In this paper, we describe the application of autonomous service personalisation used on a social robot in the context of health care, in particular for the elderly population. The intent is to design a framework where the robot can learn the user's preferences (likes and dislikes) over time based on facial expression as a form of feedback. By extracting emotional cues from facial expression, we can then compute the intensity of a given expression on the user and adapt the robot's services accordingly. To illustrate the application of this system, we use the case study of an emotion-aware music recommendation system.
{"title":"Robot Enabled Service Personalisation Based On Emotion Feedback","authors":"R. Khosla, K. Nguyen, Mei-Tai Chu, Yu-Ang Tan","doi":"10.1145/3007120.3007167","DOIUrl":"https://doi.org/10.1145/3007120.3007167","url":null,"abstract":"In this paper, we describe the application of autonomous service personalisation used on a social robot in the context of health care, in particular for the elderly population. The intent is to design a framework where the robot can learn the user's preferences (likes and dislikes) over time based on facial expression as a form of feedback. By extracting emotional cues from facial expression, we can then compute the intensity of a given expression on the user and adapt the robot's services accordingly. To illustrate the application of this system, we use the case study of an emotion-aware music recommendation system.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Affective computing is an up-surging research area relying on multimodal multimedia information processing techniques to study human interaction. Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life. A fight detection system finds wide applications, such as in a prison, a bar and so on. Research works on fight detection are often based on visual features and demand substantive computation and good video quality. In this paper, we propose an approach to detect fights in a natural and low cost manner through motion analysis. Most existing works evaluated their algorithms on public datasets manifesting simulated fights, where the fight events are acted by actors. To evaluate on real fight scenarios, we collect fight videos from YouTube to form our own dataset. Based on the two types of datasets, we process the motion information to achieve fight detection. Experimental results indicate that our approach accurately detect fights in real scenarios. More importantly, we uncover some fundamental differences between real and simulated fights and could discriminate them well.
{"title":"Automatic Fight Detection in Surveillance Videos","authors":"E. Fu, H. Leong, G. Ngai, S. Chan","doi":"10.1145/3007120.3007129","DOIUrl":"https://doi.org/10.1145/3007120.3007129","url":null,"abstract":"Affective computing is an up-surging research area relying on multimodal multimedia information processing techniques to study human interaction. Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life. A fight detection system finds wide applications, such as in a prison, a bar and so on. Research works on fight detection are often based on visual features and demand substantive computation and good video quality. In this paper, we propose an approach to detect fights in a natural and low cost manner through motion analysis. Most existing works evaluated their algorithms on public datasets manifesting simulated fights, where the fight events are acted by actors. To evaluate on real fight scenarios, we collect fight videos from YouTube to form our own dataset. Based on the two types of datasets, we process the motion information to achieve fight detection. Experimental results indicate that our approach accurately detect fights in real scenarios. More importantly, we uncover some fundamental differences between real and simulated fights and could discriminate them well.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.
{"title":"When Game Theory Meets VANET's Security and Privacy","authors":"Sara Bahamou, M. D. E. Ouadghiri, J. Bonnin","doi":"10.1145/3007120.3007168","DOIUrl":"https://doi.org/10.1145/3007120.3007168","url":null,"abstract":"Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryo Izuta, Kazuya Murao, T. Terada, T. Iso, H. Inamura, M. Tsukamoto
In this paper, we propose a screen unlocking system using an accelerometer and pressure sensor arrays mounted on a mobile phone as casual identification. The proposed system focuses on the user's behavioral characteristics when taking their mobile phone from their pocket and the pressure distribution when gripping the mobile phone during this motion. In the evaluation experiment, 12 out of 30 taking-out actions succeed to unlock the mobile phone screen, and our system achieved 0.43 FAR after 18 templates had been trained.
