Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530278
S. Rekhis, N. Boudriga
In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios showing with details how the attack scenario was conducted and how the system behaved accordingly, we develop in this paper a Model Checker tool which provides tolerance to unknown attacks and integrates a technique for hypothetical actions generation.
{"title":"A Formal Approach for the Reconstruction of Potential Attack Scenarios","authors":"S. Rekhis, N. Boudriga","doi":"10.1109/ICTTA.2008.4530278","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530278","url":null,"abstract":"In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios showing with details how the attack scenario was conducted and how the system behaved accordingly, we develop in this paper a Model Checker tool which provides tolerance to unknown attacks and integrates a technique for hypothetical actions generation.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128996884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530317
M. Mohamedpour, E. Asgharizadeh, K. Mohamedpour
Nowadays one of the most effective models for strategic planning implementation and performance measurement in organizations is Balanced Scorecard (BSC). The Balanced Scorecard has four aspects which are: 1-financial, 2- costumer, 3- internal business processes and 4- learning and growth; Accordance to these four aspects we can derive many indices to measure the performance of any institution carefully. Since the study was accomplished in a Telecommunication Research Center as a nonprofit and research organization in information and communication technology area which has 5 ICT related units; for more adoption to measure its performance and compare these units, BSC model was transformed into the Modified Balanced Scorecard (MBSC) and number of indices (attributes) were obtained to measure the performance of the units. Finally research units of ICT were compared and ranked by a new technique of multiple attribute decision making (MADM) approach of Operations Research (OR) which called multi-attribute utility theory (MAUT) technique.
{"title":"Comparison of the research units of ICT using MAUT via MBSC","authors":"M. Mohamedpour, E. Asgharizadeh, K. Mohamedpour","doi":"10.1109/ICTTA.2008.4530317","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530317","url":null,"abstract":"Nowadays one of the most effective models for strategic planning implementation and performance measurement in organizations is Balanced Scorecard (BSC). The Balanced Scorecard has four aspects which are: 1-financial, 2- costumer, 3- internal business processes and 4- learning and growth; Accordance to these four aspects we can derive many indices to measure the performance of any institution carefully. Since the study was accomplished in a Telecommunication Research Center as a nonprofit and research organization in information and communication technology area which has 5 ICT related units; for more adoption to measure its performance and compare these units, BSC model was transformed into the Modified Balanced Scorecard (MBSC) and number of indices (attributes) were obtained to measure the performance of the units. Finally research units of ICT were compared and ranked by a new technique of multiple attribute decision making (MADM) approach of Operations Research (OR) which called multi-attribute utility theory (MAUT) technique.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124661833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530194
Mohamad Aljnidi, J. Leneutre, Télécom Paristech
Most of ad-hoc network features encourage self- management. This paper introduces security solutions for ad-hoc networks, taking into consideration their need for an autonomic nature. After defining autonomic networks, we present the MAutoNet (mobile autonomic network) which is our specific type of ad-hoc networks. Our general objective is to build an autonomic security system for MAutoNets. We introduce here a security-based network structure, according to which such system can control a MAutoNet. We then elaborate a relevant access control model that we call SRBAC (secure-relation-based access control). It is a variant of RBAC enhanced with trust management, which is required in autonomic communications.
{"title":"Security Solutions in Mobile Autonomic Networks","authors":"Mohamad Aljnidi, J. Leneutre, Télécom Paristech","doi":"10.1109/ICTTA.2008.4530194","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530194","url":null,"abstract":"Most of ad-hoc network features encourage self- management. This paper introduces security solutions for ad-hoc networks, taking into consideration their need for an autonomic nature. After defining autonomic networks, we present the MAutoNet (mobile autonomic network) which is our specific type of ad-hoc networks. Our general objective is to build an autonomic security system for MAutoNets. We introduce here a security-based network structure, according to which such system can control a MAutoNet. We then elaborate a relevant access control model that we call SRBAC (secure-relation-based access control). It is a variant of RBAC enhanced with trust management, which is required in autonomic communications.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530311
A. A. Sharifloo, Y. Motazedi, M. Shamsfard, R. Dehkharghani
This paper discusses an ontology developed to represent the CMMI-ACQ domain knowledge. CMMI introduces a collection of best practices that helps organizations improve their processes and CMMI-ACQ as one of its constellations is to provide organizations with a resource of effective and proven practices to support acquisition process improvement. This ontology has been developed based on SUMO upper ontology. Through the paper, CMMI and CMMI-ACQ will be illustrated. Also the ontology, its development methodology, and its potential application will be described.
