Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890796
Jacqueline Tham, A. Khin
There has been many studies carried out on virtual banking adoption, but studies carried out in Malaysia to enhance the virtual banking strategy adoption are limited. Therefore, the objective of this study is to conduct the conceptual model of virtual banking strategies and to find out the key determinants of virtual banking strategies in achieving customers' loyalty in Malaysian perceptive by using Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA) and Diffusion of Innovation (DOI) theories to adopt virtual banking strategies to meet customers need with the advancement in payment system and technology. Results from pilot study shown that banking strategy which being used to test the independent variables in this study is significant in affecting customer loyalty among local banks in Malaysia and correlation test on Equation 1 and 2 suggest the instruments as a measure tool is well suited for this study. This research can be useful for future researchers in this virtual banking domain. However, result may differ with a larger sample size conducted for this study.
{"title":"A conceptual model of virtual banking strategies in achieving customers' loyalty of Malaysian perceptive","authors":"Jacqueline Tham, A. Khin","doi":"10.1109/ICICTM.2016.7890796","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890796","url":null,"abstract":"There has been many studies carried out on virtual banking adoption, but studies carried out in Malaysia to enhance the virtual banking strategy adoption are limited. Therefore, the objective of this study is to conduct the conceptual model of virtual banking strategies and to find out the key determinants of virtual banking strategies in achieving customers' loyalty in Malaysian perceptive by using Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA) and Diffusion of Innovation (DOI) theories to adopt virtual banking strategies to meet customers need with the advancement in payment system and technology. Results from pilot study shown that banking strategy which being used to test the independent variables in this study is significant in affecting customer loyalty among local banks in Malaysia and correlation test on Equation 1 and 2 suggest the instruments as a measure tool is well suited for this study. This research can be useful for future researchers in this virtual banking domain. However, result may differ with a larger sample size conducted for this study.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890785
Zuraini Zainol, P. Nohuddin, Mohd T. Hamid Jaymes, S. Marzukhi
True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues among Muslims such as spiritual, economic, political and social, administration of inheritance of wealth, etc. Since Muslims come from many races and use different languages, Muslim scholars have translated the chapters into various languages so that Muslims around the world can understand the meaning of it. This paper investigates the frequent patterns that can be found in the chapters of Hadith. By using the technique of Association Rule Mining (ARM), frequent patterns and interesting relationships that can benefits Muslim scholars in making full use of Hadith in assisting them in their daily Islamic life and practice.
{"title":"Discovering “interesting” keyword patterns in Hadith chapter documents","authors":"Zuraini Zainol, P. Nohuddin, Mohd T. Hamid Jaymes, S. Marzukhi","doi":"10.1109/ICICTM.2016.7890785","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890785","url":null,"abstract":"True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues among Muslims such as spiritual, economic, political and social, administration of inheritance of wealth, etc. Since Muslims come from many races and use different languages, Muslim scholars have translated the chapters into various languages so that Muslims around the world can understand the meaning of it. This paper investigates the frequent patterns that can be found in the chapters of Hadith. By using the technique of Association Rule Mining (ARM), frequent patterns and interesting relationships that can benefits Muslim scholars in making full use of Hadith in assisting them in their daily Islamic life and practice.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115577453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890783
M. Othman, M. Danuri
This paper introduces Dengue Active Surveillance System (DASS) framework for an early warning system of the outbreak. Dengue and dengue hemorrhagic fever are emerging as major public health problems in most Asian countries such as Malaysia. Effective prevention and control programs will depend on improved surveillance. A new approach to active surveillance outlined with emphasis on the inter-epidemic period. The objective is to develop an early warning surveillance system (framework) that can predict epidemic dengue to improve current passive surveillance system available in Malaysia. Basically, the framework introduced data harvesting process from multiple sources as input, data pre-processing using data aggregator and filtering engine, storing large data in repository, analytic engine for analysis and processing the large data, and presentation of the information to the users. The data harvested from two major sources such as weather or flood information, and social media such as build development and dengue symptom using system API, SOAP and others. The data aggregator will aggregate the data from three different types of data such as structured, semi-structured and unstructured data to be stored into the semi-structured database such as MongoDB and NoSQL. The data parse to the filtering engine for filtering and cleaning the data sources using suitable keywords prior to store it in the large data repository. After that, the large data will be processed and analyzed using algorithm or mathematical calculation to determine the expected dengue cases. Then, the processed information will be presented to the users in a form of web or mobile application and other method, for example, short message service (SMS). Finally, the system accuracy will be evaluated based on the comparison study with the traditional passive system.
