Pub Date : 2024-08-16DOI: 10.1007/s13198-024-02468-8
U. M. Fernandes Dimlo, V. Rupesh, Yeligeti Raju
In the contemporary era, with the emergence of distributed computing and storage facilities, there has been an increase in the creation of textual data. The invention of the Internet of Things (IoT) and its use cases also led to the creation of big data in textual corpora. At the same time, there are emerging Artificial Intelligence (AI) techniques for processing data in unstructured format. In this context, an important research question is how Natural Language Processing (NLP) and text mining cope with emerging AI techniques. This paper investigates the hypothesis that “NLP and text mining play an increased role in emerging AI techniques.” The investigation uses a dual approach: a literature review and an empirical study. Different aspects of the study, including data science approaches covering AI techniques, are investigated. NLP and text mining are indispensable for meaningful AI outcomes in solving different real-world problems. This paper sheds light on the investigations made and paves the way for exciting future research into utilizing AI along with NLP and text mining. It has covered the research reflecting the dynamics of natural language processing and text mining under emerging artificial intelligence techniques.
{"title":"The dynamics of natural language processing and text mining under emerging artificial intelligence techniques","authors":"U. M. Fernandes Dimlo, V. Rupesh, Yeligeti Raju","doi":"10.1007/s13198-024-02468-8","DOIUrl":"https://doi.org/10.1007/s13198-024-02468-8","url":null,"abstract":"<p>In the contemporary era, with the emergence of distributed computing and storage facilities, there has been an increase in the creation of textual data. The invention of the Internet of Things (IoT) and its use cases also led to the creation of big data in textual corpora. At the same time, there are emerging Artificial Intelligence (AI) techniques for processing data in unstructured format. In this context, an important research question is how Natural Language Processing (NLP) and text mining cope with emerging AI techniques. This paper investigates the hypothesis that “NLP and text mining play an increased role in emerging AI techniques.” The investigation uses a dual approach: a literature review and an empirical study. Different aspects of the study, including data science approaches covering AI techniques, are investigated. NLP and text mining are indispensable for meaningful AI outcomes in solving different real-world problems. This paper sheds light on the investigations made and paves the way for exciting future research into utilizing AI along with NLP and text mining. It has covered the research reflecting the dynamics of natural language processing and text mining under emerging artificial intelligence techniques.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain has gained the attention of scholars and industry practitioners due to its immutability, transparency, and operational features, which can improve overall supply chain efficiency. However, a holistic review of blockchain-based supply chains through the lens of digital trust has remained elusive, making participants reluctant to share information due to growing attacks on digital systems and fraud. Therefore, this study examines digital trust in using blockchain technology for supply chain operations by following a five-stage review process consisting of a systematic literature review protocol. The study performs a bibliometric and morphological analysis of 123 articles published between 2012 and 2023 to explore the current state and provide future research directions to develop safe, secure, reliable, and transparent blockchain-based supply chains. Further, our analysis reveals five characteristics of digital trust: transparency, cybersecurity, data protection, accountability, reliability and provenance, and regulatory compliance, which are essential to ensuring digital trust for supply chain sustainability, four research pathways, and keyword combinations for future research with other industry 4.0 technologies. Although blockchain applications for secure and trusted environments have been recognized, very little attention has been given to the detailed discussion on digitally trusted blockchain-based supply chains. The present study contributes to the literature by synthesizing the available literature on blockchain-based supply chains from the perspective of digital trust, thereby analyzing the current state and providing future opportunities for researchers and practitioners working in industry sectors and developing blockchain-based supply chains.
