This paper aim to implement an off-grid photovoltaic system for electrifications purposes to an existing bus stop at Melaka, Malaysia. A calculation has been carried out to determine the system size and design, hence also for improving the system design. The system will consists of solar PV panels along with batteries as energy storage, 500 Watt low power inverter and the small design with a load of capacity of approximately 400 Watt. The system setup could be operating in automatic mode to switch on at night and off the system during the day light. During the day the system design will be perform the energy harness cycle to replace all the used power from the battery. Further, the system setup can be extended for extra load connection in order to electrify remote or rural area. Thus, the photovoltaic system can be installed at any commercial area such as residences or highways.
{"title":"Implementation Off-Grid Solar Powered Technology to Electrify Existing Bus Stop","authors":"S. Ranjit, C. Tan, S. Subramaniam","doi":"10.1109/ISMS.2011.44","DOIUrl":"https://doi.org/10.1109/ISMS.2011.44","url":null,"abstract":"This paper aim to implement an off-grid photovoltaic system for electrifications purposes to an existing bus stop at Melaka, Malaysia. A calculation has been carried out to determine the system size and design, hence also for improving the system design. The system will consists of solar PV panels along with batteries as energy storage, 500 Watt low power inverter and the small design with a load of capacity of approximately 400 Watt. The system setup could be operating in automatic mode to switch on at night and off the system during the day light. During the day the system design will be perform the energy harness cycle to replace all the used power from the battery. Further, the system setup can be extended for extra load connection in order to electrify remote or rural area. Thus, the photovoltaic system can be installed at any commercial area such as residences or highways.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Herman, Azizah Abd. Rahman, Yoanda Alim Syahbana, K. A. Bakar
Quality of Service (QoS) of video streaming service over wireless and mobile network is determined by many intermingled factors. Some of the factors can be adjusted. Video resolution, audio rate, and bandwidth are among of them. Other factors are not fully controllable such as network throughput, delay, and packet lost probability. In order to increase user satisfaction, efforts to make better quality of video services should consider these factors. However, user-perceived quality of the service is not only determined by QoS factors. User experience, user expectation and user interest to specific content are among factors that influence level of user satisfaction. In this context, customer satisfaction is known as Quality of user Experience (QoE). Moreover, there is a nonlinearity issue regarding improvement of QoS and QoE. This paper will discuss a holistic view of video service quality in order to elaborate the nonlinearity of QoS and QoE factors and their contribution to enhance user satisfaction.
{"title":"Nonlinearity Modelling of QoE for Video Streaming over Wireless and Mobile Network","authors":"H. Herman, Azizah Abd. Rahman, Yoanda Alim Syahbana, K. A. Bakar","doi":"10.1109/ISMS.2011.55","DOIUrl":"https://doi.org/10.1109/ISMS.2011.55","url":null,"abstract":"Quality of Service (QoS) of video streaming service over wireless and mobile network is determined by many intermingled factors. Some of the factors can be adjusted. Video resolution, audio rate, and bandwidth are among of them. Other factors are not fully controllable such as network throughput, delay, and packet lost probability. In order to increase user satisfaction, efforts to make better quality of video services should consider these factors. However, user-perceived quality of the service is not only determined by QoS factors. User experience, user expectation and user interest to specific content are among factors that influence level of user satisfaction. In this context, customer satisfaction is known as Quality of user Experience (QoE). Moreover, there is a nonlinearity issue regarding improvement of QoS and QoE. This paper will discuss a holistic view of video service quality in order to elaborate the nonlinearity of QoS and QoE factors and their contribution to enhance user satisfaction.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114484721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper features state of the art and highly accurate method of designing a microwave amplifier. A Full-wave Electromagnetic (EM) Simulator that is based on Method-of-Moments (MoM) numerical method was used in complement with the conventional SPICE-based microwave circuit simulator to demonstrate a superior performance outcome such as Stability, Return Loss and Small Signal Gain. This method known as EM/Circuit Co-Simulation guarantees a design that work with the first board tape-out and concurrently multiple board layouts are avoided, which will saves design cost and time respectively. The method is precisely demonstrated with the design of power amplifier based on E-pHEMT technology intended for IEEE 802.16e Mobile WiMAX applications.
