Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515783
Hamid Mohammed Almaden, A. F. Samaha Mansoor, Al-Hassan Al-Faith Al-Hassan, Gamer Al-TayebAhmad, A. K. Ali, Mysoon Siding Ali
Technological development is growing rapidly worldwide, so many machines, factories, and even homes use these technologies.The target of this paper is to avoid Cars congestion and long waiting in the queue of fuel pumps, excessive employment. The commission is not available financially. And lack of reliability in the sales system. The automatic implementation of the technological systems is very useful for the security and confidentiality of the mechanisms andfactories in particular with respect to access to devices and the user authorized to carry outspecific operations. In this work, an automatic fuel selling machine system is designed using the Radio Frequency Identification RFID device and The Internet of Things technology. The designed system is providing fast filling of fuel, ease in financial transactions, and more secure by checking the rights of access to the device using the RFID card read bythe reader. In addition, the system allows the possibility of monitoring the access to the fuel station and offer a special graphical user interface to the service provider.
{"title":"A low-cost fuel selling machines using RFID and IoT technology","authors":"Hamid Mohammed Almaden, A. F. Samaha Mansoor, Al-Hassan Al-Faith Al-Hassan, Gamer Al-TayebAhmad, A. K. Ali, Mysoon Siding Ali","doi":"10.1109/ICCCEEE.2018.8515783","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515783","url":null,"abstract":"Technological development is growing rapidly worldwide, so many machines, factories, and even homes use these technologies.The target of this paper is to avoid Cars congestion and long waiting in the queue of fuel pumps, excessive employment. The commission is not available financially. And lack of reliability in the sales system. The automatic implementation of the technological systems is very useful for the security and confidentiality of the mechanisms andfactories in particular with respect to access to devices and the user authorized to carry outspecific operations. In this work, an automatic fuel selling machine system is designed using the Radio Frequency Identification RFID device and The Internet of Things technology. The designed system is providing fast filling of fuel, ease in financial transactions, and more secure by checking the rights of access to the device using the RFID card read bythe reader. In addition, the system allows the possibility of monitoring the access to the fuel station and offer a special graphical user interface to the service provider.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73702779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/iccceee.2018.8515787
A. Hamid
Most of software development time is consumed in software evolution and maintenance so as to respond to the growing business needs and to fix the newly discovered bugs. In this paper an approach for software change request implementation is examined. Then a road map is developed to accelerate planning, analysis and decision making process a matter that reduces the implementation effort in terms of time and quality.
{"title":"Software Change Request: A Road Map for Implementation","authors":"A. Hamid","doi":"10.1109/iccceee.2018.8515787","DOIUrl":"https://doi.org/10.1109/iccceee.2018.8515787","url":null,"abstract":"Most of software development time is consumed in software evolution and maintenance so as to respond to the growing business needs and to fix the newly discovered bugs. In this paper an approach for software change request implementation is examined. Then a road map is developed to accelerate planning, analysis and decision making process a matter that reduces the implementation effort in terms of time and quality.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"76 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76443043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515834
Lubna Basheir
This paper reports the finding that power-law degree distributions are consistent in the AS-level Internet topology throughout its lifetime, mainly after Internet commercialization. This result is based on analyzing topology data collected by CAIDA from 2000 to 2017. Power-law degree distribution is an indicator of asymmetry between ASs in acquiring links. The continued presence of this asymmetry is graphically and quantitatively characterized using Lorenz curve and Gini coefficient. Results show that Gini coefficient has not changed significantly through Internet development, recording high values ranging between 0.80 and 0.84. The study concludes that degree distribution asymmetry is a persistent quality of the evolving AS-level Internet topology, making the Internet hierarchical structure inherent.
