Diabetes is one of the life threatening diseases in theworld. Nowadays, diabetes patients are increasing due toimproper monitoring of blood glucose level. The diabetes infectedpatients have to check the amount of glucose level present in thebody using invasive method. By using this method, they have totake a drop of blood from the body and check the amount ofglucose level, by which they can inject the required amount ofinsulin into the body. To overcome the difficulties caused byinvasive method, in this prototype we are using non-invasivemethodology. The main objective of this work is to design aportable non-invasive blood glucose level monitoring device usingnear infrared sensors. The device includes Infrared LED,Photodiode and ATMEGA328 Microcontroller. Besides beingable to detect glucose concentration in blood, the device alsodisplays the required insulin dose based on glucose levelcorresponding to the Body Mass Index (BMI) of the user.
{"title":"Development of Smart Insulin Device for Non Invasive Blood Glucose Level Monitoring","authors":"P. S. Reddy, V. Jyothi","doi":"10.1109/IACC.2017.0112","DOIUrl":"https://doi.org/10.1109/IACC.2017.0112","url":null,"abstract":"Diabetes is one of the life threatening diseases in theworld. Nowadays, diabetes patients are increasing due toimproper monitoring of blood glucose level. The diabetes infectedpatients have to check the amount of glucose level present in thebody using invasive method. By using this method, they have totake a drop of blood from the body and check the amount ofglucose level, by which they can inject the required amount ofinsulin into the body. To overcome the difficulties caused byinvasive method, in this prototype we are using non-invasivemethodology. The main objective of this work is to design aportable non-invasive blood glucose level monitoring device usingnear infrared sensors. The device includes Infrared LED,Photodiode and ATMEGA328 Microcontroller. Besides beingable to detect glucose concentration in blood, the device alsodisplays the required insulin dose based on glucose levelcorresponding to the Body Mass Index (BMI) of the user.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In This paper portrays about real, power qualityissues mostly voltage quality[2] in the power system, massivelyconsequences for delicate loads[10], these heaps can be secure bypresenting custom power device[3] called Dynamic Voltagerestorer (DVR),in the line this is related in series, it caninfuse/absorb voltage [8][9]with the assistance of self upheldcapacitor[6] - infuse voltage in quadrature with the line currentamid sag[2] by including a (BESS)battery energy storage systeminfuse voltage in phase with Vs(v). With the goal that voltagesource converter rating is decreased, gate pulses should begenerated with the help of synchronous reference theory(SRF)and that BESS supportive network connected to IEEE 11, 33and 69 Bus distribution systems.
{"title":"Design of Battery Energy Storage System (BESS) Support Dynamic Voltage Restorer (DVR) to Reduce the Rating of Voltage Source Converter (VSC) Applied to IEEE 11, 33 & 69 Bus Systems","authors":"C. Udayakiran, S. H. Vali","doi":"10.1109/IACC.2017.0104","DOIUrl":"https://doi.org/10.1109/IACC.2017.0104","url":null,"abstract":"In This paper portrays about real, power qualityissues mostly voltage quality[2] in the power system, massivelyconsequences for delicate loads[10], these heaps can be secure bypresenting custom power device[3] called Dynamic Voltagerestorer (DVR),in the line this is related in series, it caninfuse/absorb voltage [8][9]with the assistance of self upheldcapacitor[6] - infuse voltage in quadrature with the line currentamid sag[2] by including a (BESS)battery energy storage systeminfuse voltage in phase with Vs(v). With the goal that voltagesource converter rating is decreased, gate pulses should begenerated with the help of synchronous reference theory(SRF)and that BESS supportive network connected to IEEE 11, 33and 69 Bus distribution systems.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Executing clustered tasks has proven to be an efficient method to improve the computation of Scientific Workflows (SWf) on clouds. However, clustered tasks has a higher probability of suffering from failures than a single task. Therefore, fault tolerance in cloud computing is extremely essential while running large-scale scientific applications. In this paper, a new heuristic called Cluster based Heterogeneous Earliest Finish Time (CHEFT) algorithm to enhance the scheduling and fault tolerance mechanism for SWf in highly distributed cloud environments is proposed. To mitigate the failure of clustered tasks, this algorithm uses idle-time of the provisioned resources to resubmit failed clustered tasks for successful execution of SWf. Experimental results show that the proposed algorithm have convincing impact on the SWf executions and also drastically reduce the resource waste compared to existing task replication techniques. A trace based simulation of five real SWf shows that this algorithm is able to sustain unexpected task failures with minimal cost and makespan.
