Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00038
J. C. López, Jorge E. Camargo
This paper presents a system to identify social engineering attacks using only text as input. This system can be used in different environments which the input is text such as SMS, chats, emails, etc. The system uses Natural Language Processing to extract features from the dialog text such as URL's report and count, spell check, blacklist count, and others. The features are used to train Machine Learning algorithms (Neural Network, Random Forest and SVM) to perform classification of social engineering attacks. The classification algorithms showed an accuracy over 80% to detect this type of attacks.
{"title":"Social Engineering Detection Using Natural Language Processing and Machine Learning","authors":"J. C. López, Jorge E. Camargo","doi":"10.1109/ICICT55905.2022.00038","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00038","url":null,"abstract":"This paper presents a system to identify social engineering attacks using only text as input. This system can be used in different environments which the input is text such as SMS, chats, emails, etc. The system uses Natural Language Processing to extract features from the dialog text such as URL's report and count, spell check, blacklist count, and others. The features are used to train Machine Learning algorithms (Neural Network, Random Forest and SVM) to perform classification of social engineering attacks. The classification algorithms showed an accuracy over 80% to detect this type of attacks.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116838767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00027
Nooh Bany Muhammad, Mariam Bazzi
In the era of modern technology, the current trend is cloud computing, “the practice of using the cloud.” Nowadays, most of the people in the world have already utilized the cloud. The cloud is a virtual storage place where people can store, share and run their data thus making it a place to protect. Back when it first started out, the primary two companies that used cloud computing first were Amazon and Google back in 2002–2009. At that time, the cloud's security level was not that sophisticated thus made it vulnerable to attacks. As time passes, people tried solving these issues and have leveled up the defense in the cloud. This paper will discuss cloud security levels from many different aspects to evaluate the secureness of the cloud in general. It will compare the different types of clouds and cloud services. It will also discuss different security risks and challenges across different cloud services.
{"title":"Advances in Cloud Computing: Security Issues and Challenges in the Cloud","authors":"Nooh Bany Muhammad, Mariam Bazzi","doi":"10.1109/ICICT55905.2022.00027","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00027","url":null,"abstract":"In the era of modern technology, the current trend is cloud computing, “the practice of using the cloud.” Nowadays, most of the people in the world have already utilized the cloud. The cloud is a virtual storage place where people can store, share and run their data thus making it a place to protect. Back when it first started out, the primary two companies that used cloud computing first were Amazon and Google back in 2002–2009. At that time, the cloud's security level was not that sophisticated thus made it vulnerable to attacks. As time passes, people tried solving these issues and have leveled up the defense in the cloud. This paper will discuss cloud security levels from many different aspects to evaluate the secureness of the cloud in general. It will compare the different types of clouds and cloud services. It will also discuss different security risks and challenges across different cloud services.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00045
Penelope DeFreitas
Technology has radically changed our societies to the extent that skills in ICT (Information and Communications Technologies) are becoming a key asset for boosting employability. Therefore, it is increasingly important for individuals employed under roles that stand the risk of becoming obsolete, to fast-track their professional development through upskilling initiatives. To support this effort, organizations around the world have been taking the lead. An example of such an initiative is the CSOD's (Caribbean School of Data) ‘scale up’ project, which offers digital/data literacy training programs to marginalized youth across the Caribbean region. Prior to the covid-19 pandemic, CSOD's training model applied a blended approach; however, to facilitate safe operations during the pandemic, the model was implemented fully remote, thus presenting an opportunity to learn about potential strengths and weaknesses of running an ICT training program virtually. The virtual training model for delivering the CSOD program resulted in several positive and notable findings. Therefore, the components of the model, as well as the lessons learned from its implementation may be of value to entities interested in delivering or improving their virtual training programs.
