Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062725
M. N. Sumaiya, R. Shantha Selva Kumari
In this paper, very simple automatic edge enhancement algorithm for Synthetic Aperture Radar (SAR) Image has been presented. Maximum Wavelet coefficients among three subbands at different scales have been exploited to form point wise maxima product. This operation produces enhanced edges in the wavelet domain itself. In many of the research works, development of edge enhancement step has been proposed prior to edge detection step. This enhancement step would ease the automatic edge detection operation. Simulated Images have been used to test the performance of the method and it is extended to the real SAR images also. For objective evaluation, quality metrics like EBCM, CP have been measured as 117 & 40 and shows good performance.
{"title":"Unsupervised edge enhancement algorithm for SAR images using exploitation of wavelet transform coefficients","authors":"M. N. Sumaiya, R. Shantha Selva Kumari","doi":"10.1109/CNT.2014.7062725","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062725","url":null,"abstract":"In this paper, very simple automatic edge enhancement algorithm for Synthetic Aperture Radar (SAR) Image has been presented. Maximum Wavelet coefficients among three subbands at different scales have been exploited to form point wise maxima product. This operation produces enhanced edges in the wavelet domain itself. In many of the research works, development of edge enhancement step has been proposed prior to edge detection step. This enhancement step would ease the automatic edge detection operation. Simulated Images have been used to test the performance of the method and it is extended to the real SAR images also. For objective evaluation, quality metrics like EBCM, CP have been measured as 117 & 40 and shows good performance.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062740
C. B. Lakshmi, S. K. Mohan Rao
Recent advances in Compact and wireless embedded Systems coupled with the technological innovations in Micro Electro Mechanical Systems(MEMS), Wireless Communications and networks paved the way for the development of small, resource constrained devices called Sensor Nodes (SNs). Performance of Sensor Node is highly dependent on the effective and efficient usage of the available limited resources with it, leading to maximum lifetime of Wireless Sensor Network (WSN) which is a primary concern of WSNs. The depletion of a SN energy leads to change in topology of WSNs often over a period of time. Therefore, protocols which consider the dynamic nature of WSNs are crucial for improving the network lifetime. In this paper, we propose bio inspired Ant Colony optimization based Self healing routing scheme inspired by swarm Intelligence technique to improve lifetime of a WSN.
{"title":"Bio-inspired self-healing routing to improve lifetime of wireless sensor networks","authors":"C. B. Lakshmi, S. K. Mohan Rao","doi":"10.1109/CNT.2014.7062740","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062740","url":null,"abstract":"Recent advances in Compact and wireless embedded Systems coupled with the technological innovations in Micro Electro Mechanical Systems(MEMS), Wireless Communications and networks paved the way for the development of small, resource constrained devices called Sensor Nodes (SNs). Performance of Sensor Node is highly dependent on the effective and efficient usage of the available limited resources with it, leading to maximum lifetime of Wireless Sensor Network (WSN) which is a primary concern of WSNs. The depletion of a SN energy leads to change in topology of WSNs often over a period of time. Therefore, protocols which consider the dynamic nature of WSNs are crucial for improving the network lifetime. In this paper, we propose bio inspired Ant Colony optimization based Self healing routing scheme inspired by swarm Intelligence technique to improve lifetime of a WSN.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062724
G. Jaffino, A. Banumathi, U. Gurunathan, J. Prabin Jose
Dental biometrics is used to identify the individuals in the forensic domain. Forensic identification is used to identify the person by comparing postmortem and ante mortem dental images. The dental radiograph image provides the information about teeth, tooth contours and in addition to that dental work (DW) is one of the notable issues for forensic identification. This dental work includes crown filling, root canal and crown mineralization for tooth. In this paper addresses the dental work identification for different radiographic images such as bitewing, periapical and panoramic dental images with Mahalanobis distance based matching. The proposed system contains preprocessing, feature extraction and matching. Experimental evaluation gives the satisfied results which will abet for dental biometrics.
