Tagging refers to the metadata that many users added in the form of keywords on photos, videos, and other resources for sharing the contents via the internet. However, there are several difficulties with tagging that come from tag variation, tag ambiguity and flat organization. This paper presents the integration of social tagging and the collaborative web search to improve users' or groups of users' satisfaction in search results. The characteristics of collaborative web search enable remote collaboration among small groups of users who are working either synchronously or asynchronously on web search tasks. Our main purpose is to analyze the users' behavior patterns from the search keywords obtained from the same and different groups of users. The patterns of web search behaviors are learned and used for generating the tag-based association rules. The results of analysis can be used to improve the quality of web search for a social search community. We designed and implemented a web application for effective use of tags to improve users' experience on web search. The users are asked to assign weights to the web links based on the relevancy of the web content to the tag. These weights are used to re-rank the original search results so that tags that best serving a user's needs are at the top of the ranked list. When a new user performs a web search, the system will generate a personalized tagging recommendation to the user for selection.
{"title":"Exploring Web Search Behavior Patterns to Personalize the Search Results","authors":"W. Romsaiyud, W. Premchaiswadi","doi":"10.1109/INCoS.2011.91","DOIUrl":"https://doi.org/10.1109/INCoS.2011.91","url":null,"abstract":"Tagging refers to the metadata that many users added in the form of keywords on photos, videos, and other resources for sharing the contents via the internet. However, there are several difficulties with tagging that come from tag variation, tag ambiguity and flat organization. This paper presents the integration of social tagging and the collaborative web search to improve users' or groups of users' satisfaction in search results. The characteristics of collaborative web search enable remote collaboration among small groups of users who are working either synchronously or asynchronously on web search tasks. Our main purpose is to analyze the users' behavior patterns from the search keywords obtained from the same and different groups of users. The patterns of web search behaviors are learned and used for generating the tag-based association rules. The results of analysis can be used to improve the quality of web search for a social search community. We designed and implemented a web application for effective use of tags to improve users' experience on web search. The users are asked to assign weights to the web links based on the relevancy of the web content to the tag. These weights are used to re-rank the original search results so that tags that best serving a user's needs are at the top of the ranked list. When a new user performs a web search, the system will generate a personalized tagging recommendation to the user for selection.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Web 3.0 is approaching fast and the Online Social Networks (OSNs) are becoming more and more pervasive in today daily activities. A subsequent consequence is that criminals are running at the same speed as technology and most of the time highly sophisticated technological machineries are used by them. Images are often involved in illicit or illegal activities, with it now being fundamental to try to ascertain as much as information on a given image as possible. Today, most of the images coming from the Internet flow through OSNs. The paper analyzes the characteristics of images published on some OSNs. The analysis mainly focuses on how the OSN processes the uploaded images and what changes are made to some of the characteristics, such as JPEG quantization table, pixel resolution and related metadata. The experimental analysis was carried out in June-July 2011 on Facebook, Badoo and Google+. It also has a forensic value: it can be used to establish whether an image has been downloaded from an OSN or not.
Web 3.0时代正在迅速到来,在线社交网络(Online Social Networks, OSNs)在当今的日常活动中变得越来越普遍。随之而来的后果是,犯罪分子的行动速度与技术一样快,而且大多数时候他们使用的是高度复杂的技术机器。图像经常涉及非法或非法活动,现在试图尽可能多地确定给定图像的信息是至关重要的。今天,大多数来自互联网的图像都通过osn传输。本文分析了一些osn上发布的图像的特点。主要分析OSN如何处理上传的图像,以及对JPEG量化表、像素分辨率和相关元数据等一些特征做了哪些改变。实验分析于2011年6 - 7月在Facebook、Badoo和b谷歌+上进行。它还具有鉴定价值:它可用于确定是否从OSN下载了映像。
{"title":"A Forensic Analysis of Images on Online Social Networks","authors":"Aniello Castiglione, G. Cattaneo, A. D. Santis","doi":"10.1109/INCOS.2011.17","DOIUrl":"https://doi.org/10.1109/INCOS.2011.17","url":null,"abstract":"The Web 3.0 is approaching fast and the Online Social Networks (OSNs) are becoming more and more pervasive in today daily activities. A subsequent consequence is that criminals are running at the same speed as technology and most of the time highly sophisticated technological machineries are used by them. Images are often involved in illicit or illegal activities, with it now being fundamental to try to ascertain as much as information on a given image as possible. Today, most of the images coming from the Internet flow through OSNs. The paper analyzes the characteristics of images published on some OSNs. The analysis mainly focuses on how the OSN processes the uploaded images and what changes are made to some of the characteristics, such as JPEG quantization table, pixel resolution and related metadata. The experimental analysis was carried out in June-July 2011 on Facebook, Badoo and Google+. It also has a forensic value: it can be used to establish whether an image has been downloaded from an OSN or not.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129461767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities and securely compressing cryptographic witnesses, which are among the major obstacles to the deployment of strong security mechanisms in VANETs.
