Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045106
Li Wang, Tenghui Ke, Mei Song, Yifei Wei, Yinglei Teng
In order to improve the performance of security and QoS provisioning of mobile cooperative network, this paper proposes an efficient approach for optimal secure relay selection, by considering secrecy capacity (SC). Firstly, the channel states are divided into several levels due to their received signal-to-noise ratio (SNR), in the meanwhile, first order finite-state Markov model is employed to indicate the time-varying Rayleigh fading channel. Secondly, Restless Multi-armed Bandit model is involved to demonstrate the secure relay selection problem according to the correlated channel states and the state transition probabilities. Finally, simulation results witnessed the efficiency of the proposed approach.
{"title":"Research on secrecy capacity oriented relay selection for mobile cooperative networks","authors":"Li Wang, Tenghui Ke, Mei Song, Yifei Wei, Yinglei Teng","doi":"10.1109/CCIS.2011.6045106","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045106","url":null,"abstract":"In order to improve the performance of security and QoS provisioning of mobile cooperative network, this paper proposes an efficient approach for optimal secure relay selection, by considering secrecy capacity (SC). Firstly, the channel states are divided into several levels due to their received signal-to-noise ratio (SNR), in the meanwhile, first order finite-state Markov model is employed to indicate the time-varying Rayleigh fading channel. Secondly, Restless Multi-armed Bandit model is involved to demonstrate the secure relay selection problem according to the correlated channel states and the state transition probabilities. Finally, simulation results witnessed the efficiency of the proposed approach.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045059
Liutong Xu, Jie Yang
Infrastructure-as-a-service (IaaS), it is typically a platform virtualization environment as a service, which deploys IT infrastructure as virtual machines in a provider's data center. There are many open source cloud platforms such as Eucalyptus, Open Nebula, oVirt, Enomaly ECP etc, that can help to transform enterprises' or organizations' existing IT infrastructure into a private or hybrid cloud. With the growing popularity of IaaS, resource monitoring and VM (Virtual Machine) monitoring has became more and more important in cloud management. But all those open source cloud platforms cannot satisfy the requirement of cloud environment monitoring and management completely. In this paper, we present a novel IaaS management platform based on Eucalyptus, which uses Libvirt management library, SNMP (simple network management protocol) and VMM (Virtual Machine Monitor) to get more abilities to manage and monitor the cloud. This platform provides some new features which can manage and monitor resources and VM status in the cloud environment and give a good user experience.
{"title":"A management platform for Eucalyptus-based IaaS","authors":"Liutong Xu, Jie Yang","doi":"10.1109/CCIS.2011.6045059","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045059","url":null,"abstract":"Infrastructure-as-a-service (IaaS), it is typically a platform virtualization environment as a service, which deploys IT infrastructure as virtual machines in a provider's data center. There are many open source cloud platforms such as Eucalyptus, Open Nebula, oVirt, Enomaly ECP etc, that can help to transform enterprises' or organizations' existing IT infrastructure into a private or hybrid cloud. With the growing popularity of IaaS, resource monitoring and VM (Virtual Machine) monitoring has became more and more important in cloud management. But all those open source cloud platforms cannot satisfy the requirement of cloud environment monitoring and management completely. In this paper, we present a novel IaaS management platform based on Eucalyptus, which uses Libvirt management library, SNMP (simple network management protocol) and VMM (Virtual Machine Monitor) to get more abilities to manage and monitor the cloud. This platform provides some new features which can manage and monitor resources and VM status in the cloud environment and give a good user experience.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134530604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045037
Qifei Zhang, Zhiqing Liu
With the rapid growth of Graphics Processing Unit (GPU) processing capability, using GPU as a coprocessor to assist the CPU in parallel computing has become indispensable. CUDA (Compute Unified Device Architecture) programming model also gives C/C++ language support which makes programming easily. This paper details how to design an engine of computer Go with Monte-Carlo algorithm which is based on GPU with Fermi architecture. We analyze the characteristics of Monte-Carlo algorithm, combined with the CUDA architecture features, divide the algorithm into various sub-modules for GPU computing fast and easily.
