Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269663
R. Kaur, Dolly Sharma, Amit Verma
The Satellite image classification is a significant method recycled in remote detecting for the automated study and structure recognition of the satellite data, which facilitate the automated understanding of the huge amount of data or information. These days, there happen the various kinds of classification methods, such as parallelepiped and less distance classifiers, but it is static essential to get better their presentation in relations of correctness rate. After existing work, we study the cross breed fuzzy, c-mean clustering algorithm and FFNN classifier for rocks cover planning of lands, shadow, construction. It initializes with the separate step pre-processing process to create the picture appropriate for segmentation. The processing of the image is refined using the cross-genetic-Artificial Bee Colony (ABC) algorithm that is implemented by cross breading the ABC and Fuzzy c-means to find the effective division in satellite image and categorized using NN. The presentation of the offered hybrid-algorithm is compared performance with the algorithms like, Artificial Bee Colony (ABC) algorithm, ABC-GA algorithm, Affecting KFCM. We implement the edge detection using Mar Hildreth Edge Detection Algorithm; Fuzzy c means Clustering using for segmentation of the satellite image, to extract the features used Principle component analysis, to optimize the extracted feature using Bacteria Foraging Algorithm and classification SVM (Support Vector Machine) to execute the satellite picture classification. In minimum time and evaluate the better accuracy based on the support vector machine algorithm. We design the framework in satellite images classifies uses MATLAB 2013a simulation tool and evaluate the performance in the Xdb-Index and DB-Index.
{"title":"Enhance satellite image classification based on fuzzy clustering and Marr-Hildreth algorithm","authors":"R. Kaur, Dolly Sharma, Amit Verma","doi":"10.1109/ISPCC.2017.8269663","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269663","url":null,"abstract":"The Satellite image classification is a significant method recycled in remote detecting for the automated study and structure recognition of the satellite data, which facilitate the automated understanding of the huge amount of data or information. These days, there happen the various kinds of classification methods, such as parallelepiped and less distance classifiers, but it is static essential to get better their presentation in relations of correctness rate. After existing work, we study the cross breed fuzzy, c-mean clustering algorithm and FFNN classifier for rocks cover planning of lands, shadow, construction. It initializes with the separate step pre-processing process to create the picture appropriate for segmentation. The processing of the image is refined using the cross-genetic-Artificial Bee Colony (ABC) algorithm that is implemented by cross breading the ABC and Fuzzy c-means to find the effective division in satellite image and categorized using NN. The presentation of the offered hybrid-algorithm is compared performance with the algorithms like, Artificial Bee Colony (ABC) algorithm, ABC-GA algorithm, Affecting KFCM. We implement the edge detection using Mar Hildreth Edge Detection Algorithm; Fuzzy c means Clustering using for segmentation of the satellite image, to extract the features used Principle component analysis, to optimize the extracted feature using Bacteria Foraging Algorithm and classification SVM (Support Vector Machine) to execute the satellite picture classification. In minimum time and evaluate the better accuracy based on the support vector machine algorithm. We design the framework in satellite images classifies uses MATLAB 2013a simulation tool and evaluate the performance in the Xdb-Index and DB-Index.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124281042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269681
Harbinder Singh, Haya Fatima, Samreeti Sharma, D. Arora
The main ambition of the research article is to present a approach for locating infrared (IR) targets by fusion of IR and visible images by making use of thresholding techniques. In this paper, a modified form of the existing local thresholding techniques is introduced which aims to overcome the major drawbacks of the already-developed methods. The binarization technique is used for separating the target from the background of infrared image. On combining this IR image with visible image, a better and enhanced resulting image possessing even minuscule details of the surrounding and the hidden targets are obtained. The technique proposed here generates an output which is immune to noise and preserves the edge information of the image.
