Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703340
N. Bilandi, H. Verma, R. Dhir
Wireless Sensor Networks (WSN) and Wireless Body Area Network (WBAN) combined together with modern health care systems are the future of healthcare practices. WBAN witness an upward interest in healthcare sector and is more advanced than any existing telemedicine system. WBAN is an upgraded version of WSN in which number of sensors used are very less in number as compared to WSN and used for monitoring health care. Energy utilization and network lifetime are the main two major challenges in WBAN as recharging and replace batteries of sensors attached to a human body may lead to one’s uneasiness. In recent years, research has been focused on channel modelling, energy consumption, design of efficient medium access control (MAC) protocols for body area networks. For handling emergency data of networks, in this paper, we deployed in numerous practical WBAN scenarios using MAC protocol and tested in more generic Time Division Multiple access (TDMA) approach for avoid packet collision which leads to higher packet loss rate. It is tested in more generic topologies, contrasting the model’s efficiency to the highly esteemed and most remarkable methodologies in the literature. Simulation results show improved performance of the proposed protocols in comparison to the selected existing ones in terms of the chosen performance metrics.
{"title":"An Energy Efficient TDMA based MAC Protocol for Wireless Body Area Networks","authors":"N. Bilandi, H. Verma, R. Dhir","doi":"10.1109/ICSCCC.2018.8703340","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703340","url":null,"abstract":"Wireless Sensor Networks (WSN) and Wireless Body Area Network (WBAN) combined together with modern health care systems are the future of healthcare practices. WBAN witness an upward interest in healthcare sector and is more advanced than any existing telemedicine system. WBAN is an upgraded version of WSN in which number of sensors used are very less in number as compared to WSN and used for monitoring health care. Energy utilization and network lifetime are the main two major challenges in WBAN as recharging and replace batteries of sensors attached to a human body may lead to one’s uneasiness. In recent years, research has been focused on channel modelling, energy consumption, design of efficient medium access control (MAC) protocols for body area networks. For handling emergency data of networks, in this paper, we deployed in numerous practical WBAN scenarios using MAC protocol and tested in more generic Time Division Multiple access (TDMA) approach for avoid packet collision which leads to higher packet loss rate. It is tested in more generic topologies, contrasting the model’s efficiency to the highly esteemed and most remarkable methodologies in the literature. Simulation results show improved performance of the proposed protocols in comparison to the selected existing ones in terms of the chosen performance metrics.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130624461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703319
C. C. Evangeline, C. Kushala, B. K. R. Alluri
Task allocation for wireless sensor networks are dependent on energy of the nodes and time that is required to perform a task efficiently. Sensor network’s performance can be assessed based on energy and lifetime of a node. Queue Length is also one of the basis for allocating the task efficiently. Therefore in this paper, we propose two task allocation strategies which when compared with current related works is much more realistic and efficient for complex task processing in terms of decreasing execution time.
{"title":"Efficient Task Allocation Strategies For WSNs","authors":"C. C. Evangeline, C. Kushala, B. K. R. Alluri","doi":"10.1109/ICSCCC.2018.8703319","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703319","url":null,"abstract":"Task allocation for wireless sensor networks are dependent on energy of the nodes and time that is required to perform a task efficiently. Sensor network’s performance can be assessed based on energy and lifetime of a node. Queue Length is also one of the basis for allocating the task efficiently. Therefore in this paper, we propose two task allocation strategies which when compared with current related works is much more realistic and efficient for complex task processing in terms of decreasing execution time.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"156 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703289
Amaan Mehdi Naqvi, Niharika Dubey
This paper describes Artemis, a 2D Vector Graphics Markup Language that can be used to define shapes and objects such as polygons, images, texts, curves in a desktop application. The language is based on the syntax of XML and thus is very easy to implement and use. A very light-weight stack-based parser is responsible for parsing the code containing the AML(Artemis Markup Language). Once parsed, the output contains a proper description of the vertices to draw on the screen and this information can be used by any modern Graphics API to render them. Artemis produces output enough for rendering simple shapes such as circles, lines, rectangles, and triangles as well as complex polygons by specifying the coordinates on the screen. Artemis is also capable of parsing other data for example, colors, scaling, offsets, etc which make it easier for the shapes to be manipulated.