{"title":"Proposed conceptual framework of Dengue Active Surveillance System (DASS) in Malaysia","authors":"M. Othman, M. Danuri","doi":"10.1109/ICICTM.2016.7890783","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890783","url":null,"abstract":"This paper introduces Dengue Active Surveillance System (DASS) framework for an early warning system of the outbreak. Dengue and dengue hemorrhagic fever are emerging as major public health problems in most Asian countries such as Malaysia. Effective prevention and control programs will depend on improved surveillance. A new approach to active surveillance outlined with emphasis on the inter-epidemic period. The objective is to develop an early warning surveillance system (framework) that can predict epidemic dengue to improve current passive surveillance system available in Malaysia. Basically, the framework introduced data harvesting process from multiple sources as input, data pre-processing using data aggregator and filtering engine, storing large data in repository, analytic engine for analysis and processing the large data, and presentation of the information to the users. The data harvested from two major sources such as weather or flood information, and social media such as build development and dengue symptom using system API, SOAP and others. The data aggregator will aggregate the data from three different types of data such as structured, semi-structured and unstructured data to be stored into the semi-structured database such as MongoDB and NoSQL. The data parse to the filtering engine for filtering and cleaning the data sources using suitable keywords prior to store it in the large data repository. After that, the large data will be processed and analyzed using algorithm or mathematical calculation to determine the expected dengue cases. Then, the processed information will be presented to the users in a form of web or mobile application and other method, for example, short message service (SMS). Finally, the system accuracy will be evaluated based on the comparison study with the traditional passive system.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890766
Khairani Abdul Majid, Zaharin Yusoff, A. Jemain
In studying traffic congestions at toll plazas, a basic model for traffic systems is introduced, which will hopefully contribute towards a longer term solution with the means for explaining and predicting congestions. It is targeted that this can then be followed by a more specific operations research approach, based on a simulation and queuing theory model, with a study on different arrival patterns, generating queue models, and constructing a Markov chain from the queuing systems, which would then provide a better insight towards a more sustainable solution.
{"title":"Queue analysis at toll plazas (inbound): A basic model for traffic systems towards a study of the effect on toll plazas with different arrival patterns","authors":"Khairani Abdul Majid, Zaharin Yusoff, A. Jemain","doi":"10.1109/ICICTM.2016.7890766","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890766","url":null,"abstract":"In studying traffic congestions at toll plazas, a basic model for traffic systems is introduced, which will hopefully contribute towards a longer term solution with the means for explaining and predicting congestions. It is targeted that this can then be followed by a more specific operations research approach, based on a simulation and queuing theory model, with a study on different arrival patterns, generating queue models, and constructing a Markov chain from the queuing systems, which would then provide a better insight towards a more sustainable solution.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890772
Mohd Zin Zalhan, Sameon Sera Syarmila, Ismail Mohd Nazri, Ismail Mohd Taha
Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restoration, industrial inspection, artistic effect and human computer interfaces. This paper proposes the implementation of digital image processing techniques to classify three different categories of commercial eggs. The proposed system consists of the study on different types and sizes of commercial eggs, real size measurement of these eggs using Coordinate Measure Machine (CMM) and camera, classification algorithm and the development of vision based egg classification system. Image processing techniques such as image filtering and image enhancements have been applied in the system. Results have shown that the proposed system has been able to successfully classify three categories of commercial eggs with accuracy of more than 96%.
{"title":"Vision-based egg grade classifier","authors":"Mohd Zin Zalhan, Sameon Sera Syarmila, Ismail Mohd Nazri, Ismail Mohd Taha","doi":"10.1109/ICICTM.2016.7890772","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890772","url":null,"abstract":"Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restoration, industrial inspection, artistic effect and human computer interfaces. This paper proposes the implementation of digital image processing techniques to classify three different categories of commercial eggs. The proposed system consists of the study on different types and sizes of commercial eggs, real size measurement of these eggs using Coordinate Measure Machine (CMM) and camera, classification algorithm and the development of vision based egg classification system. Image processing techniques such as image filtering and image enhancements have been applied in the system. Results have shown that the proposed system has been able to successfully classify three categories of commercial eggs with accuracy of more than 96%.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890801
R. Chik, Muhammad Rafi’i
The goals of this system is to develop an automated and interactive evaluation system to assist Final Year Project (FYP) assessors during the events of project evaluations. The system will enable the assessors to key in the student's marks into the application and the results will be produced automatically by the system in real time. This could support a paper-less process and environment. The system was developed using PHP and testing was done to gather user's response towards the proposed system. Results from the user testing show a favorable results toward the proposed system which means the system is able to do what is supposed to do. The proposed system has met the user requirements although more improvements could be introduced which will be taken into consideration for future work in this research.
