Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00011
M. Saravanan, Smita Behera, Vishakh Iyer
Blockchain is one of the most discussed disruptive technologies of recent times and for good reason; it has the potential of transforming how industries work into a more secure path. The technology can be applied in sectors that create value and where trust and security are of concern. In its early years, we have seen tremendous growth in Blockchain-based solutions for the financial sector with implementations in banking and cryptocurrencies and research of this technology in other sectors like IoT, Asset management etc. This paper discovers the possibility of exploring Blockchain in the telecom sector for a billing and charging solution which removes the industry's reliance on third party clearing houses by building in trust and security into the system thereby improving the speed and bringing down the costs of managing such large scale transactional data. Blockchain can be used to manage the CDR (Call Detail Records), fulfil roaming agreements between operators and even facilitate operator independent balance transfers between the users; all while maintaining state of the art cryptographic security of the system and drastically reducing the turnaround time of these transactions.
{"title":"Smart Contracts in Mobile Telecom Networks","authors":"M. Saravanan, Smita Behera, Vishakh Iyer","doi":"10.1109/ADCOM.2017.00011","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00011","url":null,"abstract":"Blockchain is one of the most discussed disruptive technologies of recent times and for good reason; it has the potential of transforming how industries work into a more secure path. The technology can be applied in sectors that create value and where trust and security are of concern. In its early years, we have seen tremendous growth in Blockchain-based solutions for the financial sector with implementations in banking and cryptocurrencies and research of this technology in other sectors like IoT, Asset management etc. This paper discovers the possibility of exploring Blockchain in the telecom sector for a billing and charging solution which removes the industry's reliance on third party clearing houses by building in trust and security into the system thereby improving the speed and bringing down the costs of managing such large scale transactional data. Blockchain can be used to manage the CDR (Call Detail Records), fulfil roaming agreements between operators and even facilitate operator independent balance transfers between the users; all while maintaining state of the art cryptographic security of the system and drastically reducing the turnaround time of these transactions.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114286363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00016
C. Srikanth
In this paper, we present salient properties of the mathematical object: sequence (collection) of arithmetic progressions, with the inverse property: i^th terms of j^th and (j + 1)^th progressions are multiplicative inverses of each other modulo (i + 1)^th term of j^th progression. The theory developed (in my doctoral thesis) on the defined object paves the way for a novel design of cryptographic primitives for (i) symmetric key cryptography, (ii) entity authentication, (iii) end-end encryption, and (iv) crypto-currencies. In addition to being efficient, the proposed primitives are customizable as they support a wide range of values for their security parameters. The customization feature allows proprietary versions, which can be used in both civilian and military applications. The proposed primitives are amenable to parallelization and well-suited for hardware portability. The security of these primitives is based on an well-defined hard problem. Some special cases of the problem are shown to be equivalent to the problem of factoring large integers, a holy grail of mathematics, whose computational difficulty is central to the security of RSA cryptosystem.
{"title":"PhD Forum 2017 New Cryptographic Systems Based on Certain Sequences of Arithmetic Progressions","authors":"C. Srikanth","doi":"10.1109/ADCOM.2017.00016","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00016","url":null,"abstract":"In this paper, we present salient properties of the mathematical object: sequence (collection) of arithmetic progressions, with the inverse property: i^th terms of j^th and (j + 1)^th progressions are multiplicative inverses of each other modulo (i + 1)^th term of j^th progression. The theory developed (in my doctoral thesis) on the defined object paves the way for a novel design of cryptographic primitives for (i) symmetric key cryptography, (ii) entity authentication, (iii) end-end encryption, and (iv) crypto-currencies. In addition to being efficient, the proposed primitives are customizable as they support a wide range of values for their security parameters. The customization feature allows proprietary versions, which can be used in both civilian and military applications. The proposed primitives are amenable to parallelization and well-suited for hardware portability. The security of these primitives is based on an well-defined hard problem. Some special cases of the problem are shown to be equivalent to the problem of factoring large integers, a holy grail of mathematics, whose computational difficulty is central to the security of RSA cryptosystem.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00015
Shreekanth M. Prabhu
Governance and Social Change are ongoing processes. In this work we attempt to develop a framework for good governance to catalyze social change. Zachman did pioneering work to define a framework for Enterprise architecture. It is a comprehensive ontology that guides information architecture. Here we evaluate Zachman framework for its applicability to achieve good governance. In addition, we draw on concepts from Unified Foundational Ontology to extend our framework. We also look at applying Balanced Score-Card approach for the governance scenario. In addition we also see how information management framework can inter-operate with models like theory of change and Bartels' theory of separations. We also evaluate the use of distributed global ledger protocols/methods such as Block-chain, Paxos and Raft to manage the state change in governance related information.
