Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8998050
Qin Haifeng, Hou Xing-ming, Jia Junhua, Wu Delong, Y. Hongbo, Liu Bo
In the field of equipment maintenance support, information technology presents some characteristics. The first is integration of command information system function. The second is intelligent of support equipment and technical means. The third is integration of information technology of military and civilian. To promote the informatization construction of equipment maintenance support, we need to scientifically formulate the development plan for the application of information technology in the field of equipment maintenance support, strengthen the construction of the security capability of the equipment maintenance support information system, and strengthen the risk management of the supply chain of equipment and facilities in the field of equipment maintenance support.
{"title":"Influence of High and New Information Technology on Informationization Construction of Military Equipment Maintenance Support","authors":"Qin Haifeng, Hou Xing-ming, Jia Junhua, Wu Delong, Y. Hongbo, Liu Bo","doi":"10.1109/IAEAC47372.2019.8998050","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8998050","url":null,"abstract":"In the field of equipment maintenance support, information technology presents some characteristics. The first is integration of command information system function. The second is intelligent of support equipment and technical means. The third is integration of information technology of military and civilian. To promote the informatization construction of equipment maintenance support, we need to scientifically formulate the development plan for the application of information technology in the field of equipment maintenance support, strengthen the construction of the security capability of the equipment maintenance support information system, and strengthen the risk management of the supply chain of equipment and facilities in the field of equipment maintenance support.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8998012
Wei Wang, Wenfeng Wang, Erqi Ding
Targeting the problem of the redundancy in complex product quality characteristics, the Adaptive-Lasso method is introduced into the identification of Critical-to-quality Characteristic. By using the Adaptive-Lasso method to filter variables, reduce the dimensions of the original quality data sample set, and obtain the order of the correlation between the quality Characteristics in the sample set and the quality category, the quality Characteristics with the highest classification correct ratio are selected to form the Critical-to-quality Characteristic subset. On this basis, the classification correct ratio of the selected Characteristic subset is tested by using the support vector machine. The example shows that compared with the traditional ReliefF method and Lasso method, this method can effectively remove the irrelevant and redundant features in the original data set to achieve the purpose of identifying the Critical-to-quality Characteristic.
{"title":"Identification of Critical-to-quality Characteristic in Complex Products Based on the Adaptive-Lasso Method","authors":"Wei Wang, Wenfeng Wang, Erqi Ding","doi":"10.1109/IAEAC47372.2019.8998012","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8998012","url":null,"abstract":"Targeting the problem of the redundancy in complex product quality characteristics, the Adaptive-Lasso method is introduced into the identification of Critical-to-quality Characteristic. By using the Adaptive-Lasso method to filter variables, reduce the dimensions of the original quality data sample set, and obtain the order of the correlation between the quality Characteristics in the sample set and the quality category, the quality Characteristics with the highest classification correct ratio are selected to form the Critical-to-quality Characteristic subset. On this basis, the classification correct ratio of the selected Characteristic subset is tested by using the support vector machine. The example shows that compared with the traditional ReliefF method and Lasso method, this method can effectively remove the irrelevant and redundant features in the original data set to achieve the purpose of identifying the Critical-to-quality Characteristic.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8997591
Pang Zhihao, Chen Ying
The way that information propagates in neural networks is of great importance. In this paper, we propose a connectivity pattern: dense connection, aiming to solve object detection algorithm YOLO-Tiny with less convolutional layers, low feature utilization rate, low precision and poor detection of small objects. We integrate dense connection into YOLO-Tiny, increasing its convolutional layers and improving the feature extraction network. Improved network extracts feature maps and fuses the feature maps by using the Dense Block module. Detection network completes the classification and location at different scales with different anchor boxes. We tested improved network on the Pascal VOC dataset. The experimental results show that our network has improved accuracy by 15% compared with the original algorithm. Although the detection speed has increased, it can still meet the requirements of real-time detection. Compared with the YOLO-Tiny model, our model size only increases by 9.8. MB, compared to the YOLO model, the model size is about 1/5 of the original.
