Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.773063
Yongbing Zhang
In this paper, a new adaptive channel assignment algorithm in cellular mobile systems is proposed and examined in comparison with a dynamic load balancing strategy, the load balancing with selective borrowing (LBSB) algorithm. The new algorithm is based on the fixed channel assignment strategy as its underlying scheme, that is, it assigns a fixed number of channels to each cell permanently. At run-time, it attempts to balance dynamically the imbalance of available channels between the cells. Two thresholds, light and heavy, are introduced to classify the cells in the system into three classes according to the number of available channels in the cells: light, moderate, and heavy cells. Each cell is assumed to know its own exact state (the number of the available channels) and to which class it belongs at any given instant. The MSC keeps the state information of the cells and runs the channel borrowing algorithm to borrow free channels from the light cells for the heavy cells whenever it finds any heavy cells. The moderate cells are not allowed to borrow any channels from any other cells nor lend any channels to any other cells. When making a borrowing decision, the states of the co-channel cells of a potential lender cell are also taken into account to prevent a potential channel borrowing loop. The results indicate that the new algorithm performs better than the LBSB algorithm with respect to the call blocking probability.
{"title":"A new adaptive channel assignment algorithm in cellular mobile systems","authors":"Yongbing Zhang","doi":"10.1109/HICSS.1999.773063","DOIUrl":"https://doi.org/10.1109/HICSS.1999.773063","url":null,"abstract":"In this paper, a new adaptive channel assignment algorithm in cellular mobile systems is proposed and examined in comparison with a dynamic load balancing strategy, the load balancing with selective borrowing (LBSB) algorithm. The new algorithm is based on the fixed channel assignment strategy as its underlying scheme, that is, it assigns a fixed number of channels to each cell permanently. At run-time, it attempts to balance dynamically the imbalance of available channels between the cells. Two thresholds, light and heavy, are introduced to classify the cells in the system into three classes according to the number of available channels in the cells: light, moderate, and heavy cells. Each cell is assumed to know its own exact state (the number of the available channels) and to which class it belongs at any given instant. The MSC keeps the state information of the cells and runs the channel borrowing algorithm to borrow free channels from the light cells for the heavy cells whenever it finds any heavy cells. The moderate cells are not allowed to borrow any channels from any other cells nor lend any channels to any other cells. When making a borrowing decision, the states of the co-channel cells of a potential lender cell are also taken into account to prevent a potential channel borrowing loop. The results indicate that the new algorithm performs better than the LBSB algorithm with respect to the call blocking probability.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116217301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772766
P. Handa, R. A. Schwartz, Ashish Tiwari
At the American stock exchange (Amex), electronically-routed orders (referred to as system orders) from "upstairs" traders interact on the Amex trading floor with each other and with orders worked by brokers. In addition, we see that brokers receive orders from clients and other traders who have chosen to involve a floor broker as an intermediary in the trading process. The quality of the trading outcomes for system orders, compared to brokered orders, differs considerably, and these results have important implications for market structure design. The paper considers electronic orders vs. floor brokered orders.
{"title":"A tale of two trading venues: electronically delivered orders vs. floor brokered orders on the American stock exchange","authors":"P. Handa, R. A. Schwartz, Ashish Tiwari","doi":"10.1109/HICSS.1999.772766","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772766","url":null,"abstract":"At the American stock exchange (Amex), electronically-routed orders (referred to as system orders) from \"upstairs\" traders interact on the Amex trading floor with each other and with orders worked by brokers. In addition, we see that brokers receive orders from clients and other traders who have chosen to involve a floor broker as an intermediary in the trading process. The quality of the trading outcomes for system orders, compared to brokered orders, differs considerably, and these results have important implications for market structure design. The paper considers electronic orders vs. floor brokered orders.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116502612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.773052
A. Röhm, G. Pernul
Existing electronic markets in the open network Internet often show a lack of security and fairness. New forms of trading are just coming up and the variety of different market structures and digital goods we will probably see in the future is yet unthinkable. Therefore, an infrastructure for future electronic markets has to support the realization of different market structures by providing secure and fair services in a transparent way and to allow dynamic changes of market structures. For example, it should allow that the market structure changes from an auction to a direct search market on the fly. We first elaborate an electronic market model and use it to describe how an open infrastructure for electronic markets should be realized. Finally we introduce the project COPS (Commercial Protocols and Services) in which we realize an infrastructure for secure and fair electronic markets.
