Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379170
Michal Mrena, M. Kvassay, R. Stankovic
Reliability belongs to key characteristics of most technical, as well as, non-technical systems. Therefore, its evaluation should be one of the principal skills of graduates of technically oriented study programs, such as mechanical engineering, electrical engineering, computer engineering, or informatics. However, analysis of system reliability is a challenging task, especially in case of systems composed of many components. Main issues in this case are efficient representation of the system and fast computation of basic reliability characteristics, such as availability of the system or importance of the system components. The first issue can be solved by using special data structures and the second one by implementation of existing algorithms using these data structures. A Binary Decision Diagram (BDD) is one of the most prospective data structures that can be used for this purpose. It is a graph structure that allows representing Boolean functions in an efficient way. In reliability analysis, it can be used to represent structure of the system. However, manipulation with bigger BDDs and their application in computation of basic reliability indices usually requires good computer support in a form of specific software tool. The core of such a software tool should be a software library implementing operations that allows fast manipulation with BDDs. In this paper, we present one such library. The library is primarily intended for the development of software tools for reliability analysis of complex systems based on BDDs, and it will also be used as a support tool within practical classes of a course on reliability engineering that is taught at the Faculty of Management Science and Informatics of University of Zilina.
{"title":"Software Library for Teaching Applications of Binary Decision Diagrams in Reliability Analysis","authors":"Michal Mrena, M. Kvassay, R. Stankovic","doi":"10.1109/ICETA51985.2020.9379170","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379170","url":null,"abstract":"Reliability belongs to key characteristics of most technical, as well as, non-technical systems. Therefore, its evaluation should be one of the principal skills of graduates of technically oriented study programs, such as mechanical engineering, electrical engineering, computer engineering, or informatics. However, analysis of system reliability is a challenging task, especially in case of systems composed of many components. Main issues in this case are efficient representation of the system and fast computation of basic reliability characteristics, such as availability of the system or importance of the system components. The first issue can be solved by using special data structures and the second one by implementation of existing algorithms using these data structures. A Binary Decision Diagram (BDD) is one of the most prospective data structures that can be used for this purpose. It is a graph structure that allows representing Boolean functions in an efficient way. In reliability analysis, it can be used to represent structure of the system. However, manipulation with bigger BDDs and their application in computation of basic reliability indices usually requires good computer support in a form of specific software tool. The core of such a software tool should be a software library implementing operations that allows fast manipulation with BDDs. In this paper, we present one such library. The library is primarily intended for the development of software tools for reliability analysis of complex systems based on BDDs, and it will also be used as a support tool within practical classes of a course on reliability engineering that is taught at the Faculty of Management Science and Informatics of University of Zilina.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379248
Fuan Wen, Haoliang Wang
In recent years, universities have paid more and more attention to virtual simulation experiments. Tens of thousands of virtual simulation teaching products have been developed and widely used in the market. However, there is a lack of effective evaluation indicators for virtual experimental teaching products. How to use the fast-developing virtual simulation technology to improve the fidelity of virtual experimental images is an urgent problem that needs to be solved in virtual experimental teaching. This paper proposes specific indicators for the fidelity of virtual simulation experiments, including first-level fidelity evaluation indicators such as experimental environment, experimental objects, experimental operations, and experimental phenomena. After corresponding first-level indicators, second-level evaluation indicators are proposed. By selecting 474 national virtual simulation experiment teaching declaration projects issued by the Ministry of Education in 2019 for testing, there are no controversial views, and a series of evaluation data are obtained and analyzed, and then the fidelity technical evaluation index of the virtual simulation experiment teaching project is proposed. The plan can be used as a reference for relevant researchers when evaluating virtual simulation experiment teaching projects.
