Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00118
Ján Cegin, K. Rástočný, M. Bieliková
Unit testing focused on the Modified Condition/Decision Coverage (MC/DC) criterion is essential in development of safety-critical systems as recommended by international standards. Designing unit tests for such specific software is time-consuming task which can be partially automated by test data generation methods. Special attention is given to search-based methods which are often used for problems where traditional methods like symbolic execution fall short. However, no publicly available dataset for evaluation of such methods taking into account specifics of the MC/DC criterion, which is esential for safety-critical systems. In this paper we present an analysis of software of safety-critical systems and we postulate to find a fitting open source project which could serve as a synthesized dataset for future evaluations of search-based test data generation methods for the MC/DC criterion.
{"title":"Synthesized dataset for search-based test data generation methods focused on MC/DC criterion","authors":"Ján Cegin, K. Rástočný, M. Bieliková","doi":"10.1109/QRS-C51114.2020.00118","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00118","url":null,"abstract":"Unit testing focused on the Modified Condition/Decision Coverage (MC/DC) criterion is essential in development of safety-critical systems as recommended by international standards. Designing unit tests for such specific software is time-consuming task which can be partially automated by test data generation methods. Special attention is given to search-based methods which are often used for problems where traditional methods like symbolic execution fall short. However, no publicly available dataset for evaluation of such methods taking into account specifics of the MC/DC criterion, which is esential for safety-critical systems. In this paper we present an analysis of software of safety-critical systems and we postulate to find a fitting open source project which could serve as a synthesized dataset for future evaluations of search-based test data generation methods for the MC/DC criterion.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116784261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00032
Oliver Kattwinkel, Michael Rademacher
In 2008, the cryptocurrency Bitcoin, which is equivalent to the original idea of a blockchain, emerged as a new currency and revolutionized the digital exchange of value. Despite the great user and research interest, the customary practice is still complex. Poor usability and negative user experience lead to several security threats. This work examines the mitigation of third party attack vectors and non-malicious human failure types identified in the personal payment process. Current approaches are analyzed and a new payment protocol is specified to foster the exchange of preparatory payment information. The qualitative evaluation reveals a significant improvement over the current best-practice exchange procedure. The system demonstrates a balance between security and usability and provides a method for more user-friendly blockchain transactions.
{"title":"Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions","authors":"Oliver Kattwinkel, Michael Rademacher","doi":"10.1109/QRS-C51114.2020.00032","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00032","url":null,"abstract":"In 2008, the cryptocurrency Bitcoin, which is equivalent to the original idea of a blockchain, emerged as a new currency and revolutionized the digital exchange of value. Despite the great user and research interest, the customary practice is still complex. Poor usability and negative user experience lead to several security threats. This work examines the mitigation of third party attack vectors and non-malicious human failure types identified in the personal payment process. Current approaches are analyzed and a new payment protocol is specified to foster the exchange of preparatory payment information. The qualitative evaluation reveals a significant improvement over the current best-practice exchange procedure. The system demonstrates a balance between security and usability and provides a method for more user-friendly blockchain transactions.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00058
Wenqiang Zheng, Taotao Zhou, Yanfu Li
The maintenance of electric multiple units (EMUs) has significant importance in ensuring the safe operation of EMUs. However, there have been limited experiences especially on the EMUs high-level maintenance scheduling which needs more research efforts. This paper presents an overview of both EMUs high-level and elementary maintenance scheduling in China. The current practice of maintenance scheduling is briefly summarized. Moreover, the key factors involved in the high-level maintenance scheduling are discussed, which can be basic guidelines to formulate constraints in modeling these scheduling problems. This study would benefit the researchers interested in the research of EMUs high-level maintenance scheduling and further studies could be performed to formulate an optimization model to systematically the balance between maintenance resources and economic operations.
