Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522556
Surajit Mondal, D. K. Pratihar
This paper presents a fuzzy logic-based formation control scheme for a group of wheeled mobile robots. A new control logic is proposed to counter the problem of formation shape control. Two separate fuzzy logic controllers for direct go-to-goal and collision avoidance are developed for two different behaviors of mobile robots. The details of the data base and rule base of the fuzzy logic controllers are provided. A simple switch is used to fuse these two logics. The comprehensive simulation details with results are presented, where the robots' trajectories are investigated carefully. Thus, the performance of the developed algorithm has been successfully tested through computer simulations.
{"title":"Fuzzy logic-based group formation control of multiple wheeled robots","authors":"Surajit Mondal, D. K. Pratihar","doi":"10.1109/MICROCOM.2016.7522556","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522556","url":null,"abstract":"This paper presents a fuzzy logic-based formation control scheme for a group of wheeled mobile robots. A new control logic is proposed to counter the problem of formation shape control. Two separate fuzzy logic controllers for direct go-to-goal and collision avoidance are developed for two different behaviors of mobile robots. The details of the data base and rule base of the fuzzy logic controllers are provided. A simple switch is used to fuse these two logics. The comprehensive simulation details with results are presented, where the robots' trajectories are investigated carefully. Thus, the performance of the developed algorithm has been successfully tested through computer simulations.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116141961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522565
Snehalika Lall, Rimita Lahiri, A. Konar, Sanchita Ghosh
The k-means clustering fails to correctly cluster the data points in high dimensional space, primarily for employing Euclidean norm as the distance metric. The Euclidean metric increases with the increase in data dimension, thus posing difficulty to segregate intra-cluster and inter-cluster data points. Adoption of k-means clustering, realized with Euclidean distance norm, often misguides the selection of cluster centres in a given iteration. This paper proposes a novel approach to k-means clustering algorithm by replacing the Euclidean distance metric by a new one. The merit of the proposed metric lies in keeping the distance low, even for large dimensional data points. The new metric enables the algorithm to correctly select the cluster centres over the iterations. Experiments undertaken revealed that the said distance metric based k-means clustering outperforms the traditional one by a large margin.
{"title":"An improved measure for data clustering in high dimensional space","authors":"Snehalika Lall, Rimita Lahiri, A. Konar, Sanchita Ghosh","doi":"10.1109/MICROCOM.2016.7522565","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522565","url":null,"abstract":"The k-means clustering fails to correctly cluster the data points in high dimensional space, primarily for employing Euclidean norm as the distance metric. The Euclidean metric increases with the increase in data dimension, thus posing difficulty to segregate intra-cluster and inter-cluster data points. Adoption of k-means clustering, realized with Euclidean distance norm, often misguides the selection of cluster centres in a given iteration. This paper proposes a novel approach to k-means clustering algorithm by replacing the Euclidean distance metric by a new one. The merit of the proposed metric lies in keeping the distance low, even for large dimensional data points. The new metric enables the algorithm to correctly select the cluster centres over the iterations. Experiments undertaken revealed that the said distance metric based k-means clustering outperforms the traditional one by a large margin.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121628683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522587
Snehalika Lall, A. Sadhu, A. Konar, K. K. Mallik, Sanchita Ghosh
Frequency spectra are nowadays getting overcrowded because of increasing cell phone users. Cognitive radio network offers an alternative modality to utilize unused spectra efficiently among unlicensed users. This paper attempts to allocate transmission power among cognitive users in an efficient way without creating interference to the licensed users. We here adopt multi-agent reinforcement learning for cooperative power allocation in cognitive radio network. Multi-agent learning is here used to handle stochastic behavior of the environment. We use three mixed strategies (Correlated equilibrium) to control transmission power in multi-agent learning. After the learning algorithm converges, we obtain the optimum power level under different situations for subsequent use in power utilization during communication. Experimental results indicate that the proposed algorithm outperforms its classical counterparts by a significant margin.