{"title":"Building ICT skills for Employability: Piloting a virtual training model for the Caribbean School of Data","authors":"Penelope DeFreitas","doi":"10.1109/ICICT55905.2022.00045","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00045","url":null,"abstract":"Technology has radically changed our societies to the extent that skills in ICT (Information and Communications Technologies) are becoming a key asset for boosting employability. Therefore, it is increasingly important for individuals employed under roles that stand the risk of becoming obsolete, to fast-track their professional development through upskilling initiatives. To support this effort, organizations around the world have been taking the lead. An example of such an initiative is the CSOD's (Caribbean School of Data) ‘scale up’ project, which offers digital/data literacy training programs to marginalized youth across the Caribbean region. Prior to the covid-19 pandemic, CSOD's training model applied a blended approach; however, to facilitate safe operations during the pandemic, the model was implemented fully remote, thus presenting an opportunity to learn about potential strengths and weaknesses of running an ICT training program virtually. The virtual training model for delivering the CSOD program resulted in several positive and notable findings. Therefore, the components of the model, as well as the lessons learned from its implementation may be of value to entities interested in delivering or improving their virtual training programs.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00015
Jin Choi, Seohwan Yoo, Hayeon Park, Chang-Gun Lee
There is a growing need for a System-on-Chip (SoC) targeting in-vehicle infotainment (IVI) and advanced driver assistance system (ADAS) products. SoC is superior to multi-chip systems in terms of space efficiency and has the advantage of minimizing power consumption. However, since different kinds of operations are done on a single chip, individual devices may do not achieve expected performance. Therefore, the purpose of this study is to examine the performance issue of an embedded chipset in the multi-screen-based automotive scenario. We observe two performance anomalies of shared resources and quantitatively analyze them using synthetic workload. From experimental results, we derive that performance can be maximized by only co-balancing CPU and GPU workload of given task sets' resource demand.
{"title":"Performance Analysis of an Embedded Chipset on a Multi-screen based Automotive Applications Environment","authors":"Jin Choi, Seohwan Yoo, Hayeon Park, Chang-Gun Lee","doi":"10.1109/ICICT55905.2022.00015","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00015","url":null,"abstract":"There is a growing need for a System-on-Chip (SoC) targeting in-vehicle infotainment (IVI) and advanced driver assistance system (ADAS) products. SoC is superior to multi-chip systems in terms of space efficiency and has the advantage of minimizing power consumption. However, since different kinds of operations are done on a single chip, individual devices may do not achieve expected performance. Therefore, the purpose of this study is to examine the performance issue of an embedded chipset in the multi-screen-based automotive scenario. We observe two performance anomalies of shared resources and quantitatively analyze them using synthetic workload. From experimental results, we derive that performance can be maximized by only co-balancing CPU and GPU workload of given task sets' resource demand.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127166447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00010
Olatorera Williams, F. Olajide
The impact of emerging technology on organisations has caused technological disruption to business processes. It is therefore required to develop better measures to improve and speed up processes for performance and competitive purposes. Intelligent Automation is an emerging technological concept that focuses on organisational workflow via the integration of Artificial Intelligence and Machine Learning, for effective operability and decision-making processes. Focusing on business process adaptability, this study aims at proposing a framework for Intelligent Automation systems. Outcomes could enable adoption, integration, and deployment of Intelligent Automation to business processes in dynamic environments.
{"title":"Towards the Design of an Intelligent Automation Framework for Business Processes","authors":"Olatorera Williams, F. Olajide","doi":"10.1109/ICICT55905.2022.00010","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00010","url":null,"abstract":"The impact of emerging technology on organisations has caused technological disruption to business processes. It is therefore required to develop better measures to improve and speed up processes for performance and competitive purposes. Intelligent Automation is an emerging technological concept that focuses on organisational workflow via the integration of Artificial Intelligence and Machine Learning, for effective operability and decision-making processes. Focusing on business process adaptability, this study aims at proposing a framework for Intelligent Automation systems. Outcomes could enable adoption, integration, and deployment of Intelligent Automation to business processes in dynamic environments.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00023
Reda Khalid, W. Ejaz
The Internet of things (IoT) technology can track and monitor an asset in the outdoor and indoor environment. This empowers businesses and end-users with the information and opportunity to run their operations efficiently and make educated decisions, respectively. In this paper, we examine the IoT-based rental asset tracking and monitoring system to develop innovative and flexible IoT devices for better management of asset infrastructure. We study different wireless technologies for monitoring the physical location of rental items. These technologies include WiFi, Bluetooth, GSM cellular, and LoRa. We propose an architecture of on-demand asset tracking and monitoring. We then present a case study to support the idea presented in the architecture, including the development of IoT devices, integration with the existing infrastructure of potential business, and field deployment for rental management assets. First, we develop IoT devices tailored for tracking rental items, so business owners can on-demand track their rental items' physical location. The goal is to maximize connectivity distance and minimize energy consumption while considering constraints on the tracking system's cost and size. Finally, we study feasibility by deploying the proposed solution to address rental asset management challenges and study feasibility while ensuring the scalability and quality-of-service (QoS) in terms of delay and reliability.
