Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522577
K. Kar, Srijan Datta, Manimala Pal, R. Ghatak
Wireless communication has captured the place which wired communication once held. One of the areas which has seen the large-scale implementation of wireless communication is the internet. People prefer to use wireless access to internet (WLAN) in place of wired and also expect the same level of service, reliability and performance as traditional wired networks provide. A common problem which is frequently noticed among WLAN users is the quality of signal or signal strength. To improve coverage in a particular area, many factors are to be simultaneously optimized. This paper presents indoor WLAN coverage analysis of the second floor of Electronics and Communication Engineering (ECE) Department of National Institute of Technology (NIT) Durgapur. The coverage calculation is based on the multiwall Motley-Keenan model. The Access Points (APs) which have been used are of the IEEE 802.11 n standard. A thorough analysis has been done to determine the setup of APs which would provide the best coverage in that floor.
{"title":"Motley Keenan model of in-building coverage analysis of IEEE 802.11n WLAN signal in electronics and communication engineering department of National Institute of Technology Durgapur","authors":"K. Kar, Srijan Datta, Manimala Pal, R. Ghatak","doi":"10.1109/MICROCOM.2016.7522577","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522577","url":null,"abstract":"Wireless communication has captured the place which wired communication once held. One of the areas which has seen the large-scale implementation of wireless communication is the internet. People prefer to use wireless access to internet (WLAN) in place of wired and also expect the same level of service, reliability and performance as traditional wired networks provide. A common problem which is frequently noticed among WLAN users is the quality of signal or signal strength. To improve coverage in a particular area, many factors are to be simultaneously optimized. This paper presents indoor WLAN coverage analysis of the second floor of Electronics and Communication Engineering (ECE) Department of National Institute of Technology (NIT) Durgapur. The coverage calculation is based on the multiwall Motley-Keenan model. The Access Points (APs) which have been used are of the IEEE 802.11 n standard. A thorough analysis has been done to determine the setup of APs which would provide the best coverage in that floor.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122642788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522528
Rupam Bhattacharya, H. Rahaman, P. Roy
Digital Micro fluidic based Biochips (DMFBs) in current years have provided an efficient alternative platform in the field of bio-chemical analysis, particularly for inexpensive, convenient, and not reusable devices mainly designed for medical diagnostic applications. For a major class of DMFBs droplet actuation is depend on the rule of electrowetting-on-dielectric, where separate droplets of nano liter volume can be manipulated using 2D array of electrodes. Most important design automation issues in DMFBs is the concurrent routing of droplets inside a 2D array. The reason of droplet steering is needed to plan the movement of a number of droplets in a time synchronized mode within a 2D array while minimizing resource consumption and within optimum latest arrival time. The droplets may be classified as homogeneous or heterogeneous. In case of heterogeneous droplet routing, major issue is the avoidance of cross contamination where as for homogeneous droplet routing sharing of electrodes among different route paths for minimum resource utilization remains the main focus. In our paper, we put forward an algorithm for routing of heterogeneous droplet inDMFBs. We further developed a routing simulator that graphically displays detailed route performance for heterogeneous droplets within a predefined DMFB layout. We have used benchmark suite I and III to analysis our algorithm.
{"title":"A new heterogeneous droplet routing technique and its simulator to improve route performance in digital microfluidic biochips","authors":"Rupam Bhattacharya, H. Rahaman, P. Roy","doi":"10.1109/MICROCOM.2016.7522528","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522528","url":null,"abstract":"Digital Micro fluidic based Biochips (DMFBs) in current years have provided an efficient alternative platform in the field of bio-chemical analysis, particularly for inexpensive, convenient, and not reusable devices mainly designed for medical diagnostic applications. For a major class of DMFBs droplet actuation is depend on the rule of electrowetting-on-dielectric, where separate droplets of nano liter volume can be manipulated using 2D array of electrodes. Most important design automation issues in DMFBs is the concurrent routing of droplets inside a 2D array. The reason of droplet steering is needed to plan the movement of a number of droplets in a time synchronized mode within a 2D array while minimizing resource consumption and within optimum latest arrival time. The droplets may be classified as homogeneous or heterogeneous. In case of heterogeneous droplet routing, major issue is the avoidance of cross contamination where as for homogeneous droplet routing sharing of electrodes among different route paths for minimum resource utilization remains the main focus. In our paper, we put forward an algorithm for routing of heterogeneous droplet inDMFBs. We further developed a routing simulator that graphically displays detailed route performance for heterogeneous droplets within a predefined DMFB layout. We have used benchmark suite I and III to analysis our algorithm.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127189160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the domain of Quantum Information processing (QIP), quantum clustering approach plays a vital role for processing information. The quantum clustering technique is basically used for providing effective information navigation and browsing mechanism. There are many classical approach of clustering the documents like k-means clustering algorithm, hierarchical clustering algorithm, information bottleneck clustering algorithm and many more. In this paper we proposed a clustering method which is based on quantum theory. For clustering the documents, such that which provides an agreeable result in comparison of existing classical approach.
