L. Kozubtsova, I. Kozubtsov, T. Tereshchenko, T. Bondarenko
{"title":"ABOUT THE CYBERSECURITY OF MILITARY PERSONNEL PLAYING GEOLOCATION GAMES WHILE STAYING AT DEPARTMENTAL CRITICAL INFORMATION INFRASTRUCTURE FACILITIES","authors":"L. Kozubtsova, I. Kozubtsov, T. Tereshchenko, T. Bondarenko","doi":"10.28925/2663-4023.2022.17.7690","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.7690","url":null,"abstract":"The subject of research in the scientific article is the state of cybersecurity of the Armed Forces of Ukraine from the gambling dependence of military personnel. Purpose of the article. Study of the psychological and pedagogical problem of gambling addiction among military personnel with the involvement of cellular communications as a new problem in ensuring cybersecurity of the Armed Forces of Ukraine. The result of the study. Sociological studies have shown that people spend more than four hours with their smartphones every day. Smartphone addiction, \"nomophobia\" is caused by the problem of excessive internet use or internet addiction disorder. Addiction occurs from games, game apps, and online games. This article discusses individual augmented reality geolocation games and their appeal. It is established that the imposition of geolocation games on military personnel is aimed at collecting confidential information about critical infrastructure facilities of the Armed Forces of Ukraine under vivid psychological pleasure. All of them are aimed at where to structure the cybersecurity system of the Armed Forces of Ukraine, and the leakage of geographic information from the location of military facilities is their natural appearance. scientific novelty. For the first time, it is proposed to include the psychological and pedagogical problem of gambling addiction of military personnel on cellular communications in the group of factors that cause cybersecurity violations in the Armed Forces of Ukraine. The practical significance of the obtained scientific result gives grounds for developing recommendations for preventing the leakage of confidential information and conducting explanatory work with the personnel of the Armed Forces of Ukraine about the dangerous consequences both personally for them and for state security through the use of intrusive geolocation games. The presented study does not exhaust all aspects of this problem. The theoretical and practical results obtained in the course of scientific research form the basis for its further study in various aspects.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Illia Laktionov, Andrii Kmit, I. Opirskyy, O. Harasymchuk
{"title":"RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR","authors":"Illia Laktionov, Andrii Kmit, I. Opirskyy, O. Harasymchuk","doi":"10.28925/2663-4023.2022.17.91111","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.91111","url":null,"abstract":"To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128596873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AUTOMATIC PILOT SYSTEM FOR UNMANNED OF AIRCRAFT IN THE ABSENCE OF RADIO COMMUNICATION","authors":"Tetyana Shabelnik, Serhii Krivenko, Olena Koneva","doi":"10.28925/2663-4023.2020.9.93103","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.93103","url":null,"abstract":"One of the most pressing problems of piloting unmanned aerial vehicles (UAV) in the absence of radio communication is considered in the article. Therefore, the aim of the article is to develop an algorithm and method of automatic piloting of UAV in terms of loss of radio control signal using the methods of technical vision. The most effective methods of tracking, identification and detection of landmarks are based on the comparison of reference information (database of known navigation objects) with the observation scene in real time.Working system of automatic piloting of UAVs in the conditions of loss of radio control signal or GPS-navigation developed. The hardware and software of the UAV provides full automatic control. The programming of the system consists of two stages: planning the flight task and calculating the trajectory of the UAV in flight. The planning of the flight task is carried out by setting the topographic landmarks and flight parameters in relation to them. At this stage, the criteria for the generalization of the various components of the landscape are formed and their division by gradations. This work is combined with the recognition of points with altitude marks, and fixing the heights of horizontal surfaces available in the area. All horizontal surfaces are tied with the shortest shooting strokes to at least of three points with elevations. The process of topography-based object selection is directly related to its segmentation, the results of which significantly affect the further process of image analysis and UAV control. The calibration of the starting point of the route occurs during the launch of the UAV. The control system automatically monitors the location of the UAV throughout the trajectory of the movement on a topographic basis relative to the prespecified landmarks. Structured shots of the terrain and topographic bases are compared during the flight. The algorithm is based on the comparison of geometric parameters of landmarks. The parameters of the geometric center O(x, y) and the area S are taken into account by such parameters. The control signal in the three axes OX, OY and OZ is determined for the first time by the method of least squares depending on the values of the calculated coefficients of the original equations.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
