Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230706
B. Rindhe, J. Digge, S. K. Narayankhedkar
Orthogonal frequency division multiplexing (OFDM), a frequency division multiplexing scheme utilized as a digital multi-carrier modulation technique, implemented using optical fiber link for practical applications thereby developing optical OFDM using OptSim simulation. OFDM has many advantages over other modulation techniques such as a high resistance to inter-symbol interference (ISI) and it is robust against fading caused by multipath propagation. Optical fiber cable (OFC) as a transmission media is used for distortion less transmission of data at a very higher data speed. OFC cable has a lot of advantages over other media. And OFDM over OFC cable will provide data speeds at a very high speed and with very less losses. In this work optical transmitter and receiver for OFDM based optical network has designed for high speed data transmission over optical fiber. While modeling the system we have also used post, pre and symmetric compensation technique to reconfigure the bandwidth along with add drop multiplexer, tunable filters and optical amplifiers to achieve high performance with minimum distortion and low bit error rate (BER).
{"title":"Implementation of optical OFDM based system for optical networks","authors":"B. Rindhe, J. Digge, S. K. Narayankhedkar","doi":"10.1109/EIC.2015.7230706","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230706","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM), a frequency division multiplexing scheme utilized as a digital multi-carrier modulation technique, implemented using optical fiber link for practical applications thereby developing optical OFDM using OptSim simulation. OFDM has many advantages over other modulation techniques such as a high resistance to inter-symbol interference (ISI) and it is robust against fading caused by multipath propagation. Optical fiber cable (OFC) as a transmission media is used for distortion less transmission of data at a very higher data speed. OFC cable has a lot of advantages over other media. And OFDM over OFC cable will provide data speeds at a very high speed and with very less losses. In this work optical transmitter and receiver for OFDM based optical network has designed for high speed data transmission over optical fiber. While modeling the system we have also used post, pre and symmetric compensation technique to reconfigure the bandwidth along with add drop multiplexer, tunable filters and optical amplifiers to achieve high performance with minimum distortion and low bit error rate (BER).","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126318754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230704
M. Waghmare, K. Reddy
This paper revels a defected 2-D hexagonal lattice structure for large frequency range. The 2-D Plane wave expansion (PWE) method is used to investigate large frequency range. It has been shown theoretically that it is possible to obtain large frequency range by adjusting filling factor and absolute frequency.
{"title":"Analysisof Photonic bandgap structure in 2-D hexagonal and square lattice structure of photonic crystal","authors":"M. Waghmare, K. Reddy","doi":"10.1109/EIC.2015.7230704","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230704","url":null,"abstract":"This paper revels a defected 2-D hexagonal lattice structure for large frequency range. The 2-D Plane wave expansion (PWE) method is used to investigate large frequency range. It has been shown theoretically that it is possible to obtain large frequency range by adjusting filling factor and absolute frequency.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230712
Nikhil Gajra, S. Khan, Pradnya B. Rane
Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.
{"title":"Private cloud security: Secured user authentication by using enhanced hybrid algorithm","authors":"Nikhil Gajra, S. Khan, Pradnya B. Rane","doi":"10.1109/EIC.2015.7230712","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230712","url":null,"abstract":"Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132063719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230731
Rohini B. Varne, R. Mane
Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed
{"title":"CAPTCHA: A robust approach to resist online password guessing attacks","authors":"Rohini B. Varne, R. Mane","doi":"10.1109/EIC.2015.7230731","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230731","url":null,"abstract":"Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230732
Prasad V. Kalne, V. Kolhe
Use of Mobile devices and internet developed gradually into a ubiquitous network and web has taken an increasingly central role in our communication. Recently the emergence of intelligent, sophisticated attacks like DOS (Denial of Service) makes web services more vulnerable than ever. To handle the DOS attacks, CAPTCHAs are used as one of the standard security technology. CAPTCHAs generate grade tests that most humans can pass but current computer programs can't. Human users and automated scripts can be classified and CAPTCHA is one of the possible ways to classify them. Text based CAPTCHAs are used in many applications but they face a challenge due to language dependency. Dynamic image based CAPTCHAs can strength the robustness of CAPTCHAs. It improves the human success rate. The probability of a BOT hacking the system is considerably low as compared to existing text based CAPTCHA. In this paper, an image-based Avatar CAPTCHA for mobile devices has been proposed as a potential solution. The solution of CAPTCHA is that users must correctly identify visually distorted human faces embedded in a complex background without selecting any non-human Avatar face. With this proposed work, CAPTCHA service is hosted on cloud that will generate CAPTCHA on cloud, so it improves efficiency of CAPTCHA generation also reduces response time for the use to authenticate as human. The need for usability and presentation that is required for a mobile device is considered during implementation. The proposed algorithm generates a CAPTCHA that offers better accuracy and lower machine attack rates compared to existing approaches.
