Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726132
Sankar Mukherjee, Shyamal Kumar Das Mandal
The paper describes an automatic parts-of-speech tagging for Bengali sentences using Global Linear Model (GLM) which learns to represent the whole sentence through a feature vector called Global feature. Tagger has been trained using averaged perceptron algorithm. Performance of this tagger has been compared to Conditional Random Field (CRF), Support Vector Machine (SVM), Hidden Markov Model (HMM) and Maximum Entropy (ME) based Bengali POS tagger. Experimental results show that GLM based Bengali POS tagger has the accuracy of 93.12 %.
本文描述了一种基于全局线性模型(Global Linear Model, GLM)的孟加拉语句子词性自动标注方法,该方法通过全局特征向量来学习表示整个句子。使用平均感知器算法训练Tagger。将该标注器的性能与条件随机场(CRF)、支持向量机(SVM)、隐马尔可夫模型(HMM)和基于最大熵(ME)的孟加拉语POS标注器进行了比较。实验结果表明,基于GLM的孟加拉语词性标注准确率为93.12%。
{"title":"Bengali parts-of-speech tagging using Global Linear Model","authors":"Sankar Mukherjee, Shyamal Kumar Das Mandal","doi":"10.1109/INDCON.2013.6726132","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726132","url":null,"abstract":"The paper describes an automatic parts-of-speech tagging for Bengali sentences using Global Linear Model (GLM) which learns to represent the whole sentence through a feature vector called Global feature. Tagger has been trained using averaged perceptron algorithm. Performance of this tagger has been compared to Conditional Random Field (CRF), Support Vector Machine (SVM), Hidden Markov Model (HMM) and Maximum Entropy (ME) based Bengali POS tagger. Experimental results show that GLM based Bengali POS tagger has the accuracy of 93.12 %.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6725925
Prachetos Sadhukhan, Naveen Kumar, M. Bhatnagar
Cognitive radio (CR) is a technology that addresses the problem of scarcity of spectrum and paves the way for efficient use of the same. In recent times, it has been observed that most research is focused on building theoretical models which are backed mostly by simulation results. In order to successfully support any theoretically developed model, it is necessary that the algorithm be tested in practical environment using hardware. Since some assumptions made to satisfy simulation requirements may not hold under practical circumstances, the implementation and testing of a theoretical concept is quite challenging. In this paper, we present experimental test results from our implementation of improved energy detector for single node and co-operative CR networks. The theoretical model is taken from [1], while GNU Radio and universal software radio peripherals 2 (USRP2) kits serve as software and hardware, respectively, in the implementation. Shadowed fading (due to obstacles and hidden node problem) makes single node sensing sometimes unreliable. Use of cooperation among secondary nodes, along with proper fusion rules, not only exploits the advantage of spatial diversity but also improves the reliability of spectrum hole sensing, as evident from the test results. It has been demonstrated by using the practical testing that cooperative sensing is better than single node sensing.
{"title":"Improved energy detector based spectrum sensing for cognitive radio: An experimental study","authors":"Prachetos Sadhukhan, Naveen Kumar, M. Bhatnagar","doi":"10.1109/INDCON.2013.6725925","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6725925","url":null,"abstract":"Cognitive radio (CR) is a technology that addresses the problem of scarcity of spectrum and paves the way for efficient use of the same. In recent times, it has been observed that most research is focused on building theoretical models which are backed mostly by simulation results. In order to successfully support any theoretically developed model, it is necessary that the algorithm be tested in practical environment using hardware. Since some assumptions made to satisfy simulation requirements may not hold under practical circumstances, the implementation and testing of a theoretical concept is quite challenging. In this paper, we present experimental test results from our implementation of improved energy detector for single node and co-operative CR networks. The theoretical model is taken from [1], while GNU Radio and universal software radio peripherals 2 (USRP2) kits serve as software and hardware, respectively, in the implementation. Shadowed fading (due to obstacles and hidden node problem) makes single node sensing sometimes unreliable. Use of cooperation among secondary nodes, along with proper fusion rules, not only exploits the advantage of spatial diversity but also improves the reliability of spectrum hole sensing, as evident from the test results. It has been demonstrated by using the practical testing that cooperative sensing is better than single node sensing.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726119
B. Champaty, Sushma Bhandari, K. Pal, D. N. Tibarewala
In the present study, attempts were made to classify menstrual phases of young healthy female (21-25 years) based on the features obtained from ECG signals. Statistical features were extracted from the heart rate variability (HRV) and the ECG signals and were used for pattern recognition during the different menstrual phases. The pattern recognition studies using HRV features suggested that the menstrual phase classification efficiency were >85 % and > 90 % using Multilayer perceptron (MLP) and Radial basis function network (RBF) Artificial Neural Network (ANN) models. On the other hand, the pattern recognition studies using ECG signal features showed classification efficiencies of > 80 % and > 90 % using MLP and RBF ANN models. The results indicated temporary changes in the autonomic nervous system and the cardiac physiology of the volunteers during the menstrual cycle.
