Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905635
Moussa El Yahyaoui, A. E. Moussati
60 GHz suffers from high free space loss which limits the area coverage to few meters. The increasing demand of large area coverage and high broadband wireless connection make Radio over Fiber (RoF) and Multiple Input and Multiple Output (MIMO) antennas a promising solution. In order to combine these technologies, we have proposed in this paper a 2×2 MIMO RoF architecture at 60 GHz. The MIMO system based on spatial diversity is used to increase the spectrum efficiency, and we used the entire 7 GHz bandwidth of unlicensed millimeter band in order to achieve higher data rate. The performances of the system are analyzed by Error Vector Magnitude (EVM) and Bit Error Rate (BER) metrics. The 2×2 MIMO RoF system achieved 35 Gb/s of data rates with BER of 10−3 over 25 km SMF transmission followed by 5 m wireless transmission.
60 GHz的自由空间损耗很大,这限制了它的覆盖范围只有几米。随着对大面积覆盖和高宽带无线连接需求的不断增长,光纤无线电(RoF)和多输入多输出(MIMO)天线成为一种很有前途的解决方案。为了将这些技术结合起来,本文提出了一种60ghz的2×2 MIMO RoF架构。为了提高频谱效率,采用了基于空间分集的MIMO系统,为了实现更高的数据速率,我们利用了免授权毫米频段的整个7 GHz带宽。通过误差矢量幅度(EVM)和误码率(BER)指标分析了系统的性能。2×2 MIMO RoF系统在25公里SMF传输和5米无线传输中实现了35 Gb/s的数据速率和10−3的误码率。
{"title":"2×2 MIMO spatial diversity for Radio over Fiber system at 60 GHz using TSV model","authors":"Moussa El Yahyaoui, A. E. Moussati","doi":"10.1109/ICMCS.2016.7905635","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905635","url":null,"abstract":"60 GHz suffers from high free space loss which limits the area coverage to few meters. The increasing demand of large area coverage and high broadband wireless connection make Radio over Fiber (RoF) and Multiple Input and Multiple Output (MIMO) antennas a promising solution. In order to combine these technologies, we have proposed in this paper a 2×2 MIMO RoF architecture at 60 GHz. The MIMO system based on spatial diversity is used to increase the spectrum efficiency, and we used the entire 7 GHz bandwidth of unlicensed millimeter band in order to achieve higher data rate. The performances of the system are analyzed by Error Vector Magnitude (EVM) and Bit Error Rate (BER) metrics. The 2×2 MIMO RoF system achieved 35 Gb/s of data rates with BER of 10−3 over 25 km SMF transmission followed by 5 m wireless transmission.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/ICMCS.2014.6911403
A. Touati, E. Abdelmounim, M. Aboulfatah, A. Abouloifa
{"title":"Observation and control of a single-phase DC-AC converter with sliding mode","authors":"A. Touati, E. Abdelmounim, M. Aboulfatah, A. Abouloifa","doi":"10.1109/ICMCS.2014.6911403","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911403","url":null,"abstract":"","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127532603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/ICMCS.2014.6911255
B. Youssef
In this paper, we apply a previously developed computational model for the growth of multicellular tissues using a discrete approach based on cellular automata to simulate the tissue growth rates and visualize the spatial patterns of three populations of proliferating and migrating cells. We use the obtained 3-D time-varying data to visualize the generated spatial patterns of the simulated grown tissue. We then briefly compare the tissue growth rates for two seeding modes, mixed and segmented, using a uniform cell distribution. Slow, moderate, and fast moving cells are utilized with each cell population having its own division characteristics. Our visualization results show that the placement of fast cells may impact not only the tissue growth rate but also the spatial characteristics of the grown tissue pattern. The developed computational model contains a number of system parameters that allow us to explore their effects on many other aspects of cell behavior as well as to study the temporal dynamics of such a complex system.
