We here illustrate a new indoor navigation system. It is an outcome of creativity, which merges an imaginative scenario and new technologies. The system intends to guide a person in unknown building by relying on technologies which do not depend on infrastructures. The system includes two key components, namely positioning and path planning. Positioning is based on geomagnetic fields, and it overcomes the several limits of WIFI and Bluetooth, etc. Path planning is based on a new and optimized Ant Colony algorithm, called Ant Colony Optimization (ACO), which offers better performances than the classic A* algorithms. The paper illustrates the logic and the architecture of the system, and also presents experimental results.
{"title":"Multi-floor Indoor Navigation with Geomagnetic Field Positioning and Ant Colony Optimization Algorithm","authors":"Kaixu Liu, G. Motta, Tianyi Ma, Tao Guo","doi":"10.1109/SOSE.2016.18","DOIUrl":"https://doi.org/10.1109/SOSE.2016.18","url":null,"abstract":"We here illustrate a new indoor navigation system. It is an outcome of creativity, which merges an imaginative scenario and new technologies. The system intends to guide a person in unknown building by relying on technologies which do not depend on infrastructures. The system includes two key components, namely positioning and path planning. Positioning is based on geomagnetic fields, and it overcomes the several limits of WIFI and Bluetooth, etc. Path planning is based on a new and optimized Ant Colony algorithm, called Ant Colony Optimization (ACO), which offers better performances than the classic A* algorithms. The paper illustrates the logic and the architecture of the system, and also presents experimental results.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aging population is an important trend of global population development in this century, and its influence reaches far and wide. Taiwan society is also affected by this global trend of aging, so industries should understand and adapt to this trend for the sake of survival. Moreover, the aging of populations around the world will bring enormous impact and change to the social system, lifestyle, business and economic model, and various industries. In order to sustain industrial development, more effort should be made to understand the influence of aging on industrial development trends. The aim of this essay is to discuss the influence of Taiwan's aging population on the design industry, thereby finding out how Taiwan's design industry should cope with the aging population.
{"title":"Discussing the Influence of Aging on Taiwan's Design Industry","authors":"C. Yang, Chung-Shan Sun","doi":"10.1109/SOSE.2016.21","DOIUrl":"https://doi.org/10.1109/SOSE.2016.21","url":null,"abstract":"The aging population is an important trend of global population development in this century, and its influence reaches far and wide. Taiwan society is also affected by this global trend of aging, so industries should understand and adapt to this trend for the sake of survival. Moreover, the aging of populations around the world will bring enormous impact and change to the social system, lifestyle, business and economic model, and various industries. In order to sustain industrial development, more effort should be made to understand the influence of aging on industrial development trends. The aim of this essay is to discuss the influence of Taiwan's aging population on the design industry, thereby finding out how Taiwan's design industry should cope with the aging population.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133664709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Web Services-based SOAs, BPEL 2.0 is the choice for defining services by composing existing ones. BPEL-based services can be directly executed on BPEL engines. With the rise of the cloud, companies aim to outsource service hosting to cloud providers. To achieve economies of scale, a cloud provider must host such services with minimal resources and keep the services from different tenants isolated. But BPEL engines typically do not support multi-tenancy. As a result, a vendor either has to extend the engine himself or host every service on its own (virtual) machine, thereby using either costly development or computing resources. Our approach solves this problem by hosting each service in its own isolated and minimal container which exposes the management functionality through APIs enabling complex multi-tenancy features or horizontal scaling on top. We aim to implement this by a) leveraging Docker container to isolate the services from each other, b) removing unused software from the container, c) starting the BPEL engine with minimal resources, and d) extracting management functionality while keeping management APIs. Our case study with Apache ODE shows that we can save significant runtime resources with only minor development effort. While this approach helps in moving SOAs into the cloud, it can also be leveraged to build resource efficient BPEL-based microservices cheaper.