{"title":"Fault-Tolerant Scheduling for Scientific Workflows in Cloud Environments","authors":"K. Vinay, S.M. Dilip Kumar","doi":"10.1109/IACC.2017.0043","DOIUrl":"https://doi.org/10.1109/IACC.2017.0043","url":null,"abstract":"Executing clustered tasks has proven to be an efficient method to improve the computation of Scientific Workflows (SWf) on clouds. However, clustered tasks has a higher probability of suffering from failures than a single task. Therefore, fault tolerance in cloud computing is extremely essential while running large-scale scientific applications. In this paper, a new heuristic called Cluster based Heterogeneous Earliest Finish Time (CHEFT) algorithm to enhance the scheduling and fault tolerance mechanism for SWf in highly distributed cloud environments is proposed. To mitigate the failure of clustered tasks, this algorithm uses idle-time of the provisioned resources to resubmit failed clustered tasks for successful execution of SWf. Experimental results show that the proposed algorithm have convincing impact on the SWf executions and also drastically reduce the resource waste compared to existing task replication techniques. A trace based simulation of five real SWf shows that this algorithm is able to sustain unexpected task failures with minimal cost and makespan.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127322309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Among all the proteins of Periplasmic C type cytochrome A (PPCA) family, only PPCA protein can interact with Deoxycholate (DXCA), while its other homologs can not, as observed from the crystal structures. This article presents a unique encoding scheme of amino acids which consists of six dimensional vectors where first three dimensions use the chemical and physical properties of amino acids and last three dimensions use one mathematical parameter "Impression" which has been previously very effective in explaining the degeneracy of Codon Table [14]. For bringing out the "Impression", the amino acids are denoted by ternary numbers which are done using molecular weights of amino acids in order. The use of chemical properties for the purpose of unique encoding of amino acids is our first agenda. Secondly we expose the reason of PPCA being able to interact alone among its homologs with regards to the embedded chemical properties along with graph theoretic model.
{"title":"Studying PPCA and Its Other Homologs in C7 Family towards the Binding with Deoxycholate Based on Unique Encoding of Amino Acids","authors":"Prasanta Pramanik, J. Das, P. Choudhury","doi":"10.1109/IACC.2017.0054","DOIUrl":"https://doi.org/10.1109/IACC.2017.0054","url":null,"abstract":"Among all the proteins of Periplasmic C type cytochrome A (PPCA) family, only PPCA protein can interact with Deoxycholate (DXCA), while its other homologs can not, as observed from the crystal structures. This article presents a unique encoding scheme of amino acids which consists of six dimensional vectors where first three dimensions use the chemical and physical properties of amino acids and last three dimensions use one mathematical parameter \"Impression\" which has been previously very effective in explaining the degeneracy of Codon Table [14]. For bringing out the \"Impression\", the amino acids are denoted by ternary numbers which are done using molecular weights of amino acids in order. The use of chemical properties for the purpose of unique encoding of amino acids is our first agenda. Secondly we expose the reason of PPCA being able to interact alone among its homologs with regards to the embedded chemical properties along with graph theoretic model.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Prasad, R. Swarnkar, K. Prasad, M. Radhakrishnan, Md. Farukh Hashmi, A. Keskar
Steady State Visually Evoked Potential (SSVEP) is one of the most popularly used signals in Brain Computer Interface (BCI) applications. A new method to detect SSVEP signals of three different frequencies (6Hz, 8Hz and 15Hz) has been proposed. This method uses Fast Walsh Hadamard Transform (FWHT) for feature extraction and Naive Bayes Classifier (NBC) for feature classification. The algorithms used in the proposed method FWHT and NBC consumes vey less memory and also makes the method less computationally complex. The proposed method also uses less execution time making it suitable for real time BCI application.
{"title":"SSVEP Signal Detection for BCI Application","authors":"P. Prasad, R. Swarnkar, K. Prasad, M. Radhakrishnan, Md. Farukh Hashmi, A. Keskar","doi":"10.1109/IACC.2017.0126","DOIUrl":"https://doi.org/10.1109/IACC.2017.0126","url":null,"abstract":"Steady State Visually Evoked Potential (SSVEP) is one of the most popularly used signals in Brain Computer Interface (BCI) applications. A new method to detect SSVEP signals of three different frequencies (6Hz, 8Hz and 15Hz) has been proposed. This method uses Fast Walsh Hadamard Transform (FWHT) for feature extraction and Naive Bayes Classifier (NBC) for feature classification. The algorithms used in the proposed method FWHT and NBC consumes vey less memory and also makes the method less computationally complex. The proposed method also uses less execution time making it suitable for real time BCI application.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a strategic approach for the generation of a number of variable length keys from a selected image. In any symmetric key algorithm, the same key cannot be used for a longer time and this enforces the user to change the key frequently. Images have more features than text like color, edges, ridges etc. Hence these features facilitate us to generate many keys of variable length. To strengthen the security of key we are applying Chinese Remainder Theorem (CRT) on the selected values from the selected image. Our experimental results proved that keys of variable length suitable for any algorithm can be generated from featured image in a secure way by using Chinese Remainder Theorem.
