Pub Date : 2018-10-01DOI: 10.1109/ictc.2018.8539728
{"title":"ICTC 2018 Committees","authors":"","doi":"10.1109/ictc.2018.8539728","DOIUrl":"https://doi.org/10.1109/ictc.2018.8539728","url":null,"abstract":"","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539398
Md. Najmul Hossain, T. Shimamura, Dayoung Kim, H. Ryu
Peak-to-average power ratio (PAPR) and out-of-band (OOB) spectrum power reduction have become challenging tasks in proper designing of power and spectrally efficient for the beyond 5th generation cellular communication systems. Power consumption in associated active devices of the power amplifier (PA) increases with large PAPR and reduction of OOB is very important for the improvement of spectrum efficiency. In this paper, a DFT (discrete Fourier transform) - Spread WR-OFDM (windowing and restructuring orthogonal frequency division multiplexing) communication system is proposed in consideration of developing reasonably acceptable future generation mobile and wireless system based on the significant reduction of both peak-to-average power ratio (PAPR) and out-of-band (OOB) power spectrum components. In our proposed system, Tukey (tapered cosine) time-domain windowing and localized subcarrier mapping have been implemented. In AWGN and multipath Rayleigh fading channels, the system performances are compared with the WR (window and restructuring) - OFDM and conventional CP (cyclic prefix) - OFDM system. Numerical results show that up to 3 dB more PAPR reduction as compared to the WR-OFDM system and out-of-band attenuation of 110 dB can be achieved at the window length of 62.
{"title":"Waveform Design of DFT-Spread WR-OFDM System for the OOB and PAPR Reduction","authors":"Md. Najmul Hossain, T. Shimamura, Dayoung Kim, H. Ryu","doi":"10.1109/ICTC.2018.8539398","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539398","url":null,"abstract":"Peak-to-average power ratio (PAPR) and out-of-band (OOB) spectrum power reduction have become challenging tasks in proper designing of power and spectrally efficient for the beyond 5th generation cellular communication systems. Power consumption in associated active devices of the power amplifier (PA) increases with large PAPR and reduction of OOB is very important for the improvement of spectrum efficiency. In this paper, a DFT (discrete Fourier transform) - Spread WR-OFDM (windowing and restructuring orthogonal frequency division multiplexing) communication system is proposed in consideration of developing reasonably acceptable future generation mobile and wireless system based on the significant reduction of both peak-to-average power ratio (PAPR) and out-of-band (OOB) power spectrum components. In our proposed system, Tukey (tapered cosine) time-domain windowing and localized subcarrier mapping have been implemented. In AWGN and multipath Rayleigh fading channels, the system performances are compared with the WR (window and restructuring) - OFDM and conventional CP (cyclic prefix) - OFDM system. Numerical results show that up to 3 dB more PAPR reduction as compared to the WR-OFDM system and out-of-band attenuation of 110 dB can be achieved at the window length of 62.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130025429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539603
Li Feng, K. Kwak, Qinghai Yang
In this paper, regarding the limited energy resource of nanomachines, we propose a dynamic resource allocation scheme including frequency selection and power control for data transmission in nano-communication networks. Firstly, in view of the properties of THz communications, notably the sensitivities to the frequency and distance on the communication path, we employ Brownian motion to describe the mobility of nanomachine and build a time-variant channel model. Then, based on the channel model and energy resource of nanomachine, we develop a stochastic optimization to maximize the channel capacity. By virtue of the Lyapunov optimization theory, the problem of stochastic optimization is converted into a series of non-convex problems for the timeslots. The non-convex problem for each timeslot is further solved via the continuity relaxation and successive approximation theories. Moreover, we obtain a dynamic capacity sub-optimal resource allocation (CoRA) algorithm to accommodate the network only according to the current energy resource information and channel state information. Simulation results validate the theoretical analysis of our scheme.