随着图形处理器(Graphics Processing Unit, GPU)处理能力的快速增长,利用GPU作为协处理器来辅助CPU进行并行计算已成为不可缺少的功能。CUDA(计算统一设备体系结构)编程模型还提供了C/ c++语言支持,使编程变得容易。本文详细介绍了如何利用基于费米架构GPU的蒙特卡罗算法设计计算机围棋引擎。分析了蒙特卡罗算法的特点,结合CUDA架构的特点,将算法划分为各个子模块,便于GPU快速、方便地进行计算。
{"title":"A parallel design of computer Go engine on CUDA-enabled GPU","authors":"Qifei Zhang, Zhiqing Liu","doi":"10.1109/CCIS.2011.6045037","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045037","url":null,"abstract":"With the rapid growth of Graphics Processing Unit (GPU) processing capability, using GPU as a coprocessor to assist the CPU in parallel computing has become indispensable. CUDA (Compute Unified Device Architecture) programming model also gives C/C++ language support which makes programming easily. This paper details how to design an engine of computer Go with Monte-Carlo algorithm which is based on GPU with Fermi architecture. We analyze the characteristics of Monte-Carlo algorithm, combined with the CUDA architecture features, divide the algorithm into various sub-modules for GPU computing fast and easily.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133166173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045146
L. Peng, Lun Xie, Fei Wu, Chongjian Li
This paper proposes a control method of synchronous motor without speed sensor based on adaptive extended Kalman filter (EKF). The adaptive EKF observes the stator voltages and currents to estimate the rotor speed and the air-gap flux angle. This adaptive method is applied to adjust the noise mean and covariance to track the dynamic noise, so as to improve the estimation precision. The simulation results show that the adaptive EKF can estimate the speed and the position of air-gap flux accurately and with good static and dynamic performance.
{"title":"Field-oriented control of synchronous motor based on adaptive extended Kalman filter","authors":"L. Peng, Lun Xie, Fei Wu, Chongjian Li","doi":"10.1109/CCIS.2011.6045146","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045146","url":null,"abstract":"This paper proposes a control method of synchronous motor without speed sensor based on adaptive extended Kalman filter (EKF). The adaptive EKF observes the stator voltages and currents to estimate the rotor speed and the air-gap flux angle. This adaptive method is applied to adjust the noise mean and covariance to track the dynamic noise, so as to improve the estimation precision. The simulation results show that the adaptive EKF can estimate the speed and the position of air-gap flux accurately and with good static and dynamic performance.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045092
F. Lamberti, A. Sanna, C. Demartini
Cloud computing is regarded to as an impressive technology, as software and hardware resources become invisible to the users (they “fade” in the cloud), and they replaced by services. In this sense, cloud computing can be considered as an evolution of former virtualization approaches, with service providers delivering on-demand access to various back-end frameworks and front-end applications. This approach requires to strongly trust these providers, as users are forced to give up control on programs and data that were previously hosted on their machines. A possible way to alleviate this drawback could be to enable users “participate” to the cloud with their own applications, thus creating “personal” clouds, which could be even shared with other users. In this paper, we present a prototype implementation of the above idea, which consists of a framework that allows today's applications to be put into the cloud by exploiting user interface automation and accessibility information embedded in modern window-based graphics toolkits.
{"title":"How to move your own applications into the cloud by exploiting interfaces automation and accessibility features","authors":"F. Lamberti, A. Sanna, C. Demartini","doi":"10.1109/CCIS.2011.6045092","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045092","url":null,"abstract":"Cloud computing is regarded to as an impressive technology, as software and hardware resources become invisible to the users (they “fade” in the cloud), and they replaced by services. In this sense, cloud computing can be considered as an evolution of former virtualization approaches, with service providers delivering on-demand access to various back-end frameworks and front-end applications. This approach requires to strongly trust these providers, as users are forced to give up control on programs and data that were previously hosted on their machines. A possible way to alleviate this drawback could be to enable users “participate” to the cloud with their own applications, thus creating “personal” clouds, which could be even shared with other users. In this paper, we present a prototype implementation of the above idea, which consists of a framework that allows today's applications to be put into the cloud by exploiting user interface automation and accessibility information embedded in modern window-based graphics toolkits.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045079
Lei Zhang, Kaiping Li, Bin Wu
SQL as a database language has been widely used in the modern society. Its function mainly focuses on the data processing, which can be used in data-mining. Due to the rapid growth of data, large-scale data processing is becoming a focal point of information techniques. Though we can still use SQL, but where to store the data and how to get the data efficiently, cost effectively, can be a tricky problem. Cloud computing emerges to solve the problem. It is mainly to deal with large-scale data processing. In this paper, we design a data-mining system which can directly deal with SQL processing based on Hadoop, a parallel store and computing platform. Then we will have a discussion about running time's efficiencies.
