Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35024
Chao Zhang, Guoliang Hu, Hu Jiajun, Yong Zhang, Yi-Di Xie
The masses of people urgently need a platform to help them identify the authenticity of network images, but the existing image forgery detection algorithms generally have high thresholds and poor real-time problems, making it difficult for the public to provide efficient detection services. Therefore, this paper proposes a cloud-based network image forgery detection system that uses B/S architecture, integrates multiple algorithms, and uses cloud computing and GPU computing technologies to improve system throughput and detection speed. Experimental results show that the system can effectively detect copy-move and splicing forgeries, and the GPU's speedup ratio reaches 6.5, which significantly improves the detection speed and throughput of the system.
{"title":"Design and Implementation of Image Forgery Detection System Based on Cloud Computing","authors":"Chao Zhang, Guoliang Hu, Hu Jiajun, Yong Zhang, Yi-Di Xie","doi":"10.12783/dtetr/mcaee2020/35024","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35024","url":null,"abstract":"The masses of people urgently need a platform to help them identify the authenticity of network images, but the existing image forgery detection algorithms generally have high thresholds and poor real-time problems, making it difficult for the public to provide efficient detection services. Therefore, this paper proposes a cloud-based network image forgery detection system that uses B/S architecture, integrates multiple algorithms, and uses cloud computing and GPU computing technologies to improve system throughput and detection speed. Experimental results show that the system can effectively detect copy-move and splicing forgeries, and the GPU's speedup ratio reaches 6.5, which significantly improves the detection speed and throughput of the system.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87025237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35076
Xiaohui Xie
Education informatization in China has been greatly promoted in recent years, along with the popularity of the network technology and the smart terminal, and the breakthrough in big data and cloud computing technology, K12 online education grows rapidly, it’s especially necessary to comprehensively know about the development history of domestic K12 online education, research status and hotspots, thus further explore the development direction of K12 online education. In this paper, Citespace software is used to visualize the journal papers and master's degree papers collected in CNKI database and draw K12 keywords co-occurrence and the research hotspot in the research of the K12 online education change sequential graph, and we found K12 online education research focused on the "basic education", "Internet +", "online learning space", "online school" and "business model", etc., indicating that K12 online education develops with the national education informatization and, and turns the way of Market-oriented Development.
{"title":"Analysis of Research Hotspots and Trends in k12 Online Education in China","authors":"Xiaohui Xie","doi":"10.12783/dtetr/mcaee2020/35076","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35076","url":null,"abstract":"Education informatization in China has been greatly promoted in recent years, along with the popularity of the network technology and the smart terminal, and the breakthrough in big data and cloud computing technology, K12 online education grows rapidly, it’s especially necessary to comprehensively know about the development history of domestic K12 online education, research status and hotspots, thus further explore the development direction of K12 online education. In this paper, Citespace software is used to visualize the journal papers and master's degree papers collected in CNKI database and draw K12 keywords co-occurrence and the research hotspot in the research of the K12 online education change sequential graph, and we found K12 online education research focused on the \"basic education\", \"Internet +\", \"online learning space\", \"online school\" and \"business model\", etc., indicating that K12 online education develops with the national education informatization and, and turns the way of Market-oriented Development.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84626161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35016
Zheng-guang Xu, Yunfei Wang
Person re-identification technology is an important foundation for security, pedestrian tracking and other fields, and is the key to building a safe and smart city. In recent years, a large number of researchers have trained pedestrian re-identification networks through triplet loss, especially the triplet loss with batch hard mining (BHTri loss) has greatly improved person re-identification networks on accuracy. However, triplet loss with batch hard mining for an anchor sample only select the hardest positive sample and the hardest negative sample to calculate the loss, ignoring the influence of other samples on network parameters. In response to the above issues, this paper proposes a variant of triplet loss with batch hard mining, which is called adaptive weight triplet loss with batch hard mining. After the training dataset extracts features from the backbone network, in the phase of calculating loss, it takes the average of the sum of the distances between an anchor sample and all corresponding positive samples as a threshold, and both positive samples with an anchor point distance greater than the threshold and negative samples smaller than the threshold are retained, then based on The distance of the anchor sample is given the corresponding sample weight for calculating the loss. Compared with BHTri, mAP have improved 1.79%, 2.04%, and 1.25% respectively on the Market1501, DukeMTMC-reID and CUHK03 datasets, indicating that the proposed algorithm is effective.
