Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668168
Nishtha Gupta, Shubham Gupta, Divya Gupta
An individual has an ability to know various aspects of difficult situations and take spontaneous decisions about what to do in the next step. But till now, introduction of screens, displays, indicators, dials, gauges have provided human only a partial interface limiting individual’s ability to interact with reality.With the advancement of Augmented Reality (AR), this situation is evolving quickly, enabling people to profit by their regular perceptual and choice capacities, enhanced with the sensor and scientific abilities of an IoT stage.
{"title":"The rise in art of Augmented Reality","authors":"Nishtha Gupta, Shubham Gupta, Divya Gupta","doi":"10.1109/IC3IOT.2018.8668168","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668168","url":null,"abstract":"An individual has an ability to know various aspects of difficult situations and take spontaneous decisions about what to do in the next step. But till now, introduction of screens, displays, indicators, dials, gauges have provided human only a partial interface limiting individual’s ability to interact with reality.With the advancement of Augmented Reality (AR), this situation is evolving quickly, enabling people to profit by their regular perceptual and choice capacities, enhanced with the sensor and scientific abilities of an IoT stage.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"6 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668121
Komal Jaswal, Nirbhay Kashyap, Manmohan Singla, T. Choudhury
These days Internet of Things (IoT) has transformed into an extreme ponder which created strides in practically all fields of human life. This examination paper gives a survey of Internet of things and its engaging developments, security issues and creating applications in the remote progressions. There are enormous number of employments of Internet of things in essentially all aspects of life i.e. therapeutic administrations, collaborations and generation organize organization, savvy condition and social application et cetera thusly security is a fundamental stress of remote frameworks accordingly it is one of the rule issues in Internet of things. The following paper will provide a layout of some of the various security stresses in an Internet of things system, perils identified with it, challenges and a framework to protect Iot devices from such security issues
{"title":"A framework for Security and protection in Internet of things (IoT) devices","authors":"Komal Jaswal, Nirbhay Kashyap, Manmohan Singla, T. Choudhury","doi":"10.1109/IC3IOT.2018.8668121","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668121","url":null,"abstract":"These days Internet of Things (IoT) has transformed into an extreme ponder which created strides in practically all fields of human life. This examination paper gives a survey of Internet of things and its engaging developments, security issues and creating applications in the remote progressions. There are enormous number of employments of Internet of things in essentially all aspects of life i.e. therapeutic administrations, collaborations and generation organize organization, savvy condition and social application et cetera thusly security is a fundamental stress of remote frameworks accordingly it is one of the rule issues in Internet of things. The following paper will provide a layout of some of the various security stresses in an Internet of things system, perils identified with it, challenges and a framework to protect Iot devices from such security issues","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132496916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668128
Yasmeen Shaikh, V. Parvati, S. R. Biradar
Monitoring health of a person(s) has become a major IoT application where we need to have a system at home that helps inhabitants to have their health check done without affecting their daily routines. It is very much essential to have a IoT driven remote health monitoring system for ailing individuals which can inform caretakers in case of an emergency. These applications are constrained by the amount of data collected, managed and exchanged. The factors that constraint IoT applications are robustness, privacy, security and reliability. In this paper, a survey of various health care solutions using Internet of Things (IoT) is presented. This paper presents various challenges and problems that occur in smart health system and proposes solution to overcome them.
