The computer vision field is quickly developing, including multiple object tracking, as the big data age approaches. The majority of the effort is focused on tracking methods while less attention is paid to the most important aspect, data. After an analysis of existing datasets, we find that they commonly ignore the breakpoint problem in tracking and have low image quality. Thus we present the dataset named Multiple Object Tracking on Horizontal view (MOT-H). MOT-H is meticulously annotated on crowded scenes from the horizontal view, with the primary goal of proving anti-jamming performance against complicated occlusion or even complete occlusion. The breakpoint issue is emphasized, which means the target object temporarily leaves the scene and returns after a while. The proposed MOT-H dataset has 10 sequences, 20,311 frames, and 337,440 annotation boxes in total, with all pictures having the resolution of 3840 × 2160 and being filmed at 30 frames per second (fps). We establish a fair benchmark for the future object tracking method development. The whole dataset can be found at: https://drive.google.com/drive/folders/1SCUJAdbqXQStyV-F2M9UyGfsuCaxR73a?usp=sharing.
{"title":"MOT-H: A Multi-Target Tracking Dataset Based on Horizontal View","authors":"Bixuan Zhang, Yuefeng Zhang","doi":"10.1145/3569966.3570064","DOIUrl":"https://doi.org/10.1145/3569966.3570064","url":null,"abstract":"The computer vision field is quickly developing, including multiple object tracking, as the big data age approaches. The majority of the effort is focused on tracking methods while less attention is paid to the most important aspect, data. After an analysis of existing datasets, we find that they commonly ignore the breakpoint problem in tracking and have low image quality. Thus we present the dataset named Multiple Object Tracking on Horizontal view (MOT-H). MOT-H is meticulously annotated on crowded scenes from the horizontal view, with the primary goal of proving anti-jamming performance against complicated occlusion or even complete occlusion. The breakpoint issue is emphasized, which means the target object temporarily leaves the scene and returns after a while. The proposed MOT-H dataset has 10 sequences, 20,311 frames, and 337,440 annotation boxes in total, with all pictures having the resolution of 3840 × 2160 and being filmed at 30 frames per second (fps). We establish a fair benchmark for the future object tracking method development. The whole dataset can be found at: https://drive.google.com/drive/folders/1SCUJAdbqXQStyV-F2M9UyGfsuCaxR73a?usp=sharing.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128218311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Migration is an important social phenomenon in the development of human society. Driven by economy, population, geography, policy, and other factors, accurate prediction of migration has always been very difficult. The grey model has the advantages of small sample size, easy calculation, no regularity in sample size, and good prediction precision, so it is very suitable for the prediction of international migration. Based on the correlation and cumulative effect of data sequence, this paper optimizes the initial value conditions of the grey model, and proposes the grey model of heat label. The proposed model is applied to the prediction of international migration from 1970 to 2020, and compared with the traditional grey model and other models, computation results show the model is practical and effective, and has positive theoretical and practical significance for international migration prediction.
{"title":"Forecasting international migrants using grey model with heat label","authors":"Tongzheng Pu, Ming Huang, J. Yang","doi":"10.1145/3569966.3571179","DOIUrl":"https://doi.org/10.1145/3569966.3571179","url":null,"abstract":"Migration is an important social phenomenon in the development of human society. Driven by economy, population, geography, policy, and other factors, accurate prediction of migration has always been very difficult. The grey model has the advantages of small sample size, easy calculation, no regularity in sample size, and good prediction precision, so it is very suitable for the prediction of international migration. Based on the correlation and cumulative effect of data sequence, this paper optimizes the initial value conditions of the grey model, and proposes the grey model of heat label. The proposed model is applied to the prediction of international migration from 1970 to 2020, and compared with the traditional grey model and other models, computation results show the model is practical and effective, and has positive theoretical and practical significance for international migration prediction.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"511 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang-Jui Shen, Yusong Tan, Pian Tao, Pan Dong, Jun Ma
Capability is an important security mechanism in operating systems. The Take-Grant model, as a classic capability system access control model, only has basic rewriting rules to meet the needs of security analysis, but it is difficult to be used for flexible and fine-grained permission propagation. This paper extends the traditional Take-Grant model to control the propagation of capabilities from the direction of propagation, distance and size of propagation, so as to meet the needs of security policies in complex scenarios. Besides, this paper divides permissions to different domains, making the extended model more flexible. The given examples show that the proposed extension to Take-Grant model is more expressive and flexible when doing privilege propagation.
