Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104805
C. Vargas, Michael Langfinger, B. Vogel‐Heuser
The discussion of threats and vulnerabilities in Industrial Control Systems has gained popularity during the last decade due to the increase in interest and growing concern to secure these systems. In order to provide an overview of the complete landscape of these threats and vulnerabilities this contribution provides a tiered security analysis of the assets that constitute Industrial Control Systems. The identification of assets is obtained from a generalization of the system's architecture. Additionally, the security analysis is complemented by discussing security countermeasures and solutions that can be used to counteract the vulnerabilities and increase the security of control systems.
{"title":"A tiered security analysis of Industrial Control System Devices","authors":"C. Vargas, Michael Langfinger, B. Vogel‐Heuser","doi":"10.1109/INDIN.2017.8104805","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104805","url":null,"abstract":"The discussion of threats and vulnerabilities in Industrial Control Systems has gained popularity during the last decade due to the increase in interest and growing concern to secure these systems. In order to provide an overview of the complete landscape of these threats and vulnerabilities this contribution provides a tiered security analysis of the assets that constitute Industrial Control Systems. The identification of assets is obtained from a generalization of the system's architecture. Additionally, the security analysis is complemented by discussing security countermeasures and solutions that can be used to counteract the vulnerabilities and increase the security of control systems.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"20 1","pages":"399-404"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83160242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104765
Sean W. Pritchard, G. Hancke, A. Abu-Mahfouz
A Software-Defined Wireless Sensor Network (SD-WSN) is a recently developed model which is expected to play a large role not only in the development of the Internet of Things (IoT) paradigm but also as a platform for other applications such as smart water management. This model makes use of a Software-Defined Networking (SDN) approach to manage a Wireless Sensor Network (WSN) in order to solve most of the inherent issues surrounding WSNs. One of the most important aspects of any network, is security. This is an area that has received little attention within the development of SDWSNs, as most research addresses security concerns within SDN and WSNs independently. There is a need for research into the security of SDWSN. Some concepts from both SDN and WSN security can be adjusted to suit the SDWSN model while others cannot. Further research is needed into consolidating SDN and WSN security measures to consider security in SDWSN. Threats, challenges and potential solutions to securing SDWSN are presented by considering both the WSN and SDN paradigms.
{"title":"Security in software-defined wireless sensor networks: Threats, challenges and potential solutions","authors":"Sean W. Pritchard, G. Hancke, A. Abu-Mahfouz","doi":"10.1109/INDIN.2017.8104765","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104765","url":null,"abstract":"A Software-Defined Wireless Sensor Network (SD-WSN) is a recently developed model which is expected to play a large role not only in the development of the Internet of Things (IoT) paradigm but also as a platform for other applications such as smart water management. This model makes use of a Software-Defined Networking (SDN) approach to manage a Wireless Sensor Network (WSN) in order to solve most of the inherent issues surrounding WSNs. One of the most important aspects of any network, is security. This is an area that has received little attention within the development of SDWSNs, as most research addresses security concerns within SDN and WSNs independently. There is a need for research into the security of SDWSN. Some concepts from both SDN and WSN security can be adjusted to suit the SDWSN model while others cannot. Further research is needed into consolidating SDN and WSN security measures to consider security in SDWSN. Threats, challenges and potential solutions to securing SDWSN are presented by considering both the WSN and SDN paradigms.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"78 1","pages":"168-173"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77192714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104851
Marie Kiermeier, Horst Sauer, J. Wieghardt
In this work, we present a monitoring system for Self-Organizing Industrial Systems (SOIS). It is based on an anomaly detection approach which evaluates the movement of objects within a factory by putting them together from sub-trajectories. By introducing two metrics — relative user frequency and pathlet occurence per user — the existing method is extended so that not only anomalous trajectories and omitted production stations can be detected, but also loops, shifts in the load distribution and novel valid paths. For this purpose, suitable visualization techniques are presented: For loop detection the pathlet occurence per user is monitored and evaluated using box plots. Shifts in the load distribution and novel valid paths are detected using heat maps. The work-flow of the monitoring system is illustrated based on data which is generated by a simplified simulation model.