{"title":"Pedestrian Re-ID Based on Improved Triplet Loss","authors":"Zheng-guang Xu, Yunfei Wang","doi":"10.12783/dtetr/mcaee2020/35016","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35016","url":null,"abstract":"Person re-identification technology is an important foundation for security, pedestrian tracking and other fields, and is the key to building a safe and smart city. In recent years, a large number of researchers have trained pedestrian re-identification networks through triplet loss, especially the triplet loss with batch hard mining (BHTri loss) has greatly improved person re-identification networks on accuracy. However, triplet loss with batch hard mining for an anchor sample only select the hardest positive sample and the hardest negative sample to calculate the loss, ignoring the influence of other samples on network parameters. In response to the above issues, this paper proposes a variant of triplet loss with batch hard mining, which is called adaptive weight triplet loss with batch hard mining. After the training dataset extracts features from the backbone network, in the phase of calculating loss, it takes the average of the sum of the distances between an anchor sample and all corresponding positive samples as a threshold, and both positive samples with an anchor point distance greater than the threshold and negative samples smaller than the threshold are retained, then based on The distance of the anchor sample is given the corresponding sample weight for calculating the loss. Compared with BHTri, mAP have improved 1.79%, 2.04%, and 1.25% respectively on the Market1501, DukeMTMC-reID and CUHK03 datasets, indicating that the proposed algorithm is effective.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82986330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35067
Ning Ye, J. Song, Gao Xiying
This paper proposed an active disturbance rejection adaptive command filtered control (CFC) scheme for tracking control of electrohydraulic actuator subjected to both parametric uncertainties and uncertain nonlinearities. The proposed controller is developed by combining extended observer technology and adaptive CFC backstepping method. The adaptive law is used to deal with parameter uncertainty; matching uncertainties and mismatching uncertainties are estimated by two extended state observers and compensated in a feedforward way. Parameter self-adaptation can greatly reduce parameter uncertainty and ease the estimation burden of the extended state observer. CFC technology is employed to deal with the inherently complex explosion problem of classic backstepping technology. Therefore, the design of the controller avoids high-gain feedback, reduces tracking errors, and decreases online calculation burden. The proposed controller can guarantee asymptotic stability and expected control performance. Comparative simulation results are acquired to verify the tracking performance of the proposed approach.
{"title":"Active Disturbance Rejection Adaptive Command Filtered Control of Electrohydraulic Actuator","authors":"Ning Ye, J. Song, Gao Xiying","doi":"10.12783/dtetr/mcaee2020/35067","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35067","url":null,"abstract":"This paper proposed an active disturbance rejection adaptive command filtered control (CFC) scheme for tracking control of electrohydraulic actuator subjected to both parametric uncertainties and uncertain nonlinearities. The proposed controller is developed by combining extended observer technology and adaptive CFC backstepping method. The adaptive law is used to deal with parameter uncertainty; matching uncertainties and mismatching uncertainties are estimated by two extended state observers and compensated in a feedforward way. Parameter self-adaptation can greatly reduce parameter uncertainty and ease the estimation burden of the extended state observer. CFC technology is employed to deal with the inherently complex explosion problem of classic backstepping technology. Therefore, the design of the controller avoids high-gain feedback, reduces tracking errors, and decreases online calculation burden. The proposed controller can guarantee asymptotic stability and expected control performance. Comparative simulation results are acquired to verify the tracking performance of the proposed approach.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"90 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90424644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35049
Mingjiang Zhang, Weihu Zhao, Hongwei Li, Chengyuan Wang
The adversarial samples can cause the convolutional neural network model to output incorrect results. It is proposed to paste the generated adversarial sample patch on the roof of the transport vehicle to prevent aerial identification of the drone and achieve the attack on the target detection system. By producing aerial transport vehicle datasets, a YOLOv2-based target detection model is trained in the Pytorch deep learning framework, and the adversarial patch is trained by the GAN (Generative Adversarial Networks) called adversarial-yolo that can make the target detection failed. After simulation and comparison, the transport vehicle with a small adversarial patch can successfully and stably attack the target detection model, making it unable to detect the target, and the operation is flexible. The research can provide a certain reference value for the defense and camouflage methods of important ground targets against unmanned aerial intelligent detection devices.