{"title":"Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket","authors":"Ryo Izuta, Kazuya Murao, T. Terada, T. Iso, H. Inamura, M. Tsukamoto","doi":"10.1145/3007120.3007162","DOIUrl":"https://doi.org/10.1145/3007120.3007162","url":null,"abstract":"In this paper, we propose a screen unlocking system using an accelerometer and pressure sensor arrays mounted on a mobile phone as casual identification. The proposed system focuses on the user's behavioral characteristics when taking their mobile phone from their pocket and the pressure distribution when gripping the mobile phone during this motion. In the evaluation experiment, 12 out of 30 taking-out actions succeed to unlock the mobile phone screen, and our system achieved 0.43 FAR after 18 templates had been trained.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124209396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The market of wearable healthcare monitoring devices has exploded in recent years as healthcare consciousness has increased. These types of devices usually consist of several biosensors, which can be worn on human bodies, such as the head, arms, and feet. The health status of a user can be analyzed according to the user's real-time vital signs that are collected from different biosensors. Due to personal medical data being transmitted through a wireless network, the data have to be encrypted. In this paper, a key agreement protocol for biosensors within Wireless Body Sensor Networks (WBSN) has been proposed based on the n-Party Diffie-Hellman key exchange protocol. In order to prevent the man-in-the-middle attacks, we have used Advance Encryption Standard (AES) encryption with Electrocardiography-based (ECG-based) keys to secure the key exchange procedures. The security and performance analysis show the feasibility of the proposed method.
{"title":"Securing Body Sensor Network with ECG","authors":"Xuechao Yang, X. Yi, I. Khalil, F. Han, Z. Tari","doi":"10.1145/3007120.3007121","DOIUrl":"https://doi.org/10.1145/3007120.3007121","url":null,"abstract":"The market of wearable healthcare monitoring devices has exploded in recent years as healthcare consciousness has increased. These types of devices usually consist of several biosensors, which can be worn on human bodies, such as the head, arms, and feet. The health status of a user can be analyzed according to the user's real-time vital signs that are collected from different biosensors. Due to personal medical data being transmitted through a wireless network, the data have to be encrypted. In this paper, a key agreement protocol for biosensors within Wireless Body Sensor Networks (WBSN) has been proposed based on the n-Party Diffie-Hellman key exchange protocol. In order to prevent the man-in-the-middle attacks, we have used Advance Encryption Standard (AES) encryption with Electrocardiography-based (ECG-based) keys to secure the key exchange procedures. The security and performance analysis show the feasibility of the proposed method.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web services are rapidly gaining acceptance as a fundamental technology in the web field. They are becoming the cutting edge of communication between the different applications all over the web. With the need for the ubiquitous computing and the pervasive use of mobile devices, the context-aware web service composition becomes a hot topic. This latter aims to adapt the web service composition behavior to the user's context such as his specific work environment, language, type of Internet connection, devices and preferences. The adaptation of previous works was carried out only at the runtime and partially covered the user's general context. In this paper, we introduce a new context-aware approach that provides a dynamic adaptation of web service composition. Our approach enables us to express requirements by taking into account the potential user's context in addition to the functional one.
{"title":"An Integrated context-aware Planning Approach to Self-Adaptation Web Service Composition","authors":"Sihem Cherif, Raoudha Ben Djemaa, Ikram Amous","doi":"10.1145/3007120.3007127","DOIUrl":"https://doi.org/10.1145/3007120.3007127","url":null,"abstract":"Web services are rapidly gaining acceptance as a fundamental technology in the web field. They are becoming the cutting edge of communication between the different applications all over the web. With the need for the ubiquitous computing and the pervasive use of mobile devices, the context-aware web service composition becomes a hot topic. This latter aims to adapt the web service composition behavior to the user's context such as his specific work environment, language, type of Internet connection, devices and preferences. The adaptation of previous works was carried out only at the runtime and partially covered the user's general context. In this paper, we introduce a new context-aware approach that provides a dynamic adaptation of web service composition. Our approach enables us to express requirements by taking into account the potential user's context in addition to the functional one.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"101 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Brun, Susan M. Ferreira, Charles Gouin-Vallerand, S. George
This paper presents a tool to transform a smartphone into a smart eyewear, named "CARTON", following a Do-It-Yourself (DIY) approach. The hardware prototype is made with very simple materials and regular tools we could find anywhere. It also includes a Software Development Kit (SDK) with samples in order to easily adapt or develop new mobile app compatible with this kind of device. By providing everything open-source and open-hardware, we intend to solve the reachability of technologies related to smart eyewear and aim to accelerate research around it. Users experiments were conducted in which participants were asked to create, by themselves, the CARTON's hardware part and perform usability tests with their own creation. Qualitative user feedback and quantitative results prove that CARTON is functional and feasible by anyone, without specific skills.
