Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991089
E. Abulibdeh, A. A. Libdeh, Fuad A. Trayek, G. Murshidi
There is an increasing need for improving the e-learning systems and so integrating smart Applications into education is a useful communication tool in interactive educational environment for both learners and teachers. The introduction of smart Applications has revolutionized education by providing a smart learning environment creating a new style in learning known as smart learning. The main purpose of this study is to shed light on this new concept of learning and highlighting the attributes and features of smart classroom. It aims to investigate the student’s perception of smart learning and their extent of using different smart learning tools. The study was conducted at several Universities in the United Arab Emirates sampling 411 students enrolled in different programs.
{"title":"Diversifying The Teaching Methods : Student’s Perceptions of Smart Learning","authors":"E. Abulibdeh, A. A. Libdeh, Fuad A. Trayek, G. Murshidi","doi":"10.1109/ACIT47987.2019.8991089","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991089","url":null,"abstract":"There is an increasing need for improving the e-learning systems and so integrating smart Applications into education is a useful communication tool in interactive educational environment for both learners and teachers. The introduction of smart Applications has revolutionized education by providing a smart learning environment creating a new style in learning known as smart learning. The main purpose of this study is to shed light on this new concept of learning and highlighting the attributes and features of smart classroom. It aims to investigate the student’s perception of smart learning and their extent of using different smart learning tools. The study was conducted at several Universities in the United Arab Emirates sampling 411 students enrolled in different programs.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991006
Walaa S. Mahmoud, Ajayeb S. Abu Daabes
Social media platforms are now considered as the most used tools that people used daily. The relationship between social media and well-being is driven by many implicit and explicit factors that are difficult to configure. There is a substantial agreement that using social media platforms have positive effects and dark sides on well-being along with many contradictions. This study is an attempt to understand social media effects on users’ well-being by a novel perception that avoids the linear perspectives of the digital world. This research proposes a digital chaos model to better understanding the full picture of the new chaotic life. This model presents the interplay of dynamic actions and factors between social media platforms and users’ well-being, which are complex, nonlinear and interactive factors.
{"title":"Does Social Media Affects Users’ Well-Being","authors":"Walaa S. Mahmoud, Ajayeb S. Abu Daabes","doi":"10.1109/ACIT47987.2019.8991006","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991006","url":null,"abstract":"Social media platforms are now considered as the most used tools that people used daily. The relationship between social media and well-being is driven by many implicit and explicit factors that are difficult to configure. There is a substantial agreement that using social media platforms have positive effects and dark sides on well-being along with many contradictions. This study is an attempt to understand social media effects on users’ well-being by a novel perception that avoids the linear perspectives of the digital world. This research proposes a digital chaos model to better understanding the full picture of the new chaotic life. This model presents the interplay of dynamic actions and factors between social media platforms and users’ well-being, which are complex, nonlinear and interactive factors.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991060
Mohammed Ajam, H. Kanaan, Lina el Khansa, M. Ayache
The algorithm presented in this paper identifies the ischemic stroke from CT brain images by extracting the textural and statistical features. Our algorithm starts by preprocessing of our CT images, and then image enhancement is performed. The brain CT images are segmented by Marker Controlled watershed. We obtained the Grey Level Co-occurrence matrix (GLCM) to extract the textural and statistical features. The experimental results showed that the over-segmentation due to noise is resolved by Marker controlled watershed. The textural and statistical features showed that the values of contrast, correlation, standard deviation and variance of normal CT images are less than those of abnormal CT images (contains ischemic stroke), where the values of homogeneity, energy and mean are bigger in normal CT images than those of abnormal CT images.
