Clock synchronization in a wireless sensor network (WSN) is quite essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using a contention-based scheme for media access, like carrier sense multiple access (CSMA). The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions. In such a situation, there are chances of collisions, and hence, message losses, which, in turn, affects the convergence of the synchronization algorithms. However, the number of collisions can be reduced with a frame based approach like time division multiple access (TDMA) for message passing. In this paper, we propose a design to utilize TDMA-based media access and control (MAC) protocol for the performance improvement of clock synchronization protocols. The basic idea is to use TDMA-based transmissions when the degree of synchronization improves among the sensor nodes during the execution of the clock synchronization algorithm. The design significantly reduces the collisions among the synchronization protocol messages. We have simulated the proposed protocol in Castalia network simulator. The simulation results show that the proposed protocol significantly reduces the time required for synchronization and also improves the accuracy of the synchronization algorithm.
{"title":"A Design for Performance Improvement of Clock Synchronization in WSNs Using a TDMA-Based MAC Protocol","authors":"Siddharth Watwe, Ashutosh Bhatia, R. Hansdah","doi":"10.1109/WAINA.2014.64","DOIUrl":"https://doi.org/10.1109/WAINA.2014.64","url":null,"abstract":"Clock synchronization in a wireless sensor network (WSN) is quite essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using a contention-based scheme for media access, like carrier sense multiple access (CSMA). The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions. In such a situation, there are chances of collisions, and hence, message losses, which, in turn, affects the convergence of the synchronization algorithms. However, the number of collisions can be reduced with a frame based approach like time division multiple access (TDMA) for message passing. In this paper, we propose a design to utilize TDMA-based media access and control (MAC) protocol for the performance improvement of clock synchronization protocols. The basic idea is to use TDMA-based transmissions when the degree of synchronization improves among the sensor nodes during the execution of the clock synchronization algorithm. The design significantly reduces the collisions among the synchronization protocol messages. We have simulated the proposed protocol in Castalia network simulator. The simulation results show that the proposed protocol significantly reduces the time required for synchronization and also improves the accuracy of the synchronization algorithm.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel distributed line outage detection algorithm was developed in this paper through convex relaxation and alternating direction method of multipliers (ADMM) method for smart grid system. The devised approach allows identification of multiple line outages using limited number of PMU measurements. The diagnosis procedure is performed close to the place where PMU measurements are collected and only partial variable estimates are exchanged among the neighbours of processors. It is shown that the proposed method outperforms the existing methods, which are either suffering from computational complexity or security and privacy issues. Numerical tests demonstrated the merits of the proposed schemes in co-ordinately figuring out multiple line outages in the system.
{"title":"Monitoring for Power-Line Change and Outage Detection in Smart Grid via the Alternating Direction Method of Multipliers","authors":"Liang Zhao, Wenzhan Song, L. Tong, Yuan Wu","doi":"10.1109/WAINA.2014.60","DOIUrl":"https://doi.org/10.1109/WAINA.2014.60","url":null,"abstract":"A novel distributed line outage detection algorithm was developed in this paper through convex relaxation and alternating direction method of multipliers (ADMM) method for smart grid system. The devised approach allows identification of multiple line outages using limited number of PMU measurements. The diagnosis procedure is performed close to the place where PMU measurements are collected and only partial variable estimates are exchanged among the neighbours of processors. It is shown that the proposed method outperforms the existing methods, which are either suffering from computational complexity or security and privacy issues. Numerical tests demonstrated the merits of the proposed schemes in co-ordinately figuring out multiple line outages in the system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We have been developing and operating safety confirmation systems for universities since 1999. The Great East Japan Earthquake in 2011 clarified some issues related to the safety confirmation systems. Thereby, we reviewed the safety confirmation systems, the result of which revealed that more carefully selected functionality, restriction on the volume of communication, and enhanced anti-disaster feature of the systems would be required. We have then developed the light-weight safety confirmation system that does not have the function to simultaneously transmit mass emails and is designed for easier system migration. Evaluation was conducted by performing demonstration experiments of the newly developed safety confirmation at a disaster prevention drill of a university.
