Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528508
S. Suganya, P. Shanmugapriya, T. R. Priyadharshini
The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.
{"title":"Improving security in two-way relay networks by optimal relay and jammer selection","authors":"S. Suganya, P. Shanmugapriya, T. R. Priyadharshini","doi":"10.1109/ICE-CCN.2013.6528508","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528508","url":null,"abstract":"The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528513
T. Deepa, R. Kumar
Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, logarithmic based companding (i.e, mu law) and Square rooting companding (SQRT) have been suggested as simple and effective PAPR reduction techniques for OFDM. This paper analyzes mu law and SQRT companding OFDM signal on M ary QAM modulation technique. Simulation results show that the SQRT OFDM system is an effective technique in reducing PAPR and improved BER performance than OFDM system with mu-law companding transform. Comparison among mu law and SQRT companding techniques is made for the best suited companding technique for PAPR reduction in OFDM system. The Simulation result also shows that by modulating a signal at a fixed subcarriers for different modulation technique, the error in the transmitted data increases rapidly whereas in case of fixed modulation techniques, increasing the number of subcarriers the PAPR increases at the transmit, the bit error rate (BER) in the transmitted data is constant and varies by a small fraction.
{"title":"Performance analysis of μ-law companding & SQRT techniques for M-QAM OFDM systems","authors":"T. Deepa, R. Kumar","doi":"10.1109/ICE-CCN.2013.6528513","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528513","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, logarithmic based companding (i.e, mu law) and Square rooting companding (SQRT) have been suggested as simple and effective PAPR reduction techniques for OFDM. This paper analyzes mu law and SQRT companding OFDM signal on M ary QAM modulation technique. Simulation results show that the SQRT OFDM system is an effective technique in reducing PAPR and improved BER performance than OFDM system with mu-law companding transform. Comparison among mu law and SQRT companding techniques is made for the best suited companding technique for PAPR reduction in OFDM system. The Simulation result also shows that by modulating a signal at a fixed subcarriers for different modulation technique, the error in the transmitted data increases rapidly whereas in case of fixed modulation techniques, increasing the number of subcarriers the PAPR increases at the transmit, the bit error rate (BER) in the transmitted data is constant and varies by a small fraction.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528526
M. Baskar, T. Gnanasekaran, S. Saravanan
Distributed Denial of Service (DDoS) attacks is measured to be a vital threat to the net. Because of memory less feature of the net routing mechanism, it's extraordinarily onerous to trace back to the supply of those attacks. Ancient packet marking techniques are not any longer applied because of its high memory consumption and poor measurability. During this paper, we have a tendency to build use of entropy variation to observe the attack that differentiates between traditional and DDoS attack traffic. However it will solely be applied to observe the attack during which rate of the traffic flow is incredibly high. There are also many attacks during which the strength of the attack is also meager, however the results of those attacks might be still severe. So it's essential to observe such attacks that square measure in lower order in terms of information rate. We have a tendency to propose an Adaptive Attack Detection System (AADS) that is capable of detection DDoS attacks regardless of the attack strength.
{"title":"Adaptive IP traceback mechanism for detecting low rate DDoS attacks","authors":"M. Baskar, T. Gnanasekaran, S. Saravanan","doi":"10.1109/ICE-CCN.2013.6528526","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528526","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks is measured to be a vital threat to the net. Because of memory less feature of the net routing mechanism, it's extraordinarily onerous to trace back to the supply of those attacks. Ancient packet marking techniques are not any longer applied because of its high memory consumption and poor measurability. During this paper, we have a tendency to build use of entropy variation to observe the attack that differentiates between traditional and DDoS attack traffic. However it will solely be applied to observe the attack during which rate of the traffic flow is incredibly high. There are also many attacks during which the strength of the attack is also meager, however the results of those attacks might be still severe. So it's essential to observe such attacks that square measure in lower order in terms of information rate. We have a tendency to propose an Adaptive Attack Detection System (AADS) that is capable of detection DDoS attacks regardless of the attack strength.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127046669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528592
A. Kumar, S. Kansal, M. Hanmandlu
We have presented a simple two equation model which produces the rich behavior of biological neurons, including tonic spiking, tonic bursting, mixed mode firing, spike frequency adaptation, resonator, integrator etc. Our model is capable of producing 19 different kinds of dynamics of real biological neuron. We have illustrated the richness and complexity of spiking behavior of individual neuron in response to simple pulses of dc current.