{"title":"Artificial intelligence based classification of menstrual phases in amenorrheic young females from ECG signals","authors":"B. Champaty, Sushma Bhandari, K. Pal, D. N. Tibarewala","doi":"10.1109/INDCON.2013.6726119","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726119","url":null,"abstract":"In the present study, attempts were made to classify menstrual phases of young healthy female (21-25 years) based on the features obtained from ECG signals. Statistical features were extracted from the heart rate variability (HRV) and the ECG signals and were used for pattern recognition during the different menstrual phases. The pattern recognition studies using HRV features suggested that the menstrual phase classification efficiency were >85 % and > 90 % using Multilayer perceptron (MLP) and Radial basis function network (RBF) Artificial Neural Network (ANN) models. On the other hand, the pattern recognition studies using ECG signal features showed classification efficiencies of > 80 % and > 90 % using MLP and RBF ANN models. The results indicated temporary changes in the autonomic nervous system and the cardiac physiology of the volunteers during the menstrual cycle.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726136
A. Pandey, U. C. Pati
Image mosaicing has been used in various arenas of image engineering. The main purpose of this research work is to develop a novel blending algorithm for mosaicing of two non-overlapping images with minimum distortion and no visible seam. In the proposed method, images are mosaiced using the pyramid technique and Savitzky-Golay filter is used for smoothing the seam between the images in the generated mosaic. Savitzky-Golay filter, is based on the least square fitting of polynomial functions of image intensities. It effectively reduces the noise and preserves the image information content resulting in a visually pleasing mosaiced image. The results and comparative analysis show the effectiveness of the proposed method.
{"title":"A novel technique for non-overlapping image mosaicing based on pyramid method","authors":"A. Pandey, U. C. Pati","doi":"10.1109/INDCON.2013.6726136","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726136","url":null,"abstract":"Image mosaicing has been used in various arenas of image engineering. The main purpose of this research work is to develop a novel blending algorithm for mosaicing of two non-overlapping images with minimum distortion and no visible seam. In the proposed method, images are mosaiced using the pyramid technique and Savitzky-Golay filter is used for smoothing the seam between the images in the generated mosaic. Savitzky-Golay filter, is based on the least square fitting of polynomial functions of image intensities. It effectively reduces the noise and preserves the image information content resulting in a visually pleasing mosaiced image. The results and comparative analysis show the effectiveness of the proposed method.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726053
Sudeep D. Thepade, Rik Das, Saurav Ghosh
Content based image classification is a vital component of machine learning and is attaining increasing importance in the field of image processing. This paper has carried out widespread comparison of block truncation coding based techniques for feature vector extraction of images which is a precursor of image classification. A new block truncation coding (BTC) based technique using even and odd image parts for feature vector extraction is also introduced to perform image classification. The performances of classifier algorithms are compared in Receiver Operating Characteristic (ROC) Space. Two different categories of classifiers viz. K Nearest Neighbor (KNN) Classifier and RIDOR Classifier are being used to observe the degree of classification for various techniques under six different feature vector extraction environments.