{"title":"The Emerging Role of EM Simulation in IEEE 802.16e Mobile WiMAX Power Amplifier Design","authors":"S. Kassim, F. Malek","doi":"10.1109/ISMS.2011.68","DOIUrl":"https://doi.org/10.1109/ISMS.2011.68","url":null,"abstract":"This paper features state of the art and highly accurate method of designing a microwave amplifier. A Full-wave Electromagnetic (EM) Simulator that is based on Method-of-Moments (MoM) numerical method was used in complement with the conventional SPICE-based microwave circuit simulator to demonstrate a superior performance outcome such as Stability, Return Loss and Small Signal Gain. This method known as EM/Circuit Co-Simulation guarantees a design that work with the first board tape-out and concurrently multiple board layouts are avoided, which will saves design cost and time respectively. The method is precisely demonstrated with the design of power amplifier based on E-pHEMT technology intended for IEEE 802.16e Mobile WiMAX applications.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Aksyonov, E. Bykov, E. Smoliy, Ekaterina Sufrygina, A.A. Sheklein, O. Aksyonova, Wang Kai
Effective decision support assist greatly in many control and management processes. Many business processes may be easily formalized and simulated, allowing automated assistance in decision making. The paper describes research on current decision support systems with the self-developed system BPsim.DSS, based on multi-agent simulation of resource conversion processes, extended with additional functionality, including agent coalitions consideration, simulation experiment design, and assistance in model design. Process definition apparatus allows such approach to be applied to various kinds of business processes in many spheres of life. Some examples of deployment within different kinds of enterprises are provided, including economical effect estimation.
{"title":"Efficient Decision Support with Simulation-Based System BPsim.DSS: Advanced Simulation Techniques","authors":"K. Aksyonov, E. Bykov, E. Smoliy, Ekaterina Sufrygina, A.A. Sheklein, O. Aksyonova, Wang Kai","doi":"10.1109/ISMS.2011.15","DOIUrl":"https://doi.org/10.1109/ISMS.2011.15","url":null,"abstract":"Effective decision support assist greatly in many control and management processes. Many business processes may be easily formalized and simulated, allowing automated assistance in decision making. The paper describes research on current decision support systems with the self-developed system BPsim.DSS, based on multi-agent simulation of resource conversion processes, extended with additional functionality, including agent coalitions consideration, simulation experiment design, and assistance in model design. Process definition apparatus allows such approach to be applied to various kinds of business processes in many spheres of life. Some examples of deployment within different kinds of enterprises are provided, including economical effect estimation.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raghdah Sadik Abdulhassan, M. Masood, Al-Samarraie Hosam
this study utilized the Souza's semiotic engineering theory of HCI to user interface metaphors. The main aim of using Metaphors is the ability to determine the potential meaning in ongoing cognitive activities. The data were collected through the “Icon Recognition Test” and the interview questions. In addition, the users’ navigation through Mac and Win7 operating systems include certain categories of metaphors. The examination result indicated that 90% of the “structure metaphors” appeared for the desktop icons and some of the Power Point environment. The findings of the study indicated that Win7 and Mac users did not recognize their system metaphors, which reflects how users can transfer their skills and experience through and across the two platforms after one week of practice across the systems.
{"title":"Semiotic Differences of Macintosh Os X & Microsoft Windows 7 Based on Metaphors and Interpretation","authors":"Raghdah Sadik Abdulhassan, M. Masood, Al-Samarraie Hosam","doi":"10.1109/ISMS.2011.41","DOIUrl":"https://doi.org/10.1109/ISMS.2011.41","url":null,"abstract":"this study utilized the Souza's semiotic engineering theory of HCI to user interface metaphors. The main aim of using Metaphors is the ability to determine the potential meaning in ongoing cognitive activities. The data were collected through the “Icon Recognition Test” and the interview questions. In addition, the users’ navigation through Mac and Win7 operating systems include certain categories of metaphors. The examination result indicated that 90% of the “structure metaphors” appeared for the desktop icons and some of the Power Point environment. The findings of the study indicated that Win7 and Mac users did not recognize their system metaphors, which reflects how users can transfer their skills and experience through and across the two platforms after one week of practice across the systems.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129355664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a novel and general algorithm for peak identification in semi-periodic signals which form an important class of useful signals occurring in several practical applications. The key ideas behind the proposed algorithm will be expounded in the paper. An extensive simulation study was carried out to test the performance of the proposed algorithm. The test bed for our performance analysis was a practical application involving ECG signals recorded from pregnant women, and consisting of identifying the heartbeat signals of both the mother and the fetus. Our proposed algorithm showed excellent results. Encouraged by this excellent performance, we also propose an enhanced version of this algorithm that can be extended to non semi-periodic signals and which will be tested as part of our future work.