{"title":"The research and design of SQL processing in a data-mining system based on MapReduce","authors":"Lei Zhang, Kaiping Li, Bin Wu","doi":"10.1109/CCIS.2011.6045079","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045079","url":null,"abstract":"SQL as a database language has been widely used in the modern society. Its function mainly focuses on the data processing, which can be used in data-mining. Due to the rapid growth of data, large-scale data processing is becoming a focal point of information techniques. Though we can still use SQL, but where to store the data and how to get the data efficiently, cost effectively, can be a tricky problem. Cloud computing emerges to solve the problem. It is mainly to deal with large-scale data processing. In this paper, we design a data-mining system which can directly deal with SQL processing based on Hadoop, a parallel store and computing platform. Then we will have a discussion about running time's efficiencies.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045087
Jianhua Liu, W. Tong
Internet of Things applications using RFID sensors are a challenging task due to the limited capacity of batteries. Thus, energy efficient control has become more critical design with RFID sensor integrating complex tag identification processing techniques. Previous works on power efficient control in multiple RFID tags identification systems often design tag anti-collision protocols in identification process, and seldom consider the features of tags are able to detect energy within its radio rang among each other. This paper is dedicated to developing a share energy provisioning (SEP) strategy for energy-limited multiple RFID tag identification system. First, SEP can dynamically adapt the variable energy resources due to the cognitive radio technique. Second, SEP combines the energy control with tags groups in wait time T, through classifying the tag into different groups according to its distances. Third, it introduces the optimization theoretical analysis energy for multiple RFID tags identification system, so as to minimize the time and energy of it takes to send tags data to reader. Finally, it shares the energy resource as different energy harvest under energy-limited RFID systems. Experimental results demonstrate the energy efficiency of the proposed approach.
{"title":"Dynamic share energy provisioning service for one-hop multiple RFID tags identification system","authors":"Jianhua Liu, W. Tong","doi":"10.1109/CCIS.2011.6045087","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045087","url":null,"abstract":"Internet of Things applications using RFID sensors are a challenging task due to the limited capacity of batteries. Thus, energy efficient control has become more critical design with RFID sensor integrating complex tag identification processing techniques. Previous works on power efficient control in multiple RFID tags identification systems often design tag anti-collision protocols in identification process, and seldom consider the features of tags are able to detect energy within its radio rang among each other. This paper is dedicated to developing a share energy provisioning (SEP) strategy for energy-limited multiple RFID tag identification system. First, SEP can dynamically adapt the variable energy resources due to the cognitive radio technique. Second, SEP combines the energy control with tags groups in wait time T, through classifying the tag into different groups according to its distances. Third, it introduces the optimization theoretical analysis energy for multiple RFID tags identification system, so as to minimize the time and energy of it takes to send tags data to reader. Finally, it shares the energy resource as different energy harvest under energy-limited RFID systems. Experimental results demonstrate the energy efficiency of the proposed approach.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132541752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045031
Chunjiang Zhao, Huarui Wu, Ronghua Gao
In order to better use with massive, heterogeneous, multimode and other characteristics of information, eliminate redundancy, the formation of the system environment is relatively complete and consistent description. It can ensure rapid and correct decision-making, planning and reflection. In this paper, a multimode information fusion method is proposed aimed at the shortcomings of hierarchical structure. Different databases and data files between different formats can be shielded, while the fuzzy neural network algorithm, make text, images and video seamless fusion by continuous learning. Experimental results show that the method of this paper is better than exist on fusion algorithms at the right rate, leakage pick up rate and false acceptance rata.
