Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476062
J. Jansen, A. Rayes, E. Benkhelifa
There is a change happening with viewers. The nearly ubiquitous use of mobile devices combined with easy access to social media platforms is causing a unique social interaction with broadcast media and other events that alters the nature of being a viewer. Once a passive role, viewers are now participants around an event, engaging in information sharing, consumption, and dissemination in real time with an event. This technology affordance for online conversation about an event is referred to as the second screen phenomenon, although there may be multiple (i.e., more than two) screens involved. The resulting online conversation from second screen interaction about an event is referred to as the social soundtrack. The social soundtrack is an interesting conversational form of information sharing, information interaction, and information diffusion. This keynote will discuss the constructs and empirical measures of social soundtrack and second screen research, along with application of these constructs and measures in current investigations involving millions of posts on multiple social media platforms. Research concerning social soundtrack and second screen is important in identifying the influence and affordances that technology has on social media conversations from an information sharing. Empirical research results also provide insights on social communication in relationship to the cultural impact of broadcast events, the social interaction in cross technology usage for second screens, and the changing role of being a viewer.
{"title":"Keynote speech 1: The transformed nature of viewership","authors":"J. Jansen, A. Rayes, E. Benkhelifa","doi":"10.1109/IACS.2016.7476062","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476062","url":null,"abstract":"There is a change happening with viewers. The nearly ubiquitous use of mobile devices combined with easy access to social media platforms is causing a unique social interaction with broadcast media and other events that alters the nature of being a viewer. Once a passive role, viewers are now participants around an event, engaging in information sharing, consumption, and dissemination in real time with an event. This technology affordance for online conversation about an event is referred to as the second screen phenomenon, although there may be multiple (i.e., more than two) screens involved. The resulting online conversation from second screen interaction about an event is referred to as the social soundtrack. The social soundtrack is an interesting conversational form of information sharing, information interaction, and information diffusion. This keynote will discuss the constructs and empirical measures of social soundtrack and second screen research, along with application of these constructs and measures in current investigations involving millions of posts on multiple social media platforms. Research concerning social soundtrack and second screen is important in identifying the influence and affordances that technology has on social media conversations from an information sharing. Empirical research results also provide insights on social communication in relationship to the cultural impact of broadcast events, the social interaction in cross technology usage for second screens, and the changing role of being a viewer.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"189 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79498720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476077
T. Ozkul
In a world where business and life revolves around internet and computers, the quality of user-computer interfaces became very important. Designs of user interface become the utmost important issue since users, -which also happen to be customers-judge quality of a product by the ease of use of the product. Selection of menu language, placement of icons, buttons all contribute to the ease and intuitive nature of the interface which eventually determine the success of the software. With all this importance riding on the user quality, there needs to be an objective way of measuring quality of user interface. In this study we have developed an automatic assessment mechanism which predicts the quality of user interface by simply observing the behavior of the user while doing transactions with the computer. The index generated through this process is a relative value which can be used for comparing quality of similar software interfaces.
{"title":"Assessment of intelligence of user-computer interface","authors":"T. Ozkul","doi":"10.1109/IACS.2016.7476077","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476077","url":null,"abstract":"In a world where business and life revolves around internet and computers, the quality of user-computer interfaces became very important. Designs of user interface become the utmost important issue since users, -which also happen to be customers-judge quality of a product by the ease of use of the product. Selection of menu language, placement of icons, buttons all contribute to the ease and intuitive nature of the interface which eventually determine the success of the software. With all this importance riding on the user quality, there needs to be an objective way of measuring quality of user interface. In this study we have developed an automatic assessment mechanism which predicts the quality of user interface by simply observing the behavior of the user while doing transactions with the computer. The index generated through this process is a relative value which can be used for comparing quality of similar software interfaces.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82486580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476075
Mariam M. Biltawi, W. Etaiwi, Sara Tedmori, A. Hudaib, A. Awajan
With the advent of online data, sentiment analysis has received growing attention in recent years. Sentiment analysis aims to determine the overall sentiment orientation of a speaker or writer towards a specific entity or towards a specific feature of a specific entity. A fundamental task of sentiment analysis is sentiment classification, which aims to automatically classify opinionated text as being positive, negative, or neutral. Although the literature on sentiment classification is quite extensive, only a few endeavors to classify opinionated text written in the Arabic language can be found. This paper provides a comprehensive survey of existing lexicon, machine learning, and hybrid sentiment classification techniques for Arabic language.