{"title":"Resource Allocation for Time-Variant Channels in the Nano-communication Networks","authors":"Li Feng, K. Kwak, Qinghai Yang","doi":"10.1109/ICTC.2018.8539603","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539603","url":null,"abstract":"In this paper, regarding the limited energy resource of nanomachines, we propose a dynamic resource allocation scheme including frequency selection and power control for data transmission in nano-communication networks. Firstly, in view of the properties of THz communications, notably the sensitivities to the frequency and distance on the communication path, we employ Brownian motion to describe the mobility of nanomachine and build a time-variant channel model. Then, based on the channel model and energy resource of nanomachine, we develop a stochastic optimization to maximize the channel capacity. By virtue of the Lyapunov optimization theory, the problem of stochastic optimization is converted into a series of non-convex problems for the timeslots. The non-convex problem for each timeslot is further solved via the continuity relaxation and successive approximation theories. Moreover, we obtain a dynamic capacity sub-optimal resource allocation (CoRA) algorithm to accommodate the network only according to the current energy resource information and channel state information. Simulation results validate the theoretical analysis of our scheme.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128956587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539727
Yong Jin, M. Tomoishi, N. Yamai
DNSSEC has been proposed to provide data origin authentication and data integrity between recursive DNS server and authoritative zone server. Although DNSSEC is an effective countermeasure to DNS cache poisoning attack, it still has low deployment rate in the Internet due to the significant workload increase on recursive DNS servers. Moreover, current DNSSEC operation does not cover end clients and the recursive DNS server separation has not been considered so that end users do not intend to use free and powerful public recursive DNS servers due to security concerns. In this paper, we propose a client based DNSSEC validation mechanism with recursive DNS server separation based on query types. DNSSEC related record types such as RRSIG, DNSKEY, DS, etc. will be forwarded to a trusted internal recursive DNS server while normal record types such as A, AAAA, MX, etc. will be forwarded to public recursive DNS server, and eventually, DNSSEC validation will be performed on end clients. Consequently, not only end clients can obtain the benefit of DNSSEC but also the workload increase of internal recursive DNS servers can be mitigated. We implemented a prototype system and evaluated the features on a local experimental network. Based on the results, we confirmed that the prototype system worked effectively and it is possible to prevent end clients from DNS cache poisoning attacks by the proposed mechanism.
{"title":"A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation","authors":"Yong Jin, M. Tomoishi, N. Yamai","doi":"10.1109/ICTC.2018.8539727","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539727","url":null,"abstract":"DNSSEC has been proposed to provide data origin authentication and data integrity between recursive DNS server and authoritative zone server. Although DNSSEC is an effective countermeasure to DNS cache poisoning attack, it still has low deployment rate in the Internet due to the significant workload increase on recursive DNS servers. Moreover, current DNSSEC operation does not cover end clients and the recursive DNS server separation has not been considered so that end users do not intend to use free and powerful public recursive DNS servers due to security concerns. In this paper, we propose a client based DNSSEC validation mechanism with recursive DNS server separation based on query types. DNSSEC related record types such as RRSIG, DNSKEY, DS, etc. will be forwarded to a trusted internal recursive DNS server while normal record types such as A, AAAA, MX, etc. will be forwarded to public recursive DNS server, and eventually, DNSSEC validation will be performed on end clients. Consequently, not only end clients can obtain the benefit of DNSSEC but also the workload increase of internal recursive DNS servers can be mitigated. We implemented a prototype system and evaluated the features on a local experimental network. Based on the results, we confirmed that the prototype system worked effectively and it is possible to prevent end clients from DNS cache poisoning attacks by the proposed mechanism.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539716
Muhammad Asim, Y. Cho
The concept of frequency reuse has been considered for underwater acoustic multicell networks due to the limited available bandwidth of acoustic channels. In the multicell network, an underwater equipment (UE) needs to detect the identity of the underwater base station (UBS) and synchronize to the serving UBS, in Doppler environments. In this paper, we propose a preamble based on linear frequency modulation (LFM) to detect the identity of UBS at the physical layer under the effect of Doppler shift. An ambiguity function (AF) of the proposed LFM-based preamble is derived to investigate its correlation property under the effect of Doppler shift.
