M. Franceschetti, Roberto Posenato, Carlo Combi, Johann Eder
A Conditional Simple Temporal Network with Uncertainty (CSTNU) models temporal constraint satisfaction problems in which the environment sets uncontrollable timepoints and conditions. The executor observes and reacts to such uncontrollable assignments as time advances with the CSTNU execution. However, there exist scenarios in which the occurrence of some future timepoints must be fixed as soon as the execution starts. We call these timepoints parameters. For a correct execution, parameters must assume values that guarantee the possibility of satisfying all temporal constraints, whatever the environment decides the execution time for uncontrollable timepoints and the truth value of conditions, i.e., dynamic controllability (DC). Here, we formalize the extension of the CSTNU with parameters. Furthermore, we define a set of rules to check the DC of such extended CSTNU. These rules additionally solve the problem inverse to checking DC: computing restrictions on parameter values that yield DC guarantees. The proposed rules can be composed into a sound and complete procedure.
{"title":"Dynamic Controllability of Parameterized CSTNUs","authors":"M. Franceschetti, Roberto Posenato, Carlo Combi, Johann Eder","doi":"10.1145/3555776.3577618","DOIUrl":"https://doi.org/10.1145/3555776.3577618","url":null,"abstract":"A Conditional Simple Temporal Network with Uncertainty (CSTNU) models temporal constraint satisfaction problems in which the environment sets uncontrollable timepoints and conditions. The executor observes and reacts to such uncontrollable assignments as time advances with the CSTNU execution. However, there exist scenarios in which the occurrence of some future timepoints must be fixed as soon as the execution starts. We call these timepoints parameters. For a correct execution, parameters must assume values that guarantee the possibility of satisfying all temporal constraints, whatever the environment decides the execution time for uncontrollable timepoints and the truth value of conditions, i.e., dynamic controllability (DC). Here, we formalize the extension of the CSTNU with parameters. Furthermore, we define a set of rules to check the DC of such extended CSTNU. These rules additionally solve the problem inverse to checking DC: computing restrictions on parameter values that yield DC guarantees. The proposed rules can be composed into a sound and complete procedure.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"52 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76157391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucas Pereira, B. Guterres, Kauê Sbrissa, Amanda Mendes, Francisca Vermeulen, L. Lain, Marié Smith, Javier Martinez, Paulo L. J. Drews-Jr, Nelson Duarte, Vinicus Oliveira, S. Botelho, M. Pias
Edge computing is a new development paradigm that brings computational power to the network edge through novel intelligent end-user services. It allows latency-sensitive applications to be placed where the data is created, thus reducing communication overhead and improving security, mobility and power consumption. There is a plethora of applications benefiting from this type of processing. Of particular interest is emerging edge-based image classification at the microscopic level. The scale and magnitude of the objects to segment, detect and classify are very challenging, with data collected using order of magnitude in magnification. The required data processing is intense, and the wish list of end-users in this space includes tools and solutions that fit into a desk-based device. Taking heavy-lift classification models initially built in the cloud to desk-based image analysis devices is a hard job for application developers. This work looks at the performance limitations and energy consumption footprint in embedding deep learning classification models in a representative edge computing device. Particularly, the dataset and heavy-lift models explored in the case study are phytoplankton images to detect Harmful Algae Blooms (HAB) in aquaculture at early stages. The work takes a deep learning model trained for phytoplankton classification and deploys it at the edge. The embedded model, deployed in a base form alongside optimised options, is submitted to a series of system stress experiments. The performance and power consumption profiling help understand system limitations and their impact on the microscopic grade image classification task.
