Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142120
Huda Ismail Olewi, R. Fyath
Different chaotic security schemes have been applied in the literature to secure transmission over orthogonal frequencies-division multiplexing (OFDM)-passive optical networks (PONs). All these schemes have been based on threedimensional (3D) or four-dimensional (4D) chaos systems and have been applied to direct-detection (DD) OFDM-PONs. This paper proposes the use of 7D hybrid chaotic scheme to provide physical-layer security in both DD and coherent OFDM-PONs. The hybrid scheme uses a combination of 3D chaotic mapping scheme and 4D chaotic discrete Hartley transform precoding. The proposed chaotic security scheme is applied successfully for both DD-and coherent OFDM-PONs, and the results show that the security is very sensitive to initial conditions of both subchaotic systems.
{"title":"Hybrid Chaotic Scheme for Secure OFDM-PON Transmission","authors":"Huda Ismail Olewi, R. Fyath","doi":"10.1109/CSASE48920.2020.9142120","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142120","url":null,"abstract":"Different chaotic security schemes have been applied in the literature to secure transmission over orthogonal frequencies-division multiplexing (OFDM)-passive optical networks (PONs). All these schemes have been based on threedimensional (3D) or four-dimensional (4D) chaos systems and have been applied to direct-detection (DD) OFDM-PONs. This paper proposes the use of 7D hybrid chaotic scheme to provide physical-layer security in both DD and coherent OFDM-PONs. The hybrid scheme uses a combination of 3D chaotic mapping scheme and 4D chaotic discrete Hartley transform precoding. The proposed chaotic security scheme is applied successfully for both DD-and coherent OFDM-PONs, and the results show that the security is very sensitive to initial conditions of both subchaotic systems.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/csase48920.2020.9142047
{"title":"CSASE 2020 Keynote Speaker-3","authors":"","doi":"10.1109/csase48920.2020.9142047","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142047","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142074
Thaer Alramli, Basim Mahmood, D. Kadhim
The rapid development of mobile devices and their vast range of affordances have been widely exploited for commercial purposes these days. Moreover, mobile advertising is considered as a new trend of commercials for advertisers and marketers. It provides an opportunity to access consumers remotely at any time and any place. Recently, mobile advertising has been grown faster than most of other digital advertising formats. The current infrastructure of mobile devices provides with a convenient platform for mobile advertising. Therefore, the most effective way for mobile advertising is the use of mobile applications. Yet, advertising companies try to adopt new methods for improving their advertising campaign. In this paper, we investigate two dissemination-related issues in mobile advertising, namely, dissemination distance (for an ad), and dissemination direction. We propose two social inspired methods for the purpose of controlling the dissemination of ads within an area of interest. The first method is based on the concept of weak ties (in social networks) among individuals for disseminating ads and the second method is based on the concept of degree centrality of individuals. The findings show that our proposed approaches are efficient and reflected a high performance in terms of dissemination distance, and dissemination direction.
{"title":"Network-Based Model for Dissemination of Advertising","authors":"Thaer Alramli, Basim Mahmood, D. Kadhim","doi":"10.1109/CSASE48920.2020.9142074","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142074","url":null,"abstract":"The rapid development of mobile devices and their vast range of affordances have been widely exploited for commercial purposes these days. Moreover, mobile advertising is considered as a new trend of commercials for advertisers and marketers. It provides an opportunity to access consumers remotely at any time and any place. Recently, mobile advertising has been grown faster than most of other digital advertising formats. The current infrastructure of mobile devices provides with a convenient platform for mobile advertising. Therefore, the most effective way for mobile advertising is the use of mobile applications. Yet, advertising companies try to adopt new methods for improving their advertising campaign. In this paper, we investigate two dissemination-related issues in mobile advertising, namely, dissemination distance (for an ad), and dissemination direction. We propose two social inspired methods for the purpose of controlling the dissemination of ads within an area of interest. The first method is based on the concept of weak ties (in social networks) among individuals for disseminating ads and the second method is based on the concept of degree centrality of individuals. The findings show that our proposed approaches are efficient and reflected a high performance in terms of dissemination distance, and dissemination direction.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127666090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142076
S. Sadkhan, S. F. Jawad
the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.