{"title":"A new avatar dynamic image based CAPTCHA service on cloud for Mobile devices","authors":"Prasad V. Kalne, V. Kolhe","doi":"10.1109/EIC.2015.7230732","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230732","url":null,"abstract":"Use of Mobile devices and internet developed gradually into a ubiquitous network and web has taken an increasingly central role in our communication. Recently the emergence of intelligent, sophisticated attacks like DOS (Denial of Service) makes web services more vulnerable than ever. To handle the DOS attacks, CAPTCHAs are used as one of the standard security technology. CAPTCHAs generate grade tests that most humans can pass but current computer programs can't. Human users and automated scripts can be classified and CAPTCHA is one of the possible ways to classify them. Text based CAPTCHAs are used in many applications but they face a challenge due to language dependency. Dynamic image based CAPTCHAs can strength the robustness of CAPTCHAs. It improves the human success rate. The probability of a BOT hacking the system is considerably low as compared to existing text based CAPTCHA. In this paper, an image-based Avatar CAPTCHA for mobile devices has been proposed as a potential solution. The solution of CAPTCHA is that users must correctly identify visually distorted human faces embedded in a complex background without selecting any non-human Avatar face. With this proposed work, CAPTCHA service is hosted on cloud that will generate CAPTCHA on cloud, so it improves efficiency of CAPTCHA generation also reduces response time for the use to authenticate as human. The need for usability and presentation that is required for a mobile device is considered during implementation. The proposed algorithm generates a CAPTCHA that offers better accuracy and lower machine attack rates compared to existing approaches.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230713
J. Jain, S. Khairnar
The aim of this paper is to introduce and investigate the class P(p,α,β,μ,λ) which consist of analytic and multivalent functions with negative coefficient in the unit disc, defined by hadamard product with Rafid operator. To obtain Coefficient bounds, extreme points, hadamard product, radius of starlikeness, convexity and close to convexity. Also to determine the distortion theorem using fractional techniques of this class.
{"title":"Applications of Rafid operator to analytic and multivalent functions with negative coefficient","authors":"J. Jain, S. Khairnar","doi":"10.1109/EIC.2015.7230713","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230713","url":null,"abstract":"The aim of this paper is to introduce and investigate the class P(p,α,β,μ,λ) which consist of analytic and multivalent functions with negative coefficient in the unit disc, defined by hadamard product with Rafid operator. To obtain Coefficient bounds, extreme points, hadamard product, radius of starlikeness, convexity and close to convexity. Also to determine the distortion theorem using fractional techniques of this class.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230702
K. Sharma, Ambika Verma, J. Kaur
Fountain Codes belongs to the class of rateless codes[4] which effectively improves the performance of systems used for wireless data transmission. In this paper, we present a quantitative analysis of Fountain Coded Orthogonal Frequency Division Multiplexing (OFDM) systems over Rician faded channel. Bit Error Rate (BER) performance evaluation and comparison is carried out for Fountain Coded and Convolution Coded OFDM systems. Utilizing this model we investigated the merits of Fountain Codes over OFDM and Convolution Codes, resulting in better system performance. The simulated results of OFDM system in terms of BER shows that Fountain Coded OFDM system has a coding gain of 3.25 dB as compared to Convolution Coded OFDM system.
喷泉码属于无速率码[4],它有效地提高了用于无线数据传输的系统的性能。本文对喷泉编码正交频分复用(Fountain Coded Orthogonal Frequency Division Multiplexing, OFDM)系统进行了定量分析。对喷泉编码和卷积编码OFDM系统的误码率性能进行了评价和比较。利用该模型研究了喷泉码相对于OFDM和卷积码的优点,从而获得更好的系统性能。对OFDM系统的误码率进行了仿真,结果表明:喷泉编码OFDM系统比卷积编码OFDM系统具有3.25 dB的编码增益。
{"title":"Performance analysis of Fountain Coded OFDM system over Rician fading channel","authors":"K. Sharma, Ambika Verma, J. Kaur","doi":"10.1109/EIC.2015.7230702","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230702","url":null,"abstract":"Fountain Codes belongs to the class of rateless codes[4] which effectively improves the performance of systems used for wireless data transmission. In this paper, we present a quantitative analysis of Fountain Coded Orthogonal Frequency Division Multiplexing (OFDM) systems over Rician faded channel. Bit Error Rate (BER) performance evaluation and comparison is carried out for Fountain Coded and Convolution Coded OFDM systems. Utilizing this model we investigated the merits of Fountain Codes over OFDM and Convolution Codes, resulting in better system performance. The simulated results of OFDM system in terms of BER shows that Fountain Coded OFDM system has a coding gain of 3.25 dB as compared to Convolution Coded OFDM system.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230735
P. Chandratre, U. Kulkarni
E-commerce web sites how to use web mining technology for providing security on e-commerce web sites. The connection between web mining security and ecommerce analyzed based on user behavior on web. Different web mining algorithms and security algorithm are used to provided security on e-commerce web sites. Based on customer behavior different web mining algorithms like page rank algorithm and trust rank algorithm is used for developing web mining framework in e-commerce web sites. This application will develop false hit database algorithm and nearest neighbor algorithm to provide security on e-commerce web site.