{"title":"Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication","authors":"Bo Qin, Qianhong Wu, J. Domingo-Ferrer, W. Susilo","doi":"10.1109/INCoS.2011.78","DOIUrl":"https://doi.org/10.1109/INCoS.2011.78","url":null,"abstract":"Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities and securely compressing cryptographic witnesses, which are among the major obstacles to the deployment of strong security mechanisms in VANETs.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper considers the problem of reshaping and reconstructing a typeface of handwritten characters. From a set of handwriting motion data, characters are constructed by a modeling scheme with the dynamic font model and the theory of smoothing splines. Using the Dynamic Programming (DP) matching and the affine transformation, we next reshape the typeface of modeled characters based on some model writings. In addition, using the modeling scheme, the typeface of such characters are transformed to the omitted running style as seen in Japanese calligraphy. The effectiveness is examined by some experiments.
{"title":"Reshaping and Reconstructing Handwritten Character Typeface Using Dynamic Font Model","authors":"H. Fujioka, Shinya Miyata","doi":"10.1109/INCoS.2011.143","DOIUrl":"https://doi.org/10.1109/INCoS.2011.143","url":null,"abstract":"This paper considers the problem of reshaping and reconstructing a typeface of handwritten characters. From a set of handwriting motion data, characters are constructed by a modeling scheme with the dynamic font model and the theory of smoothing splines. Using the Dynamic Programming (DP) matching and the affine transformation, we next reshape the typeface of modeled characters based on some model writings. In addition, using the modeling scheme, the typeface of such characters are transformed to the omitted running style as seen in Japanese calligraphy. The effectiveness is examined by some experiments.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130305502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Asimakopoulou, N. Bessis, Stelios Sotiriadis, F. Xhafa, L. Barolli
Currently, there is a growing interest in developing methods, systems and tools for managing disasters in a computational and integrated manner. This is due to the development of several next generation emerging technologies, which seem to be more fit for purpose. Various emerged distributed and computational paradigms include collective intelligence, Internet of things, social networking, context-aware, sensors and collaborative technologies such as grids, clouds and crowds, these are just few to name here. In our previous works, we have discussed and demonstrated the potential of these technologies for disaster management in a manner, which seems to be more synergetic towards an integrated and more informed decision-making. In this paper, the aim is two-fold: firstly, to demonstrate quantitative evidence supporting the increasing occurrence of disasters in terms of costs during the preparedness and recovery disaster stages. Secondly, there is current stagnation in resource matters, that is to say, it would be of particular importance to develop a more focused and resource balanced disaster management approach. Due to the data complexity and volume, our survey is predominantly focused on evidence from disasters occurred in 27 European countries.