{"title":"CARTON Project: Do-It-Yourself Approach to Turn a Smartphone into a Smart Eyewear","authors":"D. Brun, Susan M. Ferreira, Charles Gouin-Vallerand, S. George","doi":"10.1145/3007120.3007134","DOIUrl":"https://doi.org/10.1145/3007120.3007134","url":null,"abstract":"This paper presents a tool to transform a smartphone into a smart eyewear, named \"CARTON\", following a Do-It-Yourself (DIY) approach. The hardware prototype is made with very simple materials and regular tools we could find anywhere. It also includes a Software Development Kit (SDK) with samples in order to easily adapt or develop new mobile app compatible with this kind of device. By providing everything open-source and open-hardware, we intend to solve the reachability of technologies related to smart eyewear and aim to accelerate research around it. Users experiments were conducted in which participants were asked to create, by themselves, the CARTON's hardware part and perform usability tests with their own creation. Qualitative user feedback and quantitative results prove that CARTON is functional and feasible by anyone, without specific skills.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132315767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
No-Reference (NR) metrics provide a mechanism to assess video quality in an ever-growing wireless network. Their low computational complexity and functional characteristics make them the primary choice when it comes to realtime content management and mobile streaming control. Unfortunately, common NR metrics suffer from poor accuracy, particularly in network-impaired video streams. In this work, we introduce a regression-based video quality metric that is simple enough for real-time computation on thin clients, and comparably as accurate as state-of-the-art Full-Reference (FR) metrics, which are functionally and computationally inviable in real-time streaming. We benchmark our metric against the FR metric VQM (Video Quality Metric), finding a very strong correlation factor.
{"title":"A Regression Method for real-time video quality evaluation","authors":"M. T. Vega, D. Mocanu, A. Liotta","doi":"10.1145/3007120.3007125","DOIUrl":"https://doi.org/10.1145/3007120.3007125","url":null,"abstract":"No-Reference (NR) metrics provide a mechanism to assess video quality in an ever-growing wireless network. Their low computational complexity and functional characteristics make them the primary choice when it comes to realtime content management and mobile streaming control. Unfortunately, common NR metrics suffer from poor accuracy, particularly in network-impaired video streams. In this work, we introduce a regression-based video quality metric that is simple enough for real-time computation on thin clients, and comparably as accurate as state-of-the-art Full-Reference (FR) metrics, which are functionally and computationally inviable in real-time streaming. We benchmark our metric against the FR metric VQM (Video Quality Metric), finding a very strong correlation factor.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Bringula, Jairus Lyndel G. Belza, Sherwin P. Belarmino, Mary Claire G. Chavez
Computing exponents is one of the most difficult mathematical topics to learn by high school students. Motivated by this concern, a mobile-based intelligent tutoring system (ITS) is being developed to assist students in learning laws of exponents. In this paper, the development and the proposed deployment of a mobile learning system for computing of exponents will be discussed. A randomized pretest-posttest control group design will be employed to determine if the mobile-based ITS is able to assist the students in learning exponents.