{"title":"Power-law Degree Distribution Consistency in the AS-level Internet Topology","authors":"Lubna Basheir","doi":"10.1109/ICCCEEE.2018.8515834","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515834","url":null,"abstract":"This paper reports the finding that power-law degree distributions are consistent in the AS-level Internet topology throughout its lifetime, mainly after Internet commercialization. This result is based on analyzing topology data collected by CAIDA from 2000 to 2017. Power-law degree distribution is an indicator of asymmetry between ASs in acquiring links. The continued presence of this asymmetry is graphically and quantitatively characterized using Lorenz curve and Gini coefficient. Results show that Gini coefficient has not changed significantly through Internet development, recording high values ranging between 0.80 and 0.84. The study concludes that degree distribution asymmetry is a persistent quality of the evolving AS-level Internet topology, making the Internet hierarchical structure inherent.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"42 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78165234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515836
S. M. S. Zobly, M. A. El-Fadel
The main problem in nuclear medicine imaging system is the resulting images degraded with large amounts of noise. In this work we want use four different enhancement methods to enhance whole-body bone scan image so as to reduce the noise from the image and improve the resolution to achieve a better image quality and maintain quality for accurate diagnosis. Different enhancement methods and two pair bone scan images used to perform this work. The enhancement algorithms are successfully demonstrated on real bone scan images.
{"title":"Whole-Body Bone Scan Image Enhancement Algorithms","authors":"S. M. S. Zobly, M. A. El-Fadel","doi":"10.1109/ICCCEEE.2018.8515836","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515836","url":null,"abstract":"The main problem in nuclear medicine imaging system is the resulting images degraded with large amounts of noise. In this work we want use four different enhancement methods to enhance whole-body bone scan image so as to reduce the noise from the image and improve the resolution to achieve a better image quality and maintain quality for accurate diagnosis. Different enhancement methods and two pair bone scan images used to perform this work. The enhancement algorithms are successfully demonstrated on real bone scan images.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"107 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77626689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515773
A. Hamid
Six Sigma is a problem solving methodology supported by set of techniques intended to improve business processes by reducing the probability of defect occurrence. The name Six Sigma is originated from the statistical term standard deviation (Greek letter sigma); this statistical term measures the variations in data. The first use of Six Sigma methodology targeted driving the processes toward six standard deviations between the mean and the nearest specification limit; this was the root for the name Six. This paper studies the application of Six Sigma methodology in software development since this methodology is proven in manufacturing as a method of eliminating defects in final products and reducing their variations.
{"title":"Application of Six Sigma Methodology in Software Development","authors":"A. Hamid","doi":"10.1109/ICCCEEE.2018.8515773","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515773","url":null,"abstract":"Six Sigma is a problem solving methodology supported by set of techniques intended to improve business processes by reducing the probability of defect occurrence. The name Six Sigma is originated from the statistical term standard deviation (Greek letter sigma); this statistical term measures the variations in data. The first use of Six Sigma methodology targeted driving the processes toward six standard deviations between the mean and the nearest specification limit; this was the root for the name Six. This paper studies the application of Six Sigma methodology in software development since this methodology is proven in manufacturing as a method of eliminating defects in final products and reducing their variations.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81739430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515765
Ayman Mohammed Muzzamail Albashear, H. Ali
this paper focuses on the effects of the TCP Initial Retransmission Timeout (RTO) and Round Trip Time (RTT) on one hand and the dictionary attack on the other hand. A dictionary attack model of two servers has been programmed and applied using TCL language. The delay time to find the correct password in the dictionary has been assigned to NS2 simulation network. The value of the initial RTO has been set to 0.5, 1, 3, 5, 10 seconds, with Round Trip Times (RTT) of 1, 5, 10, 20, and 50 milliseconds in the simulated network to study different situations. The results obtained were found to be consistent with previous findings associated to initial RTO values between 0.5s to Is for network performance. The additional values introduced here are for network security purposes as they represent the best values for which the attacker finds difficulty to accomplish dictionary attack.
