Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898914
Philipp M. Glatz, L. Hörmann, C. Steger, R. Weiss
Large scale deployments of small, wireless, networked, embedded systems demand for cost reduction in development and maintenance. Most often, this translates into the need for reliable methods for energy conservation as it is the case for wireless sensor networks (WSNs). Our work considers energy harvesting system (EHS)-enhanced WSN technology which is the state-of-the-art technology for perpetual systems supplied from ambient environmental energy. Therefore several aspects have been considered in literature so far: EHS design, energy prediction modeling, harvesting aware media access control (MAC) and routing and finally power management. This paper postulates that identifying and optimizing these aspects on their own does not necessarily lead to feasible solutions. We take a cross-layer perspective and provide a networking protocol for implicit or explicit EHS policy negotiation under the constraint of two prototypical communication patterns. The methods presented show how to combine energy aware routing or conservation from network coding with EHS power management policies under the constraint of state-of-the-art MAC. Evaluation of different end-user communication patterns lets the reader interpret the results for an application at hand.
{"title":"HANS: Harvesting aware networking service for energy management in wireless sensor networks","authors":"Philipp M. Glatz, L. Hörmann, C. Steger, R. Weiss","doi":"10.1109/CTS.2011.5898914","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898914","url":null,"abstract":"Large scale deployments of small, wireless, networked, embedded systems demand for cost reduction in development and maintenance. Most often, this translates into the need for reliable methods for energy conservation as it is the case for wireless sensor networks (WSNs). Our work considers energy harvesting system (EHS)-enhanced WSN technology which is the state-of-the-art technology for perpetual systems supplied from ambient environmental energy. Therefore several aspects have been considered in literature so far: EHS design, energy prediction modeling, harvesting aware media access control (MAC) and routing and finally power management. This paper postulates that identifying and optimizing these aspects on their own does not necessarily lead to feasible solutions. We take a cross-layer perspective and provide a networking protocol for implicit or explicit EHS policy negotiation under the constraint of two prototypical communication patterns. The methods presented show how to combine energy aware routing or conservation from network coding with EHS power management policies under the constraint of state-of-the-art MAC. Evaluation of different end-user communication patterns lets the reader interpret the results for an application at hand.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130851167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898902
Alton MacDonald, R. Cartas, J. Incera
Digital convergence is becoming increasingly imortant to both network operators and end users. Network operators look to Next Generation Network (NGN) solutions to meet the ever growing user demand and to the IP Multimedia Subsystem (IMS) as a catalyzer for attractive and innovative services which aim at improving user Quality of Experience (QoE). IMS, presented as the first working implementation of a Service Delivery Platform (SDP), takes great strides to ease migration to NGN as well as help the network become transparent to the end user. Location Based Services (LBS) also play an important role in QoE by supplying relevant information on the user's whereabouts directly enhancing their day-to-day activities. The combination of LBS within IMS holds great promise for future services where service delivery mimics a network responding directly to user activities. This helps dissolve the difference between the network and the User Equipment (UE), thus increasing user adoption through a transparent network and service delivery. This paper presents two personalized LBS implemented within an IMS test bed acting as a proof of concept for providing improved QoE on an IMS infrastructure as well as demonstrating that service creation is relatively easy to achieve in IMS.
{"title":"Custom tailored location based services: An IMS implementation","authors":"Alton MacDonald, R. Cartas, J. Incera","doi":"10.1109/CTS.2011.5898902","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898902","url":null,"abstract":"Digital convergence is becoming increasingly imortant to both network operators and end users. Network operators look to Next Generation Network (NGN) solutions to meet the ever growing user demand and to the IP Multimedia Subsystem (IMS) as a catalyzer for attractive and innovative services which aim at improving user Quality of Experience (QoE). IMS, presented as the first working implementation of a Service Delivery Platform (SDP), takes great strides to ease migration to NGN as well as help the network become transparent to the end user. Location Based Services (LBS) also play an important role in QoE by supplying relevant information on the user's whereabouts directly enhancing their day-to-day activities. The combination of LBS within IMS holds great promise for future services where service delivery mimics a network responding directly to user activities. This helps dissolve the difference between the network and the User Equipment (UE), thus increasing user adoption through a transparent network and service delivery. This paper presents two personalized LBS implemented within an IMS test bed acting as a proof of concept for providing improved QoE on an IMS infrastructure as well as demonstrating that service creation is relatively easy to achieve in IMS.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898935
Yu Liu, Xuqi Zhu, Cong Ma, Lin Zhang
Event Detection is one of the main applications of wireless sensor networks (WSN). However, due to the noisy sensed data of sensors and the wireless channel noise, it's difficult to guarantee the accuracy of detection, especially in multiple event detection. In this paper, we proposed a multiple event detection scheme using compressed sensing (CS). By analogy with CS problem, the efficient recovery algorithms of CS can be used to reconstruct the source signal that contains multiple simultaneous events. Moreover, the events may not change much, so the source signals at two adjacent time instants have high redundancy. This temporal correlation is also utilized in our scheme to improve the detection accuracy. In the proposed scheme, not only the position but also the value of an event can be achieved. Three algorithms of CS are used in our scheme to show the advantages on detection probability over the traditional decentralized detection methods using Bayesian.
