Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00034
Qing-xian Zhao
Choosing a more scientific evaluation system can evaluate the cultural construction of an enterprise reasonably. With the development of science and technology, the integration of computers in all fields of various industries is inseparable. Computer algorithms play an irreplaceable role in building various models. Mining and metallurgical enterprises have their own particularities. It is of theoretical and practical value to construct a system that can comprehensively evaluate mining and metallurgy culture through the processing of computer algorithms. Therefore, based on the characteristics of mining and metallurgy culture, this paper takes the corporate culture construction of China Pingmei Shenma Group as the research object and conducts a comprehensive evaluation. After comprehensive evaluation, two conclusions are drawn: one is that the cultural construction of the enterprise is relatively good; the other is that the spherical network structure model is verified to be feasible in the evaluation of cultural enterprise.
{"title":"Comprehensive evaluation and analysis of the culture of mining and metallurgy enterprises by combining the spherical network structure model constructed by the calculation algorithm","authors":"Qing-xian Zhao","doi":"10.1109/ITCA52113.2020.00034","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00034","url":null,"abstract":"Choosing a more scientific evaluation system can evaluate the cultural construction of an enterprise reasonably. With the development of science and technology, the integration of computers in all fields of various industries is inseparable. Computer algorithms play an irreplaceable role in building various models. Mining and metallurgical enterprises have their own particularities. It is of theoretical and practical value to construct a system that can comprehensively evaluate mining and metallurgy culture through the processing of computer algorithms. Therefore, based on the characteristics of mining and metallurgy culture, this paper takes the corporate culture construction of China Pingmei Shenma Group as the research object and conducts a comprehensive evaluation. After comprehensive evaluation, two conclusions are drawn: one is that the cultural construction of the enterprise is relatively good; the other is that the spherical network structure model is verified to be feasible in the evaluation of cultural enterprise.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00022
Dong Liu, Ang Chen, Juanjuan Wu
The future trend prediction of time series represented by stock price has always been a key research topic in the field of data science. The rapid development of deep learning makes the analysis and prediction of time series enter a new stage. Deep learning algorithm represented by deep neural network can effectively overcome the shortcomings of traditional time series analysis methods. This paper first introduces the principle and structure of the recurrent neural network (RNN) model in the deep neural network. In view of the problem that the gradient vanishes easily and cannot effectively analyze the long sequence data, this paper introduces the gating structure to improve the hidden layer of the RNN, so as to construct the long short-term memory (LSTM) neural network model. In this paper, the LSTM neural network model is applied to the stock price prediction, and the prediction results are compared with the RNN model. The experimental results show that the error value of the LSTM neural network model is smaller than that of the RNN model, and has better prediction effect. Therefore, the LSTM neural network model is more suitable for the prediction of stock price.
{"title":"Research on Stock Price Prediction Method Based on Deep Learning","authors":"Dong Liu, Ang Chen, Juanjuan Wu","doi":"10.1109/ITCA52113.2020.00022","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00022","url":null,"abstract":"The future trend prediction of time series represented by stock price has always been a key research topic in the field of data science. The rapid development of deep learning makes the analysis and prediction of time series enter a new stage. Deep learning algorithm represented by deep neural network can effectively overcome the shortcomings of traditional time series analysis methods. This paper first introduces the principle and structure of the recurrent neural network (RNN) model in the deep neural network. In view of the problem that the gradient vanishes easily and cannot effectively analyze the long sequence data, this paper introduces the gating structure to improve the hidden layer of the RNN, so as to construct the long short-term memory (LSTM) neural network model. In this paper, the LSTM neural network model is applied to the stock price prediction, and the prediction results are compared with the RNN model. The experimental results show that the error value of the LSTM neural network model is smaller than that of the RNN model, and has better prediction effect. Therefore, the LSTM neural network model is more suitable for the prediction of stock price.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00049
Guanlin Liu
Surface defect detection techniques based on deep learning have been widely used in various industrial scenarios. This paper reviews the latest works on deep learning-based surface defect detection methods. They are classified into three categories: full-supervised learning model method, unsupervised learning model method, and other methods. The typical methods are further subdivided and compared. The advantages and disadvantages of these methods and their application scenarios are summarized. This paper analyzes three key issues in surface defect detection and introduces common data sets for industrial surface defects. Finally, the future development trend of surface defect detection is predicted.
