Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929130
John Clark, Sylvain P. Leblanc, S. Knight
This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the specific risks associated with an Insider's use of such a device to circumvent established security policies, even when these are implemented with state of the art Endpoint Security Solutions. The paper argues that a specific category of Hardware Trojan Horse devices, those implemented as functional peripheral devices, are particularly dangerous when used by a malicious Insider. The research discusses the implementation of a proof of concept Hardware Trojan Horse device, implemented as a USB Human Interface Devices, that exploits unintended USB channels to exfiltrate data from a computer. The work discusses unintended USB channels, paying particular attention to the observability of the channel in operation. Various scenarios are presented to show that Hardware Trojan Horse devices implemented as peripheral devices can be used to prosecute a wide variety of attacks that are not mitigated by modern defensive techniques. The work demonstrates that a Hardware Trojan Horse device and physical access by a malicious Insider are sufficient to compromise a modern computer system. The paper argues that the study of Hardware Trojan devices must become an integral part of research on Insider Threats.
{"title":"Risks associated with USB Hardware Trojan devices used by insiders","authors":"John Clark, Sylvain P. Leblanc, S. Knight","doi":"10.1109/SYSCON.2011.5929130","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929130","url":null,"abstract":"This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the specific risks associated with an Insider's use of such a device to circumvent established security policies, even when these are implemented with state of the art Endpoint Security Solutions. The paper argues that a specific category of Hardware Trojan Horse devices, those implemented as functional peripheral devices, are particularly dangerous when used by a malicious Insider. The research discusses the implementation of a proof of concept Hardware Trojan Horse device, implemented as a USB Human Interface Devices, that exploits unintended USB channels to exfiltrate data from a computer. The work discusses unintended USB channels, paying particular attention to the observability of the channel in operation. Various scenarios are presented to show that Hardware Trojan Horse devices implemented as peripheral devices can be used to prosecute a wide variety of attacks that are not mitigated by modern defensive techniques. The work demonstrates that a Hardware Trojan Horse device and physical access by a malicious Insider are sufficient to compromise a modern computer system. The paper argues that the study of Hardware Trojan devices must become an integral part of research on Insider Threats.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929064
E. Maiorana, P. Campisi, A. Neri
Recently, significant efforts have being dedicated to the design of algorithms and architectures able to protect biometric characteristics, in order to guarantee the necessary security and privacy to their owners. In this paper we discuss a protected on-line signature-based biometric authentication system, where the considered biometrics are secured by means of non-invertible transformations, able to generate templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different matching strategies in the transformed domain, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to provide security and renewability for the considered biometrics.
{"title":"Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system","authors":"E. Maiorana, P. Campisi, A. Neri","doi":"10.1109/SYSCON.2011.5929064","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929064","url":null,"abstract":"Recently, significant efforts have being dedicated to the design of algorithms and architectures able to protect biometric characteristics, in order to guarantee the necessary security and privacy to their owners. In this paper we discuss a protected on-line signature-based biometric authentication system, where the considered biometrics are secured by means of non-invertible transformations, able to generate templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different matching strategies in the transformed domain, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to provide security and renewability for the considered biometrics.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929117
K. Ariyur
TRIZ methods were developed in the erstwhile Soviet Union by Genrikh Altshuller and his students. Many proponents claim that their methods make creativity an exact science, something not conceded by others. We analyze two of the most widely used TRIZ methods here—the resolution of ‘contradictions’ and idealization in the context of optimization and decision theory. We first show that the resolution of contradictions helps improve system design through providing additional design flexibility. We also show how idealization directs system configuration so as to avoid or minimize side-effects or externalities, and therefore trade-offs and risks. We illustrate these issues in the context of a tablet counting problem.
