Pub Date : 2023-01-01DOI: 10.59992/ijsr.2023.v2n8p12
هاله محمد
There is no doubt that the Kingdom of Saudi Arabia has been long overdue towards empowering Saudi women from their political rights, and this is due to the culture of society, which has had a negative impact towards delaying women's enjoyment of their political rights. It is worth noting that Saudi women began to participate in political and public life in general at the official and informal level through their membership in the Shura Council. On September 25, 2011, the King of Saudi Arabia, Abdullah bin Abdulaziz announced the approval of the participation of women in the membership of the Shura Council and municipal councils as a candidate and a vote. As a minimum, 20% of the Shura Council seats are reserved for women. The Kingdom's regulations do not include provisions that prevent women from occupying any of the higher positions, which confirms that there are no legal obstacles towards empowering women, and perhaps the recent amendment of legislation has had an impact in changing the culture of society towards empowering women. The study analyzes the legal impediments to women's exercise of their political rights, as the researcher relied on the descriptive approach that is based on the study of legal texts and internal regulations that dealt with women's political rights at the domestic level, reaching a result that seeks to challenge the most important obstacles to empowering women with all the political rights imposed on them by legislation and regulations Interior of the Kingdom of Saudi Arabia. It is worth noting that the Kingdom's Vision 2030 affirms the political empowerment of the many rights it carried to women and the protection that affirms respect and codification of women's political rights in the Kingdom of Saudi Arabia. The first chapter reviews the political rights established for Saudi women in accordance with the legislation in the Kingdom of Saudi Arabia, and the second chapter deals with the reality of Saudi women exercising their political rights in the Kingdom of Saudi Arabia and deals with obstacles to Saudi women empowering their political rights in the Kingdom of Saudi Arabia.
{"title":"Obstacles to Women's Empowerment in the Kingdom of Saudi Arabia","authors":"هاله محمد","doi":"10.59992/ijsr.2023.v2n8p12","DOIUrl":"https://doi.org/10.59992/ijsr.2023.v2n8p12","url":null,"abstract":"There is no doubt that the Kingdom of Saudi Arabia has been long overdue towards empowering Saudi women from their political rights, and this is due to the culture of society, which has had a negative impact towards delaying women's enjoyment of their political rights. It is worth noting that Saudi women began to participate in political and public life in general at the official and informal level through their membership in the Shura Council. On September 25, 2011, the King of Saudi Arabia, Abdullah bin Abdulaziz announced the approval of the participation of women in the membership of the Shura Council and municipal councils as a candidate and a vote. As a minimum, 20% of the Shura Council seats are reserved for women. The Kingdom's regulations do not include provisions that prevent women from occupying any of the higher positions, which confirms that there are no legal obstacles towards empowering women, and perhaps the recent amendment of legislation has had an impact in changing the culture of society towards empowering women. The study analyzes the legal impediments to women's exercise of their political rights, as the researcher relied on the descriptive approach that is based on the study of legal texts and internal regulations that dealt with women's political rights at the domestic level, reaching a result that seeks to challenge the most important obstacles to empowering women with all the political rights imposed on them by legislation and regulations Interior of the Kingdom of Saudi Arabia. It is worth noting that the Kingdom's Vision 2030 affirms the political empowerment of the many rights it carried to women and the protection that affirms respect and codification of women's political rights in the Kingdom of Saudi Arabia. The first chapter reviews the political rights established for Saudi women in accordance with the legislation in the Kingdom of Saudi Arabia, and the second chapter deals with the reality of Saudi women exercising their political rights in the Kingdom of Saudi Arabia and deals with obstacles to Saudi women empowering their political rights in the Kingdom of Saudi Arabia.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73251137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.59992/ijsr.2023.v2n8p5
محمد دابو
The central bank is a supreme authority to which all financial institutions are subject, and it is also concerned with managing the economy to maintain its stability from financial fluctuations and the disadvantages of high prices, so the central bank implements its policies and instructions through these institutions that make up the economy, so any measure or action it takes is affected by these institutions and then the economy. The interest is one of the tools that the Central Bank uses in all its actions and procedures to manage institutions. Institutions that deal with interest respond and interact with its procedures and instructions. As for those that do not deal with interest, such as Islamic financial institutions, they do not respond to what the central bank issues, as it differs from the nature and mechanism of its banking work and the privacy of many Its actions resulting from the source of its legislation, and therefore the Central Bank faces the possibility of violating the legal prohibitions controlling it, which makes it difficult to monitor the task.