{"title":"Documents clustering using quantum clustering algorithm","authors":"Rupam Bhagawati, Sahinur Rahman Laskar, Bhagaban Swain","doi":"10.1109/MICROCOM.2016.7522562","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522562","url":null,"abstract":"In the domain of Quantum Information processing (QIP), quantum clustering approach plays a vital role for processing information. The quantum clustering technique is basically used for providing effective information navigation and browsing mechanism. There are many classical approach of clustering the documents like k-means clustering algorithm, hierarchical clustering algorithm, information bottleneck clustering algorithm and many more. In this paper we proposed a clustering method which is based on quantum theory. For clustering the documents, such that which provides an agreeable result in comparison of existing classical approach.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522526
Syed Emdad Ullah, Tania Alauddin, Hasan U. Zaman
In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use e-commerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the under-developed world is not that great and there is a lot to desire for. This paper outlines different aspects of developing an e-commerce website and the optimum solution to the challenges involved in developing one. It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity. This no-nonsense method of developing an e-commerce website can be easily replicated and followed in developing e-commerce websites in the developing and under-developed countries where computing resources are scarce and expensive because of their socio-economic condition.
{"title":"Developing an E-commerce website","authors":"Syed Emdad Ullah, Tania Alauddin, Hasan U. Zaman","doi":"10.1109/MICROCOM.2016.7522526","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522526","url":null,"abstract":"In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use e-commerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the under-developed world is not that great and there is a lot to desire for. This paper outlines different aspects of developing an e-commerce website and the optimum solution to the challenges involved in developing one. It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity. This no-nonsense method of developing an e-commerce website can be easily replicated and followed in developing e-commerce websites in the developing and under-developed countries where computing resources are scarce and expensive because of their socio-economic condition.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"97 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522541
Jyotismita Chaki, R. Parekh, S. Bhattacharya
The current work proposes an approach for the recognition of plants from their digital leaf images using multiple visual features to handle heterogeneous plant types. Recognizing the fact that plant leaves can have a variety of recognizable features like color (green and non-green) and shape (simple and compound) and texture (vein structure patterns), a single set of features may not be efficient enough for complete recognition of heterogeneous plant types. Accordingly a layered architecture is proposed where each layer handles a specific type of visual characteristics using its own set of features to create a customized data model. Features from various layers are subsequently fed to an array of custom classifiers for a more robust recognition. In this work we enumerate on the color and shape layers only. A dataset involving 600 leaf images divided over 30 classes and including green, non-green, simple and compound leaves, is used to test the performance and effectiveness of the approach.
{"title":"Plant leaf recognition using a layered approach","authors":"Jyotismita Chaki, R. Parekh, S. Bhattacharya","doi":"10.1109/MICROCOM.2016.7522541","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522541","url":null,"abstract":"The current work proposes an approach for the recognition of plants from their digital leaf images using multiple visual features to handle heterogeneous plant types. Recognizing the fact that plant leaves can have a variety of recognizable features like color (green and non-green) and shape (simple and compound) and texture (vein structure patterns), a single set of features may not be efficient enough for complete recognition of heterogeneous plant types. Accordingly a layered architecture is proposed where each layer handles a specific type of visual characteristics using its own set of features to create a customized data model. Features from various layers are subsequently fed to an array of custom classifiers for a more robust recognition. In this work we enumerate on the color and shape layers only. A dataset involving 600 leaf images divided over 30 classes and including green, non-green, simple and compound leaves, is used to test the performance and effectiveness of the approach.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522506
Karima Haque, M. Khan, Narisha Nowrin, Hasan U. Zaman
This paper describes the design of a self-sufficient system for lighting street lights using piezoelectric renewable energy source. In modern times, renewable energy sources are more desirable because of the lack of more direct sources of energy. In this project, we make use of piezoelectric materials to generate practically usable electricity from wasted mechanical energy. Piezoelectric harvesters are becoming increasingly popular because the produced piezoelectricity now can supply up to 10-100's of W of available power. In this paper, we describe the use of full-wave bridge rectifiers to improve the power extraction capability from piezoelectric harvesters and the further steps required to provide sufficient energy to light up smart street lights.
