Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702910
Tuomo Hanninen, J. Vartiainen, M. Juntti, M. Raustia
Opportunistic spectrum usage is one application of the so called cognitive communication systems that enables efficient spectrum usage in future wireless communication systems. One of the key features in opportunistic spectrum usage is a spectrum opportunity estimation method. Energy detection has the benefit that knowledge about the licensed users is not required. In this paper, energy detection method called the localization algorithm based on double-thresholding (LAD) is implemented on the wireless open-access research platform (WARP). The simulation measurements proved that the implementation was done correctly. Results included important information of consumed FPGA resources and processing latencies for the LAD method implementation.
{"title":"Implementation of spectrum sensing on wireless open-access research platform","authors":"Tuomo Hanninen, J. Vartiainen, M. Juntti, M. Raustia","doi":"10.1109/ISABEL.2010.5702910","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702910","url":null,"abstract":"Opportunistic spectrum usage is one application of the so called cognitive communication systems that enables efficient spectrum usage in future wireless communication systems. One of the key features in opportunistic spectrum usage is a spectrum opportunity estimation method. Energy detection has the benefit that knowledge about the licensed users is not required. In this paper, energy detection method called the localization algorithm based on double-thresholding (LAD) is implemented on the wireless open-access research platform (WARP). The simulation measurements proved that the implementation was done correctly. Results included important information of consumed FPGA resources and processing latencies for the LAD method implementation.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702897
Yves Gendrault, M. Madec, C. Lallement, J. Haiech
Synthetic biology is a science resulting from the connection between biotechnology and engineering sciences. It aims to design and build new biological systems and functions. The ability to design a new biological function according to given specifications includes many steps. One of the big issues is to formalize a design methodolgy and to develop adapted tools. One way to explore is to adapt the design flow used in digital microelectronics to synthetic biology. The paper focuses on a key point of the design flow, which is the development of a multi-abstraction model library for BioBricks, which is the basis of a design kit, provided to biodesigners, for simulation purposes. For each abstraction level, we present the way the model is built. The pertinence of each model is presented as well.
{"title":"Multi-abstraction modeling in synthetic biology","authors":"Yves Gendrault, M. Madec, C. Lallement, J. Haiech","doi":"10.1109/ISABEL.2010.5702897","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702897","url":null,"abstract":"Synthetic biology is a science resulting from the connection between biotechnology and engineering sciences. It aims to design and build new biological systems and functions. The ability to design a new biological function according to given specifications includes many steps. One of the big issues is to formalize a design methodolgy and to develop adapted tools. One way to explore is to adapt the design flow used in digital microelectronics to synthetic biology. The paper focuses on a key point of the design flow, which is the development of a multi-abstraction model library for BioBricks, which is the basis of a design kit, provided to biodesigners, for simulation purposes. For each abstraction level, we present the way the model is built. The pertinence of each model is presented as well.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129573040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702767
Wendong Yang, Yueming Cai, Weiwei Yang
In this paper, the outage performance is investigated for orthogonal frequency division multiplexing (OFDM)-based selective amplify-and-forward cooperative networks over independent but not identically distributed (i.n.i.d.) Nakagami-m fading channels, with integer values of parameter m. A unified closed-form expression for the outage probability is derived for three selective relaying schemes. The effect of the coherence bandwidth on these schemes is also investigated. Monte Carlo simulations are carried out to validate our analysis.