{"title":"Classification of different neuron behavior by designing spiking neuron model","authors":"A. Kumar, S. Kansal, M. Hanmandlu","doi":"10.1109/ICE-CCN.2013.6528592","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528592","url":null,"abstract":"We have presented a simple two equation model which produces the rich behavior of biological neurons, including tonic spiking, tonic bursting, mixed mode firing, spike frequency adaptation, resonator, integrator etc. Our model is capable of producing 19 different kinds of dynamics of real biological neuron. We have illustrated the richness and complexity of spiking behavior of individual neuron in response to simple pulses of dc current.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131583703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528584
I. Khan, R. Kumari, S. Behera
Design of four element rectangular shaped dielectric resonator antenna (RDRA) array is presented for wireless applications. The RDRA array is excited by rectangular conformal patch (RCP) connected to microstrip line which is an effective feed mechanism and more efficient in energy coupling. Simulation result shows that the proposed antenna achieves an impedance bandwidth from 4 GHz to 7.1 GHz covering wireless bands. Parametric studies have been carried out by varying the RCP and the ground plane of the final design. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.
{"title":"A four element rectangular dielectric resonator antenna array for wireless applications","authors":"I. Khan, R. Kumari, S. Behera","doi":"10.1109/ICE-CCN.2013.6528584","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528584","url":null,"abstract":"Design of four element rectangular shaped dielectric resonator antenna (RDRA) array is presented for wireless applications. The RDRA array is excited by rectangular conformal patch (RCP) connected to microstrip line which is an effective feed mechanism and more efficient in energy coupling. Simulation result shows that the proposed antenna achieves an impedance bandwidth from 4 GHz to 7.1 GHz covering wireless bands. Parametric studies have been carried out by varying the RCP and the ground plane of the final design. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528531
Sarabjot Singh, N. Mishra, S. Sharma
Into the bloggers or a blog network, there are some users who cause a great influence over other users of the network. In this paper we refer these kinds of users as Influential Users (IU). IUs are those users that cause the other users to do some actions on the documents and contents published by him or her. The IU is being used by different organizations for viral marketing by using blogging sites. The organization wants to market a new product by using a small group of potential users to get profit. In this paper, we focus on the various approaches that helps in determination of IUs, some of them are based on the topology of the social network and some are based on hyperlink and later we discuss the new approach to finding the influential user which is based on the activities that the users performs in social networks, utilizing their diffusion history.
{"title":"Survey of various techniques for determining influential users in social networks","authors":"Sarabjot Singh, N. Mishra, S. Sharma","doi":"10.1109/ICE-CCN.2013.6528531","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528531","url":null,"abstract":"Into the bloggers or a blog network, there are some users who cause a great influence over other users of the network. In this paper we refer these kinds of users as Influential Users (IU). IUs are those users that cause the other users to do some actions on the documents and contents published by him or her. The IU is being used by different organizations for viral marketing by using blogging sites. The organization wants to market a new product by using a small group of potential users to get profit. In this paper, we focus on the various approaches that helps in determination of IUs, some of them are based on the topology of the social network and some are based on hyperlink and later we discuss the new approach to finding the influential user which is based on the activities that the users performs in social networks, utilizing their diffusion history.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132467295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528602
A. Christopher, S. Appavu
Data mining approaches have been successfully applied in different fields. Risk and safety have always been important considerations in aviation. There is a large amount of knowledge and data accumulation in aviation industry. These data can be store in the form of pilot reports, maintenance reports, accident reports or delay reports. This paper applied the decision tree model on accident reports of the Federal Aviation Administration (FAA) Accident / incident Data System database, contains 468 accident data records for all categories of aviation between the years of 1970 to 2011. The decision tree classifier is use to predict the warning level of the component as the class attribute. We have explored the use of the decision tree technique on aviation components data. Decision Tree induction algorithm is applied to generate the model and the generated model is used to predict the warning of accidents in the airline database. This work may be useful for Aviation Company to make better prediction.
{"title":"Data mining approaches for aircraft accidents prediction: An empirical study on Turkey airline","authors":"A. Christopher, S. Appavu","doi":"10.1109/ICE-CCN.2013.6528602","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528602","url":null,"abstract":"Data mining approaches have been successfully applied in different fields. Risk and safety have always been important considerations in aviation. There is a large amount of knowledge and data accumulation in aviation industry. These data can be store in the form of pilot reports, maintenance reports, accident reports or delay reports. This paper applied the decision tree model on accident reports of the Federal Aviation Administration (FAA) Accident / incident Data System database, contains 468 accident data records for all categories of aviation between the years of 1970 to 2011. The decision tree classifier is use to predict the warning level of the component as the class attribute. We have explored the use of the decision tree technique on aviation components data. Decision Tree induction algorithm is applied to generate the model and the generated model is used to predict the warning of accidents in the airline database. This work may be useful for Aviation Company to make better prediction.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124804497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528497
R. Kumar, D. Chandy
The increase in availability of music information demands for the development of tools for audio retrieval. Audio information retrieval implicates the retrieval of similar audio files based on the feature. Feature extraction is one of the important tasks where the entire retrieval system relies on. In this work, audio information retrieval has been performed on GTZAN datasets using Delta Mel-Frequency Cepstral Coefficients (MFCC) feature which is a kind of timbre feature. The results obtained for the various stages of feature extraction and retrieval performance plot has been presented. The average precision and recall values obtained are 78.67% and 58.02%, respectively.
