In the last years the interest in methods and techniques for circumventing digital video broadcasting security is continuously increasing, and digital TV content providers are struggling to restrict usage only to authorized users through complex conditional access systems. Currently, the most significant weakness is the card-sharing activity which allows a subscriber to provide access to digital contents to a group of users connected through an IP network. This is usually realized employing ad hoc customized devices. Detecting the presence of these illegal systems on the network by recognizing their related traffic is an important issue of primary importance. To avoid the identification of such traffic are often used payload obfuscation strategies based on encryption, making it difficult the adoption of packet inspection techniques. This paper presents some ideas about a possible strategy for binary classification and detection of card-sharing traffic based on the natural capability of Wavelet Analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas are a first step for the implementation of a classification scheme that relies only on time regularities of the traffic and not on the packet content that may be affected by protocol and payload obfuscation techniques.
{"title":"Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis","authors":"Aniello Castiglione, A. D. Santis, F. Palmieri","doi":"10.1109/INCOS.2011.62","DOIUrl":"https://doi.org/10.1109/INCOS.2011.62","url":null,"abstract":"In the last years the interest in methods and techniques for circumventing digital video broadcasting security is continuously increasing, and digital TV content providers are struggling to restrict usage only to authorized users through complex conditional access systems. Currently, the most significant weakness is the card-sharing activity which allows a subscriber to provide access to digital contents to a group of users connected through an IP network. This is usually realized employing ad hoc customized devices. Detecting the presence of these illegal systems on the network by recognizing their related traffic is an important issue of primary importance. To avoid the identification of such traffic are often used payload obfuscation strategies based on encryption, making it difficult the adoption of packet inspection techniques. This paper presents some ideas about a possible strategy for binary classification and detection of card-sharing traffic based on the natural capability of Wavelet Analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas are a first step for the implementation of a classification scheme that relies only on time regularities of the traffic and not on the packet content that may be affected by protocol and payload obfuscation techniques.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network reliability is needed as the Internet becomes an important social infrastructure. However, we face risks of failure and congestion on many links or routers, therefore, a network should be robust enough to avoid failure and congestion. As the route of a path between two nodes is automatically determined by a routing protocol, many paths may be included in a same link and it may cause congestion. Especially, when a link fails, the routes of the paths included in the link are automatically changed, and eventually congestion may occur. If there are critical links whose failures cause congestion, they must be protected by the function that a failed link is rapidly switched to its backup link in the lower layer and the failure is not detected over the IP layer. However, such a link protection increases investment cost for facilities and operational cost. In this paper, we formulate the problem to find links to be protected so that no congestion occurs even if any non-protected links fails. We prove that this problem is NP-hard. In addition, we present a polynomial-time algorithm to solve the problem that the number of simultaneously failed links is restricted to one.
{"title":"Network Design Method by Link Protection for Network Load Alleviation against Failures","authors":"Akira Noguchi, Takeshi Fujimura, H. Miwa","doi":"10.1109/INCoS.2011.124","DOIUrl":"https://doi.org/10.1109/INCoS.2011.124","url":null,"abstract":"Network reliability is needed as the Internet becomes an important social infrastructure. However, we face risks of failure and congestion on many links or routers, therefore, a network should be robust enough to avoid failure and congestion. As the route of a path between two nodes is automatically determined by a routing protocol, many paths may be included in a same link and it may cause congestion. Especially, when a link fails, the routes of the paths included in the link are automatically changed, and eventually congestion may occur. If there are critical links whose failures cause congestion, they must be protected by the function that a failed link is rapidly switched to its backup link in the lower layer and the failure is not detected over the IP layer. However, such a link protection increases investment cost for facilities and operational cost. In this paper, we formulate the problem to find links to be protected so that no congestion occurs even if any non-protected links fails. We prove that this problem is NP-hard. In addition, we present a polynomial-time algorithm to solve the problem that the number of simultaneously failed links is restricted to one.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interactive Evolutionary Computation is well known as an effective method to create media contents suited to user's preference and objectives to use. As one of the methods, we have already presented a method that creates sign sounds with Interactive Differential Evolution (IDE). In the user's evaluation process, the user selects better one from two presented media contents. In this study, to fundamentally investigate the efficacy of the IDE method, three listening experiments were performed, experiment 1 as comparing experiment, experiment 2 as re-evaluation for subjects themselves, and experiment 3 as re-evaluation for other subjects. Target of the creation with the IDE method was warning sign sounds. Ten males participated as subjects in the experiments. In the result of the experiment 2, gradual increase of the subjective fitness value was observed. In the result of the experiment 3, increase of the subjective fitness value was not observed. These results suggested that the IDE method has a possibility to create sign sounds suited to user's preference.