{"title":"Visualization of spatial patterns of cells using a 3-D simulation model for multicellular tissue growth","authors":"B. Youssef","doi":"10.1109/ICMCS.2014.6911255","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911255","url":null,"abstract":"In this paper, we apply a previously developed computational model for the growth of multicellular tissues using a discrete approach based on cellular automata to simulate the tissue growth rates and visualize the spatial patterns of three populations of proliferating and migrating cells. We use the obtained 3-D time-varying data to visualize the generated spatial patterns of the simulated grown tissue. We then briefly compare the tissue growth rates for two seeding modes, mixed and segmented, using a uniform cell distribution. Slow, moderate, and fast moving cells are utilized with each cell population having its own division characteristics. Our visualization results show that the placement of fast cells may impact not only the tissue growth rate but also the spatial characteristics of the grown tissue pattern. The developed computational model contains a number of system parameters that allow us to explore their effects on many other aspects of cell behavior as well as to study the temporal dynamics of such a complex system.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122137614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/ICMCS.2014.6911193
Abdelaziz Amara Korba, Mehdi Nafaa, S. Ghanemi
An ad hoc network is a collection of mobile devices that communicate in a self-organized way using wireless network interfaces without neither centralized administration nor fixed infrastructure. In such a network, nodes must cooperate with each other so as to extend their transmission range to reach distant nodes. This cooperation requires a specific ad hoc routing protocol to establish and maintain routes between nodes. Ad hoc routing protocols are based on mutual trust between collaborating nodes and suppose a correct behavior. As a result, these networks are particularly vulnerable to various security threats. , and therefore, security is a more significant issue than infrastructure-based wireless networks. In this paper, we present security analysis of the Ad hoc On-demand Distance Vector (AODV) routing protocol to identify all possible security threats that can target its algorithm, such as resources depletion, blackhole, wormhole and rushing attacks. Keywords—MANET; AODV; security attacks; malicious node;
{"title":"Analysis of security attacks in AODV","authors":"Abdelaziz Amara Korba, Mehdi Nafaa, S. Ghanemi","doi":"10.1109/ICMCS.2014.6911193","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911193","url":null,"abstract":"An ad hoc network is a collection of mobile devices that communicate in a self-organized way using wireless network interfaces without neither centralized administration nor fixed infrastructure. In such a network, nodes must cooperate with each other so as to extend their transmission range to reach distant nodes. This cooperation requires a specific ad hoc routing protocol to establish and maintain routes between nodes. Ad hoc routing protocols are based on mutual trust between collaborating nodes and suppose a correct behavior. As a result, these networks are particularly vulnerable to various security threats. , and therefore, security is a more significant issue than infrastructure-based wireless networks. In this paper, we present security analysis of the Ad hoc On-demand Distance Vector (AODV) routing protocol to identify all possible security threats that can target its algorithm, such as resources depletion, blackhole, wormhole and rushing attacks. Keywords—MANET; AODV; security attacks; malicious node;","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"127 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/ICMCS.2014.6911146
I. E. Khalkhali
With today's world population increasing, the people's trend to study is rapidly growing, education environments are changing and universities are looking to reach more and more students. The need of new learning method becomes really necessary to facilitate today's students learning and educational trends.The growth of the internet and its impact on education system has created a new learning model called e-learning that is considered as a new revolution in the world of education. This paper describes an experiment made at the National Business School of Tangier. This experience aims to investigate student's perceptions towards the usage of an e-learning platform through a survey which was conducted in semester 1 of session 2012/2013.
{"title":"The use of DOKEOS e-learning platform in a Moroccan Business School","authors":"I. E. Khalkhali","doi":"10.1109/ICMCS.2014.6911146","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911146","url":null,"abstract":"With today's world population increasing, the people's trend to study is rapidly growing, education environments are changing and universities are looking to reach more and more students. The need of new learning method becomes really necessary to facilitate today's students learning and educational trends.The growth of the internet and its impact on education system has created a new learning model called e-learning that is considered as a new revolution in the world of education. This paper describes an experiment made at the National Business School of Tangier. This experience aims to investigate student's perceptions towards the usage of an e-learning platform through a survey which was conducted in semester 1 of session 2012/2013.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130854167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1998-06-28DOI: 10.1109/ICMCS.1998.10000
M. Das, S. Liou
Video organization is a key step in the content-based indexing of video archives. The objective of video organization is to capture the semantic structure of a video in a form which is meaningful to the user. We present a hybrid approach to video organization which automatically processes video, creating a video table of contents (VTOC), while providing easy-to-use interfaces for verification, correction and augmentation of the automatically extracted video structure. Algorithms are developed to solve the sub-problems of shot detection, shot grouping and VTOC generation without making very restrictive assumptions about the structure or content of the video. We use a nonstationary time series model of difference metrics for shot boundary detection, color and edge similarities for shot grouping and observations about the structure of a wide class of videos for the generation of the VTOC. The use of automatic processing in conjunction with input from the user allows us to produce meaningful video organization efficiently.