{"title":"The Effect of the Initial Retransmission Timeout upon the Dictionary Attack Delay","authors":"Ayman Mohammed Muzzamail Albashear, H. Ali","doi":"10.1109/ICCCEEE.2018.8515765","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515765","url":null,"abstract":"this paper focuses on the effects of the TCP Initial Retransmission Timeout (RTO) and Round Trip Time (RTT) on one hand and the dictionary attack on the other hand. A dictionary attack model of two servers has been programmed and applied using TCL language. The delay time to find the correct password in the dictionary has been assigned to NS2 simulation network. The value of the initial RTO has been set to 0.5, 1, 3, 5, 10 seconds, with Round Trip Times (RTT) of 1, 5, 10, 20, and 50 milliseconds in the simulated network to study different situations. The results obtained were found to be consistent with previous findings associated to initial RTO values between 0.5s to Is for network performance. The additional values introduced here are for network security purposes as they represent the best values for which the attacker finds difficulty to accomplish dictionary attack.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"86 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515784
Ahmed Abdelkarim Yassin Abdelkarim, Mahmoud Esawi Babikir Osman, S. Babiker
Satellites play great role in our life; they are used to perform many tasks that couldn’t be achieved without them. When the satellite launch to its orbit and in order to achieve its mission, the satellite needs to communicate with the ground station to receive the commands and instructions and also send its information to the ground station, but the ground station can’t communicate with the satellite directly before precisely determine its location. Hence, the objective of this research is to design and implement satellite tracking model to determine and track precisely the position of the satellite in its orbit in order to allow the ground station to communicate directly with it using the Two Line Elements Set which are unique for each satellite and need to be accurately specified. This tracking model was designed and developed in three phases: inputs phase, prediction phase and outputs phase. It include graphical user interface that shows illustration of satellite position in its orbit and also shows the value of all necessary data that are required to track the satellite and to predict its motion track.
卫星在我们的生活中扮演着重要的角色;它们被用来完成许多没有它们就无法完成的任务。当卫星发射到轨道上,为了完成任务,卫星需要与地面站通信,接收命令和指令,并将其信息发送给地面站,但地面站在精确确定其位置之前无法与卫星直接通信。因此,本研究的目的是设计并实现卫星跟踪模型,以精确确定和跟踪卫星在其轨道上的位置,以便地面站使用每颗卫星唯一且需要精确指定的Two Line Elements Set与卫星直接通信。该跟踪模型分为三个阶段:输入阶段、预测阶段和输出阶段。它包括图形用户界面,显示卫星在轨道上的位置说明,并显示跟踪卫星和预测其运动轨迹所需的所有必要数据的值。
{"title":"Satellite Orbit Determination and Tracking Model Using Two-Line Elements Set","authors":"Ahmed Abdelkarim Yassin Abdelkarim, Mahmoud Esawi Babikir Osman, S. Babiker","doi":"10.1109/ICCCEEE.2018.8515784","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515784","url":null,"abstract":"Satellites play great role in our life; they are used to perform many tasks that couldn’t be achieved without them. When the satellite launch to its orbit and in order to achieve its mission, the satellite needs to communicate with the ground station to receive the commands and instructions and also send its information to the ground station, but the ground station can’t communicate with the satellite directly before precisely determine its location. Hence, the objective of this research is to design and implement satellite tracking model to determine and track precisely the position of the satellite in its orbit in order to allow the ground station to communicate directly with it using the Two Line Elements Set which are unique for each satellite and need to be accurately specified. This tracking model was designed and developed in three phases: inputs phase, prediction phase and outputs phase. It include graphical user interface that shows illustration of satellite position in its orbit and also shows the value of all necessary data that are required to track the satellite and to predict its motion track.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"116 2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76862624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515772
Omer Mohamed Elhassan Ahmed, Abdalla A. Osman, Sally Dafaalla Awadalkarim
In Sudan, unfortunately, farmers still use traditional methods of farming management leading to inputs wastages and low production due inaccurate types and amount of fertilizers applied to the field which depends upon soil analysis and plant yield. And the process of determining the type of fertilizers according to the soil analysis results takes a long time. The main objective of this paper is to overcome the above-mentioned problems by designing an automated fertigation system based on the internet of things (IoT). Water use efficiency (WUE) is achieved and controlled by using moisture sensor when the soil moisture drops below 30% is opened and closes when it reaches 70% (preset data according to plant needs). The fertilization control is the process of adjusting the potential of Hydrogen (pH) and soil electrical conductivity (EC) as in preset database and thereby acidity and alkalinity. In addition to that, the plant root zone is controlled as required. When the system is applied, it improves water and fertilizer use efficiencies and thus saves effort, money, time, energy, increases production, and productivity.