{"title":"The not-so-easy task of taking heavy-lift ML models to the edge: a performance-watt perspective","authors":"Lucas Pereira, B. Guterres, Kauê Sbrissa, Amanda Mendes, Francisca Vermeulen, L. Lain, Marié Smith, Javier Martinez, Paulo L. J. Drews-Jr, Nelson Duarte, Vinicus Oliveira, S. Botelho, M. Pias","doi":"10.1145/3555776.3577742","DOIUrl":"https://doi.org/10.1145/3555776.3577742","url":null,"abstract":"Edge computing is a new development paradigm that brings computational power to the network edge through novel intelligent end-user services. It allows latency-sensitive applications to be placed where the data is created, thus reducing communication overhead and improving security, mobility and power consumption. There is a plethora of applications benefiting from this type of processing. Of particular interest is emerging edge-based image classification at the microscopic level. The scale and magnitude of the objects to segment, detect and classify are very challenging, with data collected using order of magnitude in magnification. The required data processing is intense, and the wish list of end-users in this space includes tools and solutions that fit into a desk-based device. Taking heavy-lift classification models initially built in the cloud to desk-based image analysis devices is a hard job for application developers. This work looks at the performance limitations and energy consumption footprint in embedding deep learning classification models in a representative edge computing device. Particularly, the dataset and heavy-lift models explored in the case study are phytoplankton images to detect Harmful Algae Blooms (HAB) in aquaculture at early stages. The work takes a deep learning model trained for phytoplankton classification and deploys it at the edge. The embedded model, deployed in a base form alongside optimised options, is submitted to a series of system stress experiments. The performance and power consumption profiling help understand system limitations and their impact on the microscopic grade image classification task.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"9 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75864732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we use a Twitter dataset collected between December 8, 2021 and February 18, 2022 towards the 2022 Russian invasion of Ukraine to design a data processing pipeline featuring a high accuracy Graph Convolutional Network (GCN) based political camp classifier, a botnet detection algorithm and a robust measure of botnet effects. Our experiments reveal that while the pro-Russian botnet contributes significantly to network polarization, the pro-Ukrainian botnet contributes with moderating effects. In order to understand the factors leading to different effects, we analyze the interactions between the botnets and the barrier-crossing vs. barrier-bound users on their own camps. We observe that, where as the pro-Russian botnet amplifies barrier-bound partisan users on their own camp majority of the time, the pro-Ukrainian botnet amplifies barrier-crossing users on their own camp alongside themselves majority of the time.
{"title":"Detecting and Measuring the Polarization Effects of Adversarial Botnets on Twitter","authors":"Yeonjung Lee, M. Ozer, S. Corman, H. Davulcu","doi":"10.1145/3555776.3577730","DOIUrl":"https://doi.org/10.1145/3555776.3577730","url":null,"abstract":"In this paper we use a Twitter dataset collected between December 8, 2021 and February 18, 2022 towards the 2022 Russian invasion of Ukraine to design a data processing pipeline featuring a high accuracy Graph Convolutional Network (GCN) based political camp classifier, a botnet detection algorithm and a robust measure of botnet effects. Our experiments reveal that while the pro-Russian botnet contributes significantly to network polarization, the pro-Ukrainian botnet contributes with moderating effects. In order to understand the factors leading to different effects, we analyze the interactions between the botnets and the barrier-crossing vs. barrier-bound users on their own camps. We observe that, where as the pro-Russian botnet amplifies barrier-bound partisan users on their own camp majority of the time, the pro-Ukrainian botnet amplifies barrier-crossing users on their own camp alongside themselves majority of the time.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"50 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85730015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Graph related tasks, such as graph classification and clustering, have been substantially improved with the advent of graph neural networks (GNNs). However, existing graph embedding models focus on homogeneous graphs that ignore the heterogeneity of the graphs. Therefore, using homogeneous graph embedding models on heterogeneous graphs discards the rich semantics of graphs and achieves average performance, especially by utilizing unlabeled information. However, limited work has been done on whole heterogeneous graph embedding as a supervised task. In light of this, we investigate unsupervised distributed representations learning on heterogeneous graphs and propose a novel model named G-HIN2Vec, Graph-Level Heterogeneous Information Network to Vector. Inspired by recent advances of unsupervised learning in natural language processing, G-HIN2Vec utilizes negative sampling technique as an unlabeled approach and learns graph embedding matrix from different pre-defined meta-paths. We conduct a variety of experiments on three main graph downstream applications on different socio-demographic cardholder features, graph regression, graph clustering, and graph classification, such as gender classification, age, and income prediction, which shows superior performance of our proposed GNN model on real-world financial credit card data.
{"title":"G-HIN2Vec: Distributed heterogeneous graph representations for cardholder transactions","authors":"Farouk Damoun, H. Seba, Jean Hilger, R. State","doi":"10.1145/3555776.3577740","DOIUrl":"https://doi.org/10.1145/3555776.3577740","url":null,"abstract":"Graph related tasks, such as graph classification and clustering, have been substantially improved with the advent of graph neural networks (GNNs). However, existing graph embedding models focus on homogeneous graphs that ignore the heterogeneity of the graphs. Therefore, using homogeneous graph embedding models on heterogeneous graphs discards the rich semantics of graphs and achieves average performance, especially by utilizing unlabeled information. However, limited work has been done on whole heterogeneous graph embedding as a supervised task. In light of this, we investigate unsupervised distributed representations learning on heterogeneous graphs and propose a novel model named G-HIN2Vec, Graph-Level Heterogeneous Information Network to Vector. Inspired by recent advances of unsupervised learning in natural language processing, G-HIN2Vec utilizes negative sampling technique as an unlabeled approach and learns graph embedding matrix from different pre-defined meta-paths. We conduct a variety of experiments on three main graph downstream applications on different socio-demographic cardholder features, graph regression, graph clustering, and graph classification, such as gender classification, age, and income prediction, which shows superior performance of our proposed GNN model on real-world financial credit card data.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"129 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78581158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we study device driver architectures on two different operating systems, Fuchsia and Linux. Fuchsia is a relatively new operating system developed by Google and it is based on a microkernel named Zircon, while Linux-based operating system is based on a monolithic kernel. This paper examines technical details of device driver on Fuchsia and Linux operating systems with the focus on different kernel designs. We also quantitatively evaluate the performance of device drivers on both operating systems by measuring I/O throughput in a real device.
