Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867407
Xiaorong Cheng, Tianqi Li
The requirement of the credibility is analyzed for smart grid data and the traditional theories of data measurement and bad data identification are studied in power system. On the basis of that, this paper mainly studies the credibility between data sources, the construction of the trusted network generation algorithm, and the hierarchical and dynamic trusted network model innovatively which is based on the relationship between data sources. The credibility evaluation of data sources, the credibility evaluation between data sources and the credibility evaluation of data are studied. The credibility between data sources is restricted by the credibility of data sources, the credibility of data sources is restricted both from the credibility of data and the credibility between data sources, the credibility of data is restricted by the credibility between data sources and the credibility of data sources, they are interrelated and restricted by each other and constitute to a whole. The simulation results show that the model can satisfy the requirement of the credibility of smart grid data better, and provide the ideas to solve the problem of the credibility measure for prospective research is feasible.
{"title":"A credibility measurement method of smart grid data","authors":"Xiaorong Cheng, Tianqi Li","doi":"10.1109/IMCEC.2016.7867407","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867407","url":null,"abstract":"The requirement of the credibility is analyzed for smart grid data and the traditional theories of data measurement and bad data identification are studied in power system. On the basis of that, this paper mainly studies the credibility between data sources, the construction of the trusted network generation algorithm, and the hierarchical and dynamic trusted network model innovatively which is based on the relationship between data sources. The credibility evaluation of data sources, the credibility evaluation between data sources and the credibility evaluation of data are studied. The credibility between data sources is restricted by the credibility of data sources, the credibility of data sources is restricted both from the credibility of data and the credibility between data sources, the credibility of data is restricted by the credibility between data sources and the credibility of data sources, they are interrelated and restricted by each other and constitute to a whole. The simulation results show that the model can satisfy the requirement of the credibility of smart grid data better, and provide the ideas to solve the problem of the credibility measure for prospective research is feasible.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128254153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867486
Lin Lin, Zhu Li
With the decline in air quality, China has frequently appeared foggy and hazy weather. It would have a negligible impact on the detection performance of millimeter wave systems. In this paper, the physical characteristics of fog and haze are discussed in detail. The mechanism of millimeter wave attenuation through fog and haze will be introduced as well. Calculation model of fog scattering and atmospheric absorption attenuation during millimeter wave propagation are established in this paper. Based on the above analysis, it works out the total attenuation consists of the haze scattering and atmospheric absorption, and further analysis the performance of the millimeter-wave systems working at non-atmospheric windows emphatically. The result shows that it has superior anti-reconnaissance performance and anti-jamming performance at non-atmospheric windows.
{"title":"Study of transmission effects of millimeter wave through fog and haze","authors":"Lin Lin, Zhu Li","doi":"10.1109/IMCEC.2016.7867486","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867486","url":null,"abstract":"With the decline in air quality, China has frequently appeared foggy and hazy weather. It would have a negligible impact on the detection performance of millimeter wave systems. In this paper, the physical characteristics of fog and haze are discussed in detail. The mechanism of millimeter wave attenuation through fog and haze will be introduced as well. Calculation model of fog scattering and atmospheric absorption attenuation during millimeter wave propagation are established in this paper. Based on the above analysis, it works out the total attenuation consists of the haze scattering and atmospheric absorption, and further analysis the performance of the millimeter-wave systems working at non-atmospheric windows emphatically. The result shows that it has superior anti-reconnaissance performance and anti-jamming performance at non-atmospheric windows.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867104
Zi-li Li, Chun-yang Jia, Da Huang
To verify the feasibility of the typhoon detection with the ocean echo data obtained by the shore-based High-Frequance Surface Wave Radar(HFSWR). The data was measured on the Bech Long Vi island of in September 2013. Calculate correlation coefficients of every part data to extract the ionospheric echo data, which infers reason out ionospheric echo variation characteristic. And it calculates the ionospheric echo SNR and analysis its SNR variation characteristics under the influence of typhoon. Ionospheric echo presents daily periodic changes in range-Doppler spectrum; Ionospheric echo SNR under the influence of typhoon decreased by about 5% to 10 %without the influence. It is feasible to detect typhoon with the ionospheric echo variation characteristic extracted from radar echo data.