{"title":"A novel approach for IR target localization based on IR and visible image fusion","authors":"Harbinder Singh, Haya Fatima, Samreeti Sharma, D. Arora","doi":"10.1109/ISPCC.2017.8269681","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269681","url":null,"abstract":"The main ambition of the research article is to present a approach for locating infrared (IR) targets by fusion of IR and visible images by making use of thresholding techniques. In this paper, a modified form of the existing local thresholding techniques is introduced which aims to overcome the major drawbacks of the already-developed methods. The binarization technique is used for separating the target from the background of infrared image. On combining this IR image with visible image, a better and enhanced resulting image possessing even minuscule details of the surrounding and the hidden targets are obtained. The technique proposed here generates an output which is immune to noise and preserves the edge information of the image.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116920531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269736
Vineeth K Kumar
To draw suitable conclusion(s) and make rational decision(s) on any set of numerical data obtained from observations, the bunching of it is require by ways of different to determine the unique value for it. This unique value by ways of different gives the representative value of the whole group, which human can grasp more easily. The different ways for finding the unique value of a group are mean, mean absolute value, RMS, simple square integral etc. In this paper also, some of the different ways for finding of unique value of a data are discuss but over the conventional space of individuals, which is 2, in case of both continuous and discrete domain. For such function splitting is require. The objective behind the function splitting is to make it in to the parts of two as a positive or negative to analyze the data on individual similarity basis. Up till in most of the cases of data analyzing by ways of different we are doing it on the collective basis only, but here we have the approach for analyzing the same but on individual basis as well, as it provides additional information, which may proves to be beneficial in some cases like surface EMG classification.
{"title":"A new proposal for time domain features of EMG signal on individual basis over conventional space","authors":"Vineeth K Kumar","doi":"10.1109/ISPCC.2017.8269736","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269736","url":null,"abstract":"To draw suitable conclusion(s) and make rational decision(s) on any set of numerical data obtained from observations, the bunching of it is require by ways of different to determine the unique value for it. This unique value by ways of different gives the representative value of the whole group, which human can grasp more easily. The different ways for finding the unique value of a group are mean, mean absolute value, RMS, simple square integral etc. In this paper also, some of the different ways for finding of unique value of a data are discuss but over the conventional space of individuals, which is 2, in case of both continuous and discrete domain. For such function splitting is require. The objective behind the function splitting is to make it in to the parts of two as a positive or negative to analyze the data on individual similarity basis. Up till in most of the cases of data analyzing by ways of different we are doing it on the collective basis only, but here we have the approach for analyzing the same but on individual basis as well, as it provides additional information, which may proves to be beneficial in some cases like surface EMG classification.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125895928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269747
Avi Goswami, Meenakshi Agarwal, T. Rawat, Kunwar Singh
Dynamically reconfigurable filter with low complexity is need of hour today. FIR digital filter finds huge application in various disciplines because of stability and linear phase property. In this paper, recently discussed reconfigurable finite impulse response filter architecture is used to implement half-band filter. The proposed filter is employed to design an interpolator taking filter coefficients as inputs. These coefficients can be varied according to the specification without altering the underlying circuitry. While implementing polyphase components of interpolation filter the proposed architecture utilises farrow structure. We have used Xilinx's Artix7 family XC7A100T-3CSG324 field-programmable gate array to implement and test our architecture and synthesis results show that the proposed architecture offer enhanced speed when compared to other existing and proposed interpolators.
{"title":"FPGA implementation of reconfigurable architecture for half-band FIR filters","authors":"Avi Goswami, Meenakshi Agarwal, T. Rawat, Kunwar Singh","doi":"10.1109/ISPCC.2017.8269747","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269747","url":null,"abstract":"Dynamically reconfigurable filter with low complexity is need of hour today. FIR digital filter finds huge application in various disciplines because of stability and linear phase property. In this paper, recently discussed reconfigurable finite impulse response filter architecture is used to implement half-band filter. The proposed filter is employed to design an interpolator taking filter coefficients as inputs. These coefficients can be varied according to the specification without altering the underlying circuitry. While implementing polyphase components of interpolation filter the proposed architecture utilises farrow structure. We have used Xilinx's Artix7 family XC7A100T-3CSG324 field-programmable gate array to implement and test our architecture and synthesis results show that the proposed architecture offer enhanced speed when compared to other existing and proposed interpolators.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125901465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269708
Sachpreet Kaur, T. Kaur, R. Khanna, Parampal Singh
DC microgrids are gaining attention worldwide over the past few years. The benefits of using DC distribution in comparison to AC distribution has been identified in various studies. The development in the concept of DC microgrids has enhanced the charging operation of electric vehicles and has reduced the charging time to a great extent. This paper presents the review of DC microgrids including their design, control, energy management and protection. A significant focus is made on review of DC microgrid based electric vehicle charging stations and their architecture.