{"title":"Monitoring self-organizing industrial systems using sub-trajectory dictionaries","authors":"Marie Kiermeier, Horst Sauer, J. Wieghardt","doi":"10.1109/INDIN.2017.8104851","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104851","url":null,"abstract":"In this work, we present a monitoring system for Self-Organizing Industrial Systems (SOIS). It is based on an anomaly detection approach which evaluates the movement of objects within a factory by putting them together from sub-trajectories. By introducing two metrics — relative user frequency and pathlet occurence per user — the existing method is extended so that not only anomalous trajectories and omitted production stations can be detected, but also loops, shifts in the load distribution and novel valid paths. For this purpose, suitable visualization techniques are presented: For loop detection the pathlet occurence per user is monitored and evaluated using box plots. Shifts in the load distribution and novel valid paths are detected using heat maps. The work-flow of the monitoring system is illustrated based on data which is generated by a simplified simulation model.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"24 1","pages":"665-670"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82403172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104812
M. Nuschke
In recent years an increasing interest in power systems with a more decentralized grid control in terms of a cell oriented grid structure or microgrids can be observed. Therefore, new control and operation control strategies have to be developed to fulfil different requirements. The overall focus in this paper is the development, implementation and test of an operation control for black start and islanding condition in a microgrid (MG) as a technical feasibility study. Therefore, two different modes for power-sharing among the decentralised energy resources (DER) have been developed. Furthermore, the dependence of operation time on different factors such as the initial battery charge level, intermittent nature of renewable energy sources, load level and the blackout occurrence time has been investigated.
{"title":"Development of a microgrid controller for black start procedure and islanding operation","authors":"M. Nuschke","doi":"10.1109/INDIN.2017.8104812","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104812","url":null,"abstract":"In recent years an increasing interest in power systems with a more decentralized grid control in terms of a cell oriented grid structure or microgrids can be observed. Therefore, new control and operation control strategies have to be developed to fulfil different requirements. The overall focus in this paper is the development, implementation and test of an operation control for black start and islanding condition in a microgrid (MG) as a technical feasibility study. Therefore, two different modes for power-sharing among the decentralised energy resources (DER) have been developed. Furthermore, the dependence of operation time on different factors such as the initial battery charge level, intermittent nature of renewable energy sources, load level and the blackout occurrence time has been investigated.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"48 4","pages":"439-444"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91498289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104769
Nabil Zerrouki, F. Harrou, Ying Sun, A. Houacine
This paper presents a computer vision-based methodology for human action recognition. First, the shape based pose features are constructed based on area ratios to identify the human silhouette in images. The proposed features are invariance to translation and scaling. Once the human body features are extracted from videos, different human actions are learned individually on the training frames of each class. Then, we apply the Adaboost algorithm for the classification process. We assessed the proposed approach using the UR Fall Detection dataset. In this study six classes of activities are considered namely: walking, standing, bending, lying, squatting, and sitting. Results demonstrate the efficiency of the proposed methodology.
{"title":"Adaboost-based algorithm for human action recognition","authors":"Nabil Zerrouki, F. Harrou, Ying Sun, A. Houacine","doi":"10.1109/INDIN.2017.8104769","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104769","url":null,"abstract":"This paper presents a computer vision-based methodology for human action recognition. First, the shape based pose features are constructed based on area ratios to identify the human silhouette in images. The proposed features are invariance to translation and scaling. Once the human body features are extracted from videos, different human actions are learned individually on the training frames of each class. Then, we apply the Adaboost algorithm for the classification process. We assessed the proposed approach using the UR Fall Detection dataset. In this study six classes of activities are considered namely: walking, standing, bending, lying, squatting, and sitting. Results demonstrate the efficiency of the proposed methodology.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"28 1","pages":"189-193"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82321006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104884
Carlos A. Garcia, Esteban X. Castellanos, César Rosero, Carlos Sánchez, Marcelo V. García, F. Pérez, M. Marcos
A cyber-physical production system (CPPS) integrates capacities such as computing, storing and communication along with others in the physical world such as objects tracking and/or objects controlling. According to the Industrial Internet of Things (IIoT) concepts it is possible to infer that CPPS systems are normally connected to each other, and also connected to the virtual world of global digital networks. It is here where, introducing the IEC-61499 standard, will allow the CPPS to implement distributed, flexible and reconfigurable controllers. In the industrial context, the ISA-88 regulation offers a coherent set of standards and terminology for batch control and defines models: physical model, controlling model etc., for this kind of industries. That is why it is necessary to provide the industry with low-cost alternatives which could redirect the CPPS development to a new variety of devices. This paper proposes the development of the Function Blocks (FBs) networks needed in the integration of distributed control systems with the use of two embedded hardware like: BeagleBone Black and Raspberry PI; having the models presented in the ISA-88 standard as the base for developing the control algorithms encapsulated inside the FBs of control.