{"title":"A Cell Detection Technique for Downlink Channel in Underwater Multicell Networks","authors":"Muhammad Asim, Y. Cho","doi":"10.1109/ICTC.2018.8539716","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539716","url":null,"abstract":"The concept of frequency reuse has been considered for underwater acoustic multicell networks due to the limited available bandwidth of acoustic channels. In the multicell network, an underwater equipment (UE) needs to detect the identity of the underwater base station (UBS) and synchronize to the serving UBS, in Doppler environments. In this paper, we propose a preamble based on linear frequency modulation (LFM) to detect the identity of UBS at the physical layer under the effect of Doppler shift. An ambiguity function (AF) of the proposed LFM-based preamble is derived to investigate its correlation property under the effect of Doppler shift.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125665906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539497
Jaehwui Bae, Youngsu Kim, N. Hur, H. Kim
In this paper, we present the study results on the possible multipath channel models for UAV(unmanned aerial vehicle) based broadcasting. In UAV based communications, the channel models consider only the path losses, the received signal strength and the conditions for Rayleigh/Ricean channel but present no multipath profiles for A2G(air-to-ground) channel, while multipath channel models in A2G channel is necessary for UAV based broadcasting to analyze reception performances. Thus according to the decision criterion of Rayleigh/Ricean channel in the UAV communication, we tried to combine approximately this criterion with DVB-T2 multipath channel models of terrestrial broadcasting. We also discussed on the preparations for the influences of yaw and tilt in UAV based broadcasting.
{"title":"Study on Air-to-Ground multipath channel and mobility influences in UAV based broadcasting","authors":"Jaehwui Bae, Youngsu Kim, N. Hur, H. Kim","doi":"10.1109/ICTC.2018.8539497","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539497","url":null,"abstract":"In this paper, we present the study results on the possible multipath channel models for UAV(unmanned aerial vehicle) based broadcasting. In UAV based communications, the channel models consider only the path losses, the received signal strength and the conditions for Rayleigh/Ricean channel but present no multipath profiles for A2G(air-to-ground) channel, while multipath channel models in A2G channel is necessary for UAV based broadcasting to analyze reception performances. Thus according to the decision criterion of Rayleigh/Ricean channel in the UAV communication, we tried to combine approximately this criterion with DVB-T2 multipath channel models of terrestrial broadcasting. We also discussed on the preparations for the influences of yaw and tilt in UAV based broadcasting.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539465
Soon-Choul Kim, H. Oh, W. Lee, Doo-Sung Baek
Network function virtualization (NFV) is well known as enabling flexible service operation and effectively reducing costs, and NFV-enabled network services will be deployed in future networks (a.k.a 5G, IoT). ATSC 3.0 broadcast has also evolved to meet next-generation IP platform network and is ready to connect with other telecommunication network industries. This paper proposes ATSC 3.0 Broadcast Gateway Virtualization System based on VNF, which can provide multiple instances to support one or more RF channels for various broadcast network environment. The proposed system enables broadcast gateways running on virtual machines to be numerically incremented and configured independently with expanding computing hardware (cpu/memory/storage) and network resources.
网络功能虚拟化(Network function virtualization, NFV)以实现灵活的业务运营和有效降低成本而闻名,未来网络(即5G、物联网)将部署NFV网络业务。ATSC 3.0广播也已发展到满足下一代IP平台网络,并准备与其他电信网络行业连接。本文提出了基于VNF的ATSC 3.0广播网关虚拟化系统,该系统可以为各种广播网络环境提供多个实例来支持一个或多个射频信道。所提出的系统使运行在虚拟机上的广播网关能够通过扩展计算硬件(cpu/内存/存储)和网络资源进行数字增量和独立配置。
{"title":"ATSC 3.0 Broadcast Gateway Virtualization System based on VNF","authors":"Soon-Choul Kim, H. Oh, W. Lee, Doo-Sung Baek","doi":"10.1109/ICTC.2018.8539465","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539465","url":null,"abstract":"Network function virtualization (NFV) is well known as enabling flexible service operation and effectively reducing costs, and NFV-enabled network services will be deployed in future networks (a.k.a 5G, IoT). ATSC 3.0 broadcast has also evolved to meet next-generation IP platform network and is ready to connect with other telecommunication network industries. This paper proposes ATSC 3.0 Broadcast Gateway Virtualization System based on VNF, which can provide multiple instances to support one or more RF channels for various broadcast network environment. The proposed system enables broadcast gateways running on virtual machines to be numerically incremented and configured independently with expanding computing hardware (cpu/memory/storage) and network resources.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126831581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539360
Wonjung Kim, Tae-Yoon Kim, Sohyun Joo, Sangheon Pack
Even though full duplex (FD) communication, which allows simultaneous transmission and reception on the same frequency channel, is a promising technology to improve the throughput in wireless local area networks (WLANs), it suffers from under-utilization when communication patterns are asymmetric. In this paper, we propose a FD-aware backoff (FD-backoff) scheme to improve the utilization in FD-WLANs. Simulation results show FD-backoff achieves increase of throughput and fairness.