{"title":"A Collective Intelligence Resource Management Dynamic Approach for Disaster Management: A Density Survey of Disasters Occurrence","authors":"E. Asimakopoulou, N. Bessis, Stelios Sotiriadis, F. Xhafa, L. Barolli","doi":"10.1109/INCOS.2011.15","DOIUrl":"https://doi.org/10.1109/INCOS.2011.15","url":null,"abstract":"Currently, there is a growing interest in developing methods, systems and tools for managing disasters in a computational and integrated manner. This is due to the development of several next generation emerging technologies, which seem to be more fit for purpose. Various emerged distributed and computational paradigms include collective intelligence, Internet of things, social networking, context-aware, sensors and collaborative technologies such as grids, clouds and crowds, these are just few to name here. In our previous works, we have discussed and demonstrated the potential of these technologies for disaster management in a manner, which seems to be more synergetic towards an integrated and more informed decision-making. In this paper, the aim is two-fold: firstly, to demonstrate quantitative evidence supporting the increasing occurrence of disasters in terms of costs during the preparedness and recovery disaster stages. Secondly, there is current stagnation in resource matters, that is to say, it would be of particular importance to develop a more focused and resource balanced disaster management approach. Due to the data complexity and volume, our survey is predominantly focused on evidence from disasters occurred in 27 European countries.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer video games have become highly interesting to educators and researchers since their sophistication has improved considerably over the last decade. Studies indicate that even simple video games are offering important educational benefits in classrooms with bilingual students from different countries. However, a need for identifying truly useful game for educational purposes exists. This article begins with an examination of lower level learning in so-called edutainment products and concludes with an example of how teachers can use computer games and video based activities as an advanced way to improve and enrich the existing curriculum. On the other hand, as a teacher, it is important to be aware of such technology and to know that these instruments can all be used in the classroom in some way. Can games based learning helps in eliminating racism problems, assisting the acceptance in small communities of the new immigrants, and can assist the gifted and talented students in their future plans? This essay identifies characteristics of highly cognitive virtual interactive environments and offers a detailed index and scoring rubric as a tool for teachers and preserves teachers to use when evaluating the tendencies a video game demonstrates toward encouraging higher order thinking in its participants. Computers have been used in the classroom for years but now it has become so advanced that it allows teachers and students to use the computers in a more efficient way. Computer games have been developed for everything and anything, including topics such as typing, reading, math, science, foreign language training, etc. Research has been done to examine whether or not these games are useful to children. It appears that children are growing up in a technological world and that these games are useful to them because it is something familiar.
{"title":"Can Games Based Learning Assists Teachers in Achieving the Aims of Curriculum to Bilingual Students of Different Ethnic Minorities?","authors":"Konstantinos Kalemis","doi":"10.1109/INCoS.2011.162","DOIUrl":"https://doi.org/10.1109/INCoS.2011.162","url":null,"abstract":"Computer video games have become highly interesting to educators and researchers since their sophistication has improved considerably over the last decade. Studies indicate that even simple video games are offering important educational benefits in classrooms with bilingual students from different countries. However, a need for identifying truly useful game for educational purposes exists. This article begins with an examination of lower level learning in so-called edutainment products and concludes with an example of how teachers can use computer games and video based activities as an advanced way to improve and enrich the existing curriculum. On the other hand, as a teacher, it is important to be aware of such technology and to know that these instruments can all be used in the classroom in some way. Can games based learning helps in eliminating racism problems, assisting the acceptance in small communities of the new immigrants, and can assist the gifted and talented students in their future plans? This essay identifies characteristics of highly cognitive virtual interactive environments and offers a detailed index and scoring rubric as a tool for teachers and preserves teachers to use when evaluating the tendencies a video game demonstrates toward encouraging higher order thinking in its participants. Computers have been used in the classroom for years but now it has become so advanced that it allows teachers and students to use the computers in a more efficient way. Computer games have been developed for everything and anything, including topics such as typing, reading, math, science, foreign language training, etc. Research has been done to examine whether or not these games are useful to children. It appears that children are growing up in a technological world and that these games are useful to them because it is something familiar.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shogo Fujita, L. Lanante, Y. Nagao, M. Kurosaki, H. Ochi
Multi-User MIMO systems have been proposed as required technology for next generation wireless communication systems. Non-linear precoding scheme called vector perturbation is remarkable method due to the high capacity. In this paper, we propose a low latency normalization method for lattice reduction aided vector perturbation (LRA-VP).
{"title":"Low-Latency Normalization Method for Multi-user MIMO System Using Vector Perturbation Precoder","authors":"Shogo Fujita, L. Lanante, Y. Nagao, M. Kurosaki, H. Ochi","doi":"10.1109/INCoS.2011.115","DOIUrl":"https://doi.org/10.1109/INCoS.2011.115","url":null,"abstract":"Multi-User MIMO systems have been proposed as required technology for next generation wireless communication systems. Non-linear precoding scheme called vector perturbation is remarkable method due to the high capacity. In this paper, we propose a low latency normalization method for lattice reduction aided vector perturbation (LRA-VP).","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124455307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kouhei Umezaki, Evjola Spaho, Y. Ogata, L. Barolli, F. Xhafa, Jiro Iwashige
The trustworthiness of peers is very important for safe communication in P2P system. The trustworthiness of a peer can be evaluated based on the reputation and actual behavior of peers to provide services to other peers. However, in order to decide the peer trustworthiness are needed many parameters, which make the problem NP-hard. In this paper, we propose a fuzzy-based peer trustworthiness system for JXTA-Overlay P2P platform. We evaluate the proposed system by some simulations. The simulation results has shown that the proposed system has a good behavior.
