Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060075
Hironobu Onishi, Hiroyuki Hatano, Y. Kuwahara
In this paper, we present a novel position estimation system for moving receivers in urban area. Currently, position estimation systems using at least four GPS satellites are most popular. However, because of the influence of signals shielded by buildings and multipath, measurement error becomes larger. For accurate estimation, we discuss algorithms for position estimation which doesn't depend on the GPS satellite too much. The proposal uses only one satellite and two receivers. Our approach is to reduce the necessary number of the satellites. Moreover, it is useful for Quasi-Zenith Satellite Systems effectively. In this paper, we introduce the proposal algorithm and the estimation characteristic derived from computation simulations.
{"title":"Proposal of position estimation algorithm using a satellite and shared data of receivers","authors":"Hironobu Onishi, Hiroyuki Hatano, Y. Kuwahara","doi":"10.1109/ITST.2011.6060075","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060075","url":null,"abstract":"In this paper, we present a novel position estimation system for moving receivers in urban area. Currently, position estimation systems using at least four GPS satellites are most popular. However, because of the influence of signals shielded by buildings and multipath, measurement error becomes larger. For accurate estimation, we discuss algorithms for position estimation which doesn't depend on the GPS satellite too much. The proposal uses only one satellite and two receivers. Our approach is to reduce the necessary number of the satellites. Moreover, it is useful for Quasi-Zenith Satellite Systems effectively. In this paper, we introduce the proposal algorithm and the estimation characteristic derived from computation simulations.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131603155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060147
Dr.Irshad Ahmed Sumra, H. Hasbullah, J. Manan, M. Iftikhar, I. Ahmad, M. Aalsalem
Security is one of the most important issues in new life saving vehicular network, whereas trust is key component of security in vehicular applications. These applications serve users when components (user, vehicle and RSU) of the network behave in an expected manner in peer to peer vehicular communication. Whenever any component of the network unexpectedly changes their behavior then it would be harmful for other users of the network. In this paper, we are proposed three different trust levels in peer to peer vehicular network. Purpose of proposed trust levels to discuss in detail is the functionality of different component of network which circumvents the attacker and emphasizes the role of trusted users in peer to peer vehicular communication.
{"title":"Trust levels in peer-to-peer (P2P) vehicular network","authors":"Dr.Irshad Ahmed Sumra, H. Hasbullah, J. Manan, M. Iftikhar, I. Ahmad, M. Aalsalem","doi":"10.1109/ITST.2011.6060147","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060147","url":null,"abstract":"Security is one of the most important issues in new life saving vehicular network, whereas trust is key component of security in vehicular applications. These applications serve users when components (user, vehicle and RSU) of the network behave in an expected manner in peer to peer vehicular communication. Whenever any component of the network unexpectedly changes their behavior then it would be harmful for other users of the network. In this paper, we are proposed three different trust levels in peer to peer vehicular network. Purpose of proposed trust levels to discuss in detail is the functionality of different component of network which circumvents the attacker and emphasizes the role of trusted users in peer to peer vehicular communication.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133630778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060118
C. Lo, Hsi-Pin Ma
In-vehicle power line communication (PLC) provides a solution for high data communication in the automotive networks without increasing volume, weight and cost of the wiring harnesses. This paper presents the vehicle power line channel model. Also, we propose the design of baseband transceiver, which specifically aimed at this channel model. In transmitter part, the corresponding preamble structure is designed. In the receiver part, it contains packet detection, symbol timing synchronization, sampling clock offset synchronization, channel estimation/equalization, and the nonlinear blanking process for reducing the impulsive noise. Functional simulations show the validity of these algorithms and system performance of the proposed transceiver.
