With the rapidly growing amount of information on the internet, real-time system is one of the key strategies to cope with the information overload and to help users in finding highly relevant information. Real-time events and domain-specific information are important knowledge base references on the Web that frequently accessed by millions of users. Real-time system is a vital to product and a technique must resolve the context of challenges to be more reliable, e.g. short data life-cycles, heterogeneous user interests, strict time constraints, and context-dependent article relevance. Since real-time data have only a short time to live, real-time models have to be continuously adapted, ensuring that real-time data are always up-to-date. The focal point of this manuscript is for designing a real-time web search approach that aggregates several web search algorithms at query time to tune search results for relevancy. We learn a context-aware delegation algorithm that allows choosing the best real-time algorithms for each query request. The evaluation showed that the proposed approach outperforms the traditional models, in which it allows us to adapt the specific properties of the considered real-time resources. In the experiments, we found that it is highly relevant for most recently searched queries, consistent in its performance, and resilient to the drawbacks faced by other algorithms
{"title":"Real-time Web Search Framework for Performing Efficient Retrieval of Data","authors":"F. Al-akashi, D. Inkpen","doi":"10.31341/jios.45.1.13","DOIUrl":"https://doi.org/10.31341/jios.45.1.13","url":null,"abstract":"With the rapidly growing amount of information on the internet, real-time system is one of the key strategies to cope with the information overload and to help users in finding highly relevant information. Real-time events and domain-specific information are important knowledge base references on the Web that frequently accessed by millions of users. Real-time system is a vital to product and a technique must resolve the context of challenges to be more reliable, e.g. short data life-cycles, heterogeneous user interests, strict time constraints, and context-dependent article relevance. Since real-time data have only a short time to live, real-time models have to be continuously adapted, ensuring that real-time data are always up-to-date. The focal point of this manuscript is for designing a real-time web search approach that aggregates several web search algorithms at query time to tune search results for relevancy. We learn a context-aware delegation algorithm that allows choosing the best real-time algorithms for each query request. The evaluation showed that the proposed approach outperforms the traditional models, in which it allows us to adapt the specific properties of the considered real-time resources. In the experiments, we found that it is highly relevant for most recently searched queries, consistent in its performance, and resilient to the drawbacks faced by other algorithms","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44929496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The end-user computing satisfaction model (EUCS) has been widely used in previous studies, and Enterprise Resource Planning. Therefore, Enterprise Resource Planning (ERP) System, need to be developed in accordance with cloud computing that dominate current information technology devices. This study was carried out to test the expansion of the EUCS model in a cloud-based ERP system. Therefore, the purpose of this research is to re-examine the validity and reliability of the computer application satisfaction model and its relationship with user performance in cloud-based ERP system. The overall satisfaction variable is added as a mediation between the satisfaction model and user performance. Data was collected through snowball sampling with a questionnaire distributed to the cloud-based ERP users. Additionally, data processing was conducted using the Second-order concept in structural equation modeling with the Partial Least Square approach. Since data processing using WarpPLS confirmed the validity and reliability of the model and all relationships between variables, this research contributes theoretically to the study of end-user satisfaction from information technology applications. Its final section describes the limitations and opportunities for future research.
{"title":"Re-examination and expanding the EUCS Model on Cloud-based ERP system","authors":"Weli Weli","doi":"10.31341/jios.45.1.7","DOIUrl":"https://doi.org/10.31341/jios.45.1.7","url":null,"abstract":"The end-user computing satisfaction model (EUCS) has been widely used in previous studies, and Enterprise Resource Planning. Therefore, Enterprise Resource Planning (ERP) System, need to be developed in accordance with cloud computing that dominate current information technology devices. This study was carried out to test the expansion of the EUCS model in a cloud-based ERP system. Therefore, the purpose of this research is to re-examine the validity and reliability of the computer application satisfaction model and its relationship with user performance in cloud-based ERP system. The overall satisfaction variable is added as a mediation between the satisfaction model and user performance. Data was collected through snowball sampling with a questionnaire distributed to the cloud-based ERP users. Additionally, data processing was conducted using the Second-order concept in structural equation modeling with the Partial Least Square approach. Since data processing using WarpPLS confirmed the validity and reliability of the model and all relationships between variables, this research contributes theoretically to the study of end-user satisfaction from information technology applications. Its final section describes the limitations and opportunities for future research.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46330403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fuzzy logic controller is one of the most prominent research fields to improve efficiency for process industries, which usually stick to the conventional proportional-integral-derivative (PID) control. The paper proposes an improved version of the three-term PID-like fuzzy logic controller by removing the necessity of having user-defined parameters in place for the algorithm to work. The resulting non-parametric three-term dissimilarity-based clustering fuzzy logic controller algorithm was shown to be very efficient and fast. The performance study was conducted by simulation on armature-controlled and field-controller DC motors, for linguistic type and Takagi-Sugeno-Kang (TSK) models. Comparison of the created algorithm with fuzzy c-means algorithm resulted in improved accuracy, increased speed and enhanced robustness, with an especially high increase for the TSK type model.
