Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274665
L. Susanto, T. Ahmad
Since a long time ago, biometrics has become a popular authentication method to verify users easily. Despite this advantage, the user’s biometric data must be stored securely because those data cannot be replaced once it has been compromised. It is because humans cannot alter parts of his or her body. Many methods can be used to secure biometric data. One of them is the cancelable fingerprint template. However, its matching computation process is quite expensive, as many minutia points need to compare. In this paper, we optimize the number of minutia points in its selection process using a new threshold. It is to reduce the computational cost of pair-polar coordinate-based cancelable fingerprint template’s matching. The experiment result shows that the proposed method achieves five times better performance than the previous method.
{"title":"Reducing Computational Cost of Pair-Polar Coordinate-based Cancelable Fingerprint Template Matching","authors":"L. Susanto, T. Ahmad","doi":"10.1109/IC2IE50715.2020.9274665","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274665","url":null,"abstract":"Since a long time ago, biometrics has become a popular authentication method to verify users easily. Despite this advantage, the user’s biometric data must be stored securely because those data cannot be replaced once it has been compromised. It is because humans cannot alter parts of his or her body. Many methods can be used to secure biometric data. One of them is the cancelable fingerprint template. However, its matching computation process is quite expensive, as many minutia points need to compare. In this paper, we optimize the number of minutia points in its selection process using a new threshold. It is to reduce the computational cost of pair-polar coordinate-based cancelable fingerprint template’s matching. The experiment result shows that the proposed method achieves five times better performance than the previous method.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132070501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274658
F. Kurniadi, Desty Septyani, I. Pratama
Lampung characters are one of the region-heritage characters from Indonesia. However, the current trend makes these characters becoming unknown. The concern about the extinction of these characters makes several researchers tried to digitized the documents which contained Lampung Character. Nevertheless, the process of digitalization is not free from noise. This problem makes us want to handle the noise from the scanned documents using binarization and noise removal techniques, especially in Lampung characters' documents. In this paper, we implemented local adaptive thresholding using the Niblack method and the Sauvola method for thresholding value. We also implemented Adaptive Wavelet Thresholding for Bayes Shrink for removing salt and pepper noise from the binarization process. The result showed that the Sauvola thresholding gives better results compared to Niblack thresholding. Our contribution in this paper is the implementation of both processes in Lampung Characters document
{"title":"Local Adaptive Thresholding Techniques for Binarizing Scanned Lampung Aksara Document Images","authors":"F. Kurniadi, Desty Septyani, I. Pratama","doi":"10.1109/IC2IE50715.2020.9274658","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274658","url":null,"abstract":"Lampung characters are one of the region-heritage characters from Indonesia. However, the current trend makes these characters becoming unknown. The concern about the extinction of these characters makes several researchers tried to digitized the documents which contained Lampung Character. Nevertheless, the process of digitalization is not free from noise. This problem makes us want to handle the noise from the scanned documents using binarization and noise removal techniques, especially in Lampung characters' documents. In this paper, we implemented local adaptive thresholding using the Niblack method and the Sauvola method for thresholding value. We also implemented Adaptive Wavelet Thresholding for Bayes Shrink for removing salt and pepper noise from the binarization process. The result showed that the Sauvola thresholding gives better results compared to Niblack thresholding. Our contribution in this paper is the implementation of both processes in Lampung Characters document","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274564
Hana Rizky Herdika, E. K. Budiardjo
The user story widely studied insufficiently describes the software requirements. Many studies discuss the challenges of requirements specifications and proposed solutions. However, there are many agile methods and each method embraces different practices. Therefore, the solution has to follow each method’s ceremonies. Only a few studies discuss conducted practices in requirements specification development with the agile method and there are no studies that discuss practices comparisons among these methods. In this paper, we performed a systematic literature review to gather the available studies in procuring a current insight into the requirements engineering practices incorporate into the agile method. This study aims to map the variability and commonality practices among agile methods. The various and standard agile RE practices show crucial practices in the requirements specification development process. Moreover, it gives information on practices from other methods that increase the success of requirements specification development. From the systematic literature review, we found a total of 12 studies relevant to the study. There are eight variability and commonality practices between Scrum, XP, and Lean methods.
