Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00059
J. Zhang
From the perspective of jamming FH radio synchronization head, this paper took frequency sweep projectile-carried communication jammer as the research object. The key parameters of the FH radio’s initial synchronization head (including synchronization information hopping speed, synchronization information rate, jamming tolerance of initial synchronization information and so on), signal transmission loss under different conditions, and influence of sweep frequency were analyzed and discussed. The results showed that for the frequency sweep projectile-carried communication jammer, the free space environment should be selected to analyze the effect of jamming the synchronization head of frequency hopping radio, so as to avoid the influence caused by the change of sweep frequency. The conclusion can be used as a reference for further study on the jamming performance of projectile-carried communication jammer for FH radio synchronization head.
{"title":"Discussion on Some Key Problems of Jamming Initial Synchronization Head of Frequency Hopping Radio by Frequency Sweep Projectile-carried Communication Jammer","authors":"J. Zhang","doi":"10.1109/ITCA52113.2020.00059","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00059","url":null,"abstract":"From the perspective of jamming FH radio synchronization head, this paper took frequency sweep projectile-carried communication jammer as the research object. The key parameters of the FH radio’s initial synchronization head (including synchronization information hopping speed, synchronization information rate, jamming tolerance of initial synchronization information and so on), signal transmission loss under different conditions, and influence of sweep frequency were analyzed and discussed. The results showed that for the frequency sweep projectile-carried communication jammer, the free space environment should be selected to analyze the effect of jamming the synchronization head of frequency hopping radio, so as to avoid the influence caused by the change of sweep frequency. The conclusion can be used as a reference for further study on the jamming performance of projectile-carried communication jammer for FH radio synchronization head.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115210399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00101
Qi Wang
The existence of functional interation between coupled layers in multiple systems makes interdependent networks more vulnerable to cascading failures. To mitigate cascade propagation, prior researches focus on node or link protection with simplex and familiar centrality, leading to the neglected impact of different centrality on the decision to protected node selection. In this paper, we tackle the node protection problem from resource-oriented approach. Firstly, we regard various node importance centrality as multiple criteria, and propose a novel multiple-attribute decision making-based node protection strategy to choose which node is needed for protection. The automatic updating function of judgment matrix is realized. Furthermore, we apply five heuristic resource allocation methods with proposed strategy to optimize the robustness of interdependent networks. Simulation results perform the allocation pattern for the protected node with our strategy and validate its effectiveness.
{"title":"Multiple-Attribute Decision Making-based Optimization of Robustness against Cascading Failures in Interdependent network","authors":"Qi Wang","doi":"10.1109/ITCA52113.2020.00101","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00101","url":null,"abstract":"The existence of functional interation between coupled layers in multiple systems makes interdependent networks more vulnerable to cascading failures. To mitigate cascade propagation, prior researches focus on node or link protection with simplex and familiar centrality, leading to the neglected impact of different centrality on the decision to protected node selection. In this paper, we tackle the node protection problem from resource-oriented approach. Firstly, we regard various node importance centrality as multiple criteria, and propose a novel multiple-attribute decision making-based node protection strategy to choose which node is needed for protection. The automatic updating function of judgment matrix is realized. Furthermore, we apply five heuristic resource allocation methods with proposed strategy to optimize the robustness of interdependent networks. Simulation results perform the allocation pattern for the protected node with our strategy and validate its effectiveness.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00144
Jinglu Si, Yunfei Xiao
With the development of information technology, light emitting diode (LED) display screen is widely used in many fields of production and life, such as bus stop reporting, road condition indicator board, building lighting, traffic signal light and KTV music wall. The frequency domain analysis of signal provides a new analysis method for studying the function and characteristics of signal, which is widely used in scientific research and production practice. The emergence of DSP chip and fast Fourier transform (FFT) algorithm provide a unified, economic and monolithic solution for signal frequency domain analysis. Taking the music signal as an example, this paper designs a set of music spectrum display based on LED lattice, so that people can have a more in-depth understanding of the time-domain and frequency-domain representation of the audio signal. In this design, STC12C5A60S2 is used as the processing chip, combined with audio input, sampling, FFT algorithm, A/D conversion, LED display and other functional modules, based on hardware design and software design as the core, to complete the LED display of audio signal spectrum. Through the system function test, the system runs stably, can display the spectrum and its changes of music signal accurately in real time, and meets the expected design requirements.
