Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929065
J. Axelsson
Many industries developing complex products based on embedded systems rely on architecting as a key activity. Furthermore, they use product line approaches to find synergies between their products. This means that they use a base platform which is adapted to different products, and the architecture of the product line thus evolves over time. In previous case studies we have seen that these companies often lack a defined process for the evolutionary architecting of these product lines. The contribution of this paper is to present such a process, which matches key characteristics of mature architecting practices. It is also discussed how this process compares to observations in industry.
{"title":"Improving the evolutionary architecting process for embedded system product lines","authors":"J. Axelsson","doi":"10.1109/SYSCON.2011.5929065","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929065","url":null,"abstract":"Many industries developing complex products based on embedded systems rely on architecting as a key activity. Furthermore, they use product line approaches to find synergies between their products. This means that they use a base platform which is adapted to different products, and the architecture of the product line thus evolves over time. In previous case studies we have seen that these companies often lack a defined process for the evolutionary architecting of these product lines. The contribution of this paper is to present such a process, which matches key characteristics of mature architecting practices. It is also discussed how this process compares to observations in industry.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"23 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124450387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929090
Christopher S. Bartley, A. Rusu, Robert Russell, Daniel Urbano, Stephen Cirner
We define radar events to be an abstraction of a request sent to a physical radar machine. Radar events are assigned a priority, will require a certain amount of time to execute and may or may not need to execute before an assigned deadline. Radar schedulers attempt to schedule radar events in real time as efficiently as possible, by scheduling the highest priority events while attempting to schedule every event before its deadline. Existing radar schedulers may have several drawbacks including inefficient algorithms, difficulty of implementing and changing of scheduling algorithms, and non-automated performance analysis of such algorithms. In this paper, we propose a system that addresses all of these issues. The goals of our system are to provide new scheduling algorithm solution techniques, to reduce the amount of time it takes to implement and begin testing new scheduling algorithms, and to reduce the number of errors committed and amount of time taken during the algorithm testing phase via automation. We will show that our system is an improvement over existing radar schedulers.
{"title":"System for performance analysis of priority-based radar schedulers","authors":"Christopher S. Bartley, A. Rusu, Robert Russell, Daniel Urbano, Stephen Cirner","doi":"10.1109/SYSCON.2011.5929090","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929090","url":null,"abstract":"We define radar events to be an abstraction of a request sent to a physical radar machine. Radar events are assigned a priority, will require a certain amount of time to execute and may or may not need to execute before an assigned deadline. Radar schedulers attempt to schedule radar events in real time as efficiently as possible, by scheduling the highest priority events while attempting to schedule every event before its deadline. Existing radar schedulers may have several drawbacks including inefficient algorithms, difficulty of implementing and changing of scheduling algorithms, and non-automated performance analysis of such algorithms. In this paper, we propose a system that addresses all of these issues. The goals of our system are to provide new scheduling algorithm solution techniques, to reduce the amount of time it takes to implement and begin testing new scheduling algorithms, and to reduce the number of errors committed and amount of time taken during the algorithm testing phase via automation. We will show that our system is an improvement over existing radar schedulers.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929082
Ying Yu, Ji Zhu
A SD model is presented in this paper to study an electrical market with regulation strategies. In each time unit of the model, the Stackelberg game between the government and the grid enterprise is analyzed: in order to encourage the grid enterprise to accept the regulated price, a transfer payment considering the impacts of the inflation is made by the government firstly, and then the grid enterprise makes responsive policy under the given regulation strategies. Based on the model, a simulation is done to investigate the impact of the inflation and the regulation strategies.