{"title":"Multi-agent reinfocement learning for stochastic power management in cognitive radio network","authors":"Snehalika Lall, A. Sadhu, A. Konar, K. K. Mallik, Sanchita Ghosh","doi":"10.1109/MICROCOM.2016.7522587","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522587","url":null,"abstract":"Frequency spectra are nowadays getting overcrowded because of increasing cell phone users. Cognitive radio network offers an alternative modality to utilize unused spectra efficiently among unlicensed users. This paper attempts to allocate transmission power among cognitive users in an efficient way without creating interference to the licensed users. We here adopt multi-agent reinforcement learning for cooperative power allocation in cognitive radio network. Multi-agent learning is here used to handle stochastic behavior of the environment. We use three mixed strategies (Correlated equilibrium) to control transmission power in multi-agent learning. After the learning algorithm converges, we obtain the optimum power level under different situations for subsequent use in power utilization during communication. Experimental results indicate that the proposed algorithm outperforms its classical counterparts by a significant margin.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522435
Soumit Chowdhury, N. Ghoshal
The paper highlights a novel transformation based differently coded separate image bit watermarking concept with various series of secret bit sequencing for the multiple hidden images achieving stronger robustness and authentication scenarios. First three pixel bytes of the 2×2 non-overlapping sub blocks of the cover image is mutually transformed followed by the distinct encoding of the resultant integer values whereas the fourth pixel byte is spatially coded for single bit hiding on each of them. Randomized position and range driven bit insertions are adopted on these integer bytes for tackling the secure coding cum robustness issues against attacks. Reverse transformation on the bit embedded first three pixel bytes would actually ensure spatial watermarked values while the receiver exercises the same forward block transformation and respective decoding mechanism to extract the hidden bits. Experimental results have confirmed better watermark imperceptibility and robustness against attacks suiting the scheme for public mobile applications.
{"title":"Block transformed with distinctly coded multiple image bit watermarking for secure mobile communication (BTDCMIBWSMC)","authors":"Soumit Chowdhury, N. Ghoshal","doi":"10.1109/MICROCOM.2016.7522435","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522435","url":null,"abstract":"The paper highlights a novel transformation based differently coded separate image bit watermarking concept with various series of secret bit sequencing for the multiple hidden images achieving stronger robustness and authentication scenarios. First three pixel bytes of the 2×2 non-overlapping sub blocks of the cover image is mutually transformed followed by the distinct encoding of the resultant integer values whereas the fourth pixel byte is spatially coded for single bit hiding on each of them. Randomized position and range driven bit insertions are adopted on these integer bytes for tackling the secure coding cum robustness issues against attacks. Reverse transformation on the bit embedded first three pixel bytes would actually ensure spatial watermarked values while the receiver exercises the same forward block transformation and respective decoding mechanism to extract the hidden bits. Experimental results have confirmed better watermark imperceptibility and robustness against attacks suiting the scheme for public mobile applications.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522426
S. Mukherjee, A. Deyasi, A. Roy, Subhro Ghosal
Complete photonic bandgap is formed in two-dimensional photonic crystal with triangular geometry under TE mode of propagation. Maxwell's equations are solved using plane wave expansion method and eigen equations for TE and TM modes are obtained using appropriate boundary conditions. Structure is realized by inserting cylindrical rods in triangular lattice. Results reveal that magnitude of bandgap and mid-band frequency depends on refractive index difference of the two materials, and also on lattice filling factor. Result is compared with that obtained for rectangular lattice, and better control on tunability of the properties is exhibited by triangular geometry. Simulated findings will play key role in designing photonic bandpass filter for photonic integrated circuit.
{"title":"Computation of photonic bandgap in two-dimensional periodic triangular lattice for bandpass filter design","authors":"S. Mukherjee, A. Deyasi, A. Roy, Subhro Ghosal","doi":"10.1109/MICROCOM.2016.7522426","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522426","url":null,"abstract":"Complete photonic bandgap is formed in two-dimensional photonic crystal with triangular geometry under TE mode of propagation. Maxwell's equations are solved using plane wave expansion method and eigen equations for TE and TM modes are obtained using appropriate boundary conditions. Structure is realized by inserting cylindrical rods in triangular lattice. Results reveal that magnitude of bandgap and mid-band frequency depends on refractive index difference of the two materials, and also on lattice filling factor. Result is compared with that obtained for rectangular lattice, and better control on tunability of the properties is exhibited by triangular geometry. Simulated findings will play key role in designing photonic bandpass filter for photonic integrated circuit.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123065811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522513
D. Saikia, J. Dutta
Fuzzy expert system is a knowledge-based system, which is considered as one of the most common form of artificial intelligence in medicine(AIM) system with medical knowledge of a particularly defined task, and able to reach a proper conclusion by using the specific data from individual patient. In fuzzy inference system, a set of rules are used for representing the knowledge or data of a particular problem. Dengue fever, caused by the dengue virus, a mosquito-borne human viral pathogen is an infectious tropical disease. In a small proportion of cases Dengue disease is considered as one of the life threatening disease and delay of the diagnosis may lead to increase the risk level of the disease. Therefore, it is very important to detect the dengue disease at early stage. Thus this work was aimed to design an expert system for the early diagnosis of dengue disease using Fuzzy Inference System (FIS), a powerful tool for dealing with imprecision and uncertainty. The designed FIS can be used for early diagnosis of dengue disease of a patient by using his/her physical symptoms and medical test reports as input variables and converting these input variables into fuzzy membership functions.