{"title":"Extending Take-Grant Model for More Flexible Privilege Propagation","authors":"Liang-Jui Shen, Yusong Tan, Pian Tao, Pan Dong, Jun Ma","doi":"10.1145/3569966.3570088","DOIUrl":"https://doi.org/10.1145/3569966.3570088","url":null,"abstract":"Capability is an important security mechanism in operating systems. The Take-Grant model, as a classic capability system access control model, only has basic rewriting rules to meet the needs of security analysis, but it is difficult to be used for flexible and fine-grained permission propagation. This paper extends the traditional Take-Grant model to control the propagation of capabilities from the direction of propagation, distance and size of propagation, so as to meet the needs of security policies in complex scenarios. Besides, this paper divides permissions to different domains, making the extended model more flexible. The given examples show that the proposed extension to Take-Grant model is more expressive and flexible when doing privilege propagation.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114365431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the life cycle process of civil aviation airborne software defined by DO-178B/C, software quality assurance process, as one of the comprehensive processes, is an important process that runs through the whole software life cycle process. According to the requirements of DO-178B/C objectives and the experience of software development and development of airworthiness projects, this paper summarizes the engineering implementation methods and key points of software quality assurance process in accordance with the requirements of DO-178B/C objectives, which provides technical guidance for practical engineering practice and provides reference and help for the engineering implementation of civil aviation airborne software quality assurance process.
{"title":"Research on Conformance Engineering process of Airborne Software quality Assurance in Civil Aviation","authors":"Jing Zhao","doi":"10.1145/3569966.3570033","DOIUrl":"https://doi.org/10.1145/3569966.3570033","url":null,"abstract":"In the life cycle process of civil aviation airborne software defined by DO-178B/C, software quality assurance process, as one of the comprehensive processes, is an important process that runs through the whole software life cycle process. According to the requirements of DO-178B/C objectives and the experience of software development and development of airworthiness projects, this paper summarizes the engineering implementation methods and key points of software quality assurance process in accordance with the requirements of DO-178B/C objectives, which provides technical guidance for practical engineering practice and provides reference and help for the engineering implementation of civil aviation airborne software quality assurance process.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Microsoft Power BI is a business analysis tool based on big data. It compiles single view, multi-panel displays for interrogation of data and quick decision-making. With the help of Power Bi software, according to the historical sales amount, this paper uses the rolling forecasting method to determine the sales growth rate and make sales forecasts. On this basis, measures such as ForecastAccuracy, ForecastAccumulation and SalesAccumu-lation are created. By making visual charts in Power Bi, analyze the trend of the accuracy rate of sales forecasts, and compare the cumulative difference between the sales forecasts and the actual sales, so as to help enterprise carry out budget management more scientifically and effectively.
{"title":"Application of Big Data Analysis Based on Power BI in Sales Forecasts","authors":"Yitong Liu, Xi Chen","doi":"10.1145/3569966.3571272","DOIUrl":"https://doi.org/10.1145/3569966.3571272","url":null,"abstract":"Microsoft Power BI is a business analysis tool based on big data. It compiles single view, multi-panel displays for interrogation of data and quick decision-making. With the help of Power Bi software, according to the historical sales amount, this paper uses the rolling forecasting method to determine the sales growth rate and make sales forecasts. On this basis, measures such as ForecastAccuracy, ForecastAccumulation and SalesAccumu-lation are created. By making visual charts in Power Bi, analyze the trend of the accuracy rate of sales forecasts, and compare the cumulative difference between the sales forecasts and the actual sales, so as to help enterprise carry out budget management more scientifically and effectively.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the era of big data and information, it is of great significance to apply big data to the study of tourism spatial development strategies of scenic spots for effective protection and rational utilization of resources. Daxu Ancient Town is a typical representative of Guilin Lijiang River Scenic Area that pays equal attention to history and culture. This paper selects it as the research object, crawls the big data of tourists' travel notes in recent years from Ctrip Travel, uses ROST Content Mining 6 software to conduct text analysis on the data of tourists' travel notes in Daxu Ancient Town, deeply analyzes tourists' image perception of the ancient town from key word frequency, semantic emotion and other aspects, and clarifies the existing problems in the scenic spot, Explore the core resources of scenic tourism, and then put forward suggestions on space protection and development.