{"title":"Comparative Study on Fuchsia and Linux Device Driver Architecture","authors":"Taejoon Song, Youngjin Kim","doi":"10.1145/3555776.3577828","DOIUrl":"https://doi.org/10.1145/3555776.3577828","url":null,"abstract":"In this paper, we study device driver architectures on two different operating systems, Fuchsia and Linux. Fuchsia is a relatively new operating system developed by Google and it is based on a microkernel named Zircon, while Linux-based operating system is based on a monolithic kernel. This paper examines technical details of device driver on Fuchsia and Linux operating systems with the focus on different kernel designs. We also quantitatively evaluate the performance of device drivers on both operating systems by measuring I/O throughput in a real device.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"20 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78792967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The adoption of semantic technologies for the representation of crime events can help law enforcement agencies (LEAs) in crime prevention and investigation. Moreover, online newspapers and social networks are valuable sources for crime intelligence gathering. In this paper, we propose a new lightweight ontology to model crime events as they are usually described in online news articles. The Crime Event Model (CEM) can integrate specific data about crimes, i.e., where and when they occurred, who is involved (author, victim, and other subjects involved), which is the reason for the occurrence, and details about the source of information (e.g., the news article). Extracting structured data from multiple online sources and interconnecting them in a Knowledge Graph using CEM allow events relationships extraction, patterns and trends identification, and event recommendation. The CEM ontology is available at https://w3id.org/CEMontology.
{"title":"CEM: an Ontology for Crime Events in Newspaper Articles","authors":"Federica Rollo, Laura Po, Alessandro Castellucci","doi":"10.1145/3555776.3577862","DOIUrl":"https://doi.org/10.1145/3555776.3577862","url":null,"abstract":"The adoption of semantic technologies for the representation of crime events can help law enforcement agencies (LEAs) in crime prevention and investigation. Moreover, online newspapers and social networks are valuable sources for crime intelligence gathering. In this paper, we propose a new lightweight ontology to model crime events as they are usually described in online news articles. The Crime Event Model (CEM) can integrate specific data about crimes, i.e., where and when they occurred, who is involved (author, victim, and other subjects involved), which is the reason for the occurrence, and details about the source of information (e.g., the news article). Extracting structured data from multiple online sources and interconnecting them in a Knowledge Graph using CEM allow events relationships extraction, patterns and trends identification, and event recommendation. The CEM ontology is available at https://w3id.org/CEMontology.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"10 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78904472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Non-Fungible Tokens (NFT) have gained popularity since 2021, reaching a total market valuation of several billion US dollars, especially in art. This paper highlights the findings of our statistically representative survey of more than 1850 Americans, e.g., 5.7% have already bought an NFT. Unfortunately, that trust has been misplaced on many occasions due to technical and legal issues of most created NFTs. We detail those issues and evaluate them in the case of the most well-known NFT marketplace, i.e., OpenSea.
{"title":"NFT Trust Survey","authors":"Jean-Marc Seigneur, Suzana Moreno","doi":"10.1145/3555776.3577824","DOIUrl":"https://doi.org/10.1145/3555776.3577824","url":null,"abstract":"Non-Fungible Tokens (NFT) have gained popularity since 2021, reaching a total market valuation of several billion US dollars, especially in art. This paper highlights the findings of our statistically representative survey of more than 1850 Americans, e.g., 5.7% have already bought an NFT. Unfortunately, that trust has been misplaced on many occasions due to technical and legal issues of most created NFTs. We detail those issues and evaluate them in the case of the most well-known NFT marketplace, i.e., OpenSea.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"113 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79323879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
João Francisco, Miguel E. Coimbra, P. Neto, Felix Freitag, L. Veiga
The model of approximate computing can be used to increase performance or optimize resource usage in stream and graph processing. It can be used to satisfy performance requirements (e.g., throughput, lag) in stream processing by reducing the effort that applications need to process datasets. There are currently multiple stream processing platforms, and most of them do not natively support approximate results. A recent one, Stateful Functions, is an API that uses Flink to enable developers to easily build stream and graph processing applications. It also retains Flink's features like stateful computations, fault-tolerance, scalability, control events and its graph processing library Gelly. Herein we present Approxate, an extension over this platform to support approximate results. It can also support more efficient stream and graph processing by allocating available resources adaptively, driven by user-defined requirements on throughput, lag, and latency. This extension enables flexibility in computational trade-offs such as trading accuracy for performance. The user can choose which metrics should be guaranteed at the cost of others, and/or the accuracy. Approxate incorporates approximate computing (using load shedding) with adaptive accuracy and resource manegement in state-of-the-art stream processing platforms, which are not targeted in other relevant related work. It does not require significant modifications to application code, and minimizes imbalance in data source representation when dropping events.
