此外,"IJDRR" 通常也会有一些特殊栏目,比如专题讨论、书评、政策分析等,这些内容都有助于读者更全面地了解灾害风险减少领域的最新动态和趋势。

总的来说,"IJDRR" 作为"International Journal of Disaster Risk Reduction" 的缩写,是灾害风险管理领域的重要学术期刊,对于推动该领域的研究和实践具有重要意义。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

International Journal of Reliability,Quality and Safety Engineeringf c World Scientific Publishing CompanyCLUSTERING-BASED NETWORK INTRUSION DETECTIONSHI ZHONG,TAGHI KHOSHGOFTAAR,and NAEEM SELIYADepartment of Computer Science and EngineeringFlorida Atlantic University,Boca Raton,FL33431,USAReceived(received date)Revised(revised date)Recently data mining methods have gained importance in addressing network security issues,including network intrusion detection—a challenging task in network security.Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate.Classification-based data mining models for intrusion detection are of-ten ineffective in dealing with dynamic changes in intrusion patterns and characteristics.Consequently,unsupervised learning methods have been given a closer look for network intrusion detection.We investigate multiple centroid-based unsupervised clustering algo-rithms for intrusion detection,and propose a simple yet effective self-labeling heuristic for detecting attack and normal clusters of network traffic audit data.The clustering algo-rithms investigated include,k-means,Mixture-Of-Spherical Gaussians,Self-Organizing Map,and Neural-Gas.The network traffic datasets provided by the DARPA1998offline intrusion detection project are used in our empirical investigation,which demonstrates the feasibility and promise of unsupervised learning methods for network intrusion de-tection.In addition,a comparative analysis shows the advantage of clustering-based methods over supervised classification techniques in identifying new or unseen attack types.1.IntroductionIn recent years,considerable attention has been given to data mining approaches for addressing network security issues.This is particularly due to the increasing dependence on computer networks for personal,business,and government activities. An intrusion attack can result in several severity levels of incapacity,from loss of personal privacy to an enormous loss of business capital.An intrusion is any use of the given network that compromises its stability and/or security of information stored across the work intrusion detection models are used for detecting intrusions or anomalous behavior.There are generally two types of approaches taken toward network intrusion detection:anomaly detection and misuse detection.In misuse detection,each net-work traffic record is identified as either normal or one of many intrusion types.A classifier is then trained to discriminate one category from the other,based on network traffic attributes.Lee et al.1proposed a data mining framework for such a system.They used a series of data mining techniques,such as frequent episodes and association rules,to help extract discriminative features,which include various network traffic statistics.Obtaining correctly-labeled data instances,however,is12Clustering-based Network Intrusion Detectiondifficult and time intensive,especially for new attack types and patterns.On the other hand,anomaly detection amounts to training models for normal traffic behavior and then classifying as intrusions any network behavior that signif-icantly deviates from the known normal patterns2.Traditional anomaly detection algorithms often require a set of purely normal traffic data from which models can be trained to represent normal traffic patterns.Clustering algorithms have recently gained attention3,4,5,6,7in related literature, since they can help current intrusion detection systems in several respects.An important advantage of using clustering or unsupervised learning to detect network attacks is the ability tofind new attacks not seen before.This implies that attack types with unknown pattern signatures can be detected.A main objective of this study is to demonstrate this advantage of unsupervised learning using a simple (clustering-based attack detection)method.The proposed method is also shown to improve(assist)traditional classification-based intrusion detection models that often have difficulty in classifying new or unseen attacks correctly.Clustering results can also assist the network security expert with labeling net-work traffic records as normal or intrusive.The amount of available network traffic audit data is usually large,making the expert-based labeling process of all records very tedious,time-consuming,and expensive.Additionally,labeling a large number of network traffic records can lead to