{"title":"An Efficiency of Optimization Method of Sign Sound Using Interactive Differential Evolution","authors":"M. Fukumoto, Shintarou Ogawa","doi":"10.1109/INCoS.2011.48","DOIUrl":"https://doi.org/10.1109/INCoS.2011.48","url":null,"abstract":"Interactive Evolutionary Computation is well known as an effective method to create media contents suited to user's preference and objectives to use. As one of the methods, we have already presented a method that creates sign sounds with Interactive Differential Evolution (IDE). In the user's evaluation process, the user selects better one from two presented media contents. In this study, to fundamentally investigate the efficacy of the IDE method, three listening experiments were performed, experiment 1 as comparing experiment, experiment 2 as re-evaluation for subjects themselves, and experiment 3 as re-evaluation for other subjects. Target of the creation with the IDE method was warning sign sounds. Ten males participated as subjects in the experiments. In the result of the experiment 2, gradual increase of the subjective fitness value was observed. In the result of the experiment 3, increase of the subjective fitness value was not observed. These results suggested that the IDE method has a possibility to create sign sounds suited to user's preference.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroaki Yamanaka, M. Shimamura, S. Ishii, Eiji Kawai, K. Iida, M. Tsuru
The Internet architecture has been reconsidered along with newly emerging diverse Internet applications, and cooperation between applications and networks becomes desired. Inherently, an application service provider concentrates on serving its own application with the high performance while an infrastructure service provider needs to consider an efficient and fair use of its physical resources to simultaneously support different applications. We propose an architecture that coordinates requirements of both types of providers based on network virtualization technologies in general and Open Flow framework in particular. In our architecture, an application service provider can easily construct a virtual network for its application service, while an infrastructure provider can achieve an efficient use of physical resource adaptively within the restriction to maintain a required performance of supporting virtual networks.
{"title":"A New Generation Network Architecture to Accommodate Virtual Network Application Services","authors":"Hiroaki Yamanaka, M. Shimamura, S. Ishii, Eiji Kawai, K. Iida, M. Tsuru","doi":"10.1109/INCoS.2011.26","DOIUrl":"https://doi.org/10.1109/INCoS.2011.26","url":null,"abstract":"The Internet architecture has been reconsidered along with newly emerging diverse Internet applications, and cooperation between applications and networks becomes desired. Inherently, an application service provider concentrates on serving its own application with the high performance while an infrastructure service provider needs to consider an efficient and fair use of its physical resources to simultaneously support different applications. We propose an architecture that coordinates requirements of both types of providers based on network virtualization technologies in general and Open Flow framework in particular. In our architecture, an application service provider can easily construct a virtual network for its application service, while an infrastructure provider can achieve an efficient use of physical resource adaptively within the restriction to maintain a required performance of supporting virtual networks.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Mangione, F. Orciuoli, A. Pierri, Pierluigi Ritrovato, M. Rosciano
This paper focuses the attention on a particular complex learning resource, namely storytelling that is characterized by its capability to support high-level learning processes thanks to a remediation of languages, strategies and roles. In the traditional forms of storytelling, a story is told to learners in a predefined way (also known as plot). This approach is called plot-based. An alternative approach is known as character-based. The plot-based approach fails to model the dynamic behaviors of virtual characters. On the other hand, the character-based approach focuses on designing the specific behaviors or actions of the virtual characters. In this work a Storytelling Design Model is defined in order to provide pedagogy-based guidelines to the design of Storytelling Complex Learning Objects taking care of both the plot-based and character-based approaches.