{"title":"Surface Defect Detection Methods Based on Deep Learning: a Brief Review","authors":"Guanlin Liu","doi":"10.1109/ITCA52113.2020.00049","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00049","url":null,"abstract":"Surface defect detection techniques based on deep learning have been widely used in various industrial scenarios. This paper reviews the latest works on deep learning-based surface defect detection methods. They are classified into three categories: full-supervised learning model method, unsupervised learning model method, and other methods. The typical methods are further subdivided and compared. The advantages and disadvantages of these methods and their application scenarios are summarized. This paper analyzes three key issues in surface defect detection and introduces common data sets for industrial surface defects. Finally, the future development trend of surface defect detection is predicted.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"120 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00081
Qihan Wang, Mingliang Li, J. Pang, Dixia Zhu
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in turn affects the running speed. In the past ten years, there have been many optimization methods of sparse matrix vector multiplication based on different ideas and techniques. In this paper, the commonly used performance optimization techniques of sparse matrix vector multiplication in multi/many-core architecture are comprehensively investigated. We classify technical methods according to their common characteristics, and discuss the problems encountered by researchers of various methods. In addition, We provide a typical large sparse matrix set for testing. This paper also provides a theoretical basis for our subsequent sparse matrix calculation in Sunway TaihuLight archiecture.
{"title":"Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture","authors":"Qihan Wang, Mingliang Li, J. Pang, Dixia Zhu","doi":"10.1109/ITCA52113.2020.00081","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00081","url":null,"abstract":"Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in turn affects the running speed. In the past ten years, there have been many optimization methods of sparse matrix vector multiplication based on different ideas and techniques. In this paper, the commonly used performance optimization techniques of sparse matrix vector multiplication in multi/many-core architecture are comprehensively investigated. We classify technical methods according to their common characteristics, and discuss the problems encountered by researchers of various methods. In addition, We provide a typical large sparse matrix set for testing. This paper also provides a theoretical basis for our subsequent sparse matrix calculation in Sunway TaihuLight archiecture.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"22 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115574119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cell proliferation level is important in clinical diagnosis. Analysis of cell proliferation level can help to judge the development trend of patient's condition, which is helpful for diagnosis. In order to evaluate the level of cell proliferation, it is necessary to calculate the number and proportion of proliferating nuclei. However, when the number of nuclei is large, it will bring a great pressure on doctors, and the accuracy rate will also decline. To solve these problems, this paper proposes a scheme for automatic detection and counting of cell nuclei, which is large in number and densely distributed. Our dataset is obtained from mouse liver cells, a total of 136 samples, each containing 100-300 nuclei and the proliferation of nuclei are stained by immunohistochemical staining, of which 120 are trained using convolution neural network and 16 samples are tested to evaluate the effects of the models. Three models were trained by RetinaNet with backbone networks of Vgg6, ResNet50 and ResNet101 respectively, and compared with Image Pro Plus 6.0. Experiments show that our models achieve higher accuracy compared with 67.2% obtained by manual using Image-Pro Plus 6.0 for detection and counting. It can be seen that in terms of detection accuracy, our models are better than the analysis software widely used in hospitals, effectively solving the problems of long manual detection time and low accuracy. It can effectively help doctors to evaluate the level of cell proliferation, and then quickly make a corresponding diagnosis.
细胞增殖水平对临床诊断具有重要意义。细胞增殖水平的分析有助于判断患者病情的发展趋势,有助于诊断。为了评价细胞的增殖水平,有必要计算增殖细胞核的数量和比例。但是,当细胞核数量较大时,会给医生带来很大的压力,准确率也会下降。针对这些问题,本文提出了一种数量多、分布密的细胞核自动检测与计数方案。我们的数据集来自小鼠肝细胞,共136个样本,每个样本含有100-300个细胞核,并通过免疫组织化学染色对细胞核的增殖进行染色,其中120个样本使用卷积神经网络进行训练,16个样本进行测试以评估模型的效果。用retanet分别以Vgg6、ResNet50和ResNet101骨干网训练3个模型,并与Image Pro Plus 6.0进行比较。实验表明,与使用Image-Pro Plus 6.0手动检测和计数的67.2%相比,我们的模型具有更高的准确率。可以看出,在检测精度方面,我们的模型优于医院广泛使用的分析软件,有效地解决了人工检测时间长、准确率低的问题。它可以有效地帮助医生评估细胞增殖水平,然后快速做出相应的诊断。
{"title":"Cell proliferation detection based on deep learning","authors":"Hao Wang, X. Lv, Guohua Wu, Guodong Lv, Xiangxiang Zheng","doi":"10.1109/ITCA52113.2020.00051","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00051","url":null,"abstract":"Cell proliferation level is important in clinical diagnosis. Analysis of cell proliferation level can help to judge the development trend of patient's condition, which is helpful for diagnosis. In order to evaluate the level of cell proliferation, it is necessary to calculate the number and proportion of proliferating nuclei. However, when the number of nuclei is large, it will bring a great pressure on doctors, and the accuracy rate will also decline. To solve these problems, this paper proposes a scheme for automatic detection and counting of cell nuclei, which is large in number and densely distributed. Our dataset is obtained from mouse liver cells, a total of 136 samples, each containing 100-300 nuclei and the proliferation of nuclei are stained by immunohistochemical staining, of which 120 are trained using convolution neural network and 16 samples are tested to evaluate the effects of the models. Three models were trained by RetinaNet with backbone networks of Vgg6, ResNet50 and ResNet101 respectively, and compared with Image Pro Plus 6.0. Experiments show that our models achieve higher accuracy compared with 67.2% obtained by manual using Image-Pro Plus 6.0 for detection and counting. It can be seen that in terms of detection accuracy, our models are better than the analysis software widely used in hospitals, effectively solving the problems of long manual detection time and low accuracy. It can effectively help doctors to evaluate the level of cell proliferation, and then quickly make a corresponding diagnosis.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/itca52113.2020.00064