{"title":"An Overview of the EMUs Maintenance Scheduling in China","authors":"Wenqiang Zheng, Taotao Zhou, Yanfu Li","doi":"10.1109/QRS-C51114.2020.00058","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00058","url":null,"abstract":"The maintenance of electric multiple units (EMUs) has significant importance in ensuring the safe operation of EMUs. However, there have been limited experiences especially on the EMUs high-level maintenance scheduling which needs more research efforts. This paper presents an overview of both EMUs high-level and elementary maintenance scheduling in China. The current practice of maintenance scheduling is briefly summarized. Moreover, the key factors involved in the high-level maintenance scheduling are discussed, which can be basic guidelines to formulate constraints in modeling these scheduling problems. This study would benefit the researchers interested in the research of EMUs high-level maintenance scheduling and further studies could be performed to formulate an optimization model to systematically the balance between maintenance resources and economic operations.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"141 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The reliability-centered maintenance (RCM) is one of the most advanced maintenance plan generating technologies for equipments. At present, the key technologies such as FMEA and FMECA supporting the RCM analysis remains in the manual stage in some enterprises. The disadvantages are time-consuming, labour-intensive and error-prone. For complex systems containing thousands of components, to achieve a fast and effective FMECA analysis is difficult. RCM should benefit from the most advanced model-based systems engineering methods. In this paper, a model-based RCM analysis framework (MRAF) is presented. Based on this framework, RCM analysts can use model-based reliability analysis techniques, such as AADL, to model the system architecture and faults information. Then the AADL-based analysis platform OSATE can be used to automatically produce the FMEA. By combining the generated FMEA with the criticality analysis (CA) technology, this paper can semiautomatically generate the FMECA for equipments and systems being analyzed by RCM.
{"title":"A Model-based RCM Analysis Method","authors":"Zhibao Mian, Shuli Jia, Xiaodong Shi, Cairong Tang, Junjie Chen, Y. Gao","doi":"10.1109/QRS-C51114.2020.00059","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00059","url":null,"abstract":"The reliability-centered maintenance (RCM) is one of the most advanced maintenance plan generating technologies for equipments. At present, the key technologies such as FMEA and FMECA supporting the RCM analysis remains in the manual stage in some enterprises. The disadvantages are time-consuming, labour-intensive and error-prone. For complex systems containing thousands of components, to achieve a fast and effective FMECA analysis is difficult. RCM should benefit from the most advanced model-based systems engineering methods. In this paper, a model-based RCM analysis framework (MRAF) is presented. Based on this framework, RCM analysts can use model-based reliability analysis techniques, such as AADL, to model the system architecture and faults information. Then the AADL-based analysis platform OSATE can be used to automatically produce the FMEA. By combining the generated FMEA with the criticality analysis (CA) technology, this paper can semiautomatically generate the FMECA for equipments and systems being analyzed by RCM.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00088
Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Y. Rebahi
Great research efforts are made towards transferring additional data, such as location and sensor information, within the duration of an NG112 call. Especially in the field of emergency communication, the transmission of eHealth sensor data, which provide information about the vital parameters of a person in need of help, could improve the overall rescue operation. Since emergency calls are time-critical, it is necessary to analyse the impact of the attached sensor data on the emergency call system. In this paper, we present a TTCN-3 Test System that emulates smart devices by sending simulated sensor data via Bluetooth to a smartphone to trigger automated emergency calls. This emergency call is routed through an NG112 platform back to the Test System to measure the latency between sending the data and receiving the call. By incrementing the number of simulated sensors, the impact of the attached sensor data can be evaluated.