{"title":"A Novel Algorithm for Peak Identification in Semi-periodic Signals","authors":"S. A. Al-Otaibi, L. Cheded","doi":"10.1109/ISMS.2011.34","DOIUrl":"https://doi.org/10.1109/ISMS.2011.34","url":null,"abstract":"In this paper, we propose a novel and general algorithm for peak identification in semi-periodic signals which form an important class of useful signals occurring in several practical applications. The key ideas behind the proposed algorithm will be expounded in the paper. An extensive simulation study was carried out to test the performance of the proposed algorithm. The test bed for our performance analysis was a practical application involving ECG signals recorded from pregnant women, and consisting of identifying the heartbeat signals of both the mother and the fetus. Our proposed algorithm showed excellent results. Encouraged by this excellent performance, we also propose an enhanced version of this algorithm that can be extended to non semi-periodic signals and which will be tested as part of our future work.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sun-young Park, Seon-Yeong Kim, Dong-Sung Ryu, Hwan-Gue Cho
It is not easy to align DNA sequences of whole genomes to find some useful biomarkers (in general term), as whole genome has more than 10 mega bases. Thus, we do not apply the straightforward Smith-Waterman O(N^2) time and space algorithms. If some specific DNA segments in which we are interested are very sparse, then the O(n^2) dynamic programming algorithm for aligning those are inefficient since that algorithm depends on the total length of the input string rather than the number of markers appearing on it. When we consider the retro-element over the whole genome, this problem becomes very clear since the size of whole genome is much more than a few (about 10-20) retro-elements we want to compare. In this paper we propose another alignment problem that consists of only two kinds of symbols, retro-elements and other general symbols. Thus, the whole genome can be regarded as a binary string of '1' (retroelement) and '0' (others). We propose an alignment algorithm for simplified binary string to reveal the structural similarity of retro-elements over two different genomes. The time complexity of this algorithm is O(M^2), where M denotes the number of retro-elements appearing in the genomes. We studied structural similarities of all HERV(Human Endogenous RetroViruses) element of four typical primates including Human, Chimpanzees, Orangutan and Rhesus monkey to show the usefulness of our algorithm. Our system successfully revealed the similarity distribution of retro elements for the four primates.
{"title":"A Time and Space Efficient Algorithm for Alignment and Visualization of Sparse Retro-elements over Whole Genome Scale","authors":"Sun-young Park, Seon-Yeong Kim, Dong-Sung Ryu, Hwan-Gue Cho","doi":"10.1109/ISMS.2011.29","DOIUrl":"https://doi.org/10.1109/ISMS.2011.29","url":null,"abstract":"It is not easy to align DNA sequences of whole genomes to find some useful biomarkers (in general term), as whole genome has more than 10 mega bases. Thus, we do not apply the straightforward Smith-Waterman O(N^2) time and space algorithms. If some specific DNA segments in which we are interested are very sparse, then the O(n^2) dynamic programming algorithm for aligning those are inefficient since that algorithm depends on the total length of the input string rather than the number of markers appearing on it. When we consider the retro-element over the whole genome, this problem becomes very clear since the size of whole genome is much more than a few (about 10-20) retro-elements we want to compare. In this paper we propose another alignment problem that consists of only two kinds of symbols, retro-elements and other general symbols. Thus, the whole genome can be regarded as a binary string of '1' (retroelement) and '0' (others). We propose an alignment algorithm for simplified binary string to reveal the structural similarity of retro-elements over two different genomes. The time complexity of this algorithm is O(M^2), where M denotes the number of retro-elements appearing in the genomes. We studied structural similarities of all HERV(Human Endogenous RetroViruses) element of four typical primates including Human, Chimpanzees, Orangutan and Rhesus monkey to show the usefulness of our algorithm. Our system successfully revealed the similarity distribution of retro elements for the four primates.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vibration analysis is the great need and can be used in many practical applications, especially in monitoring the status of machines, bridges and other construction works. This paper presents a low-cost structural health monitoring scheme using MEMS-based accelerometers. The purpose of this scheme is to achieve the high performance system for bridge monitoring with low cost. The system can operate in two modes, real-time and offline. In the real-time mode, embedded real-time short-time Fourier transform programs on the 3-DOF accelerometers were performed for the monitoring and alert. In the offline mode, the analysis of bridge models was utilized based on DIAMOND tool for further analyses and evaluations. Initial results show that the system is suitable for practical applications.