{"title":"Security Evaluation Methods and the used parameters for Some Cryptosystem","authors":"S. Sadkhan, S. F. Jawad","doi":"10.1109/CSASE48920.2020.9142076","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142076","url":null,"abstract":"the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"AES-7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126506446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142099
S. Al-Shammari, A. Husein
The Internet of Things (IoT) has a vital role in managing organisations in daily life. In addition, it is significant in the real-time monitoring systems. This has led to the importance of finding ways to minimise the time required to process the data. Wireless Sensor Networks (WSNs) are used in IoT to collect the data from the monitored environments to the servers. Managing real-time applications requires the management of the transmitted data between the client-side and the provider side. Managing the monitored data in IoT requires processing the transmitted data into the cloud. Web services technologies are used in managing and implementing cloud applications APIs (Application Programming Interfaces). This paper presents an implementation of a cloud web application for a smart monitoring system using Representational State Transfer (REST) architecture; the paper also introduces a performance evaluation for the transmitted data, which includes the response time required in the transmission process. This research discusses the effect of multitenancy on the overall system performance.
物联网(IoT)在日常生活中管理组织方面发挥着至关重要的作用。此外,它在实时监控系统中具有重要意义。这导致了寻找最小化处理数据所需时间的方法的重要性。无线传感器网络(wsn)在物联网中用于从被监控环境收集数据到服务器。管理实时应用程序需要管理客户端和提供程序端之间传输的数据。在物联网中管理监控数据需要将传输的数据处理到云中。Web服务技术用于管理和实现云应用程序api(应用程序编程接口)。本文提出了一种基于REST (Representational State Transfer, Representational State Transfer)架构的智能监控系统的云web应用实现方案;本文还介绍了传输数据的性能评估,包括传输过程中所需的响应时间。本研究讨论了多租户对整体系统性能的影响。
{"title":"Response Time Study of Cloud Web Application - Based Smart Monitoring System","authors":"S. Al-Shammari, A. Husein","doi":"10.1109/CSASE48920.2020.9142099","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142099","url":null,"abstract":"The Internet of Things (IoT) has a vital role in managing organisations in daily life. In addition, it is significant in the real-time monitoring systems. This has led to the importance of finding ways to minimise the time required to process the data. Wireless Sensor Networks (WSNs) are used in IoT to collect the data from the monitored environments to the servers. Managing real-time applications requires the management of the transmitted data between the client-side and the provider side. Managing the monitored data in IoT requires processing the transmitted data into the cloud. Web services technologies are used in managing and implementing cloud applications APIs (Application Programming Interfaces). This paper presents an implementation of a cloud web application for a smart monitoring system using Representational State Transfer (REST) architecture; the paper also introduces a performance evaluation for the transmitted data, which includes the response time required in the transmission process. This research discusses the effect of multitenancy on the overall system performance.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142062
Ammar M. Raheema, Sattar B. Sadkhan-SMIEEE, Sinan M. Abdul Satar
scrambling method structure consists of three main components: scrambling, noisy channel and descrambling. The scrambling and descrambling processes. On the basis of chaotic signals, a speech scrambling technique is an essential work to upgrade and improve data protection in secure communication applications, especially military applications, and the main idea is immunity against eavesdropper to achieve security. The aim of uses the key encrypted in the Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing QAM OFDM system to improve performance of the Bits Error Rates BER on the receiving side that is robust against the effects of the Additive White Gaussian Noise AWGN. This paper has been published a speech authentication model using five separate chaotic maps / flows: Logistic maps LM, Baker maps BM, Henon map HM, Rössler system RÖS and Lorenz system LS based on 16-64 QAM_OFDM technique. The evaluation measures included six different tests: Segmental spectral signal to ratio of noise SSSNR, Log spectral distance dLOG, Linear predict coding distance dLPC, cepstral distance dCD, Frequency Weighted log Spectral distance dFWLOG and Bit error rate BER. Objective tests to measure the residual intelligibility R.I. of speech between the original and scrambling/ descrambling signal for proposed models: dLOG= 14.5415, dLPC= 0.9741, dCD= 8.8503, SSSNR= −26.506, and dFWLOG= 20.9976, While the BER between the original signal and recovered signal at 10 dB about 10-03, Which is big enough to protect the brute force attack encryption signal. We conducted a series of unpredictable map / flow randomness tests: Lyapunov exponent test and Auto correlation.
