Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353199
Mansoor Ahmed, N. Khan
This paper deals with the estimation of rapidly time varying non isotropic Rayleigh fading channels in synchronous direct sequence spread spectrum (DS-CDMA) systems. The effects of non isotropic scattering can be captured by using Von Mises distribution for the angle of arrival (AOA) of the scattered waves at the receiver. Kalman Filter based on higher order autoregressive (AR) model is used for tracking and estimation of the non isotropic Rayleigh channel. The proposed algorithm works much better than AR(1) based algorithms in tracking time varying channel especially on high Doppler spreads in directional scenarios. However, it is observed, the computational cost of the proposed algorithm increases when the AR model order increases.
{"title":"Model based approach for time-varying channel estimation in DS-CDMA systems using non-isotropic scattering environment","authors":"Mansoor Ahmed, N. Khan","doi":"10.1109/ICET.2009.5353199","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353199","url":null,"abstract":"This paper deals with the estimation of rapidly time varying non isotropic Rayleigh fading channels in synchronous direct sequence spread spectrum (DS-CDMA) systems. The effects of non isotropic scattering can be captured by using Von Mises distribution for the angle of arrival (AOA) of the scattered waves at the receiver. Kalman Filter based on higher order autoregressive (AR) model is used for tracking and estimation of the non isotropic Rayleigh channel. The proposed algorithm works much better than AR(1) based algorithms in tracking time varying channel especially on high Doppler spreads in directional scenarios. However, it is observed, the computational cost of the proposed algorithm increases when the AR model order increases.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353154
Y. Mehmood, M. Javed, Muhammad Afzal, H. F. Ahmad
Information technology has started focusing on the healthcare enterprises, for providing better medical care. There exist different healthcare enterprise standards that are used for the communication of medical information across health enterprises providing swift and reliable results. HL7 is one of those standards that are used for the exchange of medical information between healthcare systems. The main focus of this research work is to make metadata processing efficient in HL7 v3. HL7 v3 is an emerging standard to achieve semantic interoperability with its well defined information models like reference information model (RIM), domain message information model (D-MIM), and refined message information model (R-MIM). These models are converted to some technology specific format for implementation such as model interchange format (MIF). This format includes metadata information in the form of XML. MIFs are required to load into memory for generation and parsing of messages. HL7 Java SIG API utilizes these files in a non-efficient manner, as it loads all associations (no matter these are required or not) present in a particular MIF file. This is not only the performance issue but also memory wastage. In this paper, we propose an algorithm to improve the process of message generation and parsing by avoiding unnecessary associations during MIF loading. This technique is based on proxy design pattern. The proposed technique removes the performance bottleneck of the API and makes it space efficient.
信息技术已经开始聚焦于医疗保健企业,以提供更好的医疗服务。存在不同的医疗保健企业标准,用于医疗保健企业之间的医疗信息通信,提供快速可靠的结果。HL7是用于在医疗保健系统之间交换医疗信息的标准之一。这项研究工作的主要重点是使HL7 v3中的元数据处理更加高效。HL7 v3是一种新兴的标准,用于通过其定义良好的信息模型(如参考信息模型(RIM)、域消息信息模型(D-MIM)和精炼消息信息模型(R-MIM))实现语义互操作性。这些模型被转换为一些特定于技术的格式,例如模型交换格式(MIF)。这种格式包括XML形式的元数据信息。为了生成和解析消息,需要将mif加载到内存中。HL7 Java SIG API以一种低效的方式利用这些文件,因为它加载特定MIF文件中存在的所有关联(无论这些关联是否必需)。这不仅是性能问题,而且是内存浪费问题。在本文中,我们提出了一种算法,通过避免在MIF加载过程中不必要的关联来改进消息生成和解析过程。该技术基于代理设计模式。所提出的技术消除了API的性能瓶颈,并使其具有空间效率。
{"title":"Efficient metadata loading algorithm for generation and parsing of health level 7 version 3 messages","authors":"Y. Mehmood, M. Javed, Muhammad Afzal, H. F. Ahmad","doi":"10.1109/ICET.2009.5353154","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353154","url":null,"abstract":"Information technology has started focusing on the healthcare enterprises, for providing better medical care. There exist different healthcare enterprise standards that are used for the communication of medical information across health enterprises providing swift and reliable results. HL7 is one of those standards that are used for the exchange of medical information between healthcare systems. The main focus of this research work is to make metadata processing efficient in HL7 v3. HL7 v3 is an emerging standard to achieve semantic interoperability with its well defined information models like reference information model (RIM), domain message information model (D-MIM), and refined message information model (R-MIM). These models are converted to some technology specific format for implementation such as model interchange format (MIF). This format includes metadata information in the form of XML. MIFs are required to load into memory for generation and parsing of messages. HL7 Java SIG API utilizes these files in a non-efficient manner, as it loads all associations (no matter these are required or not) present in a particular MIF file. This is not only the performance issue but also memory wastage. In this paper, we propose an algorithm to improve the process of message generation and parsing by avoiding unnecessary associations during MIF loading. This technique is based on proxy design pattern. The proposed technique removes the performance bottleneck of the API and makes it space efficient.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114238947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353204
