Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083439
William Steingartner, Richard Zsiga, D. Radaković
In this article, we refer to current research in the field of semantic methods for a selected set of domain-specific languages. In our research, we focus on the formulation and definition of semantic methods for describing the meaning of programs in a simple domain-specific language for controlling a robot in an orthogonal system. Considering the importance for current and future programmers and IT specialists to know how programs work and prevent possible mistakes at the design and algorithmic stages, we consider it important in educating young IT professionals to provide them with a solid foundation in formal methods for software engineering. Semantic modeling forms the necessary basis for these formal methods. Therefore, we continue our research by formulating semantic methods for selected domain-specific languages. We also developed a software tool for the mentioned method as a support in education to increase its attractiveness.
{"title":"Natural semantics visualization for domain-specific language","authors":"William Steingartner, Richard Zsiga, D. Radaković","doi":"10.1109/Informatics57926.2022.10083439","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083439","url":null,"abstract":"In this article, we refer to current research in the field of semantic methods for a selected set of domain-specific languages. In our research, we focus on the formulation and definition of semantic methods for describing the meaning of programs in a simple domain-specific language for controlling a robot in an orthogonal system. Considering the importance for current and future programmers and IT specialists to know how programs work and prevent possible mistakes at the design and algorithmic stages, we consider it important in educating young IT professionals to provide them with a solid foundation in formal methods for software engineering. Semantic modeling forms the necessary basis for these formal methods. Therefore, we continue our research by formulating semantic methods for selected domain-specific languages. We also developed a software tool for the mentioned method as a support in education to increase its attractiveness.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083445
M. Cervenka
This paper aims to calculate the Gaussian elimination method without division operation, which is useful for cases where the division operation is considerably expensive, not optimised or inconvenient. To substitute the division, more multiplication steps are performed. The division is completely avoided, reaching only 7 % longer execution time on a modern computer. Memory savings and also less multiplication has been reached in comparison to the state-of-the-art approach.
{"title":"Geometry Algebra and Gauss Elimination method for solving a linear system of equations without division","authors":"M. Cervenka","doi":"10.1109/Informatics57926.2022.10083445","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083445","url":null,"abstract":"This paper aims to calculate the Gaussian elimination method without division operation, which is useful for cases where the division operation is considerably expensive, not optimised or inconvenient. To substitute the division, more multiplication steps are performed. The division is completely avoided, reaching only 7 % longer execution time on a modern computer. Memory savings and also less multiplication has been reached in comparison to the state-of-the-art approach.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"713-715 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127945990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083394
M. Jenčik, A. Grincova, D. Simsík, A. Galajdová
This paper discusses the need for automated accessible documents creation in a world of disabled people inclusion and their education. Converting study materials into more accessible formats is not a trivial problem. We will try to review several possible solutions to this problem. The first very used solution for producing study scientific documents is to produce them in LaTeX language, but when we generate PDF documents directly from LaTeX, math expressions are not accessible by screen readers and braille displays. They can be made accessible by using LaTeX package, which automatically produces a hidden text corresponding to the LaTeX commands that generate the math expressions. The second solution is used the system LAMBDA for reading and writing mathematics especially for people with visual impairments. This system does not help to produce accessible math documents but it can be used as e-learning study system. The third solution is RoboBraille service. RoboBraille is automatized system for decentralized study materials production and automated document conversion service. RoboBraille can very easily convert study documents into digital Braille, MP3 audio files, DAISY structured audio books and various types e-books. Finally yet importantly, solution for e-learning study support students with special needs is to use computer algebra system. The main features of using computer algebra system MAPLE in the e-learning process as a supporting tool in the education of people with disabilities. We will illustrate on the solution of the differential equation in the chapter five.