Liu Xu
In recent years, the continuous development of wireless communication technology has brought great convenience to people’s work and life. However, due to the openness of the wireless channel, the information is vulnerable to eavesdropping and interference from illegal users in the process of transmission. As usual, the security of information and information is guaranteed by the high-level encryption system, but with the increasing strength of the computing power of computers, the traditional encryption system has not been fully implemented which cannot meet the security requirements of the current wireless communication network. With the development of information technology, satellite communication has been widely used, especially in the military field. However, with the increasingly severe and complex military struggle, higher requirements are put forward for the security and anti-jamming capability of satellite communications. In the satellite communication support and training, we often find that once the polarization angle of the antenna feed module changes, the signal intensity also changes. At the same time, in order to solve the problem that the trust information of both sides of the ship data transmission method is lost in the case of a large amount of data, which leads to the abnormal security of data transmission, this paper studies the application of network security encryption technology in warship data transmission. Through the chaotic map transformation to update the key value in the register, the wheel key component is obtained. Then based on which the network transmission encryption algorithm is designed, the encryption of each data transmission is realized through iterative calculation. And the secure communication protocol of data transmission is designed at the same time. The information of both parties is exchanged before transmission, the two-way identity authentication is realized, and the ship data is transmitted after the authentication is completed. The polarization characteristic of the signal has a good performance in the nonlinear response of the device, the alleviation of the shortage of spectrum resources, anti-interference and so on.
{"title":"Secure Transmission Strategy of Network Communication layer Relay based on Satellite Transmission","authors":"Liu Xu","doi":"10.1109/itca52113.2020.00064","DOIUrl":"https://doi.org/10.1109/itca52113.2020.00064","url":null,"abstract":"In recent years, the continuous development of wireless communication technology has brought great convenience to people’s work and life. However, due to the openness of the wireless channel, the information is vulnerable to eavesdropping and interference from illegal users in the process of transmission. As usual, the security of information and information is guaranteed by the high-level encryption system, but with the increasing strength of the computing power of computers, the traditional encryption system has not been fully implemented which cannot meet the security requirements of the current wireless communication network. With the development of information technology, satellite communication has been widely used, especially in the military field. However, with the increasingly severe and complex military struggle, higher requirements are put forward for the security and anti-jamming capability of satellite communications. In the satellite communication support and training, we often find that once the polarization angle of the antenna feed module changes, the signal intensity also changes. At the same time, in order to solve the problem that the trust information of both sides of the ship data transmission method is lost in the case of a large amount of data, which leads to the abnormal security of data transmission, this paper studies the application of network security encryption technology in warship data transmission. Through the chaotic map transformation to update the key value in the register, the wheel key component is obtained. Then based on which the network transmission encryption algorithm is designed, the encryption of each data transmission is realized through iterative calculation. And the secure communication protocol of data transmission is designed at the same time. The information of both parties is exchanged before transmission, the two-way identity authentication is realized, and the ship data is transmitted after the authentication is completed. The polarization characteristic of the signal has a good performance in the nonlinear response of the device, the alleviation of the shortage of spectrum resources, anti-interference and so on.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00087
Haiping Ren, Yongjun Xie
In this paper, a X-band waveguide circulator operating at 11 to 13 GHz is designed. The parameters of the circulator are optimized by HFSS (high-frequency electromagnetic simulation software). Isolation is a key indicator of the circulator. The simulation results show that the isolation of the circulator in the working frequency band is greater than 30dB, and the relative bandwidth exceeds 16%. In addition, the voltage standing wave ratios of the three ports are all less than 1.1. Therefore, the circulator presented in this paper can provide a reference scheme for the design of high isolation circulator.