{"title":"Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical Features","authors":"Mohammed Ajam, H. Kanaan, Lina el Khansa, M. Ayache","doi":"10.1109/ACIT47987.2019.8991060","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991060","url":null,"abstract":"The algorithm presented in this paper identifies the ischemic stroke from CT brain images by extracting the textural and statistical features. Our algorithm starts by preprocessing of our CT images, and then image enhancement is performed. The brain CT images are segmented by Marker Controlled watershed. We obtained the Grey Level Co-occurrence matrix (GLCM) to extract the textural and statistical features. The experimental results showed that the over-segmentation due to noise is resolved by Marker controlled watershed. The textural and statistical features showed that the values of contrast, correlation, standard deviation and variance of normal CT images are less than those of abnormal CT images (contains ischemic stroke), where the values of homogeneity, energy and mean are bigger in normal CT images than those of abnormal CT images.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127289536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991124
Huthifh Al-Rushdan, M. Shurman, Sharhabeel H. Alnabelsi, Q. Althebyan
The zero-day attack in networks exploits an undiscovered vulnerability, in order to affect/damage networks or programs. The term “zero-day” refers to the number of days available to the software or the hardware vendor to issue a patch for this new vulnerability. Currently, the best-known defense mechanism against the zero-day attacks focuses on detection and response, as a prevention effort, which typically fails against unknown or new vulnerabilities. To the best of our knowledge, this attack has not been widely investigated for Software-Defined Networks (SDNs). Therefore, in this work we are motivated to develop anew zero-day attack detection and prevention mechanism, which is designed and implemented for SDN using a modified sandbox tool, named Cuckoo. Our experiments results, under UNIX system, show that our proposed design successfully stops zero-day malwares by isolating the infected client, and thus, prevents these malwares from infesting other clients.
{"title":"Zero-Day Attack Detection and Prevention in Software-Defined Networks","authors":"Huthifh Al-Rushdan, M. Shurman, Sharhabeel H. Alnabelsi, Q. Althebyan","doi":"10.1109/ACIT47987.2019.8991124","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991124","url":null,"abstract":"The zero-day attack in networks exploits an undiscovered vulnerability, in order to affect/damage networks or programs. The term “zero-day” refers to the number of days available to the software or the hardware vendor to issue a patch for this new vulnerability. Currently, the best-known defense mechanism against the zero-day attacks focuses on detection and response, as a prevention effort, which typically fails against unknown or new vulnerabilities. To the best of our knowledge, this attack has not been widely investigated for Software-Defined Networks (SDNs). Therefore, in this work we are motivated to develop anew zero-day attack detection and prevention mechanism, which is designed and implemented for SDN using a modified sandbox tool, named Cuckoo. Our experiments results, under UNIX system, show that our proposed design successfully stops zero-day malwares by isolating the infected client, and thus, prevents these malwares from infesting other clients.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991125
Z. Shanaa, E. Abulibdeh
This study aimed at exploring the effect of using iPads on the academic achievement of grade 10 students in ICT class at a Private School in Abu Dhabi, in the United Arab Emirates, and to compare their results with their peers who study the same subject using traditional educational methods. The study was conducted during the second semester of the school year 2017/2018 and the sample consisted of two groups: the control group (42 students) who were taught using the traditional method, and the experimental group (42 students) who were taught using the iPad. An achievement pre and post-tests were given to the two groups, data were statically analyzed and discussed. The study results have shown statistical difference in the achievement of the experimental group indicating that using the iPad in learning has a positive effect on the academic achievement of grade 10 students compared to those who learned by the traditional method.
{"title":"Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAE","authors":"Z. Shanaa, E. Abulibdeh","doi":"10.1109/ACIT47987.2019.8991125","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991125","url":null,"abstract":"This study aimed at exploring the effect of using iPads on the academic achievement of grade 10 students in ICT class at a Private School in Abu Dhabi, in the United Arab Emirates, and to compare their results with their peers who study the same subject using traditional educational methods. The study was conducted during the second semester of the school year 2017/2018 and the sample consisted of two groups: the control group (42 students) who were taught using the traditional method, and the experimental group (42 students) who were taught using the iPad. An achievement pre and post-tests were given to the two groups, data were statically analyzed and discussed. The study results have shown statistical difference in the achievement of the experimental group indicating that using the iPad in learning has a positive effect on the academic achievement of grade 10 students compared to those who learned by the traditional method.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"14 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991143
Mariam Khader, Ghazi Al-Naymat
Discovering clusters with arbitrary shapes has attracted a large number of researchers, due to its importance in analyzing real-world datasets. DENCLUE is an efficient density-based algorithm that provides a compact mathematical definition of clusters with arbitrary shapes. Several variants of DENCLUE have been proposed to enhance its performance, including DENCLUE 2.0. This study aims to discuss the difference between the two variants, DENCLUE 1.0 and DENCLUE 2.0. This will allow for future improvements on both variants and determining the best variant for specific types of datasets. The Adjusted Rand Index measure is used to evaluate the difference between the clustering results of both algorithms. The experimental results conclude that DECNLUE 1.0 outperforms DENCLUE 2.0 in discovering clusters with arbitrary shapes. Specifically, in datasets that contain clusters with multiple modes.