{"title":"Interactive evaluation system for Final Year Project (FYP)","authors":"R. Chik, Muhammad Rafi’i","doi":"10.1109/ICICTM.2016.7890801","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890801","url":null,"abstract":"The goals of this system is to develop an automated and interactive evaluation system to assist Final Year Project (FYP) assessors during the events of project evaluations. The system will enable the assessors to key in the student's marks into the application and the results will be produced automatically by the system in real time. This could support a paper-less process and environment. The system was developed using PHP and testing was done to gather user's response towards the proposed system. Results from the user testing show a favorable results toward the proposed system which means the system is able to do what is supposed to do. The proposed system has met the user requirements although more improvements could be introduced which will be taken into consideration for future work in this research.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890775
W. Yusof, O. Zakaria, Zuraini Zainol
Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However, tacit knowledge is not easily extracted due to being stored implicitly into the mind of the experienced staff. Therefore, this paper explains the structured way on how to collect appropriate tacit knowledge from the experienced staff.
{"title":"Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models","authors":"W. Yusof, O. Zakaria, Zuraini Zainol","doi":"10.1109/ICICTM.2016.7890775","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890775","url":null,"abstract":"Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However, tacit knowledge is not easily extracted due to being stored implicitly into the mind of the experienced staff. Therefore, this paper explains the structured way on how to collect appropriate tacit knowledge from the experienced staff.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890782
Muayad Ali Hamood Bakhtan, Munaisyah Abdullah, Aedah Abd Rahman
License plate recognition(LPR)system contributed to facilitate the human work and make it easier. It is an image processing technology, which uses number plate to identify the vehicles. This paper aims to investigate in the existing LPR research by categorizing existing methods by analyzing the pros/cons of these features, and comparing them in terms of the algorithms that involve and recognition performance. We focus on the recent studies and their limitations, since each country has a different environment and format of licence plate.
{"title":"A review on License Plate Recognition system algorithms","authors":"Muayad Ali Hamood Bakhtan, Munaisyah Abdullah, Aedah Abd Rahman","doi":"10.1109/ICICTM.2016.7890782","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890782","url":null,"abstract":"License plate recognition(LPR)system contributed to facilitate the human work and make it easier. It is an image processing technology, which uses number plate to identify the vehicles. This paper aims to investigate in the existing LPR research by categorizing existing methods by analyzing the pros/cons of these features, and comparing them in terms of the algorithms that involve and recognition performance. We focus on the recent studies and their limitations, since each country has a different environment and format of licence plate.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890812
Raffie Z.A Mohd, M. Zuhairi, Akimi Z.A Shadil, H. Dao
The increasing amount of network traffic threat may originates from various sources, that can led to a higher probability for an organization to be exposed to intruder. Security mechanism such as Intrusion Detection System (IDS) is significant to alleviate such issue. Despite the ability of IDS to detect, some of the anomaly traffic may not be effectively detected. As such, it is vital the IDS algorithm to be reliable and can provide high detection accuracy, reducing as much as possible threats from the network. Nonetheless, every security mechanism has its weaknesses that can be exploited by intruders. Many research works exists, that attempts to address the issue using various methods. This paper discusses a hybrid approach to network IDS, which can minimize the malicious traffic in the network by using machine learning. The paper also provides a review of the available methods to further improve Anomaly-based Network Intrusion Detection System.
{"title":"Anomaly-based NIDS: A review of machine learning methods on malware detection","authors":"Raffie Z.A Mohd, M. Zuhairi, Akimi Z.A Shadil, H. Dao","doi":"10.1109/ICICTM.2016.7890812","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890812","url":null,"abstract":"The increasing amount of network traffic threat may originates from various sources, that can led to a higher probability for an organization to be exposed to intruder. Security mechanism such as Intrusion Detection System (IDS) is significant to alleviate such issue. Despite the ability of IDS to detect, some of the anomaly traffic may not be effectively detected. As such, it is vital the IDS algorithm to be reliable and can provide high detection accuracy, reducing as much as possible threats from the network. Nonetheless, every security mechanism has its weaknesses that can be exploited by intruders. Many research works exists, that attempts to address the issue using various methods. This paper discusses a hybrid approach to network IDS, which can minimize the malicious traffic in the network by using machine learning. The paper also provides a review of the available methods to further improve Anomaly-based Network Intrusion Detection System.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. A SAR operation typically requires a search grid for the identified search area, and a search pattern to conduct a search that covers the grid, together forming a search grid pattern. There is also a need to position the search grid pattern at the actual search area in order to place the search team members for them to conduct the search pattern accordingly. This paper presents a study on determining an appropriate search grid pattern for forest areas and a technique to position it at the search area.
{"title":"Determining an appropriate search grid pattern and positioning it for search and rescue operations (SAR) in forest areas","authors":"N. Zailan, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, Syahaneim Marzuki","doi":"10.1109/ICICTM.2016.7890767","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890767","url":null,"abstract":"Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. A SAR operation typically requires a search grid for the identified search area, and a search pattern to conduct a search that covers the grid, together forming a search grid pattern. There is also a need to position the search grid pattern at the actual search area in order to place the search team members for them to conduct the search pattern accordingly. This paper presents a study on determining an appropriate search grid pattern for forest areas and a technique to position it at the search area.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121371584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}