{"title":"COPS: a model and infrastructure for secure and fair electronic markets","authors":"A. Röhm, G. Pernul","doi":"10.1109/HICSS.1999.773052","DOIUrl":"https://doi.org/10.1109/HICSS.1999.773052","url":null,"abstract":"Existing electronic markets in the open network Internet often show a lack of security and fairness. New forms of trading are just coming up and the variety of different market structures and digital goods we will probably see in the future is yet unthinkable. Therefore, an infrastructure for future electronic markets has to support the realization of different market structures by providing secure and fair services in a transparent way and to allow dynamic changes of market structures. For example, it should allow that the market structure changes from an auction to a direct search market on the fly. We first elaborate an electronic market model and use it to describe how an open infrastructure for electronic markets should be realized. Finally we introduce the project COPS (Commercial Protocols and Services) in which we realize an infrastructure for secure and fair electronic markets.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121543045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772698
U. Nuldén
This paper discusses an educational philosophy and proposes a framework for structuring introductory courses in higher education. Two elements are central in the philosophy: First, the notion of a thematic module (TM) which is a unit for studying a limited subject matter or topic. Second, asynchronous learning networks (ALN), which is the use of computer mediated communication for time and place independent collaborative learning. To evaluate the philosophy, a course, "Introduction to Informatics", was designed and offered to forty-three business administration majors. Three central assumptions of the philosophy guided the design and evaluation of the course. First, thematic modules are appropriate for structuring an introductory course, second, asynchronous learning network is a viable environment to enhance thematic modules, and third, TM in ALN is a suitable approach for educators who wish to engage students and fellow educators in constructive and collaborative learning activities. To investigate the assumptions, both qualitative and quantitative data were collected and analyzed. The data gathered are very limited, but give indication for further research. The paper ends with a tentative framework for design of introductory courses using TM and ALN.
{"title":"Thematic modules in an asynchronous learning network: designing introductory courses","authors":"U. Nuldén","doi":"10.1109/HICSS.1999.772698","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772698","url":null,"abstract":"This paper discusses an educational philosophy and proposes a framework for structuring introductory courses in higher education. Two elements are central in the philosophy: First, the notion of a thematic module (TM) which is a unit for studying a limited subject matter or topic. Second, asynchronous learning networks (ALN), which is the use of computer mediated communication for time and place independent collaborative learning. To evaluate the philosophy, a course, \"Introduction to Informatics\", was designed and offered to forty-three business administration majors. Three central assumptions of the philosophy guided the design and evaluation of the course. First, thematic modules are appropriate for structuring an introductory course, second, asynchronous learning network is a viable environment to enhance thematic modules, and third, TM in ALN is a suitable approach for educators who wish to engage students and fellow educators in constructive and collaborative learning activities. To investigate the assumptions, both qualitative and quantitative data were collected and analyzed. The data gathered are very limited, but give indication for further research. The paper ends with a tentative framework for design of introductory courses using TM and ALN.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772820
D. Schonfeld, D. Lelescu
Multimedia data is generally stored in compressed form in order to efficiently utilize the available storage facilities. Access to archives is dependent on our ability to browse compressed multimedia information-retrieval and tracking from coded video databases. In this paper, a novel visual search engine for video retrieval and tracking from compressed multimedia databases is proposed. The goal of the project is the implementation of a visual browser that operates in a distributed environment where users initiate video searches and retrieve relevant video information simultaneously from multiple video archives. Being presented with a query in the form of template images of objects, the system operates on the compressed video to find the images or video sequences where those objects are present and their positions in the image. Upon user's request, the system will decompress and display only the video sequences of interest.
