Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522560
Arnab Rakshit, A. Banerjee, D. Tibarewala
HCI (Human Computer Interfacing) technology is now able to provide an alternative support to the speech disabled person who have undergone severe brain stroke or spinal cord injury. It has been presented here that amongst all bio potential signal Electro-Oculogram (EOG) signal has got the ability to represent all daily life characters which is most needed for communication. This paper is aimed to provide novel approach of rehabilitative HCI where it successfully classifies the numerical digits drawn by subject's eye movement and for achieving the result, electro-oculography sensors (dual channel) and amplifier has been designed, which is able to extract the sharp change of corneo retinal potential due to eyeball movement intended to draw a pattern (numeric digit, alphabet). The extracted signal has been processed and classified successfully with more than 90% accuracy rate and with suitable precision and sensitivity value. Here Power spectral density has been used as feature extractor and support vector machine with multilayer perceptron kernel function has been used as feature classifier. Performance of other classifiers also have been compared here. 12 healthy subjects took part in experiment and their eyeball movement signal has been acquired for distinguishing different numerical digits that are frequently needed for communication to external world.
{"title":"Electro-oculogram based digit recognition to design assitive communication system for speech disabled patients","authors":"Arnab Rakshit, A. Banerjee, D. Tibarewala","doi":"10.1109/MICROCOM.2016.7522560","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522560","url":null,"abstract":"HCI (Human Computer Interfacing) technology is now able to provide an alternative support to the speech disabled person who have undergone severe brain stroke or spinal cord injury. It has been presented here that amongst all bio potential signal Electro-Oculogram (EOG) signal has got the ability to represent all daily life characters which is most needed for communication. This paper is aimed to provide novel approach of rehabilitative HCI where it successfully classifies the numerical digits drawn by subject's eye movement and for achieving the result, electro-oculography sensors (dual channel) and amplifier has been designed, which is able to extract the sharp change of corneo retinal potential due to eyeball movement intended to draw a pattern (numeric digit, alphabet). The extracted signal has been processed and classified successfully with more than 90% accuracy rate and with suitable precision and sensitivity value. Here Power spectral density has been used as feature extractor and support vector machine with multilayer perceptron kernel function has been used as feature classifier. Performance of other classifiers also have been compared here. 12 healthy subjects took part in experiment and their eyeball movement signal has been acquired for distinguishing different numerical digits that are frequently needed for communication to external world.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522444
A. K. Mal, A. Mal
This paper demonstrates the design of analog circuits using simulated I/V data of a sample device (PMOS/NMOS), and estimation of transconductance (gm) from this plot using approximation. Proposed design technique is based on the fact that the ratio of transconductance (gm) is inversely proportional to the MOS gate-source voltage (VGS). From the amplifier specifications, bias current and the load (or DC drop across the load) are generally estimated which in-turn is used to predict the device size. Proposed method is not only technology independent, it is also free from complex mathematical expressions associated with the device as it employs plots generated from simulators, Instead of analytical methods usually based on square law, which is unfit to capture sub-micron characteristics. When simulator is incorporated in the design process, analysis of the designed circuit, using the same simulator, is expected to match the desired performance closely. Using this simple approach, design time becomes shorter and a workable design can be made very quickly. An example amplifier circuit is designed using the proposed method, and simulation results are presented.
{"title":"Amplifier design approximations in submicron CMOS","authors":"A. K. Mal, A. Mal","doi":"10.1109/MICROCOM.2016.7522444","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522444","url":null,"abstract":"This paper demonstrates the design of analog circuits using simulated I/V data of a sample device (PMOS/NMOS), and estimation of transconductance (gm) from this plot using approximation. Proposed design technique is based on the fact that the ratio of transconductance (gm) is inversely proportional to the MOS gate-source voltage (VGS). From the amplifier specifications, bias current and the load (or DC drop across the load) are generally estimated which in-turn is used to predict the device size. Proposed method is not only technology independent, it is also free from complex mathematical expressions associated with the device as it employs plots generated from simulators, Instead of analytical methods usually based on square law, which is unfit to capture sub-micron characteristics. When simulator is incorporated in the design process, analysis of the designed circuit, using the same simulator, is expected to match the desired performance closely. Using this simple approach, design time becomes shorter and a workable design can be made very quickly. An example amplifier circuit is designed using the proposed method, and simulation results are presented.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132038102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the domain of Quantum Information processing (QIP), quantum clustering approach plays a vital role for processing information. The quantum clustering technique is basically used for providing effective information navigation and browsing mechanism. There are many classical approach of clustering the documents like k-means clustering algorithm, hierarchical clustering algorithm, information bottleneck clustering algorithm and many more. In this paper we proposed a clustering method which is based on quantum theory. For clustering the documents, such that which provides an agreeable result in comparison of existing classical approach.
