Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006200
K PRASAD BABU, S. A. Basha, M. Chennaiah, H. Devanna
Current low power circuit designs are employing Reversible logic as its applications are found in CMOS design, cryptography, optical information processing and nanotechnology. In this paper we are designing Full adder circuit using NG and NTG reversible gates, Full adder is chosen, as it is one of the basic building block in many computational units. The proposed design is compatible with optical and quantum reversible implementations.
{"title":"Design of low power FULLADDER using NG and NTG gates","authors":"K PRASAD BABU, S. A. Basha, M. Chennaiah, H. Devanna","doi":"10.1109/ICSSS.2014.7006200","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006200","url":null,"abstract":"Current low power circuit designs are employing Reversible logic as its applications are found in CMOS design, cryptography, optical information processing and nanotechnology. In this paper we are designing Full adder circuit using NG and NTG reversible gates, Full adder is chosen, as it is one of the basic building block in many computational units. The proposed design is compatible with optical and quantum reversible implementations.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125044637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006182
Ajayakumar Katageri, B. G. Sheeparamatti, V. B. Math
This paper presents a unique design of MEMS based 4-bit shift register that perform shifting operation same as logic devices that are composed of solid-state transistors. The MEMS shift register design inherits all the advantages from MEMS switches and thus is expected to have more applications. One unique feature of this device is that it can perform all types of shifting mechanisms, but with different electrical and mechanical interconnects. The model consists of multiple switches working on the principle of electrostatic actuation. The shift register has 4 stages with each stage having 4 switches and each switch is one bit implementation of a 4 bit shift register. Since the basic logical switching operation is indicated by a mechanical deflection of a cantilever, the proposed system is accurate and reliable.
{"title":"Design of MEMS based 4-bit shift register","authors":"Ajayakumar Katageri, B. G. Sheeparamatti, V. B. Math","doi":"10.1109/ICSSS.2014.7006182","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006182","url":null,"abstract":"This paper presents a unique design of MEMS based 4-bit shift register that perform shifting operation same as logic devices that are composed of solid-state transistors. The MEMS shift register design inherits all the advantages from MEMS switches and thus is expected to have more applications. One unique feature of this device is that it can perform all types of shifting mechanisms, but with different electrical and mechanical interconnects. The model consists of multiple switches working on the principle of electrostatic actuation. The shift register has 4 stages with each stage having 4 switches and each switch is one bit implementation of a 4 bit shift register. Since the basic logical switching operation is indicated by a mechanical deflection of a cantilever, the proposed system is accurate and reliable.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006180
L. Abhishek, R. Karthick, K. Kumar, G. Sivakumar
This paper presents cheap smart materials for water purification. First, we present shock electrodialysis method, which can efficiently perform desalination, filtration, disinfection and ion separation by charge and size, which is based on charge of porous glass frit and charge of toxic particles. It is superior to open channel electrodialysis as ion depletion zone can be increased and so the flow rate of ions. Enhacement and reduction ratio of positive and negative ions are discussed. In this method, toxic microparticles, charged (+/-) dye particles, bacterium, salinity is completely removed and results of disinfection of e-coli in the contaminated water and filter efficiency based on size of toxic particles are discussed. Secondly, we present natural nano filter employed with nitrogen doped cellulose acetate fibres, membrane fibres from banana peel, plantain stem, amla bark, antimicrobial surfactant modified zeolite(SMZ). We found about 97% bacteria, 90-99% viruses, 95% turbidity (<;1 NTU) and 95 % iron removal. Mainly the surfactant modified zeolite, onto which 30% aqueous solution of DiOctadecyl Dimethyl Ammonium Chloride (DODAC), embedded with silver nanoparticles to create a hydrophobic layer, which attracts chlorine and other negatively charged salts and its efficiency of removal of viruses like MS2, Phix174 and bromide content are also discussed. Finally, N2 doped activated carbon preparation from natural cellulose of the tree barks and its preparation by pyrolysis are discussed and its performance is yet to be tested.