{"title":"Design of Music Spectrum Display Based on LED","authors":"Jinglu Si, Yunfei Xiao","doi":"10.1109/ITCA52113.2020.00144","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00144","url":null,"abstract":"With the development of information technology, light emitting diode (LED) display screen is widely used in many fields of production and life, such as bus stop reporting, road condition indicator board, building lighting, traffic signal light and KTV music wall. The frequency domain analysis of signal provides a new analysis method for studying the function and characteristics of signal, which is widely used in scientific research and production practice. The emergence of DSP chip and fast Fourier transform (FFT) algorithm provide a unified, economic and monolithic solution for signal frequency domain analysis. Taking the music signal as an example, this paper designs a set of music spectrum display based on LED lattice, so that people can have a more in-depth understanding of the time-domain and frequency-domain representation of the audio signal. In this design, STC12C5A60S2 is used as the processing chip, combined with audio input, sampling, FFT algorithm, A/D conversion, LED display and other functional modules, based on hardware design and software design as the core, to complete the LED display of audio signal spectrum. Through the system function test, the system runs stably, can display the spectrum and its changes of music signal accurately in real time, and meets the expected design requirements.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00126
C. Song, Bin Wu
Rough set theory, based on its advantages of calculating index weights without relying on prior knowledge, is introduced into the methods of the attack effect of network. However, classical rough set theory has some shortcomings that can't handle incomplete datasets, and the lack of data will affect the accuracy of evaluation. Usually, the method of deleting the missing parts is adopted in the relevant assessment process, which is easy to cause data waste. This paper presents a method of the attack effect of network based on the combination of rough set theory and KNN interpolation algorithm. Through the KNN interpolation algorithm, the incomplete dataset is complemented, so that the processing error of the rough set can be reduced as much as possible. The experimental results show that the proposed evaluation method has better accuracy and objectivity.
{"title":"Evaluation Method of the Attack Effect of Network Based on Rough Set and KNN","authors":"C. Song, Bin Wu","doi":"10.1109/ITCA52113.2020.00126","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00126","url":null,"abstract":"Rough set theory, based on its advantages of calculating index weights without relying on prior knowledge, is introduced into the methods of the attack effect of network. However, classical rough set theory has some shortcomings that can't handle incomplete datasets, and the lack of data will affect the accuracy of evaluation. Usually, the method of deleting the missing parts is adopted in the relevant assessment process, which is easy to cause data waste. This paper presents a method of the attack effect of network based on the combination of rough set theory and KNN interpolation algorithm. Through the KNN interpolation algorithm, the incomplete dataset is complemented, so that the processing error of the rough set can be reduced as much as possible. The experimental results show that the proposed evaluation method has better accuracy and objectivity.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00157
Wei Chu, Pengwei Zhang
Aiming at the problem that obstacle avoidance algorithms do not distinguish the types of obstacles in the process of obstacle recognition and avoidance, this paper designs a robot obstacle avoidance system including knowledge base by combining prior knowledge with obstacle avoidance algorithm. The knowledge in the knowledge base can be defined by human as prior knowledge to classify obstacles. This makes it possible for the robot to identify obstacles according to the vision sensor in the obstacle avoidance process, and can choose different obstacle avoidance strategies for different obstacles according to the existing knowledge in the knowledge base. The knowledge base takes knowrob as the platform, and the experimental results show that the obstacle avoidance system can effectively avoid obstacles.