{"title":"TTCN-3 based NG112 Test System and Playground for Emergency Communication","authors":"Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Y. Rebahi","doi":"10.1109/QRS-C51114.2020.00088","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00088","url":null,"abstract":"Great research efforts are made towards transferring additional data, such as location and sensor information, within the duration of an NG112 call. Especially in the field of emergency communication, the transmission of eHealth sensor data, which provide information about the vital parameters of a person in need of help, could improve the overall rescue operation. Since emergency calls are time-critical, it is necessary to analyse the impact of the attached sensor data on the emergency call system. In this paper, we present a TTCN-3 Test System that emulates smart devices by sending simulated sensor data via Bluetooth to a smartphone to trigger automated emergency calls. This emergency call is routed through an NG112 platform back to the Test System to measure the latency between sending the data and receiving the call. By incrementing the number of simulated sensors, the impact of the attached sensor data can be evaluated.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"85 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00087
Martin A. Schneider, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk
Mobile applications are today ubiquitous, and everybody uses them on a daily basis. This applies also to security-critical mobile applications such as online banking apps. In today's architectures, these mobile applications are usually fed from the same source as mobile applications on smart phones, i.e. web services. This makes security testing of web services inevitable. Furthermore, regulation increases and requires stronger security mechanisms as with the strong customer authentication from the Revised European Payment Services Directive (PSD2). Automated security testing is a way to cope with the increasing requirements on assuring the security of such web services and their implemented security controls whilst dealing with decreasing resources for such efforts. In this paper, we present our experiences from a case study provided by Kuveyt Türk Bank performed within the ITEA-3 project TESTOMAT where we introduced automated security testing in terms of fuzzing to complement manual security testing.
{"title":"Fuzzing of Mobile Application in the Banking Domain: a Case Study","authors":"Martin A. Schneider, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk","doi":"10.1109/QRS-C51114.2020.00087","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00087","url":null,"abstract":"Mobile applications are today ubiquitous, and everybody uses them on a daily basis. This applies also to security-critical mobile applications such as online banking apps. In today's architectures, these mobile applications are usually fed from the same source as mobile applications on smart phones, i.e. web services. This makes security testing of web services inevitable. Furthermore, regulation increases and requires stronger security mechanisms as with the strong customer authentication from the Revised European Payment Services Directive (PSD2). Automated security testing is a way to cope with the increasing requirements on assuring the security of such web services and their implemented security controls whilst dealing with decreasing resources for such efforts. In this paper, we present our experiences from a case study provided by Kuveyt Türk Bank performed within the ITEA-3 project TESTOMAT where we introduced automated security testing in terms of fuzzing to complement manual security testing.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00045
Yu Huang, Yue Chen
This is a survey of autonomous driving technologies with deep learning methods. We investigate the major fields of self-driving systems, such as perception, mapping and localization, prediction, planning and control, simulation, V2X and safety etc. Due to the limited space, we focus the analysis on several key areas, i.e. 3D object detection, depth estimation from cameras, multiple sensor fusion on the data, feature and task level respectively, behavior modelling and prediction of vehicle driving and pedestrian trajectories.
{"title":"Survey of State-of-Art Autonomous Driving Technologies with Deep Learning","authors":"Yu Huang, Yue Chen","doi":"10.1109/QRS-C51114.2020.00045","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00045","url":null,"abstract":"This is a survey of autonomous driving technologies with deep learning methods. We investigate the major fields of self-driving systems, such as perception, mapping and localization, prediction, planning and control, simulation, V2X and safety etc. Due to the limited space, we focus the analysis on several key areas, i.e. 3D object detection, depth estimation from cameras, multiple sensor fusion on the data, feature and task level respectively, behavior modelling and prediction of vehicle driving and pedestrian trajectories.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132660671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00120
I. Itkin, E. Treshcheva, Luba Konnova, Pavel Braslavski, R. Yavorskiy
We propose a hybrid technique of black-box testing of virtual assistants (VAs) in the financial sector. The specifics of the highly regulated industry imposes numerous limitations on the testing process: GDPR and other data protection requirements, the absence of interaction logs with real users, restricted access to internal data, etc. These limitations also decrease the applicability of a few VA testing methods that are widely described in the research literature. The approach suggested in this paper consists of semi-controlled interaction logging from the trained testers and subsequent augmenting the collected data for automated testing.