Usman Ahmed, A. Masood
A novel approach of host based intrusion detection is suggested in this paper that uses Radial basis Functions Neural Networks as profile containers. The system works by using system calls made by privileged UNIX processes and trains the neural network on its basis. An algorithm is proposed that prioritize the speed and efficiency of the training phase and also limits the false alarm rate. In the detection phase the algorithm provides implementation of window size to detect intrusions that are temporally located. Also a threshold is implemented that is altered on basis of the process behavior. The system is tested with attacks that target different intrusion scenarios. The result shows that the radial Basis Functions Neural Networks provide better detection rate and very low training time as compared to other soft computing methods. The robustness of the training phase is evident by low false alarm rate and high detection capability depicted by the application
{"title":"Host based intrusion detection using RBF neural networks","authors":"Usman Ahmed, A. Masood","doi":"10.1109/ICET.2009.5353204","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353204","url":null,"abstract":"A novel approach of host based intrusion detection is suggested in this paper that uses Radial basis Functions Neural Networks as profile containers. The system works by using system calls made by privileged UNIX processes and trains the neural network on its basis. An algorithm is proposed that prioritize the speed and efficiency of the training phase and also limits the false alarm rate. In the detection phase the algorithm provides implementation of window size to detect intrusions that are temporally located. Also a threshold is implemented that is altered on basis of the process behavior. The system is tested with attacks that target different intrusion scenarios. The result shows that the radial Basis Functions Neural Networks provide better detection rate and very low training time as compared to other soft computing methods. The robustness of the training phase is evident by low false alarm rate and high detection capability depicted by the application","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353208
M. Shoaib, M. Yasin, Ullah K. Hikmat, M. I. Saeed, M. Khiyal
The Holy Quran, due to its unique style and allegorical nature, needs special attention about searching and information retrieval issues. The legacy keyword searching techniques are incapable of retrieving semantically relevant verses. In this paper, we address the deficiencies of key word based searching and the issues related to semantic search in the Holy Quran, and propose a model that is capable of performing semantic search. The model exploits WordNet relationships in relational database model. The implementation of this model has been carried out in latest tools and Surah Al-Baqrah, the largest chapter of the Holy Quran, has been taken as sample text. The precision of our model's prototype implementation is far better than simple key word searching.
{"title":"Relational WordNet model for semantic search in Holy Quran","authors":"M. Shoaib, M. Yasin, Ullah K. Hikmat, M. I. Saeed, M. Khiyal","doi":"10.1109/ICET.2009.5353208","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353208","url":null,"abstract":"The Holy Quran, due to its unique style and allegorical nature, needs special attention about searching and information retrieval issues. The legacy keyword searching techniques are incapable of retrieving semantically relevant verses. In this paper, we address the deficiencies of key word based searching and the issues related to semantic search in the Holy Quran, and propose a model that is capable of performing semantic search. The model exploits WordNet relationships in relational database model. The implementation of this model has been carried out in latest tools and Surah Al-Baqrah, the largest chapter of the Holy Quran, has been taken as sample text. The precision of our model's prototype implementation is far better than simple key word searching.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121171033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353191
A. Ullah, M. Nadeem, Asif Ahmed
This paper consists of theoretical modeling and computer simulation of two phase isothermal flow in a convergent divergent nozzle. First general expressions to determine velocity at any point, velocity at throat and speed of sound for two phase isothermal flow through convergent divergent nozzle as a function of pressure and initial volume ratio are developed using basic laws of energy, momentum and ideal gas equation. Then continuity equation is used to derive an expression for area ratio. By using these expressions data is generated for various values of initial volume ratios. Variation in Mach number ratio, velocity ratio, volume ratio, density ratio, pressure ratio with change in area ratio is also observed. A comparison of analytical results with experimental data shows minor deviations. The model developed can be applied to all realistic isothermal compressible two phase flows.