{"title":"Research on characteristics of ionospheric echo based on ocean","authors":"Zi-li Li, Chun-yang Jia, Da Huang","doi":"10.1109/IMCEC.2016.7867104","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867104","url":null,"abstract":"To verify the feasibility of the typhoon detection with the ocean echo data obtained by the shore-based High-Frequance Surface Wave Radar(HFSWR). The data was measured on the Bech Long Vi island of in September 2013. Calculate correlation coefficients of every part data to extract the ionospheric echo data, which infers reason out ionospheric echo variation characteristic. And it calculates the ionospheric echo SNR and analysis its SNR variation characteristics under the influence of typhoon. Ionospheric echo presents daily periodic changes in range-Doppler spectrum; Ionospheric echo SNR under the influence of typhoon decreased by about 5% to 10 %without the influence. It is feasible to detect typhoon with the ionospheric echo variation characteristic extracted from radar echo data.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128374289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867260
Kuisheng Wang, Yan Hou
For the issues that the Web service is easy to suffer from SQL injection attacks in cloud computing environment. This paper proposes a kind of SQL detection method which combined with dynamic taint analysis and input filtering. And it is embedded in the cloud environment to achieve the protection of the Web applications in cloud deployment. First, the method obtains the SQL keywords through the analysis of lexical regulation for SQL statement. Then, it analyses the syntax regulation of SQL statement to create the rule tree. Finally, it traverses ternary tree on the basis of the model which established by SQL syntax regulation to detect the attacks. Experimental results show that the method is effective and feasible. Also, the accuracy is improved by adding the detection module.
{"title":"Detection method of SQL injection attack in cloud computing environment","authors":"Kuisheng Wang, Yan Hou","doi":"10.1109/IMCEC.2016.7867260","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867260","url":null,"abstract":"For the issues that the Web service is easy to suffer from SQL injection attacks in cloud computing environment. This paper proposes a kind of SQL detection method which combined with dynamic taint analysis and input filtering. And it is embedded in the cloud environment to achieve the protection of the Web applications in cloud deployment. First, the method obtains the SQL keywords through the analysis of lexical regulation for SQL statement. Then, it analyses the syntax regulation of SQL statement to create the rule tree. Finally, it traverses ternary tree on the basis of the model which established by SQL syntax regulation to detect the attacks. Experimental results show that the method is effective and feasible. Also, the accuracy is improved by adding the detection module.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867194
Sixiang Wang, Qi Cui, Xianwei Gao, Lei Zhang, Xiaoyi Duan
MCrypton is an ultra-lightweight symmetric cryptographic algorithm, which is designed to adapt to the resource constrained computing scenarios, such as RFID tags and sensor networks, etc. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Among the attack methods, the power consumption attack (PA) is widely adopted because of its advantages such as easy acquisition, fast efficiency and high accuracy. This paper has designed a complete differential power attack (DPA) platform, targeting at the mCrypton algorithm implemented on a Mega16 micro-controller. Test results indication that the mCrypton algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, the present paper proposes a fixed-value mask algorithm for mCrypton.
