Pub Date : 2015-12-10DOI: 10.1109/ICOS.2012.6417643
Youssef Gahi, M. Guennoun, Z. Guennoun, K. El-Khatib
The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks. However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme. The new protocol allows nodes, which collaborate in a dynamic environment, to evaluate their knowledge on the trustworthiness of specific routes and securely share this knowledge.
{"title":"An encrypted trust-based routing protocol","authors":"Youssef Gahi, M. Guennoun, Z. Guennoun, K. El-Khatib","doi":"10.1109/ICOS.2012.6417643","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417643","url":null,"abstract":"The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks. However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme. The new protocol allows nodes, which collaborate in a dynamic environment, to evaluate their knowledge on the trustworthiness of specific routes and securely share this knowledge.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129237665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417616
T. O. Barayyan, Hanan Dakheel Al-Alwni, A. Azmi, R. Tuli
Interconnection network topologies are those networks which are used in parallel, distributed system or cluster system to provide the communication among multiple processors or nodes. Interconnection network topologies play a big rule in performance of the system. There are many issues regarding interconnection network topologies. In this paper, congestion and latency point of view have been discussed among three different topologies that are Mesh/Torus, Hypercube and Chordal Ring interconnection topology.
{"title":"Congestion and latency in symmetric interconnection topology","authors":"T. O. Barayyan, Hanan Dakheel Al-Alwni, A. Azmi, R. Tuli","doi":"10.1109/ICOS.2012.6417616","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417616","url":null,"abstract":"Interconnection network topologies are those networks which are used in parallel, distributed system or cluster system to provide the communication among multiple processors or nodes. Interconnection network topologies play a big rule in performance of the system. There are many issues regarding interconnection network topologies. In this paper, congestion and latency point of view have been discussed among three different topologies that are Mesh/Torus, Hypercube and Chordal Ring interconnection topology.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417632
Sanjay Kumar, N. Javaid, Z. Yousuf, Haresh Kumar, Z. Khan, U. Qasim
This paper presents the link availability probability. We evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different number of connections and node density. A novel contribution of this work is enhancement in existing parameters of routing protocols; AODV, DSR and FSR as MOD-AODV, MOD-DSR and MOD-FSR. From the results, we observe that MOD-DSR and DSR outperform MOD-AODV, AODV, MOD-OLSR and OLSR in terms of Packet Delivery Ratio (PDR), Average End-to End Delay (AE2ED), link availability probability at the cost of high value of Normalized Routing Overhead (NRO).
{"title":"On link availability probability of routing protocols for urban scenario in VANETs","authors":"Sanjay Kumar, N. Javaid, Z. Yousuf, Haresh Kumar, Z. Khan, U. Qasim","doi":"10.1109/ICOS.2012.6417632","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417632","url":null,"abstract":"This paper presents the link availability probability. We evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different number of connections and node density. A novel contribution of this work is enhancement in existing parameters of routing protocols; AODV, DSR and FSR as MOD-AODV, MOD-DSR and MOD-FSR. From the results, we observe that MOD-DSR and DSR outperform MOD-AODV, AODV, MOD-OLSR and OLSR in terms of Packet Delivery Ratio (PDR), Average End-to End Delay (AE2ED), link availability probability at the cost of high value of Normalized Routing Overhead (NRO).","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417614
Jong-Woon Yoo, Youngwoo Lee, Dae-Jin Kim, KyoungSoo Park
Modern vehicles are getting increasingly smarter and evolving to become new mobile computing platforms. As the software platformization of vehicles advances, the demands for reconfigurable cars, installing and upgrading vehicle software as plug-and-play have also grown. However, the existing automotive software platforms are not designed for dynamic reconfiguration and plug-and-play. This paper addresses the plug-and-play challenge in the recent automotive systems. Drawing from recent advancements in the mobile phone operating systems, we propose an Android-based software architecture which supports the play-and-play in automotive systems. In our architecture, an application can be downloaded from cloud services and executed on ECUs in a distributed fashion. Before installing an application, our system performs schedulability analysis to check real-time performance requirements for recent vehicles. We also present a model-based development tool for designing a workflow of automotive applications for our system. We implement a prototype and demonstrate the feasibility of our approach.