{"title":"An Ontology for CMMI-ACQ Model","authors":"A. A. Sharifloo, Y. Motazedi, M. Shamsfard, R. Dehkharghani","doi":"10.1109/ICTTA.2008.4530311","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530311","url":null,"abstract":"This paper discusses an ontology developed to represent the CMMI-ACQ domain knowledge. CMMI introduces a collection of best practices that helps organizations improve their processes and CMMI-ACQ as one of its constellations is to provide organizations with a resource of effective and proven practices to support acquisition process improvement. This ontology has been developed based on SUMO upper ontology. Through the paper, CMMI and CMMI-ACQ will be illustrated. Also the ontology, its development methodology, and its potential application will be described.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126881808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530263
F. Eshghabadi, M. Dousti, F. Temcamani, B. Delacressoniere, J. Gautier
A 2.4GHz front-end system design for wide spectrum WLAN applications is presented in a 0.35 μm SiGe BiCMOS Technology. This transceiver front-end contains a receive (Rx) chain with a two-stage cascode low noise amplifier (LNA) and an active down-conversion Rx mixer, and a transmit (Tx) chain composed of a Gilbert-Cell core up-conversion Tx mixer and a high-gain Driver Amplifier (DA). The high linear LNA shows a gain of 15.5 dB, an noise figure (NF) of 2.28 dB and an input- referred third-order intercept point (IP3) of +2.4 dBm with 1-dB gain bandwidth (BW) of 1.5 GHz. The single-balanced Rx mixer exhibited a gain and 1-dB gain BW of +6.8 dB and 1.5 GHz. Also a double-balanced Tx mixer with a gain and input/output return loss of -1.3dB and below -35dB, respectively, and a DA with a gain and output-referred IP3 of +29.2dB and +21.2dBm, respectively, is developed. The NF, input-referred IP3 and DC power consumption of Rx string (from antenna to Rx mixer) were achieved 4.4 dB, -15.4 dBm and 30 mW respectively. The output-referred IP3 and power consumption of Tx chain were +20.5 dBm and 125 mW, respectively.
{"title":"A 2.4-GHz Front-end System Design for WLAN Applications using 0.35μm SiGe BiCMOS Technology","authors":"F. Eshghabadi, M. Dousti, F. Temcamani, B. Delacressoniere, J. Gautier","doi":"10.1109/ICTTA.2008.4530263","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530263","url":null,"abstract":"A 2.4GHz front-end system design for wide spectrum WLAN applications is presented in a 0.35 μm SiGe BiCMOS Technology. This transceiver front-end contains a receive (Rx) chain with a two-stage cascode low noise amplifier (LNA) and an active down-conversion Rx mixer, and a transmit (Tx) chain composed of a Gilbert-Cell core up-conversion Tx mixer and a high-gain Driver Amplifier (DA). The high linear LNA shows a gain of 15.5 dB, an noise figure (NF) of 2.28 dB and an input- referred third-order intercept point (IP3) of +2.4 dBm with 1-dB gain bandwidth (BW) of 1.5 GHz. The single-balanced Rx mixer exhibited a gain and 1-dB gain BW of +6.8 dB and 1.5 GHz. Also a double-balanced Tx mixer with a gain and input/output return loss of -1.3dB and below -35dB, respectively, and a DA with a gain and output-referred IP3 of +29.2dB and +21.2dBm, respectively, is developed. The NF, input-referred IP3 and DC power consumption of Rx string (from antenna to Rx mixer) were achieved 4.4 dB, -15.4 dBm and 30 mW respectively. The output-referred IP3 and power consumption of Tx chain were +20.5 dBm and 125 mW, respectively.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530129
F. Besbes, H. Trichili, B. Solaiman
Mono modal biometric systems encounter a variety of security problems and present sometimes unacceptable error rates. Some of these drawbacks can be overcome by setting up multimodal biometric systems. Multimodal biometrics consists in combining two or more biometric modalities in a single identification system to improve the recognition accuracy. However features of different biometrics have to be statistically independent. This paper proposes a multimodal biometric systems using fingerprint and iris recognition.