{"title":"Simulation design of an X-band high isolation circulator","authors":"Haiping Ren, Yongjun Xie","doi":"10.1109/ITCA52113.2020.00087","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00087","url":null,"abstract":"In this paper, a X-band waveguide circulator operating at 11 to 13 GHz is designed. The parameters of the circulator are optimized by HFSS (high-frequency electromagnetic simulation software). Isolation is a key indicator of the circulator. The simulation results show that the isolation of the circulator in the working frequency band is greater than 30dB, and the relative bandwidth exceeds 16%. In addition, the voltage standing wave ratios of the three ports are all less than 1.1. Therefore, the circulator presented in this paper can provide a reference scheme for the design of high isolation circulator.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DC circuit breaker is one of the alternatives for clearing DC faults in flexible DC power grids, and its cost is closely related to its volume and its breaking current. In this paper, starting from the level of reducing the breaking fault current of the DC circuit breaker (DCCB), a dual adaptive controller suitable for MMC fault current limiting and rapid system recovery is designed. By adjusting the reference value of the MMC DC voltage and the capacitor voltage of the bridge arm sub-module, the development speed of the fault current can be automatically limited, and the system recovery after the fault can be accelerated. The design method and structure of the dual adaptive controller are introduced, and the mechanism of action is theoretically analyzed.
{"title":"Control of DC Grid for Fault Current Limiting and System Fast Recovery","authors":"Shu Zhang, Hanchen Li, Huajing Li, Huadong Li, Wanli Zhang, Yingbei Fang","doi":"10.1109/ITCA52113.2020.00076","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00076","url":null,"abstract":"DC circuit breaker is one of the alternatives for clearing DC faults in flexible DC power grids, and its cost is closely related to its volume and its breaking current. In this paper, starting from the level of reducing the breaking fault current of the DC circuit breaker (DCCB), a dual adaptive controller suitable for MMC fault current limiting and rapid system recovery is designed. By adjusting the reference value of the MMC DC voltage and the capacitor voltage of the bridge arm sub-module, the development speed of the fault current can be automatically limited, and the system recovery after the fault can be accelerated. The design method and structure of the dual adaptive controller are introduced, and the mechanism of action is theoretically analyzed.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121380270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00056
Yuanming Ding, Yu Zhao, Ran Zhang
With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite network still lacks effective means of routing security protection. In order to solve this problem, combining with the characteristics of limited energy and computing capacity of micro-nano satellite nodes, this research proposes a secure routing algorithm based on trust value. First, the trust value of the computing node is synthesized, and then the routing path is generated by combining the trust value of the node with the AODV routing algorithm. Simulation results show that the proposed MNS-AODV routing algorithm can effectively resist the influence of internal malicious nodes on data transmission, and it can reduce the packet loss rate and average energy consumption.
{"title":"A Secure Routing Algorithm Based on Trust Value for Micro-nano Satellite Network","authors":"Yuanming Ding, Yu Zhao, Ran Zhang","doi":"10.1109/ITCA52113.2020.00056","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00056","url":null,"abstract":"With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite network still lacks effective means of routing security protection. In order to solve this problem, combining with the characteristics of limited energy and computing capacity of micro-nano satellite nodes, this research proposes a secure routing algorithm based on trust value. First, the trust value of the computing node is synthesized, and then the routing path is generated by combining the trust value of the node with the AODV routing algorithm. Simulation results show that the proposed MNS-AODV routing algorithm can effectively resist the influence of internal malicious nodes on data transmission, and it can reduce the packet loss rate and average energy consumption.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00092
Wu Dan, Li Yin, Wang Yeying, Wang Rui, Fan Chen, Zhang Zhongyang, Hu Dongdong, Guo Liang
This article authorizes all relevant participants to join the private blockchain network and form a stakeholder alliance to jointly maintain the operation of the blockchain. It not only ensures the legal compliance of the participants in the transaction system, increases mutual trust between the participants, but also provides an open and collaborative environment, and realizes the benign circulation of aerospace industry resources. The data transaction method in this article covers the entire life cycle process of data production and transaction, and uses blockchain technology to ensure data credibility, data security, and transaction traceability. It solves the problems of proof of the value of aerospace test data, data security and network transaction trust, protects the interests of both parties in the transaction, and effectively expands the application scope of aerospace industry resources.
{"title":"Research on aerospace data transaction platform and method based on blockchain","authors":"Wu Dan, Li Yin, Wang Yeying, Wang Rui, Fan Chen, Zhang Zhongyang, Hu Dongdong, Guo Liang","doi":"10.1109/ITCA52113.2020.00092","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00092","url":null,"abstract":"This article authorizes all relevant participants to join the private blockchain network and form a stakeholder alliance to jointly maintain the operation of the blockchain. It not only ensures the legal compliance of the participants in the transaction system, increases mutual trust between the participants, but also provides an open and collaborative environment, and realizes the benign circulation of aerospace industry resources. The data transaction method in this article covers the entire life cycle process of data production and transaction, and uses blockchain technology to ensure data credibility, data security, and transaction traceability. It solves the problems of proof of the value of aerospace test data, data security and network transaction trust, protects the interests of both parties in the transaction, and effectively expands the application scope of aerospace industry resources.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}