{"title":"Research on fidelity technology evaluation index of virtual simulation experiment","authors":"Fuan Wen, Haoliang Wang","doi":"10.1109/ICETA51985.2020.9379248","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379248","url":null,"abstract":"In recent years, universities have paid more and more attention to virtual simulation experiments. Tens of thousands of virtual simulation teaching products have been developed and widely used in the market. However, there is a lack of effective evaluation indicators for virtual experimental teaching products. How to use the fast-developing virtual simulation technology to improve the fidelity of virtual experimental images is an urgent problem that needs to be solved in virtual experimental teaching. This paper proposes specific indicators for the fidelity of virtual simulation experiments, including first-level fidelity evaluation indicators such as experimental environment, experimental objects, experimental operations, and experimental phenomena. After corresponding first-level indicators, second-level evaluation indicators are proposed. By selecting 474 national virtual simulation experiment teaching declaration projects issued by the Ministry of Education in 2019 for testing, there are no controversial views, and a series of evaluation data are obtained and analyzed, and then the fidelity technical evaluation index of the virtual simulation experiment teaching project is proposed. The plan can be used as a reference for relevant researchers when evaluating virtual simulation experiment teaching projects.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379182
P. Segec, M. Moravčík, M. Kontšek, J. Papán
Cloud computing along with virtualization, offers an excellent tool in IT education to support presence learning. However, what is the most common in today's situation, they excellently support online distance teaching. Cloud offers simplified access to computing resources, services and applications that support modern approach to learning. Therefore, several universities in Slovakia have built their own cloud solutions using their local computing resources. However, their employees also use the services of public cloud providers in their daily teaching practice. This situation thus opens up and supports the transition from the use of isolated private and public CC services to the construction and use of hybrid-based solutions. The article deals with an initial analysis of issues of implementation CC models with an emphasis on hybrid (multi) CC deployment solutions with a view to further exploring and developing HCC deployments for the Slovak sector of higher education institutions.
{"title":"Perspective of hybrid cloud computing in higher education","authors":"P. Segec, M. Moravčík, M. Kontšek, J. Papán","doi":"10.1109/ICETA51985.2020.9379182","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379182","url":null,"abstract":"Cloud computing along with virtualization, offers an excellent tool in IT education to support presence learning. However, what is the most common in today's situation, they excellently support online distance teaching. Cloud offers simplified access to computing resources, services and applications that support modern approach to learning. Therefore, several universities in Slovakia have built their own cloud solutions using their local computing resources. However, their employees also use the services of public cloud providers in their daily teaching practice. This situation thus opens up and supports the transition from the use of isolated private and public CC services to the construction and use of hybrid-based solutions. The article deals with an initial analysis of issues of implementation CC models with an emphasis on hybrid (multi) CC deployment solutions with a view to further exploring and developing HCC deployments for the Slovak sector of higher education institutions.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379175
J. Papán, P. Segec, Juraj Dobrota, Lukáš Koncz, Oleksandra Yeremenko, Oleksandr V Lemeshko, M. Yevdokymenko
The Fast ReRoute (FRR) is an area that addresses issues of network recovery in the event of crucial devices or line failures in the network. During the event of a failure in the ISP network, the process of network convergence starts. This process may last unpredictable time and traffic affected by the failure may be inevitably lost. FRR mechanisms work mostly on the principle of a precalculated backup route. After a failure at one of the protected nodes in the network, the FRR mechanism will use a specific backup route to redirect traffic away from the location affected by the failure. By using FRR mechanisms in the Internet Service Provider (ISP) network, we can minimize the time required for network recovery to the order of tens of milliseconds and thus ensure immediate recovery of communication after a network outage.
{"title":"Review of Fast ReRoute solutions","authors":"J. Papán, P. Segec, Juraj Dobrota, Lukáš Koncz, Oleksandra Yeremenko, Oleksandr V Lemeshko, M. Yevdokymenko","doi":"10.1109/ICETA51985.2020.9379175","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379175","url":null,"abstract":"The Fast ReRoute (FRR) is an area that addresses issues of network recovery in the event of crucial devices or line failures in the network. During the event of a failure in the ISP network, the process of network convergence starts. This process may last unpredictable time and traffic affected by the failure may be inevitably lost. FRR mechanisms work mostly on the principle of a precalculated backup route. After a failure at one of the protected nodes in the network, the FRR mechanism will use a specific backup route to redirect traffic away from the location affected by the failure. By using FRR mechanisms in the Internet Service Provider (ISP) network, we can minimize the time required for network recovery to the order of tens of milliseconds and thus ensure immediate recovery of communication after a network outage.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379209
Š. Korečko, B. Sobota, M. Hudák, R. F. Edorco, M. Sivý
– Visuospatial cognitive functions play a crucial role in human cognition. In recent years., these functions have sparked interest among researchers., neuroscientists and psychologists., focusing on their training., assessment and restoration. Virtual reality (VR) provides an immersive environment., which can be used for stimulation of these cognitive functions and its effects that can be measured afterwards. The experimental procedure., described in this paper., bring us closer to understanding how a VR experience., in a gamified form using a tower defense genre game., may improve our visuospatial cognitive functions. An incremental development., described in this paper., is a shift from the use of a unique but expensive VR CAVE to a more flexible., smaller and cheaper solution – a VR headset. The development utilizes a progressive mix of web and VR technologies. The presented approach can contribute to a new method of experiment participants testing., even outside a laboratory environment.