{"title":"Performance comparison of feature vector extraction techniques in RGB color space using block truncation coding for content based image classification with discrete classifiers","authors":"Sudeep D. Thepade, Rik Das, Saurav Ghosh","doi":"10.1109/INDCON.2013.6726053","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726053","url":null,"abstract":"Content based image classification is a vital component of machine learning and is attaining increasing importance in the field of image processing. This paper has carried out widespread comparison of block truncation coding based techniques for feature vector extraction of images which is a precursor of image classification. A new block truncation coding (BTC) based technique using even and odd image parts for feature vector extraction is also introduced to perform image classification. The performances of classifier algorithms are compared in Receiver Operating Characteristic (ROC) Space. Two different categories of classifiers viz. K Nearest Neighbor (KNN) Classifier and RIDOR Classifier are being used to observe the degree of classification for various techniques under six different feature vector extraction environments.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6725850
A. Sairam, S. Saha, Asif Ekbal, Gurramapati Ravi Teja Reddy
In a stub network which is connected to Internet via more than one edge routers to Internet Service Providers, the users are classified into groups where each group is connected to one edge router. Each edge link of the stub network has its own maximum available bandwidth provided by the ISP. If the group of users assigned to an edge link downloads a total inbound traffic which exceeds the maximum available bandwidth provided by that edge link, then the link is said to be over-utilized. On the contrary some group of users might download very less, under utilizing the capacity of the edge link assigned to them. In this paper, we try to provide a suitable solution for this problem by finding a better possible way of assignment of users to edge links so that the inbound traffic of all the edge links is fairly load balanced and no link is over or under utilized. This problem is framed as a multi-objective optimization problem with three objectives - load balance the inbound traffic, minimize user movements and minimize the intradomain cost. We improve on an earlier approach [1] using NSGA II [2] to minimize the first two objectives and implement third objective. Our results show that our approach load balances the inbound traffic as well as minimizes the user movements and also show that intra domain cost affects other two objectives.
{"title":"Improved multobjective algorithm for dynamic load balancing of network traffic","authors":"A. Sairam, S. Saha, Asif Ekbal, Gurramapati Ravi Teja Reddy","doi":"10.1109/INDCON.2013.6725850","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6725850","url":null,"abstract":"In a stub network which is connected to Internet via more than one edge routers to Internet Service Providers, the users are classified into groups where each group is connected to one edge router. Each edge link of the stub network has its own maximum available bandwidth provided by the ISP. If the group of users assigned to an edge link downloads a total inbound traffic which exceeds the maximum available bandwidth provided by that edge link, then the link is said to be over-utilized. On the contrary some group of users might download very less, under utilizing the capacity of the edge link assigned to them. In this paper, we try to provide a suitable solution for this problem by finding a better possible way of assignment of users to edge links so that the inbound traffic of all the edge links is fairly load balanced and no link is over or under utilized. This problem is framed as a multi-objective optimization problem with three objectives - load balance the inbound traffic, minimize user movements and minimize the intradomain cost. We improve on an earlier approach [1] using NSGA II [2] to minimize the first two objectives and implement third objective. Our results show that our approach load balances the inbound traffic as well as minimizes the user movements and also show that intra domain cost affects other two objectives.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726007
Nagesh Kumar, V. G, Ramana, V. K., S. Kiran, Ghasem Hosseini Aghdam
Unbalanced and distorted loads create lot of disturbances in source voltages and other neighboring loads. The loads like light or computers are sensitive, they may flicker or cause heat internally and may loses its life earlier. For controlling unbalanced loads, custom power devices like DSTATCOM, DVR and UPQC are most widely used. In this analysis, in three phases, three different loads like resistor load, diode rectifier load and DC motor load is placed. The resistor load gives normal voltage and current, diode rectifier load voltage and current which will distort voltage waveform and DC motor load will distort both voltage and current waveforms. In the analysis, these loads are considered with different power ratings, so unbalanced voltages and currents are produced. In this paper, DSTATCOM with hysteresis controller is used for compensating unbalanced voltages and to reduce total harmonic distortion (THD) in source voltage and current.