{"title":"E-Learning Study Support and Accessible Documents Creation for Students with Special Needs","authors":"M. Jenčik, A. Grincova, D. Simsík, A. Galajdová","doi":"10.1109/Informatics57926.2022.10083394","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083394","url":null,"abstract":"This paper discusses the need for automated accessible documents creation in a world of disabled people inclusion and their education. Converting study materials into more accessible formats is not a trivial problem. We will try to review several possible solutions to this problem. The first very used solution for producing study scientific documents is to produce them in LaTeX language, but when we generate PDF documents directly from LaTeX, math expressions are not accessible by screen readers and braille displays. They can be made accessible by using LaTeX package, which automatically produces a hidden text corresponding to the LaTeX commands that generate the math expressions. The second solution is used the system LAMBDA for reading and writing mathematics especially for people with visual impairments. This system does not help to produce accessible math documents but it can be used as e-learning study system. The third solution is RoboBraille service. RoboBraille is automatized system for decentralized study materials production and automated document conversion service. RoboBraille can very easily convert study documents into digital Braille, MP3 audio files, DAISY structured audio books and various types e-books. Finally yet importantly, solution for e-learning study support students with special needs is to use computer algebra system. The main features of using computer algebra system MAPLE in the e-learning process as a supporting tool in the education of people with disabilities. We will illustrate on the solution of the differential equation in the chapter five.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130123196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083443
J. Škrinárová
Cloud systems are managed on the basis of au-tonomous systems. We present criteria that are suitable for optimization or improvement of modern cloud systems. In every operating system, task scheduling is very important. In clouds systems, where large amount of tasks runs on numerous machines, optimized task scheduling leads to significant reduction of computing time. Cloud providers have to comply with service level agreement from technical and from the quality of service point of view. For this reason, we specify quality of service criteria and limits for service level agreement violation. Clouds are virtualized by virtual machines or containers. We show approaches for power consumption minimization. Fog computing helps to improve middleware technology between cloud computing and the IoT devices. We specify criteria for correct decomposition of parallel and distributed application. We conclude that understanding of effective work of the system, can improve design and implementation of parallel and distributed application.
{"title":"Heterogeneous Cloud Systems and Criteria for Enhanced Performance","authors":"J. Škrinárová","doi":"10.1109/Informatics57926.2022.10083443","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083443","url":null,"abstract":"Cloud systems are managed on the basis of au-tonomous systems. We present criteria that are suitable for optimization or improvement of modern cloud systems. In every operating system, task scheduling is very important. In clouds systems, where large amount of tasks runs on numerous machines, optimized task scheduling leads to significant reduction of computing time. Cloud providers have to comply with service level agreement from technical and from the quality of service point of view. For this reason, we specify quality of service criteria and limits for service level agreement violation. Clouds are virtualized by virtual machines or containers. We show approaches for power consumption minimization. Fog computing helps to improve middleware technology between cloud computing and the IoT devices. We specify criteria for correct decomposition of parallel and distributed application. We conclude that understanding of effective work of the system, can improve design and implementation of parallel and distributed application.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083488
Sergiusz Slawczyk, Olga Siedlecka-Lamch
The article presents the impact of the problem of Byzantine generals on the blockchain-based network on the example of the decentralised blogosphere. The oral message algorithm's implementation was tested and compared to the signed message algorithm adapted to the blogosphere example. The work showed that the problem of the Byzantine generals poses a significant threat to the correct operation of the network. However, it has also been proven that, based on authentication methods, it is possible to implement an algorithm that allows for the detection of fraud attempts and an appropriate reaction without the need for many recursive calls. A further research direction was also proposed - adapting the above algorithm to situations where not all servers will receive complete information from other nodes.
{"title":"How to improve blockchain for blogosphere?","authors":"Sergiusz Slawczyk, Olga Siedlecka-Lamch","doi":"10.1109/Informatics57926.2022.10083488","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083488","url":null,"abstract":"The article presents the impact of the problem of Byzantine generals on the blockchain-based network on the example of the decentralised blogosphere. The oral message algorithm's implementation was tested and compared to the signed message algorithm adapted to the blogosphere example. The work showed that the problem of the Byzantine generals poses a significant threat to the correct operation of the network. However, it has also been proven that, based on authentication methods, it is possible to implement an algorithm that allows for the detection of fraud attempts and an appropriate reaction without the need for many recursive calls. A further research direction was also proposed - adapting the above algorithm to situations where not all servers will receive complete information from other nodes.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083416
Benjámin Barth, Richárd Szalay, Z. Porkoláb
Effective and safe parallel programming is among the biggest challenges of today's software technology. The C++ 17 standard introduced Parallel STL: a set of overloaded functions taking an additional “execution policy” parameter in the Algorithms chapter of the Standard library. During the years since its introduction, a few shortages of Parallel STL have been revealed. While the Standard defines the semantics of the individual algorithms, adherence to their abstract requirements - e.g., absolutely no data races or deadlocks during the evaluation of a predicate or other customisation point - is up to the developer. Experience shows that programmers frequently make mistakes and write erroneous code, which is hard to debug. In this paper, we investigate some of the critical issues of the Parallel STL library and suggest improvements to increase its safety. While a fully automatic detection of erroneous constructs is computationally infeasible to do, we introduce a framework with which the user will be able to indicate - axiomatically, based on absolute trust - that an operation has “safe” properties, e.g., commutativity of certain functors. We implemented a prototype of the proposed framework to demonstrate its usability and effectiveness.