{"title":"A high performance baseband transceiver for in-vehicle power line communications","authors":"C. Lo, Hsi-Pin Ma","doi":"10.1109/ITST.2011.6060118","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060118","url":null,"abstract":"In-vehicle power line communication (PLC) provides a solution for high data communication in the automotive networks without increasing volume, weight and cost of the wiring harnesses. This paper presents the vehicle power line channel model. Also, we propose the design of baseband transceiver, which specifically aimed at this channel model. In transmitter part, the corresponding preamble structure is designed. In the receiver part, it contains packet detection, symbol timing synchronization, sampling clock offset synchronization, channel estimation/equalization, and the nonlinear blanking process for reducing the impulsive noise. Functional simulations show the validity of these algorithms and system performance of the proposed transceiver.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060066
Nuutti Varis, J. Manner, Johanna Heinonen
GTP tunnels are used to transport user data packets in LTE networks over the mobile backhaul between the base stations and core network elements. Maintaining the tunnel as the user equipment moves requires heavy signaling. Moreover, the protocol stack effectively adds headers and thus introduces overhead. In this paper, we design and analyze an LTE architecture and mobility management solution that is based on layer-2 switching. We remove the GTP tunnel and its associated IP/UDP tunnel, and embed user IP packets directly in Ethernet frames within the mobile backhaul. Mobility management within an access network is distributed. We show that the design is very efficient and would simplify the future LTE evolution.
{"title":"A layer-2 approach for mobility and transport in the mobile backhaul","authors":"Nuutti Varis, J. Manner, Johanna Heinonen","doi":"10.1109/ITST.2011.6060066","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060066","url":null,"abstract":"GTP tunnels are used to transport user data packets in LTE networks over the mobile backhaul between the base stations and core network elements. Maintaining the tunnel as the user equipment moves requires heavy signaling. Moreover, the protocol stack effectively adds headers and thus introduces overhead. In this paper, we design and analyze an LTE architecture and mobility management solution that is based on layer-2 switching. We remove the GTP tunnel and its associated IP/UDP tunnel, and embed user IP packets directly in Ethernet frames within the mobile backhaul. Mobility management within an access network is distributed. We show that the design is very efficient and would simplify the future LTE evolution.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124220615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060134
N. Debnath, Paola Martellotto, Marcela Daniele, D. Riesco, G. Montejano
The Web services technology for invoking external applications from a workflow engine provides significant benefits to the WFMS. With the increasing number of web services that provide similar functionality, it is important to find the best web service that meets the user's needs, including both their functional and non functional requirements. The non-functional description of the service requires specifying at run time, the quality attributes that can influence the choice of a web service offered by a supplier. In this sense, it is essential to use metrics to evaluate the quality characteristics of Web services (QoS) in order to filter out Web services discovered, and obtain the most suitable one. The dynamic behavior of Web services regarding the development of new services and constantly changing existing ones, requires a continuous evaluation process, leading to capture web service information with respect to their quality and performance evaluation as requested by the workflow. This paper proposes a quantitative measurement method that allows evaluating QoS of web services, and provides a value that allows the comparison and selection that best meets the required characteristics.
{"title":"A method to evaluate QoS of web services required by a workflow","authors":"N. Debnath, Paola Martellotto, Marcela Daniele, D. Riesco, G. Montejano","doi":"10.1109/ITST.2011.6060134","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060134","url":null,"abstract":"The Web services technology for invoking external applications from a workflow engine provides significant benefits to the WFMS. With the increasing number of web services that provide similar functionality, it is important to find the best web service that meets the user's needs, including both their functional and non functional requirements. The non-functional description of the service requires specifying at run time, the quality attributes that can influence the choice of a web service offered by a supplier. In this sense, it is essential to use metrics to evaluate the quality characteristics of Web services (QoS) in order to filter out Web services discovered, and obtain the most suitable one. The dynamic behavior of Web services regarding the development of new services and constantly changing existing ones, requires a continuous evaluation process, leading to capture web service information with respect to their quality and performance evaluation as requested by the workflow. This paper proposes a quantitative measurement method that allows evaluating QoS of web services, and provides a value that allows the comparison and selection that best meets the required characteristics.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060161
Yuyao Zhao, Xin Su, Jie Zeng, Yuan You, Xibin Xu
Distributed antenna system (DAS) could provide high throughput for multi-users. The uplink sum transmission rate is studied in a multi-user DAS scenario. An uncomplicated antenna selection strategy is proposed to approach high sum rate. Considering fairness, the performance of inferior user could be improved remarkable with low sum rate loss in two-user scenario.