{"title":"Sentiment classification techniques for Arabic language: A survey","authors":"Mariam M. Biltawi, W. Etaiwi, Sara Tedmori, A. Hudaib, A. Awajan","doi":"10.1109/IACS.2016.7476075","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476075","url":null,"abstract":"With the advent of online data, sentiment analysis has received growing attention in recent years. Sentiment analysis aims to determine the overall sentiment orientation of a speaker or writer towards a specific entity or towards a specific feature of a specific entity. A fundamental task of sentiment analysis is sentiment classification, which aims to automatically classify opinionated text as being positive, negative, or neutral. Although the literature on sentiment classification is quite extensive, only a few endeavors to classify opinionated text written in the Arabic language can be found. This paper provides a comprehensive survey of existing lexicon, machine learning, and hybrid sentiment classification techniques for Arabic language.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"339-346"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90499240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476117
Ahmad Amro, E. M. El-Alfy
Cryptanalysis combines a set of techniques and heuristics to reveal existing security flaws in a certain cryptographic scheme, for the sake of improvement or sometimes violation. In this paper, we analyze a newly proposed text cryptosystem that uses three different schemes for a pseudorandom number generator (PRNG). We show that two of the suggested methods are not secure against known-plaintext attacks. Moreover, we propose an improved symmetric-stream encryption method based on PRNG. We implemented the proposed method in MATLAB and evaluated it for various types of attacks and different sensitivity tests. The improved method was designed to overcome the security issues in the other methods. Especially the resiliency to known-plaintext attack. Furthermore, the results of the sensitivity tests show excellent level of randomness ranging from 40% to 50%.
{"title":"Known-plaintext attack and improvement of PRNG-based text encryption","authors":"Ahmad Amro, E. M. El-Alfy","doi":"10.1109/IACS.2016.7476117","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476117","url":null,"abstract":"Cryptanalysis combines a set of techniques and heuristics to reveal existing security flaws in a certain cryptographic scheme, for the sake of improvement or sometimes violation. In this paper, we analyze a newly proposed text cryptosystem that uses three different schemes for a pseudorandom number generator (PRNG). We show that two of the suggested methods are not secure against known-plaintext attacks. Moreover, we propose an improved symmetric-stream encryption method based on PRNG. We implemented the proposed method in MATLAB and evaluated it for various types of attacks and different sensitivity tests. The improved method was designed to overcome the security issues in the other methods. Especially the resiliency to known-plaintext attack. Furthermore, the results of the sensitivity tests show excellent level of randomness ranging from 40% to 50%.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"233-238"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88337748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476091
Yazan A. Jaradat, Ahmad T. Al-Taani
Text summarization is one of the most paramount applications of the field of natural language processing. This paper presents a Hybrid-based Single-document Extractive Arabic Text Summarization approach based on Genetic Algorithm. The proposed summarization approach was evaluated using EASC corpus, and ROUGE evaluation method to determine the accuracy of the proposed approach. The result showed that our method outperformed many state-of-the art methods.
{"title":"Hybrid-based Arabic single-document text summarization approach using genatic algorithm","authors":"Yazan A. Jaradat, Ahmad T. Al-Taani","doi":"10.1109/IACS.2016.7476091","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476091","url":null,"abstract":"Text summarization is one of the most paramount applications of the field of natural language processing. This paper presents a Hybrid-based Single-document Extractive Arabic Text Summarization approach based on Genetic Algorithm. The proposed summarization approach was evaluated using EASC corpus, and ROUGE evaluation method to determine the accuracy of the proposed approach. The result showed that our method outperformed many state-of-the art methods.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"25 1","pages":"85-91"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85951056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476094
A. Hossam-eldin, A. Lotfy, Mohammed Elgamal, Mohammed Ebeed
Voltage source converter (VSC) based multi-terminal HVDC systems (MTHVDC) require rigid detection and fault clearing techniques capable of detecting commonly occurring faults. Furthermore, reduction of installation cost implies minimizing the expensive current and voltage sensors. In this paper, a new observability analysis algorithm is proposed to obtain the minimum number of sensors and their placement, required to control and protect MTHVDC grid. The proposed algorithm is incorporated with a developed wavelet - fuzzy logic based protection algorithm to identify fault types and location with minimum number of sensors. A new software tool-box is created and applied to test systems to verify the validity and importance of the proposed algorithm.
