Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860230
B. Pal, Boshir Ahmed
Pattern classification in domains that follow dissimilar distribution and where target domain has insufficient labelled samples, requires transfer of knowledge across domains through a process called domain adaption. Deep learning research demonstrates the transferability of deep convolutional features that are activations of intermediate layers of convolutional neural networks for domain adaption. Traditional clustering based domain adaption approaches are practical to handle knowledge transfer scenario. This paper presents a scheme that uses local neighborhoods based consistency analysis of one supervised and another unsupervised model to effectively transfer knowledge using deep features. Contrasting conventional models this approach uses only two models to classify patterns except hard ones. Neighbourhood consistency analysis identifies the hard samples, and is classified using a third model. Experimental analysis has been carried out focusing change on category variation of different samples for train and test cases. The proposed approach yields encouraging experimental result on benchmark domain adaption dataset compared to a deep feature based single support vector machine classifier in terms of state of the art metrics demonstrating effective generalization of source domain information.
{"title":"Neighbourhood consistency based deep domain adaption analysis for multi category object detection","authors":"B. Pal, Boshir Ahmed","doi":"10.1109/ICCITECHN.2016.7860230","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860230","url":null,"abstract":"Pattern classification in domains that follow dissimilar distribution and where target domain has insufficient labelled samples, requires transfer of knowledge across domains through a process called domain adaption. Deep learning research demonstrates the transferability of deep convolutional features that are activations of intermediate layers of convolutional neural networks for domain adaption. Traditional clustering based domain adaption approaches are practical to handle knowledge transfer scenario. This paper presents a scheme that uses local neighborhoods based consistency analysis of one supervised and another unsupervised model to effectively transfer knowledge using deep features. Contrasting conventional models this approach uses only two models to classify patterns except hard ones. Neighbourhood consistency analysis identifies the hard samples, and is classified using a third model. Experimental analysis has been carried out focusing change on category variation of different samples for train and test cases. The proposed approach yields encouraging experimental result on benchmark domain adaption dataset compared to a deep feature based single support vector machine classifier in terms of state of the art metrics demonstrating effective generalization of source domain information.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860189
Jith Sarker, A. S. M. Z. Shifat
In the neoteric years, Graphene is one of the predominant resplendence in the horizon of fabrication technology owing to some of its tremendous electronic properties like zero band gap, high saturation velocity, higher electrical conductivity and so on. Graphene based devices are now being deliberated as one of possible options for post Si based electronics era. In this paper, we have analyzed the miscellaneous idiosyncratics of top gated graphene metal oxide semiconductor field effect transistor (MOSFET). Surface potential dependent quantum capacitance is obtained self-consistently along with linear and square root approximation. Gate voltage dependence of surface potential has been shown. Output characteristics, transfer characteristics of the proposed device model have been investigated. Considering all of the graphical illustrations, we strongly recommend Graphene to be a fellow replacement of silicon based devices in future MOSFET applications.
{"title":"An analytical approach for modelling of a top gated graphene based MOSFET","authors":"Jith Sarker, A. S. M. Z. Shifat","doi":"10.1109/ICCITECHN.2016.7860189","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860189","url":null,"abstract":"In the neoteric years, Graphene is one of the predominant resplendence in the horizon of fabrication technology owing to some of its tremendous electronic properties like zero band gap, high saturation velocity, higher electrical conductivity and so on. Graphene based devices are now being deliberated as one of possible options for post Si based electronics era. In this paper, we have analyzed the miscellaneous idiosyncratics of top gated graphene metal oxide semiconductor field effect transistor (MOSFET). Surface potential dependent quantum capacitance is obtained self-consistently along with linear and square root approximation. Gate voltage dependence of surface potential has been shown. Output characteristics, transfer characteristics of the proposed device model have been investigated. Considering all of the graphical illustrations, we strongly recommend Graphene to be a fellow replacement of silicon based devices in future MOSFET applications.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116781074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860179
B. Barua, S. Majumder, A. Melloni
In recent years, silicon photonics has attracted attention as an emerging technology for optical telecommunications and for optical interconnects in microelectronics. The refractive index contrast plays a fundamental role in determining the characteristics of an optical dielectric waveguide and a higher index contrast permits to move towards larger scales of integration and to access new devices and functionalities. But high contrast waveguides are more difficult to realize and more critical but there are no serious impediments in their use. The aim of this contribution is to investigate the dependence of the waveguide characteristics with respect to the index contrast and explore the difficulties. In this paper, the impact of the index contrast on the characteristics of dielectric waveguides such as single mode regime, losses, fiber to waveguide coupling, technological constraints and available materials are investigated. The investigation shows that the dependence of the sensitivity in optical waveguide sensors on the polarization of guided modes is less in small refractive index difference waveguide compare than the silicon on silica waveguides but it provide flexibility to the design engineers.
