Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796823
Cherif Seibi, Zachary Ward, Masoum Mohammad A.S., Mohammad Shekaramiz
Wind turbine blades can sustain damage during operation that can jeopardize the reliability of the entire wind power generator. This damage can be difficult to detect using conventional methods and, if unaddressed, could eventually result in the failure of the wind turbine. In this paper, a method of detecting wind turbine blade cracks from images is investigated which utilizes Haar-like features to locate cracks and the Jaya K-Means algorithm to extract the image pixels containing cracks. A modified turbine blade crack detection methodology based on existing technology is presented and coded in Python. Initial results for a small-scale wind turbine prototype with faulty blades at Utah Valley University look promising. Finally, a direction for continuing this undergraduate research project is put forth.
{"title":"Locating and Extracting Wind Turbine Blade Cracks Using Haar-like Features and Clustering","authors":"Cherif Seibi, Zachary Ward, Masoum Mohammad A.S., Mohammad Shekaramiz","doi":"10.1109/ietc54973.2022.9796823","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796823","url":null,"abstract":"Wind turbine blades can sustain damage during operation that can jeopardize the reliability of the entire wind power generator. This damage can be difficult to detect using conventional methods and, if unaddressed, could eventually result in the failure of the wind turbine. In this paper, a method of detecting wind turbine blade cracks from images is investigated which utilizes Haar-like features to locate cracks and the Jaya K-Means algorithm to extract the image pixels containing cracks. A modified turbine blade crack detection methodology based on existing technology is presented and coded in Python. Initial results for a small-scale wind turbine prototype with faulty blades at Utah Valley University look promising. Finally, a direction for continuing this undergraduate research project is put forth.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796914
M. Thompson, Brad Ferguson, G. Nielson, S. Schultz
Silicon carbide has many desirable properties that make it a high demand product. Some of these properties make it difficult to machine silicon carbide for industrial use. This work demonstrated the ability to machine silicon carbide using Electrical Discharge Machining, Water Jet Machining, and diamond grinding.
{"title":"Machining of Silicon Carbide Wafers","authors":"M. Thompson, Brad Ferguson, G. Nielson, S. Schultz","doi":"10.1109/ietc54973.2022.9796914","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796914","url":null,"abstract":"Silicon carbide has many desirable properties that make it a high demand product. Some of these properties make it difficult to machine silicon carbide for industrial use. This work demonstrated the ability to machine silicon carbide using Electrical Discharge Machining, Water Jet Machining, and diamond grinding.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125125757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796899
Wesley Thomas, Parker Wegrowski, Jacob Lemirick, Taher Deemyad
In this project, a robotic arm with minimum actuation is designed and analyzed. This design is part of an advanced grasping system for Unmanned Aerial Vehicles (UAVs) and includes a foldable arm, case, novel gripper, and vision system. In this paper, the focus is only on the robotic arm and the case of this system. This system consists of a foldable robotic arm mechanism and a case for keeping the arm inside of it during flight. To minimize the weight of the system, the mechanism includes an arm, gripper, and cage, only using one actuator for all motions. A SolidWorks model of this design was developed, motion analysis in SolidWorks was studied, and a prototype of this design was built and tested. This design can be scaled and attached to most UAVs of various sizes.
{"title":"Lightweight Foldable Robotic Arm for Drones","authors":"Wesley Thomas, Parker Wegrowski, Jacob Lemirick, Taher Deemyad","doi":"10.1109/ietc54973.2022.9796899","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796899","url":null,"abstract":"In this project, a robotic arm with minimum actuation is designed and analyzed. This design is part of an advanced grasping system for Unmanned Aerial Vehicles (UAVs) and includes a foldable arm, case, novel gripper, and vision system. In this paper, the focus is only on the robotic arm and the case of this system. This system consists of a foldable robotic arm mechanism and a case for keeping the arm inside of it during flight. To minimize the weight of the system, the mechanism includes an arm, gripper, and cage, only using one actuator for all motions. A SolidWorks model of this design was developed, motion analysis in SolidWorks was studied, and a prototype of this design was built and tested. This design can be scaled and attached to most UAVs of various sizes.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121765876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796793
Veronica Gunyan, Benjamin Miera, Abolfazl Amin, Bonnie Andersen
Over centuries, different mechanical methods have been used to mimic the sounds of the human vocal tract. The researchers in this paper have used a thermoacoustic engine to produce vowel formant frequencies based on Arai’s three-tube sliding model [1]. The sliding constriction represents the tongue, the open end represents the mouth, and the closed end represents the glottis. A one-dimensional wave equation is used to calculate the formant frequencies as a function of tongue position. By analyzing the peak frequencies of the FFT spectrum from the engine, the more dominant modes were compared to the mathematical model to evaluate its predictive power. These results may be used in speech therapy and diagnosis.