{"title":"A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform","authors":"Kouhei Umezaki, Evjola Spaho, Y. Ogata, L. Barolli, F. Xhafa, Jiro Iwashige","doi":"10.1109/INCOS.2011.22","DOIUrl":"https://doi.org/10.1109/INCOS.2011.22","url":null,"abstract":"The trustworthiness of peers is very important for safe communication in P2P system. The trustworthiness of a peer can be evaluated based on the reputation and actual behavior of peers to provide services to other peers. However, in order to decide the peer trustworthiness are needed many parameters, which make the problem NP-hard. In this paper, we propose a fuzzy-based peer trustworthiness system for JXTA-Overlay P2P platform. We evaluate the proposed system by some simulations. The simulation results has shown that the proposed system has a good behavior.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raffaele Pizzolante, B. Carpentieri, Aniello Castiglione, G. Maio
In this paper we review the Adaptive Vector Quantization algorithm for lossy image compression, introduced by Constantinescu and Storer. AVQ combines the potentiality of a dictionary-based algorithm to process input in single-pass with the potentiality of Vector Quantization to approximate data. We discuss an open-source implementation and report the achieved results by this implementation with different size of the dictionary. Subsequently, we consider the problem of the copyright protection in multimedia contents, by focusing our attention on the Digital Watermarking. In addition we describe an approach for this algorithm that permits to improve the robustness of digital invisible watermarks. The proposed approach consists of spreading the watermark into the image during the compression process. We assume that the compression algorithm is aware of the positions of the watermarks: when the algorithm identifies the block containing the watermark, then this block is encoded in loss less mode and is spread all over the image.
{"title":"The AVQ Algorithm: Watermarking and Compression Performances","authors":"Raffaele Pizzolante, B. Carpentieri, Aniello Castiglione, G. Maio","doi":"10.1109/INCOS.2011.153","DOIUrl":"https://doi.org/10.1109/INCOS.2011.153","url":null,"abstract":"In this paper we review the Adaptive Vector Quantization algorithm for lossy image compression, introduced by Constantinescu and Storer. AVQ combines the potentiality of a dictionary-based algorithm to process input in single-pass with the potentiality of Vector Quantization to approximate data. We discuss an open-source implementation and report the achieved results by this implementation with different size of the dictionary. Subsequently, we consider the problem of the copyright protection in multimedia contents, by focusing our attention on the Digital Watermarking. In addition we describe an approach for this algorithm that permits to improve the robustness of digital invisible watermarks. The proposed approach consists of spreading the watermark into the image during the compression process. We assume that the compression algorithm is aware of the positions of the watermarks: when the algorithm identifies the block containing the watermark, then this block is encoded in loss less mode and is spread all over the image.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127115415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Bratitsis, Triantafyllos Kotopoulos, Kyriaki Mandila
Fairy Tales exist for centuries and have intrigued educators who have been utilizing their "magical power of affection", especially when teaching young children. In the current paper, story creation is examined with the perspective of the children as authors. A web 2.0 service, Tikatok, which provides several facilities for creating stories in a book-like format, is utilized in order to examine the effect of the digital medium (ICTs) in the story creation process by the children. Eight Kindergarten students divided into four pairs, worked in different settings. The results show an impressive effect of the computer on children's motivation, as well as several qualitative aspects of story creation.
{"title":"Kindergarten Children as Story Makers: The Effect of the Digital Medium","authors":"T. Bratitsis, Triantafyllos Kotopoulos, Kyriaki Mandila","doi":"10.1109/INCoS.2011.108","DOIUrl":"https://doi.org/10.1109/INCoS.2011.108","url":null,"abstract":"Fairy Tales exist for centuries and have intrigued educators who have been utilizing their \"magical power of affection\", especially when teaching young children. In the current paper, story creation is examined with the perspective of the children as authors. A web 2.0 service, Tikatok, which provides several facilities for creating stories in a book-like format, is utilized in order to examine the effect of the digital medium (ICTs) in the story creation process by the children. Eight Kindergarten students divided into four pairs, worked in different settings. The results show an impressive effect of the computer on children's motivation, as well as several qualitative aspects of story creation.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}