{"title":"Documents clustering using quantum clustering algorithm","authors":"Rupam Bhagawati, Sahinur Rahman Laskar, Bhagaban Swain","doi":"10.1109/MICROCOM.2016.7522562","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522562","url":null,"abstract":"In the domain of Quantum Information processing (QIP), quantum clustering approach plays a vital role for processing information. The quantum clustering technique is basically used for providing effective information navigation and browsing mechanism. There are many classical approach of clustering the documents like k-means clustering algorithm, hierarchical clustering algorithm, information bottleneck clustering algorithm and many more. In this paper we proposed a clustering method which is based on quantum theory. For clustering the documents, such that which provides an agreeable result in comparison of existing classical approach.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522526
Syed Emdad Ullah, Tania Alauddin, Hasan U. Zaman
In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use e-commerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the under-developed world is not that great and there is a lot to desire for. This paper outlines different aspects of developing an e-commerce website and the optimum solution to the challenges involved in developing one. It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity. This no-nonsense method of developing an e-commerce website can be easily replicated and followed in developing e-commerce websites in the developing and under-developed countries where computing resources are scarce and expensive because of their socio-economic condition.
{"title":"Developing an E-commerce website","authors":"Syed Emdad Ullah, Tania Alauddin, Hasan U. Zaman","doi":"10.1109/MICROCOM.2016.7522526","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522526","url":null,"abstract":"In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use e-commerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the under-developed world is not that great and there is a lot to desire for. This paper outlines different aspects of developing an e-commerce website and the optimum solution to the challenges involved in developing one. It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity. This no-nonsense method of developing an e-commerce website can be easily replicated and followed in developing e-commerce websites in the developing and under-developed countries where computing resources are scarce and expensive because of their socio-economic condition.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"97 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522541
Jyotismita Chaki, R. Parekh, S. Bhattacharya
The current work proposes an approach for the recognition of plants from their digital leaf images using multiple visual features to handle heterogeneous plant types. Recognizing the fact that plant leaves can have a variety of recognizable features like color (green and non-green) and shape (simple and compound) and texture (vein structure patterns), a single set of features may not be efficient enough for complete recognition of heterogeneous plant types. Accordingly a layered architecture is proposed where each layer handles a specific type of visual characteristics using its own set of features to create a customized data model. Features from various layers are subsequently fed to an array of custom classifiers for a more robust recognition. In this work we enumerate on the color and shape layers only. A dataset involving 600 leaf images divided over 30 classes and including green, non-green, simple and compound leaves, is used to test the performance and effectiveness of the approach.
{"title":"Plant leaf recognition using a layered approach","authors":"Jyotismita Chaki, R. Parekh, S. Bhattacharya","doi":"10.1109/MICROCOM.2016.7522541","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522541","url":null,"abstract":"The current work proposes an approach for the recognition of plants from their digital leaf images using multiple visual features to handle heterogeneous plant types. Recognizing the fact that plant leaves can have a variety of recognizable features like color (green and non-green) and shape (simple and compound) and texture (vein structure patterns), a single set of features may not be efficient enough for complete recognition of heterogeneous plant types. Accordingly a layered architecture is proposed where each layer handles a specific type of visual characteristics using its own set of features to create a customized data model. Features from various layers are subsequently fed to an array of custom classifiers for a more robust recognition. In this work we enumerate on the color and shape layers only. A dataset involving 600 leaf images divided over 30 classes and including green, non-green, simple and compound leaves, is used to test the performance and effectiveness of the approach.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522506
Karima Haque, M. Khan, Narisha Nowrin, Hasan U. Zaman
This paper describes the design of a self-sufficient system for lighting street lights using piezoelectric renewable energy source. In modern times, renewable energy sources are more desirable because of the lack of more direct sources of energy. In this project, we make use of piezoelectric materials to generate practically usable electricity from wasted mechanical energy. Piezoelectric harvesters are becoming increasingly popular because the produced piezoelectricity now can supply up to 10-100's of W of available power. In this paper, we describe the use of full-wave bridge rectifiers to improve the power extraction capability from piezoelectric harvesters and the further steps required to provide sufficient energy to light up smart street lights.