{"title":"Multiple event detection in wireless sensor networks using compressed sensing","authors":"Yu Liu, Xuqi Zhu, Cong Ma, Lin Zhang","doi":"10.1109/CTS.2011.5898935","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898935","url":null,"abstract":"Event Detection is one of the main applications of wireless sensor networks (WSN). However, due to the noisy sensed data of sensors and the wireless channel noise, it's difficult to guarantee the accuracy of detection, especially in multiple event detection. In this paper, we proposed a multiple event detection scheme using compressed sensing (CS). By analogy with CS problem, the efficient recovery algorithms of CS can be used to reconstruct the source signal that contains multiple simultaneous events. Moreover, the events may not change much, so the source signals at two adjacent time instants have high redundancy. This temporal correlation is also utilized in our scheme to improve the detection accuracy. In the proposed scheme, not only the position but also the value of an event can be achieved. Three algorithms of CS are used in our scheme to show the advantages on detection probability over the traditional decentralized detection methods using Bayesian.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898959
Z. Zinonos, Ricardo M. Silva, V. Vassiliou, J. Silva
Wireless sensor and actuator networks (WSANs) have been studied for about ten years now. However, a gap between research and real applications and implementations remains. The lack of an integrated solution, capable of providing the reliability levels of monitoring and actuation required by critical applications, have postponed the replacement and extension of the existing inflexible and expensive wired solutions with the low-cost, easy-to-deploy, and portable wireless options. In order to assist this transition this paper presents a new method for supporting mobility in WSANs specifically designed for time-critical scenarios. The method is being targeted for a critical application located in a real oil refinery, in which a WSAN has been implemented in the scope of a European research project.
{"title":"Mobility solutions for wireless sensor and actuator networks with performance guarantees","authors":"Z. Zinonos, Ricardo M. Silva, V. Vassiliou, J. Silva","doi":"10.1109/CTS.2011.5898959","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898959","url":null,"abstract":"Wireless sensor and actuator networks (WSANs) have been studied for about ten years now. However, a gap between research and real applications and implementations remains. The lack of an integrated solution, capable of providing the reliability levels of monitoring and actuation required by critical applications, have postponed the replacement and extension of the existing inflexible and expensive wired solutions with the low-cost, easy-to-deploy, and portable wireless options. In order to assist this transition this paper presents a new method for supporting mobility in WSANs specifically designed for time-critical scenarios. The method is being targeted for a critical application located in a real oil refinery, in which a WSAN has been implemented in the scope of a European research project.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121105230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.6024144
S. M. Zabihi-Maddah, M. M. Kakhki
Increasing the number of simultaneous users is one of the challenging issues in incoherent and asynchronous optical CDMA systems. One solution is to increase the value of cross- correlation, λc. In neglecting the effect of noise, optimum value of λcwas obtained. In this work, with considering noise, the simultaneous effect of λc and transmitted power on the probability of bit error (pbe) is investigated. Our investigation is performed by employing OOC (λc =1) and prime code (λc =2) and active correlator is chosen for its robustness against the noise. The performance is analyzed for three common receiver structures, namely soft receiver (without optical hard limiter), single optical hard limiter (SHL) and double optical hard limiters (DHL). Our results show that under the same bandwidth efficiency, increasing λc in high power regimes decreases the pbe but increasing λc in low power regimes will increase pbe.