errors being incorporated during the process. Instead of evaluating each data instance one by one,the expert can simultaneously label all(tens or hundreds)data instances in a cluster by observing the common characteristics of the cluster,with possibly very few mistakes,provided the clus-ters obtained are relatively“pure”.A completely(100%)pure cluster is one that contains data instances only from one category(normal or a specific attack type or category).We investigate the performance of several clustering algorithms in terms of cluster purity as well as other performance criteria.Recent works on clustering-based intrusion detection focus on constructing a set of clusters(based on unlabeled4,6or labeled5training data)to classify(future) test data instances.Such approaches do not completely exploit the advantages of clustering-based methods.In contrast,we advocate clustering the(future)test data instances to be classified,and then use heuristics or existing labeled data to help la-bel the clustered instances.This paper extends our previous study7to demonstrate that our clustering-based method can outperform and enhance the state-of-the-art support vector machine algorithm in detecting unseen intrusion(attack)types.The primary contributions of this paper are:1.A comprehensive comparative study of multiple clustering algorithms for an-alyzing large intrusion detection datasets was conducted.We analyzed the suitability of different clustering algorithms and empirically compared several centroid-based algorithms–k-means8,Mixture-Of-Spherical Gaussians9,Self-Organizing Map10,and Neural-Gas11,in terms of both clustering quality and run-time efficiency.Such a study holds practical merit and will benefit future studies in this area,especially given the existence of many clustering methods.International Journal of Reliability,Quality and Safety Engineering32.A simple and effective self-labeling heuristic is proposed to detect and labelattack clusters.The detection performance is evaluated by detection accura-cies and ROC(Receiver’s Operating Characteristics)curves for each of the aforementioned clustering algorithms.3.A set of experiments are designed to show the main advantage of our clustering-based intrusion detection method in identifying new attack instances.Results also demonstrate that our method can be used to help classification methods achieve better overall intrusion detection accuracies.This paper is organized as follows.The clustering algorithms investigated in this paper are introduced in the next section.We then present the proposed heuristic for self-labeling of clusters,followed by a description of the intrusion detection dataset and empirical settings,and a discussion of our empirical results.Finally,we present related work,concluding remarks,and suggestions for future work.2.Clustering TechniquesGenerally speaking,clustering techniques can be divided into two categories—pairwise clustering and central clustering.The former,also called similarity-based clustering,groups similar data instances together based on a data-pairwise proxim-ity measure.Examples of this category include graph partitioning-type methods.12,13 The latter,also called centroid-based or model-based clustering,represents each cluster by a model,i.e.,its“centroid”.Central clustering algorithms are often more efficient than similarity-based clustering algorithms.14Regular k-means8and EM (Expectation Maximization)clustering algorithms9fall into this category.We choose centroid-based clustering over similarity-based clustering due to the large size of the network traffic audit dataset.This was decided after initial stud-ies on a variety of methods,including the CLUTO toolkit,13which is based on graph partitioning techniques.Preliminary experiments using CLUTO show that it takes several hours to cluster around110K network traffic instances and the algo-rithm generated500∼700clusters due to required(for efficiency)sparsity for the constructed graph.a We could not efficiently get a desired(for comprehensibility) number of clusters,e.g.,100or200as set by users.Similarity-based algorithms usually have a complexity of at least O(N2)(for computing the data-pairwise proximity measures),where N is the number of data instances.In contrast,centroid-based algorithms are more scalable,with a complex-ity of O(NKM),where K is the number of clusters and M the number of batch iterations.In addition,all these centroid-based clustering techniques have an on-line version which can be suitably used for adaptive attack detection in a data-flow environment.1a See the CLUTO toolkit manual for more details.4Clustering-based