{"title":"Automatic Variable Length Key Generation from Images and CRT","authors":"K. Srinivas, V. Janaki","doi":"10.1109/IACC.2017.0148","DOIUrl":"https://doi.org/10.1109/IACC.2017.0148","url":null,"abstract":"This paper proposes a strategic approach for the generation of a number of variable length keys from a selected image. In any symmetric key algorithm, the same key cannot be used for a longer time and this enforces the user to change the key frequently. Images have more features than text like color, edges, ridges etc. Hence these features facilitate us to generate many keys of variable length. To strengthen the security of key we are applying Chinese Remainder Theorem (CRT) on the selected values from the selected image. Our experimental results proved that keys of variable length suitable for any algorithm can be generated from featured image in a secure way by using Chinese Remainder Theorem.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Murali, K. Kishore, C. R. Krishna, S. Kumar, A. Rao
Networking and communication systems are meant to perform data operations to obtain data integrity in secured states. For this reason, Block Cipher and Hash Function play an important role in providing the data integrity and security. Authenticated Encryption (AE) is a technique that performs both encryption and authentication with single algorithm and aids achieving high speed implementation goal in FPGAs. For security purposes, AES-GCM circuits are utilized in many of the applications. Key-synthesized technique is described with VPNs(Virtual Private Networks).
{"title":"Integrating the Reconfigurable Devices Using Slow-Changing Key Technique to Achieve High Performance","authors":"A. Murali, K. Kishore, C. R. Krishna, S. Kumar, A. Rao","doi":"10.1109/IACC.2017.0115","DOIUrl":"https://doi.org/10.1109/IACC.2017.0115","url":null,"abstract":"Networking and communication systems are meant to perform data operations to obtain data integrity in secured states. For this reason, Block Cipher and Hash Function play an important role in providing the data integrity and security. Authenticated Encryption (AE) is a technique that performs both encryption and authentication with single algorithm and aids achieving high speed implementation goal in FPGAs. For security purposes, AES-GCM circuits are utilized in many of the applications. Key-synthesized technique is described with VPNs(Virtual Private Networks).","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130575648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olugbenga A. Bankole, V. Lalitha, Habib Ullah Khan, Anjaneyulu Jinugu
The maritime industry represents one of the oldest industries known to man. From time immemorial human beings have been navigating the water ways as a transport medium for trade, leisure, basic transport and a myriad of other things including war between nations over territorial rights. The water ways also present dynamics in international relations as well with countries vying for the control of water locked mineral resources. The interest of nations in who controls the water ways and the resources therein also play a critical role in conflict and high politics amongst nations [1]. The impact of Information Technology on organisations that provide services to the mari-time sector is also brought under review with the aim of identifying the criticality of IT as a strategic business tool in positioning the organization for growth in the chosen market place, achieving reduction in the cost of doing business as well as criticality for survival as an organization is taken into consideration. Literature review and information gathering constitute the bulk of data for this research. Surveys were used to collate responses from industry practitioners. The responses were analysed and relevant details ascertained. The results of the survey and studies conducted clearly established the fact that Information Technology infrastructure is critical to the sustenance of the LNG shipping industry. Ensuring retention of seafarers who are key human resources to an shipping organization is seen to heavily depend on the provision of reliable IT infrastructure.