{"title":"Code cross-correlation effects on the performance of optical cdma systems in the presence of receiver noises","authors":"S. M. Zabihi-Maddah, M. M. Kakhki","doi":"10.1109/CTS.2011.6024144","DOIUrl":"https://doi.org/10.1109/CTS.2011.6024144","url":null,"abstract":"Increasing the number of simultaneous users is one of the challenging issues in incoherent and asynchronous optical CDMA systems. One solution is to increase the value of cross- correlation, λ<sub>c</sub>. In neglecting the effect of noise, optimum value of λ<sub>c</sub>was obtained. In this work, with considering noise, the simultaneous effect of λ<sub>c</sub> and transmitted power on the probability of bit error (pbe) is investigated. Our investigation is performed by employing OOC (λ<sub>c</sub> =1) and prime code (λ<sub>c</sub> =2) and active correlator is chosen for its robustness against the noise. The performance is analyzed for three common receiver structures, namely soft receiver (without optical hard limiter), single optical hard limiter (SHL) and double optical hard limiters (DHL). Our results show that under the same bandwidth efficiency, increasing λ<sub>c</sub> in high power regimes decreases the pbe but increasing λ<sub>c</sub> in low power regimes will increase pbe.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898908
Hamidreza Aghasi, M. Hashemi, B. Khalaj
In this paper we present a method of localizing multiple wideband acoustic sources based on both signal attenuation pattern and delays in the reception of the signal. Moreover, an additional order of flexibility is added to the problem by considering the attenuation model as an unknown function with reasonable prior assumptions about its functional space. Such approach is capable of enhancing the localization performance compared to when only the signal attenuation data or the time delays are used. A cost function is then formed in terms of the sources locations and the attenuation model parameters. Having different types of unknowns in the cost function, convergence concerns, and the advantage of using trust region methods encourages using the Levenberg-Marquardt algorithm. Accordingly, to simplify the implementation of the proposed algorithm, methods of calculating the Jacobian are provided. Finally the validity of the proposed method is verified by providing simulation results.
{"title":"Source localization through adaptive signal attenuation model and time delay estimation","authors":"Hamidreza Aghasi, M. Hashemi, B. Khalaj","doi":"10.1109/CTS.2011.5898908","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898908","url":null,"abstract":"In this paper we present a method of localizing multiple wideband acoustic sources based on both signal attenuation pattern and delays in the reception of the signal. Moreover, an additional order of flexibility is added to the problem by considering the attenuation model as an unknown function with reasonable prior assumptions about its functional space. Such approach is capable of enhancing the localization performance compared to when only the signal attenuation data or the time delays are used. A cost function is then formed in terms of the sources locations and the attenuation model parameters. Having different types of unknowns in the cost function, convergence concerns, and the advantage of using trust region methods encourages using the Levenberg-Marquardt algorithm. Accordingly, to simplify the implementation of the proposed algorithm, methods of calculating the Jacobian are provided. Finally the validity of the proposed method is verified by providing simulation results.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116317223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898963
Andoena Balla, A. Stassopoulou, M. Dikaiakos
In this paper we present a methodology for detecting web crawlers in real time. We use decision trees to classify requests in real time, as originating from a crawler or human, while their session is ongoing. For this purpose we used machine learning techniques to identify the most important features that differentiate humans from crawlers. The method was tested in real time with the help of an emulator, using only a small number of requests. Our results demonstrate the effectiveness and applicability of our approach.
{"title":"Real-time web crawler detection","authors":"Andoena Balla, A. Stassopoulou, M. Dikaiakos","doi":"10.1109/CTS.2011.5898963","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898963","url":null,"abstract":"In this paper we present a methodology for detecting web crawlers in real time. We use decision trees to classify requests in real time, as originating from a crawler or human, while their session is ongoing. For this purpose we used machine learning techniques to identify the most important features that differentiate humans from crawlers. The method was tested in real time with the help of an emulator, using only a small number of requests. Our results demonstrate the effectiveness and applicability of our approach.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"144 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898989
M. H. L. Froushani, B. Khalaj, Shahin Vakilinia
Cooperation is an integral part of wireless ad hoc networks. In this paper, we introduce a combination of pricing and reputation-based mechanisms targeted at generating higher incentive for cooperation among nodes. The reputation-based part of the mechanism guarantees proper cooperation among sources. In addition, the pricing-based mechanism is added to ensure cooperation of relay nodes. In contrast with earlier works, a more comprehensive definition of cooperation is presented which guarantees a better reward and punishment system. In our approach, a multi-player game is defined with continuous strategy set and payoffs which lead to a more practical model. Based on the proposed game theoretic framework, existence of Nash equilibrium is then investigated. Finally, simulation results evaluate performance of the proposed scheme.