{"title":"A SD model for the electrical market considering inflation and regulation strategies","authors":"Ying Yu, Ji Zhu","doi":"10.1109/SYSCON.2011.5929082","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929082","url":null,"abstract":"A SD model is presented in this paper to study an electrical market with regulation strategies. In each time unit of the model, the Stackelberg game between the government and the grid enterprise is analyzed: in order to encourage the grid enterprise to accept the regulated price, a transfer payment considering the impacts of the inflation is made by the government firstly, and then the grid enterprise makes responsive policy under the given regulation strategies. Based on the model, a simulation is done to investigate the impact of the inflation and the regulation strategies.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929038
Chad L. Calvert, G. Hamza-Lup, A. Agarwal, B. Alhalabi
The increasing system design complexity is negatively impacting the overall system design productivity by increasing the cost and time of product development. One key to overcoming these challenges is exploiting Component Based Engineering practices. Components are designed for various specifications and usually variants of each component exist with different performance and quality of service parameters. Therefore it is a challenge to select the optimum components from a component library that will satisfy all functional and non-functional system requirements. If these designs and architectural decisions are delayed, they may lead to design re-spins thereby, negatively impacting the product development cost and time. In this paper we propose an integrated framework for component selection.
{"title":"An integrated component selection framework for system-level design","authors":"Chad L. Calvert, G. Hamza-Lup, A. Agarwal, B. Alhalabi","doi":"10.1109/SYSCON.2011.5929038","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929038","url":null,"abstract":"The increasing system design complexity is negatively impacting the overall system design productivity by increasing the cost and time of product development. One key to overcoming these challenges is exploiting Component Based Engineering practices. Components are designed for various specifications and usually variants of each component exist with different performance and quality of service parameters. Therefore it is a challenge to select the optimum components from a component library that will satisfy all functional and non-functional system requirements. If these designs and architectural decisions are delayed, they may lead to design re-spins thereby, negatively impacting the product development cost and time. In this paper we propose an integrated framework for component selection.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929116
Nitin Kanaskar, J. Bian, R. Seker, Mais Nijim, N. Yilmazer
Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.
{"title":"Dynamical System approach to insider threat detection","authors":"Nitin Kanaskar, J. Bian, R. Seker, Mais Nijim, N. Yilmazer","doi":"10.1109/SYSCON.2011.5929116","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929116","url":null,"abstract":"Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133878274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929098
M. Al-Qutayri, J. Jeedella, Majid Al-Shamsi
This paper presents an integrated wireless system that helps a visually impaired person navigate within an indoor environment. The guidance process to help the person navigate uses a ZigBee wireless mesh network to localize the user and a compass to determine his/her orientation. The system uses a server to calculate an optimal path from the user's present location to the target location or item to be reached. The system receives voice commands from the visually impaired person and generates audio responses to guide the person. The mobile unit of the system is compact and requires relatively low power. Overall the system has minimal intrusion level and the results of various testing scenarios showed it was successful. The results also showed that the accuracy level depends on the available ZigBee modules within the mesh network and the particular zone.
{"title":"An integrated wireless indoor navigation system for visually impaired","authors":"M. Al-Qutayri, J. Jeedella, Majid Al-Shamsi","doi":"10.1109/SYSCON.2011.5929098","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929098","url":null,"abstract":"This paper presents an integrated wireless system that helps a visually impaired person navigate within an indoor environment. The guidance process to help the person navigate uses a ZigBee wireless mesh network to localize the user and a compass to determine his/her orientation. The system uses a server to calculate an optimal path from the user's present location to the target location or item to be reached. The system receives voice commands from the visually impaired person and generates audio responses to guide the person. The mobile unit of the system is compact and requires relatively low power. Overall the system has minimal intrusion level and the results of various testing scenarios showed it was successful. The results also showed that the accuracy level depends on the available ZigBee modules within the mesh network and the particular zone.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133198063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929114
Susan Ferreira, J. Tejeda
Emergence is a systems concept that refers to the properties that emerge as a result of the interactions between elements of a system. Emergent properties can be desirable or undesirable. Due to the potential for adverse consequences, it is beneficial to understand the undesirable emergent properties and be able to predict them prior to their occurrence. If the undesirable emergent properties are not predicted, it is important to detect them as soon as possible after their occurrence to minimize potential negative consequences. This paper discusses how the ability to predict and detect emergent properties evolves and improves over a system's lifecycle. Factors and system characteristics which may be useful to predict emergent properties are identified and associated to stages and processes in the system's lifecycle.