{"title":"An Android-based automotive middleware architecture for plug-and-play of applications","authors":"Jong-Woon Yoo, Youngwoo Lee, Dae-Jin Kim, KyoungSoo Park","doi":"10.1109/ICOS.2012.6417614","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417614","url":null,"abstract":"Modern vehicles are getting increasingly smarter and evolving to become new mobile computing platforms. As the software platformization of vehicles advances, the demands for reconfigurable cars, installing and upgrading vehicle software as plug-and-play have also grown. However, the existing automotive software platforms are not designed for dynamic reconfiguration and plug-and-play. This paper addresses the plug-and-play challenge in the recent automotive systems. Drawing from recent advancements in the mobile phone operating systems, we propose an Android-based software architecture which supports the play-and-play in automotive systems. In our architecture, an application can be downloaded from cloud services and executed on ECUs in a distributed fashion. Before installing an application, our system performs schedulability analysis to check real-time performance requirements for recent vehicles. We also present a model-based development tool for designing a workflow of automotive applications for our system. We implement a prototype and demonstrate the feasibility of our approach.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417637
G. Mathew
Cloud services can be interweaved as modular building blocks to a multi-component application. This is very appealing because of ready-to-use specialized services and supporting integration APIs from cloud service providers. However, securing and integrating the cloud-based services add challenges compared to having all components within the boundaries of the corporate network. These services can be user-centric, application-centric or machine-centric. The security issues range from channel protection to services chaining. Combining cloud services calls for building transactional interconnects of on-the-shelf services that are secure end-to-end in the wild. Using services from different providers and integrating them securely can be a challenge. An assessment framework for evaluating risks in moving a service to the cloud is also presented. We focus on the security issues in building a cloud application by loosely coupled services designed for transparency in drop-n-replacement of a component service. Security patterns and approaches are presented to realize this transparency.
{"title":"Elements of application security in the cloud computing environment","authors":"G. Mathew","doi":"10.1109/ICOS.2012.6417637","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417637","url":null,"abstract":"Cloud services can be interweaved as modular building blocks to a multi-component application. This is very appealing because of ready-to-use specialized services and supporting integration APIs from cloud service providers. However, securing and integrating the cloud-based services add challenges compared to having all components within the boundaries of the corporate network. These services can be user-centric, application-centric or machine-centric. The security issues range from channel protection to services chaining. Combining cloud services calls for building transactional interconnects of on-the-shelf services that are secure end-to-end in the wild. Using services from different providers and integrating them securely can be a challenge. An assessment framework for evaluating risks in moving a service to the cloud is also presented. We focus on the security issues in building a cloud application by loosely coupled services designed for transparency in drop-n-replacement of a component service. Security patterns and approaches are presented to realize this transparency.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133797029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417622
R. Muhamedyev, Y. Kuchin, P. Gricenko, Z. Nurushev, K. Yakunin, E. Muhamedyeva
Interpretation geophysical data is one of the important factors affecting the economic indicators of mining process. The mining process depend on the speed and accuracy of geophysical data interpretation, but the process of logging data interpretation can not be strictly formalized. Therefore, computer interpretation methods on the basis of expert estimates are necessary. The method is based on expert opinion are widely used in weakly formalized tasks. Mention may be made of the system based on rules, fuzzy logic, Bayesian decision-making systems, artificial neural networks (ANN). ANN have already been used for solving a wide range of recognition problems. The paper analyzes the quality of network's data interpretation essentially depending on its configuration parameters, methods of data preprocessing and learning samples. About 2000 calculation experiments have been made, software and templates for preprocessing of data and interpretation findings have been developed. These experiments showed the effectiveness of neural network approach to solving the problem of geological rocks recognition in stratum-infiltration uranium deposits. Further research in this area will raise the recognition process automation and its accuracy.