{"title":"Black-Box Testing of Financial Virtual Assistants","authors":"I. Itkin, E. Treshcheva, Luba Konnova, Pavel Braslavski, R. Yavorskiy","doi":"10.1109/QRS-C51114.2020.00120","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00120","url":null,"abstract":"We propose a hybrid technique of black-box testing of virtual assistants (VAs) in the financial sector. The specifics of the highly regulated industry imposes numerous limitations on the testing process: GDPR and other data protection requirements, the absence of interaction logs with real users, restricted access to internal data, etc. These limitations also decrease the applicability of a few VA testing methods that are widely described in the research literature. The approach suggested in this paper consists of semi-controlled interaction logging from the trained testers and subsequent augmenting the collected data for automated testing.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"29 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00081
S. Mao, M. Zhang, Jiaohong Yan, Yao Chen
Balanced Failure Biasing (BFB) is a way to simulate the probability of reaching a rare goal state in highly reliable Markovian systems (HRMSs). BFB gives the same probability to each ralely-arrived path of one state, therefore leading to large expenditures on paths with little influence on results. We propose a new framework using Stratified Sampling, which is a general and efficient framework for improving BFB. We introduce Stratified Sampling on BFB (SBFB), which divides the original state space into many subspaces, and rearranges the attention on each subspace. To make a further reduction on average path length, we introduce Stratified Sampling on Distance-based BFB (SBFB-D). According to experiments based on case of Workstation Cluster and case of Distributed Database System, SBFB has about 0.07% and 2.13% relative error on these two cases respectively, while SBFB-D has about 0.07% and 0.197%, comparing to standard BFB's 11.1% and 11.1%. Besides, SBFB spends about 12.30s and 28.65s on path simulation respectively, while SBFB-D spends about 13.10s and 17.40s, comparing to standard-BFB's 26.44s and 36.78s.
{"title":"A general and efficient framework for improving Balanced Failure Biasing","authors":"S. Mao, M. Zhang, Jiaohong Yan, Yao Chen","doi":"10.1109/QRS-C51114.2020.00081","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00081","url":null,"abstract":"Balanced Failure Biasing (BFB) is a way to simulate the probability of reaching a rare goal state in highly reliable Markovian systems (HRMSs). BFB gives the same probability to each ralely-arrived path of one state, therefore leading to large expenditures on paths with little influence on results. We propose a new framework using Stratified Sampling, which is a general and efficient framework for improving BFB. We introduce Stratified Sampling on BFB (SBFB), which divides the original state space into many subspaces, and rearranges the attention on each subspace. To make a further reduction on average path length, we introduce Stratified Sampling on Distance-based BFB (SBFB-D). According to experiments based on case of Workstation Cluster and case of Distributed Database System, SBFB has about 0.07% and 2.13% relative error on these two cases respectively, while SBFB-D has about 0.07% and 0.197%, comparing to standard BFB's 11.1% and 11.1%. Besides, SBFB spends about 12.30s and 28.65s on path simulation respectively, while SBFB-D spends about 13.10s and 17.40s, comparing to standard-BFB's 26.44s and 36.78s.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"63 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00040
R. Sasaki
It is necessary to evaluate the risk of Internet of Things (IoT) systems not only in terms of security and privacy but also in terms of safety. In addition, because IoT systems are distributed over a wide area, the risk evaluation should consider remote maintenance. Therefore, it is necessary to conduct risk assessment based on the maintainability, safety, security, and privacy (MSSP) concept to realize these four indices in a well-balanced manner. To this end, we proposed an enhanced method that has the function not only to clarify the magnitude of the risk before the measure but also to find an optimal combination of measure plan. As a result of applying this method and the support program named PMSSP to an under-the-sheet type medical IoT monitoring system for multiple vital signs, and we were able to specifically determine the optimal combination of measures.
{"title":"Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function","authors":"R. Sasaki","doi":"10.1109/QRS-C51114.2020.00040","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00040","url":null,"abstract":"It is necessary to evaluate the risk of Internet of Things (IoT) systems not only in terms of security and privacy but also in terms of safety. In addition, because IoT systems are distributed over a wide area, the risk evaluation should consider remote maintenance. Therefore, it is necessary to conduct risk assessment based on the maintainability, safety, security, and privacy (MSSP) concept to realize these four indices in a well-balanced manner. To this end, we proposed an enhanced method that has the function not only to clarify the magnitude of the risk before the measure but also to find an optimal combination of measure plan. As a result of applying this method and the support program named PMSSP to an under-the-sheet type medical IoT monitoring system for multiple vital signs, and we were able to specifically determine the optimal combination of measures.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}