{"title":"An evolving understanding for predicting emergent properties","authors":"Susan Ferreira, J. Tejeda","doi":"10.1109/SYSCON.2011.5929114","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929114","url":null,"abstract":"Emergence is a systems concept that refers to the properties that emerge as a result of the interactions between elements of a system. Emergent properties can be desirable or undesirable. Due to the potential for adverse consequences, it is beneficial to understand the undesirable emergent properties and be able to predict them prior to their occurrence. If the undesirable emergent properties are not predicted, it is important to detect them as soon as possible after their occurrence to minimize potential negative consequences. This paper discusses how the ability to predict and detect emergent properties evolves and improves over a system's lifecycle. Factors and system characteristics which may be useful to predict emergent properties are identified and associated to stages and processes in the system's lifecycle.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130197438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929127
J. Mulcahy, Shihong Huang, Junwei Cao, Fan Zhang
Mobile devices and cloud computing platforms have become increasing popular in recent years, as more ways in which to adopt these technologies to existing business and research models have been envisioned and implemented. What started as simply providing bandwidth and technology to mobile users in order to browse the internet from handheld devices now allows entire websites to be hosted on remote cloud platforms. Users now have the ability to trade and track stock market data from anywhere and anytime, automatically communicate data from wearable medical sensor devices, avoid vehicle collisions, track freight shipments, and a plethora of other applications. Healthcare is an area where the leveraging of these new technologies has the ability to have worldwide impact, with many exciting possibilities. However, much of the current focus is on more “doctor-centric” uses rather than “patient-centric” ones. The use of mobile devices to automatically sense and transmit data from the patient, devices to aid in dictation and communication within hospital settings, and cloud products to store patient data and other solutions help make the tasks of physicians easier, but do not necessarily improve the care given to the patient. There are bandwidth concerns, security concerns and the general cyberphobia that consumers commonly have with sharing personal information. This paper proposes a different type of solution that is more related to a social networking environment in which many people are already comfortable using. It concentrates on the collection of data from patients during a period of time that they are often suffering the most - after initial post-operative release from a hospital or clinic. It first explores technologies that are currently in use, and then describes a different model that allows the patient to control what information is being shared, who is allowed to consume this data, and how it might enhance the well-being of those that may make use of this new paradigm.
{"title":"How are you feeling? A social network model to monitor the health of post-operative patients","authors":"J. Mulcahy, Shihong Huang, Junwei Cao, Fan Zhang","doi":"10.1109/SYSCON.2011.5929127","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929127","url":null,"abstract":"Mobile devices and cloud computing platforms have become increasing popular in recent years, as more ways in which to adopt these technologies to existing business and research models have been envisioned and implemented. What started as simply providing bandwidth and technology to mobile users in order to browse the internet from handheld devices now allows entire websites to be hosted on remote cloud platforms. Users now have the ability to trade and track stock market data from anywhere and anytime, automatically communicate data from wearable medical sensor devices, avoid vehicle collisions, track freight shipments, and a plethora of other applications. Healthcare is an area where the leveraging of these new technologies has the ability to have worldwide impact, with many exciting possibilities. However, much of the current focus is on more “doctor-centric” uses rather than “patient-centric” ones. The use of mobile devices to automatically sense and transmit data from the patient, devices to aid in dictation and communication within hospital settings, and cloud products to store patient data and other solutions help make the tasks of physicians easier, but do not necessarily improve the care given to the patient. There are bandwidth concerns, security concerns and the general cyberphobia that consumers commonly have with sharing personal information. This paper proposes a different type of solution that is more related to a social networking environment in which many people are already comfortable using. It concentrates on the collection of data from patients during a period of time that they are often suffering the most - after initial post-operative release from a hospital or clinic. It first explores technologies that are currently in use, and then describes a different model that allows the patient to control what information is being shared, who is allowed to consume this data, and how it might enhance the well-being of those that may make use of this new paradigm.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929077