{"title":"Towards Safer Parallel STL Usage","authors":"Benjámin Barth, Richárd Szalay, Z. Porkoláb","doi":"10.1109/Informatics57926.2022.10083416","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083416","url":null,"abstract":"Effective and safe parallel programming is among the biggest challenges of today's software technology. The C++ 17 standard introduced Parallel STL: a set of overloaded functions taking an additional “execution policy” parameter in the Algorithms chapter of the Standard library. During the years since its introduction, a few shortages of Parallel STL have been revealed. While the Standard defines the semantics of the individual algorithms, adherence to their abstract requirements - e.g., absolutely no data races or deadlocks during the evaluation of a predicate or other customisation point - is up to the developer. Experience shows that programmers frequently make mistakes and write erroneous code, which is hard to debug. In this paper, we investigate some of the critical issues of the Parallel STL library and suggest improvements to increase its safety. While a fully automatic detection of erroneous constructs is computationally infeasible to do, we introduce a framework with which the user will be able to indicate - axiomatically, based on absolute trust - that an operation has “safe” properties, e.g., commutativity of certain functors. We implemented a prototype of the proposed framework to demonstrate its usability and effectiveness.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083470
Andrea Galadíková, N. Adamko
Operational management of railway nodes, such as marshalling yards or maintenance depots, is important to ensure the efficient operation of the whole railway transportation system. Due to the nature of the railway operation, many tasks in such systems have to be performed by dispatchers. This paper proposes methods that could provide support for operational management carried out by dispatchers, namely the allocation of personnel to individual work tasks. A mathematical optimization model was designed for these needs. To lower the computational time required for the optimization, an algorithm combining simulation and optimization method is proposed, in which the optimization is performed on the reduced state space. The usefulness of proposed approach has been verified using simulation model of an existing railway maintenance depot.
{"title":"Simulation-based optimization of personnel assignment in railway nodes","authors":"Andrea Galadíková, N. Adamko","doi":"10.1109/Informatics57926.2022.10083470","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083470","url":null,"abstract":"Operational management of railway nodes, such as marshalling yards or maintenance depots, is important to ensure the efficient operation of the whole railway transportation system. Due to the nature of the railway operation, many tasks in such systems have to be performed by dispatchers. This paper proposes methods that could provide support for operational management carried out by dispatchers, namely the allocation of personnel to individual work tasks. A mathematical optimization model was designed for these needs. To lower the computational time required for the optimization, an algorithm combining simulation and optimization method is proposed, in which the optimization is performed on the reduced state space. The usefulness of proposed approach has been verified using simulation model of an existing railway maintenance depot.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083403
Matúš Sulír, Marcel Regeci
There exists a large number of research works analyzing questions and answers on the popular Stack Overflow website. However, other sub-sites of the Stack Exchange platform are studied rarely. In this paper, we analyze the questions and answers on the Software Engineering Stack Exchange site that encompasses a broader set of areas, such as testing or software processes. Topics and quantities of the questions, historical trends, and the authors' sentiment were analyzed using downloaded datasets. We found that the asked questions are most frequently related to database systems, quality assurance, and agile software development. The most attractive topics were career and teamwork problems, and the least attractive ones were network programming and software modeling. Historically, the topic of domain-driven design recorded the highest rise, and jobs and career the most significant fall. The number of new questions dropped, while the portion of unanswered ones increased.