{"title":"A New Model for Storytelling Complex Learning Objects","authors":"G. Mangione, F. Orciuoli, A. Pierri, Pierluigi Ritrovato, M. Rosciano","doi":"10.1109/INCoS.2011.27","DOIUrl":"https://doi.org/10.1109/INCoS.2011.27","url":null,"abstract":"This paper focuses the attention on a particular complex learning resource, namely storytelling that is characterized by its capability to support high-level learning processes thanks to a remediation of languages, strategies and roles. In the traditional forms of storytelling, a story is told to learners in a predefined way (also known as plot). This approach is called plot-based. An alternative approach is known as character-based. The plot-based approach fails to model the dynamic behaviors of virtual characters. On the other hand, the character-based approach focuses on designing the specific behaviors or actions of the virtual characters. In this work a Storytelling Design Model is defined in order to provide pedagogy-based guidelines to the design of Storytelling Complex Learning Objects taking care of both the plot-based and character-based approaches.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Dunwell, Panagiotis Petridis, S. Arnab, A. Protopsaltis, M. Hendrix, S. Freitas
Serious games have recognized potential as a means to tackle many challenges in education, ranging from stimulating increased learner motivation, to transferring challenging concepts in a novel and engaging form. They are commonly shown to work most effectively in blended approaches to learning, whereby the game plays a core role in a wider pedagogic approach, often based around an experiential or exploratory model. In this paper, we explore how the integration of a serious game, and more generally gaming paradigms, can be extended to a learning content management system (LCMS) to support a blended and holistic approach to their use in education. Through a case study within the EU-Funded Adaptive Learning via Intuitive/Interactive, Collaborative and Emotional Systems (ALICE) project, we demonstrate a technical integration of a gaming engine with a proprietary LCMS, and discuss the broader pedagogic benefits of such an approach. In particular, we note how this method can support an 'intuitive guided' or scaffolded approach to learning, where the learner is given the potential to explore a non-linear learning environment, whilst scaffolding and blending provides the guidance towards ensuring targeted learning objectives are met.
严肃游戏已经被公认为是解决教育中许多挑战的一种手段,从刺激学习者的动机,到以新颖和吸引人的形式传递具有挑战性的概念。它们通常被证明在混合学习方法中最有效,即游戏在更广泛的教学方法中扮演核心角色,通常基于经验或探索模式。在本文中,我们探讨了如何将严肃游戏和更普遍的游戏范例整合到学习内容管理系统(LCMS)中,以支持在教育中使用混合和整体方法。通过欧盟资助的适应性学习(Adaptive Learning via Intuitive/Interactive, Collaborative and Emotional Systems, ALICE)项目的案例研究,我们展示了游戏引擎与专有LCMS的技术集成,并讨论了这种方法的更广泛的教学效益。特别是,我们注意到这种方法如何支持“直观引导”或框架式的学习方法,在这种方法中,学习者有可能探索非线性学习环境,而框架和混合为确保实现目标学习目标提供了指导。
{"title":"Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System","authors":"I. Dunwell, Panagiotis Petridis, S. Arnab, A. Protopsaltis, M. Hendrix, S. Freitas","doi":"10.1109/INCoS.2011.58","DOIUrl":"https://doi.org/10.1109/INCoS.2011.58","url":null,"abstract":"Serious games have recognized potential as a means to tackle many challenges in education, ranging from stimulating increased learner motivation, to transferring challenging concepts in a novel and engaging form. They are commonly shown to work most effectively in blended approaches to learning, whereby the game plays a core role in a wider pedagogic approach, often based around an experiential or exploratory model. In this paper, we explore how the integration of a serious game, and more generally gaming paradigms, can be extended to a learning content management system (LCMS) to support a blended and holistic approach to their use in education. Through a case study within the EU-Funded Adaptive Learning via Intuitive/Interactive, Collaborative and Emotional Systems (ALICE) project, we demonstrate a technical integration of a gaming engine with a proprietary LCMS, and discuss the broader pedagogic benefits of such an approach. In particular, we note how this method can support an 'intuitive guided' or scaffolded approach to learning, where the learner is given the potential to explore a non-linear learning environment, whilst scaffolding and blending provides the guidance towards ensuring targeted learning objectives are met.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I will report our current endeavor to create a learning community aiming for better quality education, by changing classroom practices from teacher-centric to learner-centric. Our efforts are focused on creating intellectually challenging collaborative learning based on a framework called "constructive interaction, " which has been identified as a basic skill of human beings to learn from social interaction. The design is called the "Knowledge Constructive Jigsaw, " which encourages the learners engage in actively explaining what each learner knows to integrate them and create an answer to the shared problem. In this presentation, I will explain the basic framework and how it can be implemented in regular classroom activities, with some outcomes. I will then touch upon how this renovation effort opens new research fields, including the formation of a networked, sustainable learning community.