{"title":"Full Duplex-Aware Backoff for Improving Channel Utilization in Full Duplex WLANs","authors":"Wonjung Kim, Tae-Yoon Kim, Sohyun Joo, Sangheon Pack","doi":"10.1109/ICTC.2018.8539360","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539360","url":null,"abstract":"Even though full duplex (FD) communication, which allows simultaneous transmission and reception on the same frequency channel, is a promising technology to improve the throughput in wireless local area networks (WLANs), it suffers from under-utilization when communication patterns are asymmetric. In this paper, we propose a FD-aware backoff (FD-backoff) scheme to improve the utilization in FD-WLANs. Simulation results show FD-backoff achieves increase of throughput and fairness.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539352
S. Khouangvichit, E. Oki, N. Kitsuwan
This paper proposes an optimization approach with providing of the probabilistic survivability guarantees to minimize the total capacity in a backup network by determining both routings in primary and backup networks, simultaneously. The backup network is designed to protect the primary network from the random multiple link failures with the probability of link failure. In a conventional approach, the routing in the primary network is not considered to be variable to minimize the total capacity in the backup network. Considering the primary routing as a variable to decide the backup network can reduce the total capacity in the backup network compared to that of the conventional approach. In the proposed approach, both routings in the primary and backup networks are considered as decision variables. Robust optimization is employed in our optimization problem to provide the probabilistic survivability guarantees for different link capacities in the primary network. Numerical results show that the proposed approach achieves lower total capacity in the backup network than that of the conventional approach.
{"title":"Minimizing Backup Capacity Considering Routings in Primary and Backup Networks for Random Multiple Link Failures","authors":"S. Khouangvichit, E. Oki, N. Kitsuwan","doi":"10.1109/ICTC.2018.8539352","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539352","url":null,"abstract":"This paper proposes an optimization approach with providing of the probabilistic survivability guarantees to minimize the total capacity in a backup network by determining both routings in primary and backup networks, simultaneously. The backup network is designed to protect the primary network from the random multiple link failures with the probability of link failure. In a conventional approach, the routing in the primary network is not considered to be variable to minimize the total capacity in the backup network. Considering the primary routing as a variable to decide the backup network can reduce the total capacity in the backup network compared to that of the conventional approach. In the proposed approach, both routings in the primary and backup networks are considered as decision variables. Robust optimization is employed in our optimization problem to provide the probabilistic survivability guarantees for different link capacities in the primary network. Numerical results show that the proposed approach achieves lower total capacity in the backup network than that of the conventional approach.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121445397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539455
Kiho Nam, Keecheon Kim
Software Defined Network (SDN) is a next-generation networking technology that transforms existing closed network environments based on individual network vendors technology into a software-based, flexible, centralized management environment that is programmable based on simplification through network abstraction. For this reason, unlike traditional networks, SDN has some strengths over some security issues. However, most of the existing network security problems and vulnerabilities exist in the SDN environment. And various attacks targeting this are occurring. This paper examines how to implement network security functions using SDN technology for these security problems. In addition, this paper proposes a structure for enhancing the security function of SDN by using existing open source IDS / IPS software Suricata.
{"title":"A Study on SDN security enhancement using open source IDS/IPS Suricata","authors":"Kiho Nam, Keecheon Kim","doi":"10.1109/ICTC.2018.8539455","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539455","url":null,"abstract":"Software Defined Network (SDN) is a next-generation networking technology that transforms existing closed network environments based on individual network vendors technology into a software-based, flexible, centralized management environment that is programmable based on simplification through network abstraction. For this reason, unlike traditional networks, SDN has some strengths over some security issues. However, most of the existing network security problems and vulnerabilities exist in the SDN environment. And various attacks targeting this are occurring. This paper examines how to implement network security functions using SDN technology for these security problems. In addition, this paper proposes a structure for enhancing the security function of SDN by using existing open source IDS / IPS software Suricata.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}