Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335567
Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.
{"title":"An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone","authors":"Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin","doi":"10.1109/CCST.2009.5335567","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335567","url":null,"abstract":"Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335542
Tien-Sheng Lin, Chu-Chuan Lee, S. Kuo
On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally secure communication in the quantum channel. The security of quantum signature schemes is unconditional security. In this paper, a concept, quantum secret sharing which can be used to reconstruct a special relation among sharing party, is proposed. Based on the property of quantum secret sharing, the proposed mechanism uses multiple pairs of four-particle Greenberger-Horne-Zielinger (GHZ) state to reconstruct a special relation among sharing party. By using this relation, we can support the security of quantum signature under an unsafe routing path to provide the message recovery. From the view of a reusing key, the proposed mechanism is key efficiency.
{"title":"Quantum signature mechanism with GHZ states","authors":"Tien-Sheng Lin, Chu-Chuan Lee, S. Kuo","doi":"10.1109/CCST.2009.5335542","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335542","url":null,"abstract":"On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally secure communication in the quantum channel. The security of quantum signature schemes is unconditional security. In this paper, a concept, quantum secret sharing which can be used to reconstruct a special relation among sharing party, is proposed. Based on the property of quantum secret sharing, the proposed mechanism uses multiple pairs of four-particle Greenberger-Horne-Zielinger (GHZ) state to reconstruct a special relation among sharing party. By using this relation, we can support the security of quantum signature under an unsafe routing path to provide the message recovery. From the view of a reusing key, the proposed mechanism is key efficiency.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335554
L. Stasiak, A. Pacut, Raul Vincente-Garcia
A system for parallel face detection, tracking and recognition in real-time video sequences is being developed. The paper describes its particle filtering based face recognition module, which operates on low quality video sequences and utilizes the results of the preceding phases of face detection and tracking. The temporal information from video sequence is utilized for the purpose of object tracking and identity recognition through knowledge cumulation. The performance of the solution is presented in closed-set and open-set identification scenarios.
{"title":"Face tracking and recognition in low quality video sequences with the use of particle filtering","authors":"L. Stasiak, A. Pacut, Raul Vincente-Garcia","doi":"10.1109/CCST.2009.5335554","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335554","url":null,"abstract":"A system for parallel face detection, tracking and recognition in real-time video sequences is being developed. The paper describes its particle filtering based face recognition module, which operates on low quality video sequences and utilizes the results of the preceding phases of face detection and tracking. The temporal information from video sequence is utilized for the purpose of object tracking and identity recognition through knowledge cumulation. The performance of the solution is presented in closed-set and open-set identification scenarios.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335510
A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera
Segmentation is one of the most time-consuming steps within the whole process of Iris Recognition. By means of Fuzzy Mathematical Morphology and Neural Networks, this new algorithm can fulfill the task of isolating the Iris, not only with an acceptable accuracy, but also with a very high improvement in terms of time. Furthermore, this innovative scheme presents an ontology able to decide whether the features can be extracted, based on previous segmentation. This paper provides a detailed explanation of both the problem to be solved and how this new approach meets the required goals. Current Iris Recognition algorithms may benefit from this new approach, and what is more, the essence of the algorithm can be extended to other biometric segmentation procedures.
{"title":"Iris segmentation based on Fuzzy Mathematical Morphology, Neural Networks and ontologies","authors":"A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera","doi":"10.1109/CCST.2009.5335510","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335510","url":null,"abstract":"Segmentation is one of the most time-consuming steps within the whole process of Iris Recognition. By means of Fuzzy Mathematical Morphology and Neural Networks, this new algorithm can fulfill the task of isolating the Iris, not only with an acceptable accuracy, but also with a very high improvement in terms of time. Furthermore, this innovative scheme presents an ontology able to decide whether the features can be extracted, based on previous segmentation. This paper provides a detailed explanation of both the problem to be solved and how this new approach meets the required goals. Current Iris Recognition algorithms may benefit from this new approach, and what is more, the essence of the algorithm can be extended to other biometric segmentation procedures.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335526
Yu-Jen Chen, Gen-Yih Liao, T. Cheng
Modern nuclear power plants have been adopting open standards in their digital networks to enhance extensibility and interoperability. This also opens another possibility for an attacker to intrude into the networks. To prevent digital networks from being attacked, the U.S. Nuclear Regulatory Commission provides guidelines regarding achieving high reliability and design quality requirements. However, quality assurance in hardware/software components is not sufficient to ensure the security of the overall network system. Security policies and sound system administration are also indispensable factors to rigid security. To enhance the level of security protection in the Taiwan nuclear power plants, this investigation aims at the scope of digital instrumentation and control networks in one of the nuclear power plants in Taiwan, takes advantages of the guidelines of RG 1.152, follows the network security standard of NUREG-0800 Appendix 7.1-D and attempts to plan and design an ISMS based on the methodology of BS7799. The result of this investigation will be able to help nuclear power plants to organize and establish the first phase of Instrumentation and Control Network Security Management System (ICNSMS), which thinks over information and network security issues in a comprehensive perspective.