{"title":"Service-Oriented Multi-tenancy (SO-MT): Enabling Multi-tenancy for Existing Service Composition Engines with Docker","authors":"G. Nikol, Michael Träger, Simon Harrer, G. Wirtz","doi":"10.1109/SOSE.2016.40","DOIUrl":"https://doi.org/10.1109/SOSE.2016.40","url":null,"abstract":"In Web Services-based SOAs, BPEL 2.0 is the choice for defining services by composing existing ones. BPEL-based services can be directly executed on BPEL engines. With the rise of the cloud, companies aim to outsource service hosting to cloud providers. To achieve economies of scale, a cloud provider must host such services with minimal resources and keep the services from different tenants isolated. But BPEL engines typically do not support multi-tenancy. As a result, a vendor either has to extend the engine himself or host every service on its own (virtual) machine, thereby using either costly development or computing resources. Our approach solves this problem by hosting each service in its own isolated and minimal container which exposes the management functionality through APIs enabling complex multi-tenancy features or horizontal scaling on top. We aim to implement this by a) leveraging Docker container to isolate the services from each other, b) removing unused software from the container, c) starting the BPEL engine with minimal resources, and d) extracting management functionality while keeping management APIs. Our case study with Apache ODE shows that we can save significant runtime resources with only minor development effort. While this approach helps in moving SOAs into the cloud, it can also be leveraged to build resource efficient BPEL-based microservices cheaper.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127838162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Though, cloud computing continues to gain popularity and has enormous economic gains, the perceived lack of trust from end-users accessing these resources continues to hinder its full deployment, usage and adoption. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform seem to be limited. With the nature of cloud, service level agreements are not enough, the user would want a transparent system with a traceability facility that allows the user to determine the relationship between varying trust relationships across the cloud layers, components, algorithms and applications especially at large scale. This paper presents some security mechanisms that enable cloud service end users to evaluate the trust level of various cloud services and resources. These mechanisms are evaluated based on fuzzy theory on a Eucalyptus cloud platform.
{"title":"Trust Modeling in Cloud Computing","authors":"Mary-Jane Sule, Maozhen Li, G. Taylor","doi":"10.1109/SOSE.2016.32","DOIUrl":"https://doi.org/10.1109/SOSE.2016.32","url":null,"abstract":"Though, cloud computing continues to gain popularity and has enormous economic gains, the perceived lack of trust from end-users accessing these resources continues to hinder its full deployment, usage and adoption. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform seem to be limited. With the nature of cloud, service level agreements are not enough, the user would want a transparent system with a traceability facility that allows the user to determine the relationship between varying trust relationships across the cloud layers, components, algorithms and applications especially at large scale. This paper presents some security mechanisms that enable cloud service end users to evaluate the trust level of various cloud services and resources. These mechanisms are evaluated based on fuzzy theory on a Eucalyptus cloud platform.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121293839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroyuki Sato, Atsushi Kanai, S. Tanimoto, Toru Kobayashi
IoT (Internet of Things) is changing the world. Today, we see that the Internet is reaching every bit in the world. IoT environment contains mobile devices, automotive equipments, and home appliances. Everything is sensed, actuated, and integrated into the Internet. Accordingly, the related problems are fast emerging. Considering the fact that the IoT is closely connected to human activities, and that the problems essential to them are tangled with traditional technical problems, it is quite natural that new challenges emerge there. Device control and privacy related security problems are their typical concerns. On the other hand, continuous efforts have been made for establishing trust in the untrusted Internet. Particularly, since it became clear that mutual trust was essential to securely and trustfully expand the market of e-commerce in the Internet, a number of technical solutions have been proposed and deployed. Furthermore, a kind of social infrastructure - trust frameworks have been deployed and are operated as the trust anchors in the Internet. In our work, trust establishment in IoT environments is investigated along the line of the trust framework in identities. First, our IoT architecture is proposed. Control and data service layer is placed on top of the device layer and the wireless communications. Trust establishment on the service layer includes that of device control and wireless security. Here, we consider "area"-wise trust, where its level is assessed in terms of device identification, monitoring of device behaviors, connection process to devices and connection protocols that are parallel to the assessment criteria in the conventional trust framework. Secure mobile network as the anchor of IoT trust is also discussed.