{"title":"Performance Enhancement of Speech Scrambling Techniques Based on Many Chaotic Signals","authors":"Ammar M. Raheema, Sattar B. Sadkhan-SMIEEE, Sinan M. Abdul Satar","doi":"10.1109/CSASE48920.2020.9142062","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142062","url":null,"abstract":"scrambling method structure consists of three main components: scrambling, noisy channel and descrambling. The scrambling and descrambling processes. On the basis of chaotic signals, a speech scrambling technique is an essential work to upgrade and improve data protection in secure communication applications, especially military applications, and the main idea is immunity against eavesdropper to achieve security. The aim of uses the key encrypted in the Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing QAM OFDM system to improve performance of the Bits Error Rates BER on the receiving side that is robust against the effects of the Additive White Gaussian Noise AWGN. This paper has been published a speech authentication model using five separate chaotic maps / flows: Logistic maps LM, Baker maps BM, Henon map HM, Rössler system RÖS and Lorenz system LS based on 16-64 QAM_OFDM technique. The evaluation measures included six different tests: Segmental spectral signal to ratio of noise SSSNR, Log spectral distance dLOG, Linear predict coding distance dLPC, cepstral distance dCD, Frequency Weighted log Spectral distance dFWLOG and Bit error rate BER. Objective tests to measure the residual intelligibility R.I. of speech between the original and scrambling/ descrambling signal for proposed models: dLOG= 14.5415, dLPC= 0.9741, dCD= 8.8503, SSSNR= −26.506, and dFWLOG= 20.9976, While the BER between the original signal and recovered signal at 10 dB about 10-03, Which is big enough to protect the brute force attack encryption signal. We conducted a series of unpredictable map / flow randomness tests: Lyapunov exponent test and Auto correlation.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142083
Hasan S. M. Al-Khaffaf, A. Talib
Engineering drawings contain many curves that intersect at a complex junction. Detection of these junctions is vital for correct recognition of line drawings. In this paper we study the detection of junctions in document images. A threestage junction detection is proposed to detect junctions in document images. The first stage works at the pixel level. Any pixel with more than two neighbors is labeled as low-level-junction. The second stage works at connected component level. All low-level-junctions adjacent to other low-level-junctions are merged into mid-level-junctions. The third stage combines mid-level-junction at a distance less than a threshold into a high-level-junction. Experimental results on real scanned images of mechanical engineering drawings show a precision rate of 82.38% and a recall rate of 97.29%.
