Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285883
M. Tuloli, B. Sitohang, B. Hendradjaya
As a method to measure a test case, mutation testing has become a subject of research, mostly about optimizing it using a search-based approach. At the time, there was no research about the potential obstacle of implementing a search-based approach in mutation testing. In this paper, using our previous work, we explored some alternative method to handle mutant redundancy. We use cache to improve our mutation testing tool performance, but surprisingly the cache can have other uses, to measure a search-based approach. We proposed the use of two alternative indicators to measure a search based mutation process: unique undetected mutant in population, and undetected mutant when the cache is full.
{"title":"On the implementation of search based approach to mutation testing","authors":"M. Tuloli, B. Sitohang, B. Hendradjaya","doi":"10.1109/ICODSE.2017.8285883","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285883","url":null,"abstract":"As a method to measure a test case, mutation testing has become a subject of research, mostly about optimizing it using a search-based approach. At the time, there was no research about the potential obstacle of implementing a search-based approach in mutation testing. In this paper, using our previous work, we explored some alternative method to handle mutant redundancy. We use cache to improve our mutation testing tool performance, but surprisingly the cache can have other uses, to measure a search-based approach. We proposed the use of two alternative indicators to measure a search based mutation process: unique undetected mutant in population, and undetected mutant when the cache is full.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285888
Anggy Trisnadoli, I. Lestari
The number of smartphone users in Indonesia has increased every year. This country belongs to the 4 countries most smartphone users in the world. The diversity of devices and platforms in mobile phone / smartphone creates a challenge for mobile application developers, such as context-aware features and reusability aspects, so that built applications can run on a cross-platform basis. Good quality software was built exactly to suit of its user requirement. So the mobile application developers need quality requirement as a reference. By using the quality requirement, developers will know what to follow or should be prioritized when developing application for good quality. In this research, we proposed the quality requirement that has been validated with triangulation of 3 methods of data collection such as interviews, surveys and observations. The quality requirement was obtained based on the results from a qualitative approach that identifies the functional and non-functional requirement that can be compiled and adapted to mobile applications that running on cross platforms, so developers can use them to build the them with good quality.
{"title":"Software requirement analysis of “family tracking mobile application” on cross platform with hybrid approach","authors":"Anggy Trisnadoli, I. Lestari","doi":"10.1109/ICODSE.2017.8285888","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285888","url":null,"abstract":"The number of smartphone users in Indonesia has increased every year. This country belongs to the 4 countries most smartphone users in the world. The diversity of devices and platforms in mobile phone / smartphone creates a challenge for mobile application developers, such as context-aware features and reusability aspects, so that built applications can run on a cross-platform basis. Good quality software was built exactly to suit of its user requirement. So the mobile application developers need quality requirement as a reference. By using the quality requirement, developers will know what to follow or should be prioritized when developing application for good quality. In this research, we proposed the quality requirement that has been validated with triangulation of 3 methods of data collection such as interviews, surveys and observations. The quality requirement was obtained based on the results from a qualitative approach that identifies the functional and non-functional requirement that can be compiled and adapted to mobile applications that running on cross platforms, so developers can use them to build the them with good quality.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130053616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285885
Ramandika Pranamulia, Y. Asnar, Riza Satria Perdana
Malware technology makes it difficult for malware analyst to detect same malware files with different obfuscation technique. In this paper we are trying to tackle that problem by analyzing the sequence of system call from an executable file. Malware files which actually are the same should have almost identical or at least a similar sequence of system calls. In this paper, we are going to create a model for each malware class consists of malwares from different families based on its sequence of system calls. Method/algorithm that's used in this paper is profile hidden markov model which is a very well-known tool in the biological informatics field for comparing DNA and protein sequences. Malware classes that we are going to build are trojan and worm class. Accuracy for these classes are pretty high, it's above 90% with also a high false positive rate around 37%.