{"title":"Variability and Commonality Requirement Specification on Agile Software Development: Scrum, XP, Lean, and Kanban","authors":"Hana Rizky Herdika, E. K. Budiardjo","doi":"10.1109/IC2IE50715.2020.9274564","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274564","url":null,"abstract":"The user story widely studied insufficiently describes the software requirements. Many studies discuss the challenges of requirements specifications and proposed solutions. However, there are many agile methods and each method embraces different practices. Therefore, the solution has to follow each method’s ceremonies. Only a few studies discuss conducted practices in requirements specification development with the agile method and there are no studies that discuss practices comparisons among these methods. In this paper, we performed a systematic literature review to gather the available studies in procuring a current insight into the requirements engineering practices incorporate into the agile method. This study aims to map the variability and commonality practices among agile methods. The various and standard agile RE practices show crucial practices in the requirements specification development process. Moreover, it gives information on practices from other methods that increase the success of requirements specification development. From the systematic literature review, we found a total of 12 studies relevant to the study. There are eight variability and commonality practices between Scrum, XP, and Lean methods.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131418363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274596
Nandiwardhana Waranugraha, M. Suryanegara
This paper aims to develop the Internet-of Things (IoT) Smart-Basket, working on 2 different systems, i.e. Edge Computing and Cloud Computing. To identify the best system, we compare the performance between “Edge Computing” system and “Cloud Computing” system. The system consists of Raspberry Pi hardware and webcam. Python, TFLite, OpenCV, and Google Cloud Vision API software to detect shopping objects. The object detection results are calculated and sent to end-users through the Telegram application. Discussions are presented concerning the Time Performance and RSSI Value between two systems. The results show “Edge Computing” systems have a more stable system with an average processing time of 1.74 sec on Line-of-Sight (LOS) condition and 1.75 sec on Non-Line-of-Sight (NLOS) condition compared to “Cloud Computing” systems with an average processing time of 10.46 sec on LOS condition and 5.36 sec on NLOS condition.
{"title":"The Development of IoT-Smart Basket: Performance Comparison between Edge Computing and Cloud Computing System","authors":"Nandiwardhana Waranugraha, M. Suryanegara","doi":"10.1109/IC2IE50715.2020.9274596","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274596","url":null,"abstract":"This paper aims to develop the Internet-of Things (IoT) Smart-Basket, working on 2 different systems, i.e. Edge Computing and Cloud Computing. To identify the best system, we compare the performance between “Edge Computing” system and “Cloud Computing” system. The system consists of Raspberry Pi hardware and webcam. Python, TFLite, OpenCV, and Google Cloud Vision API software to detect shopping objects. The object detection results are calculated and sent to end-users through the Telegram application. Discussions are presented concerning the Time Performance and RSSI Value between two systems. The results show “Edge Computing” systems have a more stable system with an average processing time of 1.74 sec on Line-of-Sight (LOS) condition and 1.75 sec on Non-Line-of-Sight (NLOS) condition compared to “Cloud Computing” systems with an average processing time of 10.46 sec on LOS condition and 5.36 sec on NLOS condition.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274685
I. Priyanto, C. A. Hartanto, A. M. Arymurthy
The aquaculture method uses floating net cages are the most productive fish farming techniques. We utilize deep learning for change detection and monitoring of floating net cages quantities by detecting & counting the number of floating net cages plots on the same Region of Interest (RoI) in different years using google earth satellite imagery. The proposed methods apply Faster R-CNN for detection purposes and compare Faster R-CNN between using NASNet-A and inception-v2 as the feature extractor. Our experiments have been conducted on annotation images by cropping google earth images to demonstrate the effectiveness and efficiency of the proposed method. The results show that Faster R-CNN using NASNet-A achieves higher accuracy with longer training time. In addition, Faster R-CNN with inception-v2 network also provided promising results with lower training time.