{"title":"A state of the art of DC microgrids for electric vehicle charging","authors":"Sachpreet Kaur, T. Kaur, R. Khanna, Parampal Singh","doi":"10.1109/ISPCC.2017.8269708","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269708","url":null,"abstract":"DC microgrids are gaining attention worldwide over the past few years. The benefits of using DC distribution in comparison to AC distribution has been identified in various studies. The development in the concept of DC microgrids has enhanced the charging operation of electric vehicles and has reduced the charging time to a great extent. This paper presents the review of DC microgrids including their design, control, energy management and protection. A significant focus is made on review of DC microgrid based electric vehicle charging stations and their architecture.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126056309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269716
Tarman, H. Saini
Forgery is not a new concept but from the very start it has been there whether it is in documents, images, art, or literary etc. Threats against digital images has increased to that extent that they require serious attention. Copy move forgery being the most dangerous one, is affecting world of digital images as this is hardest to detect. We first discuss and demonstrate image forgery types, discuss detection methods and their shortcomings, and then discuss the idea of using Keypoint based method M-SIFT which is an improved version of SIFT. Additionally, we provide implementation and performance analysis of suggested algorithm.
{"title":"M-SIFT: A detection algorithm for copy move image forgery","authors":"Tarman, H. Saini","doi":"10.1109/ISPCC.2017.8269716","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269716","url":null,"abstract":"Forgery is not a new concept but from the very start it has been there whether it is in documents, images, art, or literary etc. Threats against digital images has increased to that extent that they require serious attention. Copy move forgery being the most dangerous one, is affecting world of digital images as this is hardest to detect. We first discuss and demonstrate image forgery types, discuss detection methods and their shortcomings, and then discuss the idea of using Keypoint based method M-SIFT which is an improved version of SIFT. Additionally, we provide implementation and performance analysis of suggested algorithm.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269702
Adviti Chauhan, Jyoti Gupta
The networks have moved worldwide and information has been considered in the digital form of bits and bytes. Critical information is stored, refined and sent in digital form on personal computers. Since information performs such an essential role, competition are purposing the personal computers for opening up communication programs to either swipe the hypersensitive information or even to agitate the critical information system. There is absolutely no differentiation of cloud aspect or client aspect encryption, so it diminishes the information security. To attain the goals of security system, the encryption algorithms must definitely provide enough power with high security put in place within an acceptable speed restriction. Therefore, the performance analysis becomes very important to the prevailing encryption algorithms. This paper proposes a novel parallel cryptographic algorithm, blending and changing from MD5 and Blowfish encryption schemes, which can upgrade security. A hybrid MD5-Blowfish cryptographic calculation is created to defeat the shortcoming from symmetric block cryptographic and hash function schemes.
{"title":"A novel technique of cloud security based on hybrid encryption by Blowfish and MD5","authors":"Adviti Chauhan, Jyoti Gupta","doi":"10.1109/ISPCC.2017.8269702","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269702","url":null,"abstract":"The networks have moved worldwide and information has been considered in the digital form of bits and bytes. Critical information is stored, refined and sent in digital form on personal computers. Since information performs such an essential role, competition are purposing the personal computers for opening up communication programs to either swipe the hypersensitive information or even to agitate the critical information system. There is absolutely no differentiation of cloud aspect or client aspect encryption, so it diminishes the information security. To attain the goals of security system, the encryption algorithms must definitely provide enough power with high security put in place within an acceptable speed restriction. Therefore, the performance analysis becomes very important to the prevailing encryption algorithms. This paper proposes a novel parallel cryptographic algorithm, blending and changing from MD5 and Blowfish encryption schemes, which can upgrade security. A hybrid MD5-Blowfish cryptographic calculation is created to defeat the shortcoming from symmetric block cryptographic and hash function schemes.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269665
U. Bhanja, Sutikshna Singhdeo
The paper presents the design, implementation and performance investigation of a novel three dimensional (3D) Phase/Wavelength/Time code referred as three dimensional modified Golomb code (3D MGC). The proposed 3D MGC code maintains high cardinality and ensures minimum cross correlation. In this paper, the performance in terms of bit error rate (BER) of the proposed 3D MGC code is compared with the existing 3D OCDMA codes. The simulation is carried out with the use of the optisystem software version 14.
