Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804980
Kawtar Akoudad, F. Jawab
The objective of this article is to model the processes of an International Road Freight Transport chain (IRFT, henceforth) for an eventual monitoring and optimization of their deadlines. In order to achieve this goal, we have designed an integrated model, that we have named `TSI', by combining three methods; namely, the Top-down approach, the tool `Supplier, Input, Process, Output, Customer' (SIPOC) and method `Integration Definition Language 0' (IDF0). Then we have deployed the model obtained at the level of IRFT chain between Morocco and Spain. This implementation allowed us to decline the chain into three levels (from the chain to macro processes, from macro processes to processes and from processes to activities).
{"title":"Design and deployment of the model ‘TSI’ for modeling the processes of the IRFT chain between Morocco and Spain","authors":"Kawtar Akoudad, F. Jawab","doi":"10.1109/CIST.2016.7804980","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804980","url":null,"abstract":"The objective of this article is to model the processes of an International Road Freight Transport chain (IRFT, henceforth) for an eventual monitoring and optimization of their deadlines. In order to achieve this goal, we have designed an integrated model, that we have named `TSI', by combining three methods; namely, the Top-down approach, the tool `Supplier, Input, Process, Output, Customer' (SIPOC) and method `Integration Definition Language 0' (IDF0). Then we have deployed the model obtained at the level of IRFT chain between Morocco and Spain. This implementation allowed us to decline the chain into three levels (from the chain to macro processes, from macro processes to processes and from processes to activities).","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805009
Raja Ettiane, R. Elkouch, A. Chaoub
3G mobile networks have gained high user popularity due to the tremendous growth of the smart phone market. However, their complex signaling procedures and limited soft capacity made them vulnerable to new denial-of-service (DoS) attacks involving the control plane. More importantly, this type of frauds can also affect the successors of the 3G and their related paradigms such as smart cities. In this paper, we deeply examine the considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks. Besides, we investigate some state-of-art techniques proposed to combat the signaling attacks. A comparative analysis between these solutions has been conducted with regard to three pertinent criteria: cost, efficiency and overhead. The summary of results indicates that even though the randomization experiences some flaws related to the radio channel consumption, it presents the most optimal cost and overhead compared to the remaining solutions. This study opens up a new horizon for more secure 3G systems based on the randomization defense mechanisms.
{"title":"Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives","authors":"Raja Ettiane, R. Elkouch, A. Chaoub","doi":"10.1109/CIST.2016.7805009","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805009","url":null,"abstract":"3G mobile networks have gained high user popularity due to the tremendous growth of the smart phone market. However, their complex signaling procedures and limited soft capacity made them vulnerable to new denial-of-service (DoS) attacks involving the control plane. More importantly, this type of frauds can also affect the successors of the 3G and their related paradigms such as smart cities. In this paper, we deeply examine the considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks. Besides, we investigate some state-of-art techniques proposed to combat the signaling attacks. A comparative analysis between these solutions has been conducted with regard to three pertinent criteria: cost, efficiency and overhead. The summary of results indicates that even though the randomization experiences some flaws related to the radio channel consumption, it presents the most optimal cost and overhead compared to the remaining solutions. This study opens up a new horizon for more secure 3G systems based on the randomization defense mechanisms.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805108
Hamid Slimani, N. E. Faddouli, Rachid Benslimane, S. Bennani
The profusion of digital resources, mainly educational ones, inside the Moroccan universities makes it difficult to satisfy students' information needs. Hence, this raises the issue of personalized search and recommendation of Digital Educational Resources (DER) within a repository. In this paper, we propose enriching the repository model ORI-OAI by the following functionalities: the filtering of results based on students' interests, the recommendation of digital educational resources based on their competences and adding of the Arabic language.