{"title":"Survey of Smart Healthcare Systems using Internet of Things (IoT) : (Invited Paper)","authors":"Yasmeen Shaikh, V. Parvati, S. R. Biradar","doi":"10.1109/IC3IOT.2018.8668128","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668128","url":null,"abstract":"Monitoring health of a person(s) has become a major IoT application where we need to have a system at home that helps inhabitants to have their health check done without affecting their daily routines. It is very much essential to have a IoT driven remote health monitoring system for ailing individuals which can inform caretakers in case of an emergency. These applications are constrained by the amount of data collected, managed and exchanged. The factors that constraint IoT applications are robustness, privacy, security and reliability. In this paper, a survey of various health care solutions using Internet of Things (IoT) is presented. This paper presents various challenges and problems that occur in smart health system and proposes solution to overcome them.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668147
K. Poornisha, M. R. Keerthana, S. Sumathi
As increase in population and over exploitation of water, groundwater level has decreased, people in the world face water crisis. India is an agarian country, farmers depend on groundwater, but to their disappointment there is irregular distribution of rainfall and failure of monsoon. So they are forced to drill borewells to greater depths and depend on it. Majority of people living in urban areas are dependent on borewells as there is no other alternative for water. The advancements in technology like Internet of Things, Cloud computing, Big Data, Internet facility can be used to design a system to monitor these immense important borewells to overcome disadvantages like poor quality drinking water, increased manpower requirements, irreversible damage caused to poorly monitored public motors. Design and development of monitoring pH, turbidity in the water and monitoring motor temperature and current in borewells would be of great use. Also borewells are not centrally monitored leading to dry run out or breakdown of the motor. Borewells are the vital source of water for the people in most of the towns and almost all cities to accomplish their basic requirements of a day. The system has two sensors for namely turbidity and pH sensor to check water quality and temperature sensor and current sensor for motor monitoring, Single microcontroller chip, a wifi chip is used to send the data of various borewells to a single sever. Thus by this system it is possible to monitor multiple borewells in a township remotely in a single mobile application.
{"title":"Borewell water quality and motor monitoring based on IoT gateway","authors":"K. Poornisha, M. R. Keerthana, S. Sumathi","doi":"10.1109/IC3IOT.2018.8668147","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668147","url":null,"abstract":"As increase in population and over exploitation of water, groundwater level has decreased, people in the world face water crisis. India is an agarian country, farmers depend on groundwater, but to their disappointment there is irregular distribution of rainfall and failure of monsoon. So they are forced to drill borewells to greater depths and depend on it. Majority of people living in urban areas are dependent on borewells as there is no other alternative for water. The advancements in technology like Internet of Things, Cloud computing, Big Data, Internet facility can be used to design a system to monitor these immense important borewells to overcome disadvantages like poor quality drinking water, increased manpower requirements, irreversible damage caused to poorly monitored public motors. Design and development of monitoring pH, turbidity in the water and monitoring motor temperature and current in borewells would be of great use. Also borewells are not centrally monitored leading to dry run out or breakdown of the motor. Borewells are the vital source of water for the people in most of the towns and almost all cities to accomplish their basic requirements of a day. The system has two sensors for namely turbidity and pH sensor to check water quality and temperature sensor and current sensor for motor monitoring, Single microcontroller chip, a wifi chip is used to send the data of various borewells to a single sever. Thus by this system it is possible to monitor multiple borewells in a township remotely in a single mobile application.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668141
Sachin Paswan, Y. Rathore
Leukemia is a development of the blood and bone marrow, the flexible tissue arranged the bones where platelets are made. Extraordinary myeloid leukemia (AML) is a champion among the most understood sorts of leukemia among adults. The signs and signs of leukemia are non-specific in nature and besides they are for all intents and purposes indistinguishable to the symptoms of other shared issue. Manual microscopic examination of recolored blood spread or bone marrow suction is the most ideal approach to fruitful investigation of leukemia. Regardless, this procedure is monotonous and less correct. In this paper, a technique for customized disclosure and portrayal of AML in blood spread is shown. K-implies calculation is utilized for division. KNN, CNN and SVM are utilized for grouping. GLCM is utilized for streamlining the ghostly highlights. Neighborhood double example is utilized for surface depiction. Blood magnifying instrument pictures were tried and the execution of the classifier was dissected. At long last, By utilizing CNN exactness of 98% has been accomplished
{"title":"Recognition and Arrangement of Blood Cancer from Microscopic Cell Pictures Utilizing Support Vector Machine K-Nearest Neighbor and Deep Learning","authors":"Sachin Paswan, Y. Rathore","doi":"10.1109/IC3IOT.2018.8668141","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668141","url":null,"abstract":"Leukemia is a development of the blood and bone marrow, the flexible tissue arranged the bones where platelets are made. Extraordinary myeloid leukemia (AML) is a champion among the most understood sorts of leukemia among adults. The signs and signs of leukemia are non-specific in nature and besides they are for all intents and purposes indistinguishable to the symptoms of other shared issue. Manual microscopic examination of recolored blood spread or bone marrow suction is the most ideal approach to fruitful investigation of leukemia. Regardless, this procedure is monotonous and less correct. In this paper, a technique for customized disclosure and portrayal of AML in blood spread is shown. K-implies calculation is utilized for division. KNN, CNN and SVM are utilized for grouping. GLCM is utilized for streamlining the ghostly highlights. Neighborhood double example is utilized for surface depiction. Blood magnifying instrument pictures were tried and the execution of the classifier was dissected. At long last, By utilizing CNN exactness of 98% has been accomplished","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668101
Amlan Kiran Mishra
Active electronically scanned array technology, with its unique degree of operational capability which is on the verge of increasing the performance of modern radar systems. AESA technology is particularly adventurous in the fighter radars. The performance, efficiency, life cycle cost makes it special. The development of packaging technology such as GaN, MMIC, the MMIC architecture are the recent trends which makes the further advancement in this sector.