{"title":"Characterization of low index Si waveguides","authors":"B. Barua, S. Majumder, A. Melloni","doi":"10.1109/ICCITECHN.2016.7860179","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860179","url":null,"abstract":"In recent years, silicon photonics has attracted attention as an emerging technology for optical telecommunications and for optical interconnects in microelectronics. The refractive index contrast plays a fundamental role in determining the characteristics of an optical dielectric waveguide and a higher index contrast permits to move towards larger scales of integration and to access new devices and functionalities. But high contrast waveguides are more difficult to realize and more critical but there are no serious impediments in their use. The aim of this contribution is to investigate the dependence of the waveguide characteristics with respect to the index contrast and explore the difficulties. In this paper, the impact of the index contrast on the characteristics of dielectric waveguides such as single mode regime, losses, fiber to waveguide coupling, technological constraints and available materials are investigated. The investigation shows that the dependence of the sensitivity in optical waveguide sensors on the polarization of guided modes is less in small refractive index difference waveguide compare than the silicon on silica waveguides but it provide flexibility to the design engineers.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860198
Shubhra Prakash Sarkar, B. Sarker, S. Hossain
Traditional way of learning programming is often tedious and fearsome to students, especially to kids. In most cases this results reluctance and uptake, while programming is the core of modern technology. Game is the signature of immersion. With its intense power of engaging players, it can wipe out the aversion and motivate students on coding. Here we have described a better way of learning programming with digital game. We have developed a cross platform game that provides a role playing game design for the player, at the same time a kinesthetic approach to reinforce the basic concepts of programming.
{"title":"Cross platform interactive programming learning environment for kids with edutainment and gamification","authors":"Shubhra Prakash Sarkar, B. Sarker, S. Hossain","doi":"10.1109/ICCITECHN.2016.7860198","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860198","url":null,"abstract":"Traditional way of learning programming is often tedious and fearsome to students, especially to kids. In most cases this results reluctance and uptake, while programming is the core of modern technology. Game is the signature of immersion. With its intense power of engaging players, it can wipe out the aversion and motivate students on coding. Here we have described a better way of learning programming with digital game. We have developed a cross platform game that provides a role playing game design for the player, at the same time a kinesthetic approach to reinforce the basic concepts of programming.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860265
Afrina Khatun, K. Sakib
Automatic bug assignment is an essential activity aiming at assigning bugs to appropriate developers. Existing approaches consider either recent commits or previous bug fixes of developers, leading to recommendation of inexperienced or inactive developers respectively. Considering only one information source leads these approaches to low prediction accuracy. An approach called ERBA is proposed, which considers both expertise and recent activities of developers. ERBA first processes source code and commit logs to construct an index connecting the source entities with developer recent activities. Next, it takes fixed bug reports and builds another index, mapping the bug report keywords with developer bug fixing expertise. On arrival of new bug reports, the final module queries the two indexes using the new bug report terms, and applies tf-idf technique on the query result to calculate an ERBA score for developers. Finally, an ascending ordered list on ERBA score is suggested. For assessment of competency, a case study has been conducted on Eclipse JDT. It depicts that ERBA outperforms existing approach by improving prediction accuracy from 33.8% upto 44%. The result also represents that ERBA shows the first correct developer on average near 4.04 ranks, whereas existing approach shows in 7.27.