{"title":"Protection oriented observability in multi-terminal HVDC systems","authors":"A. Hossam-eldin, A. Lotfy, Mohammed Elgamal, Mohammed Ebeed","doi":"10.1109/IACS.2016.7476094","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476094","url":null,"abstract":"Voltage source converter (VSC) based multi-terminal HVDC systems (MTHVDC) require rigid detection and fault clearing techniques capable of detecting commonly occurring faults. Furthermore, reduction of installation cost implies minimizing the expensive current and voltage sensors. In this paper, a new observability analysis algorithm is proposed to obtain the minimum number of sensors and their placement, required to control and protect MTHVDC grid. The proposed algorithm is incorporated with a developed wavelet - fuzzy logic based protection algorithm to identify fault types and location with minimum number of sensors. A new software tool-box is created and applied to test systems to verify the validity and importance of the proposed algorithm.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"309 1","pages":"102-108"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82884787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476076
Ines Berrazega, R. Faiz, Ghassan Mourad, A. Bouhafs
We present in this paper a linguistic method to automatically identify and semantically annotate the categories of normative provisions in Arabic legal texts. The proposed method is based on a contextual exploration of the discursive knowledge conveyed in the processed texts. Coupled to a taxonomy of Arabic normative provisions and a set of annotation rules, this method enables the semantic annotation of the normative provisions based on a surface analysis in order to extract a set of relevant linguistic markers having contextual dependencies. The performance of this method has been evaluated by developing a prototype to automatically identify the normative categories over a large set of Arabic normative texts collected from the Official Gazette of the Republic of Tunisia. Evaluation was conducted in terms of Precision, Recall and F-score. We obtained respectively 96,4%, 96,06% and 96,23% for Precision, Recall and F-score.
{"title":"A linguistic method for Arabic normative provisions' annotation based on contextual exploration","authors":"Ines Berrazega, R. Faiz, Ghassan Mourad, A. Bouhafs","doi":"10.1109/IACS.2016.7476076","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476076","url":null,"abstract":"We present in this paper a linguistic method to automatically identify and semantically annotate the categories of normative provisions in Arabic legal texts. The proposed method is based on a contextual exploration of the discursive knowledge conveyed in the processed texts. Coupled to a taxonomy of Arabic normative provisions and a set of annotation rules, this method enables the semantic annotation of the normative provisions based on a surface analysis in order to extract a set of relevant linguistic markers having contextual dependencies. The performance of this method has been evaluated by developing a prototype to automatically identify the normative categories over a large set of Arabic normative texts collected from the Official Gazette of the Republic of Tunisia. Evaluation was conducted in terms of Precision, Recall and F-score. We obtained respectively 96,4%, 96,06% and 96,23% for Precision, Recall and F-score.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"4 1","pages":"347-352"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90635469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476071
Khan Zeb, Basil AsSadhan, J. Al-Muhtadi, S. Alshebeili
The detection of anomalous behavior such as low volume attacks and abnormalities in today's large volume of Internet traffic has become a challenging problem in the network community. An efficient and real-time detection of anomaly traffic is crucial in order to rapidly diagnose and mitigate the anomaly, and to recover the resulting malfunction. In this paper, we present an efficient anomaly detection method based on the estimation of long-range dependence (LRD) behavior in packet and byte count of the aggregated control traffic. This method surrogates Internet aggregated whole traffic (i.e., control plus data) by the aggregated control traffic and detects anomaly traffic through the wavelet-based estimation of LRD behavior in the corresponding control traffic. Since Internet traffic exhibits LRD behavior during benign normal condition, deviation from this behavior can indicate an anomalous behavior. Experiments on the KSU dataset demonstrate that this method not only significantly improves the process of anomaly detection by considerably reducing the large-volume of traffic to be processed but also achieves a high detection effect. Because the control traffic constitute a small fraction of the whole traffic, and usually most of the attacks are manifested and carried out in the control traffic; therefore, surrogating the whole traffic by the control traffic increases the detection efficacy.