{"title":"Software Engineers' Questions and Answers on Stack Exchange","authors":"Matúš Sulír, Marcel Regeci","doi":"10.1109/Informatics57926.2022.10083403","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083403","url":null,"abstract":"There exists a large number of research works analyzing questions and answers on the popular Stack Overflow website. However, other sub-sites of the Stack Exchange platform are studied rarely. In this paper, we analyze the questions and answers on the Software Engineering Stack Exchange site that encompasses a broader set of areas, such as testing or software processes. Topics and quantities of the questions, historical trends, and the authors' sentiment were analyzed using downloaded datasets. We found that the asked questions are most frequently related to database systems, quality assurance, and agile software development. The most attractive topics were career and teamwork problems, and the least attractive ones were network programming and software modeling. Historically, the topic of domain-driven design recorded the highest rise, and jobs and career the most significant fall. The number of new questions dropped, while the portion of unanswered ones increased.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114783759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083399
Anca-Maria Ilienescu, A. Iovanovici, Mircea Vladutiu
The goal of the investigation is to develop and test a system capable of providing short-term (less than an hour) traffic flow predictions in an urban environment. We present a data acquisition and preprocessing pipeline capable of filtering and normalizing data collected using Here Maps API. The data is used for training a supervised machine learning model which is afterwards validated by observing actual road traffic conditions and making empirical observations on the predicted routes. All the experimental determinations were carried on the city of Timisoara, Romania. The traffic flow data collected and used is available as an open dataset.
{"title":"Supervised learning data preprocessing for short-term traffic flow prediction","authors":"Anca-Maria Ilienescu, A. Iovanovici, Mircea Vladutiu","doi":"10.1109/Informatics57926.2022.10083399","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083399","url":null,"abstract":"The goal of the investigation is to develop and test a system capable of providing short-term (less than an hour) traffic flow predictions in an urban environment. We present a data acquisition and preprocessing pipeline capable of filtering and normalizing data collected using Here Maps API. The data is used for training a supervised machine learning model which is afterwards validated by observing actual road traffic conditions and making empirical observations on the predicted routes. All the experimental determinations were carried on the city of Timisoara, Romania. The traffic flow data collected and used is available as an open dataset.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-23DOI: 10.1109/Informatics57926.2022.10083469
Gereltsetseg Altangerel, M. Tejfel, Enkhtur Tsogbaatar
Due to the limited capacity and versatility of Internet of Things (IoT) devices, it isn't easy to implement advanced security mechanisms and adhere to common security standards on IoT devices. Our study proposes a network-based solution to address these issues in the IoT environment. This solution leverages the advantages of a programmable data plane, Software-Defined Networking (SDN), and machine learning. In-Band Network Telemetry (INT) is a novel monitoring application developed using a programmable data plane to collect network characteristics (INT data) in real time without affecting network performance. We aim to detect IoT attacks based on INT data using a 1D CNN-based deep learning model. As far as we know, this model is the first attempt to use INT data to detect IoT attacks. We created an SDN network infrastructure in a simulation environment and collected INT data from IoT devices in the event of an attack or non-attack. Our proposed 1D CNN-based model using INT data can detect IoT attacks with approximately 99.63 % accuracy. Our solution is relatively cost-effective and performs well compared to other competing models.
{"title":"A 1D CNN-based model for IoT anomaly detection using INT data","authors":"Gereltsetseg Altangerel, M. Tejfel, Enkhtur Tsogbaatar","doi":"10.1109/Informatics57926.2022.10083469","DOIUrl":"https://doi.org/10.1109/Informatics57926.2022.10083469","url":null,"abstract":"Due to the limited capacity and versatility of Internet of Things (IoT) devices, it isn't easy to implement advanced security mechanisms and adhere to common security standards on IoT devices. Our study proposes a network-based solution to address these issues in the IoT environment. This solution leverages the advantages of a programmable data plane, Software-Defined Networking (SDN), and machine learning. In-Band Network Telemetry (INT) is a novel monitoring application developed using a programmable data plane to collect network characteristics (INT data) in real time without affecting network performance. We aim to detect IoT attacks based on INT data using a 1D CNN-based deep learning model. As far as we know, this model is the first attempt to use INT data to detect IoT attacks. We created an SDN network infrastructure in a simulation environment and collected INT data from IoT devices in the event of an attack or non-attack. Our proposed 1D CNN-based model using INT data can detect IoT attacks with approximately 99.63 % accuracy. Our solution is relatively cost-effective and performs well compared to other competing models.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}