{"title":"Performance analysis of a three dimensional OCDMA code","authors":"U. Bhanja, Sutikshna Singhdeo","doi":"10.1109/ISPCC.2017.8269665","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269665","url":null,"abstract":"The paper presents the design, implementation and performance investigation of a novel three dimensional (3D) Phase/Wavelength/Time code referred as three dimensional modified Golomb code (3D MGC). The proposed 3D MGC code maintains high cardinality and ensures minimum cross correlation. In this paper, the performance in terms of bit error rate (BER) of the proposed 3D MGC code is compared with the existing 3D OCDMA codes. The simulation is carried out with the use of the optisystem software version 14.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269682
A. Kaur, Sunny Singh, K. Ramkumar
Since the whole world is suffering from energy and power crises. So keeping this in mind an energy and power efficient device has been made in the following paper. An energy and power efficient Bengali Unicode Reader is a contribution towards green communication. After implementing the code on Xilinx software power efficient techniques such as frequency scaling and the FPGA technologies scaling techniques have been applied in order to get power efficient device. Static and dynamic powers of the device have been analyzed. It can be concluded that it is always better to operate the device on a lower frequency range of 10 MHz as compare to the higher frequency range of 1 THz. Also less amount of power is consumed by operating the device on a Artix-7 FPGA (28nm) technology instead of Virtex-6 FPGA (40nm) technology.
{"title":"Frequency scaling based energy efficient bengali unicode reader design for 28 nm and 40nm FPGA","authors":"A. Kaur, Sunny Singh, K. Ramkumar","doi":"10.1109/ISPCC.2017.8269682","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269682","url":null,"abstract":"Since the whole world is suffering from energy and power crises. So keeping this in mind an energy and power efficient device has been made in the following paper. An energy and power efficient Bengali Unicode Reader is a contribution towards green communication. After implementing the code on Xilinx software power efficient techniques such as frequency scaling and the FPGA technologies scaling techniques have been applied in order to get power efficient device. Static and dynamic powers of the device have been analyzed. It can be concluded that it is always better to operate the device on a lower frequency range of 10 MHz as compare to the higher frequency range of 1 THz. Also less amount of power is consumed by operating the device on a Artix-7 FPGA (28nm) technology instead of Virtex-6 FPGA (40nm) technology.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269700
Manjeet Singh, S. Soni, Vicky Kumar
Segregating wireless sensor network into clusters to distribute various tasks uniformly among the sensors is an elegant solution to conserve the energy resources. The identification of cluster heads relies upon various parameters such as energy, distance, proximity to the base station and retransmission rate etc. These parameters present uncertainty in the cluster heads identification process. Therefore, in order to select efficient cluster heads and organize clusters uniformly throughout the network in this paper, firstly cluster heads are identified using fuzzy logic to reduce uncertainty and secondly correlation model is used to distribute clusters uniformly in the network. The correlation between the sensor node and the base station is used in the fuzzy system and the correlation between sensors is used for cluster formation. The performance is evaluated and results are compared with well-known techniques LEACH and CHEF.
{"title":"Improving WSN operational lifetime using fuzzy logic and correlation characteristics","authors":"Manjeet Singh, S. Soni, Vicky Kumar","doi":"10.1109/ISPCC.2017.8269700","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269700","url":null,"abstract":"Segregating wireless sensor network into clusters to distribute various tasks uniformly among the sensors is an elegant solution to conserve the energy resources. The identification of cluster heads relies upon various parameters such as energy, distance, proximity to the base station and retransmission rate etc. These parameters present uncertainty in the cluster heads identification process. Therefore, in order to select efficient cluster heads and organize clusters uniformly throughout the network in this paper, firstly cluster heads are identified using fuzzy logic to reduce uncertainty and secondly correlation model is used to distribute clusters uniformly in the network. The correlation between the sensor node and the base station is used in the fuzzy system and the correlation between sensors is used for cluster formation. The performance is evaluated and results are compared with well-known techniques LEACH and CHEF.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130598129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}