{"title":"AESA radar and its application","authors":"Amlan Kiran Mishra","doi":"10.1109/IC3IOT.2018.8668101","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668101","url":null,"abstract":"Active electronically scanned array technology, with its unique degree of operational capability which is on the verge of increasing the performance of modern radar systems. AESA technology is particularly adventurous in the fighter radars. The performance, efficiency, life cycle cost makes it special. The development of packaging technology such as GaN, MMIC, the MMIC architecture are the recent trends which makes the further advancement in this sector.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668119
M. Darbandi, Saeed Haghgoo, Mahdi Hajiali, Alireza Khabir
Today, IT technologies and the internet are become an essential factors in human life’s. The demands level of the users are growing extensively, they need more generic software and hardware services, also they need, security in their processes and data transfers, dynamic accessibility, swift processing and also saving more money in their works. In this paper, we want to present new method for estimating and predicting the next user demands, and provide those services before direct request of the users. Our algorithm is based on Kalman filtering, and it used background usages of the users along with their suggestions in CRM section to be able to predict their next needs. By providing the next needs of the users, before their request, we can improve the level of customer satisfaction and also earn more money via suggesting the new software and applications.
{"title":"Prediction and Estimation of Next Demands of Cloud Users based on their Comments in CRM and Previous usages","authors":"M. Darbandi, Saeed Haghgoo, Mahdi Hajiali, Alireza Khabir","doi":"10.1109/IC3IOT.2018.8668119","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668119","url":null,"abstract":"Today, IT technologies and the internet are become an essential factors in human life’s. The demands level of the users are growing extensively, they need more generic software and hardware services, also they need, security in their processes and data transfers, dynamic accessibility, swift processing and also saving more money in their works. In this paper, we want to present new method for estimating and predicting the next user demands, and provide those services before direct request of the users. Our algorithm is based on Kalman filtering, and it used background usages of the users along with their suggestions in CRM section to be able to predict their next needs. By providing the next needs of the users, before their request, we can improve the level of customer satisfaction and also earn more money via suggesting the new software and applications.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668157
P. Patil, Kalyani Bhole
The current status of heart disease in India is alarming, with projections suggesting that by the year 2020, the population of heart patients in India will surpass all the countries. Thus, monitoring the electrical activity of heart i.e. electrocardiogram is a necessity rather than luxury. ECG machines available in hospital are rather expensive. This paper aims at charting the ECG signal using the Raspberry Pi Arm processor. The ECG signals are recorded from the patient via the AD8232 ECG module and then this data is digitized using serial ADC MCP3008. The processor maps the signal on an online graphics tool plotl.ly using python programming. The main advantage of this system is that the result can be viewed at any place at any time. In this way, Internet of Things (IOT) concept is used to diagnose the heart defect and abnormalities in ECG without involving expensive ECG machines.