{"title":"Personalized search and recommendation in a digital educational resources repository: The case of ORI-OAI","authors":"Hamid Slimani, N. E. Faddouli, Rachid Benslimane, S. Bennani","doi":"10.1109/CIST.2016.7805108","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805108","url":null,"abstract":"The profusion of digital resources, mainly educational ones, inside the Moroccan universities makes it difficult to satisfy students' information needs. Hence, this raises the issue of personalized search and recommendation of Digital Educational Resources (DER) within a repository. In this paper, we propose enriching the repository model ORI-OAI by the following functionalities: the filtering of results based on students' interests, the recommendation of digital educational resources based on their competences and adding of the Arabic language.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804960
M. Sekkal, N. Berrached, K. Medjaher, C. Varnier
Predictive maintenance of physical systems can only be achieved by monitoring their most critical elements to track their health assessment during operation. The acquired data is processed to extract relevant features, which are used to estimate the state of the system at any time and detect any loss of performance that may occur due to the critical element. We propose in this work an architecture of generic method to supervise this critical element and generate a Health Indicator (HI) for the physical system. The generated HI takes into account the evolution in time of the healthy status of the physical systems. The proposed method is based on sensors data that allow us to extract in real time the values of features constituting themselves the HI construction bloc input, through several HI obtaining test. Block diagram of the approach is made, then checked using benchmark data taken from “NASA data repository prognosis” associated to an element used in different operating conditions are checked. This approach is classified as data driven method which use sensors data that inform us about the real-time values of features.
{"title":"Skeleton of a generic approach for the generation of health indicators of physical systems","authors":"M. Sekkal, N. Berrached, K. Medjaher, C. Varnier","doi":"10.1109/CIST.2016.7804960","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804960","url":null,"abstract":"Predictive maintenance of physical systems can only be achieved by monitoring their most critical elements to track their health assessment during operation. The acquired data is processed to extract relevant features, which are used to estimate the state of the system at any time and detect any loss of performance that may occur due to the critical element. We propose in this work an architecture of generic method to supervise this critical element and generate a Health Indicator (HI) for the physical system. The generated HI takes into account the evolution in time of the healthy status of the physical systems. The proposed method is based on sensors data that allow us to extract in real time the values of features constituting themselves the HI construction bloc input, through several HI obtaining test. Block diagram of the approach is made, then checked using benchmark data taken from “NASA data repository prognosis” associated to an element used in different operating conditions are checked. This approach is classified as data driven method which use sensors data that inform us about the real-time values of features.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804971
Tarik Hajji, Sidi Yasser El Jasouli, J. Mbarki, E. Jaâra
This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this survey we have tried to find out if the MFIs are willing to adopt the new technologies in their system by using software solutions. The survey has been conducted with MFIs in located in different countries. Besides MFIs, the respondents included banks as well.
{"title":"Microfinance risk analysis using the business intelligence","authors":"Tarik Hajji, Sidi Yasser El Jasouli, J. Mbarki, E. Jaâra","doi":"10.1109/CIST.2016.7804971","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804971","url":null,"abstract":"This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this survey we have tried to find out if the MFIs are willing to adopt the new technologies in their system by using software solutions. The survey has been conducted with MFIs in located in different countries. Besides MFIs, the respondents included banks as well.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804956
J. Ibrahim, A. Dahlan
A number of key studies have argued universities are in need of new business models in order to stay relevant and sustainable. Drivers of change such as technology, financial support, industry trends and socio-economic ecosystems are dictating higher education sector to re-examine its existing business model and value proposition. The changes are dynamic and complex. It is very difficult to analyse complex problem without proper business modeling tools. Business Model Canvas (BMC) and Value Proposition Design (VPD) are recent tools being used by industry to design, evaluate alternative business models and value propositions. The tools allows us to design business models that create value for the business and value propositions that create value for the customers, thus enabling the creation of sustainable road maps. In this paper we explore the use of BMC as business modeling tool to analyse and design sustainable business models for the University of the Future. Depending on the targeted customer segments and value proposition design, we found design options for the University of the Future. In our opinion this will help university business planners and relevant stakeholders to design sustainable and competitive business model.