{"title":"Risk assessment on Instrumentation and Control Network Security Management System for nuclear power plants","authors":"Yu-Jen Chen, Gen-Yih Liao, T. Cheng","doi":"10.1109/CCST.2009.5335526","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335526","url":null,"abstract":"Modern nuclear power plants have been adopting open standards in their digital networks to enhance extensibility and interoperability. This also opens another possibility for an attacker to intrude into the networks. To prevent digital networks from being attacked, the U.S. Nuclear Regulatory Commission provides guidelines regarding achieving high reliability and design quality requirements. However, quality assurance in hardware/software components is not sufficient to ensure the security of the overall network system. Security policies and sound system administration are also indispensable factors to rigid security. To enhance the level of security protection in the Taiwan nuclear power plants, this investigation aims at the scope of digital instrumentation and control networks in one of the nuclear power plants in Taiwan, takes advantages of the guidelines of RG 1.152, follows the network security standard of NUREG-0800 Appendix 7.1-D and attempts to plan and design an ISMS based on the methodology of BS7799. The result of this investigation will be able to help nuclear power plants to organize and establish the first phase of Instrumentation and Control Network Security Management System (ICNSMS), which thinks over information and network security issues in a comprehensive perspective.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335572
S. Michel, A. Schwaninger
This article discusses different ways to enhance human-machine interaction in x-ray screening, especially regarding x-ray image display technology. It represents a summary of the studies conducted as work package 4 of the EU funded VIA project (www.viaproject.eu). First, important theoretical issues regarding the interpretation of x-ray images are discussed. We then explain how to measure x-ray image interpretation competency using tests built into CBT. This is followed by a summary of studies on how to increase the efficiency in x-ray screening using computer-based training (CBT). We then discuss the relevance of so-called image enhancement functions (IEFs) and the value of multi-view x-ray technology. Finally, we present the results of statistical modeling which allowed us to predict x-ray image difficulty and human performance.
{"title":"Human-machine interaction in x-ray screening","authors":"S. Michel, A. Schwaninger","doi":"10.1109/CCST.2009.5335572","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335572","url":null,"abstract":"This article discusses different ways to enhance human-machine interaction in x-ray screening, especially regarding x-ray image display technology. It represents a summary of the studies conducted as work package 4 of the EU funded VIA project (www.viaproject.eu). First, important theoretical issues regarding the interpretation of x-ray images are discussed. We then explain how to measure x-ray image interpretation competency using tests built into CBT. This is followed by a summary of studies on how to increase the efficiency in x-ray screening using computer-based training (CBT). We then discuss the relevance of so-called image enhancement functions (IEFs) and the value of multi-view x-ray technology. Finally, we present the results of statistical modeling which allowed us to predict x-ray image difficulty and human performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134246251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335545
Miguel A. Ferrer, Joan Fabregas, M. Faúndez, J. B. Alonso, C. Travieso
The effect of changing the image resolution over a biometric system based on hand geometry is analyzed in this paper. Image resolution is progressively diminished from an initial 120dpi resolution up to 24dpi. The robustness of the examined system is analyzed with 2 databases and two identifiers. The first database acquires the images of the hand underneath whereas the second database acquires the images over the hand. The first classifier identifies with a multiclass support vector machine whereas the second classifier identifies with a neural network with error correction output codes. The four experiments show that an image resolution of 72dpi offers a good trade-off between performance and image resolution for the 15 geometric features used.