{"title":"Light-Weight Safety Confirmation System for Large-Scale Disasters","authors":"Hiroaki Yuze, S. Nabeta, M. Izumi","doi":"10.1109/WAINA.2014.97","DOIUrl":"https://doi.org/10.1109/WAINA.2014.97","url":null,"abstract":"We have been developing and operating safety confirmation systems for universities since 1999. The Great East Japan Earthquake in 2011 clarified some issues related to the safety confirmation systems. Thereby, we reviewed the safety confirmation systems, the result of which revealed that more carefully selected functionality, restriction on the volume of communication, and enhanced anti-disaster feature of the systems would be required. We have then developed the light-weight safety confirmation system that does not have the function to simultaneously transmit mass emails and is designed for easier system migration. Evaluation was conducted by performing demonstration experiments of the newly developed safety confirmation at a disaster prevention drill of a university.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When we discuss operability and convenience of remote control robot systems, it was usual to focus on user interfaces to operate robots. In this paper, we propose to improve methods of service providing based on the different operation types, e.g. Operation which requires real time response, operation which allows delay between user operation and robot movement via networks.
{"title":"A Virtual Campus Tour Service Using Mobile Robots","authors":"M. Fujita, Y. Tokiwa, Osamu Ohashi, Y. Kato","doi":"10.1109/WAINA.2014.55","DOIUrl":"https://doi.org/10.1109/WAINA.2014.55","url":null,"abstract":"When we discuss operability and convenience of remote control robot systems, it was usual to focus on user interfaces to operate robots. In this paper, we propose to improve methods of service providing based on the different operation types, e.g. Operation which requires real time response, operation which allows delay between user operation and robot movement via networks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Defining and describing a context requires knowledge (contextual information), while research is addressing a wider range of potential contextual information in a diverse range of domains the diversity of potential contextual information has not been effectively addressed. This paper considers the implementation of context and identifies emotion (more accurately emotional response) as a factor in the personalization of services as under-represented in the literature. We propose semantic valence modeling implemented in fuzzy rule-based systems as a potential solution to the implementation of emotional responses in context-aware systems. It is concluded that the effective implementation of emotional responses based on the posited approach will improve the accuracy of personalized service provision and additionally offers the potential to improve the levels of computational intelligence in context-aware domains and systems.
{"title":"Semantic Valence Modeling: Emotion Recognition and Affective States in Context-Aware Systems","authors":"P. Moore, F. Xhafa, L. Barolli","doi":"10.1109/WAINA.2014.88","DOIUrl":"https://doi.org/10.1109/WAINA.2014.88","url":null,"abstract":"Defining and describing a context requires knowledge (contextual information), while research is addressing a wider range of potential contextual information in a diverse range of domains the diversity of potential contextual information has not been effectively addressed. This paper considers the implementation of context and identifies emotion (more accurately emotional response) as a factor in the personalization of services as under-represented in the literature. We propose semantic valence modeling implemented in fuzzy rule-based systems as a potential solution to the implementation of emotional responses in context-aware systems. It is concluded that the effective implementation of emotional responses based on the posited approach will improve the accuracy of personalized service provision and additionally offers the potential to improve the levels of computational intelligence in context-aware domains and systems.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121608107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cognitive radio is widely accepted as a promising technology to intelligently manage the scarce radio resources and correspondingly select the optimal radio configurations. The process of cognition is challenging because of the trade-offs among response time, accuracy, available training samples, and NN structure complexity, which is a limiting factor for cognitive radio (CR) to achieve optimal configuration settings in real time. In this paper, a complex model of LTE uplink is analysed and a cognitive engine(CE) is introduced with ANN as an artificial intelligence technique. The CE is characterizing the achievable communication performance of all available secondary and primary users configurations. Furthermore, Suggesting the optimal radio configurations, taking into account the user requirements as well as the electromagnetic environment. Performance evaluation of the proposed ANN has revealed 60% improvement in accuracy and efficiency as compared to existing ANN models for the same parameters configurations.