Network Intrusion Detection2.1.K-meansThe widely used standard k-means algorithm8can be found in many other pa-pers and its details are omitted here.It minimizes the mean-squared error(mse) objective functionE=1Nnx n−µyn2,(1)where y n=arg min k x n−µk 2is the cluster identity of data vector x n andµyn is the centroid of cluster y n.Unless specified otherwise, · represents L2norm.The popularity of the k-means algorithm is largely due to its simplicity,low timecomplexity,and fast convergence.Since batch k-means has been described in manypapers,15here we instead present an online k-means algorithm in Fig.1.Both arestudied in Section4.3,and they are named batch k-means and kmo,respectively. Algorithm:online k-means(kmo)Input:A set of N data vectors X={x1,...,x N}in I R d and number of clusters K. Output:A partition of the data vectors given by the cluster identity vector Y={y1,...y N},y n∈{1,...,K}.Steps:1.Initialization:initialize the cluster centroid vectors{µ1,...,µK};2.Loop for M iterationsFor each data vector x n,set y n=arg mink x n−µk 2,and update thecentroidµynasµ(new) y n =µyn−∂E∂µyn=µyn+ξ(x n−µyn),whereξis a learning rate usually set to be a small positive number(e.g.,0.05).The number can also gradually decrease in the learning process.Figure1:Online k-means algorithm.2.2.Mixture-Of-Spherical Gaussians(MOSG)The MOSG clustering using the EM algorithm16is shown in Fig.2.It is a special case of Mixture-Of-Gaussians clustering,with an identity covariance matrix used for the Gaussian distribution of a ing an identity covariance matrix makes the algorithm more scalable to higher data dimensionality.A detailed derivation of the parameter estimation for the Mixture-Of-Gaussians and an excellent tutorial on the EM algorithm can be found in Blimes17.The MOSG algorithm is a“soft”clustering technique because each data vector is fractionally assigned to multiple clusters.In contrast,the data assignment in the k-means algorithm is considered “hard”(i.e.,each data vector is assigned to only one cluster).International Journal of Reliability,Quality and Safety Engineering 5Algorithm:Mixture-Of-Spherical Gaussians clusteringInput:A set of N data vectors X ={x 1,...,x N },model structureΛ={µk ,σk ,αk }k =1,...,K ,where µ’s and σ’s are the parameters for Gaussianmodels and α’s are prior parameters that are subject to αk ≥0,∀k and k αk=1.Output:Trained model parameters Λthat maximizes the data likelihoodP (X |Λ)= n k αk p (x n |λk ),and a partition of the data vectors given bythe cluster identity vector Y ={y 1,...,y N },y n ∈{1,...,K }.Steps:1.Initialization:initialize the model parameters Λ;2.E-step:the posterior probability of model k ,given a data vector x n andcurrent model parameters Λ,is estimated asP (k |x n ,Λ)=αk p (x n |λk ) jαj p (x n |λj ),where the pdf p (x |λ)is given byp (x n |λk )=1(√2πσ)d exp − x n −µk 2σ2k ;3.M-step:the maximum likelihood re-estimation of model parameters Λis givenby µ(new )k = n P (k |x n ,Λ)x n nP (k |x n ,Λ),σ(new )k =1dn P (k |x n ,Λ) x n −µk 2 n P (k |x n ,Λ),and α(new )k =1N nP (k |x n ,Λ);4.Stop if P (X |Λ)converges,otherwise go back to Step 2a;5.For each data vector x n ,set y n =arg max k(αk p (x n |λk )).Figure 2:Mixture-Of-Spherical Gaussians clustering algorithm.6Clustering-based Network Intrusion Detection2.3.Self-Organizing Map(SOM)Self-organizing map10is a competitive learning technique that can extract structural information from data and provide low-dimensional(1,2,or3-D)visualization through a topological map.Each cluster has afixed coordinate in the topologicalmap.Let the map location of cluster k beφk;Kα(φ1,φ2)=exp− φ1−φ2 22α2be aneighborhood function;and y n=arg min y x n−µy 2.The batch SOM algorithm amounts to iterating between the following two steps:P(y|x n)=Kα(φy,φyn)yKα(φy ,φyn),andµy=xP(y|x)xxP(y|x),whereαis a parameter controlling the width of the neighborhood function and decreases gradually during the clustering process.Note that theαparameter has the same functionality of a temperature parameter in an annealing process.A unique feature of SOM is that the calculation of P(y|x)is constrained by a topological map structure,which gives SOM the advantage that all resulting clusters are structurally related according to the user-specified topological map (which is good for visualization).However,SOM is usually not as good as k-means or Neural-Gas(discussed next)in terms of minimizing the mse function(1).2.4.Neural-GasThe(batch-version)Neural-Gas algorithm differs from the SOM clustering,only in how P(y|x)is computed,i.e.,P(y|x)=e−r(x,y)/βye−r(x,y )/β,whereβis an equivalent temperature parameter and