{"title":"Audio retrieval using timbral feature","authors":"R. Kumar, D. Chandy","doi":"10.1109/ICE-CCN.2013.6528497","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528497","url":null,"abstract":"The increase in availability of music information demands for the development of tools for audio retrieval. Audio information retrieval implicates the retrieval of similar audio files based on the feature. Feature extraction is one of the important tasks where the entire retrieval system relies on. In this work, audio information retrieval has been performed on GTZAN datasets using Delta Mel-Frequency Cepstral Coefficients (MFCC) feature which is a kind of timbre feature. The results obtained for the various stages of feature extraction and retrieval performance plot has been presented. The average precision and recall values obtained are 78.67% and 58.02%, respectively.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528489
K. Priya, S. Terence
One of the main objective of wireless sensor network is to forward the events to the destination in a fast and reliable manner. There are several methods are existing for packet forwarding. Some researchers use single node to forward event packet and some researchers use all nodes (nodes in event region) to forward event packet. In this paper we proposing a technique named as Reliable Event Transmission Protocol (RETP) in a wireless sensor network for real time event detection and reliable packet forwarding in wireless sensor networks. In RETP, we introduce the concept cluster heads to forward the event when event occurred. Here number for event forwarding nodes is restricted by n/2(for even number of nodes) or n-1/2(for odd number of nodes). So it helps to energy conversion, computation cost in the network as well as it ensures the reliability in event forwarding. The literature survey has been done on various techniques in event detection.
{"title":"RETP: Reliable Event Transmission Protocol in a wireless sensor network","authors":"K. Priya, S. Terence","doi":"10.1109/ICE-CCN.2013.6528489","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528489","url":null,"abstract":"One of the main objective of wireless sensor network is to forward the events to the destination in a fast and reliable manner. There are several methods are existing for packet forwarding. Some researchers use single node to forward event packet and some researchers use all nodes (nodes in event region) to forward event packet. In this paper we proposing a technique named as Reliable Event Transmission Protocol (RETP) in a wireless sensor network for real time event detection and reliable packet forwarding in wireless sensor networks. In RETP, we introduce the concept cluster heads to forward the event when event occurred. Here number for event forwarding nodes is restricted by n/2(for even number of nodes) or n-1/2(for odd number of nodes). So it helps to energy conversion, computation cost in the network as well as it ensures the reliability in event forwarding. The literature survey has been done on various techniques in event detection.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528594
J. Jagannathan, A. Sherajdheen, R. Deepak, N. Krishnan
Intelligent Traffic Systems (ITS) is an integral component of modern day road transportation networks. Identification of vehicles is one of the most important challenges to be addressed in the design of any intelligent traffic system. License plate being a unique identity for any registered vehicle, License Plate Recognition (LPR) systems have been used as the means to resolve the issue of identification of vehicles. Intelligent systems involving LPR has been widely applied in several applications such as intelligent traffic rule enforcement, prevention of car theft, intelligent traffic emergency/accident handling, monitoring of vehicle traffic and flow control, intelligent parking, automated toll payment, intelligent surveillance and security enforcement etc. A typical LPR process consists of three stages viz; License Plate Extraction, Character Segmentation and Character Recognition. This paper address the Character Segmentation problem. The character segmentation method using horizontal and vertical projection and with dynaic thresholding is proposed in this paper. From the experimental studies made, it is learned that the proposed technique works reasonably well in real world scenarios.
{"title":"License plate Character Segmentation using horizontal and vertical projection with dynamic thresholding","authors":"J. Jagannathan, A. Sherajdheen, R. Deepak, N. Krishnan","doi":"10.1109/ICE-CCN.2013.6528594","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528594","url":null,"abstract":"Intelligent Traffic Systems (ITS) is an integral component of modern day road transportation networks. Identification of vehicles is one of the most important challenges to be addressed in the design of any intelligent traffic system. License plate being a unique identity for any registered vehicle, License Plate Recognition (LPR) systems have been used as the means to resolve the issue of identification of vehicles. Intelligent systems involving LPR has been widely applied in several applications such as intelligent traffic rule enforcement, prevention of car theft, intelligent traffic emergency/accident handling, monitoring of vehicle traffic and flow control, intelligent parking, automated toll payment, intelligent surveillance and security enforcement etc. A typical LPR process consists of three stages viz; License Plate Extraction, Character Segmentation and Character Recognition. This paper address the Character Segmentation problem. The character segmentation method using horizontal and vertical projection and with dynaic thresholding is proposed in this paper. From the experimental studies made, it is learned that the proposed technique works reasonably well in real world scenarios.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116936977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}