{"title":"Designing business models options for “University of the Future”","authors":"J. Ibrahim, A. Dahlan","doi":"10.1109/CIST.2016.7804956","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804956","url":null,"abstract":"A number of key studies have argued universities are in need of new business models in order to stay relevant and sustainable. Drivers of change such as technology, financial support, industry trends and socio-economic ecosystems are dictating higher education sector to re-examine its existing business model and value proposition. The changes are dynamic and complex. It is very difficult to analyse complex problem without proper business modeling tools. Business Model Canvas (BMC) and Value Proposition Design (VPD) are recent tools being used by industry to design, evaluate alternative business models and value propositions. The tools allows us to design business models that create value for the business and value propositions that create value for the customers, thus enabling the creation of sustainable road maps. In this paper we explore the use of BMC as business modeling tool to analyse and design sustainable business models for the University of the Future. Depending on the targeted customer segments and value proposition design, we found design options for the University of the Future. In our opinion this will help university business planners and relevant stakeholders to design sustainable and competitive business model.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"21 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805012
M. Laanaoui, S. Raghay
Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic through intelligent transportation systems. In addition, the growing demand for access to data and information from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle to roadside communication systems capable of high data rates and amenable to high degrees of node mobility. The importance of inter-vehicle communication is increasing due to its role in organizing road. In this paper we present our proposition witch consisting of a new routing protocol VANET (vehicle AdHoc Network). This protocol is based on the localization of the node, and also the score assigned to each vehicle and the cost for each junction. We evaluate the performance of our protocol IRUV by comparing it with the VANET protocols: LAR and GyTAR in terms of: End to End Delay, and Delivery Ratio.
{"title":"New routing process in VANET","authors":"M. Laanaoui, S. Raghay","doi":"10.1109/CIST.2016.7805012","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805012","url":null,"abstract":"Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic through intelligent transportation systems. In addition, the growing demand for access to data and information from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle to roadside communication systems capable of high data rates and amenable to high degrees of node mobility. The importance of inter-vehicle communication is increasing due to its role in organizing road. In this paper we present our proposition witch consisting of a new routing protocol VANET (vehicle AdHoc Network). This protocol is based on the localization of the node, and also the score assigned to each vehicle and the cost for each junction. We evaluate the performance of our protocol IRUV by comparing it with the VANET protocols: LAR and GyTAR in terms of: End to End Delay, and Delivery Ratio.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805029
Mohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir
In this paper we deal with business process verification for reachability, liveness and deadlock-freeness properties. Actual business process verification techniques use formal methods such as model checking that checks exhaustively temporal logics properties, however, in this case, the business process model must be mapped to an abstract mathematical model (like Petri nets, timed automata or process algebra) on which the verification process could be done. The fact that the verification is done on this second representation can fake the results if the transformation is either erroneous or over-constrained as well as if the proprieties are misspecified. In this article we illustrate that probability calculation can be used in business process verification by evaluating a disjunctive normal form of its conditions, moreover, the verification process could be done directly on the business process model and can handle all its functional elements. We have developed an application that numerically shows the performance of our proposed technique by verifying several workflows with various “known” flaws.
{"title":"A probabilistic method for business process verification: Reachability, Liveness and deadlock detection","authors":"Mohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir","doi":"10.1109/CIST.2016.7805029","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805029","url":null,"abstract":"In this paper we deal with business process verification for reachability, liveness and deadlock-freeness properties. Actual business process verification techniques use formal methods such as model checking that checks exhaustively temporal logics properties, however, in this case, the business process model must be mapped to an abstract mathematical model (like Petri nets, timed automata or process algebra) on which the verification process could be done. The fact that the verification is done on this second representation can fake the results if the transformation is either erroneous or over-constrained as well as if the proprieties are misspecified. In this article we illustrate that probability calculation can be used in business process verification by evaluating a disjunctive normal form of its conditions, moreover, the verification process could be done directly on the business process model and can handle all its functional elements. We have developed an application that numerically shows the performance of our proposed technique by verifying several workflows with various “known” flaws.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805023
Hajar Sahbani, M. E. Marraki
The mathematical framework of networks is well suited to describe several systems consisting of a large number of entities interacting with each others. Every entity is represented by a network node and each interaction by a link between two nodes. It is therefore possible to model these networks as graphs. In this paper, we present a reliability study for chain topologies based on spanning tree in a social network considered as graph. Our approach consist on finding a general formulae that compute complexities in some special closed networks, which represent an important measure of robustness and reliability, then we compare which topology can be adopted for a more reliable routing.