{"title":"Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering","authors":"Mariam Khader, Ghazi Al-Naymat","doi":"10.1109/ACIT47987.2019.8991143","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991143","url":null,"abstract":"Discovering clusters with arbitrary shapes has attracted a large number of researchers, due to its importance in analyzing real-world datasets. DENCLUE is an efficient density-based algorithm that provides a compact mathematical definition of clusters with arbitrary shapes. Several variants of DENCLUE have been proposed to enhance its performance, including DENCLUE 2.0. This study aims to discuss the difference between the two variants, DENCLUE 1.0 and DENCLUE 2.0. This will allow for future improvements on both variants and determining the best variant for specific types of datasets. The Adjusted Rand Index measure is used to evaluate the difference between the clustering results of both algorithms. The experimental results conclude that DECNLUE 1.0 outperforms DENCLUE 2.0 in discovering clusters with arbitrary shapes. Specifically, in datasets that contain clusters with multiple modes.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991024
Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib
A Genetic Algorithm is a sophisticated searching technique that finds the best possible solution in the solution space. The search process is driven by a fitness function which measures the fitness level of a candidate solution. The chosen fitness function varies according to the problem being solved. However, any fitness function should satisfy some conditions. In the Bayesian genetic algorithm for missing values imputation we noted that the used fitness function performs poorly when be applied with datasets that contain missing values, since such datasets hold a level of bias which would adversely affect the efficiency of the entire searching process. In this paper we mentioned that some assumptions should hold in order to apply the technique of Bayesian genetic algorithm efficiently.
{"title":"Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values Imputation","authors":"Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib","doi":"10.1109/ACIT47987.2019.8991024","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991024","url":null,"abstract":"A Genetic Algorithm is a sophisticated searching technique that finds the best possible solution in the solution space. The search process is driven by a fitness function which measures the fitness level of a candidate solution. The chosen fitness function varies according to the problem being solved. However, any fitness function should satisfy some conditions. In the Bayesian genetic algorithm for missing values imputation we noted that the used fitness function performs poorly when be applied with datasets that contain missing values, since such datasets hold a level of bias which would adversely affect the efficiency of the entire searching process. In this paper we mentioned that some assumptions should hold in order to apply the technique of Bayesian genetic algorithm efficiently.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990975
Ghaliya Alfarsi, J. Jabbar, R. M. Tawafak, A. Alsidiri, M. Alsinani
The aims of this research are to conduct a survey on face verification techniques and to discuss the methods that they used and which one was the optimal and for what it is the best. We searched for articles and review papers related to face verification techniques. Ten papers were selected based on the year of publication and the techniques used. The techniques were studied and a summary report of the techniques used is created. We also suggest merging two techniques that may increase accuracy and effectiveness of verification. A summary report of various techniques by researchers is created. An approach by merging two techniques included in the summary report is suggested to enhance verification. The presence of variable illumination, pretense, facial look, growing old and other unsystematic reasons regularly cause identification errors to occur. Moreover increase in level of controlling and executing of the face verification methods is not only difficult even though it is a critical sense of function. Face verification has a huge contribution in different types of media purposes, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. Several methods have proved to be the best to show a potential move towards the development of performance achieved since more than prompt and verification.