{"title":"Three-stage Junction Detection in Document Images","authors":"Hasan S. M. Al-Khaffaf, A. Talib","doi":"10.1109/CSASE48920.2020.9142083","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142083","url":null,"abstract":"Engineering drawings contain many curves that intersect at a complex junction. Detection of these junctions is vital for correct recognition of line drawings. In this paper we study the detection of junctions in document images. A threestage junction detection is proposed to detect junctions in document images. The first stage works at the pixel level. Any pixel with more than two neighbors is labeled as low-level-junction. The second stage works at connected component level. All low-level-junctions adjacent to other low-level-junctions are merged into mid-level-junctions. The third stage combines mid-level-junction at a distance less than a threshold into a high-level-junction. Experimental results on real scanned images of mechanical engineering drawings show a precision rate of 82.38% and a recall rate of 97.29%.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142071
R. M. Tawafak, Ghaliya Alfarsi, M. Alnuaimi, Abdalla Eldow, S. I. Malik, M. Shakir
There is a need for several models in the higher education institutions of the Middle East to improve both teacher and student satisfaction. This study investigates the influence of combining online learning with class communication on the enhancement of teaching methods and assessment techniques. This paper aims to enhance an e-learning model for improving faculty assessment. In the first part, an organized review of the previous literature articles was determined to test and compare the common criteria used in selecting factors such as student motivation, understanding, usage, and satisfaction. Then, design a compatible model that mixed up with an online E-Learning model with course work classes for assessing both student grade and skills performance in addition to evaluate the match of teaching method and course outcomes and learning. In this study, surveys were distributed to AlBuraimi University College in Oman to assess their satisfaction with teaching and assessment. The findings of this paper give highly acceptance of SPSS statistical results.
{"title":"Model of Faculty Experience in E-Learning Student Satisfaction","authors":"R. M. Tawafak, Ghaliya Alfarsi, M. Alnuaimi, Abdalla Eldow, S. I. Malik, M. Shakir","doi":"10.1109/CSASE48920.2020.9142071","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142071","url":null,"abstract":"There is a need for several models in the higher education institutions of the Middle East to improve both teacher and student satisfaction. This study investigates the influence of combining online learning with class communication on the enhancement of teaching methods and assessment techniques. This paper aims to enhance an e-learning model for improving faculty assessment. In the first part, an organized review of the previous literature articles was determined to test and compare the common criteria used in selecting factors such as student motivation, understanding, usage, and satisfaction. Then, design a compatible model that mixed up with an online E-Learning model with course work classes for assessing both student grade and skills performance in addition to evaluate the match of teaching method and course outcomes and learning. In this study, surveys were distributed to AlBuraimi University College in Oman to assess their satisfaction with teaching and assessment. The findings of this paper give highly acceptance of SPSS statistical results.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/csase48920.2020.9142108
{"title":"CSASE 2020 Author Index","authors":"","doi":"10.1109/csase48920.2020.9142108","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142108","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/CSASE48920.2020.9142115
Hadeel M. Awad, Waffa M. Saeed
Semantic similarity is a measure based on the meaning of the word and represented by the type of semantic relationships between the meanings of two words. The semantic similarity between words or sentences can be calculated by following the method, WordNet-based similarity. In our suggested method, the proposed solution depends on the two-step to return the target document collection. Once the top d1, d2…, dn documents have been retrieved using the initial query. The second compares these retrieved documents with the query, this step takes the most frequent senses of sentences in d1, d2…, dn with the senses of the query sentences. Query enrichment is then carried out adding terms semantically related to these senses the aim is to resolve the issue of incompatibility and the ambiguity problem affecting the results of information retrieval through the use of techniques to Word sense disambiguation (WSD) the word and the results be more semantically related with the query. Our experiment, carried out using part of the fire2011 data set.
{"title":"Semantic Relevance Feedback Based on Local Context","authors":"Hadeel M. Awad, Waffa M. Saeed","doi":"10.1109/CSASE48920.2020.9142115","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142115","url":null,"abstract":"Semantic similarity is a measure based on the meaning of the word and represented by the type of semantic relationships between the meanings of two words. The semantic similarity between words or sentences can be calculated by following the method, WordNet-based similarity. In our suggested method, the proposed solution depends on the two-step to return the target document collection. Once the top d1, d2…, dn documents have been retrieved using the initial query. The second compares these retrieved documents with the query, this step takes the most frequent senses of sentences in d1, d2…, dn with the senses of the query sentences. Query enrichment is then carried out adding terms semantically related to these senses the aim is to resolve the issue of incompatibility and the ambiguity problem affecting the results of information retrieval through the use of techniques to Word sense disambiguation (WSD) the word and the results be more semantically related with the query. Our experiment, carried out using part of the fire2011 data set.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}