This study is to develop a wireless detection system for health and military application. Among the elderly population falling/collapsing is a common and very serious issue. It can cause severe injuries like fractures, joint dislocations, head injuries etc. In cases where person is immobilized or lost consciousness it is not possible to seek immediate help or medical attention. There are several cases where elderly people live alone are not found for hours after the fall which makes the situation more severe. The damage caused because of failure in seeking medical attention at the right time is more than the damage and injuries caused by the fall itself. Similar cases can be found with Border Security Force soldiers and other security people standing for long hours guarding the nation borders. Also VIP securities standing in front of VIP homes are vulnerable for such attacks causing injuries. Objective of this paper is to develop a wireless fall-detection system which can sense such situations and alerts others seeking help. The sensors for fall Detection is wearable by the potential-victim/user. Upon detection of fall/collapse the sensor system transmits the information wirelessly, which will be received by the care-taker's mobile. The sensor is a belt shaped wearable device consisting of accelerometer (tri-axial) and gyroscope. These sensors are used to classify the posture and dynamics of the user. The main aim of the project is to develop efficient algorithms to detect falls and distinguish between falls and non-falls using these sensors. The sensor is a part of zigbee node. It will communicate to the microcontroller over zigbee. Zigbee will provide an efficient wireless communication with the microcontroller with relatively small hardware size. The microcontroller is responsible for sending information to the Care taker's mobile using a GSM module interfaced to it. The microcontroller is interfaced to a PC in order to burn the program on to the microcontroller and for testing and debugging.
{"title":"Wireless Detection System for Health and Military Application","authors":"Yallalinga, N. Benni, S. Manvi","doi":"10.1109/IACC.2017.0045","DOIUrl":"https://doi.org/10.1109/IACC.2017.0045","url":null,"abstract":"This study is to develop a wireless detection system for health and military application. Among the elderly population falling/collapsing is a common and very serious issue. It can cause severe injuries like fractures, joint dislocations, head injuries etc. In cases where person is immobilized or lost consciousness it is not possible to seek immediate help or medical attention. There are several cases where elderly people live alone are not found for hours after the fall which makes the situation more severe. The damage caused because of failure in seeking medical attention at the right time is more than the damage and injuries caused by the fall itself. Similar cases can be found with Border Security Force soldiers and other security people standing for long hours guarding the nation borders. Also VIP securities standing in front of VIP homes are vulnerable for such attacks causing injuries. Objective of this paper is to develop a wireless fall-detection system which can sense such situations and alerts others seeking help. The sensors for fall Detection is wearable by the potential-victim/user. Upon detection of fall/collapse the sensor system transmits the information wirelessly, which will be received by the care-taker's mobile. The sensor is a belt shaped wearable device consisting of accelerometer (tri-axial) and gyroscope. These sensors are used to classify the posture and dynamics of the user. The main aim of the project is to develop efficient algorithms to detect falls and distinguish between falls and non-falls using these sensors. The sensor is a part of zigbee node. It will communicate to the microcontroller over zigbee. Zigbee will provide an efficient wireless communication with the microcontroller with relatively small hardware size. The microcontroller is responsible for sending information to the Care taker's mobile using a GSM module interfaced to it. The microcontroller is interfaced to a PC in order to burn the program on to the microcontroller and for testing and debugging.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Previously many works regarding addition and subtraction of two integers are done in CVT-XOR paradigm. It has been also seen that performance using Cellular automata machine (CAM) for addition and subtraction in CVT and XOR paradigm is much faster. In this current study, we mainly focus to handle the division algorithm and associated complexity in this paradigm. We also proposed a block diagram model of division algorithm which could be very much helpful for VLSI implementation on using recursive CAM.
{"title":"Efficient Division in Carry Value Transformation (CVT) and Exclusive OR (XOR) Paradigm","authors":"J. Das, P. Choudhury","doi":"10.1109/IACC.2017.0139","DOIUrl":"https://doi.org/10.1109/IACC.2017.0139","url":null,"abstract":"Previously many works regarding addition and subtraction of two integers are done in CVT-XOR paradigm. It has been also seen that performance using Cellular automata machine (CAM) for addition and subtraction in CVT and XOR paradigm is much faster. In this current study, we mainly focus to handle the division algorithm and associated complexity in this paradigm. We also proposed a block diagram model of division algorithm which could be very much helpful for VLSI implementation on using recursive CAM.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wheelchair usage in India is increasing rapidly due to higher ageing population, road accidents etc. In case of nuclear families, the elder people those who are unable to do their regular activities without assistance, are left alone at their home. Manual propelling is difficult for aged population for which they employ use of the motorized wheelchair, but their costs is quite high making it difficult for the middle income people to procure it. In order to overcome the above challenge, we proposed a novel wheel chair design "low cost local-mapnavigation based intelligent wheelchair". In this paper, we implemented design of voice control module for a motorized wheelchair which works based on the speech processing technique and local map navigation system. In speech processing, we employed the concept of mel – frequency cepstrum coefficients (MFCCs) and mean squared error (MSE). The simulation result shows the robustness of the voice recognition module. A microphone is provided with the wheelchair, if the user utters the destination i, e, where he/she wants to go, the wheel chair automatically takes to the destination. Based on the result we ensure that the proposed wheelchair will improve the quality of life of this population and helping them in achieving their daily routine tasks with comfort.
