LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the pioneer clustering routing algorithm, the idea of clustering proposed by which provides a good reference for the design of routing algorithm for wireless sensor network. In LEACH algorithm, the selection of cluster head ignores the consideration of node energy, which may lead to the death of cluster head and this will case the failure of data transmitted to sink. Besides, cluster head direct communication with the base station limits the expansion of the network scale. In response to these shortcomings, three strategies to improve the performance of LEACH-based algorithm are discussed in this paper, based on which we propose a low energy consumption high reliable multi-hop routing algorithm LEACH-MB. By improving the selection of cluster heads, introducing a mechanism of backup cluster head and adopting the approach of cluster head multi-hop, the performance of this new algorithm has been significantly improved compared to LEACH. Through the simulation analysis of the algorithm, we can find that this algorithm can prolong the network lifetime and improve the reliability of data transmission, and get a result of throughput increase.
LEACH (Low Energy Adaptive Clustering Hierarchy)是最早的聚类路由算法之一,其提出的聚类思想为无线传感器网络路由算法的设计提供了很好的参考。在LEACH算法中,簇头的选择忽略了对节点能量的考虑,这可能导致簇头死亡,从而导致数据传输到sink失败。此外,集群头与基站直接通信限制了网络规模的扩展。针对这些不足,本文讨论了提高基于leach算法性能的三种策略,在此基础上提出了一种低能耗、高可靠的多跳路由算法LEACH-MB。通过改进簇头选择、引入簇头备份机制和采用簇头多跳方法,该算法的性能比LEACH算法有了明显提高。通过对该算法的仿真分析,可以发现该算法可以延长网络寿命,提高数据传输的可靠性,并获得吞吐量增加的结果。
{"title":"Improved Strategies of LEACH-based Low Energy Consumption and High Reliable Multi-hop Routing Algorithm for Wireless Sensor Network","authors":"Lubin Guo, Jiayan Liu, Peng Qin, Xiongwen Zhao, Huiyuan Ma, Zhongjun Chi","doi":"10.1109/ICCC51575.2020.9345136","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345136","url":null,"abstract":"LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the pioneer clustering routing algorithm, the idea of clustering proposed by which provides a good reference for the design of routing algorithm for wireless sensor network. In LEACH algorithm, the selection of cluster head ignores the consideration of node energy, which may lead to the death of cluster head and this will case the failure of data transmitted to sink. Besides, cluster head direct communication with the base station limits the expansion of the network scale. In response to these shortcomings, three strategies to improve the performance of LEACH-based algorithm are discussed in this paper, based on which we propose a low energy consumption high reliable multi-hop routing algorithm LEACH-MB. By improving the selection of cluster heads, introducing a mechanism of backup cluster head and adopting the approach of cluster head multi-hop, the performance of this new algorithm has been significantly improved compared to LEACH. Through the simulation analysis of the algorithm, we can find that this algorithm can prolong the network lifetime and improve the reliability of data transmission, and get a result of throughput increase.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345097
Xiang Wu, Hao Wu
Mobile users need to consider the credibility of nodes to ensure their privacy when building a P2P network. Therefore, how to perform node trust management is an urgent problem to be solved. This paper proposes a trust management method that combines incentive mechanisms and punishment measures, introduces time-sensitive functions, integrates hash chains, and builds a mobile user trust evaluation model.
{"title":"Trust Management of Mobile Users P2P Nodes Based on Blockchain","authors":"Xiang Wu, Hao Wu","doi":"10.1109/ICCC51575.2020.9345097","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345097","url":null,"abstract":"Mobile users need to consider the credibility of nodes to ensure their privacy when building a P2P network. Therefore, how to perform node trust management is an urgent problem to be solved. This paper proposes a trust management method that combines incentive mechanisms and punishment measures, introduces time-sensitive functions, integrates hash chains, and builds a mobile user trust evaluation model.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132723089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9344904
Mingsheng Gao, Pengfei Wei, Yuxiang Liu
Path planning is the fundamental aspect of applications for autonomous Unmanned Aerial Vehicles (UAVs) system. It allows UAV to find an optimal path relevant to some specific missions within limited time, especially in large sized scenarios. In this paper, a novel competitive self-organizing neural network algorithm is proposed to improve the search ability and speed up the convergence of traditional algorithms. More specifically, in the initialization phase, a new opposition-based learning is adopted to generate better neurons. Next, a secondary competitive layer is added above the hidden layer, thus enhancing accuracy of the algorithm. Simulations validate the proposed algorithm outperforms some intelligence algorithms in terms of optimization ability.