{"title":"Performance Analysis of Artificial Neural Network-Based Learning Schemes for Cognitive Radio Systems in LTE-UL","authors":"Ahsan Adeel, H. Larijani, A. Ahmadinia","doi":"10.1109/WAINA.2014.116","DOIUrl":"https://doi.org/10.1109/WAINA.2014.116","url":null,"abstract":"Cognitive radio is widely accepted as a promising technology to intelligently manage the scarce radio resources and correspondingly select the optimal radio configurations. The process of cognition is challenging because of the trade-offs among response time, accuracy, available training samples, and NN structure complexity, which is a limiting factor for cognitive radio (CR) to achieve optimal configuration settings in real time. In this paper, a complex model of LTE uplink is analysed and a cognitive engine(CE) is introduced with ANN as an artificial intelligence technique. The CE is characterizing the achievable communication performance of all available secondary and primary users configurations. Furthermore, Suggesting the optimal radio configurations, taking into account the user requirements as well as the electromagnetic environment. Performance evaluation of the proposed ANN has revealed 60% improvement in accuracy and efficiency as compared to existing ANN models for the same parameters configurations.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The adoption of server virtualization and cloud computing has enabled high flexibility of service execution in the Internet. It also promises the efficient use of resources including power. At present, the cloud infrastructure (physical machines and cloud platforms) and the services employing the infrastructure are managed by independent entities. As a result, it is difficult to jointly configure hardware and software resources, which may introduce significant inefficiency of resource utilization. Often infrastructure providers over provision resources to accommodate a growing demand, but the cost of such inefficiency is gradually being felt by both parties. This paper experimentally examines the effect of system configuration (concurrency) on the power consumption and latency of a video hosting server. We find that the usefulness of concurrency is greatly influenced by the interplay of underlying leased resources and by the interaction of virtual machines with these resources. However, the exact nature of this interplay is difficult to quantitatively establish and, therefore, it is not presented to service providers. Our study encourages the scientific community to pay attention to this aspect and to undertake a more rigorous investigation based on practical observations.
{"title":"Power-Latency Trade-offs in Virtualized Environments","authors":"W. Dargie, Jianjun Wen","doi":"10.1109/WAINA.2014.67","DOIUrl":"https://doi.org/10.1109/WAINA.2014.67","url":null,"abstract":"The adoption of server virtualization and cloud computing has enabled high flexibility of service execution in the Internet. It also promises the efficient use of resources including power. At present, the cloud infrastructure (physical machines and cloud platforms) and the services employing the infrastructure are managed by independent entities. As a result, it is difficult to jointly configure hardware and software resources, which may introduce significant inefficiency of resource utilization. Often infrastructure providers over provision resources to accommodate a growing demand, but the cost of such inefficiency is gradually being felt by both parties. This paper experimentally examines the effect of system configuration (concurrency) on the power consumption and latency of a video hosting server. We find that the usefulness of concurrency is greatly influenced by the interplay of underlying leased resources and by the interaction of virtual machines with these resources. However, the exact nature of this interplay is difficult to quantitatively establish and, therefore, it is not presented to service providers. Our study encourages the scientific community to pay attention to this aspect and to undertake a more rigorous investigation based on practical observations.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hakim Adhari, Sebastian Werner, T. Dreibholz, E. Rathgeb
The Internet is based on best effort communication, i.e. It tries to deliver packets but does not provide any guarantees. A transport protocol can make use of this best effort service to provide a suitable service to its applications. Also, its congestion control is responsible for a fair distribution of the resources within the Internet. However, background data transfer applications (like file sharing or update fetching) do not require "best effort", they in fact could use a "lower-than-best-effort" service to leave resources to more important applications if needed. For this purpose, the Low Extra Delay Background Transport (LEDBAT) algorithm has been standardized by the IETF. Nowadays, multi-homing is becoming increasingly common in modern networks and several approaches to exploit this feature (e.g. CMT-SCTP, MPTCP) have evolved that are able to combine resources of multiple paths. For background traffic oriented algorithms like LEDBAT, this feature could be of great use, too, i.e. By increasing the overall bandwidth while shifting the transmission away from paths which are used by other flows. This could be particularly useful for non-critical bulk transfers in data centres. In this paper, we introduce our approach LEDBAT for Multi-Path - denoted as LEDBAT-MP - and analyze its performance by simulations. With this paper, we want to highlight some generic design questions and start a discussion on how a solid universal background multi-path congestion control strategy should behave.