{"title":"Blockchain technology as an enabler for digital trust in supply chain: evolution, issues and opportunities","authors":"Vaibhav Sharma, Rajeev Agrawal, Vijaya Kumar Manupati","doi":"10.1007/s13198-024-02471-z","DOIUrl":"https://doi.org/10.1007/s13198-024-02471-z","url":null,"abstract":"<p>Blockchain has gained the attention of scholars and industry practitioners due to its immutability, transparency, and operational features, which can improve overall supply chain efficiency. However, a holistic review of blockchain-based supply chains through the lens of digital trust has remained elusive, making participants reluctant to share information due to growing attacks on digital systems and fraud. Therefore, this study examines digital trust in using blockchain technology for supply chain operations by following a five-stage review process consisting of a systematic literature review protocol. The study performs a bibliometric and morphological analysis of 123 articles published between 2012 and 2023 to explore the current state and provide future research directions to develop safe, secure, reliable, and transparent blockchain-based supply chains. Further, our analysis reveals five characteristics of digital trust: transparency, cybersecurity, data protection, accountability, reliability and provenance, and regulatory compliance, which are essential to ensuring digital trust for supply chain sustainability, four research pathways, and keyword combinations for future research with other industry 4.0 technologies. Although blockchain applications for secure and trusted environments have been recognized, very little attention has been given to the detailed discussion on digitally trusted blockchain-based supply chains. The present study contributes to the literature by synthesizing the available literature on blockchain-based supply chains from the perspective of digital trust, thereby analyzing the current state and providing future opportunities for researchers and practitioners working in industry sectors and developing blockchain-based supply chains.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-14DOI: 10.1007/s13198-024-02457-x
Shakuntla Singla, Komalpreet Kaur
Simplified swarm optimization (SSO) and particle swarm optimization (PSO) are two types of modern swarm intelligence techniques that are often used for optimization. In order to identify the most effective system RRAP with a cold-standby strategic plan while aiming to exploit the reliability of the organization, the article discusses a PSSO procedure that combines UM of PSO and Simplified swarm optimization, PSSO is especially impressive in comparison with other recently incorporated algorithms into four popular applications, namely a sequences scheme, a complex organization, a series–parallel system, and an airspeed indicator defense system for a turbine, with extensive experiments conducted on the pretty standard and well-known four benchmarks of reliability-redundancy allocation problems. Finally, the experiment findings show that the particle-based simplified swarm optimization can successfully solution to address the reliability-redundancy allocation (RRAP) issues using the cold-standby method and performs well in terms of organization reliability, even though the best platform consistency is not attained in all four benchmarks and experiment is done using python and Google colab.
{"title":"Using particle-based simplified swarm optimization to solve the cold-standby reliability of the gas turbine industry","authors":"Shakuntla Singla, Komalpreet Kaur","doi":"10.1007/s13198-024-02457-x","DOIUrl":"https://doi.org/10.1007/s13198-024-02457-x","url":null,"abstract":"<p>Simplified swarm optimization (SSO) and particle swarm optimization (PSO) are two types of modern swarm intelligence techniques that are often used for optimization. In order to identify the most effective system RRAP with a cold-standby strategic plan while aiming to exploit the reliability of the organization, the article discusses a PSSO procedure that combines UM of PSO and Simplified swarm optimization, PSSO is especially impressive in comparison with other recently incorporated algorithms into four popular applications, namely a sequences scheme, a complex organization, a series–parallel system, and an airspeed indicator defense system for a turbine, with extensive experiments conducted on the pretty standard and well-known four benchmarks of reliability-redundancy allocation problems. Finally, the experiment findings show that the particle-based simplified swarm optimization can successfully solution to address the reliability-redundancy allocation (RRAP) issues using the cold-standby method and performs well in terms of organization reliability, even though the best platform consistency is not attained in all four benchmarks and experiment is done using python and Google colab.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-12DOI: 10.1007/s13198-024-02445-1
P. Sivakumar, M. Balasubramani, R. Sowndharya, B. S. Deepa Priya, W. Deva Priya, Maganti Syamala
Twitter has improved in such a way people acquire knowledge or information by making them share their thoughts and opinions on everyday tweets. However, spammers have discovered Twitter to be desirable for spreading spam as a result of its enormous popularity. Twitter spam, in contrast to other types of spam, has recently become a big concern. The enormous number of users and volume of content or information published on Twitter contribute considerably to the rise of spam. To protect users, Twitter and the research team have developed several spam detection systems that employ various machine-learning techniques. According to a new study, existing machine learning-based detection algorithms are unable to detect spam correctly since the features of spam tweets vary over time. The issue is referred to as “Twitter Spam Drift.” In this paper, a semi-supervised learning approach (SSLA) using the YATSI algorithm has been suggested. YATSI is categorized into two steps. An initial prediction model is the first phase. The genuine predictions for unlabeled cases are identified in the second phase by using ML algorithms. To deal with the drift, the study utilizes a live Twitter stream of data acquired using Twitter API. This proposed method uses pre-processed labelled data to learn the structure of unlabeled data that is live-downloaded to distinguish between genuine and fake users. Experiments were conducted on live twitter data using KNN, SVM and NB machine learning classifiers. Among those classifiers SVM is showing the better results, in-terms of accuracy.
