Pub Date : 2014-12-26DOI: 10.14419/JACST.V4I1.3958
Mohamed Sayed
Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.
{"title":"Coset decomposition method for storing and decoding fingerprint data","authors":"Mohamed Sayed","doi":"10.14419/JACST.V4I1.3958","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3958","url":null,"abstract":"Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-25DOI: 10.14419/JACST.V4I1.3922
M. Ghasemi, M. Khalili
In this paper an attempt has been made to the other corner of the power of neural networks. According to the neural network in the diagnosis of diseases, we use neural network models for diagnosing bipolar disorder; bipolar disorder is the common disorder of depression mood. We have used two neural network models: MLP & KNN. With different percentages of the implementation of neural network models is discussed. And the error was calculated for each model. We can by using the MLP model achieve an error of 16% for the diagnosis of bipolar disorder.
{"title":"A hybrid KNN-MLP algorithm to diagnose bipolar disorder","authors":"M. Ghasemi, M. Khalili","doi":"10.14419/JACST.V4I1.3922","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3922","url":null,"abstract":"In this paper an attempt has been made to the other corner of the power of neural networks. According to the neural network in the diagnosis of diseases, we use neural network models for diagnosing bipolar disorder; bipolar disorder is the common disorder of depression mood. We have used two neural network models: MLP & KNN. With different percentages of the implementation of neural network models is discussed. And the error was calculated for each model. We can by using the MLP model achieve an error of 16% for the diagnosis of bipolar disorder.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126173048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software Defined Networking (SDN) is an emerging architecture which decouples networks control plane and data plane physically. It makes control plane programmable trough a centralized controller, and builds intelligent and flexible networks. The OpenFlow is one of the most famous SDN protocols, which acts as a southbound interface between control plane and data plane. In this survey, SDN implementation approaches and different southbound interfaces, beside different version of OpenFlow, are introduced. In addition to general architecture of SDN, different wireless architectures are discussed. Here, also potential SDN’s applications and research areas including hot topics such as Information Centric Networks, Cloud and datacenters, multimedia, wireless and mobile networks over SDN are reviewed.
{"title":"A survey on SDN, the future of networking","authors":"Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary","doi":"10.14419/JACST.V3I2.3754","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3754","url":null,"abstract":"Software Defined Networking (SDN) is an emerging architecture which decouples networks control plane and data plane physically. It makes control plane programmable trough a centralized controller, and builds intelligent and flexible networks. The OpenFlow is one of the most famous SDN protocols, which acts as a southbound interface between control plane and data plane. In this survey, SDN implementation approaches and different southbound interfaces, beside different version of OpenFlow, are introduced. In addition to general architecture of SDN, different wireless architectures are discussed. Here, also potential SDN’s applications and research areas including hot topics such as Information Centric Networks, Cloud and datacenters, multimedia, wireless and mobile networks over SDN are reviewed.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126277475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-09DOI: 10.14419/JACST.V3I2.3663
Abdolghader Pourali, M. V. Malakooti, Muhammad Hussein Yektaie
In general, a mobile payment system in mobile e-commerce must have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders, in this paper we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce presented at the International Conference) [18]. Keywords : Reliability, Colored Petri Net, Assessment, Payment Models, M-Commerce.
{"title":"Reliability evaluation of a payment model in mobile e-commerce using colored Petri net","authors":"Abdolghader Pourali, M. V. Malakooti, Muhammad Hussein Yektaie","doi":"10.14419/JACST.V3I2.3663","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3663","url":null,"abstract":"In general, a mobile payment system in mobile e-commerce must have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders, in this paper we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce presented at the International Conference) [18]. Keywords : Reliability, Colored Petri Net, Assessment, Payment Models, M-Commerce.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-23DOI: 10.14419/JACST.V3I2.3696
Parisa Bazmi, Manijeh Keshtgary
Communication across the Internet has transformed over the years, generated primarily by changes in the importance of content distribution. In the twenty-first century, people are more concerned with the content rather than the location of the information. Content-Centric Networking (CCN) is a new Internet architecture, which aims to access content by a name rather than the IP address of a host. Having the content, CCN which is natively pull-based functions based on the requests received from customers. It is also combined with the availability of in-network chaching. Because of the availability of in-network caching in CCN, chunks may be served by multiple sources. This multi-path transfer in CCN makes TCP-based congestion control mechanisms inefficient for CCN. In this paper a new congestion control algorithm is proposed, which is based on Neural Network prediction over content-centric networks. The designed NN is implemented in each router to predict adaptively the existence of the congestion on link given the current status of the network. The results demonstrate that the proposed congestion control algorithm can effectively improve throughput by 85.53%. This improvement is done by preventing queue overflow from happening, which will result in reductions in packet drop in the network. Keywords : Content-Centric Network, Congestion Control, Drop Prediction, Named Data Networking, Neural Network.