{"title":"Capacity analysis and antenna selection strategy for multi-user distributed antenna system","authors":"Yuyao Zhao, Xin Su, Jie Zeng, Yuan You, Xibin Xu","doi":"10.1109/ITST.2011.6060161","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060161","url":null,"abstract":"Distributed antenna system (DAS) could provide high throughput for multi-users. The uplink sum transmission rate is studied in a multi-user DAS scenario. An uncomplicated antenna selection strategy is proposed to approach high sum rate. Considering fairness, the performance of inferior user could be improved remarkable with low sum rate loss in two-user scenario.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122106200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060089
Mildred M. Caballeros Morales, Rim Haw, Jun Lee, C. Hong
The Vehicular Ad hoc Network (VANET) takes the advantage of the relative mobility of the vehicles to opportunistically share dynamic information when they meet, aiming to avoid accidents and traffic jams, get local information of the nearby places, enjoy entertainment applications among others. However, the shared information must be handled properly, saving bandwidth and tackling the unnecessary duplication of data, preventing the scalability problem and congestion. The current solutions of these problems incorporate the concept of Relevance to share the information in a clever way but they do not exploit the advantage of knowing the destination of the vehicles and context-aware services to follow behavior patterns. Therefore, we propose an efficient destination-based data management policy, which follows the vehicular behavior and context to determine the relevance or importance of the information using a publisher/subscriber model and cluster-based dissemination. In order to demonstrate the feasibility of the proposal we implemented sets of simulation in which the results reported an outstanding performance in terms of congestion and delivery ratio.
车辆自组织网络(Vehicular Ad hoc Network, VANET)利用车辆的相对移动性,在相遇时机会主义地共享动态信息,旨在避免事故和交通堵塞,获取附近地方的本地信息,享受娱乐应用等。但是,必须对共享信息进行适当的处理,节省带宽,解决不必要的数据重复,防止可扩展性问题和拥塞问题。这些问题的当前解决方案包含了相关性的概念,以一种巧妙的方式共享信息,但它们没有利用了解车辆目的地和上下文感知服务的优势来遵循行为模式。因此,我们提出了一种高效的基于目的地的数据管理策略,该策略遵循车辆行为和上下文,使用发布者/订阅者模型和基于集群的传播来确定信息的相关性或重要性。为了证明该建议的可行性,我们实施了一组仿真,其中结果报告了在拥塞和交付率方面的出色性能。
{"title":"An efficient destination-based data management policy for vehicular networks","authors":"Mildred M. Caballeros Morales, Rim Haw, Jun Lee, C. Hong","doi":"10.1109/ITST.2011.6060089","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060089","url":null,"abstract":"The Vehicular Ad hoc Network (VANET) takes the advantage of the relative mobility of the vehicles to opportunistically share dynamic information when they meet, aiming to avoid accidents and traffic jams, get local information of the nearby places, enjoy entertainment applications among others. However, the shared information must be handled properly, saving bandwidth and tackling the unnecessary duplication of data, preventing the scalability problem and congestion. The current solutions of these problems incorporate the concept of Relevance to share the information in a clever way but they do not exploit the advantage of knowing the destination of the vehicles and context-aware services to follow behavior patterns. Therefore, we propose an efficient destination-based data management policy, which follows the vehicular behavior and context to determine the relevance or importance of the information using a publisher/subscriber model and cluster-based dissemination. In order to demonstrate the feasibility of the proposal we implemented sets of simulation in which the results reported an outstanding performance in terms of congestion and delivery ratio.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114558231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060144
Hsing-yi Hsieh, Han-Kui Chang, Meng-Lin Ku
In cognitive radio (CR), spectrum sensing is a key enabling functionality to discover the vacant spectrum which is not occupied by primary systems. With good sensing capability, secondary users can effectively recycle the spectrum resource without disturbing active primary users. Energy detector (ED) is a commonly used and relatively simple spectrum sensing technique. In realistic environments, the CR receiver might operate at low signal-to-noise ratio (SNR) regimes due to the channel fading and noise uncertainty. At low SNR cases, the performance of the EDs degrades dramatically as the signal and noise are mixed together after the operation of energy calculation. In this paper, a high-order statistics (HOS) based sequential test detector is investigated to sense the underutilized spectrum, particularly for low-SNR applications. We resort to HOS, in terms of cumulant statistics, for overwhelming the Gaussian noise effect and improving the spectrum sensing reliability. Based on these cumulants, a binary hypothesis testing problem is formulated and a low-complexity sequential probability ratio test (SPRT) is developed for efficiently and fast detecting the vacant spectrum so as to meet the sensing duration requirements. Our numerical results show that the proposed detector outperforms the conventional EDs at extremely low SNR environments.