{"title":"Outage performance of OFDM-based selective amplify-and-forward cooperative networks over Nakagami-m fading channels","authors":"Wendong Yang, Yueming Cai, Weiwei Yang","doi":"10.1109/ISABEL.2010.5702767","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702767","url":null,"abstract":"In this paper, the outage performance is investigated for orthogonal frequency division multiplexing (OFDM)-based selective amplify-and-forward cooperative networks over independent but not identically distributed (i.n.i.d.) Nakagami-m fading channels, with integer values of parameter m. A unified closed-form expression for the outage probability is derived for three selective relaying schemes. The effect of the coherence bandwidth on these schemes is also investigated. Monte Carlo simulations are carried out to validate our analysis.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702884
F. Vatta, R. Romano, F. Mesiti
Objective of this paper is the study of Quantum Key Distribution (QKD) protocols based on classical error-correcting codes. The Quantum Key Distribution (QKD) systems and related protocols, in particular conditions, can use the classic channel coding techniques, instead of quantum error-correcting codes, both for correcting errors that occurred during the exchange of a cryptographic key between two authorized users, and to allow privacy amplification, in order to make completely vain a possible intruder attempt. The secret key is transmitted over a quantum, and thus safe, channel, characterized by very low transmission rates and high error rates. This channel is safe for the properties of a quantum system, where each measurement on the system perturbs the system itself, allowing the authorized users to “feel” if there is any intruder listening. Moreover, as shown by accurate experimental studies, the communication channel used for quantum key exchange is not able to reach high levels of reliability (the Quantum Bit Error Rate (QBER) takes values between 0.05 and 0.11), both because of the inherent characteristics of the system, and of the presence of a possible attacker. Thus, in order to obtain acceptable residual error rates, it is necessary to use a parallel classical and public channel, conversely characterized by high transmission rates and low error rates, on which to transmit only the redundancy bits of systematic channel codes with performance possibly close to the capacity limit.
{"title":"Analysis and design of parallel concatenated channel codes for Quantum Key Distribution (QKD) applications","authors":"F. Vatta, R. Romano, F. Mesiti","doi":"10.1109/ISABEL.2010.5702884","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702884","url":null,"abstract":"Objective of this paper is the study of Quantum Key Distribution (QKD) protocols based on classical error-correcting codes. The Quantum Key Distribution (QKD) systems and related protocols, in particular conditions, can use the classic channel coding techniques, instead of quantum error-correcting codes, both for correcting errors that occurred during the exchange of a cryptographic key between two authorized users, and to allow privacy amplification, in order to make completely vain a possible intruder attempt. The secret key is transmitted over a quantum, and thus safe, channel, characterized by very low transmission rates and high error rates. This channel is safe for the properties of a quantum system, where each measurement on the system perturbs the system itself, allowing the authorized users to “feel” if there is any intruder listening. Moreover, as shown by accurate experimental studies, the communication channel used for quantum key exchange is not able to reach high levels of reliability (the Quantum Bit Error Rate (QBER) takes values between 0.05 and 0.11), both because of the inherent characteristics of the system, and of the presence of a possible attacker. Thus, in order to obtain acceptable residual error rates, it is necessary to use a parallel classical and public channel, conversely characterized by high transmission rates and low error rates, on which to transmit only the redundancy bits of systematic channel codes with performance possibly close to the capacity limit.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126390551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702776
S. Benco, S. Boldrini, A. Ghittino, S. Annese, M. Di Benedetto
A time-domain recognition of different wireless technologies may be obtained using energy detection. In this work, an energy detector was implemented using the Universal Software Radio Peripheral SDR platform. The energy detector output allows the formation of a packet presence/absence diagram. Experimental results indicate that the observation of Bluetooth packet exchange patterns reveals technology-specific MAC layer procedures, leading to the conclusion that technology recognition can be obtained on the basis of time domain technology-specific features.