{"title":"Competitive Self-Organizing Neural Network Based UAV Path Planning","authors":"Mingsheng Gao, Pengfei Wei, Yuxiang Liu","doi":"10.1109/ICCC51575.2020.9344904","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344904","url":null,"abstract":"Path planning is the fundamental aspect of applications for autonomous Unmanned Aerial Vehicles (UAVs) system. It allows UAV to find an optimal path relevant to some specific missions within limited time, especially in large sized scenarios. In this paper, a novel competitive self-organizing neural network algorithm is proposed to improve the search ability and speed up the convergence of traditional algorithms. More specifically, in the initialization phase, a new opposition-based learning is adopted to generate better neurons. Next, a secondary competitive layer is added above the hidden layer, thus enhancing accuracy of the algorithm. Simulations validate the proposed algorithm outperforms some intelligence algorithms in terms of optimization ability.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133202294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345182
Liang Liu, Song Wang, Ting Cai, Weixin Zhao
Spatio-temporal trajectory data cover a wide area, have high real-time performance, which can not only reflect the timing change of road traffic but also reflect the travel rules of residents. However, due to the lack of effective methods, it is difficult for analysts to conduct in-depth analysis and extract valuable information. To help users to understand the situation of urban traffic congestion, explore the social behavior pattern, this paper proposed and implemented a novel interactive visual analysis system, Visual Analyzer for Bus Data (VABD). Visual analysis of spatio-temporal trajectory data is introduced into “intelligent transportation” to provide new ideas and data support for solving urban congestion problems. A case study based on urban bus data of Mianyang proves the effectiveness of the system.
{"title":"VABD: Visual Analysis of Spatio-temporal Trajectory Based on Urban Bus Data","authors":"Liang Liu, Song Wang, Ting Cai, Weixin Zhao","doi":"10.1109/ICCC51575.2020.9345182","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345182","url":null,"abstract":"Spatio-temporal trajectory data cover a wide area, have high real-time performance, which can not only reflect the timing change of road traffic but also reflect the travel rules of residents. However, due to the lack of effective methods, it is difficult for analysts to conduct in-depth analysis and extract valuable information. To help users to understand the situation of urban traffic congestion, explore the social behavior pattern, this paper proposed and implemented a novel interactive visual analysis system, Visual Analyzer for Bus Data (VABD). Visual analysis of spatio-temporal trajectory data is introduced into “intelligent transportation” to provide new ideas and data support for solving urban congestion problems. A case study based on urban bus data of Mianyang proves the effectiveness of the system.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345212
Jingang Yu, Peipei Zhao, Shu Li, Haiting Wang
The current flow and trading of data has been a trend, but the current enthusiasm for data trading is not high. Due to the particularity of data and the current trading pattern of data, the ability of data trading platform to retain trading data has become a potential threat to both sides of the transaction and an obstacle to data trading. Due to the sensitivity of data, how to protect the privacy security of both sides of the transaction is also an important factor hindering the current data transaction. In response to the existing problems, this paper proposes a feasibility plan for data security transactions based on blockchain and in an untrusted environment, and designs a new decentralized transaction platform that will help transform data through online transactions. At the same time, it is technically guaranteed that the platform does not have the possibility of viewing, copying and detaining data, thereby ensuring the secure transaction of data and the privacy of both parties to the transaction.