{"title":"Dental work extraction for different radiographic Images in human Forensic Identification","authors":"G. Jaffino, A. Banumathi, U. Gurunathan, J. Prabin Jose","doi":"10.1109/CNT.2014.7062724","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062724","url":null,"abstract":"Dental biometrics is used to identify the individuals in the forensic domain. Forensic identification is used to identify the person by comparing postmortem and ante mortem dental images. The dental radiograph image provides the information about teeth, tooth contours and in addition to that dental work (DW) is one of the notable issues for forensic identification. This dental work includes crown filling, root canal and crown mineralization for tooth. In this paper addresses the dental work identification for different radiographic images such as bitewing, periapical and panoramic dental images with Mahalanobis distance based matching. The proposed system contains preprocessing, feature extraction and matching. Experimental evaluation gives the satisfied results which will abet for dental biometrics.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062742
K. Balasubramanian
In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.
{"title":"Variants of RSA and their cryptanalysis","authors":"K. Balasubramanian","doi":"10.1109/CNT.2014.7062742","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062742","url":null,"abstract":"In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062718
K. Vimala Devi, S. Vetha
Cloud computing is a new technology in computer field which provides various resources over the Internet. It serves different types of the resources in virtualized form. Resource allocation and better utilization of the virtualized resources can be done by using scheduling. This paper analyses various types of scheduling algorithms for resource allocation in cloud computing. We propose a new algorithm to allocate resources in efficient manner. The developed resource allocation algorithm is based on different parameters like number of processor requests, capacity requests etc. Our proposal algorithm can be used for a better resource allocation of jobs in the cloud environment.
{"title":"Capacity based resource allocation in cloud","authors":"K. Vimala Devi, S. Vetha","doi":"10.1109/CNT.2014.7062718","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062718","url":null,"abstract":"Cloud computing is a new technology in computer field which provides various resources over the Internet. It serves different types of the resources in virtualized form. Resource allocation and better utilization of the virtualized resources can be done by using scheduling. This paper analyses various types of scheduling algorithms for resource allocation in cloud computing. We propose a new algorithm to allocate resources in efficient manner. The developed resource allocation algorithm is based on different parameters like number of processor requests, capacity requests etc. Our proposal algorithm can be used for a better resource allocation of jobs in the cloud environment.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124976152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062774
B. Anoob, C. Unni
This paper presents the design of a planar printed antenna with ground plate is in coplanar configuration. The target of this paper is to introduce an antenna that supports all mobile and wireless services with low SAR value. The antenna operates for most of the mobile applications such as the GSM 850, GSM 900, DCS 1800, PCS 1900, and UMTS 2100. The antenna also support WiMAX, wireless local area network (WLAN), and the Industrial, Scientific, and Medical (ISM) bands. The proposed antenna consists of monopole, meander line, and a spiral EBG structure. Higher frequency bands are supported by both the meander line and the monopole since they acts as traveling-wave antennas at the high frequency bands. The high impedance surface property of the EBG structure is utilized here to reduce the radiation at the resonant frequency of the mobile band. The proposed antenna exhibits certain features such compact size, the multiband operation including the low frequency bands, and the low SAR radiation. The simulations were carried out in CST Microwave studio.
