Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423455
Chang-Gyu Lim, S. Pahk, Younghawa Kim
SDN (Software Defined Networking) is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. It has attracted attentions for even transport networks. For the management of transport network service: especially MPLS-TP(Multiprotocol Label Switching - Transport Profile), we use T-SDN(Transport SDN) controller which manages network services and resources between NBI(North Bound Interface) and SBI(South Bound Interface), based on OpenDaylight. This paper proposes the model of transport SDN and MPSL-TP. With using proposed model, T-SDN controller can make an intra/inter-domain network service easily.
{"title":"Model of transport SDN and MPLS-TP for T-SDN controller","authors":"Chang-Gyu Lim, S. Pahk, Younghawa Kim","doi":"10.1109/ICACT.2016.7423455","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423455","url":null,"abstract":"SDN (Software Defined Networking) is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. It has attracted attentions for even transport networks. For the management of transport network service: especially MPLS-TP(Multiprotocol Label Switching - Transport Profile), we use T-SDN(Transport SDN) controller which manages network services and resources between NBI(North Bound Interface) and SBI(South Bound Interface), based on OpenDaylight. This paper proposes the model of transport SDN and MPSL-TP. With using proposed model, T-SDN controller can make an intra/inter-domain network service easily.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"4 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423578
Ramneek, Patrick Hosein, Won-Jeong Choi, Woojin Seok
There has been a phenomenal growth in wireless and cellular network technologies since the past few years. This has further led to a rapid increase in the number of mobile subscribers and the amount of data traffic. To accommodate the exponentially increasing data traffic, while optimizing the spectral efficiency, different techniques such as offloading, etc. have been adopted by the network operators. However, the demand is expected to eventually exceed the capacity, and hence, there is a need of more efficient network management techniques. Pricing is now considered as one of the effective ways to regulate the user behavior and manage the network resources, while optimizing the Quality of Service (QoS) and the operator revenue, at the same time. By analyzing the key features and limitations of different pricing plans offered by telecom operators in different countries, this paper attempts to facilitate the better understanding of the implications of pricing strategies on the network performance and the user satisfaction.
{"title":"A study of QoS support, performance and pricing of mobile data plans in the USA and South Korea","authors":"Ramneek, Patrick Hosein, Won-Jeong Choi, Woojin Seok","doi":"10.1109/ICACT.2016.7423578","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423578","url":null,"abstract":"There has been a phenomenal growth in wireless and cellular network technologies since the past few years. This has further led to a rapid increase in the number of mobile subscribers and the amount of data traffic. To accommodate the exponentially increasing data traffic, while optimizing the spectral efficiency, different techniques such as offloading, etc. have been adopted by the network operators. However, the demand is expected to eventually exceed the capacity, and hence, there is a need of more efficient network management techniques. Pricing is now considered as one of the effective ways to regulate the user behavior and manage the network resources, while optimizing the Quality of Service (QoS) and the operator revenue, at the same time. By analyzing the key features and limitations of different pricing plans offered by telecom operators in different countries, this paper attempts to facilitate the better understanding of the implications of pricing strategies on the network performance and the user satisfaction.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117255164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423316
S. A. Nsaif, Semog Kim, J. Rhee
We previously introduced a quick removing (QR) approach to improve the high-availability seamless redundancy (HSR) protocol's traffic performance. The idea of the QR approach is to remove the duplicated frame copies from the network when all the nodes have received one copy of the sent frame and begin to receive the second copy. Therefore, the forwarding of those frame copies until they reach the source node, as occurs in standard HSR, is not needed in QR. In our earlier paper, we adopted the store and forward switching mode, whereas in this paper, we present the HSR node's behavior and the QR approach performance using a cut-through switching mode. The performance analysis shows a reduction percentage in frame latency that reaches about 49% compared to the store and forward switching mode. Consequently, this will improve network performance, free more bandwidth, and deliver sent frames quickly to their required destinations, which is a firm condition in many industrial and automation applications.