{"title":"Artemis 2D Vector Graphics Markup Language","authors":"Amaan Mehdi Naqvi, Niharika Dubey","doi":"10.1109/ICSCCC.2018.8703289","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703289","url":null,"abstract":"This paper describes Artemis, a 2D Vector Graphics Markup Language that can be used to define shapes and objects such as polygons, images, texts, curves in a desktop application. The language is based on the syntax of XML and thus is very easy to implement and use. A very light-weight stack-based parser is responsible for parsing the code containing the AML(Artemis Markup Language). Once parsed, the output contains a proper description of the vertices to draw on the screen and this information can be used by any modern Graphics API to render them. Artemis produces output enough for rendering simple shapes such as circles, lines, rectangles, and triangles as well as complex polygons by specifying the coordinates on the screen. Artemis is also capable of parsing other data for example, colors, scaling, offsets, etc which make it easier for the shapes to be manipulated.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703333
Saurav Singh, Manav Sharma, Janvi Malhotra, N. Bilandi
With the expansion of automation technology, life is getting simpler and smarter, therefore, Automatic systems are being preferred over the manual systems. Development of automation frameworks in the domain of Internet of Things (IoT) renders an unprecedented opportunity for designing smart and fully automated systems. IoT automation system allows the user to control, access, report and operate the system remotely from anywhere around the world through aninternet connection. In this paper,investigatethe full potential of automation systems in two scenarios as Wireless Industry Automation system (WIAS) and Home Automation System (HAS). In both works, we had used Raspberry Pi that employs the integration of cloud networking, wireless communication, to provide the user with remote control of appliances, machines and storing the data on the cloud. These systems are developed to be power efficient, economical and expandable with futuristic devices.
{"title":"An Effective Approach for Smart Infrastructures Using Internet of Things","authors":"Saurav Singh, Manav Sharma, Janvi Malhotra, N. Bilandi","doi":"10.1109/ICSCCC.2018.8703333","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703333","url":null,"abstract":"With the expansion of automation technology, life is getting simpler and smarter, therefore, Automatic systems are being preferred over the manual systems. Development of automation frameworks in the domain of Internet of Things (IoT) renders an unprecedented opportunity for designing smart and fully automated systems. IoT automation system allows the user to control, access, report and operate the system remotely from anywhere around the world through aninternet connection. In this paper,investigatethe full potential of automation systems in two scenarios as Wireless Industry Automation system (WIAS) and Home Automation System (HAS). In both works, we had used Raspberry Pi that employs the integration of cloud networking, wireless communication, to provide the user with remote control of appliances, machines and storing the data on the cloud. These systems are developed to be power efficient, economical and expandable with futuristic devices.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132703066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703295
Rajat Khurana, A. Kushwaha
Recognition of the human activities in videos has gathered numerous demands in various applications of computer vision such as Ambient Assisted Living, intelligent surveillance, Human Computer interaction. One of the most pioneering technique for Human Activity Recognition is based upon deep learning and this paper focuses on various approaches based on that. Convolution Neural Network and Recurrent Neural Networks are mostly used in deep learning architectures. Deep Learning have the capacity of automatic learning of the features from the input modality. Analysis based on Methodology, Accuracy, classifier and datasets is presented in this survey paper.
{"title":"Deep Learning Approaches for Human Activity Recognition in Video Surveillance - A Survey","authors":"Rajat Khurana, A. Kushwaha","doi":"10.1109/ICSCCC.2018.8703295","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703295","url":null,"abstract":"Recognition of the human activities in videos has gathered numerous demands in various applications of computer vision such as Ambient Assisted Living, intelligent surveillance, Human Computer interaction. One of the most pioneering technique for Human Activity Recognition is based upon deep learning and this paper focuses on various approaches based on that. Convolution Neural Network and Recurrent Neural Networks are mostly used in deep learning architectures. Deep Learning have the capacity of automatic learning of the features from the input modality. Analysis based on Methodology, Accuracy, classifier and datasets is presented in this survey paper.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703348
Prashant S. Kumar, N. Chauhan, N. Chand
Opportunistic networks are considered to be a special class of ad-hoc networks, where nodes carry the data packets until new communication opportunity is found. In opportunistic networks, there is an absence of permanent links between the nodes and it exhibits high delay. Simulation allows us to create the real world scenarios in resource and timed constrained environment. Assumptions and simulation tools play a vital role in the performance estimation of any network protocol. Thus, it is very important that tools be chosen carefully. In this article, we present a general idea of mobility model used in opportunistic networks research. Further, we describe the commonly used simulation tools in opportunistic networks along with their merits and limitations.