{"title":"A Design of an Automated Fertigation System Using IoT","authors":"Omer Mohamed Elhassan Ahmed, Abdalla A. Osman, Sally Dafaalla Awadalkarim","doi":"10.1109/ICCCEEE.2018.8515772","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515772","url":null,"abstract":"In Sudan, unfortunately, farmers still use traditional methods of farming management leading to inputs wastages and low production due inaccurate types and amount of fertilizers applied to the field which depends upon soil analysis and plant yield. And the process of determining the type of fertilizers according to the soil analysis results takes a long time. The main objective of this paper is to overcome the above-mentioned problems by designing an automated fertigation system based on the internet of things (IoT). Water use efficiency (WUE) is achieved and controlled by using moisture sensor when the soil moisture drops below 30% is opened and closes when it reaches 70% (preset data according to plant needs). The fertilization control is the process of adjusting the potential of Hydrogen (pH) and soil electrical conductivity (EC) as in preset database and thereby acidity and alkalinity. In addition to that, the plant root zone is controlled as required. When the system is applied, it improves water and fertilizer use efficiencies and thus saves effort, money, time, energy, increases production, and productivity.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"76 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77187701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515843
Nadia Mustafa Mohammed Alhag, Y. Mohamed
The Data Encryption Standard (DES) algorithm has been considered as the most popular symmetric key, blocks ciphering cryptographic. Even though the DES algorithm had still been used in some applications, it was considered unsafe because of the short key length (64 Bits), besides, the Brute force attack has shown that the DES practically can be attacked. In January 1999, the DES key was cracked in only (22 hours) and (15 minutes). The aim of this research is to improve the DES algorithm by increasing the key length (1024 bits) that is to be divided into 16 keys (64 bits each), each key is independently generated for the different algorithm cycles. The results of the proposed algorithm were much better than the old algorithm for detecting the encryption key or the total number of keys that could be generated by following Blind search method (try all possible keys), Increasing the key length (degree of complexity) makes it difficult to search in a vast space of numbers and attempts.
{"title":"An Enhancement of Data Encryption Standards Algorithm (DES)","authors":"Nadia Mustafa Mohammed Alhag, Y. Mohamed","doi":"10.1109/ICCCEEE.2018.8515843","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515843","url":null,"abstract":"The Data Encryption Standard (DES) algorithm has been considered as the most popular symmetric key, blocks ciphering cryptographic. Even though the DES algorithm had still been used in some applications, it was considered unsafe because of the short key length (64 Bits), besides, the Brute force attack has shown that the DES practically can be attacked. In January 1999, the DES key was cracked in only (22 hours) and (15 minutes). The aim of this research is to improve the DES algorithm by increasing the key length (1024 bits) that is to be divided into 16 keys (64 bits each), each key is independently generated for the different algorithm cycles. The results of the proposed algorithm were much better than the old algorithm for detecting the encryption key or the total number of keys that could be generated by following Blind search method (try all possible keys), Increasing the key length (degree of complexity) makes it difficult to search in a vast space of numbers and attempts.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78454767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515792
Abubakr Albashir, Kamal Abdellatif Sami, Mohammed Ahmedeltigani
The ionospheric propagation delay is one of the major error sources in GPS positioning. This effect is as a result of the fact that the GPS signals are affected by the ionized layer of the ionosphere. Subsequently, the signal reception time will be delayed, which causes an increase in the measured pseudo-ranges and phase measurements of GPS observables.In this paper the linear combination observables technique was used to estimate the ionospheric propagation delay effect on the measured pseudo-ranges and GPS point positioning. The use of the free linear combination technique was found to reduce the ionospheric propagation effects significantly.
{"title":"Enhancing The Accuracy of GPS Point Positioning by Modeling the Ionospheric Propagation Delay","authors":"Abubakr Albashir, Kamal Abdellatif Sami, Mohammed Ahmedeltigani","doi":"10.1109/ICCCEEE.2018.8515792","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515792","url":null,"abstract":"The ionospheric propagation delay is one of the major error sources in GPS positioning. This effect is as a result of the fact that the GPS signals are affected by the ionized layer of the ionosphere. Subsequently, the signal reception time will be delayed, which causes an increase in the measured pseudo-ranges and phase measurements of GPS observables.In this paper the linear combination observables technique was used to estimate the ionospheric propagation delay effect on the measured pseudo-ranges and GPS point positioning. The use of the free linear combination technique was found to reduce the ionospheric propagation effects significantly.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"340 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77664891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}