{"title":"Establishing Trust in the Emerging Era of IoT","authors":"Hiroyuki Sato, Atsushi Kanai, S. Tanimoto, Toru Kobayashi","doi":"10.1109/SOSE.2016.50","DOIUrl":"https://doi.org/10.1109/SOSE.2016.50","url":null,"abstract":"IoT (Internet of Things) is changing the world. Today, we see that the Internet is reaching every bit in the world. IoT environment contains mobile devices, automotive equipments, and home appliances. Everything is sensed, actuated, and integrated into the Internet. Accordingly, the related problems are fast emerging. Considering the fact that the IoT is closely connected to human activities, and that the problems essential to them are tangled with traditional technical problems, it is quite natural that new challenges emerge there. Device control and privacy related security problems are their typical concerns. On the other hand, continuous efforts have been made for establishing trust in the untrusted Internet. Particularly, since it became clear that mutual trust was essential to securely and trustfully expand the market of e-commerce in the Internet, a number of technical solutions have been proposed and deployed. Furthermore, a kind of social infrastructure - trust frameworks have been deployed and are operated as the trust anchors in the Internet. In our work, trust establishment in IoT environments is investigated along the line of the trust framework in identities. First, our IoT architecture is proposed. Control and data service layer is placed on top of the device layer and the wireless communications. Trust establishment on the service layer includes that of device control and wireless security. Here, we consider \"area\"-wise trust, where its level is assessed in terms of device identification, monitoring of device behaviors, connection process to devices and connection protocols that are parallel to the assessment criteria in the conventional trust framework. Secure mobile network as the anchor of IoT trust is also discussed.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129262428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Choreographies represent a particular approach for service composition in which coordination is performed in a distributed way. This approach is becoming one of the de facto standards for service composition in the Future Internet. However, QoS-aware deployment and management of service choreographies is usually performed without explicitly considering service sharing. This simplifying assumption makes choreography deployment less feasible in real scenarios, in which individual services are actually shared by several choreographies. This paper presents an approach for QoS-aware service selection for multiple choreographies considering the sharing of services among them. In particular, we argue that sharing-aware service selection represents a more realistic perspective since unsupervised service sharing may degrade the overall QoS provided for the choreographies. Our approach for service selection avoids this degradation by taking into account, besides the QoS requirements of service consumers and the QoS properties of services, the aggregate service load that results from the sharing.
{"title":"An Approach for QoS-aware Selection of Shared Services for Multiple Service Choreographies","authors":"J. C. Lima, R. Rocha, F. Costa","doi":"10.1109/SOSE.2016.62","DOIUrl":"https://doi.org/10.1109/SOSE.2016.62","url":null,"abstract":"Choreographies represent a particular approach for service composition in which coordination is performed in a distributed way. This approach is becoming one of the de facto standards for service composition in the Future Internet. However, QoS-aware deployment and management of service choreographies is usually performed without explicitly considering service sharing. This simplifying assumption makes choreography deployment less feasible in real scenarios, in which individual services are actually shared by several choreographies. This paper presents an approach for QoS-aware service selection for multiple choreographies considering the sharing of services among them. In particular, we argue that sharing-aware service selection represents a more realistic perspective since unsupervised service sharing may degrade the overall QoS provided for the choreographies. Our approach for service selection avoids this degradation by taking into account, besides the QoS requirements of service consumers and the QoS properties of services, the aggregate service load that results from the sharing.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115641547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, both the vehicle active safety service and the user infotainment service have become two core applications for vehicular delay tolerant networks (VDTNs). Both the core applications over VDTNs demand a high data transmission capacity. Additionally, the connection between any vehicle nodes in VDTNs is intermittent and opportunistic. The intermittent data dissemination is a more stringent and challenging issue than the full connectivity vehicular ad-hoc networks (VANETs). In this paper, we propose a data dissemination algorithm using node forwarding capability estimation (D2NFCE). For the first step, D2NFCE has to estimate the active connection time interval according to the moving directions and the velocities between any two vehicles. Secondly, the throughput function for VDTNs is fitted by building the wavelet neural network traffic model. Next, the throughput function within the effective connection time interval is integrated to obtain the forwarding capability estimation of the node. And then, the high efficiency routing algorithm for VDTNs is designed by the node forwarding capability estimation. Finally, D2NFCE is simulated on the opportunity network emulator (ONE). Experimental results show that the D2NFCE can greatly improve data dissemination efficiency, reduce the transmission delay, delay jitter and data packet loss rate compared with the state of the art.
{"title":"Intermittent Data Dissemination Using Node Forwarding Capability Estimation in Vehicle Delay Tolerant Networks","authors":"Zhi-yuan Li, Pan-Pan Wu, Yue Song, Jun-lei Bi","doi":"10.1109/SOSE.2016.12","DOIUrl":"https://doi.org/10.1109/SOSE.2016.12","url":null,"abstract":"Recently, both the vehicle active safety service and the user infotainment service have become two core applications for vehicular delay tolerant networks (VDTNs). Both the core applications over VDTNs demand a high data transmission capacity. Additionally, the connection between any vehicle nodes in VDTNs is intermittent and opportunistic. The intermittent data dissemination is a more stringent and challenging issue than the full connectivity vehicular ad-hoc networks (VANETs). In this paper, we propose a data dissemination algorithm using node forwarding capability estimation (D2NFCE). For the first step, D2NFCE has to estimate the active connection time interval according to the moving directions and the velocities between any two vehicles. Secondly, the throughput function for VDTNs is fitted by building the wavelet neural network traffic model. Next, the throughput function within the effective connection time interval is integrated to obtain the forwarding capability estimation of the node. And then, the high efficiency routing algorithm for VDTNs is designed by the node forwarding capability estimation. Finally, D2NFCE is simulated on the opportunity network emulator (ONE). Experimental results show that the D2NFCE can greatly improve data dissemination efficiency, reduce the transmission delay, delay jitter and data packet loss rate compared with the state of the art.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121640013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongmei Liu, X. Wu, Xin Zhang, Hong Zhu, Ian Bayley
Web services are designed to be discovered and composed dynamically, which implies that testing must also be done dynamically. This involves both the generation of test cases and the checking of test results. This paper presents algorithms for both of these using the technique of algebraic specification. It focuses in particular on the problem that web services, when they are third-party, have poor controllability and observability, and introduces a solution known as monic floating checkable test cases. A prototype tool has implemented the proposed testing technique and it is applied to a case study with a real industry application GoGrid, demonstrating that the technique is both applicable and feasible.