{"title":"Ontology-based multimode information fusion method","authors":"Chunjiang Zhao, Huarui Wu, Ronghua Gao","doi":"10.1109/CCIS.2011.6045031","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045031","url":null,"abstract":"In order to better use with massive, heterogeneous, multimode and other characteristics of information, eliminate redundancy, the formation of the system environment is relatively complete and consistent description. It can ensure rapid and correct decision-making, planning and reflection. In this paper, a multimode information fusion method is proposed aimed at the shortcomings of hierarchical structure. Different databases and data files between different formats can be shielded, while the fuzzy neural network algorithm, make text, images and video seamless fusion by continuous learning. Experimental results show that the method of this paper is better than exist on fusion algorithms at the right rate, leakage pick up rate and false acceptance rata.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045110
Ei Shwe Sin
Scheduling problems such as nurse rostering problems, university timetabling, arise in almost all areas of human activity. As a result, there are many methods to solve them. Some of the most effective techniques on the benchmark data are Meta heuristic methods. Unfortunately, these methods rely upon either parameter tuning or deep understanding of domain knowledge. They are not capable of dealing with other different problems. Thus, this has led to the development of hyper heuristics system. One contribution of this paper is to attempt to use the extended great deluge (EGD) method as a move acceptance method to drive the selection of low level heuristic within hyper heuristic (HH) framework. Moreover, hyper heuristic search with memory, which is also used to store the accepted solutions at each iteration, is also applied. The proposed EGD based HH is tested to a benchmark set of examination timetabling problem as an instance of a constraint based real world optimization problem and the experiment results are also shown.
{"title":"Reinforcement learning with EGD based hyper heuristic system for exam timetabling problem","authors":"Ei Shwe Sin","doi":"10.1109/CCIS.2011.6045110","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045110","url":null,"abstract":"Scheduling problems such as nurse rostering problems, university timetabling, arise in almost all areas of human activity. As a result, there are many methods to solve them. Some of the most effective techniques on the benchmark data are Meta heuristic methods. Unfortunately, these methods rely upon either parameter tuning or deep understanding of domain knowledge. They are not capable of dealing with other different problems. Thus, this has led to the development of hyper heuristics system. One contribution of this paper is to attempt to use the extended great deluge (EGD) method as a move acceptance method to drive the selection of low level heuristic within hyper heuristic (HH) framework. Moreover, hyper heuristic search with memory, which is also used to store the accepted solutions at each iteration, is also applied. The proposed EGD based HH is tested to a benchmark set of examination timetabling problem as an instance of a constraint based real world optimization problem and the experiment results are also shown.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045093
Deyi Li, Yuchao Liu, Haisu Zhang, Guisheng Chen
Development of Internet technology and social network has greatly changed the traditional software engineering based on single Turing machine. Software development will be cooperated and completed on the network with collective intelligence. The interaction among human-machine and machine-machine becomes the kernel of Internet computing, while Turing model studied on Entscheidungsproblem based on an automatic computer theoretical model without interaction with people. Clusters or virtual clusters become the basic platform of cloud computing centers. And SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) become the common knowledge for software engineers. Furthermore, the research of network science has discovered lots of physical law about the distribution of information resources, such as the power law distribution of Web services. This paper focuses on this computing paradigm, and analyses the trend of software development style facing Internet computing. And the features of cloud computing such as virtualization, granular computing, soft computing and uncertainty are discussed too.
{"title":"Cloud computing beyond turing machines","authors":"Deyi Li, Yuchao Liu, Haisu Zhang, Guisheng Chen","doi":"10.1109/CCIS.2011.6045093","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045093","url":null,"abstract":"Development of Internet technology and social network has greatly changed the traditional software engineering based on single Turing machine. Software development will be cooperated and completed on the network with collective intelligence. The interaction among human-machine and machine-machine becomes the kernel of Internet computing, while Turing model studied on Entscheidungsproblem based on an automatic computer theoretical model without interaction with people. Clusters or virtual clusters become the basic platform of cloud computing centers. And SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) become the common knowledge for software engineers. Furthermore, the research of network science has discovered lots of physical law about the distribution of information resources, such as the power law distribution of Web services. This paper focuses on this computing paradigm, and analyses the trend of software development style facing Internet computing. And the features of cloud computing such as virtualization, granular computing, soft computing and uncertainty are discussed too.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122922427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}