{"title":"Recognition of geological rocks at the bedded-infiltration uranium fields by using neural networks","authors":"R. Muhamedyev, Y. Kuchin, P. Gricenko, Z. Nurushev, K. Yakunin, E. Muhamedyeva","doi":"10.1109/ICOS.2012.6417622","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417622","url":null,"abstract":"Interpretation geophysical data is one of the important factors affecting the economic indicators of mining process. The mining process depend on the speed and accuracy of geophysical data interpretation, but the process of logging data interpretation can not be strictly formalized. Therefore, computer interpretation methods on the basis of expert estimates are necessary. The method is based on expert opinion are widely used in weakly formalized tasks. Mention may be made of the system based on rules, fuzzy logic, Bayesian decision-making systems, artificial neural networks (ANN). ANN have already been used for solving a wide range of recognition problems. The paper analyzes the quality of network's data interpretation essentially depending on its configuration parameters, methods of data preprocessing and learning samples. About 2000 calculation experiments have been made, software and templates for preprocessing of data and interpretation findings have been developed. These experiments showed the effectiveness of neural network approach to solving the problem of geological rocks recognition in stratum-infiltration uranium deposits. Further research in this area will raise the recognition process automation and its accuracy.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417651
M. Al-Bashayreh, N. Hashim, O. T. Khorma
Design of context-aware application frameworks to develop mobile patient monitoring systems using wireless sensors (MPMS) is an emerging in the biomedical informatics domain. However, literature about this topic remains fragmented. In fact, there are no categories in the literature to characterize these frameworks. In addition, there are no success factors to identify lacks and gaps in their design. To address these gaps, this paper is a survey of the context-aware frameworks in the biomedical informatics domain to identify the categories that can be used to gain an intensive and extensive understanding of previous studies. Then, use these categories to identify the Factors of Successful Context-aware Application Frameworks (FSCAF), which are a set of designs and domain requirements that must be satisfied to design context-aware frameworks to develop MPMS. The results are expected to help researchers identify lacks and gaps in the literature to design enhanced context-aware frameworks to develop MPMS.
{"title":"A survey on success factors to design context-aware frameworks to develop mobile patient monitoring systems","authors":"M. Al-Bashayreh, N. Hashim, O. T. Khorma","doi":"10.1109/ICOS.2012.6417651","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417651","url":null,"abstract":"Design of context-aware application frameworks to develop mobile patient monitoring systems using wireless sensors (MPMS) is an emerging in the biomedical informatics domain. However, literature about this topic remains fragmented. In fact, there are no categories in the literature to characterize these frameworks. In addition, there are no success factors to identify lacks and gaps in their design. To address these gaps, this paper is a survey of the context-aware frameworks in the biomedical informatics domain to identify the categories that can be used to gain an intensive and extensive understanding of previous studies. Then, use these categories to identify the Factors of Successful Context-aware Application Frameworks (FSCAF), which are a set of designs and domain requirements that must be satisfied to design context-aware frameworks to develop MPMS. The results are expected to help researchers identify lacks and gaps in the literature to design enhanced context-aware frameworks to develop MPMS.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417613
Rusli Abdullah, A. M. Talib
Cloud computing describes services and applications that are extended to be accessible through the Internet. Service Level Agreement (SLA) is a contractual agreement that has been established between the members of Cloud Service Provider (CSP) that consists of the service provider and its recipient for a specific application of services based on its allocating and sharing Resources as a Service (RaaS). In this context, there are many parties who are very concerning about it, but unfortunately there is lack of a common mapping of SLA information and RaaS of best practice as a guideline that can be used by CSP in making decision for the future purposes in engaging with services in the cloud computing environment. Therefore, the main goal of this paper is to integrate information of SLA and RaaS in order to ensure everybody who are providing and receiving the services in the cloud particularly will be satisfied and getting the best maximum Return Of the Investment (ROI) in allocating and sharing resources among the providers and recipients in cloud computing environment. As a result, some attributes such as reliability, readability and standardization of Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are found to be high.