{"title":"Differential power analysis attack and countermeasures on MCrypton","authors":"Sixiang Wang, Qi Cui, Xianwei Gao, Lei Zhang, Xiaoyi Duan","doi":"10.1109/IMCEC.2016.7867194","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867194","url":null,"abstract":"MCrypton is an ultra-lightweight symmetric cryptographic algorithm, which is designed to adapt to the resource constrained computing scenarios, such as RFID tags and sensor networks, etc. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Among the attack methods, the power consumption attack (PA) is widely adopted because of its advantages such as easy acquisition, fast efficiency and high accuracy. This paper has designed a complete differential power attack (DPA) platform, targeting at the mCrypton algorithm implemented on a Mega16 micro-controller. Test results indication that the mCrypton algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, the present paper proposes a fixed-value mask algorithm for mCrypton.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867351
Junying Chen, Haijun You
As the health issue is being concerned by more and more people, the workload of a clinical doctor becomes larger. As there are many images to diagnose every day for a medical ultrasonic doctor, image pattern recognition and classification technologies for medical ultrasonic images are necessary to reduce the workload of the clinical doctor. The major image pattern recognition methods include Bayesian pattern classifier, support vector machine method, and neural network model. These image pattern classification methods present good image classification performance but require large training dataset and long training time. As such, efficient characteristics-based image pattern classification methods were discussed in this paper, standard deviation classification method and aspect ratio classification method. They were applied to the recognition and classification of benign and malignant thyroid tumors on medical ultrasonic images. These image pattern recognition methods were built upon the inherent characteristics of the benign and malignant thyroid tumors which were presented on the ultrasonic images. The efficient classification methods interpreted in the paper demonstrated good classification performance, which verified that the characteristics-based image pattern classification methods can be utilized in effective image classifier construction.
{"title":"Efficient classification of benign and malignant thyroid tumors based on characteristics of medical ultrasonic images","authors":"Junying Chen, Haijun You","doi":"10.1109/IMCEC.2016.7867351","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867351","url":null,"abstract":"As the health issue is being concerned by more and more people, the workload of a clinical doctor becomes larger. As there are many images to diagnose every day for a medical ultrasonic doctor, image pattern recognition and classification technologies for medical ultrasonic images are necessary to reduce the workload of the clinical doctor. The major image pattern recognition methods include Bayesian pattern classifier, support vector machine method, and neural network model. These image pattern classification methods present good image classification performance but require large training dataset and long training time. As such, efficient characteristics-based image pattern classification methods were discussed in this paper, standard deviation classification method and aspect ratio classification method. They were applied to the recognition and classification of benign and malignant thyroid tumors on medical ultrasonic images. These image pattern recognition methods were built upon the inherent characteristics of the benign and malignant thyroid tumors which were presented on the ultrasonic images. The efficient classification methods interpreted in the paper demonstrated good classification performance, which verified that the characteristics-based image pattern classification methods can be utilized in effective image classifier construction.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867268
Nan Yang, W. Xu, Wei Liu, W. Cheng
Pitch correction with preservation of voice timbre has been a challenging issue that hinders the development of music related applications. To address this problem, we propose a spectral modeling synthesis (SMS) based automatic pitch correction system for singing voice. When obtaining one candidate singing voice, we firstly conduct pitch detection with voiced/unvoiced decision, and extracts the pitch contour. Then it is compared with the reference pitches that is extracted from the singing voice of famous singer, such that the detuned parts can be determined. We perform SMS method to obtain the frequency components together with the spectral envelop of the candidate singing voice, and then continue adjusting the phase of every spectral peak by preserving the spectral envelop, until all the pitches are corrected. Experimental results show that the proposed system can provide good pitch correction effect.
{"title":"A pitch correction system based on spectral modeling synthesis technique","authors":"Nan Yang, W. Xu, Wei Liu, W. Cheng","doi":"10.1109/IMCEC.2016.7867268","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867268","url":null,"abstract":"Pitch correction with preservation of voice timbre has been a challenging issue that hinders the development of music related applications. To address this problem, we propose a spectral modeling synthesis (SMS) based automatic pitch correction system for singing voice. When obtaining one candidate singing voice, we firstly conduct pitch detection with voiced/unvoiced decision, and extracts the pitch contour. Then it is compared with the reference pitches that is extracted from the singing voice of famous singer, such that the detuned parts can be determined. We perform SMS method to obtain the frequency components together with the spectral envelop of the candidate singing voice, and then continue adjusting the phase of every spectral peak by preserving the spectral envelop, until all the pitches are corrected. Experimental results show that the proposed system can provide good pitch correction effect.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867377
S. Qiang, Yi Tao, Liu Bin, L. Hongzhong, Wang Linyu
Starts from the characteristics of the smart distribution and utilization system(SDUS), typical and representative applications are summarized for further research. The comprehensive benefit analysis model of SDUS from the perspective of the entire society, taking the battery-energy storage system (BESS), distributed generation (DG), charging and exchanging station, micro grid and smart home into account, is introduced on the basis of establishing the cost benefit models of all kinds of smart businesses through extracting the correlation among the various business from a bottom-up way. Combined with an example, the comprehensive benefit of SDUS and the contribution degrees of smart businesses to the benefits were analyzed. Result shows that the use of SDUS has certain social value, and the concept of net loss sensitivity and reliability sensitivity can be used to analysis redundant relationship and obtain the contribution degree of different devices to the total net loss benefit and total reliability benefit.
