Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397238
Heba Mostafa, A. Ali, Ghada El Taweal
In this paper, we propose a new hybrid method for image steganography by using discrete curvelet transform and least significant bit (LSB). The proposed method is called Hybrid Curvelet Transform and Least Significant Bit (HCTLSB). In HCTLSB, the curvelet denoising is applied as a preprocessing step in order to remove the noise from the cover image. The cover image is transformed by applying the discreet curvelet transform before embedding the secret data by using LSB technique. Invoking the curvelet transform in the proposed method can handle the curve discontinuities in the cover image to obtain a better quality and robustness image. The LSB technique is applied on the obtained discrete curvelet coefficients image to embed the secret data without making noticeable changes to the cover image. The general performance of the proposed method is tested on 10 cover and secret images and compared against two benchmark methods. The experimental results show that the proposed method is a promising method and can obtain results better than the other compared methods.
{"title":"Hybrid Curvelet Transform and Least Significant Bit for image steganography","authors":"Heba Mostafa, A. Ali, Ghada El Taweal","doi":"10.1109/INTELCIS.2015.7397238","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397238","url":null,"abstract":"In this paper, we propose a new hybrid method for image steganography by using discrete curvelet transform and least significant bit (LSB). The proposed method is called Hybrid Curvelet Transform and Least Significant Bit (HCTLSB). In HCTLSB, the curvelet denoising is applied as a preprocessing step in order to remove the noise from the cover image. The cover image is transformed by applying the discreet curvelet transform before embedding the secret data by using LSB technique. Invoking the curvelet transform in the proposed method can handle the curve discontinuities in the cover image to obtain a better quality and robustness image. The LSB technique is applied on the obtained discrete curvelet coefficients image to embed the secret data without making noticeable changes to the cover image. The general performance of the proposed method is tested on 10 cover and secret images and compared against two benchmark methods. The experimental results show that the proposed method is a promising method and can obtain results better than the other compared methods.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"25 1","pages":"300-305"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86087442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397246
Gamal F. Elhady, Medhat A. Tawfeek
Cloud computing are becoming the major source of computing. The core idea of this environment is managing and scheduling the available resources to provide service's needs. Servers in cloud may be physical or virtual machines accessed across the network. Selecting machines for executing a task in the cloud computing must be considered. They have to be selected according to its status and submitted tasks properties to exploit the efficiency of the resources. Cloud task scheduling is considered an NP-hard optimization problem, and many meta-heuristic algorithms are suitable to solve it. This paper investigates three possible approaches proposed for dynamic task scheduling in cloud computing. The three approaches are belonging to the field of swarm intelligence that is used to find solutions for difficult or impossible combinatorial problems. These approaches are inspired by ant colony behavior, the behavior of particle swarm and honeybee foraging behavior. The main goal is to provide an evaluation and comparative study of these approaches that are used to minimize the makespan of a given tasks set. Performance of the algorithms is simulated using toolkit package of CloudSim. Algorithms have been compared with each other and with the well-known existed algorithms for dynamic task scheduling problem. The results of the experiments are presented and the strengths of each algorithm are investigated. Experimental results show that the proposed approaches satisfy expectation, also proved that ABC algorithm is the superior than other algorithms.
