Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728512
S. Rafi, N. Kumar, D. J. Kumar
Aadhaar is a unique identification issued by the Indian government to every resident of India. The Unique Identification Authority of India (UIDAI), which functions under the planning commission of India, is responsible for managing Aadhaar identification cards. The Aadhaar project was initiated as an attempt to have a unique identification document which would capture all the details including the demographic and biometric (fingerprints and iris scan) information. In some cases Biometric verification can even be faked remotely, with no product or equipment hack. Fingerprints can be duplicated from an assortment of surfaces and used to make a fake finger. Also, iris picture could be skimmed from photos and supplanted on a simulated eye-like protest. DNA (deoxyribonucleic acid), is the hereditary material and is unique in every person. As the DNA can’t be duplicated by any morphing techniques it will be more useful if we interlink the DNA samples to Aadhaar cards as an identification criteria.
{"title":"Survey for Interlinking of DNA Models with Aadhaar Real-Time Records for Enhanced Authentication","authors":"S. Rafi, N. Kumar, D. J. Kumar","doi":"10.1109/ICACCS.2019.8728512","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728512","url":null,"abstract":"Aadhaar is a unique identification issued by the Indian government to every resident of India. The Unique Identification Authority of India (UIDAI), which functions under the planning commission of India, is responsible for managing Aadhaar identification cards. The Aadhaar project was initiated as an attempt to have a unique identification document which would capture all the details including the demographic and biometric (fingerprints and iris scan) information. In some cases Biometric verification can even be faked remotely, with no product or equipment hack. Fingerprints can be duplicated from an assortment of surfaces and used to make a fake finger. Also, iris picture could be skimmed from photos and supplanted on a simulated eye-like protest. DNA (deoxyribonucleic acid), is the hereditary material and is unique in every person. As the DNA can’t be duplicated by any morphing techniques it will be more useful if we interlink the DNA samples to Aadhaar cards as an identification criteria.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today’s world we are facing an acute shortage of resources like Fuel, Clean Water, Shelter and Hygienic Food. And only 0.1%, of the total Water present on Earth, is available as clean and fresh water to the living beings. Also the human population on Earth is increasing day by day and most of the sources of clean water are depleting. Ground water levels are going down rapidly and the pollution of ground water by chemicals [Water and Soil Pollution] has alarming effects on the sustainable growth of Human Beings. Most of the clean water is wasted by the households and this usually takes place in Modern societies and recent establishments. This review paper discusses the need for water management, measures to control water scarcity and the idea of smart water grid for conservation of water and the challenges in its implementation in India.
{"title":"Review on Implementing Smart Water Grid for Smart Cities in India: Challenges and Solutions","authors":"Mehtab Fatima, Sonal Jain, Arvasu Chikara, Manan Luthra","doi":"10.1109/ICACCS.2019.8728485","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728485","url":null,"abstract":"In today’s world we are facing an acute shortage of resources like Fuel, Clean Water, Shelter and Hygienic Food. And only 0.1%, of the total Water present on Earth, is available as clean and fresh water to the living beings. Also the human population on Earth is increasing day by day and most of the sources of clean water are depleting. Ground water levels are going down rapidly and the pollution of ground water by chemicals [Water and Soil Pollution] has alarming effects on the sustainable growth of Human Beings. Most of the clean water is wasted by the households and this usually takes place in Modern societies and recent establishments. This review paper discusses the need for water management, measures to control water scarcity and the idea of smart water grid for conservation of water and the challenges in its implementation in India.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728353
A. Deebika Shree, J. Anusuya, S. Malathy
Public transportation system plays a major role in every aspect of life. It has a greater impact on economic development of the country. Tracking, monitoring, scheduling, alert services are the major challenges faced by this system. Currently, major services of this system are manually operated which are approximate and ease of access is denied to the people. This project aims in automating the services of the system that can provide the real time tracking experience of the public transport buses. The buses will be having RFID tags within them and RFID readers will be placed in every bus stops. Arduino serves as the central controller for this system. GSM module will be used to send the tracking messages to the authorized persons for continuous monitoring. GPS is used for getting the location of the buses. Users will be getting the bus tracking details as notifications in their mobiles through IoT. The inputs from RFID readers are continuously updated to Arduino for processing the data. The processed data is sent to the cloud which serves as the interface between the user and the system.