{"title":"Study on the comprehensive benefit analysis model of smart distribution and utilization system","authors":"S. Qiang, Yi Tao, Liu Bin, L. Hongzhong, Wang Linyu","doi":"10.1109/IMCEC.2016.7867377","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867377","url":null,"abstract":"Starts from the characteristics of the smart distribution and utilization system(SDUS), typical and representative applications are summarized for further research. The comprehensive benefit analysis model of SDUS from the perspective of the entire society, taking the battery-energy storage system (BESS), distributed generation (DG), charging and exchanging station, micro grid and smart home into account, is introduced on the basis of establishing the cost benefit models of all kinds of smart businesses through extracting the correlation among the various business from a bottom-up way. Combined with an example, the comprehensive benefit of SDUS and the contribution degrees of smart businesses to the benefits were analyzed. Result shows that the use of SDUS has certain social value, and the concept of net loss sensitivity and reliability sensitivity can be used to analysis redundant relationship and obtain the contribution degree of different devices to the total net loss benefit and total reliability benefit.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"64 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123233884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867228
Zixuan Wu, Li Tieke, Bailin Wang
Market demand of hot rolled seamless steel tube has the characteristics of multi-varieties and small batch. To meet the market demand and satisfy production requirements of seamless steel tube enterprises, this paper considers the machine maintenance factors and proposes a batch scheduling model. The model takes the machine adjustment and the idle time as optimization objective. To solve the problem, a hybrid variable neighborhood search combined with simulated annealing is designed. Experimental results show the feasibility and effectiveness of the model and algorithm.
{"title":"Hybrid variable neighborhood search for batch scheduling of hot rolled steel tube","authors":"Zixuan Wu, Li Tieke, Bailin Wang","doi":"10.1109/IMCEC.2016.7867228","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867228","url":null,"abstract":"Market demand of hot rolled seamless steel tube has the characteristics of multi-varieties and small batch. To meet the market demand and satisfy production requirements of seamless steel tube enterprises, this paper considers the machine maintenance factors and proposes a batch scheduling model. The model takes the machine adjustment and the idle time as optimization objective. To solve the problem, a hybrid variable neighborhood search combined with simulated annealing is designed. Experimental results show the feasibility and effectiveness of the model and algorithm.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867300
Hao Liu, Fang Liu, D. Tao
Based on the principle of compressed sensing theory and one of the reconstruction way—Matching Pursuit (MP) algorithm, this paper improve the MP algorithm, this method analyses the time-frequency parameter property of the Gabor atom and converts the inner product calculations in MP algorithm into cross-correlation calculations to reduce the computation cost. For real signal, cross-correlation calculation can be fast done by fast Hartley transform. Test shows that this approach can greatly improve the speed of reconstruction algorithm of compressed sensing
{"title":"Fast Hartley transform (FHT)based reconstruction algorithm of compressed sensing","authors":"Hao Liu, Fang Liu, D. Tao","doi":"10.1109/IMCEC.2016.7867300","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867300","url":null,"abstract":"Based on the principle of compressed sensing theory and one of the reconstruction way—Matching Pursuit (MP) algorithm, this paper improve the MP algorithm, this method analyses the time-frequency parameter property of the Gabor atom and converts the inner product calculations in MP algorithm into cross-correlation calculations to reduce the computation cost. For real signal, cross-correlation calculation can be fast done by fast Hartley transform. Test shows that this approach can greatly improve the speed of reconstruction algorithm of compressed sensing","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}