Twitter 的改进使人们可以通过每天在推特上分享自己的想法和观点来获取知识或信息。然而,垃圾邮件发送者发现,Twitter 的巨大人气使其成为传播垃圾邮件的理想场所。与其他类型的垃圾邮件相比,Twitter 垃圾邮件最近引起了人们的极大关注。Twitter 上巨大的用户数量和发布的内容或信息量在很大程度上导致了垃圾邮件的增加。为了保护用户,Twitter 和研究团队开发了多个采用各种机器学习技术的垃圾邮件检测系统。根据一项新的研究,现有的基于机器学习的检测算法无法正确检测垃圾邮件,因为垃圾推文的特征随时间而变化。这个问题被称为 "Twitter 垃圾漂移"。本文提出了一种使用 YATSI 算法的半监督学习方法 (SSLA)。YATSI 算法分为两个步骤。第一阶段是建立初始预测模型。在第二阶段,使用 ML 算法识别未标记案例的真实预测结果。为了解决漂移问题,该研究利用 Twitter API 获取的 Twitter 实时数据流。该方法使用预处理过的标记数据来学习实时下载的未标记数据的结构,从而区分真假用户。使用 KNN、SVM 和 NB 机器学习分类器对实时 Twitter 数据进行了实验。在这些分类器中,SVM 的准确率较高。
{"title":"Twitter spam drift detection by semi supervised learning approach using YATSI algorithm","authors":"P. Sivakumar, M. Balasubramani, R. Sowndharya, B. S. Deepa Priya, W. Deva Priya, Maganti Syamala","doi":"10.1007/s13198-024-02445-1","DOIUrl":"https://doi.org/10.1007/s13198-024-02445-1","url":null,"abstract":"<p>Twitter has improved in such a way people acquire knowledge or information by making them share their thoughts and opinions on everyday tweets. However, spammers have discovered Twitter to be desirable for spreading spam as a result of its enormous popularity. Twitter spam, in contrast to other types of spam, has recently become a big concern. The enormous number of users and volume of content or information published on Twitter contribute considerably to the rise of spam. To protect users, Twitter and the research team have developed several spam detection systems that employ various machine-learning techniques. According to a new study, existing machine learning-based detection algorithms are unable to detect spam correctly since the features of spam tweets vary over time. The issue is referred to as “Twitter Spam Drift.” In this paper, a semi-supervised learning approach (SSLA) using the YATSI algorithm has been suggested. YATSI is categorized into two steps. An initial prediction model is the first phase. The genuine predictions for unlabeled cases are identified in the second phase by using ML algorithms. To deal with the drift, the study utilizes a live Twitter stream of data acquired using Twitter API. This proposed method uses pre-processed labelled data to learn the structure of unlabeled data that is live-downloaded to distinguish between genuine and fake users. Experiments were conducted on live twitter data using KNN, SVM and NB machine learning classifiers. Among those classifiers SVM is showing the better results, in-terms of accuracy.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-10DOI: 10.1007/s13198-024-02446-0
Vadde Usha, T. K. R. K. Rao
{"title":"Resource provisioning optimization in fog computing: a hybrid meta-heuristic algorithm approach","authors":"Vadde Usha, T. K. R. K. Rao","doi":"10.1007/s13198-024-02446-0","DOIUrl":"https://doi.org/10.1007/s13198-024-02446-0","url":null,"abstract":"","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141920084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-10DOI: 10.1007/s13198-024-02446-0
Vadde Usha, T. K. R. K. Rao
{"title":"Resource provisioning optimization in fog computing: a hybrid meta-heuristic algorithm approach","authors":"Vadde Usha, T. K. R. K. Rao","doi":"10.1007/s13198-024-02446-0","DOIUrl":"https://doi.org/10.1007/s13198-024-02446-0","url":null,"abstract":"","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-08DOI: 10.1007/s13198-024-02456-y
G. Pius Agbulu, G. Joselin Retna Kumar, S. Gunasekar
{"title":"IESDCC-KM: an improved energy-saving distributed cluster–chain K-communication scheme for smart sensor networks","authors":"G. Pius Agbulu, G. Joselin Retna Kumar, S. Gunasekar","doi":"10.1007/s13198-024-02456-y","DOIUrl":"https://doi.org/10.1007/s13198-024-02456-y","url":null,"abstract":"","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141925976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-08DOI: 10.1007/s13198-024-02453-1
Neha Hajare, A. Rajawat
{"title":"Correction: IoT based smart agri system: deep classifiers for black gram disease classification with modified feature set","authors":"Neha Hajare, A. Rajawat","doi":"10.1007/s13198-024-02453-1","DOIUrl":"https://doi.org/10.1007/s13198-024-02453-1","url":null,"abstract":"","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-07DOI: 10.1007/s13198-024-02465-x
Aravind Arasavilli, M Kishore Babu, A Nageswara Rao
With a notable rise in the number of students opting for overseas education, study abroad has developed into a competitive industry over the past few decades. This study aims to identify the essential factors that affect students’ decisions to study abroad at Internalisation. A 32-item questionnaire spanning a range of topics was developed to address students’ goals and motivations for studying abroad. It was scored on a five-point Likert scale. Next, Structural Equation Modelling (SEM) with AMOS is used to test the factors’ validity and reliability. The study’s conclusions will aid in the understanding of the factors influencing students’ decisions and incentives to study abroad by policymakers and educational advisors.
