Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586335
Ajay Sharma, H. Anand
Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.
{"title":"Cycle efficient and SNR dependent CQI Decoder implementation","authors":"Ajay Sharma, H. Anand","doi":"10.1109/ICACCS.2016.7586335","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586335","url":null,"abstract":"Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586365
Joshua Reginald Pullagura, D. Rao
A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.
{"title":"An efficient and reliable Cooperative Multicast routing based on hop tree in Ad-hoc Networks","authors":"Joshua Reginald Pullagura, D. Rao","doi":"10.1109/ICACCS.2016.7586365","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586365","url":null,"abstract":"A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586317
L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang
Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.
{"title":"Parallel implementation of arbitrary-sized Discrete Fourier Transform on FPGA","authors":"L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang","doi":"10.1109/ICACCS.2016.7586317","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586317","url":null,"abstract":"Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586356
A. Patil, Shital S Mali
Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.
{"title":"Hybrid cryptography mechanism for securing self-organized wireless networks","authors":"A. Patil, Shital S Mali","doi":"10.1109/ICACCS.2016.7586356","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586356","url":null,"abstract":"Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586343
P. M. James, Jaimol Thomas
Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.
{"title":"Comparative study of an efficient cascaded Inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586343","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586343","url":null,"abstract":"Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586383
Chandrima Chatterjee, Arunasish Acharya
In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.
{"title":"Proper use of web technology to teach older people: A case study","authors":"Chandrima Chatterjee, Arunasish Acharya","doi":"10.1109/ICACCS.2016.7586383","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586383","url":null,"abstract":"In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/icaccs.2016.7586305
E. Jeyakumar, L. Prabha
{"title":"National advisory committee","authors":"E. Jeyakumar, L. Prabha","doi":"10.1109/icaccs.2016.7586305","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586305","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586380
G. Poovila, N. Kavitha, Jim Mathew Philip
Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.
{"title":"Improving throughput in Hybrid Wireless Networks using P2P based Market guided distributed Routing mechanism","authors":"G. Poovila, N. Kavitha, Jim Mathew Philip","doi":"10.1109/ICACCS.2016.7586380","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586380","url":null,"abstract":"Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586396
Shashank Sharma, S. Dhavale
In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.
{"title":"A review of passive forensic techniques for detection of copy-move attacks on digital videos","authors":"Shashank Sharma, S. Dhavale","doi":"10.1109/ICACCS.2016.7586396","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586396","url":null,"abstract":"In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/icaccs.2016.7586304
R. Venkatesan
{"title":"Chief guest & session chairs","authors":"R. Venkatesan","doi":"10.1109/icaccs.2016.7586304","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586304","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}