Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019452
Snehal Ghorpade, S. Jagtap
The objective of this project of is to develop a fault detection technique for MOSFET's open circuit faults in voltage source inverter (VSI)-fed induction motor drives. This consist the analysis of the control signals and the line-to-line voltage levels during the switching time of MOSFET, under both healthy and faulty conditions which requires line-to-line voltage measurement, which provides information about switching states. The fault detection scheme is achieved by a simple hardware and it can be included in the existing inverter system. It not only detects the accurate single and multiple faults diagnosis but also minimizes the fault detection time.
{"title":"Detection and identification of open circuit faults in VSI-fed induction motor drive","authors":"Snehal Ghorpade, S. Jagtap","doi":"10.1109/ICACCCT.2014.7019452","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019452","url":null,"abstract":"The objective of this project of is to develop a fault detection technique for MOSFET's open circuit faults in voltage source inverter (VSI)-fed induction motor drives. This consist the analysis of the control signals and the line-to-line voltage levels during the switching time of MOSFET, under both healthy and faulty conditions which requires line-to-line voltage measurement, which provides information about switching states. The fault detection scheme is achieved by a simple hardware and it can be included in the existing inverter system. It not only detects the accurate single and multiple faults diagnosis but also minimizes the fault detection time.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121761694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019420
Suresh Kumar Balakrishnanl, Jagathy Raj
Now a days, email has become the most widely used communication system in daily life. To improve security and efficiency of email system, most of the current email system adopts S/MIME or PGP as the mechanism implement security. But these systems are not efficient because of the high cost for public key certificate management and the problem on credential trust management. This paper presents a complete implementation of a practical secure email system based on Identity Based Encryption (IBE) which uses DNS as the infrastructure for public key exchange, a proxy service for encryption/decryption on behalf of user and a secure key token or fingerprint authentication system for user authentication.
如今,电子邮件已经成为日常生活中使用最广泛的通信系统。为了提高电子邮件系统的安全性和效率,目前的电子邮件系统大多采用S/MIME或PGP作为安全机制来实现。但由于公钥证书管理成本高和证书信任管理问题,这些系统的效率不高。本文提出了一种基于身份加密(Identity based Encryption, IBE)的实用安全电子邮件系统的完整实现,该系统使用DNS作为公钥交换的基础设施,使用代理服务代表用户进行加/解密,使用安全密钥令牌或指纹认证系统对用户进行身份验证。
{"title":"Practical implementation of secure email system based on IBE, DNS and proxy service","authors":"Suresh Kumar Balakrishnanl, Jagathy Raj","doi":"10.1109/ICACCCT.2014.7019420","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019420","url":null,"abstract":"Now a days, email has become the most widely used communication system in daily life. To improve security and efficiency of email system, most of the current email system adopts S/MIME or PGP as the mechanism implement security. But these systems are not efficient because of the high cost for public key certificate management and the problem on credential trust management. This paper presents a complete implementation of a practical secure email system based on Identity Based Encryption (IBE) which uses DNS as the infrastructure for public key exchange, a proxy service for encryption/decryption on behalf of user and a secure key token or fingerprint authentication system for user authentication.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019366
P. Ravivarma, B. Ramasubramanian, G. Arunmani, B. Babumohan
Diabetic Retinopathy is the major cause of blindness in many diabetic patients. Automatic detection of exudates in retinal images can assist in early screening of Diabetic Retinopathy. Several techniques can achieve good performance on a good quality retinal images. But when the image is of low quality, we need a new method. In this paper, we presented a novel method for the detection of exudates in low quality retinal images. The colour retinal images are pre-processed by a hyperbolic median filter and then segmented using fuzzy c-means clustering algorithm. After segmenting the images, a set of features based on colour, size and texture are extracted. Then these features are optimized using Particle Swarm Optimization (PSO) technique. Finally the features are classified using a recursive Support Vector Machine (SVM) Classifier. The proposed method achieves an accuracy of 98% and predictivity of 98.5% for the identification of exudates.