{"title":"Stateful Adaptive Streams with Approximate Computing and Elastic Scaling","authors":"João Francisco, Miguel E. Coimbra, P. Neto, Felix Freitag, L. Veiga","doi":"10.1145/3555776.3577858","DOIUrl":"https://doi.org/10.1145/3555776.3577858","url":null,"abstract":"The model of approximate computing can be used to increase performance or optimize resource usage in stream and graph processing. It can be used to satisfy performance requirements (e.g., throughput, lag) in stream processing by reducing the effort that applications need to process datasets. There are currently multiple stream processing platforms, and most of them do not natively support approximate results. A recent one, Stateful Functions, is an API that uses Flink to enable developers to easily build stream and graph processing applications. It also retains Flink's features like stateful computations, fault-tolerance, scalability, control events and its graph processing library Gelly. Herein we present Approxate, an extension over this platform to support approximate results. It can also support more efficient stream and graph processing by allocating available resources adaptively, driven by user-defined requirements on throughput, lag, and latency. This extension enables flexibility in computational trade-offs such as trading accuracy for performance. The user can choose which metrics should be guaranteed at the cost of others, and/or the accuracy. Approxate incorporates approximate computing (using load shedding) with adaptive accuracy and resource manegement in state-of-the-art stream processing platforms, which are not targeted in other relevant related work. It does not require significant modifications to application code, and minimizes imbalance in data source representation when dropping events.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"6 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78035215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Indoor Environment Quality (IEQ) is one of the most important goals for smart spaces. Thermal comfort is typically considered the most emphasized factor in IEQ that depends on personalized thermal preference. In this paper, we explore technical challenges to deploying a robot-driven personalized thermal control system that uses a mobile robot for learning user-state-specific preference efficiently. We conduct a few experiments that give a clue to overcome such challenges (i.e. low image recognition) when the system is deployed in a real world. We present future directions to improve robot-driven preference learning from the exploration.
{"title":"Towards Deployment of Mobile Robot driven Preference Learning for User-State-Specific Thermal Control in A Real-World Smart Space","authors":"Geon Kim, Hyunju Kim, Dongman Lee","doi":"10.1145/3555776.3577760","DOIUrl":"https://doi.org/10.1145/3555776.3577760","url":null,"abstract":"Indoor Environment Quality (IEQ) is one of the most important goals for smart spaces. Thermal comfort is typically considered the most emphasized factor in IEQ that depends on personalized thermal preference. In this paper, we explore technical challenges to deploying a robot-driven personalized thermal control system that uses a mobile robot for learning user-state-specific preference efficiently. We conduct a few experiments that give a clue to overcome such challenges (i.e. low image recognition) when the system is deployed in a real world. We present future directions to improve robot-driven preference learning from the exploration.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"75 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86059371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed monitoring is an essential functionality to allow large cluster federations to efficiently schedule applications on a set of available geo-distributed resources. However, periodically reporting the precise status of each available server is both unnecessary to allow accurate scheduling and unscalable when the number of servers grows. This paper proposes Acala, a monitoring framework for geo-distributed cluster federations which aims to provide the management cluster with aggregate information about the entire cluster instead of individual servers. Our evaluations, based on actual deployment under controlled environment in the geo-distributed Grid'5000 testbed, show that Acala reduces the cross-cluster network traffic by up to 99% and the scrape duration by up to 55%.
{"title":"Acala: Aggregate Monitoring for Geo-Distributed Cluster Federations","authors":"Chih-Kai Huang, G. Pierre","doi":"10.1145/3555776.3577716","DOIUrl":"https://doi.org/10.1145/3555776.3577716","url":null,"abstract":"Distributed monitoring is an essential functionality to allow large cluster federations to efficiently schedule applications on a set of available geo-distributed resources. However, periodically reporting the precise status of each available server is both unnecessary to allow accurate scheduling and unscalable when the number of servers grows. This paper proposes Acala, a monitoring framework for geo-distributed cluster federations which aims to provide the management cluster with aggregate information about the entire cluster instead of individual servers. Our evaluations, based on actual deployment under controlled environment in the geo-distributed Grid'5000 testbed, show that Acala reduces the cross-cluster network traffic by up to 99% and the scrape duration by up to 55%.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"126 12","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72444214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}