{"title":"Analysis of three phases four wire hysteresis current controller for unbalanced loads like DC motor and diode rectifier on different phases using DSTATCOM","authors":"Nagesh Kumar, V. G, Ramana, V. K., S. Kiran, Ghasem Hosseini Aghdam","doi":"10.1109/INDCON.2013.6726007","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726007","url":null,"abstract":"Unbalanced and distorted loads create lot of disturbances in source voltages and other neighboring loads. The loads like light or computers are sensitive, they may flicker or cause heat internally and may loses its life earlier. For controlling unbalanced loads, custom power devices like DSTATCOM, DVR and UPQC are most widely used. In this analysis, in three phases, three different loads like resistor load, diode rectifier load and DC motor load is placed. The resistor load gives normal voltage and current, diode rectifier load voltage and current which will distort voltage waveform and DC motor load will distort both voltage and current waveforms. In the analysis, these loads are considered with different power ratings, so unbalanced voltages and currents are produced. In this paper, DSTATCOM with hysteresis controller is used for compensating unbalanced voltages and to reduce total harmonic distortion (THD) in source voltage and current.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726019
R. Saligram
Reversible Logic is one of the emerging computational methodology which assures zero power dissipation through theoretical laws of thermodynamics. Fault Tolerance property in reversible logic is achieved by using a special class of reversible logic gates called the parity preserving gates. This paper presents a novel BCD adder which has a distinguished architecture than those prevalent in the literature, constructed using proposed Parity Conserving Toffoli Gate (PCTG) and Double Feynman Gate. The proposed structure has the least logical cost than all the other designs studied under the scope. The reversible logic being the nucleus of nanotechnology, the circuits are at the nanometric scale.
{"title":"Design and implementation of logical cost efficient nanometric fault tolerant reversible BCD adder","authors":"R. Saligram","doi":"10.1109/INDCON.2013.6726019","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726019","url":null,"abstract":"Reversible Logic is one of the emerging computational methodology which assures zero power dissipation through theoretical laws of thermodynamics. Fault Tolerance property in reversible logic is achieved by using a special class of reversible logic gates called the parity preserving gates. This paper presents a novel BCD adder which has a distinguished architecture than those prevalent in the literature, constructed using proposed Parity Conserving Toffoli Gate (PCTG) and Double Feynman Gate. The proposed structure has the least logical cost than all the other designs studied under the scope. The reversible logic being the nucleus of nanotechnology, the circuits are at the nanometric scale.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6726065
D. K. Rout, Susmita Das
Body Area Networks (BAN) is an emerging area in the field of wireless communication and remote health monitoring. An important concern in BANs is the interference from existing wireless networks. In the year 2002 a 50 MHz spectrum was proposed for IEEE 802.11y from 4940MHz to 4990MHz for WLAN channels 20 to 26 which is a potential interferer for BANs. The paper suggests the modified Hermite pulses for narrowband interference suppression and investigates the performance in the presence of strong narrowband interference. The method can be easily extended to other systems and bands too.
{"title":"Performance of MHP pulse based TH BPSK in presence of strong narrowband interference in UWB Body Area Networks","authors":"D. K. Rout, Susmita Das","doi":"10.1109/INDCON.2013.6726065","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6726065","url":null,"abstract":"Body Area Networks (BAN) is an emerging area in the field of wireless communication and remote health monitoring. An important concern in BANs is the interference from existing wireless networks. In the year 2002 a 50 MHz spectrum was proposed for IEEE 802.11y from 4940MHz to 4990MHz for WLAN channels 20 to 26 which is a potential interferer for BANs. The paper suggests the modified Hermite pulses for narrowband interference suppression and investigates the performance in the presence of strong narrowband interference. The method can be easily extended to other systems and bands too.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/INDCON.2013.6725911
Vibhuti Dhyani, Sudha Arora
This paper presents application of fuzzy logic control for Reactive Power and D.C capacitor voltage control of Doubly Fed Induction Generator (DFIG) during external faults. In order to apply fuzzy logic controller, a model is developed in MATLAB/SIMULINK. Reactive power is control from rotor side converter and d.c. capacitor voltage is control from grid side converter. The simulation results are presented to illuminate the effectiveness of the fuzzy controller compared with conventional PI controller in the DFIG system.
{"title":"Application of fuzzy logic control for reactive power and D.C. capacitor voltage control of Doubly Fed Induction Generator during external faults","authors":"Vibhuti Dhyani, Sudha Arora","doi":"10.1109/INDCON.2013.6725911","DOIUrl":"https://doi.org/10.1109/INDCON.2013.6725911","url":null,"abstract":"This paper presents application of fuzzy logic control for Reactive Power and D.C capacitor voltage control of Doubly Fed Induction Generator (DFIG) during external faults. In order to apply fuzzy logic controller, a model is developed in MATLAB/SIMULINK. Reactive power is control from rotor side converter and d.c. capacitor voltage is control from grid side converter. The simulation results are presented to illuminate the effectiveness of the fuzzy controller compared with conventional PI controller in the DFIG system.","PeriodicalId":313185,"journal":{"name":"2013 Annual IEEE India Conference (INDICON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}