{"title":"Research on spatial development strategy of Daxu ancient town scenic spot based on big data analysis","authors":"Shuo Sun","doi":"10.1145/3569966.3570084","DOIUrl":"https://doi.org/10.1145/3569966.3570084","url":null,"abstract":"In the era of big data and information, it is of great significance to apply big data to the study of tourism spatial development strategies of scenic spots for effective protection and rational utilization of resources. Daxu Ancient Town is a typical representative of Guilin Lijiang River Scenic Area that pays equal attention to history and culture. This paper selects it as the research object, crawls the big data of tourists' travel notes in recent years from Ctrip Travel, uses ROST Content Mining 6 software to conduct text analysis on the data of tourists' travel notes in Daxu Ancient Town, deeply analyzes tourists' image perception of the ancient town from key word frequency, semantic emotion and other aspects, and clarifies the existing problems in the scenic spot, Explore the core resources of scenic tourism, and then put forward suggestions on space protection and development.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In part due to climate change, the last few years have been some of the warmest on record and characterized by hot and dry weather. This led to a frequent outbreak of wildfires, especially in already dry areas such as California. Experiments were conducted to evaluate the ability of machine learning models to detect wildfires and map the areas burnt using satellite images. For the detection of wildfires, machine learning models of different complexities are trained to distinguish between images containing wildfires and images containing no wildfires. The tested models achieved consistently training accuracies above 90% and testing accuracies above 70%. HyperOpt was then used to fine tune the models’ hyperparameters to improve their accuracy. For mapping the areas burnt by wildfires referred to for the rest of the paper as wildfire perimeter mapping, a preliminary burn map is produced mathematically from each image. The preliminary map is then refined using an object detection model. The refined burn maps achieved an average accuracy of around 10%. However, in a few cases where the original satellite images have high image quality, the refined burn map that was produced reflected the recorded burn area with above 90% accuracy. In conclusion, machine learning models alongside satellite images have the potential to be used for quick and efficient detection of a wildfire outbreak. With some improvements to the current process, machine learning also has the potential to accurately determine the area burnt by the wildfire at any given time simply using a satellite image - a significant improvement over traditional methods such as hand sketching or GPS walk.
{"title":"Wildfire Detection and Perimeter Mapping using Satellite Imagery and Machine Learning with Hyperopt Tuning","authors":"Haolin Yang","doi":"10.1145/3569966.3570097","DOIUrl":"https://doi.org/10.1145/3569966.3570097","url":null,"abstract":"In part due to climate change, the last few years have been some of the warmest on record and characterized by hot and dry weather. This led to a frequent outbreak of wildfires, especially in already dry areas such as California. Experiments were conducted to evaluate the ability of machine learning models to detect wildfires and map the areas burnt using satellite images. For the detection of wildfires, machine learning models of different complexities are trained to distinguish between images containing wildfires and images containing no wildfires. The tested models achieved consistently training accuracies above 90% and testing accuracies above 70%. HyperOpt was then used to fine tune the models’ hyperparameters to improve their accuracy. For mapping the areas burnt by wildfires referred to for the rest of the paper as wildfire perimeter mapping, a preliminary burn map is produced mathematically from each image. The preliminary map is then refined using an object detection model. The refined burn maps achieved an average accuracy of around 10%. However, in a few cases where the original satellite images have high image quality, the refined burn map that was produced reflected the recorded burn area with above 90% accuracy. In conclusion, machine learning models alongside satellite images have the potential to be used for quick and efficient detection of a wildfire outbreak. With some improvements to the current process, machine learning also has the potential to accurately determine the area burnt by the wildfire at any given time simply using a satellite image - a significant improvement over traditional methods such as hand sketching or GPS walk.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The importance of SCADA systems within the power grid is currently increasing due to the increased complexity of the grid. Thus, these systems may contain various security vulnerabilities, the exploitation of which may lead to large-scale blackouts. Therefore, the emphasis is nowadays on cyber security. One tool for automated testing and detection of hard-to-detect vulnerabilities such as buffer overflow and others is fuzzing. This paper discusses the fuzzing testing capabilities of IEC 60870-5-104 protocol which is used by power grid. We present a framework that can be used for automated testing. By using load balancing, high performance of the fuzzing process is achieved. The framework also provides a graphical environment to facilitate continuous testing. The functionality of the framework is demonstrated on a demonstration server into which a buffer overflow vulnerability was inserted, which was detected by the fuzzing framework.