{"title":"Dynamic obstacle avoidance of vision sensor mobile robot based on prior knowledge","authors":"Wei Chu, Pengwei Zhang","doi":"10.1109/ITCA52113.2020.00157","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00157","url":null,"abstract":"Aiming at the problem that obstacle avoidance algorithms do not distinguish the types of obstacles in the process of obstacle recognition and avoidance, this paper designs a robot obstacle avoidance system including knowledge base by combining prior knowledge with obstacle avoidance algorithm. The knowledge in the knowledge base can be defined by human as prior knowledge to classify obstacles. This makes it possible for the robot to identify obstacles according to the vision sensor in the obstacle avoidance process, and can choose different obstacle avoidance strategies for different obstacles according to the existing knowledge in the knowledge base. The knowledge base takes knowrob as the platform, and the experimental results show that the obstacle avoidance system can effectively avoid obstacles.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126816977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00010
Zumin Wang, Boxiao Yu, Bingnan Pei, Lei Zhang
This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algorithm is combined with the time stamp in the process of key expansion to encrypt the data in the data link layer. At the same time of dynamic updating and synchronization of the key, the extraction and synchronization of timestamp are released. When sending broadcast packets, timestamp is used to generate time-related key to realize the security update and synchronization of the key. Simulation results show that, compared with other traditional algorithms, this scheme is more suitable for solving the potential threat from source node to destination node.
{"title":"Research on AES encryption algorithm based on timestamp in Wireless Sensor Networks","authors":"Zumin Wang, Boxiao Yu, Bingnan Pei, Lei Zhang","doi":"10.1109/ITCA52113.2020.00010","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00010","url":null,"abstract":"This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algorithm is combined with the time stamp in the process of key expansion to encrypt the data in the data link layer. At the same time of dynamic updating and synchronization of the key, the extraction and synchronization of timestamp are released. When sending broadcast packets, timestamp is used to generate time-related key to realize the security update and synchronization of the key. Simulation results show that, compared with other traditional algorithms, this scheme is more suitable for solving the potential threat from source node to destination node.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today’s era is an information age as well as a data age, which provides conditions for the reform and development of education. With the substantial increase in the number of school students, student performance and other data show an explosive growth trend, we now urgently need to use technology to promote teaching progress. In the era of big data, this paper applies Apriori algorithm to practice, analyzes students' performance and draws conclusions, facilitates educational management, scientifically arrange courses, improves students' learning efficiency and achieves teaching objectives.
{"title":"Application of Student achievement Analysis based on Apriori Algorithm","authors":"Huang Hui, Tang Ming-jie, Zeng Qing-tao, Zhang Xiao-liang","doi":"10.1109/ITCA52113.2020.00011","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00011","url":null,"abstract":"Today’s era is an information age as well as a data age, which provides conditions for the reform and development of education. With the substantial increase in the number of school students, student performance and other data show an explosive growth trend, we now urgently need to use technology to promote teaching progress. In the era of big data, this paper applies Apriori algorithm to practice, analyzes students' performance and draws conclusions, facilitates educational management, scientifically arrange courses, improves students' learning efficiency and achieves teaching objectives.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00151
Cheng Liang, S. Lijun
The traditional formation pressure calculation mostly uses the system identification method of empirical formula and fitting formula. It can not get satisfactory identification results. In this paper, neural network is applied to system identification. A neural network identification model and improved error back propagation algorithm are researched. It is applied to the formation pressure prediction of injection production system. The process of system identification is the process of directly learning the input and output data of the system. The experimental results show that the neural network is effective in system identification.
{"title":"Research on Formation Pressure Prediction Based on Neural Network System Identification Theory","authors":"Cheng Liang, S. Lijun","doi":"10.1109/ITCA52113.2020.00151","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00151","url":null,"abstract":"The traditional formation pressure calculation mostly uses the system identification method of empirical formula and fitting formula. It can not get satisfactory identification results. In this paper, neural network is applied to system identification. A neural network identification model and improved error back propagation algorithm are researched. It is applied to the formation pressure prediction of injection production system. The process of system identification is the process of directly learning the input and output data of the system. The experimental results show that the neural network is effective in system identification.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00154
Yaofu Cao, Xiaomeng Li, Shulin Zhang, Yang Li, Liang Chen, Yunrui He
The current network security situation of the electric power dispatching and control system is becoming more and more severe. On the basis of the original network security management platform, to increase the collection of network security data information and improve the network security analysis ability, this article proposes the electric power dispatching and control system network security situation awareness analysis module. The perception layer accesses multi-source heterogeneous data sources. Upwards through the top layer, data standardization will be introduced, who realizes data support for security situation analysis, and forms an association mapping with situation awareness elements such as health situation, attack situation, behavior situation, and operation situation. The overall effect is achieving the construction goals of "full control of equipment status, source of security attacks can be traced, operational risks are identifiable, and abnormal behaviors can be found."