{"title":"Modeling of two phase flow in a convergent- divergent nozzle","authors":"A. Ullah, M. Nadeem, Asif Ahmed","doi":"10.1109/ICET.2009.5353191","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353191","url":null,"abstract":"This paper consists of theoretical modeling and computer simulation of two phase isothermal flow in a convergent divergent nozzle. First general expressions to determine velocity at any point, velocity at throat and speed of sound for two phase isothermal flow through convergent divergent nozzle as a function of pressure and initial volume ratio are developed using basic laws of energy, momentum and ideal gas equation. Then continuity equation is used to derive an expression for area ratio. By using these expressions data is generated for various values of initial volume ratios. Variation in Mach number ratio, velocity ratio, volume ratio, density ratio, pressure ratio with change in area ratio is also observed. A comparison of analytical results with experimental data shows minor deviations. The model developed can be applied to all realistic isothermal compressible two phase flows.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353137
Syeda Uzma Gardazi, A. A. Shahid
Software Architecture is a new field but it is not a new activity while developing Software. However, it remained ignored and less important as compared to other activities like coding. Now it is considered as a separate activity during the development of the software. This paper surveys the description, evolution, evaluation and usage of Software Architecture in Pakistani software industry. The conclusion is made about the description and usage of Software Architecture in Pakistani software industry in particular and in the world in general.
{"title":"Survey of software architecture description and usage in software industry of Pakistan","authors":"Syeda Uzma Gardazi, A. A. Shahid","doi":"10.1109/ICET.2009.5353137","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353137","url":null,"abstract":"Software Architecture is a new field but it is not a new activity while developing Software. However, it remained ignored and less important as compared to other activities like coding. Now it is considered as a separate activity during the development of the software. This paper surveys the description, evolution, evaluation and usage of Software Architecture in Pakistani software industry. The conclusion is made about the description and usage of Software Architecture in Pakistani software industry in particular and in the world in general.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353194
Vahid Mohammadnia, K. Salahshoor
Hitherto, instrumentation network design methodologies have been almost developed based upon linear systems and no algorithm has been suggested for large-scale nonlinear plants. On the other hand, the estimation capabilities of data reconciliation method have not been utilized in the previous works. In this paper, an optimal instrumentation sensor network design scheme is presented for large-scale nonlinear process plants using the particle filtering as a data reconciliation technique. For this purpose, a combinatorial particle swarm optimization (CPSO) algorithm is used to optimize the sensor network design procedure. The proposed design methodology will be implemented on a simulated nonlinear CSTR via two tests to illustrate its effective capabilities.
{"title":"Optimal instrumentation design based on the particle filter for process plants","authors":"Vahid Mohammadnia, K. Salahshoor","doi":"10.1109/ICET.2009.5353194","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353194","url":null,"abstract":"Hitherto, instrumentation network design methodologies have been almost developed based upon linear systems and no algorithm has been suggested for large-scale nonlinear plants. On the other hand, the estimation capabilities of data reconciliation method have not been utilized in the previous works. In this paper, an optimal instrumentation sensor network design scheme is presented for large-scale nonlinear process plants using the particle filtering as a data reconciliation technique. For this purpose, a combinatorial particle swarm optimization (CPSO) algorithm is used to optimize the sensor network design procedure. The proposed design methodology will be implemented on a simulated nonlinear CSTR via two tests to illustrate its effective capabilities.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129335399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353136
Saif ur Rehman Khan, Inayat ur Rehman, S. Malik
Software testing is critical but most expensive phase of Software Development Life Cycle (SDLC). Development organizations desire to thoroughly test the software. But this exhaustive testing is impractical due to resource constraints. A large number of test suites are generated using automated tools. But the real challenge is the selection of subset of test cases and/or high order test cases crucial to validate the System Under Test (SUT). Test case reduction and prioritization techniques help test manager to solve this problem at a little cost. In this paper, we investigate their impact on testing process effectiveness using previous empirical studies. The results indicate that these techniques improve the testing effectiveness significantly. At the end, a case study is presented that suggests different useful combinations of these techniques, which are helpful for different testing scenarios.