{"title":"A New Hybrid Approach to Video Organization for Content-Based Indexing","authors":"M. Das, S. Liou","doi":"10.1109/ICMCS.1998.10000","DOIUrl":"https://doi.org/10.1109/ICMCS.1998.10000","url":null,"abstract":"Video organization is a key step in the content-based indexing of video archives. The objective of video organization is to capture the semantic structure of a video in a form which is meaningful to the user. We present a hybrid approach to video organization which automatically processes video, creating a video table of contents (VTOC), while providing easy-to-use interfaces for verification, correction and augmentation of the automatically extracted video structure. Algorithms are developed to solve the sub-problems of shot detection, shot grouping and VTOC generation without making very restrictive assumptions about the structure or content of the video. We use a nonstationary time series model of difference metrics for shot boundary detection, color and edge similarities for shot grouping and observations about the structure of a wide class of videos for the generation of the VTOC. The use of automatic processing in conjunction with input from the user allows us to produce meaningful video organization efficiently.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117137913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICMCS.2014.6911256
Essaid El Haji, Abdellah Az Mani, M. E. Harzli
This paper presents the design of a multi-expert system to help in educational and vocational guidance by using a multi-agent approach. This approach, which is at the connection of several areas, especially artificial intelligence, seeks to distribute a problem on a set of entities called agents that communicate with each other to coordinate their behavior and cooperate to solve a problem. The problem to be dealt with in this article is that of educational and career guidance where different types of knowledge come from four sources: pedagogical expert, psychological expert, sociological expert and economic expert. In addition to the four mentioned experts, other two experts are added which are a coaching expert and the system supervisor. The latter, that organizes tasks between agents, is considered as expert in the sense that he has its own database of rules. Such a system is a tool for decision support that allows students and job seekers to build their professional projects while taking into account the various factors involved in the process of educational and vocational guidance.
{"title":"Expert system design for educational and vocational guidance, using a multi-agent system","authors":"Essaid El Haji, Abdellah Az Mani, M. E. Harzli","doi":"10.1109/ICMCS.2014.6911256","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911256","url":null,"abstract":"This paper presents the design of a multi-expert system to help in educational and vocational guidance by using a multi-agent approach. This approach, which is at the connection of several areas, especially artificial intelligence, seeks to distribute a problem on a set of entities called agents that communicate with each other to coordinate their behavior and cooperate to solve a problem. The problem to be dealt with in this article is that of educational and career guidance where different types of knowledge come from four sources: pedagogical expert, psychological expert, sociological expert and economic expert. In addition to the four mentioned experts, other two experts are added which are a coaching expert and the system supervisor. The latter, that organizes tasks between agents, is considered as expert in the sense that he has its own database of rules. Such a system is a tool for decision support that allows students and job seekers to build their professional projects while taking into account the various factors involved in the process of educational and vocational guidance.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICMCS.2012.6320200
Nabiha Azizi, N. Farah
Arabic Pattern recognition can be regarded as a problem of classification, where different patterns are presented and be needed to classify into specified classes. One way to improve the recognition rates of pattern recognition tasks is to improve the accuracy of individual classifiers, and another is to apply ensemble of classifiers methods. The advantage of dynamic ensemble selection vs dynamic classifier selection is that we distribute the risk of this over-generalization by choosing a group of classifiers instead of one individual classifier for a test pattern. In this paper we propose a new approach for Arabic handwriting recognition based on dynamic selection of ensembles of classifiers. Our DECS-LA algorithm (Dynamic Ensemble of Classifiers Selection by Local accuracy) chooses the most confident ensemble of classifiers to label each test sample dynamically. Such a level of confidence is measured by calculating the proposed local reliability measure using confusion matrixes constructed during training level. After validation with voting and weighted voting and ten different classifiers, we show experimentally that choosing classifier ensembles dynamically taking into account the behavior classifier during test level by L-Reliability measure leads to increase recognition rate for Arabic Handwritten recognition system.
