Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266500
M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel
After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.
《图像处理在线期刊》(Image Processing On Line journal, IPOL)经过四年的发展,本文首次对其科技发展进行了分析和综述。从期刊一开始就遇到和克服的主要问题被描述为期刊的目的,重点是建立一个关于主要图像处理主题的艺术状态。本文还首先分析了作者/出版商对在线演示的批评,并提出了一种新的演示系统模块化架构的建议。
{"title":"IPOL: A new journal for fully reproducible research; analysis of four years development","authors":"M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel","doi":"10.1109/NTMS.2015.7266500","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266500","url":null,"abstract":"After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133499697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266497
João M. G. Duarte, E. Cerqueira, L. Villas
The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.
{"title":"Indoor patient monitoring through Wi-Fi and mobile computing","authors":"João M. G. Duarte, E. Cerqueira, L. Villas","doi":"10.1109/NTMS.2015.7266497","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266497","url":null,"abstract":"The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"87 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266525
Kashif Habib, W. Leister
The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.
{"title":"Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures","authors":"Kashif Habib, W. Leister","doi":"10.1109/NTMS.2015.7266525","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266525","url":null,"abstract":"The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266469
Sana Tmar-Ben Hamida, B. Ahmed
An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.
{"title":"A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis","authors":"Sana Tmar-Ben Hamida, B. Ahmed","doi":"10.1109/NTMS.2015.7266469","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266469","url":null,"abstract":"An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121489155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266474
Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi
IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.
{"title":"Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks","authors":"Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi","doi":"10.1109/NTMS.2015.7266474","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266474","url":null,"abstract":"IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266484
M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar
Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.
{"title":"Design, implementation and evaluation of SDN-based resource management model","authors":"M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar","doi":"10.1109/NTMS.2015.7266484","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266484","url":null,"abstract":"Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266480
G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin
This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.
{"title":"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)","authors":"G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin","doi":"10.1109/NTMS.2015.7266480","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266480","url":null,"abstract":"This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266470
Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho
A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.
{"title":"Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings","authors":"Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho","doi":"10.1109/NTMS.2015.7266470","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266470","url":null,"abstract":"A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128163995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266460
Randika Upathilake, Yingkun Li, A. Matrawy
As the World Wide Web has increasingly become a necessity in daily life, the acute need to safeguard user privacy and security has become manifestly apparent. After users realized that browser cookies could allow websites to track their actions without permission or notification, many have chosen to reject cookies in order to protect their privacy. However, more recently, methods of fingerprinting a web browser have become an increasingly common practice. In this paper, we classify web browser fingerprinting into four main categories: (1) Browser Specific, (2) Canvas, (3) JavaScript Engine, and (4) Cross-browser. We then summarize the privacy and security implications, discuss commercial fingerprinting techniques, and finally present some detection and prevention methods.
{"title":"A classification of web browser fingerprinting techniques","authors":"Randika Upathilake, Yingkun Li, A. Matrawy","doi":"10.1109/NTMS.2015.7266460","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266460","url":null,"abstract":"As the World Wide Web has increasingly become a necessity in daily life, the acute need to safeguard user privacy and security has become manifestly apparent. After users realized that browser cookies could allow websites to track their actions without permission or notification, many have chosen to reject cookies in order to protect their privacy. However, more recently, methods of fingerprinting a web browser have become an increasingly common practice. In this paper, we classify web browser fingerprinting into four main categories: (1) Browser Specific, (2) Canvas, (3) JavaScript Engine, and (4) Cross-browser. We then summarize the privacy and security implications, discuss commercial fingerprinting techniques, and finally present some detection and prevention methods.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266507
Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif
Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.
{"title":"Modeling information flow properties with UML","authors":"Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif","doi":"10.1109/NTMS.2015.7266507","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266507","url":null,"abstract":"Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}