{"title":"Object Detection Algorithm based on Dense Connection","authors":"Pang Zhihao, Chen Ying","doi":"10.1109/IAEAC47372.2019.8997591","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997591","url":null,"abstract":"The way that information propagates in neural networks is of great importance. In this paper, we propose a connectivity pattern: dense connection, aiming to solve object detection algorithm YOLO-Tiny with less convolutional layers, low feature utilization rate, low precision and poor detection of small objects. We integrate dense connection into YOLO-Tiny, increasing its convolutional layers and improving the feature extraction network. Improved network extracts feature maps and fuses the feature maps by using the Dense Block module. Detection network completes the classification and location at different scales with different anchor boxes. We tested improved network on the Pascal VOC dataset. The experimental results show that our network has improved accuracy by 15% compared with the original algorithm. Although the detection speed has increased, it can still meet the requirements of real-time detection. Compared with the YOLO-Tiny model, our model size only increases by 9.8. MB, compared to the YOLO model, the model size is about 1/5 of the original.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8997667
Zuo Baishun, Zhu Wei, Li Feng, Zhu Jia
At present, Tactical Internet has become an important part of the new generation mobile communication support system in the battlefield of our army. Network planning is the core link of the organization and application of Tactical Internet equipment. It is not only an important guarantee to achieve efficient and smooth command ,but also an urgent problem to be solved when mobile communication equipment is equipped with troops. Therefore, paper attempts to introduce artificial intelligence technology to design a scientific and reasonable experimental evaluation method. Developing the test appraisal and evaluation activities based on intelligent Emergency Communication Network planning and an attempt is made to explore the technical approach of artificial intelligence test appraisal and evaluation under the current military intelligence prospects.
{"title":"Test Evaluation of Emergency Communication Network Planning Based on Intelligence","authors":"Zuo Baishun, Zhu Wei, Li Feng, Zhu Jia","doi":"10.1109/IAEAC47372.2019.8997667","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997667","url":null,"abstract":"At present, Tactical Internet has become an important part of the new generation mobile communication support system in the battlefield of our army. Network planning is the core link of the organization and application of Tactical Internet equipment. It is not only an important guarantee to achieve efficient and smooth command ,but also an urgent problem to be solved when mobile communication equipment is equipped with troops. Therefore, paper attempts to introduce artificial intelligence technology to design a scientific and reasonable experimental evaluation method. Developing the test appraisal and evaluation activities based on intelligent Emergency Communication Network planning and an attempt is made to explore the technical approach of artificial intelligence test appraisal and evaluation under the current military intelligence prospects.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the architecture of data exchange and service platform for Internet of Things(IOT) is studied. The architecture mainly includes Data Exchange Platform, Data Service Platform, Device Adaptation Module and Application Adaptation Module. The architecture is mainly used to solve the problems of data interchange and data protocol compatibility between systems and systems, systems and devices, which occurs in the process of access and integration of IOT devices and systems. Thus, it can realize fast and efficient access to IOT devices, as well as unified and standardized support for access systems.
{"title":"Architecture Design of Data Exchange and Service Platform for Internet of Things","authors":"Tian Xuguang, Zhang Chengming, Tian Xiao-tao, Zhong Yan, Wang Kun, Zhou Xiaoyu","doi":"10.1109/IAEAC47372.2019.8997648","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997648","url":null,"abstract":"In this paper, the architecture of data exchange and service platform for Internet of Things(IOT) is studied. The architecture mainly includes Data Exchange Platform, Data Service Platform, Device Adaptation Module and Application Adaptation Module. The architecture is mainly used to solve the problems of data interchange and data protocol compatibility between systems and systems, systems and devices, which occurs in the process of access and integration of IOT devices and systems. Thus, it can realize fast and efficient access to IOT devices, as well as unified and standardized support for access systems.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8997595
Na Chen, Shuangshuang Shuai, B. Yan
In this paper, we propose a novel scheme for deterministic hierarchical joint remote state preparation (HJRSP). Two senders and three receivers are involved. One sender has the amplitude information of the target state to be prepared at the receiver's port, while the other one has the phase information. There is a hierarchy among the receivers concerning their powers to reconstruct the target state. 6-particle partially entangled state is used as the quantum channel. Participants perform projective measurements under elaborate measurement bases. According to their measurement results, the receiver reconstructs the target state by means of appropriate unitary operation. The higher-power receiver reconstructs the target state independently, and the lower-power receiver reconstructs the target state if and only if all the other receivers help him (her). Different from the previous HJRSP scheme utilizing partially entangled channels, auxiliary qubit is not required in our scheme, and unit success probability can be achieved. It is shown that the success probability is independent of the parameters of the partially entangled quantum channel.