{"title":"Distributed Data Trading Model Based on Blockchain","authors":"Jingang Yu, Peipei Zhao, Shu Li, Haiting Wang","doi":"10.1109/ICCC51575.2020.9345212","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345212","url":null,"abstract":"The current flow and trading of data has been a trend, but the current enthusiasm for data trading is not high. Due to the particularity of data and the current trading pattern of data, the ability of data trading platform to retain trading data has become a potential threat to both sides of the transaction and an obstacle to data trading. Due to the sensitivity of data, how to protect the privacy security of both sides of the transaction is also an important factor hindering the current data transaction. In response to the existing problems, this paper proposes a feasibility plan for data security transactions based on blockchain and in an untrusted environment, and designs a new decentralized transaction platform that will help transform data through online transactions. At the same time, it is technically guaranteed that the platform does not have the possibility of viewing, copying and detaining data, thereby ensuring the secure transaction of data and the privacy of both parties to the transaction.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345113
Wenge Xing, Yuan Yao, Guang-xin Wu, Xinxin Liu, Jun Zhu
Radar communication integration seems promising to meet multiple mission requirements, reduce the number of antennas, and improve the utilization of spectrum resources. However, proper system design is required to obtain these advantages. In this paper, we propose a radar communication framework which allows radar and communication to share aperture, beamforming, spectrum, and resource scheduling. Moreover, a burst communication waveform is proposed to overcome the impact of saturated power amplifiers and improve performance. Moreover, we develop a radar communication test system. Test results validate the feasibility and effect of our proposed radar communication framework. Besides, in the test radar communication integration system, over-the-horizon scattering communications have been realized.
{"title":"System Design and Performance Test for Phased Array Radar Communication","authors":"Wenge Xing, Yuan Yao, Guang-xin Wu, Xinxin Liu, Jun Zhu","doi":"10.1109/ICCC51575.2020.9345113","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345113","url":null,"abstract":"Radar communication integration seems promising to meet multiple mission requirements, reduce the number of antennas, and improve the utilization of spectrum resources. However, proper system design is required to obtain these advantages. In this paper, we propose a radar communication framework which allows radar and communication to share aperture, beamforming, spectrum, and resource scheduling. Moreover, a burst communication waveform is proposed to overcome the impact of saturated power amplifiers and improve performance. Moreover, we develop a radar communication test system. Test results validate the feasibility and effect of our proposed radar communication framework. Besides, in the test radar communication integration system, over-the-horizon scattering communications have been realized.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9344900
Bo Li, Yuqing Zhou, Hui Ren
Nowadays, most image automatic descriptions are based on objective descriptions and not contain subjective emotions. However, when people observe images, they will have certain subjective feelings. This paper proposes an image emotion description system based on attention mechanism, which automatically generates captions with sentiments. In the encoding stage, we use CNN to extract image features. In the decoding description phase, we use two same direction parallel LSTMs‐ — one represents factual descriptions; another specializes in descriptions with emotion. When attention mechanism detects different regions of the image, whether emotional words need to be output is selected by a switching mechanism. This system makes the image description more vivid and ensures the accuracy of the description.
{"title":"Image Emotion Caption Based on Visual Attention Mechanisms","authors":"Bo Li, Yuqing Zhou, Hui Ren","doi":"10.1109/ICCC51575.2020.9344900","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344900","url":null,"abstract":"Nowadays, most image automatic descriptions are based on objective descriptions and not contain subjective emotions. However, when people observe images, they will have certain subjective feelings. This paper proposes an image emotion description system based on attention mechanism, which automatically generates captions with sentiments. In the encoding stage, we use CNN to extract image features. In the decoding description phase, we use two same direction parallel LSTMs‐ — one represents factual descriptions; another specializes in descriptions with emotion. When attention mechanism detects different regions of the image, whether emotional words need to be output is selected by a switching mechanism. This system makes the image description more vivid and ensures the accuracy of the description.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345261
Z. Yang, Chen Chen Kong
Aiming at the problem of vehicle partial occlusion in the road monitoring image, the idea of vehicle partial occlusion completion based on depth learning is proposed. Using the characteristics that the appearance of the vehicle is basically unchanged in a short period of time, the same vehicle image that is not occluded in the same equipment or adjacent monitoring video is found, and the image information is extracted to complete the occluded vehicle image. This method mainly involves two key technologies, one is vehicle recognition technology, the other is image smoothing technology. In this paper, based on the mature vehicle recognition technology and image smoothing technology, some improvements are made to effectively solve the technical problems such as occluded vehicle recognition, image smoothing with angle adjustment and so on.