{"title":"Smart street lights using piezoelectric materials","authors":"Karima Haque, M. Khan, Narisha Nowrin, Hasan U. Zaman","doi":"10.1109/MICROCOM.2016.7522506","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522506","url":null,"abstract":"This paper describes the design of a self-sufficient system for lighting street lights using piezoelectric renewable energy source. In modern times, renewable energy sources are more desirable because of the lack of more direct sources of energy. In this project, we make use of piezoelectric materials to generate practically usable electricity from wasted mechanical energy. Piezoelectric harvesters are becoming increasingly popular because the produced piezoelectricity now can supply up to 10-100's of W of available power. In this paper, we describe the use of full-wave bridge rectifiers to improve the power extraction capability from piezoelectric harvesters and the further steps required to provide sufficient energy to light up smart street lights.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522575
Pinky Khundrakpam, Manimala Pal, Pankaj Sarkar, R. Ghatak
A two order dual-band bandpass filter using a half-wavelength step impedance resonator to operate at the passbands 2.45 GHz and 5.45 GHz is proposed. Ground slots were embedded below the coupled line section to increase coupling that resulted in passbands of 560 MHz and 470 MHz. Four transmission zeroes obtained at 1.75 GHz, 3.79 GHz, 6.23 GHz and 9.34 GHz, near the two passband edges enhanced the filter selectivity. The detailed design process is presented.
{"title":"A dual wideband bandpass filter for WLAN and 5G Wi-Fi applications","authors":"Pinky Khundrakpam, Manimala Pal, Pankaj Sarkar, R. Ghatak","doi":"10.1109/MICROCOM.2016.7522575","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522575","url":null,"abstract":"A two order dual-band bandpass filter using a half-wavelength step impedance resonator to operate at the passbands 2.45 GHz and 5.45 GHz is proposed. Ground slots were embedded below the coupled line section to increase coupling that resulted in passbands of 560 MHz and 470 MHz. Four transmission zeroes obtained at 1.75 GHz, 3.79 GHz, 6.23 GHz and 9.34 GHz, near the two passband edges enhanced the filter selectivity. The detailed design process is presented.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522448
P. Dutta, M. Nachamai
Face detection is the primary approach of all fundamental problems of human computer interaction system (HCIS). This paper evaluates the performance of detection system on single face from stored videos that are stored in different file formats. Stored videos contain raw homemade datasets as well as ready-made datasets. This proposed work concludes detection percentage of face detection system in different video formats. The implementation is done in two phases. The raw homemade dataset is tested on .3gp, .avi, .mov,.mp4 and a ready-made dataset is tested on .wmv, .m4v, .asf, .mpg file formats. The coding part for face detection has been done in MATLAB R2013a. The detection of faces from video file was 72.79 % for homemade dataset and 82.78% for ready-made dataset.
{"title":"Detection of faces from video files with different file formats","authors":"P. Dutta, M. Nachamai","doi":"10.1109/MICROCOM.2016.7522448","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522448","url":null,"abstract":"Face detection is the primary approach of all fundamental problems of human computer interaction system (HCIS). This paper evaluates the performance of detection system on single face from stored videos that are stored in different file formats. Stored videos contain raw homemade datasets as well as ready-made datasets. This proposed work concludes detection percentage of face detection system in different video formats. The implementation is done in two phases. The raw homemade dataset is tested on .3gp, .avi, .mov,.mp4 and a ready-made dataset is tested on .wmv, .m4v, .asf, .mpg file formats. The coding part for face detection has been done in MATLAB R2013a. The detection of faces from video file was 72.79 % for homemade dataset and 82.78% for ready-made dataset.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116385785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522536
K. Kodur, Salam Thoi Thoi, W. Arif
One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.
{"title":"TOR hidden services for supervising remote embedded systems anonymously","authors":"K. Kodur, Salam Thoi Thoi, W. Arif","doi":"10.1109/MICROCOM.2016.7522536","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522536","url":null,"abstract":"One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522518
D. Ramesh, R. Priya
Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not solve the trust issues as well as attribute revocation problem. Although many multi-authority CP-ABE schemes have been proposed and solved the trust problem to some extent but failed to provide efficient attribute revocation and solution for system failure. This paper proposes a multi-authority scheme which can solve the trust issues, attribute revocation problem, and system failure.
外包数据的安全已成为云计算的核心问题。已经提出了许多安全模型,其中CP-ABE在该研究领域得到了广泛的应用。基于密文策略属性的加密(cipher - policy Attribute - Based Encryption, CP-ABE)被认为是云存储系统中实现细粒度数据访问的理想工具。现有的只有一个授权机构的CP-ABE方案不能解决信任问题和属性撤销问题。虽然已经提出了许多多权威CP-ABE方案,并在一定程度上解决了信任问题,但未能提供有效的属性撤销和系统故障解决方案。提出了一种解决信任问题、属性撤销问题和系统失效问题的多授权方案。
{"title":"Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage","authors":"D. Ramesh, R. Priya","doi":"10.1109/MICROCOM.2016.7522518","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522518","url":null,"abstract":"Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not solve the trust issues as well as attribute revocation problem. Although many multi-authority CP-ABE schemes have been proposed and solved the trust problem to some extent but failed to provide efficient attribute revocation and solution for system failure. This paper proposes a multi-authority scheme which can solve the trust issues, attribute revocation problem, and system failure.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}