{"title":"Testing of Visuospatial Cognitive Functions in Virtual Reality Environment","authors":"Š. Korečko, B. Sobota, M. Hudák, R. F. Edorco, M. Sivý","doi":"10.1109/ICETA51985.2020.9379209","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379209","url":null,"abstract":"– Visuospatial cognitive functions play a crucial role in human cognition. In recent years., these functions have sparked interest among researchers., neuroscientists and psychologists., focusing on their training., assessment and restoration. Virtual reality (VR) provides an immersive environment., which can be used for stimulation of these cognitive functions and its effects that can be measured afterwards. The experimental procedure., described in this paper., bring us closer to understanding how a VR experience., in a gamified form using a tower defense genre game., may improve our visuospatial cognitive functions. An incremental development., described in this paper., is a shift from the use of a unique but expensive VR CAVE to a more flexible., smaller and cheaper solution – a VR headset. The development utilizes a progressive mix of web and VR technologies. The presented approach can contribute to a new method of experiment participants testing., even outside a laboratory environment.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132705934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379228
P. Kanuch, Dominik Macko, L. Hudec
A huge amount of cybersecurity attacks discovered in recent years, moreover in the last one associated with the pandemic situation, where intruders are trying to exploit the hospitals and research centers. It can be dangerous as nowadays a lot of IoT devices are connected in that area of life. It is one of the several points of our motivation to secure IoT devices or data in Healthcare. In our article, we discussed several approaches dealing with the classification of security attacks. In the next part, we analyzed and compared HIP-based security protocols also used in IoT networks. We also ran experiments to show that it is crucial to bring energy-efficient lightweight, optimized protocol for using in IoT networks within sufficient security strength.
{"title":"HIP-Based Security in IoT Networks: A comparison","authors":"P. Kanuch, Dominik Macko, L. Hudec","doi":"10.1109/ICETA51985.2020.9379228","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379228","url":null,"abstract":"A huge amount of cybersecurity attacks discovered in recent years, moreover in the last one associated with the pandemic situation, where intruders are trying to exploit the hospitals and research centers. It can be dangerous as nowadays a lot of IoT devices are connected in that area of life. It is one of the several points of our motivation to secure IoT devices or data in Healthcare. In our article, we discussed several approaches dealing with the classification of security attacks. In the next part, we analyzed and compared HIP-based security protocols also used in IoT networks. We also ran experiments to show that it is crucial to bring energy-efficient lightweight, optimized protocol for using in IoT networks within sufficient security strength.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379171
A. Jantošová, J. Morgoš, I. Dolnák, J. Litvik
The following article provides an overview of currently the most perspective radio access technologies designed for vehicular V2X (Vehicle-to-Everything) environment, mainly for mutual communication among vehicles, and also for communication between vehicles and infrastructure. Principally, the goal of the article is to summarize general knowledge about radio access technologies designed for vehicular V2X networks, which are mainly WLAN based communication technologies and communication technologies based on cellular V2X technologies. In the context of described vehicular V2X communication technologies, the end of this article compares selected communication technologies that could bring a new perspective not only for scientific research but also for the reader who is interested in the issue of the vehicular V2X networks.