{"title":"Real Time Bus Tracking and Location Updation System","authors":"A. Deebika Shree, J. Anusuya, S. Malathy","doi":"10.1109/ICACCS.2019.8728353","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728353","url":null,"abstract":"Public transportation system plays a major role in every aspect of life. It has a greater impact on economic development of the country. Tracking, monitoring, scheduling, alert services are the major challenges faced by this system. Currently, major services of this system are manually operated which are approximate and ease of access is denied to the people. This project aims in automating the services of the system that can provide the real time tracking experience of the public transport buses. The buses will be having RFID tags within them and RFID readers will be placed in every bus stops. Arduino serves as the central controller for this system. GSM module will be used to send the tracking messages to the authorized persons for continuous monitoring. GPS is used for getting the location of the buses. Users will be getting the bus tracking details as notifications in their mobiles through IoT. The inputs from RFID readers are continuously updated to Arduino for processing the data. The processed data is sent to the cloud which serves as the interface between the user and the system.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"31 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728526
R. Rengasamy, M. Chidambaram
Cloud computing is a new paradigm in which computing is offered as services rather than physical products. Computing services are provided by third-party service providers which offer consumers affordable and flexible computing services via shared resources. Cloud providers offer different layers/levels of services to consumers over many types of application domains. Server consolidation is a technique for reducing operating costs of computer resources in virtualization. These expenses can lead to increasement of financial costs of servers, power consumption of servers, data-center cooling systems and labour costs. It is inefficient if there are under-utilized servers that have more space and consume more resources. The proposed method meets the requirements for effective resource allocation for cloud computing. The effectiveness of the proposed method is evaluated and reveals higher performance in cloud computing.
{"title":"A Novel Predictive Resource Allocation Framework for Cloud Computing","authors":"R. Rengasamy, M. Chidambaram","doi":"10.1109/ICACCS.2019.8728526","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728526","url":null,"abstract":"Cloud computing is a new paradigm in which computing is offered as services rather than physical products. Computing services are provided by third-party service providers which offer consumers affordable and flexible computing services via shared resources. Cloud providers offer different layers/levels of services to consumers over many types of application domains. Server consolidation is a technique for reducing operating costs of computer resources in virtualization. These expenses can lead to increasement of financial costs of servers, power consumption of servers, data-center cooling systems and labour costs. It is inefficient if there are under-utilized servers that have more space and consume more resources. The proposed method meets the requirements for effective resource allocation for cloud computing. The effectiveness of the proposed method is evaluated and reveals higher performance in cloud computing.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728381
J. Priya, M. Gunasekaran
IoT, the network of the future. The futuristic trend is towards the emerging technology based on the internet, which comprises a number of devices arranged systematic to form a network, converse among themselves and sharing exclusive information with the help of the Internet is named as Internet-of-Things (IoT). The context becomes smarter when so many devices get connected and placed properly. IoT network must also tackle with the overplus of security and privacy threats which disorganize and seize the data of entire industries as like some other existing information systems based on web technology. Therefore, to overcome this, IoT network must act towards effectively with the threats and also to make sure security and privacy of information that shared in a network. This paper gives an overview of the existing works on security and privacy challenges in the IoT network. In addition, the paper discusses the security attacks and privacy issues on IoT data. Hence, concern about privacy-preserving and security-aware is needed so that better protections shall be incorporated to make the massive IoT network to be a secured one.