{"title":"Difficulties faced by the supervisory authorities in controlling Islamic financial institutions from the legal point of view","authors":"محمد دابو","doi":"10.59992/ijsr.2023.v2n8p5","DOIUrl":"https://doi.org/10.59992/ijsr.2023.v2n8p5","url":null,"abstract":"The central bank is a supreme authority to which all financial institutions are subject, and it is also concerned with managing the economy to maintain its stability from financial fluctuations and the disadvantages of high prices, so the central bank implements its policies and instructions through these institutions that make up the economy, so any measure or action it takes is affected by these institutions and then the economy. The interest is one of the tools that the Central Bank uses in all its actions and procedures to manage institutions. Institutions that deal with interest respond and interact with its procedures and instructions. As for those that do not deal with interest, such as Islamic financial institutions, they do not respond to what the central bank issues, as it differs from the nature and mechanism of its banking work and the privacy of many Its actions resulting from the source of its legislation, and therefore the Central Bank faces the possibility of violating the legal prohibitions controlling it, which makes it difficult to monitor the task.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73684935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.59992/ijsr.2023.v2n7p6
Hamad Bouzreda, Mohamed Mohsen, Hatem Musa
MRI is a very complex imaging modality in radiography. Although some simulators have been developed for training purposes, we are not sure about any of them. In this research, we tried to measure the performance of different simulations for educational purposes and then quantitatively evaluate them. With this paper, our study deals with an evaluative review of previous studies related to MRI simulators, which are designed to perform specific functions to help the medical engineer managing radiographic operations to better learn the theoretical and practical concepts of MRI from others. Traditional education, which is a method based on reviewing previous studies, searching for strengths and weaknesses in simulators and possible alternatives to them, and then providing recommendations for future studies that can be conducted to switch to packaging simulation programs, which are virtual laboratories that we hope will be the most efficient simulation devices and models used. Currently in MRI engineer qualification.
{"title":"Impact of Simulation on MRI Physicists","authors":"Hamad Bouzreda, Mohamed Mohsen, Hatem Musa","doi":"10.59992/ijsr.2023.v2n7p6","DOIUrl":"https://doi.org/10.59992/ijsr.2023.v2n7p6","url":null,"abstract":"MRI is a very complex imaging modality in radiography. Although some simulators have been developed for training purposes, we are not sure about any of them. In this research, we tried to measure the performance of different simulations for educational purposes and then quantitatively evaluate them. With this paper, our study deals with an evaluative review of previous studies related to MRI simulators, which are designed to perform specific functions to help the medical engineer managing radiographic operations to better learn the theoretical and practical concepts of MRI from others. Traditional education, which is a method based on reviewing previous studies, searching for strengths and weaknesses in simulators and possible alternatives to them, and then providing recommendations for future studies that can be conducted to switch to packaging simulation programs, which are virtual laboratories that we hope will be the most efficient simulation devices and models used. Currently in MRI engineer qualification.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74385227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.59992/ijsr.2023.v2n6p4
This study aimed to know the attitudes of Al-Ahsa fans towards the tourism media campaigns for the World Cup Qatar 2022. It explores their attitudes towards the media content and explores the extent of their satisfaction with these campaigns. The study sample consisted of (385) people. The study followed the descriptive survey method, and an electronic questionnaire was used as a tool for collecting the data. The study found that the vast majority of the fans from Al-Ahsa Governorate believed that the media campaigns held during the Qatar World Cup 2022 highlighted the tourist attractions in Al-Ahsa Governorate in a professional manner, and the campaign organizers succeeded in choosing the appropriate time to broadcast these campaigns to the public and attract them to Al-Ahsa Governorate. The majority also reported that the Social Media Platforms and traditional media tools were rich with these campaigns that highlighted the Al-Ahsa and its cultural and historical landmarks, and contributed to the revitalization of the economy of Al-Ahsa Governorate.