{"title":"A novel approach to incentive-based cooperation in wireless ad hoc networks","authors":"M. H. L. Froushani, B. Khalaj, Shahin Vakilinia","doi":"10.1109/CTS.2011.5898989","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898989","url":null,"abstract":"Cooperation is an integral part of wireless ad hoc networks. In this paper, we introduce a combination of pricing and reputation-based mechanisms targeted at generating higher incentive for cooperation among nodes. The reputation-based part of the mechanism guarantees proper cooperation among sources. In addition, the pricing-based mechanism is added to ensure cooperation of relay nodes. In contrast with earlier works, a more comprehensive definition of cooperation is presented which guarantees a better reward and punishment system. In our approach, a multi-player game is defined with continuous strategy set and payoffs which lead to a more practical model. Based on the proposed game theoretic framework, existence of Nash equilibrium is then investigated. Finally, simulation results evaluate performance of the proposed scheme.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130198853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898939
Bin Li, Yumei Wang, Qing Huang, Yu Liu
Low-density Parity-Check (LDPC) code is widely used in distributed video coding (DVC) to realizing Wyner-Ziv (WZ) coding for its better performance than other channel codes. However, during the LDPC decoding process, most of DVC solutions do not make use of the video character to help decoding. In this paper, we propose an improved LDPC decoding scheme for DVC by utilizing the movement of the objects in the video sequence to partition different confidence areas for the side information (SI). The pixels in the SI correspond to different confidence areas, and the corresponding binary representations of the pixels will have different likelihood-ratio (LLR) initialization methods which are used to generate the LLR values for LDPC iterative decoding. The experimental results show that with the proposed decoding scheme the PSNR gain can reach up to 0.8 db without increasing the decoding complexity.
{"title":"An LDPC-based improved decoding scheme for distributed video codec","authors":"Bin Li, Yumei Wang, Qing Huang, Yu Liu","doi":"10.1109/CTS.2011.5898939","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898939","url":null,"abstract":"Low-density Parity-Check (LDPC) code is widely used in distributed video coding (DVC) to realizing Wyner-Ziv (WZ) coding for its better performance than other channel codes. However, during the LDPC decoding process, most of DVC solutions do not make use of the video character to help decoding. In this paper, we propose an improved LDPC decoding scheme for DVC by utilizing the movement of the objects in the video sequence to partition different confidence areas for the side information (SI). The pixels in the SI correspond to different confidence areas, and the corresponding binary representations of the pixels will have different likelihood-ratio (LLR) initialization methods which are used to generate the LLR values for LDPC iterative decoding. The experimental results show that with the proposed decoding scheme the PSNR gain can reach up to 0.8 db without increasing the decoding complexity.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128599623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-08DOI: 10.1109/CTS.2011.5898906
Yongliang Zhang, Yongyu Chang, Liyun Dai, Dacheng Yang
In this paper, we propose a simplified amplify-and-forward (AF) relaying scheme with adaptive modulation to maximize the spectral efficiency. We derive the closed-form expressions of the average spectral efficiency and outage probability of the proposed scheme over Rayleigh fading channels. The analysis results are verified by using Monte Carlo simulation. The numerical results demonstrate that the proposed scheme not only has simplified receiver architecture, but also can offer similarly high spectral efficiency as the MSE-AM scheme proposed in [1], when the relay link is stronger enough than the direct link.
{"title":"Performance of a simplified amplify-and-forward relaying with adaptive modulation over Rayleigh-fading channels","authors":"Yongliang Zhang, Yongyu Chang, Liyun Dai, Dacheng Yang","doi":"10.1109/CTS.2011.5898906","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898906","url":null,"abstract":"In this paper, we propose a simplified amplify-and-forward (AF) relaying scheme with adaptive modulation to maximize the spectral efficiency. We derive the closed-form expressions of the average spectral efficiency and outage probability of the proposed scheme over Rayleigh fading channels. The analysis results are verified by using Monte Carlo simulation. The numerical results demonstrate that the proposed scheme not only has simplified receiver architecture, but also can offer similarly high spectral efficiency as the MSE-AM scheme proposed in [1], when the relay link is stronger enough than the direct link.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129986803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}