{"title":"A Video Based Method of Occlusion Vehicle Completion","authors":"Z. Yang, Chen Chen Kong","doi":"10.1109/ICCC51575.2020.9345261","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345261","url":null,"abstract":"Aiming at the problem of vehicle partial occlusion in the road monitoring image, the idea of vehicle partial occlusion completion based on depth learning is proposed. Using the characteristics that the appearance of the vehicle is basically unchanged in a short period of time, the same vehicle image that is not occluded in the same equipment or adjacent monitoring video is found, and the image information is extracted to complete the occluded vehicle image. This method mainly involves two key technologies, one is vehicle recognition technology, the other is image smoothing technology. In this paper, based on the mature vehicle recognition technology and image smoothing technology, some improvements are made to effectively solve the technical problems such as occluded vehicle recognition, image smoothing with angle adjustment and so on.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345031
Qian Wang, Feng Zhang, J. Zhao, Zhe Li
In the receiving link of time and frequency hopping communication system, it is necessary to search multiple frequency points and time intervals according to a variety of time-frequency patterns at the same time, then complete blind data acquisition and effective information extraction. A large amount of data storage is required. This paper calculates and explains the data storage amount and storage speed of a certain time and frequency hopping communication system, compares and analyzes the advantages and disadvantages of the three storage methods and the applicable scenarios. Finally, the data storage method based on HBM2 in Stratix series FPGA is introduced in detail, and the practical application in the time and frequency hopping communication system verifies the storage speed and storage capacity of the method whether meets the system requirements.
{"title":"Application of HBM2 Data Storage in Time and Frequency Hopping Network Communication System","authors":"Qian Wang, Feng Zhang, J. Zhao, Zhe Li","doi":"10.1109/ICCC51575.2020.9345031","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345031","url":null,"abstract":"In the receiving link of time and frequency hopping communication system, it is necessary to search multiple frequency points and time intervals according to a variety of time-frequency patterns at the same time, then complete blind data acquisition and effective information extraction. A large amount of data storage is required. This paper calculates and explains the data storage amount and storage speed of a certain time and frequency hopping communication system, compares and analyzes the advantages and disadvantages of the three storage methods and the applicable scenarios. Finally, the data storage method based on HBM2 in Stratix series FPGA is introduced in detail, and the practical application in the time and frequency hopping communication system verifies the storage speed and storage capacity of the method whether meets the system requirements.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/ICCC51575.2020.9345270
Meng Xiao, Hailun Xia, Ziwei Xie, Chunyan Feng
Estimating 3D human poses from a single RGB image is a challenging task in computer vision due to depth ambiguity and lack of unconstrained 3D datasets. Poor exploiting of image cues will lead to inaccurate pose predictions. Previous works try to constrain illegal spatial relations and exploit 2D annotations of in-the-wild images as weak labels. In this paper, we propose to use multi-scale recalibration with stronger geometry constraints to regress 3D pose. The overall network is end-to-end which consists of a 2D pose estimation sub-network and a depth regression subnetwork. Firstly, by adding the residual multi-scale recalibration module to the depth regression sub-network, our approach works better on exploiting the structural information of human poses. Secondly, the advanced geometry constraints are introduced to restrict the human pose from the bone length and joint angle orientation, which shows a better result. Experimental results on the Human3.6m and in-the-wild MPII datasets show the effectiveness and robustness of our method.
{"title":"Multi-scale Recalibration with Advanced Geometry Constraints for 3D Human Pose Estimation","authors":"Meng Xiao, Hailun Xia, Ziwei Xie, Chunyan Feng","doi":"10.1109/ICCC51575.2020.9345270","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345270","url":null,"abstract":"Estimating 3D human poses from a single RGB image is a challenging task in computer vision due to depth ambiguity and lack of unconstrained 3D datasets. Poor exploiting of image cues will lead to inaccurate pose predictions. Previous works try to constrain illegal spatial relations and exploit 2D annotations of in-the-wild images as weak labels. In this paper, we propose to use multi-scale recalibration with stronger geometry constraints to regress 3D pose. The overall network is end-to-end which consists of a 2D pose estimation sub-network and a depth regression subnetwork. Firstly, by adding the residual multi-scale recalibration module to the depth regression sub-network, our approach works better on exploiting the structural information of human poses. Secondly, the advanced geometry constraints are introduced to restrict the human pose from the bone length and joint angle orientation, which shows a better result. Experimental results on the Human3.6m and in-the-wild MPII datasets show the effectiveness and robustness of our method.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122099444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}