{"title":"Mobility Models and Simulation Tools for Opportunistic Networks","authors":"Prashant S. Kumar, N. Chauhan, N. Chand","doi":"10.1109/ICSCCC.2018.8703348","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703348","url":null,"abstract":"Opportunistic networks are considered to be a special class of ad-hoc networks, where nodes carry the data packets until new communication opportunity is found. In opportunistic networks, there is an absence of permanent links between the nodes and it exhibits high delay. Simulation allows us to create the real world scenarios in resource and timed constrained environment. Assumptions and simulation tools play a vital role in the performance estimation of any network protocol. Thus, it is very important that tools be chosen carefully. In this article, we present a general idea of mobility model used in opportunistic networks research. Further, we describe the commonly used simulation tools in opportunistic networks along with their merits and limitations.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703301
J. Kumar, Rajeev Kumar, Pushpender Kumar
Applications of machine learning supplemented with data mining techniques has become a hot topic for research worldwide, sports analytics is no exception though. Cricket is one of the most popular sports in Australia, Caribbean, UK and South Asian nations with a net fan base of around 2.5 billion. The game has tremendous spectator support in more than 100 nations and the masses show great interest in predicting the game outcomes. There are lots of pre-game and in-game attributes which decides the outcome of a cricket match. Pre-game attributes like the venue, past track-records, innings(first/second), team strength etc. and the various in-game attributes like toss, run rate, wickets remaining, strike rate etc. influence the result of a match in a predominant manner. In this study, 2 different ML approaches namely Decision Trees and Multilayer Perceptron Network have been used to analyse the effect produced on the outcome of a cricket match due to these varied factors. Based on these results CricAI: Cricket Match Outcome Prediction System has been developed. The designed tool takes into consideration the pregame attributes like the ground, venue (home, away, neutral) and innings (first/second) for predicting the final result of given match.
{"title":"Outcome Prediction of ODI Cricket Matches using Decision Trees and MLP Networks","authors":"J. Kumar, Rajeev Kumar, Pushpender Kumar","doi":"10.1109/ICSCCC.2018.8703301","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703301","url":null,"abstract":"Applications of machine learning supplemented with data mining techniques has become a hot topic for research worldwide, sports analytics is no exception though. Cricket is one of the most popular sports in Australia, Caribbean, UK and South Asian nations with a net fan base of around 2.5 billion. The game has tremendous spectator support in more than 100 nations and the masses show great interest in predicting the game outcomes. There are lots of pre-game and in-game attributes which decides the outcome of a cricket match. Pre-game attributes like the venue, past track-records, innings(first/second), team strength etc. and the various in-game attributes like toss, run rate, wickets remaining, strike rate etc. influence the result of a match in a predominant manner. In this study, 2 different ML approaches namely Decision Trees and Multilayer Perceptron Network have been used to analyse the effect produced on the outcome of a cricket match due to these varied factors. Based on these results CricAI: Cricket Match Outcome Prediction System has been developed. The designed tool takes into consideration the pregame attributes like the ground, venue (home, away, neutral) and innings (first/second) for predicting the final result of given match.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134365177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703266
N. Gupta, Neetu Sood, I. Saini
The brain is most complicated framework which involves association of billions of nerve cells (neurons) which displays rich spatiotemporal flow. Among all techniques for inspecting human brain, an immediate measure of cortical movement with a resolution less than millisecond is only obtained with EEG. Brain and meditation have a connection for centuries. This study involves statistical analysis of EEG spectral power during meditation and non-meditation. This study also deals with regular meditators in two conditions first are during meditation and second is during normal condition. The EEG signal is recorded for 40 subjects in which 20 are regular meditators and 20 are non-meditators. This recorded data is preprocessed to remove the artifacts. After that wavelet transform is applied for different wavelet functions and then Fourier transform is performed to achieve power spectrum density. It was found that theta power increases during meditation and also haar wavelet provides better results than other wavelet functions. This study signifies that with meditation there is a considerable change in EEG of person is observed.