{"title":"Security-Aware and Privacy-Preserving Communication in the Internet of Things: A Review","authors":"J. Priya, M. Gunasekaran","doi":"10.1109/ICACCS.2019.8728381","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728381","url":null,"abstract":"IoT, the network of the future. The futuristic trend is towards the emerging technology based on the internet, which comprises a number of devices arranged systematic to form a network, converse among themselves and sharing exclusive information with the help of the Internet is named as Internet-of-Things (IoT). The context becomes smarter when so many devices get connected and placed properly. IoT network must also tackle with the overplus of security and privacy threats which disorganize and seize the data of entire industries as like some other existing information systems based on web technology. Therefore, to overcome this, IoT network must act towards effectively with the threats and also to make sure security and privacy of information that shared in a network. This paper gives an overview of the existing works on security and privacy challenges in the IoT network. In addition, the paper discusses the security attacks and privacy issues on IoT data. Hence, concern about privacy-preserving and security-aware is needed so that better protections shall be incorporated to make the massive IoT network to be a secured one.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728358
Abhishek A. Madankar, Minal Patil, P. D. Khandait
The rising population of India presents genuine dangers as to the accessibility of living space, use of regular assets and crude materials, training and business. In any case, another genuine risk that pursues is the heightening measure of waste created every moment by a person. An amazing 1 Hundred thousand tons of waste is created every day in India. Uncontrolled dumping of waste on edges of towns and urban communities has made flooding landfills which are not just difficult to recover on account of the aimless way of dumping yet in addition has genuine ecological ramifications as far as ground water contamination and commitment to Global warming. Building up a motorized framework to help spare the lives of numerous and making the world a cleaner and a greener place is the respectable target of our project. In this paper proposed a programmed waste segregator that goes for isolating the loss at the transfer level itself. It is intended to sort the loss into 3 noteworthy classes, to be specific metallic, wet and dry, in this manner making waste administration increasingly powerful.
{"title":"Automated Waste Segregation System and its approach towards generation of Ethanol","authors":"Abhishek A. Madankar, Minal Patil, P. D. Khandait","doi":"10.1109/ICACCS.2019.8728358","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728358","url":null,"abstract":"The rising population of India presents genuine dangers as to the accessibility of living space, use of regular assets and crude materials, training and business. In any case, another genuine risk that pursues is the heightening measure of waste created every moment by a person. An amazing 1 Hundred thousand tons of waste is created every day in India. Uncontrolled dumping of waste on edges of towns and urban communities has made flooding landfills which are not just difficult to recover on account of the aimless way of dumping yet in addition has genuine ecological ramifications as far as ground water contamination and commitment to Global warming. Building up a motorized framework to help spare the lives of numerous and making the world a cleaner and a greener place is the respectable target of our project. In this paper proposed a programmed waste segregator that goes for isolating the loss at the transfer level itself. It is intended to sort the loss into 3 noteworthy classes, to be specific metallic, wet and dry, in this manner making waste administration increasingly powerful.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115438513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728376
P. Pradeesha, G. Ravi, P. Priya
Energy efficiency is the important factor being noticed caused by reduced battery capacity of the sensor in sensor networks. In existing system there are various issues such as hotspot problem, overheads that cause battery to drain easily. In this paper ring routing with multiple mobile sinks is proposed to reduce the overheads to make it more efficient, and the method is that it forms ring structure with ring nodes by using clustering algorithm. Ring structure is constructed according to the determined radius, nodes near to the ring form the ring structure and the sink position is updated and the location of the sink node is shared between all the ring candidates then the data dissemination takes place. The proposed system makes improvement in network lifetime and reduces delay and focuses mainly on the energy efficiency.
{"title":"Ring routing clustering based energy efficient protocol for wireless sensor networks","authors":"P. Pradeesha, G. Ravi, P. Priya","doi":"10.1109/ICACCS.2019.8728376","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728376","url":null,"abstract":"Energy efficiency is the important factor being noticed caused by reduced battery capacity of the sensor in sensor networks. In existing system there are various issues such as hotspot problem, overheads that cause battery to drain easily. In this paper ring routing with multiple mobile sinks is proposed to reduce the overheads to make it more efficient, and the method is that it forms ring structure with ring nodes by using clustering algorithm. Ring structure is constructed according to the determined radius, nodes near to the ring form the ring structure and the sink position is updated and the location of the sink node is shared between all the ring candidates then the data dissemination takes place. The proposed system makes improvement in network lifetime and reduces delay and focuses mainly on the energy efficiency.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132272513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728394
R. Katarya, Yamini Arora
Deep Neural Networks are being used in different domains, from Image Classification to Natural language Processing. Research has been done on Artificial Neural Networks and different types of Neural Networks such as CNN and RNN have been studied and developed. They have been applied in different applications. In 2017, a new concept has been introduced in the Neural Networks Architecture by Geoffrey Hinton – Capsule Networks.Capsule Networks bring an improvement in the old neural network architecture and it has worked better than the Convolutional Neural Networks (CNN). There are certain disadvantages of using the convolutional neural networks, few areas where CNN lacks, Capsule Networks have overcome those limitations and now it is better neural network architecture for developing models to solve the problems in different domains. Capsule Networks are primarily used for Image Classification. They can be applied in the areas of Natural Language Processing and Recommender Systems to utilize the textual information in a more efficient manner. Neural Networks can be trained to learn numeric representations of various words and phrases using models such as Word2Vec and Glove and can be applied to classify the data in different categories. This paper presents a review on text classification using the newly introduced capsule networks.