{"title":"A Thermoacoustically-Driven Vocal Tract Model","authors":"Veronica Gunyan, Benjamin Miera, Abolfazl Amin, Bonnie Andersen","doi":"10.1109/ietc54973.2022.9796793","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796793","url":null,"abstract":"Over centuries, different mechanical methods have been used to mimic the sounds of the human vocal tract. The researchers in this paper have used a thermoacoustic engine to produce vowel formant frequencies based on Arai’s three-tube sliding model [1]. The sliding constriction represents the tongue, the open end represents the mouth, and the closed end represents the glottis. A one-dimensional wave equation is used to calculate the formant frequencies as a function of tongue position. By analyzing the peak frequencies of the FFT spectrum from the engine, the more dominant modes were compared to the mathematical model to evaluate its predictive power. These results may be used in speech therapy and diagnosis.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796846
Clay Keisel, S. Sajal
The goal of our work is to build a tool that allows any number of people to communicate comfortably in their native language with anyone around the globe in real time. As globalization and the mixing of economies grows throughout the world people from different locales will need to constantly be communicating with each other to collaborate and get work done. This collaboration will oftentimes include crucial conversations where language barriers might be an obstacle that prevents efficient work from getting done. We want to demonstrate that a server-less implementation of the MQTT protocol and by leveraging google’s translation engine, that seamless native communication can happen between multiple individuals who speak different languages. To accomplish this goal we will develop a rudimentary chat application which will allow one user to type a message in their native language and have that language translate in transit to the other users preferred language. By offering this feature users from around the globe will be able to feel confident that they can communicate complex thoughts and ideas to anyone anywhere and will be a huge boon to industry as our global economy continues to get more tightly coupled.
{"title":"BabelFish: A Seamless Solution to Communicate with Multi-Lingual Individuals","authors":"Clay Keisel, S. Sajal","doi":"10.1109/ietc54973.2022.9796846","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796846","url":null,"abstract":"The goal of our work is to build a tool that allows any number of people to communicate comfortably in their native language with anyone around the globe in real time. As globalization and the mixing of economies grows throughout the world people from different locales will need to constantly be communicating with each other to collaborate and get work done. This collaboration will oftentimes include crucial conversations where language barriers might be an obstacle that prevents efficient work from getting done. We want to demonstrate that a server-less implementation of the MQTT protocol and by leveraging google’s translation engine, that seamless native communication can happen between multiple individuals who speak different languages. To accomplish this goal we will develop a rudimentary chat application which will allow one user to type a message in their native language and have that language translate in transit to the other users preferred language. By offering this feature users from around the globe will be able to feel confident that they can communicate complex thoughts and ideas to anyone anywhere and will be a huge boon to industry as our global economy continues to get more tightly coupled.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796722
Soha Boroojerdi, George Rudolph
Offline handwritten digit recognition is a well-known problem that remains at best partially solved. This paper presents a study of three different algorithms for offline handwritten multi-digit recognition using the MNIST dataset: Decision Trees, Multilayer Perceptrons and Random Forest. Our results indicate that Random Forest had the best accuracy at 96% with reasonable runtime performance. This kind of study is not novel-however, the authors developed a mechanism for reading multi-digit numbers from image files and webcams that may be of interest.