{"title":"Change Detection of Floating Net Cages Quantities Utilizing Faster R-CNN","authors":"I. Priyanto, C. A. Hartanto, A. M. Arymurthy","doi":"10.1109/IC2IE50715.2020.9274685","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274685","url":null,"abstract":"The aquaculture method uses floating net cages are the most productive fish farming techniques. We utilize deep learning for change detection and monitoring of floating net cages quantities by detecting & counting the number of floating net cages plots on the same Region of Interest (RoI) in different years using google earth satellite imagery. The proposed methods apply Faster R-CNN for detection purposes and compare Faster R-CNN between using NASNet-A and inception-v2 as the feature extractor. Our experiments have been conducted on annotation images by cropping google earth images to demonstrate the effectiveness and efficiency of the proposed method. The results show that Faster R-CNN using NASNet-A achieves higher accuracy with longer training time. In addition, Faster R-CNN with inception-v2 network also provided promising results with lower training time.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274643
Ferryansa, Avon Budiono, A. Almaarif
The use of a very wide windows operating system is undeniably also followed by increasing attacks on the operating system. Universal Serial Bus (USB) is one of the mechanisms used by many people with plug and play functionality that is very easy to use, making data transfers fast and easy compared to other hardware. Some research shows that the Windows operating system has weaknesses so that it is often exploited by using various attacks and malware. There are various methods used to exploit the Windows operating system, one of them by using a USB device. By using a USB device, a criminal can plant a backdoor reverse shell to exploit the victim’s computer just by connecting the USB device to the victim’s computer without being noticed. This research was conducted by planting a reverse shell backdoor through a USB device to exploit the victim’s device, especially the webcam and microphone device on the target computer. From 35 experiments that have been carried out, it was found that 83% of spying attacks using USB devices on the Windows operating system were successfully carried out.
{"title":"Analysis of USB Based Spying Method Using Arduino and Metasploit Framework in Windows Operating System","authors":"Ferryansa, Avon Budiono, A. Almaarif","doi":"10.1109/IC2IE50715.2020.9274643","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274643","url":null,"abstract":"The use of a very wide windows operating system is undeniably also followed by increasing attacks on the operating system. Universal Serial Bus (USB) is one of the mechanisms used by many people with plug and play functionality that is very easy to use, making data transfers fast and easy compared to other hardware. Some research shows that the Windows operating system has weaknesses so that it is often exploited by using various attacks and malware. There are various methods used to exploit the Windows operating system, one of them by using a USB device. By using a USB device, a criminal can plant a backdoor reverse shell to exploit the victim’s computer just by connecting the USB device to the victim’s computer without being noticed. This research was conducted by planting a reverse shell backdoor through a USB device to exploit the victim’s device, especially the webcam and microphone device on the target computer. From 35 experiments that have been carried out, it was found that 83% of spying attacks using USB devices on the Windows operating system were successfully carried out.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115120064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274607
T. Mantoro, M. A. Ayu, R. Handayanto
Crime information is usually announced periodically. To get the information in real-time, the information should be retrieved through the information retrieval system automatically. The system should choose some appropriate keywords for retrieving the crime data. Eight keywords have been chosen which represented the most viral topic. The keywords in this study were analyzed regarding their sentiment from the hashtags in twitter posts. The Machine Learning algorithms were utilised such as Multinomal Naive Bayes, Random Forest Classifier, Linear SVM, and Nearestneighborhood (kNN) finding a better classifier. Sentiments, both positive and negative, are usually have been used by the website content designer to attract the reader. Most keywords showed negative sentiment which showed the negative reaction from the people. The sentiment analysis in Bahasa Indonesia also useful for understanding the people’s view on the types of crime as well as for keyword selection in the crime information retrieval system. As the result, near-repeat crime effect as a condition where criminal activity tends to repeat in the near place and time, can be predicted.