{"title":"Hand geometry identification system performance","authors":"Miguel A. Ferrer, Joan Fabregas, M. Faúndez, J. B. Alonso, C. Travieso","doi":"10.1109/CCST.2009.5335545","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335545","url":null,"abstract":"The effect of changing the image resolution over a biometric system based on hand geometry is analyzed in this paper. Image resolution is progressively diminished from an initial 120dpi resolution up to 24dpi. The robustness of the examined system is analyzed with 2 databases and two identifiers. The first database acquires the images of the hand underneath whereas the second database acquires the images over the hand. The first classifier identifies with a multiclass support vector machine whereas the second classifier identifies with a neural network with error correction output codes. The four experiments show that an image resolution of 72dpi offers a good trade-off between performance and image resolution for the 15 geometric features used.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124075428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human faces and license plates are the most important targets for many digital surveillance systems. The image quality is too poor to recognize the targets due to the uncontrollable effects such as poor light conditions or far distances from the concerned objects. The cameras are zoomed in to make the targets to be discernible. Image interpolation and super-resolution are two popular techniques for removing the blurry effects of the zoomed images. In this paper, the super-resolution approach is applied on the reconstructions of facial and license plate images. Training samples are collected and their pyramidal edge images are built. The intuition idea for enhancing image quality is to preserve the edge data of the high resolutional images. Face and license plate hallucination are constructed. Some experimental results are conducted to show the effectiveness of the proposed approach. Some conclusions and future works are given.
{"title":"The interpolation of face/license-plate images using pyramid-based hallucination","authors":"Chin-Chuan Han, Yan-Shin Tasi, Chen-Ta Hsieh, Chih-Hsun Chou","doi":"10.1109/CCST.2009.5335533","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335533","url":null,"abstract":"Human faces and license plates are the most important targets for many digital surveillance systems. The image quality is too poor to recognize the targets due to the uncontrollable effects such as poor light conditions or far distances from the concerned objects. The cameras are zoomed in to make the targets to be discernible. Image interpolation and super-resolution are two popular techniques for removing the blurry effects of the zoomed images. In this paper, the super-resolution approach is applied on the reconstructions of facial and license plate images. Training samples are collected and their pyramidal edge images are built. The intuition idea for enhancing image quality is to preserve the edge data of the high resolutional images. Face and license plate hallucination are constructed. Some experimental results are conducted to show the effectiveness of the proposed approach. Some conclusions and future works are given.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125996950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335564
Surachai Chitpinityon, S. Sanguanpong, K. Koht-Arsa, Jatuporn Chuchuay
currently, the number of users accessing to the network is significantly increasing which requires a tightly control based on the organization policy. Network access control (NAC) is an essential tool focuses on checking and granting permission. In general, NAC requires specific network devices which may not work with the existing devices. In this paper, a Policy-Based Network Access Control framework has been proposed. The framework defines a set of communication between distinctive devices, regardless of brands, in the system. Moreover, the proposed NAC offers more control to the existing generic network equipments.
{"title":"Design and implementation of open framework for Policy-Based Network Access Control","authors":"Surachai Chitpinityon, S. Sanguanpong, K. Koht-Arsa, Jatuporn Chuchuay","doi":"10.1109/CCST.2009.5335564","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335564","url":null,"abstract":"currently, the number of users accessing to the network is significantly increasing which requires a tightly control based on the organization policy. Network access control (NAC) is an essential tool focuses on checking and granting permission. In general, NAC requires specific network devices which may not work with the existing devices. In this paper, a Policy-Based Network Access Control framework has been proposed. The framework defines a set of communication between distinctive devices, regardless of brands, in the system. Moreover, the proposed NAC offers more control to the existing generic network equipments.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335565
Victoria Cutler, S. Paddock
Threat Image Projection (TIP) is a software system that is used at airports to project images of threat items amongst the passenger baggage being screened by X-ray. The use of TIP is becoming more widespread and is increasingly being included as part of security regulation. This is due to its purported benefits of improved attention and vigilance, and increased exposure to threat items that are linked to improvements in threat detection performance. Further, the data collected by the TIP system can be used to assess individual performance, provide feedback to screeners, and tailor training to specific performance weaknesses; which can generate further performance improvements. However, TIP will only be successful in enhancing security performance if it is used and managed effectively.
{"title":"Use of threat image projection (TIP) to enhance security performance","authors":"Victoria Cutler, S. Paddock","doi":"10.1109/CCST.2009.5335565","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335565","url":null,"abstract":"Threat Image Projection (TIP) is a software system that is used at airports to project images of threat items amongst the passenger baggage being screened by X-ray. The use of TIP is becoming more widespread and is increasingly being included as part of security regulation. This is due to its purported benefits of improved attention and vigilance, and increased exposure to threat items that are linked to improvements in threat detection performance. Further, the data collected by the TIP system can be used to assess individual performance, provide feedback to screeners, and tailor training to specific performance weaknesses; which can generate further performance improvements. However, TIP will only be successful in enhancing security performance if it is used and managed effectively.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}