{"title":"Attitudes of Al-Ahsa fans towards the tourism media content in the Qatar World Cup 2022","authors":"","doi":"10.59992/ijsr.2023.v2n6p4","DOIUrl":"https://doi.org/10.59992/ijsr.2023.v2n6p4","url":null,"abstract":"This study aimed to know the attitudes of Al-Ahsa fans towards the tourism media campaigns for the World Cup Qatar 2022. It explores their attitudes towards the media content and explores the extent of their satisfaction with these campaigns. The study sample consisted of (385) people. The study followed the descriptive survey method, and an electronic questionnaire was used as a tool for collecting the data. The study found that the vast majority of the fans from Al-Ahsa Governorate believed that the media campaigns held during the Qatar World Cup 2022 highlighted the tourist attractions in Al-Ahsa Governorate in a professional manner, and the campaign organizers succeeded in choosing the appropriate time to broadcast these campaigns to the public and attract them to Al-Ahsa Governorate. The majority also reported that the Social Media Platforms and traditional media tools were rich with these campaigns that highlighted the Al-Ahsa and its cultural and historical landmarks, and contributed to the revitalization of the economy of Al-Ahsa Governorate.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90780463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.23883/ijrter.2017.2998.vmcg4
Meghna Chapaneria, Nisha Bhanushali, Krishani Mehta, M. Rathod
: The main purpose of our system to make on-line event safer and simple. Presently days, biometric technology is increasing quickly. Biometric is utilized for personal identification. Here we've got a bent to a mistreatment Fingerprint scanning biometric to supply access to ATM machine. Information of a fingerprint is detain info mistreatment the enrollment methodology through the Bank. Bank provide authentication to the shopper which will be access whereas humanities event methodology. If fingerprint match is found in info base then event happen. once verification if fingerprint does not match event area unit aiming to be off. mistreatment fingerprint based ATM system user can build secure event.
{"title":"Fingerprint based ATM System","authors":"Meghna Chapaneria, Nisha Bhanushali, Krishani Mehta, M. Rathod","doi":"10.23883/ijrter.2017.2998.vmcg4","DOIUrl":"https://doi.org/10.23883/ijrter.2017.2998.vmcg4","url":null,"abstract":": The main purpose of our system to make on-line event safer and simple. Presently days, biometric technology is increasing quickly. Biometric is utilized for personal identification. Here we've got a bent to a mistreatment Fingerprint scanning biometric to supply access to ATM machine. Information of a fingerprint is detain info mistreatment the enrollment methodology through the Bank. Bank provide authentication to the shopper which will be access whereas humanities event methodology. If fingerprint match is found in info base then event happen. once verification if fingerprint does not match event area unit aiming to be off. mistreatment fingerprint based ATM system user can build secure event.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"67 2 1","pages":"31-34"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75173462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects: the best of our knowledge, our is the to support scalable and Cloud Computing. In particular, our scheme achieves batch auditing multiple delegated auditing tasks from different users can be performed simultaneously by the TPA.
{"title":"Homomorphic Authenticable Ring Signature Mechanism for Public Auditing on Shared Data in the Cloud","authors":"G. D. Patwardhan, B. W. Balkhande","doi":"10.18535/ijecs/v5i3.10","DOIUrl":"https://doi.org/10.18535/ijecs/v5i3.10","url":null,"abstract":": Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects: the best of our knowledge, our is the to support scalable and Cloud Computing. In particular, our scheme achieves batch auditing multiple delegated auditing tasks from different users can be performed simultaneously by the TPA.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"3 1","pages":"20-26"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84069591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-01-20DOI: 10.15242/ijccie.er1215111
Priti S. Patel, S. Desai
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence” by Tempus project PROMIS.
{"title":"Ontological Model of Educational Programs in Computer Science (Bachelor and Master Degrees)","authors":"Priti S. Patel, S. Desai","doi":"10.15242/ijccie.er1215111","DOIUrl":"https://doi.org/10.15242/ijccie.er1215111","url":null,"abstract":"In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence” by Tempus project PROMIS.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"36 1","pages":"5-8"},"PeriodicalIF":0.0,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87144773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-01-01DOI: 10.21275/v4i12.nov151842
P. Jayakumar, J. Meena
The Homogenous biquadratic equation with five unknowns given by 2 2 2 4 4 ) ( 26 R w z y x is considered and analyzed for finding its non zero distinct integral solutions. Introducing the linear transformations x = u + v, y = u – v, z = 2uv +1, w =2uv-1 and employing the method of factorization different patterns of non zero distinct integer solutions of the equation under the above equation are obtained. A few interesting relations between the integral solutions and the special numbers namely Polygonal numbers, Star number, Pronic number and Gnomonic number are exhibited.