{"title":"Internet of Things-based On-demand Rental Asset Tracking and Monitoring System","authors":"Reda Khalid, W. Ejaz","doi":"10.1109/ICICT55905.2022.00023","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00023","url":null,"abstract":"The Internet of things (IoT) technology can track and monitor an asset in the outdoor and indoor environment. This empowers businesses and end-users with the information and opportunity to run their operations efficiently and make educated decisions, respectively. In this paper, we examine the IoT-based rental asset tracking and monitoring system to develop innovative and flexible IoT devices for better management of asset infrastructure. We study different wireless technologies for monitoring the physical location of rental items. These technologies include WiFi, Bluetooth, GSM cellular, and LoRa. We propose an architecture of on-demand asset tracking and monitoring. We then present a case study to support the idea presented in the architecture, including the development of IoT devices, integration with the existing infrastructure of potential business, and field deployment for rental management assets. First, we develop IoT devices tailored for tracking rental items, so business owners can on-demand track their rental items' physical location. The goal is to maximize connectivity distance and minimize energy consumption while considering constraints on the tracking system's cost and size. Finally, we study feasibility by deploying the proposed solution to address rental asset management challenges and study feasibility while ensuring the scalability and quality-of-service (QoS) in terms of delay and reliability.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132253522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00014
Muchiri Henry, Sankan Nabuyuni
There exists growing global attention focused on tackling the menstrual management related challenges facing vulnerable school going girls in low- and middle-income countries. Kenya is no exception with a large proportion of school going girls facing period poverty. Kenya has initiated programmes to provide menstrual products to these girls through the schools they attend. These initiatives have however, not achieved the intended goal with many donated products not reaching the targeted recipients due to distribution challenges occasioned by lack of transparency and accountability. This study seeks to enhance the distribution process by developing a mobile based information system that tracks and monitors the distribution of donated sanitary products from the donor to the girls using quick response (QR) codes). Each girl will have a unique QR code which will be used to record menstrual products disbursed thus ensuring that the donated products get to the target recipient.
{"title":"An Enhanced Menstrual Products Distribution and Monitoring approach for Vulnerable School Going Girls in Kenya using QR Code Technology","authors":"Muchiri Henry, Sankan Nabuyuni","doi":"10.1109/ICICT55905.2022.00014","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00014","url":null,"abstract":"There exists growing global attention focused on tackling the menstrual management related challenges facing vulnerable school going girls in low- and middle-income countries. Kenya is no exception with a large proportion of school going girls facing period poverty. Kenya has initiated programmes to provide menstrual products to these girls through the schools they attend. These initiatives have however, not achieved the intended goal with many donated products not reaching the targeted recipients due to distribution challenges occasioned by lack of transparency and accountability. This study seeks to enhance the distribution process by developing a mobile based information system that tracks and monitors the distribution of donated sanitary products from the donor to the girls using quick response (QR) codes). Each girl will have a unique QR code which will be used to record menstrual products disbursed thus ensuring that the donated products get to the target recipient.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133212950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00016
Hajer Salem
On e-commerce sites, users change their pref-erences over time concerning the products they want to purchase. Indeed, a product that is desired today may no longer be of interest tomorrow. This may be caused by a purchase of a similar product, a change of user's situation (marriage, birth, etc.) leading to the appearance of new preferences. Therefore, classifying users of an e-commerce site in a fixed class can induce inaccurate recommendations. Besides, a user may have different tastes and behaviors on the e-commerce site and therefore belong to several classes of user profiles. Finally, the number of classes of user profiles cannot be known a priori and may change over time since the membership of new users to the site may include the appearance of new classes. To overcome these issues, state-of-the-art approaches are mostly based on sequential models to keep a trade-off between the historical interests and the current session interests. However, these models fail to represent users' relation and discover new trends in user profiles. In this paper, we handle these issues and propose a model-based Bayesian non-parametrics. Our proposed solution can select an adaptive number of users' profiles and point out the discriminating hidden interests of users. Furthermore, the method could be applied to any e-commerce dataset and does not rely on feature engineering or specific parameters. Experiments are performed using real data from publicly available data sets, and the obtained results demonstrate the adaptability of the approach and its ability to infer the hidden features behind the appearance of user profiles.