{"title":"Dissimilarity Clustering Algorithm for Designing the PID-like Fuzzy Controllers","authors":"E. Natsheh","doi":"10.31341/jios.45.1.12","DOIUrl":"https://doi.org/10.31341/jios.45.1.12","url":null,"abstract":"Fuzzy logic controller is one of the most prominent research fields to improve efficiency for process industries, which usually stick to the conventional proportional-integral-derivative (PID) control. The paper proposes an improved version of the three-term PID-like fuzzy logic controller by removing the necessity of having user-defined parameters in place for the algorithm to work. The resulting non-parametric three-term dissimilarity-based clustering fuzzy logic controller algorithm was shown to be very efficient and fast. The performance study was conducted by simulation on armature-controlled and field-controller DC motors, for linguistic type and Takagi-Sugeno-Kang (TSK) models. Comparison of the created algorithm with fuzzy c-means algorithm resulted in improved accuracy, increased speed and enhanced robustness, with an especially high increase for the TSK type model.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47648777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Educationists are urged to investigate the effect of social networks control. There is a lack of multidisciplinary studies with a focus on coercive social network control in the higher education sector. This exploratory and descriptive study presents a theoretical contemplation of social network control based on ten key elements that influence teaching and learning in higher educational environments. The paper provides a critical analysis of the impact of an economic model on social networks control and examines social engineering through the tenets of digital presence, psychological strategies and tactics. Insights into user-generated content and the learning process of manipulative assimilation that influence current ways of thinking in higher educational contexts are offered through the lens of social networks control mechanisms. A framework for social network control was derived, signifying the flow and dynamics between key elements which might impact on various aspects of social network security and its applications in Higher Education.
{"title":"A Framework of Social Networks Control in Higher Educational Contexts","authors":"M. Jakovljevic, N. Nkopodi","doi":"10.31341/jios.45.2.6","DOIUrl":"https://doi.org/10.31341/jios.45.2.6","url":null,"abstract":"Educationists are urged to investigate the effect of social networks control. There is a lack of multidisciplinary studies with a focus on coercive social network control in the higher education sector. This exploratory and descriptive study presents a theoretical contemplation of social network control based on ten key elements that influence teaching and learning in higher educational environments. The paper provides a critical analysis of the impact of an economic model on social networks control and examines social engineering through the tenets of digital presence, psychological strategies and tactics. Insights into user-generated content and the learning process of manipulative assimilation that influence current ways of thinking in higher educational contexts are offered through the lens of social networks control mechanisms. A framework for social network control was derived, signifying the flow and dynamics between key elements which might impact on various aspects of social network security and its applications in Higher Education.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45331511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keeping the proper security level of ciphers used in communication networks is today a very important problem. Cryptanalysts ensure a constant need for improvement complexity and ciphers' security by trying to break them. Sometimes they do not instantly try to break the strongest version of the cipher, but they are looking for weaknesses by splitting it and independently checking all algorithm components. Often cryptanalysts also attempt to break cipher by using its weaker version or configuration. There are plenty of mechanisms and approaches to cryptanalysis to solve those challenges. One of them is SAT-based method, that uses logical encoding. In this article, we present our wide analysis and new experimental results of SATbased, direct cryptanalysis of the RC5 cipher. To perform such actions on the given cipher, we initially create a propositional logical formula, that describes and represents the entire RC5 algorithm. The second step is to randomly generate key and plaintext. Then we determine the ciphertext. In the last step of our computations, we use SAT-solvers. They are particularly designed tools for checking the satisfiability of the Boolean formulas. In our research, we make cryptanalysis of RC5 cipher in the case with plaintext and ciphertext. To get the best result, we compared many SATsolvers and choose several. Some of them were relatively old, but still very efficient and some were modern and popular.