{"title":"A neural network based congestion control algorithm for content-centric networks","authors":"Parisa Bazmi, Manijeh Keshtgary","doi":"10.14419/JACST.V3I2.3696","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3696","url":null,"abstract":"Communication across the Internet has transformed over the years, generated primarily by changes in the importance of content distribution. In the twenty-first century, people are more concerned with the content rather than the location of the information. Content-Centric Networking (CCN) is a new Internet architecture, which aims to access content by a name rather than the IP address of a host. Having the content, CCN which is natively pull-based functions based on the requests received from customers. It is also combined with the availability of in-network chaching. Because of the availability of in-network caching in CCN, chunks may be served by multiple sources. This multi-path transfer in CCN makes TCP-based congestion control mechanisms inefficient for CCN. In this paper a new congestion control algorithm is proposed, which is based on Neural Network prediction over content-centric networks. The designed NN is implemented in each router to predict adaptively the existence of the congestion on link given the current status of the network. The results demonstrate that the proposed congestion control algorithm can effectively improve throughput by 85.53%. This improvement is done by preventing queue overflow from happening, which will result in reductions in packet drop in the network. Keywords : Content-Centric Network, Congestion Control, Drop Prediction, Named Data Networking, Neural Network.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-21DOI: 10.14419/JACST.V3I2.3588
M. Alani
This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addition, general cloud security recommendations are given. Keywords: cloud, cloud computing, security, threats, attacks, SaaS, PaaS, IaaS.
{"title":"Securing the Cloud: Threats, Attacks and Mitigation Techniques","authors":"M. Alani","doi":"10.14419/JACST.V3I2.3588","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3588","url":null,"abstract":"This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addition, general cloud security recommendations are given. Keywords: cloud, cloud computing, security, threats, attacks, SaaS, PaaS, IaaS.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-17DOI: 10.14419/JACST.V3I2.3602
S. M. Hashemi, A. Hanani
As Cloud Computing has become more and more famous and popular, various Cloud Computing architectures, models and infrastructures have been defined, given their specific circumstances for the applications. Currently, many Cloud definitions, applications and samples can be helpful as a reference for using a Cloud Computing service. As Cloud Computing technology is being used to minimize the cost of computing resources, many enterprises gained interest of migrating their old system to the Cloud Computing system. This further illustrates the importance the usage of Cloud Computing, therefore, this paper investigates some distributed computing model especially cloud computing to clarify which definition, usage, applications and use-cases are more useful. Further, this article attempts to introduce various models of cloud computing, services, use-cases and applications. Finally, we made a comparison between various companies that are providing Cloud Computing facilities. Keywords : Cloud Computing, E-Services, Service Computing, UML, RUP.
{"title":"Cloud computing: use cases & various applications","authors":"S. M. Hashemi, A. Hanani","doi":"10.14419/JACST.V3I2.3602","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3602","url":null,"abstract":"As Cloud Computing has become more and more famous and popular, various Cloud Computing architectures, models and infrastructures have been defined, given their specific circumstances for the applications. Currently, many Cloud definitions, applications and samples can be helpful as a reference for using a Cloud Computing service. As Cloud Computing technology is being used to minimize the cost of computing resources, many enterprises gained interest of migrating their old system to the Cloud Computing system. This further illustrates the importance the usage of Cloud Computing, therefore, this paper investigates some distributed computing model especially cloud computing to clarify which definition, usage, applications and use-cases are more useful. Further, this article attempts to introduce various models of cloud computing, services, use-cases and applications. Finally, we made a comparison between various companies that are providing Cloud Computing facilities. Keywords : Cloud Computing, E-Services, Service Computing, UML, RUP.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-17DOI: 10.14419/JACST.V3I2.3404
Mahnoosh Sadat Azaminezhad, A. Bidgoli
Steganography is a technique which embeds the secret messages in the cover image and transmitted in such a way that the existence of information is undetectable. In this paper, we present a new technique that consists of two encoding algorithm such as Huffman encoding and bit inverting algorithm. In this technique, we proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image. Our simulation results show that the algorithm has a good perceptual invisibility and high capacity in addition to be secure.