{"title":"Profile hidden Markov model for malware classification — usage of system call sequence for malware classification","authors":"Ramandika Pranamulia, Y. Asnar, Riza Satria Perdana","doi":"10.1109/ICODSE.2017.8285885","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285885","url":null,"abstract":"Malware technology makes it difficult for malware analyst to detect same malware files with different obfuscation technique. In this paper we are trying to tackle that problem by analyzing the sequence of system call from an executable file. Malware files which actually are the same should have almost identical or at least a similar sequence of system calls. In this paper, we are going to create a model for each malware class consists of malwares from different families based on its sequence of system calls. Method/algorithm that's used in this paper is profile hidden markov model which is a very well-known tool in the biological informatics field for comparing DNA and protein sequences. Malware classes that we are going to build are trojan and worm class. Accuracy for these classes are pretty high, it's above 90% with also a high false positive rate around 37%.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122747234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285886
Daniel Silalahi, Y. Asnar, Riza Satria Perdana
Nowadays, most network is already protected by Intrusion Prevention System (IPS). But most of the IPS is using signature based detection techniques, whereas signature update tends to be difficult and time consuming because it requires expert knowledge in the making. Therefore, IPS signature based has a weakness in detecting latest attack. This paper present a signature-generating technique by using signature generator and honeypot. The signature generator used in this paper is Polygraph because has an advantage on detecting polymorphic worm. The honeypot used is Dionaea because the log can be converted into the forms required by Polygraph. This paper will discuss what steps are needed in transforming attack data from honeypot into a rule that can be used by IPS Snort.
{"title":"Rule generator for IPS by using honeypot to fight polymorphic worm","authors":"Daniel Silalahi, Y. Asnar, Riza Satria Perdana","doi":"10.1109/ICODSE.2017.8285886","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285886","url":null,"abstract":"Nowadays, most network is already protected by Intrusion Prevention System (IPS). But most of the IPS is using signature based detection techniques, whereas signature update tends to be difficult and time consuming because it requires expert knowledge in the making. Therefore, IPS signature based has a weakness in detecting latest attack. This paper present a signature-generating technique by using signature generator and honeypot. The signature generator used in this paper is Polygraph because has an advantage on detecting polymorphic worm. The honeypot used is Dionaea because the log can be converted into the forms required by Polygraph. This paper will discuss what steps are needed in transforming attack data from honeypot into a rule that can be used by IPS Snort.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285889
Feryandi Nurdiantoro, Y. Asnar, T. E. Widagdo
Spreadsheet is one of types application that commonly used for various usages including data collection. Using spreadsheet has several advantages over other types of data collection applications (e.g., web-based form, e-form, manual form). The most visible advantage is that many people know how to use spreadsheet. In addition, spreadsheet has many features and capabilities related to data analysis and processing. Therefore, spreadsheet is often the primary choice in collecting and processing data. However, using spreadsheet as data collector, has several problems, such lack of support for: collaboration, input validation, and data retention. By creating an additional tool within the spreadsheet, we could propose a new means to collect the data using spreadsheet format and yet simpler and more efficient and effective.
{"title":"The development of data collection tool on spreadsheet format","authors":"Feryandi Nurdiantoro, Y. Asnar, T. E. Widagdo","doi":"10.1109/ICODSE.2017.8285889","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285889","url":null,"abstract":"Spreadsheet is one of types application that commonly used for various usages including data collection. Using spreadsheet has several advantages over other types of data collection applications (e.g., web-based form, e-form, manual form). The most visible advantage is that many people know how to use spreadsheet. In addition, spreadsheet has many features and capabilities related to data analysis and processing. Therefore, spreadsheet is often the primary choice in collecting and processing data. However, using spreadsheet as data collector, has several problems, such lack of support for: collaboration, input validation, and data retention. By creating an additional tool within the spreadsheet, we could propose a new means to collect the data using spreadsheet format and yet simpler and more efficient and effective.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128224273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285848
Venny Larasati Ayudiani, Saiful Akbar
Spatial clustering dealt with the clustering of spatial objects so that the objects with higher similarity is grouped together in a cluster. It has been applied among numerous fields with various approaches and methods. Some tools and libraries capable of doing spatial clustering analysis have been developed. However, those tools typically only implement a specific approach. In this paper, we propose a user-friendly analysis tool that can facilitate various approaches and methods to conduct spatial clustering analysis. Moreover, we take into account the extensibility factor of the analysis tool which allows integration of new algorithms to be done.