{"title":"Early diagnosis of dengue disease using fuzzy inference system","authors":"D. Saikia, J. Dutta","doi":"10.1109/MICROCOM.2016.7522513","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522513","url":null,"abstract":"Fuzzy expert system is a knowledge-based system, which is considered as one of the most common form of artificial intelligence in medicine(AIM) system with medical knowledge of a particularly defined task, and able to reach a proper conclusion by using the specific data from individual patient. In fuzzy inference system, a set of rules are used for representing the knowledge or data of a particular problem. Dengue fever, caused by the dengue virus, a mosquito-borne human viral pathogen is an infectious tropical disease. In a small proportion of cases Dengue disease is considered as one of the life threatening disease and delay of the diagnosis may lead to increase the risk level of the disease. Therefore, it is very important to detect the dengue disease at early stage. Thus this work was aimed to design an expert system for the early diagnosis of dengue disease using Fuzzy Inference System (FIS), a powerful tool for dealing with imprecision and uncertainty. The designed FIS can be used for early diagnosis of dengue disease of a patient by using his/her physical symptoms and medical test reports as input variables and converting these input variables into fuzzy membership functions.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131367865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522516
S. A. Karim, Hasan U. Zaman
A Multiple Independent Gate Field Transistor (MIGFET) has more than one gates. These gates may be placed on or around the channel. An advantage of multiple gates structure is the better control of the channel region than the single gate structure. Another use of multiple gates can be to the increase functionality per transistor. In this paper, we present a functionally equivalent full adder circuit using the MIGFET structure that is feasible and more advantageous in many respects. We also show a simple improvement of the equivalent circuit. This technique of MIGFET implementation of digital logics can be extended to other digital logic circuits as well.
{"title":"Qualitative analysis of an equivalent full adder circuit using MIGFET: An alternative approach to full adder circuit via direct truth table implementation","authors":"S. A. Karim, Hasan U. Zaman","doi":"10.1109/MICROCOM.2016.7522516","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522516","url":null,"abstract":"A Multiple Independent Gate Field Transistor (MIGFET) has more than one gates. These gates may be placed on or around the channel. An advantage of multiple gates structure is the better control of the channel region than the single gate structure. Another use of multiple gates can be to the increase functionality per transistor. In this paper, we present a functionally equivalent full adder circuit using the MIGFET structure that is feasible and more advantageous in many respects. We also show a simple improvement of the equivalent circuit. This technique of MIGFET implementation of digital logics can be extended to other digital logic circuits as well.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522447
Rajat Sanyal, Binod Prasad, Sanjay Dhar Roy, S. Kundu
In this paper, a work has been carried out to analyse the performance of cognitive radio (CR) users where secondary user (SU) adapts its transmit power according to an activity model of primary user (PU). The performance has been measured in terms of the outage probability of PU and SU where SU is working in spectrum underlay mode. While PU is present in the network, SU's instantaneous transmitting power is controlled such a manner that interference at the primary receiver (PR) end will be less than a threshold limit, otherwise SU transmits the signal at power Pmax. A power control scheme has been proposed where SU maintains a interference constraint on PR end in terms of maximum allowable primary outage. SU imperfectly estimates the channel with PR and controls its transmission power based on the accuracy of this estimation. A MATLAB based simulation test bed has been developed, and performance studies are carried over for Nakagami-m fading channel to show the performance of the power control scheme. Also, SU's maximum achievable channel capacity is shown for various amount of imperfect channel state information (CSI) under some PU outage constraint.