{"title":"An efficient system for the detection of exudates in colour fundus images using image processing technique","authors":"P. Ravivarma, B. Ramasubramanian, G. Arunmani, B. Babumohan","doi":"10.1109/ICACCCT.2014.7019366","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019366","url":null,"abstract":"Diabetic Retinopathy is the major cause of blindness in many diabetic patients. Automatic detection of exudates in retinal images can assist in early screening of Diabetic Retinopathy. Several techniques can achieve good performance on a good quality retinal images. But when the image is of low quality, we need a new method. In this paper, we presented a novel method for the detection of exudates in low quality retinal images. The colour retinal images are pre-processed by a hyperbolic median filter and then segmented using fuzzy c-means clustering algorithm. After segmenting the images, a set of features based on colour, size and texture are extracted. Then these features are optimized using Particle Swarm Optimization (PSO) technique. Finally the features are classified using a recursive Support Vector Machine (SVM) Classifier. The proposed method achieves an accuracy of 98% and predictivity of 98.5% for the identification of exudates.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"22 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019148
A. Rahim
Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
{"title":"Implementation of image based authentication to ensure the security of mail server","authors":"A. Rahim","doi":"10.1109/ICACCCT.2014.7019148","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019148","url":null,"abstract":"Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019446
B. Raj Kiran, Meenakshi Jayaraman, V. .. Sreedevi
Efficient DC to DC and DC to AC converters play a vital role in the reliable performance of standalone and grid connected photovoltaic systems. This paper deals with DC to AC conversion by a seven level cascaded H-bridge multilevel inverter for a standalone photovoltaic system. The PV fed seven level cascaded H-bridge multilevel inverter is analyzed in two ways: 1) with equal voltage sources as input to the H-bridges and 2) with unequal voltage sources as input. A comparative study of the total harmonic distortion reduction in the PV fed multilevel inverter system with and without equal voltage sources as input is carried out. It is observed that with unequal voltage sources, the total harmonic distortion is increased than that with equal voltage sources as input to the PV fed seven level cascaded H-bridge multilevel inverter. Further, the study attempts to show that with an LC filter at the output stage of the multilevel inverter, the total harmonic reduction is significantly reduced and the power quality of the PV fed multilevel inverter system is highly improved. Results are verified using simulations done in MATLAB/Simulink environment.
{"title":"Power quality analysis of a PV fed seven level cascaded H-bridge multilevel inverter","authors":"B. Raj Kiran, Meenakshi Jayaraman, V. .. Sreedevi","doi":"10.1109/ICACCCT.2014.7019446","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019446","url":null,"abstract":"Efficient DC to DC and DC to AC converters play a vital role in the reliable performance of standalone and grid connected photovoltaic systems. This paper deals with DC to AC conversion by a seven level cascaded H-bridge multilevel inverter for a standalone photovoltaic system. The PV fed seven level cascaded H-bridge multilevel inverter is analyzed in two ways: 1) with equal voltage sources as input to the H-bridges and 2) with unequal voltage sources as input. A comparative study of the total harmonic distortion reduction in the PV fed multilevel inverter system with and without equal voltage sources as input is carried out. It is observed that with unequal voltage sources, the total harmonic distortion is increased than that with equal voltage sources as input to the PV fed seven level cascaded H-bridge multilevel inverter. Further, the study attempts to show that with an LC filter at the output stage of the multilevel inverter, the total harmonic reduction is significantly reduced and the power quality of the PV fed multilevel inverter system is highly improved. Results are verified using simulations done in MATLAB/Simulink environment.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019327
Anjali Kulkarni, A. Panditrao
Lung cancer is the uncontrolled growth of abnormal cells that starts off in one or both images. People who smoke have the greatest risk of lung cancer. The overall 5 year survival rate for lung cancer combining all stages is roughly 15%. Early detection of lung cancer can increase the chance of survival among people. Lung cancer may be found by imaging tests such as chest computed tomography scan as it provides more detailed picture. To classify the stages of lung cancer, image processing technique is developed. In this work, new algorithm is developed using image processing technique to detect the cancer at early stage with more accuracy. Image processing involves the pre-processing, feature extraction and finally classification steps.
{"title":"Classification of lung cancer stages on CT scan images using image processing","authors":"Anjali Kulkarni, A. Panditrao","doi":"10.1109/ICACCCT.2014.7019327","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019327","url":null,"abstract":"Lung cancer is the uncontrolled growth of abnormal cells that starts off in one or both images. People who smoke have the greatest risk of lung cancer. The overall 5 year survival rate for lung cancer combining all stages is roughly 15%. Early detection of lung cancer can increase the chance of survival among people. Lung cancer may be found by imaging tests such as chest computed tomography scan as it provides more detailed picture. To classify the stages of lung cancer, image processing technique is developed. In this work, new algorithm is developed using image processing technique to detect the cancer at early stage with more accuracy. Image processing involves the pre-processing, feature extraction and finally classification steps.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019215
Mrinmoy Bhattacharjee, Shubhrata Gupta
Recently Wireless Sensor Networks (WSNs) have garnered a great interest among the research community. WSNs are heavily energy constrained and hence redundant nodes in the network must be allowed to sleep so that the network lifetime may be enhanced. Recently a lot of work has been done to determine the amount of redundancy inherent in a WSN. This paper describes a method that attempts to reduce the redundancy in the network that is distributive in nature and does not use the location information of the nodes. To find out if a node is redundant, the nodes' sensing area overlap is to be found out. The method uses three-circle overlap area as the base case for finding the total overlap over the sensing area of a node by its neighbors. The work here is for static deployment of the sensor nodes.