{"title":"Handwritten Multi-Digit Recognition With Machine Learning","authors":"Soha Boroojerdi, George Rudolph","doi":"10.1109/ietc54973.2022.9796722","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796722","url":null,"abstract":"Offline handwritten digit recognition is a well-known problem that remains at best partially solved. This paper presents a study of three different algorithms for offline handwritten multi-digit recognition using the MNIST dataset: Decision Trees, Multilayer Perceptrons and Random Forest. Our results indicate that Random Forest had the best accuracy at 96% with reasonable runtime performance. This kind of study is not novel-however, the authors developed a mechanism for reading multi-digit numbers from image files and webcams that may be of interest.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796822
Khaled Shaaban, Alaa Alsarhan
The COVID-19 pandemic has affected undergraduate research activities for college students. The purpose of this study is to assess the effect of the pandemic on undergraduate research for engineering students at a teaching-focused university. Data for research grants were obtained before, during, and after the pandemic. The results showed a gradual increase in funding opportunities and awarded grants for faculty members. On the other hand, there was a reduction in the number of undergraduate students involved in these research activities. The study also discussed potential strategies and solutions that enable engineering students at the undergraduate level to conduct research. Most of these strategies focus on gathering and analyzing data without the need for fieldwork, laboratory work, or in-person interactions.
{"title":"The Impact of the COVID-19 Pandemic on Undergraduate Research for Engineering Students and Possible Strategies to Promote Research","authors":"Khaled Shaaban, Alaa Alsarhan","doi":"10.1109/ietc54973.2022.9796822","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796822","url":null,"abstract":"The COVID-19 pandemic has affected undergraduate research activities for college students. The purpose of this study is to assess the effect of the pandemic on undergraduate research for engineering students at a teaching-focused university. Data for research grants were obtained before, during, and after the pandemic. The results showed a gradual increase in funding opportunities and awarded grants for faculty members. On the other hand, there was a reduction in the number of undergraduate students involved in these research activities. The study also discussed potential strategies and solutions that enable engineering students at the undergraduate level to conduct research. Most of these strategies focus on gathering and analyzing data without the need for fieldwork, laboratory work, or in-person interactions.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116813349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796981
C. Gutiérrez, Willie K. Harrison, M. Rice, B. Redd, Autumn Twitchell
This paper presents the results of a measurement campaign of the Doppler shift and envelope distribution of small-scale vehicle-to-vehicle (V2V) channels at 5.9 GHz. The measurement experiments were conducted in a suburban environment in the city of San Luis Potosí, México. The obtained results show that the Rice distribution provides the best fit for the empirical subcarrier envelope distribution in 90.7% of the cases, whereas the Nakagami and Weibull distribution provide the best fit in the remaining 1.3% and 7.9%, respectively. The measured mean Doppler shift and Doppler spread suggest that the sounding signal arrived at the receiver from multiple propagation paths. However, such paths produced a mild signal dispersion in the Doppler frequency domain. The results presented here are intended to serve as a benchmark for the performance analysis of vehicular communication systems under realistic propagation conditions.
{"title":"Doppler Shift and Envelope Distribution of V2V Channels at 5.9 GHz in Suburban Environments","authors":"C. Gutiérrez, Willie K. Harrison, M. Rice, B. Redd, Autumn Twitchell","doi":"10.1109/ietc54973.2022.9796981","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796981","url":null,"abstract":"This paper presents the results of a measurement campaign of the Doppler shift and envelope distribution of small-scale vehicle-to-vehicle (V2V) channels at 5.9 GHz. The measurement experiments were conducted in a suburban environment in the city of San Luis Potosí, México. The obtained results show that the Rice distribution provides the best fit for the empirical subcarrier envelope distribution in 90.7% of the cases, whereas the Nakagami and Weibull distribution provide the best fit in the remaining 1.3% and 7.9%, respectively. The measured mean Doppler shift and Doppler spread suggest that the sounding signal arrived at the receiver from multiple propagation paths. However, such paths produced a mild signal dispersion in the Doppler frequency domain. The results presented here are intended to serve as a benchmark for the performance analysis of vehicular communication systems under realistic propagation conditions.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128200145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796923
Leah C. Guthrie, W. Guthrie
The objective of this research was to compare the efficacy of vacuuming, power blowing, and pressure washing for cleaning of a clogged pervious concrete pavement at a site in northern Utah. The results indicate that, for conditions similar to those evaluated, only pressure washing in conjunction with vacuuming can successfully clean clogged pervious concrete. In this research, an average water infiltration rate of 127 in./hour was achieved after cleaning. While the use of pervious concrete has many advantages, the cost of regularly cleaning pervious concrete pavement should be weighed against the cost of installing and maintaining a traditional detention basin for storm water management.