{"title":"A bug assignment technique based on bug fixing expertise and source commit recency of developers","authors":"Afrina Khatun, K. Sakib","doi":"10.1109/ICCITECHN.2016.7860265","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860265","url":null,"abstract":"Automatic bug assignment is an essential activity aiming at assigning bugs to appropriate developers. Existing approaches consider either recent commits or previous bug fixes of developers, leading to recommendation of inexperienced or inactive developers respectively. Considering only one information source leads these approaches to low prediction accuracy. An approach called ERBA is proposed, which considers both expertise and recent activities of developers. ERBA first processes source code and commit logs to construct an index connecting the source entities with developer recent activities. Next, it takes fixed bug reports and builds another index, mapping the bug report keywords with developer bug fixing expertise. On arrival of new bug reports, the final module queries the two indexes using the new bug report terms, and applies tf-idf technique on the query result to calculate an ERBA score for developers. Finally, an ascending ordered list on ERBA score is suggested. For assessment of competency, a case study has been conducted on Eclipse JDT. It depicts that ERBA outperforms existing approach by improving prediction accuracy from 33.8% upto 44%. The result also represents that ERBA shows the first correct developer on average near 4.04 ranks, whereas existing approach shows in 7.27.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1007/978-981-13-1951-8_53
Sajib Chatterjee, Resheta Ahmed Smrity, Md. Rafiqul Islam
{"title":"Protein structure prediction using chemical reaction optimization","authors":"Sajib Chatterjee, Resheta Ahmed Smrity, Md. Rafiqul Islam","doi":"10.1007/978-981-13-1951-8_53","DOIUrl":"https://doi.org/10.1007/978-981-13-1951-8_53","url":null,"abstract":"","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860255
P. Mondal, Rupam Deb, M. N. Huda
Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication device lost or stolen, false sense of security (if used on login device), compromised answer of the generic question, higher implementation costs, unambiguous movement profile, calculated hash value stolen (there is no chance to replace it), etc. Compliance with Anti-Money Laundering (AML), Know Your Customer (KYC) and sanction requirements continue to be a key focus area for Financial Institutions' (FIs) management; firms must ensure that they are following appropriate compliance procedures to meet the increasing regulatory demands [1,2]. By addressing existing limitation of MFA, this paper proposes dynamic KYC based MFA authentication method to ensure the secured access of the financial services through the internet. Analysis and simulation results show that the proposed method provides control same as existing MFA/2FA techniques, but customers will get relief from holding additional security devices that incur huge cost.
{"title":"Know your customer (KYC) based authentication method for financial services through the internet","authors":"P. Mondal, Rupam Deb, M. N. Huda","doi":"10.1109/ICCITECHN.2016.7860255","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860255","url":null,"abstract":"Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication device lost or stolen, false sense of security (if used on login device), compromised answer of the generic question, higher implementation costs, unambiguous movement profile, calculated hash value stolen (there is no chance to replace it), etc. Compliance with Anti-Money Laundering (AML), Know Your Customer (KYC) and sanction requirements continue to be a key focus area for Financial Institutions' (FIs) management; firms must ensure that they are following appropriate compliance procedures to meet the increasing regulatory demands [1,2]. By addressing existing limitation of MFA, this paper proposes dynamic KYC based MFA authentication method to ensure the secured access of the financial services through the internet. Analysis and simulation results show that the proposed method provides control same as existing MFA/2FA techniques, but customers will get relief from holding additional security devices that incur huge cost.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860224
Md Saiful Islam, Md Al Amin, Shapan Das Uzzal
The sentiment of a sentence or a comment can be detected more accurately by applying Word Embeddings. This article presents the idea of word co-occurrence matrix and Skip-Gram to determine the actual contexts of the words, Hellinger PCA to determine the most similar words and generate a sliding window of most probable context words around each word. It is shown that, by applying Word Embeddings to classify the sentiment of a comment achieves higher accuracy with larger corpus. For our corpus of 2500 comments, the accuracy achieved is 70%, which is rapidly increasing with the size of the corpus.