{"title":"Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic","authors":"Khan Zeb, Basil AsSadhan, J. Al-Muhtadi, S. Alshebeili","doi":"10.1109/IACS.2016.7476071","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476071","url":null,"abstract":"The detection of anomalous behavior such as low volume attacks and abnormalities in today's large volume of Internet traffic has become a challenging problem in the network community. An efficient and real-time detection of anomaly traffic is crucial in order to rapidly diagnose and mitigate the anomaly, and to recover the resulting malfunction. In this paper, we present an efficient anomaly detection method based on the estimation of long-range dependence (LRD) behavior in packet and byte count of the aggregated control traffic. This method surrogates Internet aggregated whole traffic (i.e., control plus data) by the aggregated control traffic and detects anomaly traffic through the wavelet-based estimation of LRD behavior in the corresponding control traffic. Since Internet traffic exhibits LRD behavior during benign normal condition, deviation from this behavior can indicate an anomalous behavior. Experiments on the KSU dataset demonstrate that this method not only significantly improves the process of anomaly detection by considerably reducing the large-volume of traffic to be processed but also achieves a high detection effect. Because the control traffic constitute a small fraction of the whole traffic, and usually most of the attacks are manifested and carried out in the control traffic; therefore, surrogating the whole traffic by the control traffic increases the detection efficacy.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"316-321"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78079397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476106
Mohamed El-Barbary, F. Newagy, I. Hafez
As OFDM has become the basis of many of telecommunication standards due to its ease of implementation, stability and efficiency, Faster-than-Nyquist signaling became an interesting base for envisioned telecommunication breakthrough, since it is based on an already used and successfully implemented technology which is OFDM, and it inherently obtains the legacy system merits, at the expense of system complexity. In this article we introduce signaling over none orthogonal carriers with a controllable orthogonality factor that optimizes channel usage based on channel quality feedback, with agility to cope with varying channels with rate higher that OFDM can tolerate.
{"title":"Performance of simplified Faster-than-Nyquist tranceiver","authors":"Mohamed El-Barbary, F. Newagy, I. Hafez","doi":"10.1109/IACS.2016.7476106","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476106","url":null,"abstract":"As OFDM has become the basis of many of telecommunication standards due to its ease of implementation, stability and efficiency, Faster-than-Nyquist signaling became an interesting base for envisioned telecommunication breakthrough, since it is based on an already used and successfully implemented technology which is OFDM, and it inherently obtains the legacy system merits, at the expense of system complexity. In this article we introduce signaling over none orthogonal carriers with a controllable orthogonality factor that optimizes channel usage based on channel quality feedback, with agility to cope with varying channels with rate higher that OFDM can tolerate.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"33 1","pages":"174-179"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88796004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476120
S. Khanji, Raja Jabir, Liza Ahmad, O. Alfandi, Huwida E. Said
Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal purposes but also used on a professional level. With the increase of electronic communication, spams have widely increased targeting individuals, having a doubtful intention such as stealing personal information to be misused or even to paralyze the Email system by injecting viruses. Therefore, to protect email users from spams and viruses, it is crucial to protect our SMTP server. In this paper, a case study is raised by configuring two SMTP servers and 6 different scenarios, for the purpose of evaluating and addressing email security issues. Various anti-spam and filtering techniques were highlighted and analyzed, along with reporting and visualizing functionalities to further assist system administrators to control and monitor SMTP server.
{"title":"Evaluation of Linux SMTP server security aspects — A case study","authors":"S. Khanji, Raja Jabir, Liza Ahmad, O. Alfandi, Huwida E. Said","doi":"10.1109/IACS.2016.7476120","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476120","url":null,"abstract":"Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal purposes but also used on a professional level. With the increase of electronic communication, spams have widely increased targeting individuals, having a doubtful intention such as stealing personal information to be misused or even to paralyze the Email system by injecting viruses. Therefore, to protect email users from spams and viruses, it is crucial to protect our SMTP server. In this paper, a case study is raised by configuring two SMTP servers and 6 different scenarios, for the purpose of evaluating and addressing email security issues. Various anti-spam and filtering techniques were highlighted and analyzed, along with reporting and visualizing functionalities to further assist system administrators to control and monitor SMTP server.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"252-257"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86943328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}