M. M. Tousi, K. Khorasani
In this paper, a new robust fault detection and isolation (FDI) methodology for an unmanned aerial vehicle (UAV) is proposed. The fault diagnosis scheme is constructed based on observer-based techniques according to fault models corresponding to each component (actuator, sensor, and structure). The proposed fault diagnosis method takes advantage of the structural perturbation of the UAV model due to the icing (the main structural fault in aircraft), sensor, and actuator faults to reduce the error of observers that are used in the FDI module in addition to distinguishing among faults in different components. Moreover, the accuracy of the FDI module is increased by considering the structural perturbation of the UAV linear model due to wind disturbances which is the major environmental disturbance affecting an aircraft. Our envisaged FDI strategy is capable of diagnosing recurrent faults through properly designed residuals with different responses to different types of faults. Simulation results are provided to illustrate and demonstrate the effectiveness of our proposed FDI approach due to faults in sensors, actuators, and structural components of unmanned aerial vehicles.
{"title":"Robust observer-based fault diagnosis for an unmanned aerial vehicle","authors":"M. M. Tousi, K. Khorasani","doi":"10.1109/SYSCON.2011.5929077","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929077","url":null,"abstract":"In this paper, a new robust fault detection and isolation (FDI) methodology for an unmanned aerial vehicle (UAV) is proposed. The fault diagnosis scheme is constructed based on observer-based techniques according to fault models corresponding to each component (actuator, sensor, and structure). The proposed fault diagnosis method takes advantage of the structural perturbation of the UAV model due to the icing (the main structural fault in aircraft), sensor, and actuator faults to reduce the error of observers that are used in the FDI module in addition to distinguishing among faults in different components. Moreover, the accuracy of the FDI module is increased by considering the structural perturbation of the UAV linear model due to wind disturbances which is the major environmental disturbance affecting an aircraft. Our envisaged FDI strategy is capable of diagnosing recurrent faults through properly designed residuals with different responses to different types of faults. Simulation results are provided to illustrate and demonstrate the effectiveness of our proposed FDI approach due to faults in sensors, actuators, and structural components of unmanned aerial vehicles.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929050
Avinash Mehta, Mukesh Menaria, S. Dangi, Shrisha Rao
With the growth of cloud computing, large scale data centers have become common in the computing industry, and there has been a significant increase in energy consumption at these data centers, which thus becomes a key issue to address. As most of the time a data center remains underutilized, a significant amount of energy can be conserved by migrating virtual machines (VM) running on underutilized machines to other machines and hibernating such underutilized machines. This paper aims to design such a strategy for energy-efficient cloud data centers. It makes use of historical traffic data from data centers and uses a service request prediction model which enables the identification of the number of active servers required at a given moment, thus making possible the hibernation of underutilized servers. The simulation results indicate that this approach brings about a significant amount of energy conservation.
{"title":"Energy conservation in cloud infrastructures","authors":"Avinash Mehta, Mukesh Menaria, S. Dangi, Shrisha Rao","doi":"10.1109/SYSCON.2011.5929050","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929050","url":null,"abstract":"With the growth of cloud computing, large scale data centers have become common in the computing industry, and there has been a significant increase in energy consumption at these data centers, which thus becomes a key issue to address. As most of the time a data center remains underutilized, a significant amount of energy can be conserved by migrating virtual machines (VM) running on underutilized machines to other machines and hibernating such underutilized machines. This paper aims to design such a strategy for energy-efficient cloud data centers. It makes use of historical traffic data from data centers and uses a service request prediction model which enables the identification of the number of active servers required at a given moment, thus making possible the hibernation of underutilized servers. The simulation results indicate that this approach brings about a significant amount of energy conservation.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}