{"title":"A comparative study of the most perspective radio access technologies for vehicular V2X networks","authors":"A. Jantošová, J. Morgoš, I. Dolnák, J. Litvik","doi":"10.1109/ICETA51985.2020.9379171","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379171","url":null,"abstract":"The following article provides an overview of currently the most perspective radio access technologies designed for vehicular V2X (Vehicle-to-Everything) environment, mainly for mutual communication among vehicles, and also for communication between vehicles and infrastructure. Principally, the goal of the article is to summarize general knowledge about radio access technologies designed for vehicular V2X networks, which are mainly WLAN based communication technologies and communication technologies based on cellular V2X technologies. In the context of described vehicular V2X communication technologies, the end of this article compares selected communication technologies that could bring a new perspective not only for scientific research but also for the reader who is interested in the issue of the vehicular V2X networks.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379237
L. Antoni, J. Guniš, P. Gurský, S. Horvát, S. Krajci, O. Krídlo, M. Opiela, A. Szabari, Ľ. Šnajder, G. Andrejková, D. Sveda
In this paper, we present the general description of Data Science, artificial intelligence, machine learning and deep learning. We describe the short history of Data Science from the beginning to nowadays. We briefly notate the interdisciplinarity of Data Science, different roles of data scientists, different types of tasks in machine learning. We thoroughly present the role of National project IT Academy - Education for the 21st Century in the university education in Slovakia. Moreover, we describe the main role of Competence center for university education and the several educational and research results of this center regarding the national project IT Academy - Education for the 21st Century.
{"title":"Data Science and its position in university education within National Project IT Academy-Education for 21st Century","authors":"L. Antoni, J. Guniš, P. Gurský, S. Horvát, S. Krajci, O. Krídlo, M. Opiela, A. Szabari, Ľ. Šnajder, G. Andrejková, D. Sveda","doi":"10.1109/ICETA51985.2020.9379237","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379237","url":null,"abstract":"In this paper, we present the general description of Data Science, artificial intelligence, machine learning and deep learning. We describe the short history of Data Science from the beginning to nowadays. We briefly notate the interdisciplinarity of Data Science, different roles of data scientists, different types of tasks in machine learning. We thoroughly present the role of National project IT Academy - Education for the 21st Century in the university education in Slovakia. Moreover, we describe the main role of Competence center for university education and the several educational and research results of this center regarding the national project IT Academy - Education for the 21st Century.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/ICETA51985.2020.9379168
Chen Wang, Fuan Wen
At present, virtual simulation experiment is commonly used in teaching practice, greatly enriching students' learning experience. However, students still face the problems of less interactive experience, poor participation and a low degree of freedom in the process of interaction through virtual simulation experiment. With the popularity of virtual reality technology, somatosensory interaction and other new human-computer interaction technology, the innovative learning method of learning with physical experience has attracted extensive attention in academic circles. Based on the theory of embodied cognition, this paper constructs a virtual simulation experiment interaction model based on the theory of embodied cognition. The purpose of this model is to emphasize the embodiment of cognition and the embeddedness of cognitive environment, enhance the immersion of students, effectively stimulate students' interest in learning, and realize the dynamic interaction among students, learning resources and teachers in virtual environment The construction and development of the real experimental resources can be used for reference.
{"title":"Research and design of virtual simulation experiment learning interaction for embodied cognition","authors":"Chen Wang, Fuan Wen","doi":"10.1109/ICETA51985.2020.9379168","DOIUrl":"https://doi.org/10.1109/ICETA51985.2020.9379168","url":null,"abstract":"At present, virtual simulation experiment is commonly used in teaching practice, greatly enriching students' learning experience. However, students still face the problems of less interactive experience, poor participation and a low degree of freedom in the process of interaction through virtual simulation experiment. With the popularity of virtual reality technology, somatosensory interaction and other new human-computer interaction technology, the innovative learning method of learning with physical experience has attracted extensive attention in academic circles. Based on the theory of embodied cognition, this paper constructs a virtual simulation experiment interaction model based on the theory of embodied cognition. The purpose of this model is to emphasize the embodiment of cognition and the embeddedness of cognitive environment, enhance the immersion of students, effectively stimulate students' interest in learning, and realize the dynamic interaction among students, learning resources and teachers in virtual environment The construction and development of the real experimental resources can be used for reference.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114514274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-12DOI: 10.1109/iceta51985.2020.9379149
{"title":"[Title page]","authors":"","doi":"10.1109/iceta51985.2020.9379149","DOIUrl":"https://doi.org/10.1109/iceta51985.2020.9379149","url":null,"abstract":"","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}