{"title":"Evaluation of Cleaning Methods for Restoring Water Drainage Through Pervious Concrete Pavement","authors":"Leah C. Guthrie, W. Guthrie","doi":"10.1109/ietc54973.2022.9796923","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796923","url":null,"abstract":"The objective of this research was to compare the efficacy of vacuuming, power blowing, and pressure washing for cleaning of a clogged pervious concrete pavement at a site in northern Utah. The results indicate that, for conditions similar to those evaluated, only pressure washing in conjunction with vacuuming can successfully clean clogged pervious concrete. In this research, an average water infiltration rate of 127 in./hour was achieved after cleaning. While the use of pervious concrete has many advantages, the cost of regularly cleaning pervious concrete pavement should be weighed against the cost of installing and maintaining a traditional detention basin for storm water management.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ietc54973.2022.9796821
Hind Milhem, Neil B. Harrison
Software architecture plays a critical role in ensuring the quality attributes of a software system (i.e. security, performance, availability, usability, and maintainability). With the advent of cloud computing, popular software architectures are changing. An important change is that some aspects of some quality attributes are now implemented in the cloud software. Architecture elements called tactics (i.e. design decisions that affect the achievement of quality attributes) are built to address the quality attributes of a software architecture. The implementation of a software application using components from a commercial cloud computing platform inherits the quality aspects of the tactics used as part of the implementation of the cloud components, freeing application developers from worrying as much about the quality attributes. We investigated components of the cloud service Amazon Web Services (AWS) and found implementations of key elements of several quality attributes. Furthermore, we identified existing and new tactics used in AWS components to address these quality attributes. In particular, we identified five common quality attributes implemented in AWS components, along with associated tactics: Reliability, Scalability, Performance, Availability, and Security. Most of the tactics are modifications of existing tactics; but several tactics in Security are new. This illustrates the rapid change in the area of security. opportunities for additional research include expanded studies of tactics in cloud services, and organizing and cataloguing of new tactics.
软件架构在确保软件系统的质量属性(即安全性、性能、可用性、可用性和可维护性)方面起着至关重要的作用。随着云计算的出现,流行的软件架构正在发生变化。一个重要的变化是,一些质量属性的某些方面现在在云软件中实现了。被称为策略的架构元素(例如,影响质量属性实现的设计决策)被构建来处理软件架构的质量属性。使用来自商业云计算平台的组件的软件应用程序的实现继承了作为云组件实现一部分的策略的质量方面,从而使应用程序开发人员不必担心质量属性。我们调查了云服务Amazon Web Services (AWS)的组件,并发现了几个质量属性的关键元素的实现。此外,我们确定了AWS组件中使用的现有和新的策略来解决这些质量属性。特别是,我们确定了在AWS组件中实现的五个常见质量属性,以及相关策略:可靠性、可伸缩性、性能、可用性和安全性。大多数战术是对现有战术的修改;但安全领域的一些策略是新的。这说明了安全领域的迅速变化。进一步研究的机会包括扩大对云服务战术的研究,以及对新战术的组织和编目。
{"title":"The Quality Attibutes and Architectural Tactics of Amazon Web Services (AWS)","authors":"Hind Milhem, Neil B. Harrison","doi":"10.1109/ietc54973.2022.9796821","DOIUrl":"https://doi.org/10.1109/ietc54973.2022.9796821","url":null,"abstract":"Software architecture plays a critical role in ensuring the quality attributes of a software system (i.e. security, performance, availability, usability, and maintainability). With the advent of cloud computing, popular software architectures are changing. An important change is that some aspects of some quality attributes are now implemented in the cloud software. Architecture elements called tactics (i.e. design decisions that affect the achievement of quality attributes) are built to address the quality attributes of a software architecture. The implementation of a software application using components from a commercial cloud computing platform inherits the quality aspects of the tactics used as part of the implementation of the cloud components, freeing application developers from worrying as much about the quality attributes. We investigated components of the cloud service Amazon Web Services (AWS) and found implementations of key elements of several quality attributes. Furthermore, we identified existing and new tactics used in AWS components to address these quality attributes. In particular, we identified five common quality attributes implemented in AWS components, along with associated tactics: Reliability, Scalability, Performance, Availability, and Security. Most of the tactics are modifications of existing tactics; but several tactics in Security are new. This illustrates the rapid change in the area of security. opportunities for additional research include expanded studies of tactics in cloud services, and organizing and cataloguing of new tactics.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133431466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}