{"title":"Smart street lights using piezoelectric materials","authors":"Karima Haque, M. Khan, Narisha Nowrin, Hasan U. Zaman","doi":"10.1109/MICROCOM.2016.7522506","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522506","url":null,"abstract":"This paper describes the design of a self-sufficient system for lighting street lights using piezoelectric renewable energy source. In modern times, renewable energy sources are more desirable because of the lack of more direct sources of energy. In this project, we make use of piezoelectric materials to generate practically usable electricity from wasted mechanical energy. Piezoelectric harvesters are becoming increasingly popular because the produced piezoelectricity now can supply up to 10-100's of W of available power. In this paper, we describe the use of full-wave bridge rectifiers to improve the power extraction capability from piezoelectric harvesters and the further steps required to provide sufficient energy to light up smart street lights.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522575
Pinky Khundrakpam, Manimala Pal, Pankaj Sarkar, R. Ghatak
A two order dual-band bandpass filter using a half-wavelength step impedance resonator to operate at the passbands 2.45 GHz and 5.45 GHz is proposed. Ground slots were embedded below the coupled line section to increase coupling that resulted in passbands of 560 MHz and 470 MHz. Four transmission zeroes obtained at 1.75 GHz, 3.79 GHz, 6.23 GHz and 9.34 GHz, near the two passband edges enhanced the filter selectivity. The detailed design process is presented.
{"title":"A dual wideband bandpass filter for WLAN and 5G Wi-Fi applications","authors":"Pinky Khundrakpam, Manimala Pal, Pankaj Sarkar, R. Ghatak","doi":"10.1109/MICROCOM.2016.7522575","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522575","url":null,"abstract":"A two order dual-band bandpass filter using a half-wavelength step impedance resonator to operate at the passbands 2.45 GHz and 5.45 GHz is proposed. Ground slots were embedded below the coupled line section to increase coupling that resulted in passbands of 560 MHz and 470 MHz. Four transmission zeroes obtained at 1.75 GHz, 3.79 GHz, 6.23 GHz and 9.34 GHz, near the two passband edges enhanced the filter selectivity. The detailed design process is presented.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522448
P. Dutta, M. Nachamai
Face detection is the primary approach of all fundamental problems of human computer interaction system (HCIS). This paper evaluates the performance of detection system on single face from stored videos that are stored in different file formats. Stored videos contain raw homemade datasets as well as ready-made datasets. This proposed work concludes detection percentage of face detection system in different video formats. The implementation is done in two phases. The raw homemade dataset is tested on .3gp, .avi, .mov,.mp4 and a ready-made dataset is tested on .wmv, .m4v, .asf, .mpg file formats. The coding part for face detection has been done in MATLAB R2013a. The detection of faces from video file was 72.79 % for homemade dataset and 82.78% for ready-made dataset.
{"title":"Detection of faces from video files with different file formats","authors":"P. Dutta, M. Nachamai","doi":"10.1109/MICROCOM.2016.7522448","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522448","url":null,"abstract":"Face detection is the primary approach of all fundamental problems of human computer interaction system (HCIS). This paper evaluates the performance of detection system on single face from stored videos that are stored in different file formats. Stored videos contain raw homemade datasets as well as ready-made datasets. This proposed work concludes detection percentage of face detection system in different video formats. The implementation is done in two phases. The raw homemade dataset is tested on .3gp, .avi, .mov,.mp4 and a ready-made dataset is tested on .wmv, .m4v, .asf, .mpg file formats. The coding part for face detection has been done in MATLAB R2013a. The detection of faces from video file was 72.79 % for homemade dataset and 82.78% for ready-made dataset.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116385785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522536
K. Kodur, Salam Thoi Thoi, W. Arif
One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.
{"title":"TOR hidden services for supervising remote embedded systems anonymously","authors":"K. Kodur, Salam Thoi Thoi, W. Arif","doi":"10.1109/MICROCOM.2016.7522536","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522536","url":null,"abstract":"One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522518
D. Ramesh, R. Priya
Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not solve the trust issues as well as attribute revocation problem. Although many multi-authority CP-ABE schemes have been proposed and solved the trust problem to some extent but failed to provide efficient attribute revocation and solution for system failure. This paper proposes a multi-authority scheme which can solve the trust issues, attribute revocation problem, and system failure.
外包数据的安全已成为云计算的核心问题。已经提出了许多安全模型,其中CP-ABE在该研究领域得到了广泛的应用。基于密文策略属性的加密(cipher - policy Attribute - Based Encryption, CP-ABE)被认为是云存储系统中实现细粒度数据访问的理想工具。现有的只有一个授权机构的CP-ABE方案不能解决信任问题和属性撤销问题。虽然已经提出了许多多权威CP-ABE方案,并在一定程度上解决了信任问题,但未能提供有效的属性撤销和系统故障解决方案。提出了一种解决信任问题、属性撤销问题和系统失效问题的多授权方案。
{"title":"Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage","authors":"D. Ramesh, R. Priya","doi":"10.1109/MICROCOM.2016.7522518","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522518","url":null,"abstract":"Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not solve the trust issues as well as attribute revocation problem. Although many multi-authority CP-ABE schemes have been proposed and solved the trust problem to some extent but failed to provide efficient attribute revocation and solution for system failure. This paper proposes a multi-authority scheme which can solve the trust issues, attribute revocation problem, and system failure.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}