{"title":"WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION","authors":"S. Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova","doi":"10.28925/2663-4023.2020.10.184196","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.184196","url":null,"abstract":"According to the large number of cyber incidents that occur every day, the process of critical infrastructure protection is an important not only technical but also scientific task. However, not all states in the world have an opportunity to provide high-quality protection of such infrastructure at a high level. Based on the fact that the critical information infrastructure protection should be managed at the state level, states need to develop a regulatory framework to address the above issue. Considering the legal framework of Ukraine, as in most post-Soviet countries, there is no effective approach to the protection of critical information infrastructure, such as in the USA or in the EU. The legislation of Ukraine identifies only certain objects of the socio-economic sphere, emergencies where they can lead to socially dangerous consequences, while a single procedure for identification and classification of critical infrastructure is not developed. A number of basic terms in the field of critical infrastructure protection from cyber threats, including “critical infrastructure” term, remain normatively vague. The mechanism of organization of activity and interaction of state and private structures in the process of critical infrastructure protection needs scientific substantiation. In this paper, the analysis of the world’s best practices concerning critical information infrastructure protection was carried out, that allows to improve qualitatively, at the state legislative level and practice, process of critical information infrastructure protection of Ukraine.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liudmyla Hlynchuk, Tetiana Hryshanovych, A. Stupin
{"title":"IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES","authors":"Liudmyla Hlynchuk, Tetiana Hryshanovych, A. Stupin","doi":"10.28925/2663-4023.2021.14.118130","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.118130","url":null,"abstract":"This research dedicated to the review, implementation and analysis of the symmetric encryption algorithm, namely - DES (Data Encryption Standard) that encrypts and decrypts text information. For this algorithm represented not only a verbal description, but also schemes of its execution and examples of implementation. Intermediate results and the results of information encryption / decryption in the implemented algorithm were verified using examples, so we can assume that the algorithm implemented correctly. Comparison of the execution time for the DES algorithm proposed implementation made for two utilities. One of them is OpenSSL, developed using assembler and the capabilities of the C programming language. The other utility developed using programming language Java. The comparison was made according to three criteria: full time from the utility execution start to its completion; the time spent by the process to execute the utility (downtime and time when the processor perform other tasks not accounted); the time taken by the operating system to run a utility, such as reading or writing the file. The analysis showed that the total execution time is not equal to the total amount of time spent by both the processor and the operating system to execute the utilities. This is due to the following: the total execution time is the real time spent on the execution of the utility; it can measure with a stopwatch. Whereas the time spent by the processor to execute the utility is measured somewhat differently: if two cores execute the same utility for 1 second, the total execution time will be 2 seconds, although in fact one second of time has passed. From the comparison follows the next conclusion: the time spent on encryption is less than the time spent on decryption. The execution time for different utilities is different: the time for OpenSSL utility turned out to be the best, because such an implementation is most adapted to the hardware. The utility in Java turned out to be the worst in terms of execution time. We propose the implementation of the DES algorithm of the nearest execution time to the fastest of the considered. Because a number of hacking possibilities have been found for the symmetric encryption standard DES, in particular due to the small number of possible keys, there is a risk of overriding them. Therefore, to increase crypto currency, other versions of this algorithm have been developed: double DES (2DES), triple DES (3DES), DESX, G-DES. In the future, it is planned to develop a utility based on our proposed implementation of the DES algorithm and to demonstrate the operation of its modifications.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Tereikovskyi, Denys Chernyshev, O. Korchenko, L. Tereikovska, O. Tereikovskyi