{"title":"VORTEX: Video retrieval and tracking from compressed multimedia databases-visual search engine","authors":"D. Schonfeld, D. Lelescu","doi":"10.1109/HICSS.1999.772820","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772820","url":null,"abstract":"Multimedia data is generally stored in compressed form in order to efficiently utilize the available storage facilities. Access to archives is dependent on our ability to browse compressed multimedia information-retrieval and tracking from coded video databases. In this paper, a novel visual search engine for video retrieval and tracking from compressed multimedia databases is proposed. The goal of the project is the implementation of a visual browser that operates in a distributed environment where users initiate video searches and retrieve relevant video information simultaneously from multiple video archives. Being presented with a query in the form of template images of objects, the system operates on the compressed video to find the images or video sequences where those objects are present and their positions in the image. Upon user's request, the system will decompress and display only the video sequences of interest.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124366210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772775
R. Harris, R. Davison, G. Vreede, D. Vogel
Our efforts to increase the deployment of IT among the less advantaged sections of society are sometimes hampered by a variety of inter-related forces. The purpose of this paper is to identify some positive steps that can help cultivate a research discipline for the subject of ITDC. Some of the issues we address are: (1) Can ITDC be conceived as a coherent body of knowledge? (2) What constitutes the discipline of ITDC, and what makes it different from research into the use of IT in developed countries? (3) What are the common elements among the papers that have been presented at this conference which might help us to define the discipline? (4) What can be done now to attract qualified individuals to our cause and to encourage quality research into the pressing issues in ITDC which are at hand? (5) What can be done to foster the development of a cumulative body of research which can be used to advocate the cause of the information poor and to satisfy their need for information? (6) How can we raise the profile of the subject among the international research community in order to accelerate the creation and dissemination of relevant and appropriate knowledge and begin to reduce the "information gap"? (7) How can the international IS research community be persuaded of the value of research into ITDC, such that developed countries can learn valuable lessons too?.
{"title":"Cultivating a research discipline for IT in developing countries (ITDC)","authors":"R. Harris, R. Davison, G. Vreede, D. Vogel","doi":"10.1109/HICSS.1999.772775","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772775","url":null,"abstract":"Our efforts to increase the deployment of IT among the less advantaged sections of society are sometimes hampered by a variety of inter-related forces. The purpose of this paper is to identify some positive steps that can help cultivate a research discipline for the subject of ITDC. Some of the issues we address are: (1) Can ITDC be conceived as a coherent body of knowledge? (2) What constitutes the discipline of ITDC, and what makes it different from research into the use of IT in developed countries? (3) What are the common elements among the papers that have been presented at this conference which might help us to define the discipline? (4) What can be done now to attract qualified individuals to our cause and to encourage quality research into the pressing issues in ITDC which are at hand? (5) What can be done to foster the development of a cumulative body of research which can be used to advocate the cause of the information poor and to satisfy their need for information? (6) How can we raise the profile of the subject among the international research community in order to accelerate the creation and dissemination of relevant and appropriate knowledge and begin to reduce the \"information gap\"? (7) How can the international IS research community be persuaded of the value of research into ITDC, such that developed countries can learn valuable lessons too?.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772691
J. Swan, S. Newell, M. Robertson
This paper compares adoption and design of collaborative computer-aided technologies for operations management within manufacturing firms in Sweden and the UK and examines the influence of technology suppliers and professional associations (PAs) in shaping these processes. Members of PAs in each country were surveyed and interviews were conducted with key stakeholders. These revealed differences in diffusion with earlier adoption of standardized packages in the UK and a stronger reliance on customized systems in Sweden. Tightly codified best practice solutions have been pushed more strongly both by technology suppliers and also via PA networks in the UK than in Sweden. This may have generated problems for UK firms because notions of best practice under-emphasize the context-sensitivity of the technology and the need for organizational redesign. A preliminary framework will be presented to explain these differences.