考虑并分析了由2 2 2 4 4)(26 R w z y x 给出的五未知数齐次双二次方程的非零离散积分解。引入线性变换x = u + v, y = u - v, z =2uv +1, w =2uv-1,采用因式分解的方法,得到了上述方程的非零异整数解的不同形式。给出了积分解与多边形数、星数、质子数、Gnomonic数等特殊数之间的一些有趣的关系。
{"title":"On The Homogeneous Biquadratic Equation with 5 Unknowns","authors":"P. Jayakumar, J. Meena","doi":"10.21275/v4i12.nov151842","DOIUrl":"https://doi.org/10.21275/v4i12.nov151842","url":null,"abstract":"The Homogenous biquadratic equation with five unknowns given by 2 2 2 4 4 ) ( 26 R w z y x is considered and analyzed for finding its non zero distinct integral solutions. Introducing the linear transformations x = u + v, y = u – v, z = 2uv +1, w =2uv-1 and employing the method of factorization different patterns of non zero distinct integer solutions of the equation under the above equation are obtained. A few interesting relations between the integral solutions and the special numbers namely Polygonal numbers, Star number, Pronic number and Gnomonic number are exhibited.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"49 1","pages":"204-206"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76426553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is been observed lately that a massive amount of crowd is diverting itself to the most efficient platform i.e. the e-commerce market for personal online shopping. During this process debit cards, credit cards and internet banking facility is regularly used for any purchase of product. This elements involve a lot of confidential data which are necessary to complete the payment but also has many intrusion risks. To avoid this data stealing, to improve the internet security and increase confidentiality of data this method is proposed which uses visual cryptography and steganography to function efficiently.
{"title":"New approach to online payment system","authors":"Himanshu Joshi, Mohit Patil, Charushila Talekar, Mohmmad Jakir","doi":"10.21090/ijaerd.0303118","DOIUrl":"https://doi.org/10.21090/ijaerd.0303118","url":null,"abstract":"It is been observed lately that a massive amount of crowd is diverting itself to the most efficient platform i.e. the e-commerce market for personal online shopping. During this process debit cards, credit cards and internet banking facility is regularly used for any purchase of product. This elements involve a lot of confidential data which are necessary to complete the payment but also has many intrusion risks. To avoid this data stealing, to improve the internet security and increase confidentiality of data this method is proposed which uses visual cryptography and steganography to function efficiently.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"30 1","pages":"546-547"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84247322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Kumar, Vivek Kumar, Sandeep Sharma, V. K. Pandey
Abstract— The objective of the present paper is to explore an approach of constructing a simple, low cost colour sensor using filter model which defines all colours as an additive combination of the primary colours Red, Green and Blue. The sensor consists of low pass filter surrounded by all color and light source. The low pass filter and the amplifier are mounted in such a way so that the color intensity from the source get absorbed by low pass filter and its passes through amplifier circuits. Therefore the voltage drop across the amplifier is varied whenever the light of different intensities from the low pass filter falls upon it. According to the voltage drop we decide the color identity because we know that every color has own intensity that why its produce specific voltage drop. The experimental results show that the variation of the color intensity gives the color identity.
{"title":"ALL COLOR DETECTOR SENSOR AR001","authors":"Aditya Kumar, Vivek Kumar, Sandeep Sharma, V. K. Pandey","doi":"10.5281/ZENODO.49307","DOIUrl":"https://doi.org/10.5281/ZENODO.49307","url":null,"abstract":"Abstract— The objective of the present paper is to explore an approach of constructing a simple, low cost colour sensor using filter model which defines all colours as an additive combination of the primary colours Red, Green and Blue. The sensor consists of low pass filter surrounded by all color and light source. The low pass filter and the amplifier are mounted in such a way so that the color intensity from the source get absorbed by low pass filter and its passes through amplifier circuits. Therefore the voltage drop across the amplifier is varied whenever the light of different intensities from the low pass filter falls upon it. According to the voltage drop we decide the color identity because we know that every color has own intensity that why its produce specific voltage drop. The experimental results show that the variation of the color intensity gives the color identity.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"116 1","pages":"12-14"},"PeriodicalIF":0.0,"publicationDate":"2015-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87923863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}