{"title":"A mathematical foundation for TRIZ methods","authors":"K. Ariyur","doi":"10.1109/SYSCON.2011.5929117","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929117","url":null,"abstract":"TRIZ methods were developed in the erstwhile Soviet Union by Genrikh Altshuller and his students. Many proponents claim that their methods make creativity an exact science, something not conceded by others. We analyze two of the most widely used TRIZ methods here—the resolution of ‘contradictions’ and idealization in the context of optimization and decision theory. We first show that the resolution of contradictions helps improve system design through providing additional design flexibility. We also show how idealization directs system configuration so as to avoid or minimize side-effects or externalities, and therefore trade-offs and risks. We illustrate these issues in the context of a tablet counting problem.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115461296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929043
Lawrence John, P. McCormick, T. McCormick, J. Boardman
An extended enterprise is, by definition, both a system of systems and a complex dynamical system. We define government-run joint and interagency efforts as “government extended enterprises” (GEEs). GEEs comprise sets of effectively autonomous organizations that must cooperate voluntarily to achieve desired outcomes. Within the discipline of systems thinking, Boardman and Sauser have detailed a set of “differentiating characteristics” for systems of systems. We believe decision makers can leverage a set of four “canonical forces” to manipulate these characteristics to raise the levels of cooperation within a GEE and its operational effectiveness at the GEE level. This paper describes the concepts involved and postulates the relationships among them. A companion paper subtitled “Experimental Methodology” discusses a game theoretic methodology that executes a real-world case in an agent-based model as a proof-of-concept.
{"title":"Self-organizing Cooperative Dynamics in Government Extended Enterprises: Essential concepts","authors":"Lawrence John, P. McCormick, T. McCormick, J. Boardman","doi":"10.1109/SYSCON.2011.5929043","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929043","url":null,"abstract":"An extended enterprise is, by definition, both a system of systems and a complex dynamical system. We define government-run joint and interagency efforts as “government extended enterprises” (GEEs). GEEs comprise sets of effectively autonomous organizations that must cooperate voluntarily to achieve desired outcomes. Within the discipline of systems thinking, Boardman and Sauser have detailed a set of “differentiating characteristics” for systems of systems. We believe decision makers can leverage a set of four “canonical forces” to manipulate these characteristics to raise the levels of cooperation within a GEE and its operational effectiveness at the GEE level. This paper describes the concepts involved and postulates the relationships among them. A companion paper subtitled “Experimental Methodology” discusses a game theoretic methodology that executes a real-world case in an agent-based model as a proof-of-concept.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929105
H. Anacker, R. Dorociak, R. Dumitrescu, J. Gausemeier
This contribution addresses a new approach for the domain-spanning system specification for the design of advanced mechatronic systems. Therefore two basic methods will be introduced: a language for the holistic specification of advanced mechatronic systems and a concept for the reuse of once successfully proven solutions in form of solution patterns. For both methods software tools have been developed. Moreover, a concept for the integrated tool support for the conceptual design of advanced mechatronic systems based on the coupling of these both methods and their respective software tools will be presented.
{"title":"Integrated tool-based approach for the conceptual design of advanced mechatronic systems","authors":"H. Anacker, R. Dorociak, R. Dumitrescu, J. Gausemeier","doi":"10.1109/SYSCON.2011.5929105","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929105","url":null,"abstract":"This contribution addresses a new approach for the domain-spanning system specification for the design of advanced mechatronic systems. Therefore two basic methods will be introduced: a language for the holistic specification of advanced mechatronic systems and a concept for the reuse of once successfully proven solutions in form of solution patterns. For both methods software tools have been developed. Moreover, a concept for the integrated tool support for the conceptual design of advanced mechatronic systems based on the coupling of these both methods and their respective software tools will be presented.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"141 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929080
J. Ras, A. Cheng