{"title":"CPPS on low cost devices for batch process under IEC-61499 and ISA-88","authors":"Carlos A. Garcia, Esteban X. Castellanos, César Rosero, Carlos Sánchez, Marcelo V. García, F. Pérez, M. Marcos","doi":"10.1109/INDIN.2017.8104884","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104884","url":null,"abstract":"A cyber-physical production system (CPPS) integrates capacities such as computing, storing and communication along with others in the physical world such as objects tracking and/or objects controlling. According to the Industrial Internet of Things (IIoT) concepts it is possible to infer that CPPS systems are normally connected to each other, and also connected to the virtual world of global digital networks. It is here where, introducing the IEC-61499 standard, will allow the CPPS to implement distributed, flexible and reconfigurable controllers. In the industrial context, the ISA-88 regulation offers a coherent set of standards and terminology for batch control and defines models: physical model, controlling model etc., for this kind of industries. That is why it is necessary to provide the industry with low-cost alternatives which could redirect the CPPS development to a new variety of devices. This paper proposes the development of the Function Blocks (FBs) networks needed in the integration of distributed control systems with the use of two embedded hardware like: BeagleBone Black and Raspberry PI; having the models presented in the ISA-88 standard as the base for developing the control algorithms encapsulated inside the FBs of control.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"18 1","pages":"855-860"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81930581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104894
F. Ribeiro, A. Rettberg, C. Pereira, S. Botelho, M. S. Soares
Real-time and embedded systems (RTES) encompass a variety of embedded and real-time properties and requirements which defines them. Timing behavior of RTES physical and logical subsystems is as important as their functional behavior. These systems must define, in addition to their functional properties, the control of several peripheral components, of their constraints, communication interfaces and temporal and non-functional requirements. Understanding the representation and treatment of several properties of real-time and embedded systems has direct influence in their development, reliability and safety. Therefore, it is pertinent to analyze the properties that represent this domain and to provide strategies for a complete definition of model elements'. This paper aims to provide guidelines for comprehension, application and possible adoption of the UML MARTE (Modelling and Analysis of RealTime and Embedded Systems) profile in specification, modeling and design of real-time and embedded properties of a system. The proposed design strategy is applied to a case study, in the domain of intelligent automation systems, in order to direct the adoption of the constructors of MARTE profile in other development contexts and to describe the semantics and syntax of these builders to strengthen their comprehensibility.
{"title":"Guidelines for using MARTE profile packages considering concerns of real-time embedded systems","authors":"F. Ribeiro, A. Rettberg, C. Pereira, S. Botelho, M. S. Soares","doi":"10.1109/INDIN.2017.8104894","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104894","url":null,"abstract":"Real-time and embedded systems (RTES) encompass a variety of embedded and real-time properties and requirements which defines them. Timing behavior of RTES physical and logical subsystems is as important as their functional behavior. These systems must define, in addition to their functional properties, the control of several peripheral components, of their constraints, communication interfaces and temporal and non-functional requirements. Understanding the representation and treatment of several properties of real-time and embedded systems has direct influence in their development, reliability and safety. Therefore, it is pertinent to analyze the properties that represent this domain and to provide strategies for a complete definition of model elements'. This paper aims to provide guidelines for comprehension, application and possible adoption of the UML MARTE (Modelling and Analysis of RealTime and Embedded Systems) profile in specification, modeling and design of real-time and embedded properties of a system. The proposed design strategy is applied to a case study, in the domain of intelligent automation systems, in order to direct the adoption of the constructors of MARTE profile in other development contexts and to describe the semantics and syntax of these builders to strengthen their comprehensibility.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"520 1","pages":"917-922"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77095038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104953
Kgaogelo S. Tshehla, Y. Hamam, A. Abu-Mahfouz
Monitoring of a Water Distribution Network (WDN) requires information about the present state of the network. Since all variables are usually not measurable directly, State estimation is employed. State estimation is a process of determining the unknown variables of a system based on the measurements and mathematical network model. Measurements are often noisy, but state estimation procedure makes use of a set of redundant measurements in order to filter out such errors and find an optimal estimate. This paper presents a literature review of static state estimation problem pertaining to Water distribution Networks.