{"title":"PROCEDURE FOR USING NEURAL NETWORKS FOR SEGMENTATION OF RASTER IMAGES","authors":"I. Tereikovskyi, Denys Chernyshev, O. Korchenko, L. Tereikovska, O. Tereikovskyi","doi":"10.28925/2663-4023.2022.18.2438","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.2438","url":null,"abstract":"Currently, means of semantic segmentation of images, based on the use of neural networks, are increasingly used in computer systems for various purposes. Despite significant successes in this field, one of the most important unsolved problems is the task of determining the type and parameters of convolutional neural networks, which are the basis of the encoder and decoder. As a result of the research, an appropriate procedure was developed that allows the neural network encoder and decoder to be adapted to the following conditions of the segmentation problem: image size, number of color channels, permissible minimum accuracy of segmentation, permissible maximum computational complexity of segmentation, the need to label segments, the need to select several segments, the need to select deformed, displaced and rotated objects, the maximum computational complexity of learning a neural network model is permissible; admissible training period of the neural network model. The implementation of the procedure of applying neural networks for image segmentation consists in the formation of the basic mathematical support, the construction of the main blocks and the general scheme of the procedure. The developed procedure was verified experimentally on examples of semantic segmentation of images containing objects such as a car. The obtained experimental results show that the application of the proposed procedure allows, avoiding complex long-term experiments, to build a neural network model that, with a sufficiently short training period, ensures the achievement of image segmentation accuracy of about 0.8, which corresponds to the best systems of a similar purpose. It is shown that the ways of further research in the direction of improving the methodological support of neural network segmentation of raster images should be correlated with the justified use of modern modules and mechanisms in the encoder and decoder, adapted to the significant conditions of the given task. For example, the use of the ResNet module allows you to increase the depth of the neural network due to the leveling of the gradient drop effect, and the Inception module provides a reduction in the number of weighting factors and the processing of objects of different sizes.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASSESSMENT OF THE PRECONDITIONS OF FORMATION OF THE METHODOLOGY OF ASSESSMENT OF INFORMATION RELIABILITY","authors":"Z. Brzhevska, R. Kyrychok","doi":"10.28925/2663-4023.2022.15.164174","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.164174","url":null,"abstract":"The conceptual model of information reliability includes information resources, sources of information, factors of information confrontation, sources of factors of information confrontation (threats to authenticity), goals of attackers, functions, methods and means of ensuring reliability, and reliability indicators. The reliability of information (the degree of trust in data) contained in information resources is largely determined by the quality of sources and the ability of individuals to influence information processes. However, the concept of reliability of information is often associated with the categories of integrity and availability of information resources. All this must be ensured in the functioning of the information space in conditions of accidental or intentional informational influences. A necessary condition for achieving the required level of reliability of information is the construction of a comprehensive system for ensuring the reliability of the information. Information space of enterprises exists in the system of commodity-money relations, which is based on the concept of economic efficiency and can not afford to spend uncontrollably and unreasonably material resources for any activities. As a result, the assessment of the level of reliability of information and decision-making on measures to improve it raise the concomitant task of assessing the economic effect of their implementation.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE","authors":"A. Andreichenko, S. Нorbachenko, O. Dykyi","doi":"10.28925/2663-4023.2020.10.4553","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.4553","url":null,"abstract":"The article provides a conceptual assessment of the existing definition of the term \"project\" and improved its management interpretation. The main essential characteristics of the project are formulated, the corresponding categorical device is given, which allows to systematize the project activity and adapt it to different objects of the application. In particular, an attempt was made to clarify the definition of the project in cybersecurity and cyberdefense. The processes influencing project activity at the level of the state, regions, and separate enterprises are defined. It is proved that although the problems of cybersecurity are gradually shifting to the state level in the context of national security, project activities in this area occur primarily at the level of the individual business. The peculiarities of cybersecurity projects such as increased level of state influence, the complexity of the initiation stage, critical implementation deadlines, significant budget differentiation, unlimited number of possible participants, high level of personalization, difficulty in calculating efficiency indicators are highlighted. The key tasks of project management in cybersecurity are defined: formulation of the main goal of the project and ranking of its goals, determination of necessary volumes and sources of financing, assessment of project risks, selection of project executors, scheduling of project implementation, resource requirements, control, etc. Proposals for optimizing project management processes in the field of cybersecurity have been formed. Emphasis is placed on the prospects of using consistent project management methods, due to simplified communication with customers, the ability to divide the process of implementing cybersecurity systems into certain stages, as well as to introduce an effective monitoring and control mechanism at these stages.