{"title":"Knowledge Constructive Jigsaw as an Adaptive Learning Framework: Its Design Principles and Network Supports","authors":"N. Miyake","doi":"10.1109/INCoS.2011.109","DOIUrl":"https://doi.org/10.1109/INCoS.2011.109","url":null,"abstract":"I will report our current endeavor to create a learning community aiming for better quality education, by changing classroom practices from teacher-centric to learner-centric. Our efforts are focused on creating intellectually challenging collaborative learning based on a framework called \"constructive interaction, \" which has been identified as a basic skill of human beings to learn from social interaction. The design is called the \"Knowledge Constructive Jigsaw, \" which encourages the learners engage in actively explaining what each learner knows to integrate them and create an answer to the shared problem. In this presentation, I will explain the basic framework and how it can be implemented in regular classroom activities, with some outcomes. I will then touch upon how this renovation effort opens new research fields, including the formation of a networked, sustainable learning community.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126589212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party and using the concurrent signature and it has prevented both sides in payment to originate and terminate protocol maliciously. At the same time fairness and security are also achieved in the proposed protocol.
{"title":"Abuse-freeness Electronic Payment Protocol","authors":"K. Fan, Yue Wang, Hui Li","doi":"10.1109/INCoS.2011.45","DOIUrl":"https://doi.org/10.1109/INCoS.2011.45","url":null,"abstract":"Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party and using the concurrent signature and it has prevented both sides in payment to originate and terminate protocol maliciously. At the same time fairness and security are also achieved in the proposed protocol.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130711325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shibboleth enables a seamless connection for authentication required Web sites. In this paper, we describe an implementation and a practice for such connection in e-Learning between a Moodle, a video streaming site and providing results of examinations site.
{"title":"A Seamless Connection for Authentication Required Web Sites by Shibboleth","authors":"Kenzi Watanabe, M. Otani","doi":"10.1109/INCoS.2011.36","DOIUrl":"https://doi.org/10.1109/INCoS.2011.36","url":null,"abstract":"Shibboleth enables a seamless connection for authentication required Web sites. In this paper, we describe an implementation and a practice for such connection in e-Learning between a Moodle, a video streaming site and providing results of examinations site.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hiyama, Elis Kulla, Makoto Ikeda, L. Barolli, Jiro Iwashige
A Mobile Ad hoc Network (MANETs) is a group of wireless mobile terminals, which cooperate together by routing packets to each other on a temporary network. MANETs are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor and outdoor environments. Considering mobility of the terminals, routing is a key process for operation of MANETs. In this paper, we analyze the performance of Optimized Link State Routing (OLSR) protocol in a mixed indoor and outdoor environment considering different scenarios (STA1, STA2, MOV) for horizontal topology. We evaluate the scenarios based on throughput and delay metrics. From the experimental results, we found that for STA1 scenario, there is a decrease in performance in the case of rightarrow-4 flow, for both metrics, because of the hop distance. For STA2 scenario, the presence of node 5 improves route quality for rightarrow-4 flow. When destination node is moving (MOV scenario), the delay and throughput decreased because it becomes difficult to keep the route to the destination.
{"title":"Performance Evaluation of MANET Testbed in a Mixed Indoor and Outdoor Environment","authors":"M. Hiyama, Elis Kulla, Makoto Ikeda, L. Barolli, Jiro Iwashige","doi":"10.1109/INCoS.2011.133","DOIUrl":"https://doi.org/10.1109/INCoS.2011.133","url":null,"abstract":"A Mobile Ad hoc Network (MANETs) is a group of wireless mobile terminals, which cooperate together by routing packets to each other on a temporary network. MANETs are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor and outdoor environments. Considering mobility of the terminals, routing is a key process for operation of MANETs. In this paper, we analyze the performance of Optimized Link State Routing (OLSR) protocol in a mixed indoor and outdoor environment considering different scenarios (STA1, STA2, MOV) for horizontal topology. We evaluate the scenarios based on throughput and delay metrics. From the experimental results, we found that for STA1 scenario, there is a decrease in performance in the case of rightarrow-4 flow, for both metrics, because of the hop distance. For STA2 scenario, the presence of node 5 improves route quality for rightarrow-4 flow. When destination node is moving (MOV scenario), the delay and throughput decreased because it becomes difficult to keep the route to the destination.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}