r(x,y)is a rank function that takes the value k−1if y is the k th closest cluster centroid to data vector x.The original Neural-Gas algorithm11was proposed as an online algorithm,in which all cluster centroids are updated each time a data instance x n is given,ac-cording toµy=µy+ξe−r(x n,y)/β(x n−µy).In the online learning process,both the learning rateξand the temperatureβgradually decrease,simulating an annealing procedure.It has been shown that the online version can converge faster andfind better local solutions than clustering with SOM for certain problems.11International Journal of Reliability,Quality and Safety Engineering7 3.Intrusion Detection with ClusteringIn addition to cluster sizes,inter-cluster distances are used in our clustering-based detection process.For the k-means,SOM,and Neural-Gas algorithms,the inter-cluster distance is defined as the Euclidean distance between two cluster centroids. For the MOSG algorithm,it is defined as the Mahalanobis distance between twocluster centroids,18calculated as D(y1,y2)=(1σ21+1σ22) µ1−µ2 2.We use a practical assumption about the intrusion data—the number of normal instances is much larger than that of attack instances.This is usually true in reality.However,unlike in Portnoy et al.4,we do not make the strict hypothetical requirement that the percentage of attacks has to be less than a certain threshold (e.g.,∼1.5%).Based on the assumption that normal instances dominate attack instances,our simple self-labeling heuristic for unsupervised intrusion detection consists of the following steps:•Find the largest cluster,i.e.,the one with the most number of instances,and label it normal.Assume its centroid isµ0.•Sort the remaining clusters in ascending order of the distance from each cluster centroid toµ0.Within a cluster,sort the data instances in the same way(i.e., ascending order of distance from each data instance toµ0).•Select thefirst N1=ηN instances,and label them as normal,whereηis the percentage of normal instances.The parameterηis the(given or estimated) fraction of all data instances as normal ones.By varyingη,we can get a series of accuracy numbers can be used to draw ROC curves.•Label all the other instances as attacks.4.Empirical Investigation4.1.Case study descriptionThe network traffic audit data used in our case study comes from the data supplied as part of the1998DARPA off-line intrusion detection project.The original dataset of about5million records was collected from a controlled experiment in which a real-life military network was intentionally subjected to various attacks at specified time periods.Each record,representing a connection between two network hosts according to some well defined network protocol,is described by41attributes(38continuous or discrete numerical features and three categorical features)such as,duration of connection,number of bytes transferred,number of failed logic attempts,etc.The attributes are of three types:20intrinsic,content-based,and traffic-based.A record was labeled as either normal or one of four intrusion categories:denial of service8Clustering-based Network Intrusion Detection(dos),reconnaissance(probe),remote-to-local(r2l),and user-to-root(u2r).A10% sample consisting of about500,000records obtained from the UCI machine learning data repository was used in our study.The dos attack type accounted for about80%of the data,and consisted mostly of redundant Neptune and Smurf attacks.To reduce such a redundancy and the computational complexity of the problem,the dataset was reduced to109,910 records by selecting only1%of Neptune and1%of Smurf attack types from the dos category.This process is commonly adopted by other researchers.The u2r type was almost negligible.We are interested in anomaly detection via unsuper-vised clustering algorithms;hence,all records labeled as attacks were considered as intrusions,while the remaining were considered as normal.The labels are not used during the clustering process,but are used for evaluating the detection performance of the algorithms.The clustering algorithms used in our comparative study do not directly handle categorical data.The3categorical features,i.e.,protocol type,service type,and connectionflag,in the dataset were converted using the1-of-N encoding scheme, which expanded the categorical features into67dimensions based on the counts for each categorical feature.Thus,the dataset used in our study consisted of109,910 records,each having105feature dimensions.All feature dimensions were scaled to be within[0,1]to avoid potential scale problems.It is worth mentioning here that feature construction(data preprocessing)is an