{"title":"Phd Forum 2017 - Information Management Framework for Good Governance","authors":"Shreekanth M. Prabhu","doi":"10.1109/ADCOM.2017.00015","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00015","url":null,"abstract":"Governance and Social Change are ongoing processes. In this work we attempt to develop a framework for good governance to catalyze social change. Zachman did pioneering work to define a framework for Enterprise architecture. It is a comprehensive ontology that guides information architecture. Here we evaluate Zachman framework for its applicability to achieve good governance. In addition, we draw on concepts from Unified Foundational Ontology to extend our framework. We also look at applying Balanced Score-Card approach for the governance scenario. In addition we also see how information management framework can inter-operate with models like theory of change and Bartels' theory of separations. We also evaluate the use of distributed global ledger protocols/methods such as Block-chain, Paxos and Raft to manage the state change in governance related information.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129463143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain is the latest buzzword in the FinTech scene and all companies big and small are vying to launch blockchain enabled products. At the basic technology level Blockchain is a distributed technology application. The challenges of operating such an application are known [1]. But the techniques of developing distributed applications by large enterprise teams, in a typical SDLC lifecycle (Develop, Test, Deploy and Upgrade) is not well known. Without proper methodologies / Formal Tools as is the case with most blockchain systems, bugs slip in easily. Studies on failures point to developers missing low handing bugs as most of the errors are simulated with 3 nodes or less [2]. The developer ecosystem is fast changing with technologies like containers and the emerging Micro Services architectures and Cloud Native Computing. The decisions on setup, build, CI/CD, Automated Testing are not taken at the beginning and as pointed out by [3] affect the entire project. The good news is that there are lot of tools available in the Open source domain that addresses the needs. The bad news is that picking the right combination to work in team sizes of 5 or more is not straight forward. This paper details our journey and lessons learnt on setting up Application Development Teams for Rapid Development in Blockchain using multiple blockchain tools like Ethereum and the HyperLedger Fabric. It details both our application architecture and the modifications needed to enable a Cloud Native architecture and the build/ deploy/ testing frameworks that we used.
{"title":"Enabling Enterprise Blockchain AppDev Teams","authors":"Prateek Reddy Yammanuru, Ayush Jain, Harihara Vinayakaram","doi":"10.1109/ADCOM.2017.00012","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00012","url":null,"abstract":"Blockchain is the latest buzzword in the FinTech scene and all companies big and small are vying to launch blockchain enabled products. At the basic technology level Blockchain is a distributed technology application. The challenges of operating such an application are known [1]. But the techniques of developing distributed applications by large enterprise teams, in a typical SDLC lifecycle (Develop, Test, Deploy and Upgrade) is not well known. Without proper methodologies / Formal Tools as is the case with most blockchain systems, bugs slip in easily. Studies on failures point to developers missing low handing bugs as most of the errors are simulated with 3 nodes or less [2]. The developer ecosystem is fast changing with technologies like containers and the emerging Micro Services architectures and Cloud Native Computing. The decisions on setup, build, CI/CD, Automated Testing are not taken at the beginning and as pointed out by [3] affect the entire project. The good news is that there are lot of tools available in the Open source domain that addresses the needs. The bad news is that picking the right combination to work in team sizes of 5 or more is not straight forward. This paper details our journey and lessons learnt on setting up Application Development Teams for Rapid Development in Blockchain using multiple blockchain tools like Ethereum and the HyperLedger Fabric. It details both our application architecture and the modifications needed to enable a Cloud Native architecture and the build/ deploy/ testing frameworks that we used.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00008
Takuma Takeuchi, Toshiya Shimizu, Ken Kamakura, Takeshi Shimoyama, H. Tsuda
Currency payment platforms on blockchains have widely spread through the e-commerce market all over the world. Colored Coins are ones of the platforms that can add information which expresses issuers and purposes of the coins. The purposes written in the information can express the usage such as coupons, but cannot prevent the coins from being paid for other purposes. First, in this paper, we propose an extended open assets protocol for limited-use assets. This protocol prevents the assets from being used for other purposes than the issuer's intended purposes. Second, we construct a limited-use asset management system on the blockchain platform with our proposed open assets protocol. Finally, we indicate the effects and use cases of our proposed system.