{"title":"Monic Testing of Web Services Based on Algebraic Specifications","authors":"Dongmei Liu, X. Wu, Xin Zhang, Hong Zhu, Ian Bayley","doi":"10.1109/SOSE.2016.45","DOIUrl":"https://doi.org/10.1109/SOSE.2016.45","url":null,"abstract":"Web services are designed to be discovered and composed dynamically, which implies that testing must also be done dynamically. This involves both the generation of test cases and the checking of test results. This paper presents algorithms for both of these using the technique of algebraic specification. It focuses in particular on the problem that web services, when they are third-party, have poor controllability and observability, and introduces a solution known as monic floating checkable test cases. A prototype tool has implemented the proposed testing technique and it is applied to a case study with a real industry application GoGrid, demonstrating that the technique is both applicable and feasible.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of computer technology, video event detection is becoming more and more important part of Recognition Pattern. Video event detection is the process of describing, identifying, classifying and interpreting the Objects or phenomena in the video. Finally across the underlying semantic gap, get high-level semantic concept. This paper improves the hypergraph partitioning theory, for the classification of the video events. The graph transformation tool AGG is used to conduct experiments in order to evaluate the accuracy of hypergraph method, a good result is obtained.
{"title":"Hypergraph Partitioning for Video Event Detection","authors":"Xiao Jun Chen, Bao-Ding Chen, Hui Xu, Jian-Guo Zhang, Jia Ke, Wen-Xin Wang, Xin-Ping Song, Xiao-Ming Jiang, Manrong Wang, Xiaobo Chen, Qian-Qian Zhang, Wen-Hong Cai","doi":"10.1109/SOSE.2016.33","DOIUrl":"https://doi.org/10.1109/SOSE.2016.33","url":null,"abstract":"With the development of computer technology, video event detection is becoming more and more important part of Recognition Pattern. Video event detection is the process of describing, identifying, classifying and interpreting the Objects or phenomena in the video. Finally across the underlying semantic gap, get high-level semantic concept. This paper improves the hypergraph partitioning theory, for the classification of the video events. The graph transformation tool AGG is used to conduct experiments in order to evaluate the accuracy of hypergraph method, a good result is obtained.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web services play an important role in today's business economy, allowing the development of distributed applications and systems over the Internet. The challenge of finding the 'right' web service, which meets a consumer's functional and non-foundational requirements, has increased with the growing numbers of web services. Web service discovery initiates the process of finding, locating and retrieving existing web services based on consumer requirements. Different web service discovery approaches have been proposed by researchers, based on different techniques and strategies. To understand the different components of discovery systems, on the poster, we discuss the process of web service discovery, the challenges of web service discovery and our proposed taxonomy of web service discovery systems based on five perspectives.
{"title":"A Taxonomy to Characterize Web Service Discovery Approaches, Looking at Five Perspectives","authors":"Waeal J. Obidallah, B. Raahemi","doi":"10.1109/SOSE.2016.13","DOIUrl":"https://doi.org/10.1109/SOSE.2016.13","url":null,"abstract":"Web services play an important role in today's business economy, allowing the development of distributed applications and systems over the Internet. The challenge of finding the 'right' web service, which meets a consumer's functional and non-foundational requirements, has increased with the growing numbers of web services. Web service discovery initiates the process of finding, locating and retrieving existing web services based on consumer requirements. Different web service discovery approaches have been proposed by researchers, based on different techniques and strategies. To understand the different components of discovery systems, on the poster, we discuss the process of web service discovery, the challenges of web service discovery and our proposed taxonomy of web service discovery systems based on five perspectives.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}