{"title":"Complete SAT based Cryptanalysis of RC5 Cipher","authors":"Artur Soboń, M. Kurkowski, Sylwia Stachowiak","doi":"10.31341/jios.44.2.10","DOIUrl":"https://doi.org/10.31341/jios.44.2.10","url":null,"abstract":"Keeping the proper security level of ciphers used in communication networks is today a very important problem. Cryptanalysts ensure a constant need for improvement complexity and ciphers' security by trying to break them. Sometimes they do not instantly try to break the strongest version of the cipher, but they are looking for weaknesses by splitting it and independently checking all algorithm components. Often cryptanalysts also attempt to break cipher by using its weaker version or configuration. There are plenty of mechanisms and approaches to cryptanalysis to solve those challenges. One of them is SAT-based method, that uses logical encoding. In this article, we present our wide analysis and new experimental results of SATbased, direct cryptanalysis of the RC5 cipher. To perform such actions on the given cipher, we initially create a propositional logical formula, that describes and represents the entire RC5 algorithm. The second step is to randomly generate key and plaintext. Then we determine the ciphertext. In the last step of our computations, we use SAT-solvers. They are particularly designed tools for checking the satisfiability of the Boolean formulas. In our research, we make cryptanalysis of RC5 cipher in the case with plaintext and ciphertext. To get the best result, we compared many SATsolvers and choose several. Some of them were relatively old, but still very efficient and some were modern and popular.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"365-382"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44637916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Numerous national and private Slovak universities and colleges are currently con fronted with a state, where the offer of study programmes exceeds its demand students’ interests. This paper describes reasons for this situation but mainly it points out the fact that the advent of information and communication technologies significantly intervened in different areas of life and all types of communication. The implementation of some tools of internet social networks in the academic envi ronment is, therefore, essential. In addition to the theoretical background, the paper also includes case study related to the creation of a new Facebook profile #MaŠtu, setting up specific online marketing key performance indicators (KPI) and moni toring them using both Facebook analytics metrics and the social networking tool for administration, ZoomSphere.
{"title":"Use of Internet Social Networks in Academic Environment","authors":"Renáta Cenková, William Steingartner","doi":"10.31341/jios.44.2.5","DOIUrl":"https://doi.org/10.31341/jios.44.2.5","url":null,"abstract":"Numerous national and private Slovak universities and colleges are currently con fronted with a state, where the offer of study programmes exceeds its demand students’ interests. This paper describes reasons for this situation but mainly it points out the fact that the advent of information and communication technologies significantly intervened in different areas of life and all types of communication. The implementation of some tools of internet social networks in the academic envi ronment is, therefore, essential. In addition to the theoretical background, the paper also includes case study related to the creation of a new Facebook profile #MaŠtu, setting up specific online marketing key performance indicators (KPI) and moni toring them using both Facebook analytics metrics and the social networking tool for administration, ZoomSphere.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"275-295"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48893565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srishti Sahni, Vaibhav Aggarwal, Ashish Khanna, Deepak Gupta, S. Bhattacharyya
Parkinson’s Disease is a degenerative neurological disorder with unknown origins, making it impossible to be cured or even diagnosed. The following article presents a Three-Layered Perceptron Neural Network model that is trained using a variety of evolutionary as well as quantum-inspired evolutionary algorithms for the classification of Parkinson's Disease. Optimization algorithms such as Particle Swarm Optimization, Artificial Bee Colony Algorithm and Bat Algorithm are studied along with their quantum-inspired counter-parts in order to identify the best suited algorithm for Neural Network Weight Distribution. The results show that the quantum-inspired evolutionary algorithms perform better under the given circumstances, with qABC offering the highest accuracy of about 92.3%. The presented model can be used not only for disease diagnosis but is also likely to find its applications in various other fields as well.
{"title":"Quantum-Inspired Evolutionary Algorithms for Neural Network Weight Distribution","authors":"Srishti Sahni, Vaibhav Aggarwal, Ashish Khanna, Deepak Gupta, S. Bhattacharyya","doi":"10.31341/jios.44.2.9","DOIUrl":"https://doi.org/10.31341/jios.44.2.9","url":null,"abstract":"Parkinson’s Disease is a degenerative neurological disorder with unknown origins, making it impossible to be cured or even diagnosed. The following article presents a Three-Layered Perceptron Neural Network model that is trained using a variety of evolutionary as well as quantum-inspired evolutionary algorithms for the classification of Parkinson's Disease. Optimization algorithms such as Particle Swarm Optimization, Artificial Bee Colony Algorithm and Bat Algorithm are studied along with their quantum-inspired counter-parts in order to identify the best suited algorithm for Neural Network Weight Distribution. The results show that the quantum-inspired evolutionary algorithms perform better under the given circumstances, with qABC offering the highest accuracy of about 92.3%. The presented model can be used not only for disease diagnosis but is also likely to find its applications in various other fields as well.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"345-363"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43788989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Competencies represent a dynamic combination of cognitive and metacognitive skills, knowledge and understanding, interpersonal and practical skills, and ethical values. Since there are many entities, as well as many activities between entities, according to system theory, the whole system belongs to complex systems. The paper develops a conceptual and computational model of interpersonal competences for the process of optimization and methodology design, using simulation modeling. The developed model enables: faster data collection, more accurate results, avoiding human error in data entry and processing, survey time can be measured and more easily restricted, NMAR (Not Missing at Random) data is avoided and socially desirable responses are more easily avoided.