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS OF DIGITAL CRYPTOCURRENCY MARKET FORECASTING METHODS AND MODELS","authors":"Bohdan Bebeshko","doi":"10.28925/2663-4023.2022.18.163174","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.163174","url":null,"abstract":"With the development of financial institutions, this application software and related information technologies are used not only by specialists, but also by ordinary citizens to solve tasks that a few years ago seemed to be within the competence of only mathematicians specializing, for example, in building forecasting models. It can be noted that the collaboration of IT with application software, as well as with the mathematical apparatus most typical for forecasting tasks, gives good results. In particular, this applies to the Central Bank market. The study is devoted to the problem of approaches to the selection of methods and strategies for analysis and forecasting of the central bank markets, which is an urgent issue today. Far from all possible methods and strategies have sufficient coverage in the scientific information space, which prompts the need to analyze and systematize already existing information in this field. Accordingly, basically. the purpose of the study is to analyze and systematize the theoretical foundations of existing approaches to forecasting the CCV market. An analysis and systematization of the theoretical foundations of existing approaches to forecasting the CCV market was carried out. Generalized advantages and disadvantages of structural methods and models used for making market forecasts were outlined. A comparative analysis of ANN models was carried out in terms of their use for market analysis tasks. Among the analyzed ANN models are the following: CNN-2l, CNN-3l, LSTM, sLSTM, BiLSTM, GRU, CLSTM, MLP and RFBNN. The analysis and testing of existing models provided results that provide a wide scope for further research and study.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS","authors":"S. Spasiteleva, Yulia Zhdanovа, Ivan Chychkan","doi":"10.28925/2663-4023.2019.6.122133","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.122133","url":null,"abstract":"The article deals with the security of universal data management systems. The analysis and classification of modern data management systems by different criteria has been made. Based on the analysis of the literature and the experience of creating corporate systems, two approaches to the organization of universal data management systems have been identified: the use of multimodel systems and integrated data management platforms. Based on the analysis of threats and data protection tools for database management systems SQL, NoSQL, NewSQL, Data Warehouse, Data Lake and data clouds, the main approaches to data protection of each product category have been identified. The current trends in the development of data management technologies and data security have been identified. The development of NoSQL, NewSQL systems and the exchange of functionalities between them has led to the development of systems, which have functions of many classes. The problems of data protection for multimodel database management systems and for integrated data platforms have been identified and ways to overcome the identified problems have been suggested. For a universal data management platform, it is not enough to combine security features of different types of DBMS but new approaches are needed. The Data Centric Security approach is suitable for integrated environments; it is focused on protecting critical data at all stages of their processing - from collection and transmission to analysis and deployment in data warehouses. The organization of access to data through logical data marts using semantic technologies, ontological data models provides the transformation of a set of different types of data into a single array by \"data virtualization\". The article has substantiated the relevance and feasibility of the use of cognitive technologies and artificial intelligence in the field of information security, which opened new opportunities for the creation of automated, \"smart\" security tools for data management systems. Such systems have the ability to self-analyse and configure. The use of machine learning technology allows to identify weaknesses in the database security system. The combination of intelligent security and management solutions with database technologies will allow developers to respond quickly to new challenges in the protection of integrated data management systems of various types.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}