本文设计了一种平面印刷天线,其接地板为共面结构。本文的目标是介绍一种支持低SAR值的所有移动和无线业务的天线。该天线适用于大多数移动应用,如GSM 850、GSM 900、DCS 1800、PCS 1900和UMTS 2100。该天线还支持WiMAX、无线局域网(WLAN)和ISM (Industrial, Scientific, and Medical)频段。该天线由单极子、弯曲线和螺旋型EBG结构组成。较高的频段由曲线和单极子支持,因为它们在高频段充当行波天线。利用EBG结构的高阻抗表面特性来减小移动频段共振频率处的辐射。该天线具有体积小、包括低频在内的多波段工作、低SAR辐射等特点。仿真在CST微波工作室进行。
{"title":"Investigation on Specific Absorption Rate due to electromagnetic radiation","authors":"B. Anoob, C. Unni","doi":"10.1109/CNT.2014.7062774","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062774","url":null,"abstract":"This paper presents the design of a planar printed antenna with ground plate is in coplanar configuration. The target of this paper is to introduce an antenna that supports all mobile and wireless services with low SAR value. The antenna operates for most of the mobile applications such as the GSM 850, GSM 900, DCS 1800, PCS 1900, and UMTS 2100. The antenna also support WiMAX, wireless local area network (WLAN), and the Industrial, Scientific, and Medical (ISM) bands. The proposed antenna consists of monopole, meander line, and a spiral EBG structure. Higher frequency bands are supported by both the meander line and the monopole since they acts as traveling-wave antennas at the high frequency bands. The high impedance surface property of the EBG structure is utilized here to reduce the radiation at the resonant frequency of the mobile band. The proposed antenna exhibits certain features such compact size, the multiband operation including the low frequency bands, and the low SAR radiation. The simulations were carried out in CST Microwave studio.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062764
A. Kamaraj, Abinaya, S. Ramya
Quantum Cellular Automata (QCA) is a promising future to the CMOS technology with ultra operating speed and low power consumption. The realization of QCA with Reversible Logic is the Green Computing. A router is the key component in the internet core for transmitting data packets. Being the technology beyond CMOS, the work has been proposed to design a Router in QCA. In addition to that, crossing in Router architecture is done in Multilayer with reversible logic. This proposed architecture guarantees efficient data routing in Router. Also it provides reduced cell area, high operating speed, and minimum complexity.
{"title":"Design of router using Reversible Logic in Quantum Cellular Automata","authors":"A. Kamaraj, Abinaya, S. Ramya","doi":"10.1109/CNT.2014.7062764","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062764","url":null,"abstract":"Quantum Cellular Automata (QCA) is a promising future to the CMOS technology with ultra operating speed and low power consumption. The realization of QCA with Reversible Logic is the Green Computing. A router is the key component in the internet core for transmitting data packets. Being the technology beyond CMOS, the work has been proposed to design a Router in QCA. In addition to that, crossing in Router architecture is done in Multilayer with reversible logic. This proposed architecture guarantees efficient data routing in Router. Also it provides reduced cell area, high operating speed, and minimum complexity.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062778
S. Devaraj, R. Helen, Vedanayagi Anita, J. Christa
In Mobile Ad-hoc Networks (MANETs), mobile node act as router themselves and keeping the route information to reach other mobile nodes and helps to forward data packets from one mobile to another mobile node. The performance of the different mobility models such as Random Walk (RW), Random Waypoint (RWP), Manhattan Mobility (MM), Reference Point Group Mobility (RPGM) are widely analyzed in the environment using NS2.34 software under Linux platform (Fedora). Depending on the type of TCP (Transmission Control Protocol) implementation the behavior was different for each mobility models and it's due to the activation or missing of the following algorithms Slow Start, Congestion Avoidance and Congestion Detection. The performance of TCP flows in an Mobile ad-hoc network is analyzed using four different mobility models with Ad hoc On- Demand Distance Vector (AODV) as the routing protocol and TCP/TCP New Reno as the transport protocol.