{"title":"Application of Adversarial Sample Attack in Aerial Photo Identification of Transport Vehicle","authors":"Mingjiang Zhang, Weihu Zhao, Hongwei Li, Chengyuan Wang","doi":"10.12783/dtetr/mcaee2020/35049","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35049","url":null,"abstract":"The adversarial samples can cause the convolutional neural network model to output incorrect results. It is proposed to paste the generated adversarial sample patch on the roof of the transport vehicle to prevent aerial identification of the drone and achieve the attack on the target detection system. By producing aerial transport vehicle datasets, a YOLOv2-based target detection model is trained in the Pytorch deep learning framework, and the adversarial patch is trained by the GAN (Generative Adversarial Networks) called adversarial-yolo that can make the target detection failed. After simulation and comparison, the transport vehicle with a small adversarial patch can successfully and stably attack the target detection model, making it unable to detect the target, and the operation is flexible. The research can provide a certain reference value for the defense and camouflage methods of important ground targets against unmanned aerial intelligent detection devices.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"272 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73558886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35097
Zhihong Li
The new economy has been rapidly penetrating all fields of people like life, production, etc. This change is a big challenge to the medium small businesses in China. Where do the medium small enterprises go? This is a grave question for them to select. So, aiming at this question, the paper first introduces the situation of the new economy and its influence to the economic society, then analyzes the opportunity, threat to the medium small enterprises, expounds the advantages and disadvantages of the medium small enterprises, on which the paper puts forward some strategies for the medium small businesses to go forward.
{"title":"Analysis on the Evolution Strategy of the Medium Small Businesses in China in the New Economy Conditions","authors":"Zhihong Li","doi":"10.12783/dtetr/mcaee2020/35097","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35097","url":null,"abstract":"The new economy has been rapidly penetrating all fields of people like life, production, etc. This change is a big challenge to the medium small businesses in China. Where do the medium small enterprises go? This is a grave question for them to select. So, aiming at this question, the paper first introduces the situation of the new economy and its influence to the economic society, then analyzes the opportunity, threat to the medium small enterprises, expounds the advantages and disadvantages of the medium small enterprises, on which the paper puts forward some strategies for the medium small businesses to go forward.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"141 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91493898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the operation of the low altitude radar platform, the test of electromagnetic environment from the surface is becoming more and more severe, which has directly affected the various performance of radar detection. The land clutter is not only an important component of the radar electromagnetic environment, but also an important feature of the radar electromagnetic environment, therefore, it is necessary to measure and analyze the characteristics of the land clutter. In this paper, a small unmanned aerial vehicle (UAV) is used as a carrier to carry a certain type of pseudorandom code continuous wave radar for land clutter measurement, the clutter characteristics of the measured terrain are analyzed according to the amplitude distribution, temporal correlation and spatial correlation of land clutter, so as to get the statistical feature of the land clutter under different measurement conditions.
{"title":"Land Clutter Characteristics Analysis of Low Altitude Flight Radar Platform","authors":"Xude Cheng, Xuedong Xue, Shuai Zhang, Wei Peng, Jian Qin","doi":"10.12783/dtetr/mcaee2020/35038","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35038","url":null,"abstract":"During the operation of the low altitude radar platform, the test of electromagnetic environment from the surface is becoming more and more severe, which has directly affected the various performance of radar detection. The land clutter is not only an important component of the radar electromagnetic environment, but also an important feature of the radar electromagnetic environment, therefore, it is necessary to measure and analyze the characteristics of the land clutter. In this paper, a small unmanned aerial vehicle (UAV) is used as a carrier to carry a certain type of pseudorandom code continuous wave radar for land clutter measurement, the clutter characteristics of the measured terrain are analyzed according to the amplitude distribution, temporal correlation and spatial correlation of land clutter, so as to get the statistical feature of the land clutter under different measurement conditions.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90334548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35075
Pu-Cong Li, Wen-Liang Zhou, Wei-Jing Kong
It is of great significance for the promotion and popularization of tourism ecommerce to study the factors influencing the adoption of mobile hotel reservation. From the perspective of user experience, taking TTF and UTAUT as the theoretical framework, four external variables including situational awareness, user experience, perceived risk and perceived cost are added to build a mobile hotel reservation adoption model. Based on the fact that senior college students have more travel needs, this paper takes college students as an example to make an empirical analysis. The results show that: task technology matching, situational awareness, effort expectation and performance expectation have a significant impact on user experience, and then affect user behavior intention; social impact, perceived risk and perceived cost also have a significant impact on user behavior intention, among which social impact has the strongest impact on college students' mobile hotel reservation intention. Combined with the analysis of empirical results, some suggestions are put forward for the development and operation promotion of mobile hotel reservation application.