{"title":"Robustness study in closed social networks using spanning tree approach","authors":"Hajar Sahbani, M. E. Marraki","doi":"10.1109/CIST.2016.7805023","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805023","url":null,"abstract":"The mathematical framework of networks is well suited to describe several systems consisting of a large number of entities interacting with each others. Every entity is represented by a network node and each interaction by a link between two nodes. It is therefore possible to model these networks as graphs. In this paper, we present a reliability study for chain topologies based on spanning tree in a social network considered as graph. Our approach consist on finding a general formulae that compute complexities in some special closed networks, which represent an important measure of robustness and reliability, then we compare which topology can be adopted for a more reliable routing.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804981
Norelislam El Hami, Mustapha Bouchekourte
Drawing upon the main theories that frame investment management styles and liquidity of financial assets, this paper is about getting more insight into Optimization of liquidity of the stock market. The liquidity is very important to determinate investment decisions made by institutional investors [8]. We consider the RL variable, representing the liquidity ratio of the Moroccan stock market, as the function to be optimized. Then, we used a panel of 15 institutional investors (three pension funds, eleven insurance companies and aggregated Moroccan Mutual Funds-OPCVM-) to estimate the proportion of their portfolios which is allocated to equity pockets. The results indicate that the liquidity ratio is impacted in the short and long term by both macroeconomic and microstructure variables and by structural factors. The optimization method used is a modified particle swarm optimization (MPSO). It's known as an efficient approach with a high performance of solving optimization problems in many research fields. It is a population intelligence algorithm inspired by social behavior simulations of bird flocking. Considerable research work on classical method PSO (Particle Swarm Optimization) has been done to improve the performance of this method. This method has the advantage to provide best results comparing with all heuristics methods. The results of this paper allow us to conclude that equities are under weighted in the portfolios of Moroccan institutional investors. The consequences of this structure impede the development of capital market which includes the Casablanca stock exchange.
{"title":"Optimising liquidity with modified particle swarm optimization application: Case of Casablanca stock exchange","authors":"Norelislam El Hami, Mustapha Bouchekourte","doi":"10.1109/CIST.2016.7804981","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804981","url":null,"abstract":"Drawing upon the main theories that frame investment management styles and liquidity of financial assets, this paper is about getting more insight into Optimization of liquidity of the stock market. The liquidity is very important to determinate investment decisions made by institutional investors [8]. We consider the RL variable, representing the liquidity ratio of the Moroccan stock market, as the function to be optimized. Then, we used a panel of 15 institutional investors (three pension funds, eleven insurance companies and aggregated Moroccan Mutual Funds-OPCVM-) to estimate the proportion of their portfolios which is allocated to equity pockets. The results indicate that the liquidity ratio is impacted in the short and long term by both macroeconomic and microstructure variables and by structural factors. The optimization method used is a modified particle swarm optimization (MPSO). It's known as an efficient approach with a high performance of solving optimization problems in many research fields. It is a population intelligence algorithm inspired by social behavior simulations of bird flocking. Considerable research work on classical method PSO (Particle Swarm Optimization) has been done to improve the performance of this method. This method has the advantage to provide best results comparing with all heuristics methods. The results of this paper allow us to conclude that equities are under weighted in the portfolios of Moroccan institutional investors. The consequences of this structure impede the development of capital market which includes the Casablanca stock exchange.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129143078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}