{"title":"Information Technology in the Maritime Industry Past, Present and Future: Focus on LNG Carriers","authors":"Olugbenga A. Bankole, V. Lalitha, Habib Ullah Khan, Anjaneyulu Jinugu","doi":"10.1109/IACC.2017.0157","DOIUrl":"https://doi.org/10.1109/IACC.2017.0157","url":null,"abstract":"The maritime industry represents one of the oldest industries known to man. From time immemorial human beings have been navigating the water ways as a transport medium for trade, leisure, basic transport and a myriad of other things including war between nations over territorial rights. The water ways also present dynamics in international relations as well with countries vying for the control of water locked mineral resources. The interest of nations in who controls the water ways and the resources therein also play a critical role in conflict and high politics amongst nations [1]. The impact of Information Technology on organisations that provide services to the mari-time sector is also brought under review with the aim of identifying the criticality of IT as a strategic business tool in positioning the organization for growth in the chosen market place, achieving reduction in the cost of doing business as well as criticality for survival as an organization is taken into consideration. Literature review and information gathering constitute the bulk of data for this research. Surveys were used to collate responses from industry practitioners. The responses were analysed and relevant details ascertained. The results of the survey and studies conducted clearly established the fact that Information Technology infrastructure is critical to the sustenance of the LNG shipping industry. Ensuring retention of seafarers who are key human resources to an shipping organization is seen to heavily depend on the provision of reliable IT infrastructure.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Normal feedback controllers may not perform well, because of the variations in process or Plant due to nonlinear actuators, changes in environmental conditions. The design of a controller for speed control of DC Motor with Model Reference Adaptive Control scheme using the MIT rule for adaptive mechanism is presented in this paper. The controller gives reasonable results, but to the changes in the amplitude of reference signal it is very sensitive. It is shown from the simulation work carried out in this paper that adaptive system becomes oscillatory if the value of adaptation gain or the amplitude of reference signal is sufficiently large. This paper also deals with the use of MIT rule along with the normalized algorithm to handle the variations in the reference signal, and this adaptation law is referred as modified MIT rule. The Modeling of MRAC is shown by means of simulation on MATLAB.
{"title":"Modeling and Analysis of Model Reference Adaptive Control by Using MIT and Modified MIT Rule for Speed Control of DC Motor","authors":"M. Swathi, P. Ramesh","doi":"10.1109/IACC.2017.0105","DOIUrl":"https://doi.org/10.1109/IACC.2017.0105","url":null,"abstract":"Normal feedback controllers may not perform well, because of the variations in process or Plant due to nonlinear actuators, changes in environmental conditions. The design of a controller for speed control of DC Motor with Model Reference Adaptive Control scheme using the MIT rule for adaptive mechanism is presented in this paper. The controller gives reasonable results, but to the changes in the amplitude of reference signal it is very sensitive. It is shown from the simulation work carried out in this paper that adaptive system becomes oscillatory if the value of adaptation gain or the amplitude of reference signal is sufficiently large. This paper also deals with the use of MIT rule along with the normalized algorithm to handle the variations in the reference signal, and this adaptation law is referred as modified MIT rule. The Modeling of MRAC is shown by means of simulation on MATLAB.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133987633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digitalization of music has grown deep into people's daily life. Derived services of digital music, such as recommendation systems and similarity test, then become essential for online services and marketing essentials. As a building block of these systems, music genre classification is necessary to support all these services. Previously, researchers mostly focused on low-level features, few of them viewed this problem from a more interpretable way, i.e., a musicological approach. This creates the problem that intermediate stages of the classification process are hardly interpretable, not much of music professionals' domain knowledge was therefore useful in the process. This paper approaches genre classification in a musicological way. The proposed method takes into consideration the high-level features that have clear musical meanings, so that music professionals would find the classification results interpretable. To examine more musicological elements other than additional statistical information, we use a dataset of only symbolic piano works, including more than 200 records of classical, jazz, and ragtime music. Feature extraction and n-gram text classification algorithm are performed. The proposed method proves its concept with experimental results achieving the prediction accuracy averaged above 90%, and with a peak of 98%. We believe that this novel method opens a door to allow music professional to contribute their expert knowledge meaningfully in the music genre classification process, the proposed approach would contribute significantly for future music classification and recommendation systems.
{"title":"Music Genre Classification: A N-Gram Based Musicological Approach","authors":"E. Zheng, M. Moh, Teng-Sheng Moh","doi":"10.1109/IACC.2017.0141","DOIUrl":"https://doi.org/10.1109/IACC.2017.0141","url":null,"abstract":"Digitalization of music has grown deep into people's daily life. Derived services of digital music, such as recommendation systems and similarity test, then become essential for online services and marketing essentials. As a building block of these systems, music genre classification is necessary to support all these services. Previously, researchers mostly focused on low-level features, few of them viewed this problem from a more interpretable way, i.e., a musicological approach. This creates the problem that intermediate stages of the classification process are hardly interpretable, not much of music professionals' domain knowledge was therefore useful in the process. This paper approaches genre classification in a musicological way. The proposed method takes into consideration the high-level features that have clear musical meanings, so that music professionals would find the classification results interpretable. To examine more musicological elements other than additional statistical information, we use a dataset of only symbolic piano works, including more than 200 records of classical, jazz, and ragtime music. Feature extraction and n-gram text classification algorithm are performed. The proposed method proves its concept with experimental results achieving the prediction accuracy averaged above 90%, and with a peak of 98%. We believe that this novel method opens a door to allow music professional to contribute their expert knowledge meaningfully in the music genre classification process, the proposed approach would contribute significantly for future music classification and recommendation systems.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133003322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}