{"title":"Quick removing (QR) approach using cut-through switching mode","authors":"S. A. Nsaif, Semog Kim, J. Rhee","doi":"10.1109/ICACT.2016.7423316","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423316","url":null,"abstract":"We previously introduced a quick removing (QR) approach to improve the high-availability seamless redundancy (HSR) protocol's traffic performance. The idea of the QR approach is to remove the duplicated frame copies from the network when all the nodes have received one copy of the sent frame and begin to receive the second copy. Therefore, the forwarding of those frame copies until they reach the source node, as occurs in standard HSR, is not needed in QR. In our earlier paper, we adopted the store and forward switching mode, whereas in this paper, we present the HSR node's behavior and the QR approach performance using a cut-through switching mode. The performance analysis shows a reduction percentage in frame latency that reaches about 49% compared to the store and forward switching mode. Consequently, this will improve network performance, free more bandwidth, and deliver sent frames quickly to their required destinations, which is a firm condition in many industrial and automation applications.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423404
Gweondo Jo, Hyoung-Oh Bae, Donghyuk Gwak, Junghoon Oh
Beam switching in the receiving antenna generates replicas in frequency domain, which enables MIMO decoding by using just single RF. It is fascinating to demodulate MIMO signals using single RF, which relieves the volume expansion by MIMO. However, this scheme has not been verified through a test-bed especially in 4×4 MIMO case. This paper presents test results of 4×4 MIMO receiver using single RF chain and beam switching antenna. Test results show the constellation and SNR of decoded 4×4 MIMO signal. When beam switching scheme applies, measured SNR was 12.95 dB on average and 17.85 dB at its maximum. This scheme can apply to massive MIMO system which requires quite a number of antennas and RF circuits.
{"title":"Demodulation of 4×4 MIMO signal using single RF","authors":"Gweondo Jo, Hyoung-Oh Bae, Donghyuk Gwak, Junghoon Oh","doi":"10.1109/ICACT.2016.7423404","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423404","url":null,"abstract":"Beam switching in the receiving antenna generates replicas in frequency domain, which enables MIMO decoding by using just single RF. It is fascinating to demodulate MIMO signals using single RF, which relieves the volume expansion by MIMO. However, this scheme has not been verified through a test-bed especially in 4×4 MIMO case. This paper presents test results of 4×4 MIMO receiver using single RF chain and beam switching antenna. Test results show the constellation and SNR of decoded 4×4 MIMO signal. When beam switching scheme applies, measured SNR was 12.95 dB on average and 17.85 dB at its maximum. This scheme can apply to massive MIMO system which requires quite a number of antennas and RF circuits.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115320957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423368
Xingmin Cui, Yu-hin Tsang, L. Hui, S. Yiu, Bo Luo
Named Data Networking (NDN), as a promising next generation network, has several advantages in scalability, mobility and network efficiency compared with IP-based Internet. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make censorship in NDN more easily to deploy. In this paper we give an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack and deep packet inspection. Existing solutions against censorship in IP-based network and NDN either cannot defend against both attacks or disable the cache mechanism, thus decrease the network efficiency. We propose a scheme which adopts the idea of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache and improve network performance. Security analysis shows that as long as the consumer can connect to a smart router which performs a second-time disguise of the requested name without going through a compromised smart router, he can retrieve his interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to disguise Interest names and Data content.
{"title":"Defend against Internet censorship in named data networking","authors":"Xingmin Cui, Yu-hin Tsang, L. Hui, S. Yiu, Bo Luo","doi":"10.1109/ICACT.2016.7423368","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423368","url":null,"abstract":"Named Data Networking (NDN), as a promising next generation network, has several advantages in scalability, mobility and network efficiency compared with IP-based Internet. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make censorship in NDN more easily to deploy. In this paper we give an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack and deep packet inspection. Existing solutions against censorship in IP-based network and NDN either cannot defend against both attacks or disable the cache mechanism, thus decrease the network efficiency. We propose a scheme which adopts the idea of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache and improve network performance. Security analysis shows that as long as the consumer can connect to a smart router which performs a second-time disguise of the requested name without going through a compromised smart router, he can retrieve his interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to disguise Interest names and Data content.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"2674 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423602
M. Buinevich, K. Izrailov, A. Vladyko
The article describes a automated method for searching of low-level and medium-level vulnerabilities in machine code, which is based on its partial recovering. Vulnerability search is positioned in the field of telecommunication devices. All various and typical vulnerabilities in source code and algorithms for its search is given. The article contains examples of usage method and its utility. There is forecast to develop methods and utilities in the near future.