{"title":"Explaining national differences in the adoption and design of collaborative technologies for operations management","authors":"J. Swan, S. Newell, M. Robertson","doi":"10.1109/HICSS.1999.772691","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772691","url":null,"abstract":"This paper compares adoption and design of collaborative computer-aided technologies for operations management within manufacturing firms in Sweden and the UK and examines the influence of technology suppliers and professional associations (PAs) in shaping these processes. Members of PAs in each country were surveyed and interviews were conducted with key stakeholders. These revealed differences in diffusion with earlier adoption of standardized packages in the UK and a stronger reliance on customized systems in Sweden. Tightly codified best practice solutions have been pushed more strongly both by technology suppliers and also via PA networks in the UK than in Sweden. This may have generated problems for UK firms because notions of best practice under-emphasize the context-sensitivity of the technology and the need for organizational redesign. A preliminary framework will be presented to explain these differences.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128185244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772849
Suck-Chul Yoon
The paper analyzed the case of a Korean company that imported industrial technology to produce diesel engines. The main objective of the paper was to develop a theoretical model to describe the systemic nature of industrial technology transfer during a case methodology. The model has identified four systemic factors affecting the commercial feasibility of technology.
{"title":"Systemic factors affecting the commercial feasibility of technology","authors":"Suck-Chul Yoon","doi":"10.1109/HICSS.1999.772849","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772849","url":null,"abstract":"The paper analyzed the case of a Korean company that imported industrial technology to produce diesel engines. The main objective of the paper was to develop a theoretical model to describe the systemic nature of industrial technology transfer during a case methodology. The model has identified four systemic factors affecting the commercial feasibility of technology.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134268273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.773013
M. Succi, Zhiping Walter
TAM (Technology Acceptance Model) has been developed to explain user acceptance of new information technologies. Empirical studies of this and other models however, have based their conclusions on surveys of middle managers or MBA students. Given strong differences between middle managers or MBAs and physicians, we argue that these models may not predict the attitudes of physicians towards new IT very well. Therefore, we propose to extend TAM by adding a new dimension of perceived usefulness: perceived usefulness towards professional status. Our paper suggests strategies that health care decision makers may take to influence physicians' attitudes in a positive way.
{"title":"Theory of user acceptance of information technologies: an examination of health care professionals","authors":"M. Succi, Zhiping Walter","doi":"10.1109/HICSS.1999.773013","DOIUrl":"https://doi.org/10.1109/HICSS.1999.773013","url":null,"abstract":"TAM (Technology Acceptance Model) has been developed to explain user acceptance of new information technologies. Empirical studies of this and other models however, have based their conclusions on surveys of middle managers or MBA students. Given strong differences between middle managers or MBAs and physicians, we argue that these models may not predict the attitudes of physicians towards new IT very well. Therefore, we propose to extend TAM by adding a new dimension of perceived usefulness: perceived usefulness towards professional status. Our paper suggests strategies that health care decision makers may take to influence physicians' attitudes in a positive way.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772722
J. George, John R. Carlson
Electronic communication is becoming more pervasive worldwide with the spread of the Internet, especially through the World Wide Web and electronic mail. Yet, as with all human communication, electronic communication is vulnerable to deceit on the part of senders, and to the less than stellar performance of most people at defecting deceit aimed at them. Despite considerable research over the years into both computer-mediated communication and into deception, there has been little if any research at the intersection of these two research streams. In this paper, we review these two streams and suggest a research model for investigating their intersection, focusing on group support systems as an electronic medium. We focus specifically on research questions concerning how successful people are at deceiving others through computer-mediated communication, and how successful people are at detecting such deception. We also suggest three propositions guiding research in this area.
{"title":"Group support systems and deceptive communication","authors":"J. George, John R. Carlson","doi":"10.1109/HICSS.1999.772722","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772722","url":null,"abstract":"Electronic communication is becoming more pervasive worldwide with the spread of the Internet, especially through the World Wide Web and electronic mail. Yet, as with all human communication, electronic communication is vulnerable to deceit on the part of senders, and to the less than stellar performance of most people at defecting deceit aimed at them. Despite considerable research over the years into both computer-mediated communication and into deception, there has been little if any research at the intersection of these two research streams. In this paper, we review these two streams and suggest a research model for investigating their intersection, focusing on group support systems as an electronic medium. We focus specifically on research questions concerning how successful people are at deceiving others through computer-mediated communication, and how successful people are at detecting such deception. We also suggest three propositions guiding research in this area.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130766784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}