{"title":"Identification of packet exchange patterns based on energy detection: The Bluetooth case","authors":"S. Benco, S. Boldrini, A. Ghittino, S. Annese, M. Di Benedetto","doi":"10.1109/ISABEL.2010.5702776","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702776","url":null,"abstract":"A time-domain recognition of different wireless technologies may be obtained using energy detection. In this work, an energy detector was implemented using the Universal Software Radio Peripheral SDR platform. The energy detector output allows the formation of a packet presence/absence diagram. Experimental results indicate that the observation of Bluetooth packet exchange patterns reveals technology-specific MAC layer procedures, leading to the conclusion that technology recognition can be obtained on the basis of time domain technology-specific features.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124554456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702877
Keya Pandia, Sourabh Ravindran, G. Kovacs, L. Giovangrandi, Randy Cole
Chest-worn accelerometers have been shown to detect acoustic and mechanical signals corresponding to cardiovascular activity. This paper aims at investigating and characterizing two different components of chest acceleration (seismocardiogram) along two orthogonal axes: firstly, the sub-10 Hz ballistic signal components dominant in the vertical axis and secondly, the 10–50 Hz acoustic signal components more dominantly expressed in the radial axis. Acceleration signals from five subjects in response to a valsalva maneuver were measured. Correlations of features from the two above acceleration components were computed with respect to reference measurements of stroke volume and pulse pressure obtained with a Finapres continuous blood pressure system. The peak amplitude of the vertical ballistic and radial acoustic signal components were found to correlate well with stroke volume (R=0.78 and 0.83, for vertical ballistic and radial acoustic, respectively). Comparable correlations were found between beat RMS power (R=0.77 and 0.83) and stroke volume. Similarly, correlations were also observed between pulse pressure and peak amplitude (R=0.74 and 0.86) and the beat RMS power (R=0.74 and 0.86).
{"title":"Chest-accelerometry for hemodynamic trending during valsalva-recovery","authors":"Keya Pandia, Sourabh Ravindran, G. Kovacs, L. Giovangrandi, Randy Cole","doi":"10.1109/ISABEL.2010.5702877","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702877","url":null,"abstract":"Chest-worn accelerometers have been shown to detect acoustic and mechanical signals corresponding to cardiovascular activity. This paper aims at investigating and characterizing two different components of chest acceleration (seismocardiogram) along two orthogonal axes: firstly, the sub-10 Hz ballistic signal components dominant in the vertical axis and secondly, the 10–50 Hz acoustic signal components more dominantly expressed in the radial axis. Acceleration signals from five subjects in response to a valsalva maneuver were measured. Correlations of features from the two above acceleration components were computed with respect to reference measurements of stroke volume and pulse pressure obtained with a Finapres continuous blood pressure system. The peak amplitude of the vertical ballistic and radial acoustic signal components were found to correlate well with stroke volume (R=0.78 and 0.83, for vertical ballistic and radial acoustic, respectively). Comparable correlations were found between beat RMS power (R=0.77 and 0.83) and stroke volume. Similarly, correlations were also observed between pulse pressure and peak amplitude (R=0.74 and 0.86) and the beat RMS power (R=0.74 and 0.86).","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702892
V. Niemela, A. Rabbachin, A. Taparugssanagorn, M. Hamalainen, J. Iinatti
Wireless technology has been developing fast for years and is spreading to new areas of everyday life. One of the newest areas is healthcare and welfare sector where it can be a significant way to save costs and improve existing procedures. The coming years are going to be challenging as the population, in the developed countries especially, is aging fast and more patients are going to need treatment but with the same or even smaller number of nursing staff than nowadays. Therefore there is a clear need for both improvement of methods and cutting down the costs. In this paper, the performance of different ultra wideband (UWB) receivers implemented following the IEEE 802.15.4a requirements are being compared in different hospital environments. Wireless body area network (WBAN) radio channel models used in the simulations are based on the measurements carried out in a real hospital environment in Oulu, Finland.
{"title":"A comparison of UWB WBAN receivers in different measured hospital environments","authors":"V. Niemela, A. Rabbachin, A. Taparugssanagorn, M. Hamalainen, J. Iinatti","doi":"10.1109/ISABEL.2010.5702892","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702892","url":null,"abstract":"Wireless technology has been developing fast for years and is spreading to new areas of everyday life. One of the newest areas is healthcare and welfare sector where it can be a significant way to save costs and improve existing procedures. The coming years are going to be challenging as the population, in the developed countries especially, is aging fast and more patients are going to need treatment but with the same or even smaller number of nursing staff than nowadays. Therefore there is a clear need for both improvement of methods and cutting down the costs. In this paper, the performance of different ultra wideband (UWB) receivers implemented following the IEEE 802.15.4a requirements are being compared in different hospital environments. Wireless body area network (WBAN) radio channel models used in the simulations are based on the measurements carried out in a real hospital environment in Oulu, Finland.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702863
A. Mammeri, Brahim Hadjou, A. Khoumsi
With the emergence of visual sensor networks (VSN), low power wavelet-based coder (WBC) is becoming increasingly mandatory. This makes the selection of the appropriate wavelet, among many competitors, not an easy task. In our context, the appropriate wavelet is that one which dissipates low energy during image decomposition, while having an adequate quality of the reconstructed image at the reception. In this paper, a comparative study is investigated between different wavelet filters. Two versions of DWT implementation are considered following their emergence: the classical convolutional-based wavelets and the relatively new lifting-based wavelets.