{"title":"Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search","authors":"M. Buinevich, K. Izrailov, A. Vladyko","doi":"10.1109/ICACT.2016.7423602","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423602","url":null,"abstract":"The article describes a automated method for searching of low-level and medium-level vulnerabilities in machine code, which is based on its partial recovering. Vulnerability search is positioned in the field of telecommunication devices. All various and typical vulnerabilities in source code and algorithms for its search is given. The article contains examples of usage method and its utility. There is forecast to develop methods and utilities in the near future.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423598
Shahid Hussain, Young-Chon Kim
Real time monitoring and control of wind power farm (WPF) require a highly reliable communication network infrastructure. The monitoring and control can be guaranteed through the communication network by using redundant resources and ensuring quality of service (QoS) for different applications. In this paper, we study and simulate fault-resilient network architecture for monitoring and controlling of WPF. First, communication network topologies are explored. Then we propose a fault-resilient communication network architecture which consists of three different levels: (1) data generation level, (2) data aggregation level, and (3) control center level. Each level is defined by its function, physical location, network topology, communication link bandwidth, redundant nodes, and links. In accordance to IEC 61400-25 standard, the monitoring traffic of wind turbine is classified into critical and non-critical data according to the required QoS. Due to low cost, non-proprietary standard, and guaranteed real-time services, the Ethernet technologies are currently used in various industrial applications. Several network failure scenarios based on Ethernet technology are used to simulate the network architecture through OPNET. The performance of the network architecture is evaluated on the basis of the amount of received data, end-to-end delay, and data loss at control center. The simulation results show that the communication network architecture can guarantee the transmission of WPF critical data.
{"title":"Fault resilient communication network architecture for monitoring and control of wind power farms","authors":"Shahid Hussain, Young-Chon Kim","doi":"10.1109/ICACT.2016.7423598","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423598","url":null,"abstract":"Real time monitoring and control of wind power farm (WPF) require a highly reliable communication network infrastructure. The monitoring and control can be guaranteed through the communication network by using redundant resources and ensuring quality of service (QoS) for different applications. In this paper, we study and simulate fault-resilient network architecture for monitoring and controlling of WPF. First, communication network topologies are explored. Then we propose a fault-resilient communication network architecture which consists of three different levels: (1) data generation level, (2) data aggregation level, and (3) control center level. Each level is defined by its function, physical location, network topology, communication link bandwidth, redundant nodes, and links. In accordance to IEC 61400-25 standard, the monitoring traffic of wind turbine is classified into critical and non-critical data according to the required QoS. Due to low cost, non-proprietary standard, and guaranteed real-time services, the Ethernet technologies are currently used in various industrial applications. Several network failure scenarios based on Ethernet technology are used to simulate the network architecture through OPNET. The performance of the network architecture is evaluated on the basis of the amount of received data, end-to-end delay, and data loss at control center. The simulation results show that the communication network architecture can guarantee the transmission of WPF critical data.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"19 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423496
SangYeob Oh, Soon-Ki Jo, Jongsoo Seo
The usual built-in navigation in a car needs to be upgraded periodically due to the update and change of road conditions. To solve those problems, a cloud network navigation system has been launched which can automatically request the information of roads needed. However sending the information to each user in a specific area individually is very inefficient in the radio resource utilization aspect. In this paper, we model the transmission architecture that can send geographical information to the vehicle using RSUs, and propose a new method called Zipping algorithm. Our proposed algorithm groups the car in efficient way and due to our scheme; the total transmission time will be minimized. To make this possible, we use N times M/M/N which is an extension of M/M/1 model of queueing theory. We show the different traffic congestion of the road depends on the weekdays and weekends. Then, we show the case of car groupings depending on the various Zipping time given. We analyze the above result by simulating the transmission efficiency and compare with the performance of unicast system and that of our proposed algorithm.