{"title":"New Dynamic Ensemble of Classifiers Selection approach based on confusion matrix for Arabic Handwritten recognition","authors":"Nabiha Azizi, N. Farah","doi":"10.1109/ICMCS.2012.6320200","DOIUrl":"https://doi.org/10.1109/ICMCS.2012.6320200","url":null,"abstract":"Arabic Pattern recognition can be regarded as a problem of classification, where different patterns are presented and be needed to classify into specified classes. One way to improve the recognition rates of pattern recognition tasks is to improve the accuracy of individual classifiers, and another is to apply ensemble of classifiers methods. The advantage of dynamic ensemble selection vs dynamic classifier selection is that we distribute the risk of this over-generalization by choosing a group of classifiers instead of one individual classifier for a test pattern. In this paper we propose a new approach for Arabic handwriting recognition based on dynamic selection of ensembles of classifiers. Our DECS-LA algorithm (Dynamic Ensemble of Classifiers Selection by Local accuracy) chooses the most confident ensemble of classifiers to label each test sample dynamically. Such a level of confidence is measured by calculating the proposed local reliability measure using confusion matrixes constructed during training level. After validation with voting and weighted voting and ten different classifiers, we show experimentally that choosing classifier ensembles dynamically taking into account the behavior classifier during test level by L-Reliability measure leads to increase recognition rate for Arabic Handwritten recognition system.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICMCS.2014.6911244
B. Jerman-Blazic
This paper briefly presents the efforts of several research teams that are working on the design and the implementation the largest world infrastructure for secure eID authentication enabling cross - border use of e-services such as e-learning, e-health, e-banking, e-business, e-procurement and e-justice in the European single market. The paper introduces the basic characteristics of the system, the quality assurance levels required for the eID services, the approach taken in the design of the business model and the problem of the service pricing. The paper concludes with a brief overview of the results obtained from the user survey regarding the expected adoption of the service and its take off.
{"title":"Designing a large cross-border secured eID service for e-government and e-business","authors":"B. Jerman-Blazic","doi":"10.1109/ICMCS.2014.6911244","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911244","url":null,"abstract":"This paper briefly presents the efforts of several research teams that are working on the design and the implementation the largest world infrastructure for secure eID authentication enabling cross - border use of e-services such as e-learning, e-health, e-banking, e-business, e-procurement and e-justice in the European single market. The paper introduces the basic characteristics of the system, the quality assurance levels required for the eID services, the approach taken in the design of the business model and the problem of the service pricing. The paper concludes with a brief overview of the results obtained from the user survey regarding the expected adoption of the service and its take off.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117126481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICMCS.2012.6320237
S. Yousfi, S. Derrode, R. Robbana
Coercion resistance is the most effective property to fight coercive attacks in Internet elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES 2005 together with a voting protocol that satisfies such a stringent security requirement. Unfortunately, their scheme has a quadratic complexity (the overhead for tallying authorities is quadratic in the number of votes) and would therefore not be suitable for large scale elections. Then the factor of complexity is very important to practice a voting system on large scale elections. Another drawback of this scheme, is that the mixnet deals Ballots which contain a fake credential. Adding the electronic watermarking on the Ballots could reduce the number of operations in the computing phase. The similarity between valid and fake watermarked ballots and the removal of fake watermarked ones, can reduce the number of Ballots in Input of mixnet. We can use the algorithm proposed by Walton in JCJ scheme to ensure integrity of Ballot and specifically the property of coercion resistance. The scheme of JCJ could be practical if we use watermarking and reduce complexity of computing.
{"title":"Watermarking in e-voting for large scale election","authors":"S. Yousfi, S. Derrode, R. Robbana","doi":"10.1109/ICMCS.2012.6320237","DOIUrl":"https://doi.org/10.1109/ICMCS.2012.6320237","url":null,"abstract":"Coercion resistance is the most effective property to fight coercive attacks in Internet elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES 2005 together with a voting protocol that satisfies such a stringent security requirement. Unfortunately, their scheme has a quadratic complexity (the overhead for tallying authorities is quadratic in the number of votes) and would therefore not be suitable for large scale elections. Then the factor of complexity is very important to practice a voting system on large scale elections. Another drawback of this scheme, is that the mixnet deals Ballots which contain a fake credential. Adding the electronic watermarking on the Ballots could reduce the number of operations in the computing phase. The similarity between valid and fake watermarked ballots and the removal of fake watermarked ones, can reduce the number of Ballots in Input of mixnet. We can use the algorithm proposed by Walton in JCJ scheme to ensure integrity of Ballot and specifically the property of coercion resistance. The scheme of JCJ could be practical if we use watermarking and reduce complexity of computing.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114297624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}