{"title":"Voice Control Module for Low Cost Local-Map Navigation Based Intelligent Wheelchair","authors":"Sateesh Reddy Avutu, D. Bhatia, B. V. Reddy","doi":"10.1109/IACC.2017.0129","DOIUrl":"https://doi.org/10.1109/IACC.2017.0129","url":null,"abstract":"Wheelchair usage in India is increasing rapidly due to higher ageing population, road accidents etc. In case of nuclear families, the elder people those who are unable to do their regular activities without assistance, are left alone at their home. Manual propelling is difficult for aged population for which they employ use of the motorized wheelchair, but their costs is quite high making it difficult for the middle income people to procure it. In order to overcome the above challenge, we proposed a novel wheel chair design \"low cost local-mapnavigation based intelligent wheelchair\". In this paper, we implemented design of voice control module for a motorized wheelchair which works based on the speech processing technique and local map navigation system. In speech processing, we employed the concept of mel – frequency cepstrum coefficients (MFCCs) and mean squared error (MSE). The simulation result shows the robustness of the voice recognition module. A microphone is provided with the wheelchair, if the user utters the destination i, e, where he/she wants to go, the wheel chair automatically takes to the destination. Based on the result we ensure that the proposed wheelchair will improve the quality of life of this population and helping them in achieving their daily routine tasks with comfort.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashmita De, Somdeb Chanda, B. Tudu, R. Bandyopadhyay, A. K. Hazarika, S. Sabhapondit, B. D. Baruah, P. Tamuly, Nabarun Bhattachryya
In this work total polyphenol contents in tea leaves have been estimated by the near infrared reflectance (NIR) spectroscopy and partial least squares (PLS) algorithm. During sample acquisition the number of variable is quite high for each spectra and whole range of spectra may not play an important role for building the calibration model of PLS algorithm. Selection of proper region for a particular application is an important task. Here, optimum wavelength was determined by genetic algorithm (GA) and particle swarm optimization (PSO). PLS algorithm was used to produce the fitness curve of PSO and GA. Training and testing was done by leave –one-sample out cross-validation during the model calibration. Testing and training was done using specific windows of wavelength. The optimum range was determined to be from 1027.75 nm to 1104.75 nm. The RMSECV value for the optimum range was observed to be 1.05.
{"title":"Wavelength Selection for Prediction of Polyphenol Content in Inward Tea Leaves Using NIR","authors":"Ashmita De, Somdeb Chanda, B. Tudu, R. Bandyopadhyay, A. K. Hazarika, S. Sabhapondit, B. D. Baruah, P. Tamuly, Nabarun Bhattachryya","doi":"10.1109/IACC.2017.0050","DOIUrl":"https://doi.org/10.1109/IACC.2017.0050","url":null,"abstract":"In this work total polyphenol contents in tea leaves have been estimated by the near infrared reflectance (NIR) spectroscopy and partial least squares (PLS) algorithm. During sample acquisition the number of variable is quite high for each spectra and whole range of spectra may not play an important role for building the calibration model of PLS algorithm. Selection of proper region for a particular application is an important task. Here, optimum wavelength was determined by genetic algorithm (GA) and particle swarm optimization (PSO). PLS algorithm was used to produce the fitness curve of PSO and GA. Training and testing was done by leave –one-sample out cross-validation during the model calibration. Testing and training was done using specific windows of wavelength. The optimum range was determined to be from 1027.75 nm to 1104.75 nm. The RMSECV value for the optimum range was observed to be 1.05.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syeeda Farah, M. Sushma, T. Asha, B. Cauvery, K.S. Shivanand
Most diseases are not triggered by a single genome but by a combination of genomes together. Sequences occurring more frequently in the diseased samples than in the healthy samples indicate the generic factors of the disease. DNA has become an extremely useful tool for predicting disease. By allowing medical professionals to identify genes in DNA that are markers for diseases, a person can make appropriate lifestyle or similar modifications to help lower the risk of disease. We propose a system in which the above knowledge is provided by determining the probabilistic levels of a disease occurring if the causal gene or the associated genes are mutated.