{"title":"Security issues related to web services in e-commerce","authors":"P. Chandratre, U. Kulkarni","doi":"10.1109/EIC.2015.7230735","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230735","url":null,"abstract":"E-commerce web sites how to use web mining technology for providing security on e-commerce web sites. The connection between web mining security and ecommerce analyzed based on user behavior on web. Different web mining algorithms and security algorithm are used to provided security on e-commerce web sites. Based on customer behavior different web mining algorithms like page rank algorithm and trust rank algorithm is used for developing web mining framework in e-commerce web sites. This application will develop false hit database algorithm and nearest neighbor algorithm to provide security on e-commerce web site.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230737
Nikita Haryani, Nishi Tikku, Dhanamma Jagli
The up-and-coming cloud computing model endeavors to deal with the explosive growth of web-connected devices and manage colossal amount of data and patron demands. Thereby, giving rise to the query whether this escalating load can be managed by this cloud model or not. Cloud workload management is one of the primary challenges which must be addressed in the cloud computing paradigm. Instantaneous and concurrent requests from various clients to access the cloud application over the internet can generate bottlenecks moreover delay in response. This Paper presents an efficient dynamic technique along with the system architecture to solve this issue and also utilization function is given to measure the cloud server utilization. It allocates the client requests systematically and uniformly with the help of Host Controller by checking certain parameters such as request rate and server utilization. An even distribution criterion is defined in order to check whether any server is overloaded or underloaded. Thus, the utilization and performance of the system will improve and response will be given quicker.
{"title":"Cloud workload management and utilization measurement using Host Controller and even distribution criterion","authors":"Nikita Haryani, Nishi Tikku, Dhanamma Jagli","doi":"10.1109/EIC.2015.7230737","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230737","url":null,"abstract":"The up-and-coming cloud computing model endeavors to deal with the explosive growth of web-connected devices and manage colossal amount of data and patron demands. Thereby, giving rise to the query whether this escalating load can be managed by this cloud model or not. Cloud workload management is one of the primary challenges which must be addressed in the cloud computing paradigm. Instantaneous and concurrent requests from various clients to access the cloud application over the internet can generate bottlenecks moreover delay in response. This Paper presents an efficient dynamic technique along with the system architecture to solve this issue and also utilization function is given to measure the cloud server utilization. It allocates the client requests systematically and uniformly with the help of Host Controller by checking certain parameters such as request rate and server utilization. An even distribution criterion is defined in order to check whether any server is overloaded or underloaded. Thus, the utilization and performance of the system will improve and response will be given quicker.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230750
Nikhita Mangaonkar, Pooja Sabhani, S. Sirsat
Electronic waste or e-waste is one of the fast growing problems of the world. E-waste consists of variety of components, containing toxic substances which lead to environment and health hazards if not handled properly. It is important to find out what is the main source of this e-waste with the help of GIS and how we can minimize the e-wastage through green technology. This paper provides a concise overview of Mumbai's current e-waste scenario, namely to locate the source of e-wastage, environmental and health hazards, green technology methods to reduce the e-wastage.
{"title":"Green Technology for avoiding E-waste with the help of GIS","authors":"Nikhita Mangaonkar, Pooja Sabhani, S. Sirsat","doi":"10.1109/EIC.2015.7230750","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230750","url":null,"abstract":"Electronic waste or e-waste is one of the fast growing problems of the world. E-waste consists of variety of components, containing toxic substances which lead to environment and health hazards if not handled properly. It is important to find out what is the main source of this e-waste with the help of GIS and how we can minimize the e-wastage through green technology. This paper provides a concise overview of Mumbai's current e-waste scenario, namely to locate the source of e-wastage, environmental and health hazards, green technology methods to reduce the e-wastage.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}