{"title":"Higher-order statistics based sequential spectrum sensing for cognitive radio","authors":"Hsing-yi Hsieh, Han-Kui Chang, Meng-Lin Ku","doi":"10.1109/ITST.2011.6060144","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060144","url":null,"abstract":"In cognitive radio (CR), spectrum sensing is a key enabling functionality to discover the vacant spectrum which is not occupied by primary systems. With good sensing capability, secondary users can effectively recycle the spectrum resource without disturbing active primary users. Energy detector (ED) is a commonly used and relatively simple spectrum sensing technique. In realistic environments, the CR receiver might operate at low signal-to-noise ratio (SNR) regimes due to the channel fading and noise uncertainty. At low SNR cases, the performance of the EDs degrades dramatically as the signal and noise are mixed together after the operation of energy calculation. In this paper, a high-order statistics (HOS) based sequential test detector is investigated to sense the underutilized spectrum, particularly for low-SNR applications. We resort to HOS, in terms of cumulant statistics, for overwhelming the Gaussian noise effect and improving the spectrum sensing reliability. Based on these cumulants, a binary hypothesis testing problem is formulated and a low-complexity sequential probability ratio test (SPRT) is developed for efficiently and fast detecting the vacant spectrum so as to meet the sensing duration requirements. Our numerical results show that the proposed detector outperforms the conventional EDs at extremely low SNR environments.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"85 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060109
Lan Li, Bo Liu, Yoshinori Nakagawa
Traffic jam is an important reference for route plan. Traditional traffic information systems usually report a same jam-level to all the drivers on the same road. However, these drivers may be facing various route characteristics and have different perceptions of same traffic situations. To overcome these discrepancies, we proposed a more effective traffic information system by introducing visual traffic information customized to the users' specific driving routes. Each user can view the traffic images taken by other vehicles whose turning directions or destinations are the same as that of the user's. The visual information is collected by on-vehicle cameras, with an algorithm applied for a low-cost and easy-to-maintain system.
{"title":"Driving route based visual traffic information system","authors":"Lan Li, Bo Liu, Yoshinori Nakagawa","doi":"10.1109/ITST.2011.6060109","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060109","url":null,"abstract":"Traffic jam is an important reference for route plan. Traditional traffic information systems usually report a same jam-level to all the drivers on the same road. However, these drivers may be facing various route characteristics and have different perceptions of same traffic situations. To overcome these discrepancies, we proposed a more effective traffic information system by introducing visual traffic information customized to the users' specific driving routes. Each user can view the traffic images taken by other vehicles whose turning directions or destinations are the same as that of the user's. The visual information is collected by on-vehicle cameras, with an algorithm applied for a low-cost and easy-to-maintain system.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-27DOI: 10.1109/ITST.2011.6060047
S. Ogata, K. Ohno, M. Itami
Application of DS-SS (Direct Sequence-Spread Spectrum) communication scheme is expected to realize efficient and reliable IVC (Inter-Vehicle Communication) system in ITS. This scheme has a lot of advantages such as robustness against additive noise and interference, possible to CDMA (Code Division Multiple Access) and so on. In this paper, the DS-SS IVC scheme based on location oriented pseudo noise (PN) code allocation scheme that makes efficient PN code allocation possible is assumed. And its performance is compared to the case of random code allocation. As the result of simulation, it was confirmed that performance of location oriented PN code and random code allocation was comparable level performance.
{"title":"A study on combining location oriented PN code allocation with successive interference cancellation for IVC","authors":"S. Ogata, K. Ohno, M. Itami","doi":"10.1109/ITST.2011.6060047","DOIUrl":"https://doi.org/10.1109/ITST.2011.6060047","url":null,"abstract":"Application of DS-SS (Direct Sequence-Spread Spectrum) communication scheme is expected to realize efficient and reliable IVC (Inter-Vehicle Communication) system in ITS. This scheme has a lot of advantages such as robustness against additive noise and interference, possible to CDMA (Code Division Multiple Access) and so on. In this paper, the DS-SS IVC scheme based on location oriented pseudo noise (PN) code allocation scheme that makes efficient PN code allocation possible is assumed. And its performance is compared to the case of random code allocation. As the result of simulation, it was confirmed that performance of location oriented PN code and random code allocation was comparable level performance.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129139195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}