{"title":"Deterministic hierarchical joint remote state preparation using partially entangled quantum channel","authors":"Na Chen, Shuangshuang Shuai, B. Yan","doi":"10.1109/IAEAC47372.2019.8997595","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997595","url":null,"abstract":"In this paper, we propose a novel scheme for deterministic hierarchical joint remote state preparation (HJRSP). Two senders and three receivers are involved. One sender has the amplitude information of the target state to be prepared at the receiver's port, while the other one has the phase information. There is a hierarchy among the receivers concerning their powers to reconstruct the target state. 6-particle partially entangled state is used as the quantum channel. Participants perform projective measurements under elaborate measurement bases. According to their measurement results, the receiver reconstructs the target state by means of appropriate unitary operation. The higher-power receiver reconstructs the target state independently, and the lower-power receiver reconstructs the target state if and only if all the other receivers help him (her). Different from the previous HJRSP scheme utilizing partially entangled channels, auxiliary qubit is not required in our scheme, and unit success probability can be achieved. It is shown that the success probability is independent of the parameters of the partially entangled quantum channel.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8997797
Xiaozheng Wang
The government in the era of big data requires safer infrastructure, information storage and data application. As a result, security threats will be the bottleneck for e-government development. Based on the e-government hierarchy model, this thesis focuses on such information security threats as human effects, network technology defects and management deficiency facing the e-government system in the era of big data. On this basis, three solutions are put forward to improve e-government information security system. Firstly, enhance information security awareness and improve network technology of information management departments in the government; secondly, conduct proper information encryption by ensuring information confidentiality and identity authentication; thirdly, implement strict information management through isolation between intranet and extranet and united planning of e-government information management.
{"title":"Study on E-government Information Security in the Era of Big Data","authors":"Xiaozheng Wang","doi":"10.1109/IAEAC47372.2019.8997797","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997797","url":null,"abstract":"The government in the era of big data requires safer infrastructure, information storage and data application. As a result, security threats will be the bottleneck for e-government development. Based on the e-government hierarchy model, this thesis focuses on such information security threats as human effects, network technology defects and management deficiency facing the e-government system in the era of big data. On this basis, three solutions are put forward to improve e-government information security system. Firstly, enhance information security awareness and improve network technology of information management departments in the government; secondly, conduct proper information encryption by ensuring information confidentiality and identity authentication; thirdly, implement strict information management through isolation between intranet and extranet and united planning of e-government information management.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8998052
Rui Liu, X. Zong, Wenyu Yi, Yiming Liu
This paper is concerned with the application of linear hyperbolic system equations in oil pipelines. In order to overcome the shortcomings of practical measurement difficulties and facilitate the application, a linear hyperbolic boundary observer is constructed. This hyperbolic boundary observer can directly apply the relevant knowledge of control theory. Then the feasibility of the observer is proved by the error system and the original system satisfying the exponential convergence by MacCormack’ method. Emphasis on the application of MacCormack algorithm in linear hyperbolic equations and the correctness of the theory is consequently verified by numerical simulation.