{"title":"An extensible tool for spatial clustering","authors":"Venny Larasati Ayudiani, Saiful Akbar","doi":"10.1109/ICODSE.2017.8285848","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285848","url":null,"abstract":"Spatial clustering dealt with the clustering of spatial objects so that the objects with higher similarity is grouped together in a cluster. It has been applied among numerous fields with various approaches and methods. Some tools and libraries capable of doing spatial clustering analysis have been developed. However, those tools typically only implement a specific approach. In this paper, we propose a user-friendly analysis tool that can facilitate various approaches and methods to conduct spatial clustering analysis. Moreover, we take into account the extensibility factor of the analysis tool which allows integration of new algorithms to be done.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285852
Jacqueline Ibrahim, D. Lestari
This paper explains classification using Support Vector Machines (SVM) technique and clustering using K-means technique in identifying eight spoken dialects in Indonesian language. Dialect identification is important to build a better Automatic Speech Recognition system. The experiment in this research is divided into using three features of sound; Mel Frequency Cepstral Coefficient (MFCC), spectral flux, and spectral centroid, and compares it to model with MFCC features only. For methods, it uses one-against-one and all-at-once as comparison. The best result is from using SVM one-against-one with three features which gives 55%.
{"title":"Classification and clustering to identify spoken dialects in Indonesian","authors":"Jacqueline Ibrahim, D. Lestari","doi":"10.1109/ICODSE.2017.8285852","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285852","url":null,"abstract":"This paper explains classification using Support Vector Machines (SVM) technique and clustering using K-means technique in identifying eight spoken dialects in Indonesian language. Dialect identification is important to build a better Automatic Speech Recognition system. The experiment in this research is divided into using three features of sound; Mel Frequency Cepstral Coefficient (MFCC), spectral flux, and spectral centroid, and compares it to model with MFCC features only. For methods, it uses one-against-one and all-at-once as comparison. The best result is from using SVM one-against-one with three features which gives 55%.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134600000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285882
Muhammad Rian Fakhrusy, Yani Widyani
This paper describes the development of Moodle plugins to generate quiz using Genetic Algorithm. Moodle is an open source learning management system. One of its features is to generate a quiz consisting random questions which is chosen form question bank. If the quiz is created randomly, it can't accommodate specific constraints. Genetic algorithm provides an opportunity to generate quiz which approximate the constraints. Our research follows previous researches done by Xiaoqin & Yin (2009) and Huang & Wang (2008), modifies them to be applied in the development of Moodle quiz generation plugins. Several attributes which are selected from previous researches, are augmented to the each question in question bank. The generated quiz is also augmented by corresponding attributes. Quiz generator needs constraints as input. Genetic algorithm will generate a quiz whose attributes approximate the constraints. The generated quiz can be used in tests after this step. At the moment, there is no option of using genetic algorithm for quiz generation in Moodle. The plugins consist of one main quiz plugin and several question type plugins. The main quiz plugin was developed so that genetic algorithm can be used in quiz generation. Meanwhile, several question type plugins were developed to provide augmented questions which quiz plugin is going to use. These plugins have been successfully implemented and integrated to Moodle.
{"title":"Moodle plugins for quiz generation using genetic algorithm","authors":"Muhammad Rian Fakhrusy, Yani Widyani","doi":"10.1109/ICODSE.2017.8285882","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285882","url":null,"abstract":"This paper describes the development of Moodle plugins to generate quiz using Genetic Algorithm. Moodle is an open source learning management system. One of its features is to generate a quiz consisting random questions which is chosen form question bank. If the quiz is created randomly, it can't accommodate specific constraints. Genetic algorithm provides an opportunity to generate quiz which approximate the constraints. Our research follows previous researches done by Xiaoqin & Yin (2009) and Huang & Wang (2008), modifies them to be applied in the development of Moodle quiz generation plugins. Several attributes which are selected from previous researches, are augmented to the each question in question bank. The generated quiz is also augmented by corresponding attributes. Quiz generator needs constraints as input. Genetic algorithm will generate a quiz whose attributes approximate the constraints. The generated quiz can be used in tests after this step. At the moment, there is no option of using genetic algorithm for quiz generation in Moodle. The plugins consist of one main quiz plugin and several question type plugins. The main quiz plugin was developed so that genetic algorithm can be used in quiz generation. Meanwhile, several question type plugins were developed to provide augmented questions which quiz plugin is going to use. These plugins have been successfully implemented and integrated to Moodle.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285879
Y. Y. Wibisono, R. Govindaraju, D. Irianto, I. Sudirman
Information technology (IT) is one of the most outsourced functions by many companies in the world. Outsourcing does not only involve two companies from the same countries, but also from the different countries that is called as offshore outsourcing. There are critical success factors for dealing with outsourcing and one of them is related to relationship management between provider and client. Therefore to achieve the success of offshore IT outsourcing requires both sides to have good interaction quality. This paper will investigate the influence of interaction quality on outsourcing success from the perspective of IT provider. After a deep related literature review, the model of interaction quality is brought forward. The model consists of interaction quality as a predictor of the outsourcing success. Interaction quality includes inter-organizational information exchange, coordination, and participation. We use the Partial Least Squares — Structural Equation Modeling (PLS-SEM) to validate the proposed model with survey data of Indonesian IT providers. The result shows that interaction quality has a strong impact on outsourcing success. Information exchange has a strong impact on coordination and a moderate impact on participation. Participation has a low influence on coordination.