{"title":"Towards integrating information of service level agreement and resources as a services (RaaS) for cloud computing environment","authors":"Rusli Abdullah, A. M. Talib","doi":"10.1109/ICOS.2012.6417613","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417613","url":null,"abstract":"Cloud computing describes services and applications that are extended to be accessible through the Internet. Service Level Agreement (SLA) is a contractual agreement that has been established between the members of Cloud Service Provider (CSP) that consists of the service provider and its recipient for a specific application of services based on its allocating and sharing Resources as a Service (RaaS). In this context, there are many parties who are very concerning about it, but unfortunately there is lack of a common mapping of SLA information and RaaS of best practice as a guideline that can be used by CSP in making decision for the future purposes in engaging with services in the cloud computing environment. Therefore, the main goal of this paper is to integrate information of SLA and RaaS in order to ensure everybody who are providing and receiving the services in the cloud particularly will be satisfied and getting the best maximum Return Of the Investment (ROI) in allocating and sharing resources among the providers and recipients in cloud computing environment. As a result, some attributes such as reliability, readability and standardization of Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are found to be high.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417629
S. I. Ch'ng, K. Seng, L. Ang
Over the years, we have seen an increase in the use of RBF neural networks for the task of face recognition. However, the use of second order algorithms as the learning algorithm for all the adjustable parameters in such networks are rare due to the high computational complexity of the calculation of the Jacobian and Hessian matrix. Hence, in this paper, we propose a modular structural training architecture to adapt the Levenberg-Marquardt based RBF neural network for the application of face recognition. In addition to the proposal of the modular structural training architecture, we have also investigated the use of different front-end processors to reduce the dimension size of the feature vectors prior to its application to the LM-based RBF neural network. The investigative study was done on three standard face databases; ORL, Yale and AR databases.
{"title":"Modular dynamic RBF neural network for face recognition","authors":"S. I. Ch'ng, K. Seng, L. Ang","doi":"10.1109/ICOS.2012.6417629","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417629","url":null,"abstract":"Over the years, we have seen an increase in the use of RBF neural networks for the task of face recognition. However, the use of second order algorithms as the learning algorithm for all the adjustable parameters in such networks are rare due to the high computational complexity of the calculation of the Jacobian and Hessian matrix. Hence, in this paper, we propose a modular structural training architecture to adapt the Levenberg-Marquardt based RBF neural network for the application of face recognition. In addition to the proposal of the modular structural training architecture, we have also investigated the use of different front-end processors to reduce the dimension size of the feature vectors prior to its application to the LM-based RBF neural network. The investigative study was done on three standard face databases; ORL, Yale and AR databases.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417649
N. A. Bakar, Ali Selamat
Model checking is an automated formal verification technique that takes formal system design model and formal properties specifications as input to perform verification and produce system correctness result and counterexamples. Although a system has been formally verified to be correct using model checking, end users still want to know how correct the system is. As flawless system is rarely feasible, an approach for verifying the verifier is needed to measure the completeness and accuracy levels of the verification implementation. In this research, we propose a framework for evaluating agent-based model checking results with the Universiti Teknologi Malaysia on-line graduate student application system. We have designed multi-agent runtime verification and validation (MARVV) architecture that incorporates a runtime system profiles to perform the evaluation. Finally, we evaluate the applicability of the proposed model using MCMAS model checking.
{"title":"Agent-based model checking verification framework","authors":"N. A. Bakar, Ali Selamat","doi":"10.1109/ICOS.2012.6417649","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417649","url":null,"abstract":"Model checking is an automated formal verification technique that takes formal system design model and formal properties specifications as input to perform verification and produce system correctness result and counterexamples. Although a system has been formally verified to be correct using model checking, end users still want to know how correct the system is. As flawless system is rarely feasible, an approach for verifying the verifier is needed to measure the completeness and accuracy levels of the verification implementation. In this research, we propose a framework for evaluating agent-based model checking results with the Universiti Teknologi Malaysia on-line graduate student application system. We have designed multi-agent runtime verification and validation (MARVV) architecture that incorporates a runtime system profiles to perform the evaluation. Finally, we evaluate the applicability of the proposed model using MCMAS model checking.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}