在移动自组织网络(manet)中,移动节点本身充当路由器,保留到达其他移动节点的路由信息,并帮助将数据包从一个移动节点转发到另一个移动节点。在Linux平台(Fedora)下,采用NS2.34软件,对随机行走(RW)、随机路径点(RWP)、曼哈顿移动(MM)、参考点群移动(RPGM)等不同移动模型的性能进行了分析。根据TCP(传输控制协议)实现的类型,每种移动模型的行为是不同的,这是由于激活或缺少以下算法慢启动,拥塞避免和拥塞检测。以Ad hoc随需应变距离矢量(AODV)为路由协议,TCP/TCP New Reno为传输协议,采用四种不同的移动模型,分析了移动自组织网络中TCP流的性能。
{"title":"Comparative analysis of random based mobility models using TCP variant in MANETs","authors":"S. Devaraj, R. Helen, Vedanayagi Anita, J. Christa","doi":"10.1109/CNT.2014.7062778","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062778","url":null,"abstract":"In Mobile Ad-hoc Networks (MANETs), mobile node act as router themselves and keeping the route information to reach other mobile nodes and helps to forward data packets from one mobile to another mobile node. The performance of the different mobility models such as Random Walk (RW), Random Waypoint (RWP), Manhattan Mobility (MM), Reference Point Group Mobility (RPGM) are widely analyzed in the environment using NS2.34 software under Linux platform (Fedora). Depending on the type of TCP (Transmission Control Protocol) implementation the behavior was different for each mobility models and it's due to the activation or missing of the following algorithms Slow Start, Congestion Avoidance and Congestion Detection. The performance of TCP flows in an Mobile ad-hoc network is analyzed using four different mobility models with Ad hoc On- Demand Distance Vector (AODV) as the routing protocol and TCP/TCP New Reno as the transport protocol.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"23 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128433000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062723
G. Prema, R. Karthiyayini
Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum is a scarce resource and it used efficiently by incorporating beamforming in the multi-antenna relay for cognitive networks. In this paper, both the adaptive beamforming for the relay networks and the performance estimation at the secondary user receiver in cognitive networks were discussed. Special attention is given to the system capacity of the cognitive networks at the secondary user receiver.
{"title":"A review on beamforming techniques for cognitive multi-antenna relay network","authors":"G. Prema, R. Karthiyayini","doi":"10.1109/CNT.2014.7062723","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062723","url":null,"abstract":"Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum is a scarce resource and it used efficiently by incorporating beamforming in the multi-antenna relay for cognitive networks. In this paper, both the adaptive beamforming for the relay networks and the performance estimation at the secondary user receiver in cognitive networks were discussed. Special attention is given to the system capacity of the cognitive networks at the secondary user receiver.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062746
J. Emmanual Robin, N. Krishnamoorthy, M. Karthikeyan, A. J. Felix
The purpose of Text Mining is to process unstructured (textual) information, extracting meaningful numeric indices from the text, and, thus, make the information contained in the text accessible to the various data mining (statistical and machine learning) algorithms. Information can be extracted to derive summaries for the words contained in the documents or to compute summaries for the documents based on the words contained in them. Hence, we can analyze words, clusters of words used in documents, etc., or we can analyze documents and determine similarities between them or how they are related to other variables of interest in the data mining project. This topic that might be integrated with massive files of very disparate joke clusters, bound only because someone thought that they were funny or someone had an interesting thing for light-bulb jokes. Therefore, there are probably tons of doubles and triples and what you have in this collection, and there's just not enough time in the day to sort them, manually. This paper is going to analyze the different variation and analysis of funny or humorous words using data mining techniques.
{"title":"Independent knowledge extraction in nature of humorous text analysis review using online text analysis tool","authors":"J. Emmanual Robin, N. Krishnamoorthy, M. Karthikeyan, A. J. Felix","doi":"10.1109/CNT.2014.7062746","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062746","url":null,"abstract":"The purpose of Text Mining is to process unstructured (textual) information, extracting meaningful numeric indices from the text, and, thus, make the information contained in the text accessible to the various data mining (statistical and machine learning) algorithms. Information can be extracted to derive summaries for the words contained in the documents or to compute summaries for the documents based on the words contained in them. Hence, we can analyze words, clusters of words used in documents, etc., or we can analyze documents and determine similarities between them or how they are related to other variables of interest in the data mining project. This topic that might be integrated with massive files of very disparate joke clusters, bound only because someone thought that they were funny or someone had an interesting thing for light-bulb jokes. Therefore, there are probably tons of doubles and triples and what you have in this collection, and there's just not enough time in the day to sort them, manually. This paper is going to analyze the different variation and analysis of funny or humorous words using data mining techniques.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}