{"title":"Interaction quality and the influence on offshore IT outsourcing success","authors":"Y. Y. Wibisono, R. Govindaraju, D. Irianto, I. Sudirman","doi":"10.1109/ICODSE.2017.8285879","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285879","url":null,"abstract":"Information technology (IT) is one of the most outsourced functions by many companies in the world. Outsourcing does not only involve two companies from the same countries, but also from the different countries that is called as offshore outsourcing. There are critical success factors for dealing with outsourcing and one of them is related to relationship management between provider and client. Therefore to achieve the success of offshore IT outsourcing requires both sides to have good interaction quality. This paper will investigate the influence of interaction quality on outsourcing success from the perspective of IT provider. After a deep related literature review, the model of interaction quality is brought forward. The model consists of interaction quality as a predictor of the outsourcing success. Interaction quality includes inter-organizational information exchange, coordination, and participation. We use the Partial Least Squares — Structural Equation Modeling (PLS-SEM) to validate the proposed model with survey data of Indonesian IT providers. The result shows that interaction quality has a strong impact on outsourcing success. Information exchange has a strong impact on coordination and a moderate impact on participation. Participation has a low influence on coordination.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICODSE.2017.8285849
Ali Ibrahim, Ermatita, Saparudin, Zefta Adetya
Developments of Technology are currently expanding rapidly, CRM technology has evolved into social CRM or CRM 2.0 utilizing from web 2.0. Social. Big social data is data derived from the activities of social network users. In the benefits of implementation of CRM, the process of validating data in analyzing the selected social media becomes a matter of concern. Because one of important in the implementation of social CRM is data. Therefore the goal of the research is to show result research in social CRM currently with comparing to see problem currently and giving the solution, furthermore describing opportunities social CRM for a company, government and all people which use technology to promote something to other people (customer). The characteristics of each social network need to be reviewed to the user. Social CRM is closely related to the behavior performed by the customer (social network users). Behavior and conditions in social media greatly affect the results to be achieved. Validating data from the result of analysis data is important to make result from implementation of social CRM can be better.
{"title":"Analysis of weakness of data validation from social CRM","authors":"Ali Ibrahim, Ermatita, Saparudin, Zefta Adetya","doi":"10.1109/ICODSE.2017.8285849","DOIUrl":"https://doi.org/10.1109/ICODSE.2017.8285849","url":null,"abstract":"Developments of Technology are currently expanding rapidly, CRM technology has evolved into social CRM or CRM 2.0 utilizing from web 2.0. Social. Big social data is data derived from the activities of social network users. In the benefits of implementation of CRM, the process of validating data in analyzing the selected social media becomes a matter of concern. Because one of important in the implementation of social CRM is data. Therefore the goal of the research is to show result research in social CRM currently with comparing to see problem currently and giving the solution, furthermore describing opportunities social CRM for a company, government and all people which use technology to promote something to other people (customer). The characteristics of each social network need to be reviewed to the user. Social CRM is closely related to the behavior performed by the customer (social network users). Behavior and conditions in social media greatly affect the results to be achieved. Validating data from the result of analysis data is important to make result from implementation of social CRM can be better.","PeriodicalId":366005,"journal":{"name":"2017 International Conference on Data and Software Engineering (ICoDSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}