{"title":"Evaluating factors influencing students’ decisions to pursue higher education abroad: a structural equation modelling study","authors":"Aravind Arasavilli, M Kishore Babu, A Nageswara Rao","doi":"10.1007/s13198-024-02465-x","DOIUrl":"https://doi.org/10.1007/s13198-024-02465-x","url":null,"abstract":"<p>With a notable rise in the number of students opting for overseas education, study abroad has developed into a competitive industry over the past few decades. This study aims to identify the essential factors that affect students’ decisions to study abroad at Internalisation. A 32-item questionnaire spanning a range of topics was developed to address students’ goals and motivations for studying abroad. It was scored on a five-point Likert scale. Next, Structural Equation Modelling (SEM) with AMOS is used to test the factors’ validity and reliability. The study’s conclusions will aid in the understanding of the factors influencing students’ decisions and incentives to study abroad by policymakers and educational advisors.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-06DOI: 10.1007/s13198-024-02455-z
Florian Thiery, Praneeth Chandran
Rotor-to-stator rubbing in rotating machinery, resulting from tight clearances, introduces complex dynamics that can potentially lead to high vibrations and machine failure. Historically, the rubbing models were addressed using cylinder-to-cylinder contacts; however, recent attention has shifted towards examining blade-tip contact in turbines, which affects the systems dynamics and efficiency. This study investigates the impact of the variations in blade number on bladed rotor systems, emphasizing on the types of motion that occur as function of the operational speed in the sub-critical range. A simplified bladed rotor model has been developed, using a Jeffcott rotor with blades represented as damped elastic pendulums. The equations of motion are derived and numerical simulations are performed to explore the system’s behaviour with varying blade numbers (3, 5, 7, and 10) in order to analyse displacements, contact forces and bifurcation diagrams as function of the rotating speed. Results reveal distinct regions: periodic motion (I and III) and chaotic motion (II and IV) appear alternatively in the bifurcation diagram, with the chaotic regions occurring at specific fractions of the natural frequency and the number of blades. The study concludes that chaotic motions are associated with larger displacements and higher contact forces, and the vibrational behaviour becomes less hazardous as the number of blades increases. In addition, the appearance of periodic and chaotic motions occur in the same regions by scaling the rotating speed with the number of blades and natural frequency of the system. From an operational perspective, this dynamic investigation offers valuable insights into the severity of blade rubbing in industrial systems. It can guide the implementation of mitigation solutions to prevent worst-case failure scenarios and help to perform adjustments to either operational or design parameters.
{"title":"On the operational similarities of bladed rotor vibrations with casing contacts","authors":"Florian Thiery, Praneeth Chandran","doi":"10.1007/s13198-024-02455-z","DOIUrl":"https://doi.org/10.1007/s13198-024-02455-z","url":null,"abstract":"<p>Rotor-to-stator rubbing in rotating machinery, resulting from tight clearances, introduces complex dynamics that can potentially lead to high vibrations and machine failure. Historically, the rubbing models were addressed using cylinder-to-cylinder contacts; however, recent attention has shifted towards examining blade-tip contact in turbines, which affects the systems dynamics and efficiency. This study investigates the impact of the variations in blade number on bladed rotor systems, emphasizing on the types of motion that occur as function of the operational speed in the sub-critical range. A simplified bladed rotor model has been developed, using a Jeffcott rotor with blades represented as damped elastic pendulums. The equations of motion are derived and numerical simulations are performed to explore the system’s behaviour with varying blade numbers (3, 5, 7, and 10) in order to analyse displacements, contact forces and bifurcation diagrams as function of the rotating speed. Results reveal distinct regions: periodic motion (I and III) and chaotic motion (II and IV) appear alternatively in the bifurcation diagram, with the chaotic regions occurring at specific fractions of the natural frequency and the number of blades. The study concludes that chaotic motions are associated with larger displacements and higher contact forces, and the vibrational behaviour becomes less hazardous as the number of blades increases. In addition, the appearance of periodic and chaotic motions occur in the same regions by scaling the rotating speed with the number of blades and natural frequency of the system. From an operational perspective, this dynamic investigation offers valuable insights into the severity of blade rubbing in industrial systems. It can guide the implementation of mitigation solutions to prevent worst-case failure scenarios and help to perform adjustments to either operational or design parameters.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}