{"title":"Efficient water treatment using smart materials","authors":"L. Abhishek, R. Karthick, K. Kumar, G. Sivakumar","doi":"10.1109/ICSSS.2014.7006180","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006180","url":null,"abstract":"This paper presents cheap smart materials for water purification. First, we present shock electrodialysis method, which can efficiently perform desalination, filtration, disinfection and ion separation by charge and size, which is based on charge of porous glass frit and charge of toxic particles. It is superior to open channel electrodialysis as ion depletion zone can be increased and so the flow rate of ions. Enhacement and reduction ratio of positive and negative ions are discussed. In this method, toxic microparticles, charged (+/-) dye particles, bacterium, salinity is completely removed and results of disinfection of e-coli in the contaminated water and filter efficiency based on size of toxic particles are discussed. Secondly, we present natural nano filter employed with nitrogen doped cellulose acetate fibres, membrane fibres from banana peel, plantain stem, amla bark, antimicrobial surfactant modified zeolite(SMZ). We found about 97% bacteria, 90-99% viruses, 95% turbidity (<;1 NTU) and 95 % iron removal. Mainly the surfactant modified zeolite, onto which 30% aqueous solution of DiOctadecyl Dimethyl Ammonium Chloride (DODAC), embedded with silver nanoparticles to create a hydrophobic layer, which attracts chlorine and other negatively charged salts and its efficiency of removal of viruses like MS2, Phix174 and bromide content are also discussed. Finally, N2 doped activated carbon preparation from natural cellulose of the tree barks and its preparation by pyrolysis are discussed and its performance is yet to be tested.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006176
Sagar Agarwal, Ishan Sharma, Anudeep Varma, A. Raj
Iterative Closest Point (ICP) is an algorithm used to find the rotation and translation to efficiently register two point sets. A major drawback of the ICP algorithm is that it demands the data point sets to be approximately registered before it can be applied. Genetic algorithms (GA) provide a global solution to this problem and have no such prerequisite, but their convergence speed is slow. In this paper, we have demonstrated the use of a hybrid of a binary genetic algorithm (GA) and the Comprehensive ICP (CICP) algorithm (an existing variant of the ICP algorithm) to register depth images of a human face. The application of the GA followed by the CICP algorithm has proven to be fast and efficient and has no precondition on initial registration. The hybrid algorithm was able to register twenty control points to an RMS error of 0.6148 in 2.0187 seconds on an average.).
{"title":"A hybrid [ICP and GA] image registration algorithm for depth images","authors":"Sagar Agarwal, Ishan Sharma, Anudeep Varma, A. Raj","doi":"10.1109/ICSSS.2014.7006176","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006176","url":null,"abstract":"Iterative Closest Point (ICP) is an algorithm used to find the rotation and translation to efficiently register two point sets. A major drawback of the ICP algorithm is that it demands the data point sets to be approximately registered before it can be applied. Genetic algorithms (GA) provide a global solution to this problem and have no such prerequisite, but their convergence speed is slow. In this paper, we have demonstrated the use of a hybrid of a binary genetic algorithm (GA) and the Comprehensive ICP (CICP) algorithm (an existing variant of the ICP algorithm) to register depth images of a human face. The application of the GA followed by the CICP algorithm has proven to be fast and efficient and has no precondition on initial registration. The hybrid algorithm was able to register twenty control points to an RMS error of 0.6148 in 2.0187 seconds on an average.).","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115067048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006183
Prashant D. Hanasi, B. G. Sheeparamatti, B. Kirankumar
Micro cantilevers are the basic MEMS structures, which can be used both as sensors and actuators. The actuation principle of micro cantilever is based on the measurement of change in cantilever position as result of applied stimulus. The objective of this work is to study concept of pull-in voltage and how to reduce the same. The proposed work is carried out by using Comsol/Multiphysics softwere which is based on the finite element method (FEM). The model is developed and simulated by selecting electro mechanics as the physics domain in the Comsol/Multiphysics softwere. Voltage is applied to upper cantilever beam and lower contact electrode is made as ground. By increasing common area between cantilever beam and contact electrode, and also by reducing thickness of the cantilever beam, it is tried to reduce the pull-in voltage. The common area between cantilever beam and contact electrode dimension is increased and the pull-in voltage is reduced from 19.7V to 12.1 V. Similarly the thickness of the cantilever beam is decreased from 1μm to 0.25μm in the steps of 0.25 μm then pull-in voltage is reduced from 57V to 7.2V.