{"title":"A comparative study into swarm intelligence algorithms for dynamic tasks scheduling in cloud computing","authors":"Gamal F. Elhady, Medhat A. Tawfeek","doi":"10.1109/INTELCIS.2015.7397246","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397246","url":null,"abstract":"Cloud computing are becoming the major source of computing. The core idea of this environment is managing and scheduling the available resources to provide service's needs. Servers in cloud may be physical or virtual machines accessed across the network. Selecting machines for executing a task in the cloud computing must be considered. They have to be selected according to its status and submitted tasks properties to exploit the efficiency of the resources. Cloud task scheduling is considered an NP-hard optimization problem, and many meta-heuristic algorithms are suitable to solve it. This paper investigates three possible approaches proposed for dynamic task scheduling in cloud computing. The three approaches are belonging to the field of swarm intelligence that is used to find solutions for difficult or impossible combinatorial problems. These approaches are inspired by ant colony behavior, the behavior of particle swarm and honeybee foraging behavior. The main goal is to provide an evaluation and comparative study of these approaches that are used to minimize the makespan of a given tasks set. Performance of the algorithms is simulated using toolkit package of CloudSim. Algorithms have been compared with each other and with the well-known existed algorithms for dynamic task scheduling problem. The results of the experiments are presented and the strengths of each algorithm are investigated. Experimental results show that the proposed approaches satisfy expectation, also proved that ABC algorithm is the superior than other algorithms.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"362-369"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91107366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397274
Eman Abd El Raoof Abas, H. Abdelkader, A. Keshk
Due to the growing of internet applications, the needs of internet security are increasing. Intrusion detection system is the primary approaches used for saving systems from internal and external intruders. Several techniques have been applied to intrusion detection system such as artificial neural Network, genetic algorithms, artificial immune system. Most researchers suggested improving the intrusion detection performance and accuracy. In this paper, we used artificial immune system network based intrusion detection. In our framework we suggest using GureKddcup database set for intrusion detection and apply R-chunk algorithm of artificial immune system technique, it is used for anomaly detection .An optimized feature selection of rough set theory used for enhancing time consuming.
{"title":"Artificial immune system based intrusion detection","authors":"Eman Abd El Raoof Abas, H. Abdelkader, A. Keshk","doi":"10.1109/INTELCIS.2015.7397274","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397274","url":null,"abstract":"Due to the growing of internet applications, the needs of internet security are increasing. Intrusion detection system is the primary approaches used for saving systems from internal and external intruders. Several techniques have been applied to intrusion detection system such as artificial neural Network, genetic algorithms, artificial immune system. Most researchers suggested improving the intrusion detection performance and accuracy. In this paper, we used artificial immune system network based intrusion detection. In our framework we suggest using GureKddcup database set for intrusion detection and apply R-chunk algorithm of artificial immune system technique, it is used for anomaly detection .An optimized feature selection of rough set theory used for enhancing time consuming.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"39 1 1","pages":"542-546"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91035121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397243
Omar Hussein, Nermin Hamza, H. Hefny
This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcessO system calls, otherwise child-process creation will fail. YSCM intercepts and verifies CreateProcessO system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, YSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries' attacks by preventing the operating system from loading and executing the new malicious child process. YSCM runs in a microkernel-based virtual machine in order to achieve two-fold advantages: (1) isolate security-critical information from probable adversaries' attacks; and (2) exploit security-related and performance-related advantages associated with thin virtual machine monitors. The expected effectiveness of YSCM is high since it is circumvention-proof, and precise in extracting the normal behavior of applications chosen to be monitored.
{"title":"A proposed approach to detect and thwart previously unknown code injection attacks","authors":"Omar Hussein, Nermin Hamza, H. Hefny","doi":"10.1109/INTELCIS.2015.7397243","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397243","url":null,"abstract":"This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcessO system calls, otherwise child-process creation will fail. YSCM intercepts and verifies CreateProcessO system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, YSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries' attacks by preventing the operating system from loading and executing the new malicious child process. YSCM runs in a microkernel-based virtual machine in order to achieve two-fold advantages: (1) isolate security-critical information from probable adversaries' attacks; and (2) exploit security-related and performance-related advantages associated with thin virtual machine monitors. The expected effectiveness of YSCM is high since it is circumvention-proof, and precise in extracting the normal behavior of applications chosen to be monitored.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"15 6 1","pages":"336-342"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81046731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397196
N. K. Kosovskii
Tools for description of bounds for word variable values are offered. The use of these descriptions provides the conditions of a problem belonging to the class P or to the class NP. NP-completeness of an unification problem is proved. The validity of the proved bounds may make possible to create effective algorithms for unification of word terms, used in such programming language as Refal.