{"title":"The impact of test case reduction and prioritization on software testing effectiveness","authors":"Saif ur Rehman Khan, Inayat ur Rehman, S. Malik","doi":"10.1109/ICET.2009.5353136","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353136","url":null,"abstract":"Software testing is critical but most expensive phase of Software Development Life Cycle (SDLC). Development organizations desire to thoroughly test the software. But this exhaustive testing is impractical due to resource constraints. A large number of test suites are generated using automated tools. But the real challenge is the selection of subset of test cases and/or high order test cases crucial to validate the System Under Test (SUT). Test case reduction and prioritization techniques help test manager to solve this problem at a little cost. In this paper, we investigate their impact on testing process effectiveness using previous empirical studies. The results indicate that these techniques improve the testing effectiveness significantly. At the end, a case study is presented that suggests different useful combinations of these techniques, which are helpful for different testing scenarios.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132171084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353195
Y. A. Khan, A. Ullah, H. Ali, K. M. Yahya, N. Ali, M. U. Khan
Quadrature Direct Digital Frequency Synthesis (QDDFS) is a technique which can generate sine and cosine values in digital domain. In this paper we present a novel architecture for implementing QDDFS, suitable for implementation in Very Large Scale Integration (VLSI). The algorithm is very simple, which leads to a reduced hardware complexity. It takes two seed values and depending upon the input frequency control word, the algorithm is capable of generating different frequencies. Hardware is ROM-less, making the proposed scheme more area efficient than ROM based lookup table algorithms. In terms of speed performance, the architecture proposed in this paper is more time efficient than COordinate Rotation DIgital Computer (CORDIC) based QDDFS and Singleton's Method. Simulation results show that the generated values are very close to the actual values.
{"title":"Differential based area efficient ROM-less Quadrature Direct Digital Frequency Synthesis","authors":"Y. A. Khan, A. Ullah, H. Ali, K. M. Yahya, N. Ali, M. U. Khan","doi":"10.1109/ICET.2009.5353195","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353195","url":null,"abstract":"Quadrature Direct Digital Frequency Synthesis (QDDFS) is a technique which can generate sine and cosine values in digital domain. In this paper we present a novel architecture for implementing QDDFS, suitable for implementation in Very Large Scale Integration (VLSI). The algorithm is very simple, which leads to a reduced hardware complexity. It takes two seed values and depending upon the input frequency control word, the algorithm is capable of generating different frequencies. Hardware is ROM-less, making the proposed scheme more area efficient than ROM based lookup table algorithms. In terms of speed performance, the architecture proposed in this paper is more time efficient than COordinate Rotation DIgital Computer (CORDIC) based QDDFS and Singleton's Method. Simulation results show that the generated values are very close to the actual values.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353196
B. H. Qureshi, S. Iqbal, N. Khan
This paper presents the derivation of the probability density function (PDF) of angle of arrival (AoA) of multipaths at base station (BS) and mobile station (MS) while directional antennas are used at both ends of the communication link. A macrocell environment is modeled by assuming uniform and Gaussian distribution of scatterers around MS. Closed form expressions for PDF of AoA at BS and MS are obtained as a result of using directional antennas at both ends of the link. The behavior of the PDF of AoA at BS and MS is observed and plotted by changing the separation between BS and MS and in case of Gaussian scatter density the effect of changing the standard deviation is shown on the PDF of AoA at BS and MS.
{"title":"Effect of directional antennas at both ends of the link on spatial characteristics of cellular and mobile channel","authors":"B. H. Qureshi, S. Iqbal, N. Khan","doi":"10.1109/ICET.2009.5353196","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353196","url":null,"abstract":"This paper presents the derivation of the probability density function (PDF) of angle of arrival (AoA) of multipaths at base station (BS) and mobile station (MS) while directional antennas are used at both ends of the communication link. A macrocell environment is modeled by assuming uniform and Gaussian distribution of scatterers around MS. Closed form expressions for PDF of AoA at BS and MS are obtained as a result of using directional antennas at both ends of the link. The behavior of the PDF of AoA at BS and MS is observed and plotted by changing the separation between BS and MS and in case of Gaussian scatter density the effect of changing the standard deviation is shown on the PDF of AoA at BS and MS.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}