This practice paper examines Toyota's electronic throttle controller (ETC) problem. ETC for passenger cars is a safety-critical, embedded control system and it must meet very high reliability and safety requirements. ETC systems continue to increase in complexity, making formal specification and verification processes an essential component of the development of safer systems. There are two ways to represent the real-time system. Firstly, we can describe the system's structure and function by detailing its electrical, mechanical, and other components. Secondly, the real-time system's behavior as it responds to actions and events can be described. Then we can compare the system's specification to the safety assertion to show that the system meets the safety properties. This paper describes two research threads. In the first, we present the specification of Toyota's electronic throttle control (ETC) system including the timing constraints. The second thread, which will be explored in a longer version of this paper, evaluates the use of conventional design versus electronic engine control by applying classical control theory.1
{"title":"On formal verification of Toyota's electronic throttle controller","authors":"J. Ras, A. Cheng","doi":"10.1109/SYSCON.2011.5929080","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929080","url":null,"abstract":"This practice paper examines Toyota's electronic throttle controller (ETC) problem. ETC for passenger cars is a safety-critical, embedded control system and it must meet very high reliability and safety requirements. ETC systems continue to increase in complexity, making formal specification and verification processes an essential component of the development of safer systems. There are two ways to represent the real-time system. Firstly, we can describe the system's structure and function by detailing its electrical, mechanical, and other components. Secondly, the real-time system's behavior as it responds to actions and events can be described. Then we can compare the system's specification to the safety assertion to show that the system meets the safety properties. This paper describes two research threads. In the first, we present the specification of Toyota's electronic throttle control (ETC) system including the timing constraints. The second thread, which will be explored in a longer version of this paper, evaluates the use of conventional design versus electronic engine control by applying classical control theory.1","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929112
M.A. Zamani, A. Fereidunian, S. S. Mansouri, M. A. Sharifi K., F. Boroomand, H. Lesani
This paper presents a novel expert system referred as Petri Net equipped Tricotyledon Theory of System Design (PN-T3SD) to select a proper IT infrastructure for smart grid. The proposed PN-T3SD is a policy-driven decision making method - combining the ideas from Petri nets and Wymorian T3SD- that can change the result of decision making according to the utility's policy. The PN-T3SD is applied to the practical data of the Greater Tehran Electrical Distribution Company (GTEDC). Three Alternatives of Spread Spectrum (SS), Distribution Line Carrier (DLC) and Leased Line (LL) are selected as proposed IT infrastructure. The implemented results are examined by developed policies scenarios.
{"title":"A Petri Net-T3SD policy driven method for IT infrastructure selection in smart grid","authors":"M.A. Zamani, A. Fereidunian, S. S. Mansouri, M. A. Sharifi K., F. Boroomand, H. Lesani","doi":"10.1109/SYSCON.2011.5929112","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929112","url":null,"abstract":"This paper presents a novel expert system referred as Petri Net equipped Tricotyledon Theory of System Design (PN-T3SD) to select a proper IT infrastructure for smart grid. The proposed PN-T3SD is a policy-driven decision making method - combining the ideas from Petri nets and Wymorian T3SD- that can change the result of decision making according to the utility's policy. The PN-T3SD is applied to the practical data of the Greater Tehran Electrical Distribution Company (GTEDC). Three Alternatives of Spread Spectrum (SS), Distribution Line Carrier (DLC) and Leased Line (LL) are selected as proposed IT infrastructure. The implemented results are examined by developed policies scenarios.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"123 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114114164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929035
H. Marzi, Y. Lian
Gamma knife radiation treatment is an alternative to treating brain tumors with surgery. Currently, treatment planning is a manual and time-consuming task that involves an iterative process of shot selection and placement. In this study Genetic Algorithm (GA) is introduced to automatically select shot location and shot size for radiosurgery treatment planning, which will make planning process simpler, less time-consuming and more effective. First, a distance transformation/coding method is used to generate the skeleton of the target. Then, along the skeleton, the GA-based shot placement algorithm is applied to find the best location to place a shot. By continuously iterating the algorithm, the number, size and the location of all the shots are generated. The proposed GA-based model has been tested using numerous simulated targets with different shapes and sizes. Results demonstrate that the GA-based shot location and size determination can speed up the process of shot placement.