{"title":"Fuzzing Framework for IEC 60870-5-104 Protocol","authors":"Petr Ilgner, R. Fujdiak","doi":"10.1145/3569966.3570026","DOIUrl":"https://doi.org/10.1145/3569966.3570026","url":null,"abstract":"The importance of SCADA systems within the power grid is currently increasing due to the increased complexity of the grid. Thus, these systems may contain various security vulnerabilities, the exploitation of which may lead to large-scale blackouts. Therefore, the emphasis is nowadays on cyber security. One tool for automated testing and detection of hard-to-detect vulnerabilities such as buffer overflow and others is fuzzing. This paper discusses the fuzzing testing capabilities of IEC 60870-5-104 protocol which is used by power grid. We present a framework that can be used for automated testing. By using load balancing, high performance of the fuzzing process is achieved. The framework also provides a graphical environment to facilitate continuous testing. The functionality of the framework is demonstrated on a demonstration server into which a buffer overflow vulnerability was inserted, which was detected by the fuzzing framework.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the cloud environment, application elastic scaling is very important. The number of copies can be dynamically adjusted according to load. A good elastic scaling scheme can not only ensure the stability of application, but also improve resource utilization of platform. The existing responsive scaling strategy of Kubernetes platform has many problems, which can not meet requirements of web system for service quality. This paper optimizes the default elastic scaling scheme in Kubernetes cluster, and proposes a container dynamic scaling scheme LP-HPA (load predict horizon pod autoscaling) based on load prediction. This scheme uses LSTM-GRU model to predict the application load, comprehensively considers predicted data and current data, realizes dynamic scaling of container, and ensures the service quality of application. Finally, by building Kubernetes cluster, this paper uses open source data set to verify the LP-HPA scheme. Experimental results show that our proposed scheme is better than Kubernetes' default scaling scheme in three scenarios: load rise, load drop and load jitter.
在云环境中,应用程序的弹性扩展非常重要。副本数量可以根据负载动态调整。良好的弹性缩放方案不仅可以保证应用的稳定性,还可以提高平台的资源利用率。现有的Kubernetes平台响应式扩展策略存在许多问题,不能满足web系统对服务质量的要求。本文对Kubernetes集群默认弹性扩展方案进行了优化,提出了一种基于负载预测的容器动态扩展方案LP-HPA (load prediction horizon pod autoscaling)。该方案采用LSTM-GRU模型预测应用负载,综合考虑预测数据和当前数据,实现容器的动态扩展,保证应用的服务质量。最后,通过构建Kubernetes集群,利用开源数据集对LP-HPA方案进行验证。实验结果表明,本文提出的方案在负载上升、负载下降和负载抖动三种场景下都优于Kubernetes的默认扩展方案。
{"title":"LP-HPA:Load Predict-Horizontal Pod Autoscaler for Container Elastic Scaling","authors":"Yifei Xu, Kai Qiao, Chaoyong Wang, Li Zhu","doi":"10.1145/3569966.3570115","DOIUrl":"https://doi.org/10.1145/3569966.3570115","url":null,"abstract":"In the cloud environment, application elastic scaling is very important. The number of copies can be dynamically adjusted according to load. A good elastic scaling scheme can not only ensure the stability of application, but also improve resource utilization of platform. The existing responsive scaling strategy of Kubernetes platform has many problems, which can not meet requirements of web system for service quality. This paper optimizes the default elastic scaling scheme in Kubernetes cluster, and proposes a container dynamic scaling scheme LP-HPA (load predict horizon pod autoscaling) based on load prediction. This scheme uses LSTM-GRU model to predict the application load, comprehensively considers predicted data and current data, realizes dynamic scaling of container, and ensures the service quality of application. Finally, by building Kubernetes cluster, this paper uses open source data set to verify the LP-HPA scheme. Experimental results show that our proposed scheme is better than Kubernetes' default scaling scheme in three scenarios: load rise, load drop and load jitter.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chronic Disease Medication Data (CDMD) includes a great number of valuable patients’ information collected from smart pillboxes. CDMD sharing in the Chronic Disease Medication Compliance Management System is helpful to improve the medical level and service. Blockchain provides a new way to solve the problems, e.g., privacy security, user control rights, and single point of failure, in data sharing. In this paper, we propose a secure CDMD sharing method in a decentralized way based on blockchain and cryptography technology to realize secure data sharing among entities by a model of ’on-chain deposition to confirm rights, off-chain storage of transmission data’. This method can enable secure sharing of medication administration data between institutions, avoiding the trustless problem caused by data centralization.
{"title":"A Chronic Disease Medication Data Sharing Model Based on Blockchain","authors":"Xiameng Si, Boyu Liu, Bobai Zhao","doi":"10.1145/3569966.3569973","DOIUrl":"https://doi.org/10.1145/3569966.3569973","url":null,"abstract":"Chronic Disease Medication Data (CDMD) includes a great number of valuable patients’ information collected from smart pillboxes. CDMD sharing in the Chronic Disease Medication Compliance Management System is helpful to improve the medical level and service. Blockchain provides a new way to solve the problems, e.g., privacy security, user control rights, and single point of failure, in data sharing. In this paper, we propose a secure CDMD sharing method in a decentralized way based on blockchain and cryptography technology to realize secure data sharing among entities by a model of ’on-chain deposition to confirm rights, off-chain storage of transmission data’. This method can enable secure sharing of medication administration data between institutions, avoiding the trustless problem caused by data centralization.","PeriodicalId":145580,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Software Engineering","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}