{"title":"Techniques For Face Verification: Literature Review","authors":"Ghaliya Alfarsi, J. Jabbar, R. M. Tawafak, A. Alsidiri, M. Alsinani","doi":"10.1109/ACIT47987.2019.8990975","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990975","url":null,"abstract":"The aims of this research are to conduct a survey on face verification techniques and to discuss the methods that they used and which one was the optimal and for what it is the best. We searched for articles and review papers related to face verification techniques. Ten papers were selected based on the year of publication and the techniques used. The techniques were studied and a summary report of the techniques used is created. We also suggest merging two techniques that may increase accuracy and effectiveness of verification. A summary report of various techniques by researchers is created. An approach by merging two techniques included in the summary report is suggested to enhance verification. The presence of variable illumination, pretense, facial look, growing old and other unsystematic reasons regularly cause identification errors to occur. Moreover increase in level of controlling and executing of the face verification methods is not only difficult even though it is a critical sense of function. Face verification has a huge contribution in different types of media purposes, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. Several methods have proved to be the best to show a potential move towards the development of performance achieved since more than prompt and verification.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8990982
A. Shaout, Nathan Schmidt
This paper will cover a project for a device that will monitor a beehive and give a status of the health and productivity of the hive to the beekeeper. Bee keeping is a very large industry with approximately 2.44 million bee colonies in the US. Bees are vital to our food supply. The value of pollination by bees in the US alone is estimated to be worth $16 billon. A phenomenon known as Colony Collapse Disorder (CCD) has brought significant loss to honeybee colonies. If a hive experiences CCD most of the bees will leave the hive for no apparent reason. It is imperative to understand a hive’s health and activities for a beekeeper to take care of the bees effectively. The system in this paper takes readings from inside the hive such as temperature, humidity, and noise. A camera is mounted on the outside of the hive to monitor bee activity and keep track of the activity at the beehive entrance. All this data is interpreted by algorithms that alert the beekeeper on the health of the hive. Some of these algorithms use machine learning to determine the health of the hive. This paper reviews various project currently in the market for beehive monitoring as well as a literature review of some of the research in bee monitoring systems.
{"title":"Bee Hive Monitor","authors":"A. Shaout, Nathan Schmidt","doi":"10.1109/ACIT47987.2019.8990982","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990982","url":null,"abstract":"This paper will cover a project for a device that will monitor a beehive and give a status of the health and productivity of the hive to the beekeeper. Bee keeping is a very large industry with approximately 2.44 million bee colonies in the US. Bees are vital to our food supply. The value of pollination by bees in the US alone is estimated to be worth $16 billon. A phenomenon known as Colony Collapse Disorder (CCD) has brought significant loss to honeybee colonies. If a hive experiences CCD most of the bees will leave the hive for no apparent reason. It is imperative to understand a hive’s health and activities for a beekeeper to take care of the bees effectively. The system in this paper takes readings from inside the hive such as temperature, humidity, and noise. A camera is mounted on the outside of the hive to monitor bee activity and keep track of the activity at the beehive entrance. All this data is interpreted by algorithms that alert the beekeeper on the health of the hive. Some of these algorithms use machine learning to determine the health of the hive. This paper reviews various project currently in the market for beehive monitoring as well as a literature review of some of the research in bee monitoring systems.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130265951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ACIT47987.2019.8991022
M. Al-Hattab, Nuha Hamada
Mobility prediction has attracted increasing interest in recent years, as correct and accurate prediction can lead to efficient data delivery and provide the user with high quality of service. Moreover, it enables the network to plan for future tasks in the suitable time. In this paper, we present a framework for a prediction scheme that predict the future mobility of mobile networks in three-dimensional space using polynomial regression and provide a time-space mapping to produce a time function for the three components of the trajectory for the node
{"title":"Mobility prediction as a time function for mobile networks in 3-D space: A Framework","authors":"M. Al-Hattab, Nuha Hamada","doi":"10.1109/ACIT47987.2019.8991022","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991022","url":null,"abstract":"Mobility prediction has attracted increasing interest in recent years, as correct and accurate prediction can lead to efficient data delivery and provide the user with high quality of service. Moreover, it enables the network to plan for future tasks in the suitable time. In this paper, we present a framework for a prediction scheme that predict the future mobility of mobile networks in three-dimensional space using polynomial regression and provide a time-space mapping to produce a time function for the three components of the trajectory for the node","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}