{"title":"Optimization in radiosurgery treatment planning","authors":"H. Marzi, Y. Lian","doi":"10.1109/SYSCON.2011.5929035","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929035","url":null,"abstract":"Gamma knife radiation treatment is an alternative to treating brain tumors with surgery. Currently, treatment planning is a manual and time-consuming task that involves an iterative process of shot selection and placement. In this study Genetic Algorithm (GA) is introduced to automatically select shot location and shot size for radiosurgery treatment planning, which will make planning process simpler, less time-consuming and more effective. First, a distance transformation/coding method is used to generate the skeleton of the target. Then, along the skeleton, the GA-based shot placement algorithm is applied to find the best location to place a shot. By continuously iterating the algorithm, the number, size and the location of all the shots are generated. The proposed GA-based model has been tested using numerous simulated targets with different shapes and sizes. Results demonstrate that the GA-based shot location and size determination can speed up the process of shot placement.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929103
A. Squires, R. Cloutier
The goal of robust design is to develop a system that performs optimally under a broad range of varying conditions including environmental conditions. A robust design is one that seeks to perform the ideal function while being insensitive to variations in environmental noise - uncontrollable factors that exist outside of the system, yet impact the ability of the system to perform the ideal function. This paper introduces a robust design framework for online systems engineering education and demonstrates its use. Combining observation and experimental design concepts, the framework is applied to the challenge of improving online course design by investigating the impact of the pedagogy used to deliver course lectures and discuss course content on student satisfaction and learning. The goal is to identify an approach for optimizing the student's learning experience and their development of system engineering competency knowledge by analyzing the student's self-perceived gain in competency knowledge related to system concepts and architectures, in a context where the students' age and years of systems engineering experience vary.
{"title":"Applying a robust design approach to improve online systems engineering education","authors":"A. Squires, R. Cloutier","doi":"10.1109/SYSCON.2011.5929103","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929103","url":null,"abstract":"The goal of robust design is to develop a system that performs optimally under a broad range of varying conditions including environmental conditions. A robust design is one that seeks to perform the ideal function while being insensitive to variations in environmental noise - uncontrollable factors that exist outside of the system, yet impact the ability of the system to perform the ideal function. This paper introduces a robust design framework for online systems engineering education and demonstrates its use. Combining observation and experimental design concepts, the framework is applied to the challenge of improving online course design by investigating the impact of the pedagogy used to deliver course lectures and discuss course content on student satisfaction and learning. The goal is to identify an approach for optimizing the student's learning experience and their development of system engineering competency knowledge by analyzing the student's self-perceived gain in competency knowledge related to system concepts and architectures, in a context where the students' age and years of systems engineering experience vary.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929106
Abbas A. Al-Muhsen, R. Babiceanu
In the ever-increasing digital world, mobile devices, such as smartphones and tablet computers are on the trend to become the most used electronic devices. Multimedia applications running on these devices require appropriate operating system support. These types of applications are often characterized as soft real-time applications since missing deadlines is not critical, even the quality of service decreases. One limitation of the capabilities of these devices comes from their power source: they are all battery-powered, with a restricted battery energy budget. An important part of the total power is used by the CPU of these devices, so by controlling the power consumed by the CPU, the overall power used by the mobile device will be significantly reduced. This work proposes a systems engineering modeling approach that integrates soft-real time CPU scheduling methodologies with dynamic voltage scaling approaches with the objective of achieving energy savings while providing a high-quality level of service.
{"title":"Systems engineering approach to CPU scheduling for mobile multimedia systems","authors":"Abbas A. Al-Muhsen, R. Babiceanu","doi":"10.1109/SYSCON.2011.5929106","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929106","url":null,"abstract":"In the ever-increasing digital world, mobile devices, such as smartphones and tablet computers are on the trend to become the most used electronic devices. Multimedia applications running on these devices require appropriate operating system support. These types of applications are often characterized as soft real-time applications since missing deadlines is not critical, even the quality of service decreases. One limitation of the capabilities of these devices comes from their power source: they are all battery-powered, with a restricted battery energy budget. An important part of the total power is used by the CPU of these devices, so by controlling the power consumed by the CPU, the overall power used by the mobile device will be significantly reduced. This work proposes a systems engineering modeling approach that integrates soft-real time CPU scheduling methodologies with dynamic voltage scaling approaches with the objective of achieving energy savings while providing a high-quality level of service.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}