{"title":"Machine Learning Approach for Sentiment Analysis in Crime Information Retrieval","authors":"T. Mantoro, M. A. Ayu, R. Handayanto","doi":"10.1109/IC2IE50715.2020.9274607","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274607","url":null,"abstract":"Crime information is usually announced periodically. To get the information in real-time, the information should be retrieved through the information retrieval system automatically. The system should choose some appropriate keywords for retrieving the crime data. Eight keywords have been chosen which represented the most viral topic. The keywords in this study were analyzed regarding their sentiment from the hashtags in twitter posts. The Machine Learning algorithms were utilised such as Multinomal Naive Bayes, Random Forest Classifier, Linear SVM, and Nearestneighborhood (kNN) finding a better classifier. Sentiments, both positive and negative, are usually have been used by the website content designer to attract the reader. Most keywords showed negative sentiment which showed the negative reaction from the people. The sentiment analysis in Bahasa Indonesia also useful for understanding the people’s view on the types of crime as well as for keyword selection in the crime information retrieval system. As the result, near-repeat crime effect as a condition where criminal activity tends to repeat in the near place and time, can be predicted.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124256430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/ic2ie50715.2020.9274652
{"title":"Welcome Editorial Remarks","authors":"","doi":"10.1109/ic2ie50715.2020.9274652","DOIUrl":"https://doi.org/10.1109/ic2ie50715.2020.9274652","url":null,"abstract":"","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116163675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274677
D. I. Sensuse, Hafizh Rafizal Adnan
Interaction between the government and the citizen is essential to improve public service and promote government openness. Knowledge resulted from e-participation initiatives is an asset for a government institution, especially to enable innovation. However, integrative study about knowledge management (KM) to support e-participation is currently lacking in the literature. Therefore, this study aimed to identify the state of the art of emerging knowledge management solution for participative government. The present study employed the Kitchenham method to explore literature related to knowledge management in the e-participation context. There were seventeen articles included in this study. Several alternatives to KM application, mechanism, and impacts were identified in this study. The findings of this study are expected to be a reference for further innovation in knowledge management, especially to optimize the potential of a combination of expert and public knowledge to enhance public service quality.
{"title":"Emerging Knowledge Management Practice for Participative Govemment","authors":"D. I. Sensuse, Hafizh Rafizal Adnan","doi":"10.1109/IC2IE50715.2020.9274677","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274677","url":null,"abstract":"Interaction between the government and the citizen is essential to improve public service and promote government openness. Knowledge resulted from e-participation initiatives is an asset for a government institution, especially to enable innovation. However, integrative study about knowledge management (KM) to support e-participation is currently lacking in the literature. Therefore, this study aimed to identify the state of the art of emerging knowledge management solution for participative government. The present study employed the Kitchenham method to explore literature related to knowledge management in the e-participation context. There were seventeen articles included in this study. Several alternatives to KM application, mechanism, and impacts were identified in this study. The findings of this study are expected to be a reference for further innovation in knowledge management, especially to optimize the potential of a combination of expert and public knowledge to enhance public service quality.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274627
P. Oktivasari, Fikri Vallian, Riandini
The heart sound detector using an android-based electronic stethoscope is a development of an acoustic stethoscope. This tool converts the sound of the heartbeat into an electrical signal by wirelessly displaying the first heart sound signal S1 (Lub), and the second heart sound signal S2 (Dub) on the android application. A low-cost electronic stethoscope consisting of a condenser microphone that converts the sound of the heartbeat captured by the stethoscope into a heartbeat signal, a signal conditioning circuit that corrects the detected signal. The output signal from the conditioner circuit is processed by the ADC on the Arduino, which will then be sent to Android using Bluetooth. The open source software used to display heart rate detection results is Android Studio. S1 and S2 heart sound signal patterns have been recorded in real-time with intervals of 2-3 seconds duration, and no time delay. The resulting signals can be saved as graphs and WAV files.
{"title":"Pattern Detection in Heart Sound Signal Based on Android Application","authors":"P. Oktivasari, Fikri Vallian, Riandini","doi":"10.1109/IC2IE50715.2020.9274627","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274627","url":null,"abstract":"The heart sound detector using an android-based electronic stethoscope is a development of an acoustic stethoscope. This tool converts the sound of the heartbeat into an electrical signal by wirelessly displaying the first heart sound signal S1 (Lub), and the second heart sound signal S2 (Dub) on the android application. A low-cost electronic stethoscope consisting of a condenser microphone that converts the sound of the heartbeat captured by the stethoscope into a heartbeat signal, a signal conditioning circuit that corrects the detected signal. The output signal from the conditioner circuit is processed by the ADC on the Arduino, which will then be sent to Android using Bluetooth. The open source software used to display heart rate detection results is Android Studio. S1 and S2 heart sound signal patterns have been recorded in real-time with intervals of 2-3 seconds duration, and no time delay. The resulting signals can be saved as graphs and WAV files.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122069052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}