{"title":"Design of network security situation awareness analysis module for electric power dispatching and control system","authors":"Yaofu Cao, Xiaomeng Li, Shulin Zhang, Yang Li, Liang Chen, Yunrui He","doi":"10.1109/ITCA52113.2020.00154","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00154","url":null,"abstract":"The current network security situation of the electric power dispatching and control system is becoming more and more severe. On the basis of the original network security management platform, to increase the collection of network security data information and improve the network security analysis ability, this article proposes the electric power dispatching and control system network security situation awareness analysis module. The perception layer accesses multi-source heterogeneous data sources. Upwards through the top layer, data standardization will be introduced, who realizes data support for security situation analysis, and forms an association mapping with situation awareness elements such as health situation, attack situation, behavior situation, and operation situation. The overall effect is achieving the construction goals of \"full control of equipment status, source of security attacks can be traced, operational risks are identifiable, and abnormal behaviors can be found.\"","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"31 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ITCA52113.2020.00023
Guishen Tian, Song Meng, Xuejiao Bai, Lijuan Liu, Y. Zhi, Binbin Zhao, Luo Meng
The monitoring and auditing of the construction progress of the transmission line is of great significance to the construction management and smooth acceptance of the project. Its key focus includes the number of completed transmission towers and the estimation of related consumables. Therefore, focusing on transmission tower detection and wire consumables estimation, this paper preliminarily explores and establishes the technical framework of transmission line construction progress monitoring and auxiliary audit based on satellite remote sensing and deep learning. This paper proposes an improved DRBox (Detector with Rotatable Boxes) model and satellite remote sensing wire consumables estimation model based on high-resolution optical satellite remote sensing image, which are applied in a transmission line section of Mengdong Company. Experiments show that the automatic detection accuracy of transmission towers in this paper is higher than 93.52%, and the average estimation accuracy of wire consumables is about 97.3%. At the same time, it can quickly count the number of transmission line towers built at different times, which improves the monitoring of transmission line construction progress and enhances the efficiency, objectivity and intelligence level of wire consumables audit.
输变电线路施工进度的监测与审计对工程的施工管理和顺利验收具有重要意义。其重点包括完成的输电塔数量和相关消耗品的估计。因此,本文围绕输电塔检测和电线耗材估算,初步探索并建立了基于卫星遥感和深度学习的输电线路建设进度监测与辅助审计的技术框架。本文提出了基于高分辨率光学卫星遥感影像的改进DRBox (Detector with Rotatable Boxes)模型和卫星遥感线材估算模型,并应用于孟东公司某输电线路段。实验表明,本文对输电塔的自动检测精度高于93.52%,对线材耗材的平均估计精度约为97.3%。同时,可以快速统计不同时间建设的输电线路塔的数量,提高了对输电线路建设进度的监控,提高了电线耗材审计的效率、客观性和智能化水平。
{"title":"Research on Monitoring and Auxiliary Audit Strategy of Transmission Line Construction Progress Based on Satellite Remote Sensing and Deep Learning","authors":"Guishen Tian, Song Meng, Xuejiao Bai, Lijuan Liu, Y. Zhi, Binbin Zhao, Luo Meng","doi":"10.1109/ITCA52113.2020.00023","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00023","url":null,"abstract":"The monitoring and auditing of the construction progress of the transmission line is of great significance to the construction management and smooth acceptance of the project. Its key focus includes the number of completed transmission towers and the estimation of related consumables. Therefore, focusing on transmission tower detection and wire consumables estimation, this paper preliminarily explores and establishes the technical framework of transmission line construction progress monitoring and auxiliary audit based on satellite remote sensing and deep learning. This paper proposes an improved DRBox (Detector with Rotatable Boxes) model and satellite remote sensing wire consumables estimation model based on high-resolution optical satellite remote sensing image, which are applied in a transmission line section of Mengdong Company. Experiments show that the automatic detection accuracy of transmission towers in this paper is higher than 93.52%, and the average estimation accuracy of wire consumables is about 97.3%. At the same time, it can quickly count the number of transmission line towers built at different times, which improves the monitoring of transmission line construction progress and enhances the efficiency, objectivity and intelligence level of wire consumables audit.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116653695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}