important step in intrusion detection1,19and involves tremendous efforts.However, in this paper we simply use the same set of features that recent papers4,21have used,since our focus is on unsupervised intrusion detection algorithms.4.2.Empirical settingThe k-means and Neural-Gas algorithms are written in C and compiled into mex files which can be run from Matlab.We implemented the MOSG algorithm in Matlab and used the SOM algorithm from the SOM Toolbox for Matlab provided by the Helsinki University of Technology b.Note that the Matlab-coded MOSG and SOM algorithms are relatively efficient due to vectorized programming and active optimization.All experiments are run on a PC with a3.06GHz Pentium-4CPU with1GB DRAM and running Windows XP.For the kmo algorithm,we use a learning rate that followsξm=1.0(0.01/1.0)m NM, where m is the online iteration number(from0to NM,N is the number of in-stances and M the number of batch iterations).For the online Neural-Gas al-gorithm,the learning rate followsξm=0.5(0.005/0.5)m NM,and the temperature followsβm=β0(βf/β0)m NM,whereβ0=K/2(K is the number of clusters)and βf=0.01/M.In order to study the effect of the total number of clusters on the intrusion de-tection results,we performed empirical studies with100and200total number of b Available from http://www.cis.hut.fi/projects/somtoolbox/.International Journal of Reliability,Quality and Safety Engineering9 clusters.For clustering quality,we use the mean squared error(mse)objective(1) and average purity(ave-pur).The purity of a cluster is defined as the percentage of the most dominated instance category in the cluster,and average purity is the mean over all clusters.Its value can range from0to1,with higher values rep-resenting better average purity.The run time of each algorithm is also recorded and compared.Each experiment is run ten times and the averages and standard deviations of the above measures are reported.For evaluating intrusion detection results,we report false positive rate(fpr), attack detection rate(adr),and overall accuracy.The false positive rate is the percentage of normal instances that are labeled as attacks.The attack detection rate represents the percentage of all attack instances that are detected,i.e.,labeled as attacks.The overall accuracy measures the percentage of all instances that are correctly labeled.We also report ROC curves,by varying the parameterηused in the detection method,to show the tradeoffbetween the false positive rate and the detection rate.In the next two sections,we present two sets of experiments,each designed to demonstrate a different point.Thefirst set is used to compare the algorithms pre-sented in Section2whereas the second to show the situations in which clustering-based intrusion detection methods outperform classification-based techniques(in terms of detection unseen attacks).We also show that clustering methods can be employed to help the performance of classification-based intrusion detection tech-niques.4.3.Experimental Results–IIn this section,we compare the aforementioned clustering algorithms on the whole data set(with109,910instances).Our results are promising based on a network traf-fic audit dataset with approximately110K-instances,of which around11.5%were attack instances.The proposed self-labeling heuristic(withη=11.5%)achieved an overall accuracy of93.6%,a false positive rate of3.6%,and a detection rate of 72%.It is logical that these numbers are not comparable to the accuracy that can be achieved by a supervised classifier since unsupervised intrusion detection tries to learn attacks without any labeled data.Detailed comparisons are presented below.The mse,average purity,and run time results for the clustering algorithms with 100clusters and200clusters,are shown in Table1and2,respectively.A standard deviation of0.0in the table signifies a very small(<0.001)number.The mse results are not indicated for the MOSG algorithm,because it optimizes a different objective(maximizing data likelihood as seen in Fig.2).The kmo and Neural-Gas algorithms perform significantly better(p<5%)than the others in terms of mse and average purity,but kmo achieves the same high quality with much less run paring the results for100clusters and those for200clusters,we observe that the k-means and Neural-Gas algorithms scale linearly with the number of clusters whereas the SOM algorithm does sub-linearly and the MOSG algorithm super-linearly.Although the batch k-means and SOM10Clustering-based Network Intrusion Detectionalgorithms are computationally efficient,they do not generate coherent clusters like the other algorithms,as indicated by