{"title":"A new high capacity steganography based on bit-inverting method in DWT domain","authors":"Mahnoosh Sadat Azaminezhad, A. Bidgoli","doi":"10.14419/JACST.V3I2.3404","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3404","url":null,"abstract":"Steganography is a technique which embeds the secret messages in the cover image and transmitted in such a way that the existence of information is undetectable. In this paper, we present a new technique that consists of two encoding algorithm such as Huffman encoding and bit inverting algorithm. In this technique, we proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image. Our simulation results show that the algorithm has a good perceptual invisibility and high capacity in addition to be secure.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121684592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-03DOI: 10.14419/jacst.v3i2.3573
Z. Al-Hashami
The statistical operations done by many specialist programs, by them can do these operations fluently and precisely. There are many functions in such programs can calculate in SAS, STAT and the analytical program SPSS. There is Microsoft Excel program that is calculate like these functions. The level of some programs may be different than others within these functions they are calculating. From these functions are Sum, Average, Maximum and Minimum. Round function is also from these functions that can measure it's accuracy through this research. In this research i chose ten digits numbers and I also chose three criteria under, equal and more than 5. According to that the rounding operations are done based on if wanted decimal place is less, equal or higher than 5. Rounding applied on ten digits using SPSS and MS Excel programs. The outputs findings are the same except that Microsoft Excel is truncating the last zeroes of the digit after the decimal point. Wherever the decimal place specified in the digit is want it will truncate after the decimal point. The SPSS is more precise than MS Excel based on the decimal place in the digit number wanted statistically and analytically. Keywords : Decimal Place, Digit, Excel, Function, Round.
{"title":"Range of outputs precise of digits rounding in SPSS and MS Excel","authors":"Z. Al-Hashami","doi":"10.14419/jacst.v3i2.3573","DOIUrl":"https://doi.org/10.14419/jacst.v3i2.3573","url":null,"abstract":"The statistical operations done by many specialist programs, by them can do these operations fluently and precisely. There are many functions in such programs can calculate in SAS, STAT and the analytical program SPSS. There is Microsoft Excel program that is calculate like these functions. The level of some programs may be different than others within these functions they are calculating. From these functions are Sum, Average, Maximum and Minimum. Round function is also from these functions that can measure it's accuracy through this research. In this research i chose ten digits numbers and I also chose three criteria under, equal and more than 5. According to that the rounding operations are done based on if wanted decimal place is less, equal or higher than 5. Rounding applied on ten digits using SPSS and MS Excel programs. The outputs findings are the same except that Microsoft Excel is truncating the last zeroes of the digit after the decimal point. Wherever the decimal place specified in the digit is want it will truncate after the decimal point. The SPSS is more precise than MS Excel based on the decimal place in the digit number wanted statistically and analytically. Keywords : Decimal Place, Digit, Excel, Function, Round.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115246501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-15DOI: 10.14419/JACST.V3I2.3321
A. Rghioui, Anass Khannous, M. Bouhorma
RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet. In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks Keywords: RPL, ROLL, 6LoWPAN, IDS, DoS, Network security.
RPL (Routing Protocol for Low-power and lossy networks)是一种特殊的路由协议,用于优化6LoWPAN (IPv6 over Low-power Wireless Personal Area Network)的运行。由于6LoWPAN受到电池、处理器、内存和带宽等资源的限制,影响了RPL协议的性能。从安全的角度来看,这将使RPL容易受到几种直接或间接的威胁。因此,加密系统不足以保护RPL免受内部攻击;来自网络的受损节点可能会导致不希望的操作而不会被这些系统检测到。应该使用入侵检测系统(IDS),但考虑到6LoWPAN的性质,这并不容易;一方面是资源的限制,另一方面是通过互联网对外开放。本文主要研究拒绝服务(DoS)攻击,确定了选择兼容IDS时应考虑的因素,并给出了一些我们认为对基于6LoWPAN-RPL网络有效的解决方案。关键词:RPL, ROLL, 6LoWPAN, IDS, DoS,网络安全。
{"title":"Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions","authors":"A. Rghioui, Anass Khannous, M. Bouhorma","doi":"10.14419/JACST.V3I2.3321","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3321","url":null,"abstract":"RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet. In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks Keywords: RPL, ROLL, 6LoWPAN, IDS, DoS, Network security.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}