{"title":"Study of pull-in voltage in MEMS actuators","authors":"Prashant D. Hanasi, B. G. Sheeparamatti, B. Kirankumar","doi":"10.1109/ICSSS.2014.7006183","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006183","url":null,"abstract":"Micro cantilevers are the basic MEMS structures, which can be used both as sensors and actuators. The actuation principle of micro cantilever is based on the measurement of change in cantilever position as result of applied stimulus. The objective of this work is to study concept of pull-in voltage and how to reduce the same. The proposed work is carried out by using Comsol/Multiphysics softwere which is based on the finite element method (FEM). The model is developed and simulated by selecting electro mechanics as the physics domain in the Comsol/Multiphysics softwere. Voltage is applied to upper cantilever beam and lower contact electrode is made as ground. By increasing common area between cantilever beam and contact electrode, and also by reducing thickness of the cantilever beam, it is tried to reduce the pull-in voltage. The common area between cantilever beam and contact electrode dimension is increased and the pull-in voltage is reduced from 19.7V to 12.1 V. Similarly the thickness of the cantilever beam is decreased from 1μm to 0.25μm in the steps of 0.25 μm then pull-in voltage is reduced from 57V to 7.2V.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"39 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126116476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006178
R. Bhuvani, D. Priyanka, S. Rajeshwari, P. Kausalyadevi
`SPEED THRILLS, BUT IT KILLS!'-Nowadays, people are conscious about their appearance rather than their life. They think that wearing helmets leads to hair fall, makes them uncomfortable and looks like a mushroom in size. But, helmets are the life savior which prevents us from fatal injuries. On contrary, during major accidents there are situation where the conventional helmets may crash and lead to death. In order to overcome the drawbacks listed above we use the concept of lnvisible helmets. In this project, we have stressed the point that wearing helmets are mandatory while driving. We use security tokens to bring this into action. Advantages of the proposed method are helmet usage becomes mandatory, anti-theft, drunk and drive can be avoided.
{"title":"Life saving alert for wearing helmets using security tokens","authors":"R. Bhuvani, D. Priyanka, S. Rajeshwari, P. Kausalyadevi","doi":"10.1109/ICSSS.2014.7006178","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006178","url":null,"abstract":"`SPEED THRILLS, BUT IT KILLS!'-Nowadays, people are conscious about their appearance rather than their life. They think that wearing helmets leads to hair fall, makes them uncomfortable and looks like a mushroom in size. But, helmets are the life savior which prevents us from fatal injuries. On contrary, during major accidents there are situation where the conventional helmets may crash and lead to death. In order to overcome the drawbacks listed above we use the concept of lnvisible helmets. In this project, we have stressed the point that wearing helmets are mandatory while driving. We use security tokens to bring this into action. Advantages of the proposed method are helmet usage becomes mandatory, anti-theft, drunk and drive can be avoided.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006201
A. Mulani, P. Mane
Reconfigurable computing has grown to become a large and important field of research. Implementing network security algorithms on reconfigurable platform provides major benefits over VLSI and software platforms since they offers high speed similar to VLSI and high flexibility similar to software platforms. The paper presents efficient implementation of DES algorithm on XC25200 FPGA. The synthesis result shows that with this kind of implementation only 2118 slices and 97 number of bonded IOBs are utilized as compared to 2151 slices and 186 number of bonded IOBs with normal implementation.