{"title":"Adaptive Bayesian Non-Parametric user profile classification in e-commerce websites","authors":"Hajer Salem","doi":"10.1109/ICICT55905.2022.00016","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00016","url":null,"abstract":"On e-commerce sites, users change their pref-erences over time concerning the products they want to purchase. Indeed, a product that is desired today may no longer be of interest tomorrow. This may be caused by a purchase of a similar product, a change of user's situation (marriage, birth, etc.) leading to the appearance of new preferences. Therefore, classifying users of an e-commerce site in a fixed class can induce inaccurate recommendations. Besides, a user may have different tastes and behaviors on the e-commerce site and therefore belong to several classes of user profiles. Finally, the number of classes of user profiles cannot be known a priori and may change over time since the membership of new users to the site may include the appearance of new classes. To overcome these issues, state-of-the-art approaches are mostly based on sequential models to keep a trade-off between the historical interests and the current session interests. However, these models fail to represent users' relation and discover new trends in user profiles. In this paper, we handle these issues and propose a model-based Bayesian non-parametrics. Our proposed solution can select an adaptive number of users' profiles and point out the discriminating hidden interests of users. Furthermore, the method could be applied to any e-commerce dataset and does not rely on feature engineering or specific parameters. Experiments are performed using real data from publicly available data sets, and the obtained results demonstrate the adaptability of the approach and its ability to infer the hidden features behind the appearance of user profiles.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00039
Syed Kumayl Raza Moosavi, M. Zafar, Filippo Sanfilippo
In this paper, a survey of the state of the art, chal-lenges, and possibilities with sensing and actuation technology for robotic grasping and haptic rendering is presented. To this end, a survey and classification of robotic grippers and grasping methods is first outlined. Then, haptic rendering is surveyed by focusing on different challenges and approaches, such as rigid body haptic interaction, deformable/rigid haptic interaction, fluid haptic interaction, image/video based haptic interaction, and virtual reality (VR) based haptic interaction. Successively, the current sensing technology is reviewed by considering sensor development for robotic hands/grippers, such as tactile sensors, and visual sensors. Finally, the current actuation technology is addressed by considering soft robotic grippers, micro and nano grippers, multi-fingered grippers, and under actuated grippers. The main objective of this study is to boost worldwide efforts toward achieving the vast variety of applications that robotic grasping and haptics may give, as well as to provide an up-to-date reference as a baseline for future research and development in this sector.
{"title":"A Review of the State-of-the-Art of Sensing and Actuation Technology for Robotic Grasping and Haptic Rendering","authors":"Syed Kumayl Raza Moosavi, M. Zafar, Filippo Sanfilippo","doi":"10.1109/ICICT55905.2022.00039","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00039","url":null,"abstract":"In this paper, a survey of the state of the art, chal-lenges, and possibilities with sensing and actuation technology for robotic grasping and haptic rendering is presented. To this end, a survey and classification of robotic grippers and grasping methods is first outlined. Then, haptic rendering is surveyed by focusing on different challenges and approaches, such as rigid body haptic interaction, deformable/rigid haptic interaction, fluid haptic interaction, image/video based haptic interaction, and virtual reality (VR) based haptic interaction. Successively, the current sensing technology is reviewed by considering sensor development for robotic hands/grippers, such as tactile sensors, and visual sensors. Finally, the current actuation technology is addressed by considering soft robotic grippers, micro and nano grippers, multi-fingered grippers, and under actuated grippers. The main objective of this study is to boost worldwide efforts toward achieving the vast variety of applications that robotic grasping and haptics may give, as well as to provide an up-to-date reference as a baseline for future research and development in this sector.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"481 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114167776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/icict55905.2022.00007
{"title":"Reviewers: ICICT 2022","authors":"","doi":"10.1109/icict55905.2022.00007","DOIUrl":"https://doi.org/10.1109/icict55905.2022.00007","url":null,"abstract":"","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130171714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}