{"title":"Statistical Feature Based Comparison of EEG in Meditation for Various Wavelet","authors":"N. Gupta, Neetu Sood, I. Saini","doi":"10.1109/ICSCCC.2018.8703266","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703266","url":null,"abstract":"The brain is most complicated framework which involves association of billions of nerve cells (neurons) which displays rich spatiotemporal flow. Among all techniques for inspecting human brain, an immediate measure of cortical movement with a resolution less than millisecond is only obtained with EEG. Brain and meditation have a connection for centuries. This study involves statistical analysis of EEG spectral power during meditation and non-meditation. This study also deals with regular meditators in two conditions first are during meditation and second is during normal condition. The EEG signal is recorded for 40 subjects in which 20 are regular meditators and 20 are non-meditators. This recorded data is preprocessed to remove the artifacts. After that wavelet transform is applied for different wavelet functions and then Fourier transform is performed to achieve power spectrum density. It was found that theta power increases during meditation and also haar wavelet provides better results than other wavelet functions. This study signifies that with meditation there is a considerable change in EEG of person is observed.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"161 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703207
Prateek Gupta, A. Sharma
In recent research, clustering protocols have gained a lot of interest in heterogeneous wireless sensor networks (HWSNs) because of handling many critical applications. This paper proposes the extension of MICHB (Modified Intelligent cluster head election based on Bacterial foraging optimization) for three level HWSNs. For this, we apply the MICHB algorithm to the existing protocols (ESEP and EDEEC), and propose MIESEP and MIEDEEC protocols which search sensor nodes (SNs) of high residual energies for cluster heads (CHs) election in distributed HWSNs. Consequently, provides minimized energy consumption, elongated stable period and proper load distribution in the network. Simulation results validate that proposed MIESEP and MIEDEEC protocols are capable in enhancing the overall network performance in distributed HWSNs.
{"title":"MICHB based extended stable clustering protocols for three-level heterogeneous WSNs","authors":"Prateek Gupta, A. Sharma","doi":"10.1109/ICSCCC.2018.8703207","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703207","url":null,"abstract":"In recent research, clustering protocols have gained a lot of interest in heterogeneous wireless sensor networks (HWSNs) because of handling many critical applications. This paper proposes the extension of MICHB (Modified Intelligent cluster head election based on Bacterial foraging optimization) for three level HWSNs. For this, we apply the MICHB algorithm to the existing protocols (ESEP and EDEEC), and propose MIESEP and MIEDEEC protocols which search sensor nodes (SNs) of high residual energies for cluster heads (CHs) election in distributed HWSNs. Consequently, provides minimized energy consumption, elongated stable period and proper load distribution in the network. Simulation results validate that proposed MIESEP and MIEDEEC protocols are capable in enhancing the overall network performance in distributed HWSNs.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703286
N. Pant
Congestion control in wireless sensor networks is a challenging area owing to the fact that the resources such as storage capacity, processing capability, sensing capability and power are limited in the sensor nodes building the wireless sensor network. Congestion occurs in wireless sensor networks when data packets flow towards a node where the node buffers are full or nearly full. To address these challenges we propose a newer congestion controlling algorithm which monitors the buffer occupancy and adjusts traffic rate to increase throughput and save energy. It detects the level of congestion based on two different thresholds. It also takes care that more number of higher priority packets are received at the destination and the life of the network is increased.
{"title":"Priority aware Congestion Control scheme using Dual Thresholds","authors":"N. Pant","doi":"10.1109/ICSCCC.2018.8703286","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703286","url":null,"abstract":"Congestion control in wireless sensor networks is a challenging area owing to the fact that the resources such as storage capacity, processing capability, sensing capability and power are limited in the sensor nodes building the wireless sensor network. Congestion occurs in wireless sensor networks when data packets flow towards a node where the node buffers are full or nearly full. To address these challenges we propose a newer congestion controlling algorithm which monitors the buffer occupancy and adjusts traffic rate to increase throughput and save energy. It detects the level of congestion based on two different thresholds. It also takes care that more number of higher priority packets are received at the destination and the life of the network is increased.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122284913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}