{"title":"LEDBAT-MP -- On the Application of \"Lower-than-Best-Effort\" for Concurrent Multipath Transfer","authors":"Hakim Adhari, Sebastian Werner, T. Dreibholz, E. Rathgeb","doi":"10.1109/WAINA.2014.125","DOIUrl":"https://doi.org/10.1109/WAINA.2014.125","url":null,"abstract":"The Internet is based on best effort communication, i.e. It tries to deliver packets but does not provide any guarantees. A transport protocol can make use of this best effort service to provide a suitable service to its applications. Also, its congestion control is responsible for a fair distribution of the resources within the Internet. However, background data transfer applications (like file sharing or update fetching) do not require \"best effort\", they in fact could use a \"lower-than-best-effort\" service to leave resources to more important applications if needed. For this purpose, the Low Extra Delay Background Transport (LEDBAT) algorithm has been standardized by the IETF. Nowadays, multi-homing is becoming increasingly common in modern networks and several approaches to exploit this feature (e.g. CMT-SCTP, MPTCP) have evolved that are able to combine resources of multiple paths. For background traffic oriented algorithms like LEDBAT, this feature could be of great use, too, i.e. By increasing the overall bandwidth while shifting the transmission away from paths which are used by other flows. This could be particularly useful for non-critical bulk transfers in data centres. In this paper, we introduce our approach LEDBAT for Multi-Path - denoted as LEDBAT-MP - and analyze its performance by simulations. With this paper, we want to highlight some generic design questions and start a discussion on how a solid universal background multi-path congestion control strategy should behave.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Monitoring activities over many different types of sensors are very challenging to support advanced services for Internet of Things (IoT) and its future. However, one of the major issues is the explosion of the amount of heterogeneous information that has to be stored and processed, thus causing the well known Big Data problem. Some Cloud strategies have been investigated to offer IoT-oriented services, but they do not specifically address solutions for Big Data management. In this paper, we present a two-layer architecture based on a hybrid storage system able to support a Platform as a Service (PaaS) federated Cloud scenario. The proposed architecture combines the benefits of both storage approaches. In particular, it allows us on one hand to extend SQL-like legacy systems, and on the other hand to manage Big Data through an XML-like, non-SQL distributed storage system according to a Cloud federation approach.
{"title":"The Need of a Hybrid Storage Approach for IoT in PaaS Cloud Federation","authors":"M. Fazio, A. Celesti, M. Villari, A. Puliafito","doi":"10.1109/WAINA.2014.162","DOIUrl":"https://doi.org/10.1109/WAINA.2014.162","url":null,"abstract":"Monitoring activities over many different types of sensors are very challenging to support advanced services for Internet of Things (IoT) and its future. However, one of the major issues is the explosion of the amount of heterogeneous information that has to be stored and processed, thus causing the well known Big Data problem. Some Cloud strategies have been investigated to offer IoT-oriented services, but they do not specifically address solutions for Big Data management. In this paper, we present a two-layer architecture based on a hybrid storage system able to support a Platform as a Service (PaaS) federated Cloud scenario. The proposed architecture combines the benefits of both storage approaches. In particular, it allows us on one hand to extend SQL-like legacy systems, and on the other hand to manage Big Data through an XML-like, non-SQL distributed storage system according to a Cloud federation approach.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Targeted cyber attacks play a critical role in disrupting network infrastructure and information privacy. Based on the incident investigation, Intelligence gathering is the first phase of such attacks. To evade detection, hacker may make use of botnet, a set of zombie machines, to gain the access of a target and the zombies send the collected results back to the hacker. Even though the zombies would be blocked by detection system, the hacker, using the access information obtained from the botnet, would login the target from another machine without being noticed by the detection system. Such information gathering tactic can evade detection and the hacker grants the initial access to the target. The proposed defense system analyzes multiple logs from the network and extracts the reconnaissance attack sequences related to targeted attacks. State-based model is adopted to model the steps of the above early phase attack performed by multiple scouts and an intruder and such attack events in a long time frame becomes significant in the state-aware model. The results show that the proposed system can identify the attacks at the early stage efficiently to prevent further damage in the networks.
{"title":"Targeted Attack Prevention at Early Stage","authors":"Chia-Mei Chen, Peng-Yu Yang, Ya-Hui Ou, H. Hsiao","doi":"10.1109/WAINA.2014.134","DOIUrl":"https://doi.org/10.1109/WAINA.2014.134","url":null,"abstract":"Targeted cyber attacks play a critical role in disrupting network infrastructure and information privacy. Based on the incident investigation, Intelligence gathering is the first phase of such attacks. To evade detection, hacker may make use of botnet, a set of zombie machines, to gain the access of a target and the zombies send the collected results back to the hacker. Even though the zombies would be blocked by detection system, the hacker, using the access information obtained from the botnet, would login the target from another machine without being noticed by the detection system. Such information gathering tactic can evade detection and the hacker grants the initial access to the target. The proposed defense system analyzes multiple logs from the network and extracts the reconnaissance attack sequences related to targeted attacks. State-based model is adopted to model the steps of the above early phase attack performed by multiple scouts and an intruder and such attack events in a long time frame becomes significant in the state-aware model. The results show that the proposed system can identify the attacks at the early stage efficiently to prevent further damage in the networks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}