{"title":"Zipping transmission for infrastructure-assisted cloud network navigation system","authors":"SangYeob Oh, Soon-Ki Jo, Jongsoo Seo","doi":"10.1109/ICACT.2016.7423496","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423496","url":null,"abstract":"The usual built-in navigation in a car needs to be upgraded periodically due to the update and change of road conditions. To solve those problems, a cloud network navigation system has been launched which can automatically request the information of roads needed. However sending the information to each user in a specific area individually is very inefficient in the radio resource utilization aspect. In this paper, we model the transmission architecture that can send geographical information to the vehicle using RSUs, and propose a new method called Zipping algorithm. Our proposed algorithm groups the car in efficient way and due to our scheme; the total transmission time will be minimized. To make this possible, we use N times M/M/N which is an extension of M/M/1 model of queueing theory. We show the different traffic congestion of the road depends on the weekdays and weekends. Then, we show the case of car groupings depending on the various Zipping time given. We analyze the above result by simulating the transmission efficiency and compare with the performance of unicast system and that of our proposed algorithm.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423546
P. Sedtheetorn, T. Chulajata
This paper introduces original analysis on the uplink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to the accurate Gaussian-based evaluation, a closed-form expression of the spectral efficiency is proposed. Also, this work is extended to the practical case in which the number of active users is random. Validated by the simulation, the presented closed form benefits us to calculate the exact average of uplink NOMA spectral efficiency at different system parameters, such as signal-to-noise ratio, active probability, number of employed subcarriers.
{"title":"Uplink spectral efficiency for non-orthogonal multiple access in Rayleigh fading","authors":"P. Sedtheetorn, T. Chulajata","doi":"10.1109/ICACT.2016.7423546","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423546","url":null,"abstract":"This paper introduces original analysis on the uplink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to the accurate Gaussian-based evaluation, a closed-form expression of the spectral efficiency is proposed. Also, this work is extended to the practical case in which the number of active users is random. Validated by the simulation, the presented closed form benefits us to calculate the exact average of uplink NOMA spectral efficiency at different system parameters, such as signal-to-noise ratio, active probability, number of employed subcarriers.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130760669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423443
Wensong Wang, Q. Cao, Yi Wang, Shuhui Yang, Yinchao Chen
A design scheme is proposed for wireless interconnection communication between chips. The PCB medium channel is built with absorber layers. Two chip pin antennas are designed and simulated. Their scattering parameters are extracted and compared with three different cases. It evaluates the bit error rate (BER) performance via a interconnect communication model with a coherent binary phase shift keying (BPSK) modulator and demodulator. Simulation results show that the designed system performance degrades with the increase of separation distance and signal noise ratio. A high data rate at 1 Gb/s with a low BER <; 10-5 can be achieved with the transmitted power of 10 dBm.
{"title":"Inter-chip wireless interconnect system over PCB medium channels","authors":"Wensong Wang, Q. Cao, Yi Wang, Shuhui Yang, Yinchao Chen","doi":"10.1109/ICACT.2016.7423443","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423443","url":null,"abstract":"A design scheme is proposed for wireless interconnection communication between chips. The PCB medium channel is built with absorber layers. Two chip pin antennas are designed and simulated. Their scattering parameters are extracted and compared with three different cases. It evaluates the bit error rate (BER) performance via a interconnect communication model with a coherent binary phase shift keying (BPSK) modulator and demodulator. Simulation results show that the designed system performance degrades with the increase of separation distance and signal noise ratio. A high data rate at 1 Gb/s with a low BER <; 10-5 can be achieved with the transmitted power of 10 dBm.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}