{"title":"Development of a Models of Interpersonal Competencies as a Complex System","authors":"Boris Blažinić, L. Gotal Dmitrović, M. Stojić","doi":"10.31341/jios.44.2.3","DOIUrl":"https://doi.org/10.31341/jios.44.2.3","url":null,"abstract":"Competencies represent a dynamic combination of cognitive and metacognitive skills, knowledge and understanding, interpersonal and practical skills, and ethical values. Since there are many entities, as well as many activities between entities, according to system theory, the whole system belongs to complex systems. The paper develops a conceptual and computational model of interpersonal competences for the process of optimization and methodology design, using simulation modeling. The developed model enables: faster data collection, more accurate results, avoiding human error in data entry and processing, survey time can be measured and more easily restricted, NMAR (Not Missing at Random) data is avoided and socially desirable responses are more easily avoided.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"247-255"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41926452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Common problem in valuation of telecommunication companies is finding comparable data and markets for valuation. The aim of this work was to identify comparable markets for the telecommunication market in Europe. A method for comparison of the markets based on the Multivariate Statistical Analysis was presented. The study covers twenty-two European countries. Using taxonomic measures, these countries were divided into five groups, taking into account the following variables: average monthly service cost of the fixed Internet, average cost of the mobile usage, and average cost of the fixed telephony usage. Within individual groups, the costs of telecommunications services are less diverse than in the entire population; their members can be considered comparable markets. The same method can be used for comparing markets in cases of enterprise valuations in the telecommunication sector, and also in analysis of their level of development.
{"title":"Comparison of Telecommunication Markets in Europe Using Multivariate Statistical Analysis","authors":"Pavel Kossecki","doi":"10.31341/jios.44.2.8","DOIUrl":"https://doi.org/10.31341/jios.44.2.8","url":null,"abstract":"Common problem in valuation of telecommunication companies is finding comparable data and markets for valuation. The aim of this work was to identify comparable markets for the telecommunication market in Europe. A method for comparison of the markets based on the Multivariate Statistical Analysis was presented. The study covers twenty-two European countries. Using taxonomic measures, these countries were divided into five groups, taking into account the following variables: average monthly service cost of the fixed Internet, average cost of the mobile usage, and average cost of the fixed telephony usage. Within individual groups, the costs of telecommunications services are less diverse than in the entire population; their members can be considered comparable markets. The same method can be used for comparing markets in cases of enterprise valuations in the telecommunication sector, and also in analysis of their level of development.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"331-344"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46347279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivana Dvorski Lacković, Vladimir Kovšca, Zrinka Lacković Vincek
Contemporary banks operate in a changing environment influenced by regulatory requirements, emerging new risk types and high competition on the market. At the same time banks have on their disposal large datasets from internal and external sources – the question arising is whether banks are using adequate analytics to gain value from big data. Big data has been used in banking for some time, mostly in the marketing field, but the usage of big data in banks’ risk management has not been a subject of extensive scientific research. The goals of this paper are twofold. Firstly, the authors are presenting an overview of existing research on the topic of big data usage in banks’ risk management by discussing selected aspects of this topic. Secondly, the authors are formulating a proposal on how to strategically use big data in risk management in banks by merging literature based extracted usage of big data with risk management phases. Expected contributions of this paper are systematization of knowledge from available literature and increasing scientific and professional awareness on the topic and potential of big data in banks’ risk management.
{"title":"A Review of Selected Aspects of Big Data Usage in Banks’ Risk Management","authors":"Ivana Dvorski Lacković, Vladimir Kovšca, Zrinka Lacković Vincek","doi":"10.31341/jios.44.2.7","DOIUrl":"https://doi.org/10.31341/jios.44.2.7","url":null,"abstract":"Contemporary banks operate in a changing environment influenced by regulatory requirements, emerging new risk types and high competition on the market. At the same time banks have on their disposal large datasets from internal and external sources – the question arising is whether banks are using adequate analytics to gain value from big data. Big data has been used in banking for some time, mostly in the marketing field, but the usage of big data in banks’ risk management has not been a subject of extensive scientific research. The goals of this paper are twofold. Firstly, the authors are presenting an overview of existing research on the topic of big data usage in banks’ risk management by discussing selected aspects of this topic. Secondly, the authors are formulating a proposal on how to strategically use big data in risk management in banks by merging literature based extracted usage of big data with risk management phases. Expected contributions of this paper are systematization of knowledge from available literature and increasing scientific and professional awareness on the topic and potential of big data in banks’ risk management.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"317-330"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44891286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}