mse and purity measures.The kmo algorithm seems to be a desirable choice,with high clustering quality and relatively low time complexity.Table1:Summary of clustering results with100clusters.mse ave-pur time(seconds)k-means0.15±0.030.93±0.0178.6±14.6kmo0.06±0.00.964±0.0249.7±9.6SOM0.28±0.00.932±0.0124.8±1.3Neural-Gas0.05±0.00.962±0.0031481.9±204.5MOSG0.958±0.006366.7±8.0Table2:Summary of clustering results with200clusters.mse ave-pur time(seconds)k-means0.11±0.010.932±0.01155.1±22.8kmo0.04±0.00.977±0.004363.6±19.0SOM0.14±0.00.956±0.0147.5±1.7Neural-Gas0.03±0.00.970±0.0032524.9±214.2MOSG0.963±0.003923.5±31.8 Since our aim is to detect network intrusion using clustering algorithms,we now analyze the unsupervised intrusion detection ing the simple self-labeling heuristic presented in Section3,we sort clusters according to their possibility of being normal in decreasing order and arrange data instances in a cluster in the same way.The possibility of being normal is measured by the distance to the centroid of the largest cluster.ROC curves can be constructed by dividing the sorted data instances into normal and intrusive categories at a series of cutting points.Fig.3(a)and(b)show the ROC curves for the kmo,SOM,and Neural-Gas al-gorithms,with100clusters and200clusters,respectively.The curve for the batch k-means and MOSG algorithms are omitted for comprehensibility and better visual-ization,particularly because they are visibly worse than the other three algorithms. It can be seen that for100clusters,the SOM algorithm is the worst and the k-means and Neural-Gas algorithms work equally well for most of the false positive rates.In contrast,for200clusters,all three algorithms perform comparably most of the time and the SOM algorithm clusters performs extremely well at very low false positive rates,e.g.,it can detect more than50%attacks with a false positive rate of almost0.Overall,the kmo and Neural-Gas algorithms seem to be the better ones and stable across different number of clusters.We now discuss the accuracy results at one cutting point from the sorted list of clusters.Suppose the approximate percentage of attack instances is known a priori or from heuristics,we split the sorted cluster list at a point that generates the desiredInternational Journal of Reliability,Quality and Safety Engineering11Figure3:ROC curves for kmo,SOM,and Neural-Gas,with(a)100clusters and(b)200 clusters.12Clustering-based Network Intrusion Detectionpercentage.In this paper,we group the clusters as normal or intrusive in such a way that the number of data instances in attack clusters account for about11.5%of the total population,reflecting the assumed distribution of the training data.We run each experiment10times and report the average and standard deviation for overall accuracy,false positive rate,and attack detection rate,in Tables3and4.The kmo and Neural-Gas algorithms again perform better than others,generating low fpr values and high overall accuracies;the performance difference to other algorithms are significant(p<5%)according to paired t-tests.Table3:Detection accuracy results with100clusters.accuracy(%)fpr(%)adr(%)k-means92.6±0.74.7±0.772.1±2.7kmo93.7±0.03.6±0.072.7±0.0SOM92.4±0.05.0±0.072.2±0.0Neural-Gas93.5±0.13.7±0.172.0±0.1MOSG91.5±1.05.9±1.071.4±3.0Table4:Detection accuracy results with200clusters.accuracy(%)fpr(%)adr(%)k-means93.1±0.34.2±0.372.8±0.7kmo93.6±0.03.6±0.072.1±0.0SOM93.1±0.04.3±0.072.9±0.0Neural-Gas93.6±0.13.6±0.172.5±0.1MOSG92.7±0.94.6±0.971.8±1.44.4.Experimental Results–IINow we present results to verify our hypothesis that clustering-based methods have an edge over classification techniques in identifying new or unseen attack types.The classification model to be compared is the state-of-the-art support vector machine method.We used the svm-light software package available online.c Default settings in the package are used.We divided the109,190data instances into two parts—a training set and a test set.The training set is formed by randomly picking half of all dos attack instances and half of all normal instances.The rest goes into the test set.Therefore, the test set contains new attack types(probe,r2l,and u2r)that are not seen in the training set.The SVM algorithm is trained using the training set and then evaluated on the test set.An ROC curve can be obtained since the SVM algorithm outputs a continuous numerical score that indicates the possibility of being normal (or intrusive)and can be used to order data instances.The kmo algorithm(picked according to our studies in the previous section)is applied directly to the test set.c /People/tj/svm light/。

相关文档
最新文档