{"title":"Performance analysis of power controlled cognitive radio with imperfect Nakagami-m fading CSI","authors":"Rajat Sanyal, Binod Prasad, Sanjay Dhar Roy, S. Kundu","doi":"10.1109/MICROCOM.2016.7522447","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522447","url":null,"abstract":"In this paper, a work has been carried out to analyse the performance of cognitive radio (CR) users where secondary user (SU) adapts its transmit power according to an activity model of primary user (PU). The performance has been measured in terms of the outage probability of PU and SU where SU is working in spectrum underlay mode. While PU is present in the network, SU's instantaneous transmitting power is controlled such a manner that interference at the primary receiver (PR) end will be less than a threshold limit, otherwise SU transmits the signal at power Pmax. A power control scheme has been proposed where SU maintains a interference constraint on PR end in terms of maximum allowable primary outage. SU imperfectly estimates the channel with PR and controls its transmission power based on the accuracy of this estimation. A MATLAB based simulation test bed has been developed, and performance studies are carried over for Nakagami-m fading channel to show the performance of the power control scheme. Also, SU's maximum achievable channel capacity is shown for various amount of imperfect channel state information (CSI) under some PU outage constraint.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123102617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522460
Subhashis Roy, S. Sarkar
Avian Influenza has caused serious damage economically as well as health point of view in the area of a poultry farm and society. The proposed solution fulfills the requirement for intensive condition monitoring by RFID electronic system of individual birds and timely reporting of data to the poultry farm manager to detect Avian Influenza at a very early stage. A software interface using Visual Basic language and SQL server database management is developed to implement the proposed RFID based Real time system. It also enhances the production and maintenance of the poultry farm by reducing the time and labor cost.
{"title":"RFID based real time system for early detection of Avian Influenza for poultry based industry","authors":"Subhashis Roy, S. Sarkar","doi":"10.1109/MICROCOM.2016.7522460","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522460","url":null,"abstract":"Avian Influenza has caused serious damage economically as well as health point of view in the area of a poultry farm and society. The proposed solution fulfills the requirement for intensive condition monitoring by RFID electronic system of individual birds and timely reporting of data to the poultry farm manager to detect Avian Influenza at a very early stage. A software interface using Visual Basic language and SQL server database management is developed to implement the proposed RFID based Real time system. It also enhances the production and maintenance of the poultry farm by reducing the time and labor cost.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/MICROCOM.2016.7522407
S. Dash, Vara Punit Ashokbhai, R. Sanmugasundaram, D. Srinivasan
The OMAP - L138 DSP+ARM Processor is a dual core SoC developed by Texas Instrument. It has the features of high-geared, small size and power efficiency. It is broadly implemented to advance portable device. This paper emphasises on retrieving the Linux Kernel code, analysing in specific aspect about the modules supported by OMAP - L138 Processor, altered source code of the Linux Kernel as per the requirement, Understanding Transplanting of Linux Kernel & U-boot (boot loader) mechanism according to the target board i.e. OMAP - L138 chip based customised board, cross compile and so on. A new customised operating system is created which is suitable for the target board. The operating system is compiled and transplanted onto the target board successfully.
{"title":"Transplantation of U-boot and Linux Kernel to OMAP-L138","authors":"S. Dash, Vara Punit Ashokbhai, R. Sanmugasundaram, D. Srinivasan","doi":"10.1109/MICROCOM.2016.7522407","DOIUrl":"https://doi.org/10.1109/MICROCOM.2016.7522407","url":null,"abstract":"The OMAP - L138 DSP+ARM Processor is a dual core SoC developed by Texas Instrument. It has the features of high-geared, small size and power efficiency. It is broadly implemented to advance portable device. This paper emphasises on retrieving the Linux Kernel code, analysing in specific aspect about the modules supported by OMAP - L138 Processor, altered source code of the Linux Kernel as per the requirement, Understanding Transplanting of Linux Kernel & U-boot (boot loader) mechanism according to the target board i.e. OMAP - L138 chip based customised board, cross compile and so on. A new customised operating system is created which is suitable for the target board. The operating system is compiled and transplanted onto the target board successfully.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}