{"title":"Research on the Adoption of Mobile Hotel Reservation Based on TTF and UTAUT","authors":"Pu-Cong Li, Wen-Liang Zhou, Wei-Jing Kong","doi":"10.12783/dtetr/mcaee2020/35075","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35075","url":null,"abstract":"It is of great significance for the promotion and popularization of tourism ecommerce to study the factors influencing the adoption of mobile hotel reservation. From the perspective of user experience, taking TTF and UTAUT as the theoretical framework, four external variables including situational awareness, user experience, perceived risk and perceived cost are added to build a mobile hotel reservation adoption model. Based on the fact that senior college students have more travel needs, this paper takes college students as an example to make an empirical analysis. The results show that: task technology matching, situational awareness, effort expectation and performance expectation have a significant impact on user experience, and then affect user behavior intention; social impact, perceived risk and perceived cost also have a significant impact on user behavior intention, among which social impact has the strongest impact on college students' mobile hotel reservation intention. Combined with the analysis of empirical results, some suggestions are put forward for the development and operation promotion of mobile hotel reservation application.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83206299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.12783/dtetr/mcaee2020/35055
Guofang Wu, Liu Fujia, Xu Shuquan, Chaozhou Chen, Ping Wang
Automobile maintenance information can provide detailed and accurate guidance for diverse, intelligent and complicated automobile maintenance. This paper summarizes the idea of compiling automobile maintenance information. At the same time, it summarizes the 7 basic elements, and introduces the expression methods and requirements according to the elements. Which provides guidance for the preparation of maintenance information that is easy to check, easy to read, complete and can guide the depth of maintenance operations. Finally, it is beneficial to improve the quality and efficiency of information compilation.
{"title":"Thoughts and Methods of Compiling Automobile Maintenance Information","authors":"Guofang Wu, Liu Fujia, Xu Shuquan, Chaozhou Chen, Ping Wang","doi":"10.12783/dtetr/mcaee2020/35055","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35055","url":null,"abstract":"Automobile maintenance information can provide detailed and accurate guidance for diverse, intelligent and complicated automobile maintenance. This paper summarizes the idea of compiling automobile maintenance information. At the same time, it summarizes the 7 basic elements, and introduces the expression methods and requirements according to the elements. Which provides guidance for the preparation of maintenance information that is easy to check, easy to read, complete and can guide the depth of maintenance operations. Finally, it is beneficial to improve the quality and efficiency of information compilation.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84506748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At present, the entrepreneurship of Chinese college students is characterized by high participation rate and low success rate. This study examines the impact of gender role androgyny on college students 'ability to cope with entrepreneurial frustration through questionnaire surveys and literature analysis from two perspectives: college students' ability to actively respond to entrepreneurial failure and learn from entrepreneurial failure. Through the analysis of 514 sample surveys of college students in Guangdong Province, we find that college students with androgyny personality have stronger ability to cope with entrepreneurial frustration, which means that the androgyny personality has a positive impact on entrepreneurship. In this regard, we put forward some suggestions to strengthen the cultivation of androgyny personality to promote the entrepreneurial development of college students.
{"title":"A Study on the Influence of College Students' Androgyny Personality on Entrepreneurial Activity—Analysis Based on Public Data in University","authors":"Zhenhua Zhang, Jing Zhang, Zhi-jian Deng, Mingqin Chen, Jiawen Shen","doi":"10.12783/dtetr/mcaee2020/35082","DOIUrl":"https://doi.org/10.12783/dtetr/mcaee2020/35082","url":null,"abstract":"At present, the entrepreneurship of Chinese college students is characterized by high participation rate and low success rate. This study examines the impact of gender role androgyny on college students 'ability to cope with entrepreneurial frustration through questionnaire surveys and literature analysis from two perspectives: college students' ability to actively respond to entrepreneurial failure and learn from entrepreneurial failure. Through the analysis of 514 sample surveys of college students in Guangdong Province, we find that college students with androgyny personality have stronger ability to cope with entrepreneurial frustration, which means that the androgyny personality has a positive impact on entrepreneurship. In this regard, we put forward some suggestions to strengthen the cultivation of androgyny personality to promote the entrepreneurial development of college students.","PeriodicalId":11264,"journal":{"name":"DEStech Transactions on Engineering and Technology Research","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85893804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}