{"title":"Computational complexity for some problems of two terms unification based on concatenation","authors":"N. K. Kosovskii","doi":"10.1109/INTELCIS.2015.7397196","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397196","url":null,"abstract":"Tools for description of bounds for word variable values are offered. The use of these descriptions provides the conditions of a problem belonging to the class P or to the class NP. NP-completeness of an unification problem is proved. The validity of the proved bounds may make possible to create effective algorithms for unification of word terms, used in such programming language as Refal.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"56-57"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79113582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397259
A. M. Rahma, May A. S. Rahma, Maryam A. S. Rahma
Kinetic analysis of the sport player performance is a very important operation for players and coaches, in order to fully understand player development and abilities. Commonly this operation is done by human observation and reviewing a large amount of recorded video. Problems with the traditional way are that this is time-consuming, inaccurate, mostly neither the players nor the coaches will be able to review the whole video content or part of the recorded video, and in some cases the reviewer may overlook some important details. This paper proposes a suggested computerized kinetic analysis for basketball free throw, the paper first detects the main positions of the free throw, then analyses the player performance based on the calculated Hu moment.
{"title":"Automated analysis for basketball free throw","authors":"A. M. Rahma, May A. S. Rahma, Maryam A. S. Rahma","doi":"10.1109/INTELCIS.2015.7397259","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397259","url":null,"abstract":"Kinetic analysis of the sport player performance is a very important operation for players and coaches, in order to fully understand player development and abilities. Commonly this operation is done by human observation and reviewing a large amount of recorded video. Problems with the traditional way are that this is time-consuming, inaccurate, mostly neither the players nor the coaches will be able to review the whole video content or part of the recorded video, and in some cases the reviewer may overlook some important details. This paper proposes a suggested computerized kinetic analysis for basketball free throw, the paper first detects the main positions of the free throw, then analyses the player performance based on the calculated Hu moment.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"22 12 1","pages":"447-453"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82918143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397233
M. Voskoglou
In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as assessment tools. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics. Our results are illustrated by three examples, through which the effectiveness of our new fuzzy assessment approach is validated compared to already established in earlier author's works assessment methods of the classical logic (calculation of the means, GPA index) and of the fuzzy logic (Trapezoidal Model).
{"title":"Fuzzy assessment processes","authors":"M. Voskoglou","doi":"10.1109/INTELCIS.2015.7397233","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397233","url":null,"abstract":"In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as assessment tools. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics. Our results are illustrated by three examples, through which the effectiveness of our new fuzzy assessment approach is validated compared to already established in earlier author's works assessment methods of the classical logic (calculation of the means, GPA index) and of the fuzzy logic (Trapezoidal Model).","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"272-280"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88801322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397199
T. Kosovskaya
Many artificial intelligence problems are NP-complete ones. To decrease the needed time of such a problem solving a method of extraction of sub-formulas characterizing the common features of objects under consideration is suggested. This method is based on the offered by the author notion of partial deduction. Repeated application of this procedure allows to form a level description of an object and of classes of objects. A model example of such a level description and the degree of steps number increasing is presented in the paper.