{"title":"A Limited-Use Asset Management System on the Blockchain Platform with an Extended Open Assets Protocol","authors":"Takuma Takeuchi, Toshiya Shimizu, Ken Kamakura, Takeshi Shimoyama, H. Tsuda","doi":"10.1109/ADCOM.2017.00008","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00008","url":null,"abstract":"Currency payment platforms on blockchains have widely spread through the e-commerce market all over the world. Colored Coins are ones of the platforms that can add information which expresses issuers and purposes of the coins. The purposes written in the information can express the usage such as coupons, but cannot prevent the coins from being paid for other purposes. First, in this paper, we propose an extended open assets protocol for limited-use assets. This protocol prevents the assets from being used for other purposes than the issuer's intended purposes. Second, we construct a limited-use asset management system on the blockchain platform with our proposed open assets protocol. Finally, we indicate the effects and use cases of our proposed system.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131125226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00014
P. Singh, Udai Shanker
Priority scheduling among running transactions is one of the most important issues in the design of mobile distributed real-time database systems (MDRTDBS). In MDRTDBS, to perform correct transaction scheduling, several priority heuristics with different concurrency control methods are used, so that, it could minimize transaction abort rate. Priority heuristic approaches deal with problem of assigning the priorities among transactions so that it could helpful with concurrency control (CC) mechanism to achieve typical time constraint. In recent few years, the performance of CC protocols of distributed real-time database Systems (DRTDBS) have been examined using different priority heuristics methods. However, very few numbers of approaches have been proposed on priority heuristics for wireless environments. Hence, a new priority heuristic method based on deadline computed by considering write only operations has been proposed for wireless environments. It is improved priority heuristic approach which shows better results than earlier priority heuristics. In recent years, researchers have classified the transactions in two types called as Read only transactions (ROT) and Update transaction. This new priority heuristic for mobile environment considers ROT and update transactions separately. Further, a study has also been done to examine the impact of these priority heuristics as compared with number of locks and mixed method approaches.
{"title":"Priority Heuristic in Mobile Distributed Real Time Database Using Optimistic Concurrency Control","authors":"P. Singh, Udai Shanker","doi":"10.1109/ADCOM.2017.00014","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00014","url":null,"abstract":"Priority scheduling among running transactions is one of the most important issues in the design of mobile distributed real-time database systems (MDRTDBS). In MDRTDBS, to perform correct transaction scheduling, several priority heuristics with different concurrency control methods are used, so that, it could minimize transaction abort rate. Priority heuristic approaches deal with problem of assigning the priorities among transactions so that it could helpful with concurrency control (CC) mechanism to achieve typical time constraint. In recent few years, the performance of CC protocols of distributed real-time database Systems (DRTDBS) have been examined using different priority heuristics methods. However, very few numbers of approaches have been proposed on priority heuristics for wireless environments. Hence, a new priority heuristic method based on deadline computed by considering write only operations has been proposed for wireless environments. It is improved priority heuristic approach which shows better results than earlier priority heuristics. In recent years, researchers have classified the transactions in two types called as Read only transactions (ROT) and Update transaction. This new priority heuristic for mobile environment considers ROT and update transactions separately. Further, a study has also been done to examine the impact of these priority heuristics as compared with number of locks and mixed method approaches.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114766728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00009
Sanket Panchamia, Deepak Kumar Byrappa
Currently in this digital world, passport is still a physical entity. It is carried at all places along with other travel related documents such as VISA and Immigration stamps that are also part of the passport(s). Each country maintains its own database of travel related information of the people entering and leaving the country. This paper is written with a vision of digitizing Passport, VISA and Immigration documents. Digitizing Passport and VISA helps in streamlining and simplifying Passport and VISA issuing, renewing, revoking, verification and validation process. For this process, we are proposing a solution based on distributed ledger for storing and retrieving information. Once implemented, this framework will help do-away with fake passports and VISA, unauthorized and repetitive data verification process. Blockchain-based distributed ledger implementation will solve several issues pertaining to paper-based authentication and make services more streamlined, improving efficiency and potentially lower costs at all levels.