{"title":"Real time ECG on internet using Raspberry Pi","authors":"P. Patil, Kalyani Bhole","doi":"10.1109/IC3IOT.2018.8668157","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668157","url":null,"abstract":"The current status of heart disease in India is alarming, with projections suggesting that by the year 2020, the population of heart patients in India will surpass all the countries. Thus, monitoring the electrical activity of heart i.e. electrocardiogram is a necessity rather than luxury. ECG machines available in hospital are rather expensive. This paper aims at charting the ECG signal using the Raspberry Pi Arm processor. The ECG signals are recorded from the patient via the AD8232 ECG module and then this data is digitized using serial ADC MCP3008. The processor maps the signal on an online graphics tool plotl.ly using python programming. The main advantage of this system is that the result can be viewed at any place at any time. In this way, Internet of Things (IOT) concept is used to diagnose the heart defect and abnormalities in ECG without involving expensive ECG machines.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130395651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668187
Du Zhiqin
Traditional offline sales of fashion businesses are shrinking, gradually replaced by the surging online sales due to the fast development of e-commerce in China. The success of online businesses has therefore become the key for the fashion businesses to succeed in such an industry with fierce competition. Under this situation, fashion businesses are trying all their means to improve their online sales through various marketing efforts. Many businesses do have successfully and effectively utilized WeChat, a mobile social networking tool, as a tool to market their products point to point, and many marketing strategies have been developed as a result. However, the majority of those strategies are formulated based on general marketing theories, and few are based on AISAS consumer behavior model (an acronym for Attention, Interest, Search, Action and Share). This research conducted a questionnaire randomly among young people, investigating the distribution of information WeChatters are concerned with, and the interaction of people with fashion businesses’ WeChat subscription accounts. On the basis of the investigation and the AISAS consumption model, fashion businesses are suggested to try all means to promote their WeChat subscription accounts, to well design and tailor make the information distributed to subscribers through WeChat, to interact efficiently with consumers before, during and after WeChat marketing campaigns, and to take measures to encourage consumers to share their positive shopping experiences through WeChat.
{"title":"Youth-Targeted WeChat Marketing Strategies of Fashion Businesses","authors":"Du Zhiqin","doi":"10.1109/IC3IOT.2018.8668187","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668187","url":null,"abstract":"Traditional offline sales of fashion businesses are shrinking, gradually replaced by the surging online sales due to the fast development of e-commerce in China. The success of online businesses has therefore become the key for the fashion businesses to succeed in such an industry with fierce competition. Under this situation, fashion businesses are trying all their means to improve their online sales through various marketing efforts. Many businesses do have successfully and effectively utilized WeChat, a mobile social networking tool, as a tool to market their products point to point, and many marketing strategies have been developed as a result. However, the majority of those strategies are formulated based on general marketing theories, and few are based on AISAS consumer behavior model (an acronym for Attention, Interest, Search, Action and Share). This research conducted a questionnaire randomly among young people, investigating the distribution of information WeChatters are concerned with, and the interaction of people with fashion businesses’ WeChat subscription accounts. On the basis of the investigation and the AISAS consumption model, fashion businesses are suggested to try all means to promote their WeChat subscription accounts, to well design and tailor make the information distributed to subscribers through WeChat, to interact efficiently with consumers before, during and after WeChat marketing campaigns, and to take measures to encourage consumers to share their positive shopping experiences through WeChat.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668162
A. Abijith, B. Abishek, Koundinya Spvs Nihith
Adhering to the stop line rule plays a major role in preventing mishaps at traffic intersections. In many parts of the world it can be seen that when the red light i.e. the stop signal turns on, many vehicles would have crossed the stop line and this causes an inconvenience to the pedestrians. This rule has become insignificant in recent times and many vehicles violate this rule and thus in turn, the safety of the pedestrians is compromised. Pedestrians usually expect motorists to halt before the stop line and thus sometimes pedestrians get involved in road accidents. To avoid all this mishaps, a solution is proposed which involves the use of a RFID System.
{"title":"Enforcing the stop line rule using Radio Frequency Identification tags","authors":"A. Abijith, B. Abishek, Koundinya Spvs Nihith","doi":"10.1109/IC3IOT.2018.8668162","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668162","url":null,"abstract":"Adhering to the stop line rule plays a major role in preventing mishaps at traffic intersections. In many parts of the world it can be seen that when the red light i.e. the stop signal turns on, many vehicles would have crossed the stop line and this causes an inconvenience to the pedestrians. This rule has become insignificant in recent times and many vehicles violate this rule and thus in turn, the safety of the pedestrians is compromised. Pedestrians usually expect motorists to halt before the stop line and thus sometimes pedestrians get involved in road accidents. To avoid all this mishaps, a solution is proposed which involves the use of a RFID System.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121456801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}