{"title":"Word embedding with hellinger PCA to detect the sentiment of bengali text","authors":"Md Saiful Islam, Md Al Amin, Shapan Das Uzzal","doi":"10.1109/ICCITECHN.2016.7860224","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860224","url":null,"abstract":"The sentiment of a sentence or a comment can be detected more accurately by applying Word Embeddings. This article presents the idea of word co-occurrence matrix and Skip-Gram to determine the actual contexts of the words, Hellinger PCA to determine the most similar words and generate a sliding window of most probable context words around each word. It is shown that, by applying Word Embeddings to classify the sentiment of a comment achieves higher accuracy with larger corpus. For our corpus of 2500 comments, the accuracy achieved is 70%, which is rapidly increasing with the size of the corpus.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860190
A. Habib, Muhidul Islam Khan, J. Uddin
Success of any supply chain highly depends on the appropriate use of transportation. It is always a tough decision to select an optimal route in the stages of a supply chain that will balance the reverse condition of cost and time. Q-learning is already getting implied to optimize routes, but it greatly lacks in designing a complete Markov Decision Process (MDP) with enough number of states and actions sets. In this paper, we propose an MDP that can fit the design of a proper multi-stage supply chain network and intend to solve the MDP with SARSA (X) algorithm. The algorithm was simulated in a java based environment and experimental results show that Q-learning produced higher chunks of rewards but SARSA (X) was faster in case of convergence speed.
{"title":"Optimal route selection in complex multi-stage supply chain networks using SARSA(λ)","authors":"A. Habib, Muhidul Islam Khan, J. Uddin","doi":"10.1109/ICCITECHN.2016.7860190","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860190","url":null,"abstract":"Success of any supply chain highly depends on the appropriate use of transportation. It is always a tough decision to select an optimal route in the stages of a supply chain that will balance the reverse condition of cost and time. Q-learning is already getting implied to optimize routes, but it greatly lacks in designing a complete Markov Decision Process (MDP) with enough number of states and actions sets. In this paper, we propose an MDP that can fit the design of a proper multi-stage supply chain network and intend to solve the MDP with SARSA (X) algorithm. The algorithm was simulated in a java based environment and experimental results show that Q-learning produced higher chunks of rewards but SARSA (X) was faster in case of convergence speed.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860205
M. Aktar, M. Mamun, M. Hossain, M. S. R. Shuvo
Change detection from remote sensing images is getting more interest now a days because of abrupt changes in earth surface due to natural disasters or man-made activities. So it's an important research question of how to extract relevant information about the changes due to rainfall, droughts, flooding, destroying land cover areas and so on. This problem has been studied in some research however many of these did not consider the nonlinear relationship while detecting the changes. In this research, above limitation has been addressed and Weighted Normalized Mutual Information (WNMI) is utilized for the improvement. The WNMI technique has been applied between the reference and target images to find out the changes. Thus the changes between every object of the given dataset have been identified and able to observe the damage of any specific area as well as its subsequent recovery. Weighting has been done to count significance at the pixel level. The proposed technique can detect the changes more effectively than the traditional mutual information approach. Experimental analysis is carried on real remote sensing images and it is found that the proposed method can detect more than 96% of changes which is much better than the standard benchmark techniques.
{"title":"Weighted normalized mutual information based change detection in remote sensing images","authors":"M. Aktar, M. Mamun, M. Hossain, M. S. R. Shuvo","doi":"10.1109/ICCITECHN.2016.7860205","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860205","url":null,"abstract":"Change detection from remote sensing images is getting more interest now a days because of abrupt changes in earth surface due to natural disasters or man-made activities. So it's an important research question of how to extract relevant information about the changes due to rainfall, droughts, flooding, destroying land cover areas and so on. This problem has been studied in some research however many of these did not consider the nonlinear relationship while detecting the changes. In this research, above limitation has been addressed and Weighted Normalized Mutual Information (WNMI) is utilized for the improvement. The WNMI technique has been applied between the reference and target images to find out the changes. Thus the changes between every object of the given dataset have been identified and able to observe the damage of any specific area as well as its subsequent recovery. Weighting has been done to count significance at the pixel level. The proposed technique can detect the changes more effectively than the traditional mutual information approach. Experimental analysis is carried on real remote sensing images and it is found that the proposed method can detect more than 96% of changes which is much better than the standard benchmark techniques.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129016590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}