{"title":"DNA Based Disease Prediction Using Pathway Analysis","authors":"Syeeda Farah, M. Sushma, T. Asha, B. Cauvery, K.S. Shivanand","doi":"10.1109/IACC.2017.0133","DOIUrl":"https://doi.org/10.1109/IACC.2017.0133","url":null,"abstract":"Most diseases are not triggered by a single genome but by a combination of genomes together. Sequences occurring more frequently in the diseased samples than in the healthy samples indicate the generic factors of the disease. DNA has become an extremely useful tool for predicting disease. By allowing medical professionals to identify genes in DNA that are markers for diseases, a person can make appropriate lifestyle or similar modifications to help lower the risk of disease. We propose a system in which the above knowledge is provided by determining the probabilistic levels of a disease occurring if the causal gene or the associated genes are mutated.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"77 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124261481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Various parameters affect the performance of Genetic Algorithms in terms of the accuracy of the optimal solution achieved and convergence rate. In this paper, effect of one such important parameter (elite count) on the behavior of Genetic Algorithms is meticulously analyzed, A standard benchmark function 'Rastrigin's Function' is used for the purpose of the study, and the results indicate that the extremely high values of elite count result in premature convergence on local minima, while low values of elite count result in much better solutions, near to the global optima.
{"title":"Analysis of the Effect of Elite Count on the Behavior of Genetic Algorithms: A Perspective","authors":"Apoorva Mishra, A. Shukla","doi":"10.1109/IACC.2017.0172","DOIUrl":"https://doi.org/10.1109/IACC.2017.0172","url":null,"abstract":"Various parameters affect the performance of Genetic Algorithms in terms of the accuracy of the optimal solution achieved and convergence rate. In this paper, effect of one such important parameter (elite count) on the behavior of Genetic Algorithms is meticulously analyzed, A standard benchmark function 'Rastrigin's Function' is used for the purpose of the study, and the results indicate that the extremely high values of elite count result in premature convergence on local minima, while low values of elite count result in much better solutions, near to the global optima.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124266829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkata Krishna Kota, Thirumal Kumar Kanakurthi, T. Velayutham, M. Akila, H. M
Goal of Complex Event Processing (CEP) is to identify meaningful events (such as opportunities or threats) and respond to them as quickly as possible. Traditional CEP frameworks do not have built-in security features. Any intruder may enter into the system and may send incorrect data to CEP engine. It causes to miss some patterns or it may lead to wrong prediction of patterns. Traditional CEP systems can be exploited through one or the other way. CEP system malfunctions when it is exploited. There is no built in procedure to check the health status of traditional CEP systems. Traditional CEP systems do not have procedures to take appropriate actions when system is affected or going to affect. When CEP system identifies some patterns, it will alert corresponding personnel about the occurrence of the event. Sometimes alert message may be undelivered or unnoticed by the corresponding people. Traditional CEP systems will not provide delivery assurance of alert message. These are few security challenges to existing CEP systems. In this paper Secure Complex Event Processing Framework is proposed to address above security challenges. Proposed framework is generic and it is pluggable into any existing CEP systems.
{"title":"Secure Complex Event Processing Framework","authors":"Venkata Krishna Kota, Thirumal Kumar Kanakurthi, T. Velayutham, M. Akila, H. M","doi":"10.1109/IACC.2017.0044","DOIUrl":"https://doi.org/10.1109/IACC.2017.0044","url":null,"abstract":"Goal of Complex Event Processing (CEP) is to identify meaningful events (such as opportunities or threats) and respond to them as quickly as possible. Traditional CEP frameworks do not have built-in security features. Any intruder may enter into the system and may send incorrect data to CEP engine. It causes to miss some patterns or it may lead to wrong prediction of patterns. Traditional CEP systems can be exploited through one or the other way. CEP system malfunctions when it is exploited. There is no built in procedure to check the health status of traditional CEP systems. Traditional CEP systems do not have procedures to take appropriate actions when system is affected or going to affect. When CEP system identifies some patterns, it will alert corresponding personnel about the occurrence of the event. Sometimes alert message may be undelivered or unnoticed by the corresponding people. Traditional CEP systems will not provide delivery assurance of alert message. These are few security challenges to existing CEP systems. In this paper Secure Complex Event Processing Framework is proposed to address above security challenges. Proposed framework is generic and it is pluggable into any existing CEP systems.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chromosome images are captured by microscopicimaging and hence analysis of these chromosomes is very difficulttask. To correctly analyse the chromosomes, segmentation ofchromosome images is necessary. Segmentation is necessary foridentification genetic diseases. For accurate diagnosis, M-FISHlabelling technique is used. This technique helps in correctlyidentifying the genetic diseases. This technique uses 5 colorthat labels each of chromosomes and DNA stain. In thisproject, chromosome images are segmented using fuzzy cmeans algorithm and by using watershed algorithm. Thesegmentation results of both the algorithms are compared byfinding segmentation accuracy. The algorithms were tested onM-FISH database which is available online.