{"title":"Multimodal Biometric System Based on Fingerprint Identification and Iris Recognition","authors":"F. Besbes, H. Trichili, B. Solaiman","doi":"10.1109/ICTTA.2008.4530129","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530129","url":null,"abstract":"Mono modal biometric systems encounter a variety of security problems and present sometimes unacceptable error rates. Some of these drawbacks can be overcome by setting up multimodal biometric systems. Multimodal biometrics consists in combining two or more biometric modalities in a single identification system to improve the recognition accuracy. However features of different biometrics have to be statistically independent. This paper proposes a multimodal biometric systems using fingerprint and iris recognition.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"261 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120881766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530196
M. Khder, A. Zin, H. Zulaiha, A. Othman
Data allocation can be used to improve data availability in distributed database environments. In such a system, a mechanism is required to distribute the data (allocate it) to the system nodes in the mobile or fixed network and to maintain the consistency of the data. The high increase for working in the disconnected mode leads to develop some models that handle the transactions during the connection, disconnection, and reconnection mode and that models have to able to manage the two networks: the fixed and the mobile network to act as peer to peer network. Most of the transaction management which using the time-out based still suffering from the long time to get the last consistent database copy, and most of the transaction management models didn't pay attention to the data distribution between the fixed network and the mobile network according to the neediness for the data, so that model distribute the data equally between the two networks even one of the networks need more data than the other. In this paper we focus on proposing the fixed end timeout technique (FETOT) for planned disconnection in mobile database over fixed network with weighted data distribution, a model will connect between the mobile network and the fixed network; we are proposing a new method to: ldr mange the data in the fixed network and the mobile network at the same time. ldr Reduce the delay in the total commit time for the timeout-based models. ldr Allocate the data to the mobile and fixed network according to the neediness by using weight factor.
{"title":"Fixed End Timeout Technique (FETOT) for Planned Disconnection in Mobile Database over Fixed Network with Weighted Data Distribution","authors":"M. Khder, A. Zin, H. Zulaiha, A. Othman","doi":"10.1109/ICTTA.2008.4530196","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530196","url":null,"abstract":"Data allocation can be used to improve data availability in distributed database environments. In such a system, a mechanism is required to distribute the data (allocate it) to the system nodes in the mobile or fixed network and to maintain the consistency of the data. The high increase for working in the disconnected mode leads to develop some models that handle the transactions during the connection, disconnection, and reconnection mode and that models have to able to manage the two networks: the fixed and the mobile network to act as peer to peer network. Most of the transaction management which using the time-out based still suffering from the long time to get the last consistent database copy, and most of the transaction management models didn't pay attention to the data distribution between the fixed network and the mobile network according to the neediness for the data, so that model distribute the data equally between the two networks even one of the networks need more data than the other. In this paper we focus on proposing the fixed end timeout technique (FETOT) for planned disconnection in mobile database over fixed network with weighted data distribution, a model will connect between the mobile network and the fixed network; we are proposing a new method to: ldr mange the data in the fixed network and the mobile network at the same time. ldr Reduce the delay in the total commit time for the timeout-based models. ldr Allocate the data to the mobile and fixed network according to the neediness by using weight factor.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114082725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530122
W.L.W. AlTarawneh, W. L. Woo
All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data. We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues. Capsulation process solved the problems of key management and distributes level of security on capsulation shields. Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption/decryption speed because it used a heading capsulation technique on covering the ciphertexts. Our results in term of attack computation complexity analysis are encouraging, while it is acceptable for the authorized users.