{"title":"Study on Text Classification using Capsule Networks","authors":"R. Katarya, Yamini Arora","doi":"10.1109/ICACCS.2019.8728394","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728394","url":null,"abstract":"Deep Neural Networks are being used in different domains, from Image Classification to Natural language Processing. Research has been done on Artificial Neural Networks and different types of Neural Networks such as CNN and RNN have been studied and developed. They have been applied in different applications. In 2017, a new concept has been introduced in the Neural Networks Architecture by Geoffrey Hinton – Capsule Networks.Capsule Networks bring an improvement in the old neural network architecture and it has worked better than the Convolutional Neural Networks (CNN). There are certain disadvantages of using the convolutional neural networks, few areas where CNN lacks, Capsule Networks have overcome those limitations and now it is better neural network architecture for developing models to solve the problems in different domains. Capsule Networks are primarily used for Image Classification. They can be applied in the areas of Natural Language Processing and Recommender Systems to utilize the textual information in a more efficient manner. Neural Networks can be trained to learn numeric representations of various words and phrases using models such as Word2Vec and Glove and can be applied to classify the data in different categories. This paper presents a review on text classification using the newly introduced capsule networks.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728435
C. Vanitha, V. N. Jeevaa, S. Shriman
This project deals with the camera application that can process the image to various processes. The impact of this project is made by the existing system where Google Lens process the image into text, translate, navigate and search about the text. The image is processed based on two major modules TEXT and IMAGE. TEXT module contains OCR, translation, maps, related Images. IMAGE module contains face emotions and image recognition. Where face emotion detects a face and reveals one’s reactions such as happiness or sadness, etc. Whereas the image recognition module processes the entire object within an image and identifies each object in text form. This project is being developed using Android Studio with the Cognitive Services from Microsoft and Google API services.
{"title":"Image and Face Recognition using CV Lens Machine Learning Android Application","authors":"C. Vanitha, V. N. Jeevaa, S. Shriman","doi":"10.1109/ICACCS.2019.8728435","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728435","url":null,"abstract":"This project deals with the camera application that can process the image to various processes. The impact of this project is made by the existing system where Google Lens process the image into text, translate, navigate and search about the text. The image is processed based on two major modules TEXT and IMAGE. TEXT module contains OCR, translation, maps, related Images. IMAGE module contains face emotions and image recognition. Where face emotion detects a face and reveals one’s reactions such as happiness or sadness, etc. Whereas the image recognition module processes the entire object within an image and identifies each object in text form. This project is being developed using Android Studio with the Cognitive Services from Microsoft and Google API services.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125664667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728351
Kalyani Sudheep, Sandy Joseph
E-health is one of an emerging field in health industry. In order to diagnose a patient, doctors need the medical record of the patient which contains multimedia big data. For efficient access EMR (Electronic Medical Record) should be placed in cloud which also supports mobility.In having many advantages, it faces many security issues as well, of which hacking is considered to be the most serious of healthcare data in cloud. In this paper, a survey on different methods for securing medical big data in cloud is done. The healthcare data can be stored and accessed using a decoy technique.
{"title":"Review on Securing Medical Big Data in Healthcare Cloud","authors":"Kalyani Sudheep, Sandy Joseph","doi":"10.1109/ICACCS.2019.8728351","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728351","url":null,"abstract":"E-health is one of an emerging field in health industry. In order to diagnose a patient, doctors need the medical record of the patient which contains multimedia big data. For efficient access EMR (Electronic Medical Record) should be placed in cloud which also supports mobility.In having many advantages, it faces many security issues as well, of which hacking is considered to be the most serious of healthcare data in cloud. In this paper, a survey on different methods for securing medical big data in cloud is done. The healthcare data can be stored and accessed using a decoy technique.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126556040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}