{"title":"Watershed and Clustering Based Segmentation of Chromosome Images","authors":"R. Manohar, J. Gawande","doi":"10.1109/IACC.2017.0145","DOIUrl":"https://doi.org/10.1109/IACC.2017.0145","url":null,"abstract":"Chromosome images are captured by microscopicimaging and hence analysis of these chromosomes is very difficulttask. To correctly analyse the chromosomes, segmentation ofchromosome images is necessary. Segmentation is necessary foridentification genetic diseases. For accurate diagnosis, M-FISHlabelling technique is used. This technique helps in correctlyidentifying the genetic diseases. This technique uses 5 colorthat labels each of chromosomes and DNA stain. In thisproject, chromosome images are segmented using fuzzy cmeans algorithm and by using watershed algorithm. Thesegmentation results of both the algorithms are compared byfinding segmentation accuracy. The algorithms were tested onM-FISH database which is available online.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kernel tracing facilitates to demonstrate various activities running inside the Operating System. Kernel tracing tools like LTT, LTTng, DTrace, FTrace provide details about processes and their resources but these tools lack to extract knowledge from it. Pattern recognition is a major field of data mining and knowledge discovery. This paper presents a survey of widely used algorithms like Apriori, Tree-projection, FPgrowth, Eclat for finding frequent pattern over the database. This paper presents a comparative study of frequent pattern mining algorithm and suggests that the FP-growth algorithm is suitable for finding patterns in kernel trace data.
{"title":"Survey on Frequent Pattern Mining Algorithm for Kernel Trace","authors":"A. Tate, L. Bewoor","doi":"10.1109/IACC.2017.0163","DOIUrl":"https://doi.org/10.1109/IACC.2017.0163","url":null,"abstract":"Kernel tracing facilitates to demonstrate various activities running inside the Operating System. Kernel tracing tools like LTT, LTTng, DTrace, FTrace provide details about processes and their resources but these tools lack to extract knowledge from it. Pattern recognition is a major field of data mining and knowledge discovery. This paper presents a survey of widely used algorithms like Apriori, Tree-projection, FPgrowth, Eclat for finding frequent pattern over the database. This paper presents a comparative study of frequent pattern mining algorithm and suggests that the FP-growth algorithm is suitable for finding patterns in kernel trace data.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116253437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firstly, this study proposed a new parallel adder circuit model in Carry Value Transformation (CVT)-Exclusive OR (XOR) paradigm. Secondly, an efficient multiplication algorithm is discussed along with its performance analysis on various inputs selection. Our design of proposed model for the addition of many integer pairs using parallel Cellular Automata Machines (CAMs) can perform the addition in a much better way with setting a preprocessing testing logic in it. CVT and XOR operations together can do the efficient addition of two non-negative integers for any bulk inputs using CAM. Multiplication is the repetitive addition process, which could be designed using recursive use of CAM. Our analysis up to 10 bits selection of all integer pairs suggest that the recursive use of CAM for multiplication becomes much faster in real life scenario for any types of inputs. Further exponential operation is highly needed for various fields of computer science which is also described in this paradigm.
{"title":"Design of a Parallel Adder Circuit for a Heavy Computing Environment and the Performance Analysis of Multiplication Algorithm","authors":"J. Das, P. Choudhury, Sudhakar Sahoo","doi":"10.1109/IACC.2017.0117","DOIUrl":"https://doi.org/10.1109/IACC.2017.0117","url":null,"abstract":"Firstly, this study proposed a new parallel adder circuit model in Carry Value Transformation (CVT)-Exclusive OR (XOR) paradigm. Secondly, an efficient multiplication algorithm is discussed along with its performance analysis on various inputs selection. Our design of proposed model for the addition of many integer pairs using parallel Cellular Automata Machines (CAMs) can perform the addition in a much better way with setting a preprocessing testing logic in it. CVT and XOR operations together can do the efficient addition of two non-negative integers for any bulk inputs using CAM. Multiplication is the repetitive addition process, which could be designed using recursive use of CAM. Our analysis up to 10 bits selection of all integer pairs suggest that the recursive use of CAM for multiplication becomes much faster in real life scenario for any types of inputs. Further exponential operation is highly needed for various fields of computer science which is also described in this paradigm.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}