{"title":"Low-cost Structural Health Monitoring Scheme Using MEMS-based Accelerometers","authors":"T. Tan, Nguyen Tien Anh, Gian Quoc Anh","doi":"10.1109/ISMS.2011.42","DOIUrl":"https://doi.org/10.1109/ISMS.2011.42","url":null,"abstract":"Vibration analysis is the great need and can be used in many practical applications, especially in monitoring the status of machines, bridges and other construction works. This paper presents a low-cost structural health monitoring scheme using MEMS-based accelerometers. The purpose of this scheme is to achieve the high performance system for bridge monitoring with low cost. The system can operate in two modes, real-time and offline. In the real-time mode, embedded real-time short-time Fourier transform programs on the 3-DOF accelerometers were performed for the monitoring and alert. In the offline mode, the analysis of bridge models was utilized based on DIAMOND tool for further analyses and evaluations. Initial results show that the system is suitable for practical applications.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection of the attack while maintaining a reasonable level of throughput in the network.
{"title":"A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks","authors":"Jaydip Sen, Sripad Koilakonda, A. Ukil","doi":"10.1109/ISMS.2011.58","DOIUrl":"https://doi.org/10.1109/ISMS.2011.58","url":null,"abstract":"A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection of the attack while maintaining a reasonable level of throughput in the network.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Mahmoudi, Elahe Sabetnia, M. N. Torshiz, Mehrdad Jalali, G. T. Tabrizi
Association rule mining is sought for items through a fairly large data set relation are certainly consequential. The traditional association mining based on a uniform minimum support, either missed interesting patterns of low support or suffered from the bottleneck of itemset generation. An alternative solution relies on exploiting support constraints which specifies the required minimum support itemsets. This paper proposes an ACS-based algorithm to determine membership functions for each item followed by computing minimum supports. It therefore will run the fuzzy multi-level mining algorithm for extracting knowledge implicit in quantitative transactions, immediately. In order to address this need, the new approach can express three profits includes specifying the membership functions for each items, computing the minimum support for each item regarding to characteristic for each item in database and making a system automation. We considered an algorithm that can cover the multiple level association rules under multiple item supports, significantly.
{"title":"Multi-level Fuzzy Association Rules Mining via Determining Minimum Supports and Membership Functions","authors":"E. Mahmoudi, Elahe Sabetnia, M. N. Torshiz, Mehrdad Jalali, G. T. Tabrizi","doi":"10.1109/ISMS.2011.20","DOIUrl":"https://doi.org/10.1109/ISMS.2011.20","url":null,"abstract":"Association rule mining is sought for items through a fairly large data set relation are certainly consequential. The traditional association mining based on a uniform minimum support, either missed interesting patterns of low support or suffered from the bottleneck of itemset generation. An alternative solution relies on exploiting support constraints which specifies the required minimum support itemsets. This paper proposes an ACS-based algorithm to determine membership functions for each item followed by computing minimum supports. It therefore will run the fuzzy multi-level mining algorithm for extracting knowledge implicit in quantitative transactions, immediately. In order to address this need, the new approach can express three profits includes specifying the membership functions for each items, computing the minimum support for each item regarding to characteristic for each item in database and making a system automation. We considered an algorithm that can cover the multiple level association rules under multiple item supports, significantly.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}