{"title":"Partial deduction in predicate calculus as a tool for artificial intelligence problem complexity decreasing","authors":"T. Kosovskaya","doi":"10.1109/INTELCIS.2015.7397199","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397199","url":null,"abstract":"Many artificial intelligence problems are NP-complete ones. To decrease the needed time of such a problem solving a method of extraction of sub-formulas characterizing the common features of objects under consideration is suggested. This method is based on the offered by the author notion of partial deduction. Repeated application of this procedure allows to form a level description of an object and of classes of objects. A model example of such a level description and the degree of steps number increasing is presented in the paper.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"73-76"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397237
Dejiu Chen, K. Meinke, Kenneth Ostberg, F. Asplund, Christoph Baumann
A system-of-systems (SoS) is inherently open in configuration and evolutionary in lifecycle. For the next generation of cooperative cyber-physical system-of-systems, safety and security constitute two key issues of public concern that affect the deployment and acceptance. In engineering, the openness and evolutionary nature also entail radical paradigm shifts. This paper presents one novel approach to the development of qualified cyber-physical system-of-systems, with Cooperative Intelligent Transport Systems (C-ITS) as one target. The approach, referred to as knowledge-in-the-loop, aims to allow a synergy of well-managed lifecycles, formal quality assurance, and smart system features. One research goal is to enable an evolutionary development with continuous and traceable flows of system rationale from design-time to post-deployment time and back, supporting automated knowledge inference and enrichment. Another research goal is to develop a formal approach to risk-aware dynamic treatment of safety and security as a whole in the context of system-of-systems. Key base technologies include: (1) EAST-ADL for the consolidation of system-wide concerns and for the creation of an ontology for advanced run-time decisions, (2) Learning Based-Testing for run-time and post-deployment model inference, safety monitoring and testing, (3) Provable Isolation for run-time attack detection and enforcement of security in real-time operating systems.
{"title":"A knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems","authors":"Dejiu Chen, K. Meinke, Kenneth Ostberg, F. Asplund, Christoph Baumann","doi":"10.1109/INTELCIS.2015.7397237","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397237","url":null,"abstract":"A system-of-systems (SoS) is inherently open in configuration and evolutionary in lifecycle. For the next generation of cooperative cyber-physical system-of-systems, safety and security constitute two key issues of public concern that affect the deployment and acceptance. In engineering, the openness and evolutionary nature also entail radical paradigm shifts. This paper presents one novel approach to the development of qualified cyber-physical system-of-systems, with Cooperative Intelligent Transport Systems (C-ITS) as one target. The approach, referred to as knowledge-in-the-loop, aims to allow a synergy of well-managed lifecycles, formal quality assurance, and smart system features. One research goal is to enable an evolutionary development with continuous and traceable flows of system rationale from design-time to post-deployment time and back, supporting automated knowledge inference and enrichment. Another research goal is to develop a formal approach to risk-aware dynamic treatment of safety and security as a whole in the context of system-of-systems. Key base technologies include: (1) EAST-ADL for the consolidation of system-wide concerns and for the creation of an ontology for advanced run-time decisions, (2) Learning Based-Testing for run-time and post-deployment model inference, safety monitoring and testing, (3) Provable Isolation for run-time attack detection and enforcement of security in real-time operating systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"48 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76353186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/INTELCIS.2015.7397253
T. Abdulaziz, I. Moawad, Wesal M. Abu-Alam
Decision makers in the tourism sector face real challenges. There is no chance to access a unified data source that can supply information to meet their inquiries and expectations. In this paper, we propose a data warehouse system for supporting the decision makers in the Egyptian tourism sector. The methodology followed to build this system is descried in details to guide the other developing countries who are trying to support their decision makers in the tourism sector by building a similar data warehouse system. In addition, we evaluated the tourism data warehouse system. The results of evaluation indicated that it can meet the needs and requirements of the decision makers in the tourism sector.
{"title":"Building data warehouse system for the tourism sector","authors":"T. Abdulaziz, I. Moawad, Wesal M. Abu-Alam","doi":"10.1109/INTELCIS.2015.7397253","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397253","url":null,"abstract":"Decision makers in the tourism sector face real challenges. There is no chance to access a unified data source that can supply information to meet their inquiries and expectations. In this paper, we propose a data warehouse system for supporting the decision makers in the Egyptian tourism sector. The methodology followed to build this system is descried in details to guide the other developing countries who are trying to support their decision makers in the tourism sector by building a similar data warehouse system. In addition, we evaluated the tourism data warehouse system. The results of evaluation indicated that it can meet the needs and requirements of the decision makers in the tourism sector.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"18 1","pages":"410-417"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74939881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}