{"created":"2023-05-15T14:44:39.274347+00:00","id":212,"links":{},"metadata":{"_buckets":{"deposit":"671fc955-a926-41e5-8352-cd786280e173"},"_deposit":{"created_by":4,"id":"212","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"212"},"status":"published"},"_oai":{"id":"oai:kitakyushu.repo.nii.ac.jp:00000212","sets":["6:18"]},"author_link":[],"control_number":"212","item_2_biblio_info_12":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2017-01-01","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"44","bibliographicPageStart":"39","bibliographicVolumeNumber":"50","bibliographic_titles":[{"bibliographic_title":"北九州工業高等専門学校研究報告"},{"bibliographic_title":"Research Report of Kitakyushu National College of Technology","bibliographic_titleLang":"en"}]}]},"item_2_identifier_14":{"attribute_name":"URL","attribute_value_mlt":[{"subitem_identifier_type":"URI","subitem_identifier_uri":"http://library.kct.ac.jp/content/files/ResRep50/6E_Isozaki.pdf | http://library.kct.ac.jp/content/files/ResRep50/6E_Isozaki.pdf"}]},"item_2_source_id_1":{"attribute_name":"雑誌書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA12510939","subitem_source_identifier_type":"NCID"}]},"item_2_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"21857598","subitem_source_identifier_type":"ISSN"}]},"item_2_title_3":{"attribute_name":"論文名よみ","attribute_value_mlt":[{"subitem_title":"トラヒック ノ トクチョウ ヲ モチイタ アプリケーション ノ シキベツ シュホウ ノ ケントウ"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"磯崎, 裕臣"},{"creatorName":"イソザキ, ヒロオミ","creatorNameLang":"ja-Kana"}]},{"creatorNames":[{"creatorName":"小川, 千恵"},{"creatorName":"オガワ, チエ","creatorNameLang":"ja-Kana"}]},{"creatorNames":[{"creatorName":"塩月, 宏次朗"},{"creatorName":"シオツキ, コウジロウ","creatorNameLang":"ja-Kana"}]},{"creatorNames":[{"creatorName":"山本, 神瑛"},{"creatorName":"ヤマモト, シンエイ","creatorNameLang":"ja-Kana"}]},{"creatorNames":[{"creatorName":"狩野, 悠貴"},{"creatorName":"カノ, ユウキ","creatorNameLang":"ja-Kana"}]},{"creatorNames":[{"creatorName":"和田, 成紀"},{"creatorName":"ワダ, シゲノリ","creatorNameLang":"ja-Kana"}]},{"creatorNames":[{"creatorName":"ISOZAKI, Hiroomi","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"OGAWA, Chie","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"SHIOTSUKI, Kojiro","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"YAMAMOTO, Shinei","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"KANO, Yuki","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"WADA, Shigenori","creatorNameLang":"en"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2023-10-06"}],"filename":"6_E_(磯崎)p39-44.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","mimetype":"application/pdf","url":{"url":"https://kitakyushu.repo.nii.ac.jp/record/212/files/6_E_(磯崎)p39-44.pdf"},"version_id":"682e49a8-a8c8-439b-9ea3-4c14bb64bbb4"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"トラヒックの特徴を用いたアプリケーションの識別手法の検討","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"トラヒックの特徴を用いたアプリケーションの識別手法の検討","subitem_title_language":"ja"},{"subitem_title":"Identification method of application based on characteristics of traffic","subitem_title_language":"en"}]},"item_type_id":"2","owner":"4","path":["18"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-06-01"},"publish_date":"2017-06-01","publish_status":"0","recid":"212","relation_version_is_last":true,"title":["トラヒックの特徴を用いたアプリケーションの識別手法の検討"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-10-06T02:03:49.861136+00:00"}