{"title":"Passport, VISA and Immigration Management Using Blockchain","authors":"Sanket Panchamia, Deepak Kumar Byrappa","doi":"10.1109/ADCOM.2017.00009","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00009","url":null,"abstract":"Currently in this digital world, passport is still a physical entity. It is carried at all places along with other travel related documents such as VISA and Immigration stamps that are also part of the passport(s). Each country maintains its own database of travel related information of the people entering and leaving the country. This paper is written with a vision of digitizing Passport, VISA and Immigration documents. Digitizing Passport and VISA helps in streamlining and simplifying Passport and VISA issuing, renewing, revoking, verification and validation process. For this process, we are proposing a solution based on distributed ledger for storing and retrieving information. Once implemented, this framework will help do-away with fake passports and VISA, unauthorized and repetitive data verification process. Blockchain-based distributed ledger implementation will solve several issues pertaining to paper-based authentication and make services more streamlined, improving efficiency and potentially lower costs at all levels.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125645154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00010
C. Madhavan, C. Srikanth, H. V. K. Swamy
We present a computational system for handling, in an integrated manner, distributed transactional information and the associated monetary payment information, arising in typical organizational applications. Our paper contains three ideas: (i) a conceptual architectural design for chains of blocks of content transaction chains, (ii) a conceptual architectural design for blocks of financial instrument transaction chains including a proposed form of denominational digital cash, and (iii) a new, versatile cryptographic hash function to support all the chaining operations. In the total design, the transactional and financial information are chained together. We call these chains the VSK chains. Our system consists of centralized, auditable chains to manage distributed transactions of: (i) financial instruments (such as coins, tokens, or coupons used as a medium of exchange) and (ii) associated transactions of plain content (such as documents, or mail). The digital cash and the blockchains of our system can be adapted to models of decentralized blockchains, akin to cryptocurrencies, using proof-of-work/proof-of-stake computational principles. We have recently proposed a new key stream generator based on certain types of collections of arithmetic progressions of integers. Our scheme provides for enhanced flexibility and versatility with respect to parametric choices.We build our hashchains using the integer sequences derived from this collection. We present an outline of prototype development and implementation of certain modules of the VSK chains system.
{"title":"VSK Chains: Integrated Content and Currency Transaction Blockchains","authors":"C. Madhavan, C. Srikanth, H. V. K. Swamy","doi":"10.1109/ADCOM.2017.00010","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00010","url":null,"abstract":"We present a computational system for handling, in an integrated manner, distributed transactional information and the associated monetary payment information, arising in typical organizational applications. Our paper contains three ideas: (i) a conceptual architectural design for chains of blocks of content transaction chains, (ii) a conceptual architectural design for blocks of financial instrument transaction chains including a proposed form of denominational digital cash, and (iii) a new, versatile cryptographic hash function to support all the chaining operations. In the total design, the transactional and financial information are chained together. We call these chains the VSK chains. Our system consists of centralized, auditable chains to manage distributed transactions of: (i) financial instruments (such as coins, tokens, or coupons used as a medium of exchange) and (ii) associated transactions of plain content (such as documents, or mail). The digital cash and the blockchains of our system can be adapted to models of decentralized blockchains, akin to cryptocurrencies, using proof-of-work/proof-of-stake computational principles. We have recently proposed a new key stream generator based on certain types of collections of arithmetic progressions of integers. Our scheme provides for enhanced flexibility and versatility with respect to parametric choices.We build our hashchains using the integer sequences derived from this collection. We present an outline of prototype development and implementation of certain modules of the VSK chains system.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114832482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ADCOM.2017.00013
Saurabh Dhumwad, Mandar Sukhadeve, Chetankumari Naik, Manjunatha Kn, S. Prabhu
A blockchain maintains a permanent record of all the transactions that happen in a bitcoin network. It is an append-only ledger which is distributed to every node in the network. We have made use of blockchain technology for recording the transactions of peers without any supervision of a central authority. A cryptographic protocol using the Merkle tree and SHA-256 hashing technique is described which makes it possible to confirm the transactions are integrity protected and to archive the transactional history using Merkle tree in an append only ledger. Paper also discusses miners, who contribute to proof of work and validation of transactions in the peer to peer network.
{"title":"A Peer to Peer Money Transfer Using SHA256 and Merkle Tree","authors":"Saurabh Dhumwad, Mandar Sukhadeve, Chetankumari Naik, Manjunatha Kn, S. Prabhu","doi":"10.1109/ADCOM.2017.00013","DOIUrl":"https://doi.org/10.1109/ADCOM.2017.00013","url":null,"abstract":"A blockchain maintains a permanent record of all the transactions that happen in a bitcoin network. It is an append-only ledger which is distributed to every node in the network. We have made use of blockchain technology for recording the transactions of peers without any supervision of a central authority. A cryptographic protocol using the Merkle tree and SHA-256 hashing technique is described which makes it possible to confirm the transactions are integrity protected and to archive the transactional history using Merkle tree in an append only ledger. Paper also discusses miners, who contribute to proof of work and validation of transactions in the peer to peer network.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129136515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}