{"title":"On the selection of appropriate wavelet filters for visual sensor networks","authors":"A. Mammeri, Brahim Hadjou, A. Khoumsi","doi":"10.1109/ISABEL.2010.5702863","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702863","url":null,"abstract":"With the emergence of visual sensor networks (VSN), low power wavelet-based coder (WBC) is becoming increasingly mandatory. This makes the selection of the appropriate wavelet, among many competitors, not an easy task. In our context, the appropriate wavelet is that one which dissipates low energy during image decomposition, while having an adequate quality of the reconstructed image at the reception. In this paper, a comparative study is investigated between different wavelet filters. Two versions of DWT implementation are considered following their emergence: the classical convolutional-based wavelets and the relatively new lifting-based wavelets.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702896
Jakub Kuzilek, L. Lhotská, M. Hanuliak
Holter recording of electrocardiographic signal (ECG) is usually disturbed by noise added to measured useful signal due to e. g. worse contact skin-electrode, body movements, etc. Our general goal is to find at least some piece of information from ECG (in our case — positions of QRS complexes) in corrupted signal, on which common preprocessing methods fail. The main purpose of the article is description of an automatic method of data preprocessing for QRS detection, which is the first step in our way to final solution. We use Independent Component Analysis based ”filter” that automatically chooses noise-free components. Selection is based on morfology of noise-free ECG components.
{"title":"Processing Holter ECG signal corrupted with noise: Using ICA for QRS complex detection","authors":"Jakub Kuzilek, L. Lhotská, M. Hanuliak","doi":"10.1109/ISABEL.2010.5702896","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702896","url":null,"abstract":"Holter recording of electrocardiographic signal (ECG) is usually disturbed by noise added to measured useful signal due to e. g. worse contact skin-electrode, body movements, etc. Our general goal is to find at least some piece of information from ECG (in our case — positions of QRS complexes) in corrupted signal, on which common preprocessing methods fail. The main purpose of the article is description of an automatic method of data preprocessing for QRS detection, which is the first step in our way to final solution. We use Independent Component Analysis based ”filter” that automatically chooses noise-free components. Selection is based on morfology of noise-free ECG components.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ISABEL.2010.5702862
Vinay Kolar, Vikram P. Munishwar, N. Abu-Ghazaleh
Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several practical challenges for realizing these algorithms in a networking system. In this paper, we consider a joint source-rate, routing and scheduling GNUM problem in CRNs. We discuss three issues of protocols that are derived directly from the optimal algorithms: spurious pressure points, bursty scheduling and the need for link pruning. We show that the above practical problems result in serious system implications such as large message passing overheads, packet delays and buffer requirements.
{"title":"Anomalies in optimal rate-control and scheduling protocols for Cognitive Radio Networks","authors":"Vinay Kolar, Vikram P. Munishwar, N. Abu-Ghazaleh","doi":"10.1109/ISABEL.2010.5702862","DOIUrl":"https://doi.org/10.1109/ISABEL.2010.5702862","url":null,"abstract":"Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several practical challenges for realizing these algorithms in a networking system. In this paper, we consider a joint source-rate, routing and scheduling GNUM problem in CRNs. We discuss three issues of protocols that are derived directly from the optimal algorithms: spurious pressure points, bursty scheduling and the need for link pruning. We show that the above practical problems result in serious system implications such as large message passing overheads, packet delays and buffer requirements.","PeriodicalId":165367,"journal":{"name":"2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115550594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}