{"title":"State estimation in water distribution network: A review","authors":"Kgaogelo S. Tshehla, Y. Hamam, A. Abu-Mahfouz","doi":"10.1109/INDIN.2017.8104953","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104953","url":null,"abstract":"Monitoring of a Water Distribution Network (WDN) requires information about the present state of the network. Since all variables are usually not measurable directly, State estimation is employed. State estimation is a process of determining the unknown variables of a system based on the measurements and mathematical network model. Measurements are often noisy, but state estimation procedure makes use of a set of redundant measurements in order to filter out such errors and find an optimal estimate. This paper presents a literature review of static state estimation problem pertaining to Water distribution Networks.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"20 1","pages":"1247-1252"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74018285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104806
Michael Sollfrank, Mina Fahimi Pirehgalin, B. Vogel‐Heuser
In the last decades, Networked Control Systems (NCS) has become a key aspect in different application domains of mechatronic technology (e.g. automotive, railway and industrial automation). This NCS consist of several control nodes equipped with sensors and actuators, which fulfill the specified control tasks and are interconnected by bus systems for realizing an efficient I/O communication between the end nodes and the controlling units. For some applications in these industries, where harm for human life is at risk by actions of the technical system, an architecture involving functional safety is mandatory (e.g. for certification). The development of today's mechatronic systems is widely supported by model-based engineering and design. Yet a model approach and modeling notation framework for designing the architecture of NCS in a functional safe manner is still lacking. In this paper, a notation is introduced describing the architecture, the time behavior and the safety requirements of such NCS. A Human-Robot-Collaboration system with safety aspects is proposed to evaluate the notation as a case study.
{"title":"Integration of safety aspects in modeling of Networked Control Systems","authors":"Michael Sollfrank, Mina Fahimi Pirehgalin, B. Vogel‐Heuser","doi":"10.1109/INDIN.2017.8104806","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104806","url":null,"abstract":"In the last decades, Networked Control Systems (NCS) has become a key aspect in different application domains of mechatronic technology (e.g. automotive, railway and industrial automation). This NCS consist of several control nodes equipped with sensors and actuators, which fulfill the specified control tasks and are interconnected by bus systems for realizing an efficient I/O communication between the end nodes and the controlling units. For some applications in these industries, where harm for human life is at risk by actions of the technical system, an architecture involving functional safety is mandatory (e.g. for certification). The development of today's mechatronic systems is widely supported by model-based engineering and design. Yet a model approach and modeling notation framework for designing the architecture of NCS in a functional safe manner is still lacking. In this paper, a notation is introduced describing the architecture, the time behavior and the safety requirements of such NCS. A Human-Robot-Collaboration system with safety aspects is proposed to evaluate the notation as a case study.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"22 1","pages":"405-412"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90750815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/INDIN.2017.8104757
Andreas Schwung, Alexander Elbel, Dorothea Schwung
This paper presents a novel approach for self-reconfiguration and plug-and-play control of modular production units. The approach is based on a service-oriented architecture which allows for a fully decentralized control and communication structure. Each system module is equipped with its own control system and communicates with other units by means of predefined service requests. Hence, the control of the overall system is solely executed by the modules own control and by the exchange of service requests of each station. The approach is implemented on a laboratory bulk good system typically used in the pharmaceutical industry with modular system structure. Results obtained from experiments underline the applicability of the approach.
{"title":"System reconfiguration of modular production units using a SOA-based control structure","authors":"Andreas Schwung, Alexander Elbel, Dorothea Schwung","doi":"10.1109/INDIN.2017.8104757","DOIUrl":"https://doi.org/10.1109/INDIN.2017.8104757","url":null,"abstract":"This paper presents a novel approach for self-reconfiguration and plug-and-play control of modular production units. The approach is based on a service-oriented architecture which allows for a fully decentralized control and communication structure. Each system module is equipped with its own control system and communicates with other units by means of predefined service requests. Hence, the control of the overall system is solely executed by the modules own control and by the exchange of service requests of each station. The approach is implemented on a laboratory bulk good system typically used in the pharmaceutical industry with modular system structure. Results obtained from experiments underline the applicability of the approach.","PeriodicalId":6595,"journal":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","volume":"17 1","pages":"121-126"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87518647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}