{"title":"Teacher AICA: A Mobile-based Intelligent Tutoring System for Laws of Exponents","authors":"R. Bringula, Jairus Lyndel G. Belza, Sherwin P. Belarmino, Mary Claire G. Chavez","doi":"10.1145/3007120.3007150","DOIUrl":"https://doi.org/10.1145/3007120.3007150","url":null,"abstract":"Computing exponents is one of the most difficult mathematical topics to learn by high school students. Motivated by this concern, a mobile-based intelligent tutoring system (ITS) is being developed to assist students in learning laws of exponents. In this paper, the development and the proposed deployment of a mobile learning system for computing of exponents will be discussed. A randomized pretest-posttest control group design will be employed to determine if the mobile-based ITS is able to assist the students in learning exponents.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125179175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soumaya Bel Hadj Youssef, S. Rekhis, N. Boudriga, A. Bagula
One of the primary tasks of wireless sensor networks (WSNs) is the collection of data from a field of interest. However, in practice, maintaining a total connectivity between sensors is not always possible, and sensors may be scattered along the sensing area, forming a set of isolated cluster of nodes that are unable to deliver the collected data. In this paper, we provide a three-layer based cloud architecture, showing the use of a network of drone quadcopters for the delivery of a Sink As A Service to terrestrial mobile sensor nodes. The set of quadcopters are in charge of coordinating their movement to collect data from terrestrial cluster heads (local data collectors) and cooperate together to relay these data to the nearest base station. As the used number of terrestrial collectors (i.e., clusters heads) has a great impact on the data delivery delay and also on the energy consumption of the quadcopters, we develop an analytical model that allows determining the optimal number of terrestrial clusters of sensors. A numerical analysis is conducted to assess the variation of the optimal values of clusters' width, delivery delay, and consumer energy, with respect to the quadcopters speed, the network throughput, and the total number of sensors.
无线传感器网络(wsn)的主要任务之一是从感兴趣的领域收集数据。然而,在实践中,传感器之间并不总是能够保持完全的连通性,传感器可能分散在传感区域,形成一组孤立的节点集群,无法传递收集到的数据。在本文中,我们提供了一个基于三层的云架构,展示了使用无人机四轴飞行器网络向地面移动传感器节点提供Sink As a Service。这组四轴飞行器负责协调它们的运动,从地面群集头(本地数据收集器)收集数据,并共同合作将这些数据中继到最近的基站。由于地面收集器(即簇头)的使用数量对数据传输延迟和四轴飞行器的能量消耗有很大影响,因此我们开发了一个分析模型,可以确定地面传感器簇的最佳数量。通过数值分析,评估了四轴飞行器速度、网络吞吐量和传感器总数对集群宽度、传输延迟和消耗能量的最优值的影响。
{"title":"A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs","authors":"Soumaya Bel Hadj Youssef, S. Rekhis, N. Boudriga, A. Bagula","doi":"10.1145/3007120.3007138","DOIUrl":"https://doi.org/10.1145/3007120.3007138","url":null,"abstract":"One of the primary tasks of wireless sensor networks (WSNs) is the collection of data from a field of interest. However, in practice, maintaining a total connectivity between sensors is not always possible, and sensors may be scattered along the sensing area, forming a set of isolated cluster of nodes that are unable to deliver the collected data. In this paper, we provide a three-layer based cloud architecture, showing the use of a network of drone quadcopters for the delivery of a Sink As A Service to terrestrial mobile sensor nodes. The set of quadcopters are in charge of coordinating their movement to collect data from terrestrial cluster heads (local data collectors) and cooperate together to relay these data to the nearest base station. As the used number of terrestrial collectors (i.e., clusters heads) has a great impact on the data delivery delay and also on the energy consumption of the quadcopters, we develop an analytical model that allows determining the optimal number of terrestrial clusters of sensors. A numerical analysis is conducted to assess the variation of the optimal values of clusters' width, delivery delay, and consumer energy, with respect to the quadcopters speed, the network throughput, and the total number of sensors.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}