{"title":"Determining redundant nodes in a location unaware Wireless Sensor Network","authors":"Mrinmoy Bhattacharjee, Shubhrata Gupta","doi":"10.1109/ICACCCT.2014.7019215","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019215","url":null,"abstract":"Recently Wireless Sensor Networks (WSNs) have garnered a great interest among the research community. WSNs are heavily energy constrained and hence redundant nodes in the network must be allowed to sleep so that the network lifetime may be enhanced. Recently a lot of work has been done to determine the amount of redundancy inherent in a WSN. This paper describes a method that attempts to reduce the redundancy in the network that is distributive in nature and does not use the location information of the nodes. To find out if a node is redundant, the nodes' sensing area overlap is to be found out. The method uses three-circle overlap area as the base case for finding the total overlap over the sensing area of a node by its neighbors. The work here is for static deployment of the sensor nodes.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019478
J. G. Anjana, M. Prasanth
Hierarchy of cache levels plays a major role for a faster memory access compared to direct main memory access for information recently used by a processor. In this paper, we propose a three level cache structure with additional decoder for much faster accesses. The three level caches maintains data redundancy and decoder helps to enable part of cache memory in each level rather than complete cache memory in each level. A piece of information from the address referencing the locations is used for enabling each way in corresponding levels. Thus the access takes less time rather than accessing the whole memory in each level. The decoder helps in enabling the way depending on few bits considered from the address to enable the desired way. A three level cache structure with L1 (2 way, 128 Kb), L2 (4 way, 128 kb) and L3 (8 way, 128 kb) has been simulated in Xilinx 9.1 ISE. The technology of decoder in each cache level improves the efficiency.
{"title":"A three level cache structure","authors":"J. G. Anjana, M. Prasanth","doi":"10.1109/ICACCCT.2014.7019478","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019478","url":null,"abstract":"Hierarchy of cache levels plays a major role for a faster memory access compared to direct main memory access for information recently used by a processor. In this paper, we propose a three level cache structure with additional decoder for much faster accesses. The three level caches maintains data redundancy and decoder helps to enable part of cache memory in each level rather than complete cache memory in each level. A piece of information from the address referencing the locations is used for enabling each way in corresponding levels. Thus the access takes less time rather than accessing the whole memory in each level. The decoder helps in enabling the way depending on few bits considered from the address to enable the desired way. A three level cache structure with L1 (2 way, 128 Kb), L2 (4 way, 128 kb) and L3 (8 way, 128 kb) has been simulated in Xilinx 9.1 ISE. The technology of decoder in each cache level improves the efficiency.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114466905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019382
A. Jyoti, V. Arora
The paper addresses deadlock due to lock acquisition dependency and wait-notify anomalies. In this work, dependencies are visualized with three types of dependence graphs namely data-control, lock acquisition and wait-notify dependence graphs. Algorithms are also proposed for generating graphs; and hence, bugs are detected due to blockage. Graphical method is used to detect bugs. A prototype tool “Bug Visualizer” is implemented in Java version 7.
{"title":"Visualization of deadlock and wait-notify anomaly in multithreaded programs","authors":"A. Jyoti, V. Arora","doi":"10.1109/ICACCCT.2014.7019382","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019382","url":null,"abstract":"The paper addresses deadlock due to lock acquisition dependency and wait-notify anomalies. In this work, dependencies are visualized with three types of dependence graphs namely data-control, lock acquisition and wait-notify dependence graphs. Algorithms are also proposed for generating graphs; and hence, bugs are detected due to blockage. Graphical method is used to detect bugs. A prototype tool “Bug Visualizer” is implemented in Java version 7.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019156
Shivangi Nanda, Parteek Bhatia
A semantic based approach is better in many ways than the keyword based searches. As the wide amount of information on the internet is exceling daily, the keyword based approach in many commercial search engines is failing to retrieve correct information without getting the knowledge and need of user query. Since the keyword based search could search for the particular language having that keyword, thus many commercial search engine is one language oriented. We present our solution for performing cross lingual semantic based search. First, we introduce the UNL, the approach followed and the frameworks IAN and EUGENE which are used as enconverter and deconverter for the system. Second, we focus on the failure of some other meaning based search engines in brief. Third, we present our semantic model semiautomated cross lingual semantic model, which encapsulate and sharpen previously proposed models. Forth, we report our analysis of search success using these data, which confirm and extend previous findings. Finally, we demonstrate our model on different strategies of search engine. Together, our semantic search engine is another approach that not only distinguishes between the search strategies but is able to perform meaning based, cross-lingual search using IAN encoder having dictionaries and rules of different languages.
{"title":"Semantic search engine and its strategies with IAN encoder","authors":"Shivangi Nanda, Parteek Bhatia","doi":"10.1109/ICACCCT.2014.7019156","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019156","url":null,"abstract":"A semantic based approach is better in many ways than the keyword based searches. As the wide amount of information on the internet is exceling daily, the keyword based approach in many commercial search engines is failing to retrieve correct information without getting the knowledge and need of user query. Since the keyword based search could search for the particular language having that keyword, thus many commercial search engine is one language oriented. We present our solution for performing cross lingual semantic based search. First, we introduce the UNL, the approach followed and the frameworks IAN and EUGENE which are used as enconverter and deconverter for the system. Second, we focus on the failure of some other meaning based search engines in brief. Third, we present our semantic model semiautomated cross lingual semantic model, which encapsulate and sharpen previously proposed models. Forth, we report our analysis of search success using these data, which confirm and extend previous findings. Finally, we demonstrate our model on different strategies of search engine. Together, our semantic search engine is another approach that not only distinguishes between the search strategies but is able to perform meaning based, cross-lingual search using IAN encoder having dictionaries and rules of different languages.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}