{"title":"Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and attack","authors":"W.L.W. AlTarawneh, W. L. Woo","doi":"10.1109/ICTTA.2008.4530122","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530122","url":null,"abstract":"All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data. We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues. Capsulation process solved the problems of key management and distributes level of security on capsulation shields. Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption/decryption speed because it used a heading capsulation technique on covering the ciphertexts. Our results in term of attack computation complexity analysis are encouraging, while it is acceptable for the authorized users.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4529953
B. Rossi, B. Russo, G. Succi
One of the top objectives of European Commission, is to grant that the introduction of eGovernment does not lead to new barriers due to a lack of interoperability. In this sense, we consider Free/Libre Open Source Software (FLOSS) and specifically Open Data Standards (ODS) as important in order to decrease interoperability barriers among organizations. In this paper, we investigate empirically the current state of deployment of data standards in European organizations by means of a large sample of data collected in six Public Administrations. We draw three main conclusions. First, proprietary formats still dominate in different categories. Second, the average file size is generally increasing in the last years in the sample public organizations. This can be critical in data exchange and interoperability due to increasing complexity of documents. Third, there are indications of an increase in ODS usage in the last years in the sample organizations considered.
{"title":"Analysis about the Diffusion of Data Standards inside European Public Organizations","authors":"B. Rossi, B. Russo, G. Succi","doi":"10.1109/ICTTA.2008.4529953","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529953","url":null,"abstract":"One of the top objectives of European Commission, is to grant that the introduction of eGovernment does not lead to new barriers due to a lack of interoperability. In this sense, we consider Free/Libre Open Source Software (FLOSS) and specifically Open Data Standards (ODS) as important in order to decrease interoperability barriers among organizations. In this paper, we investigate empirically the current state of deployment of data standards in European organizations by means of a large sample of data collected in six Public Administrations. We draw three main conclusions. First, proprietary formats still dominate in different categories. Second, the average file size is generally increasing in the last years in the sample public organizations. This can be critical in data exchange and interoperability due to increasing complexity of documents. Third, there are indications of an increase in ODS usage in the last years in the sample organizations considered.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530315
M. Kossmann, R. Wong, M. Odeh, A. Gillies
The present paper gives an insight into the process of developing the metamodel of OntoREM, an ontology-driven requirements engineering methodology, which is currently being developed at the University of the West of England in close cooperation with Airbus. The approach suggested by Noy and McGuinness (2000) has been followed to build a first version of the metamodel of OntoREM as an ontology specified in OWL using Protege-OWL. The outcomes and shortcomings of applying this approach in the context of OntoREM have been assessed showing a major shift in the way that requirements engineering is practiced from process-driven to also knowledge- driven requirements engineering. This, however, necessitates further empirical evaluation of the implementation of OntoREM.
{"title":"Ontology-driven Requirements Engineering: Building the OntoREM Meta Model","authors":"M. Kossmann, R. Wong, M. Odeh, A. Gillies","doi":"10.1109/ICTTA.2008.4530315","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530315","url":null,"abstract":"The present paper gives an insight into the process of developing the metamodel of OntoREM, an ontology-driven requirements engineering methodology, which is currently being developed at the University of the West of England in close cooperation with Airbus. The approach suggested by Noy and McGuinness (2000) has been followed to build a first version of the metamodel of OntoREM as an ontology specified in OWL using Protege-OWL. The outcomes and shortcomings of applying this approach in the context of OntoREM have been assessed showing a major shift in the way that requirements engineering is practiced from process-driven to also knowledge- driven requirements engineering. This, however, necessitates further empirical evaluation of the implementation of OntoREM.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}