{"title":"Application of Boundary Observer for Linear Hyperbolic Systems in Oil Pipeline based on MacCormack’ Method","authors":"Rui Liu, X. Zong, Wenyu Yi, Yiming Liu","doi":"10.1109/IAEAC47372.2019.8998052","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8998052","url":null,"abstract":"This paper is concerned with the application of linear hyperbolic system equations in oil pipelines. In order to overcome the shortcomings of practical measurement difficulties and facilitate the application, a linear hyperbolic boundary observer is constructed. This hyperbolic boundary observer can directly apply the relevant knowledge of control theory. Then the feasibility of the observer is proved by the error system and the original system satisfying the exponential convergence by MacCormack’ method. Emphasis on the application of MacCormack algorithm in linear hyperbolic equations and the correctness of the theory is consequently verified by numerical simulation.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8997669
Changan Kou, Xiaobin Tang, Kang Shao, Jiangling Liu
With the gradual entry of high-power microwave weapons into the battlefield, the accurate evaluation of high-power microwave interference effects has increasingly important practical significance. Firstly, a radar simulation system based on nonlinear RF front-end is established. The interference effect of high-power microwave on radar nonlinear RF front-end and pulse compression processing module is analyzed. It is concluded that whether the interference signal covers the echo signal in the time domain is the main factor of the interference. Secondly, the same-frequency interference signal with different parameters is injected into the system together with the target echo signal to calculate the target detection probability of the radar system under the disturbed state. Based on the probability evaluation criterion and the least squares method, the data is analyzed, and the mathematical model of the interference pulse repetition interval and the radar target detection probability is fitted. The results show that when the power is large enough, the pulse repetition interval of the interference signal and the target detection probability constitute a power function relationship, and the function parameters are linearly related to the interference signal pulse width. When the pulse repetition interval of the high-power microwave and the radar transmission signal reaches a certain ratio, effective interference can be achieved. Under the same duty cycle, the interference effect of the interference signal with high pulse repetition rate is obviously stronger than that of the high pulse width. The suppression of high-power microwaves can significantly reduce the radar detection performance. The model can be used to optimize the interference pulse design and the prediction and evaluation of interference effects.
{"title":"High power microwave interference effect of radar system","authors":"Changan Kou, Xiaobin Tang, Kang Shao, Jiangling Liu","doi":"10.1109/IAEAC47372.2019.8997669","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997669","url":null,"abstract":"With the gradual entry of high-power microwave weapons into the battlefield, the accurate evaluation of high-power microwave interference effects has increasingly important practical significance. Firstly, a radar simulation system based on nonlinear RF front-end is established. The interference effect of high-power microwave on radar nonlinear RF front-end and pulse compression processing module is analyzed. It is concluded that whether the interference signal covers the echo signal in the time domain is the main factor of the interference. Secondly, the same-frequency interference signal with different parameters is injected into the system together with the target echo signal to calculate the target detection probability of the radar system under the disturbed state. Based on the probability evaluation criterion and the least squares method, the data is analyzed, and the mathematical model of the interference pulse repetition interval and the radar target detection probability is fitted. The results show that when the power is large enough, the pulse repetition interval of the interference signal and the target detection probability constitute a power function relationship, and the function parameters are linearly related to the interference signal pulse width. When the pulse repetition interval of the high-power microwave and the radar transmission signal reaches a certain ratio, effective interference can be achieved. Under the same duty cycle, the interference effect of the interference signal with high pulse repetition rate is obviously stronger than that of the high pulse width. The suppression of high-power microwaves can significantly reduce the radar detection performance. The model can be used to optimize the interference pulse design and the prediction and evaluation of interference effects.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/IAEAC47372.2019.8997879
Junlei Guo, Deqiang Yang, Xin Yang, Boning Wang
An ultra-wide band (UWB) slot antenna with a compact size is proposed for positioning application in this paper. The miniaturization characteristic of the antenna is obtained by folding the radiation patch. And the slots etched on the patch are optimized to improve the impedance bandwidth. This presented antenna with the dimension of 15× 20 mm2 and has an operation bandwidth of 3.10 GHz-5.74 GHz (59.7%). Finally, the positioning performance of the antenna was measured in the UWB positioning system and a positioning accuracy of 4 cm is obtained.
{"title":"A Compact Slot Antenna for UWB Positioning Application","authors":"Junlei Guo, Deqiang Yang, Xin Yang, Boning Wang","doi":"10.1109/IAEAC47372.2019.8997879","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997879","url":null,"abstract":"An ultra-wide band (UWB) slot antenna with a compact size is proposed for positioning application in this paper. The miniaturization characteristic of the antenna is obtained by folding the radiation patch. And the slots etched on the patch are optimized to improve the impedance bandwidth. This presented antenna with the dimension of 15× 20 mm2 and has an operation bandwidth of 3.10 GHz-5.74 GHz (59.7%). Finally, the positioning performance of the antenna was measured in the UWB positioning system and a positioning accuracy of 4 cm is obtained.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123322249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}