{"title":"Area optimization of cryptographic algorithm on less dense reconfigurable platform","authors":"A. Mulani, P. Mane","doi":"10.1109/ICSSS.2014.7006201","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006201","url":null,"abstract":"Reconfigurable computing has grown to become a large and important field of research. Implementing network security algorithms on reconfigurable platform provides major benefits over VLSI and software platforms since they offers high speed similar to VLSI and high flexibility similar to software platforms. The paper presents efficient implementation of DES algorithm on XC25200 FPGA. The synthesis result shows that with this kind of implementation only 2118 slices and 97 number of bonded IOBs are utilized as compared to 2151 slices and 186 number of bonded IOBs with normal implementation.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132920076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006190
V. Nandakumar
Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.
{"title":"A novel shared key for security in grid computing","authors":"V. Nandakumar","doi":"10.1109/ICSSS.2014.7006190","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006190","url":null,"abstract":"Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"2001 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131371287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006175
G. Vijayalakshmi, A. Raj, S. V. S. K. Ashok Varma
The paper proposes a Modified Principal Component Analysis coined as 2DPCA to compare 2D and 3D face recognition. In 2DPCA a covariance matrix of image is obtained directly from the original image and is used to find the eigenvectors for image feature extraction. Here the Texas 3D [1] face recognition database was considered, which has 1149 pairs of high resolution, preprocessed and pose normalized color and range images. These images are pixel-to-pixel registered and of resolution of 751×501 pixels. The experiment performed using the images reconstructed from feature vectors demonstrated that depth information was beneficial in representing and recognizing the face with least number of principal components.
{"title":"Optimum selection of features for 2D (color) and 3D (depth) face recognition using modified PCA (2D)","authors":"G. Vijayalakshmi, A. Raj, S. V. S. K. Ashok Varma","doi":"10.1109/ICSSS.2014.7006175","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006175","url":null,"abstract":"The paper proposes a Modified Principal Component Analysis coined as 2DPCA to compare 2D and 3D face recognition. In 2DPCA a covariance matrix of image is obtained directly from the original image and is used to find the eigenvectors for image feature extraction. Here the Texas 3D [1] face recognition database was considered, which has 1149 pairs of high resolution, preprocessed and pose normalized color and range images. These images are pixel-to-pixel registered and of resolution of 751×501 pixels. The experiment performed using the images reconstructed from feature vectors demonstrated that depth information was beneficial in representing and recognizing the face with least number of principal components.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICSSS.2014.7006195
D. Varma, A. Kumari
This paper proposes Voltage Oriented Controller based Statcom connected at PCC with grid connected fixed speed induction generator. The Performance of Wind turbine System connected utility grid using the proposed control strategy is analyzed under various abnormal conditions using MATLAB/SIMULINK Tool Box. The effect of unbalanced and Non sinusoidal current drawing loads connected at Point of Interconnection is analyzed on the grid side and on the source side by the proposed current control strategy. The simulation results show that the proposed controller effectively reduces the distortions and unbalanced effect on the grid side and improves the wind farm voltage and current waveforms at PCC to improve the Power Quality. The THD Percentage of Grid utility Current is compared with and without Statcom to meet the IEEE-519-1992 Standards.
{"title":"Voltage oriented controller based statcom in grid connected wind energy system under unbalaced and distorted conditions","authors":"D. Varma, A. Kumari","doi":"10.1109/ICSSS.2014.7006195","DOIUrl":"https://doi.org/10.1109/ICSSS.2014.7006195","url":null,"abstract":"This paper proposes Voltage Oriented Controller based Statcom connected at PCC with grid connected fixed speed induction generator. The Performance of Wind turbine System connected utility grid using the proposed control strategy is analyzed under various abnormal conditions using MATLAB/SIMULINK Tool Box. The effect of unbalanced and Non sinusoidal current drawing loads connected at Point of Interconnection is analyzed on the grid side and on the source side by the proposed current control strategy. The simulation results show that the proposed controller effectively reduces the distortions and unbalanced effect on the grid side and improves the wind farm voltage and current waveforms at PCC to improve the Power Quality. The THD Percentage of Grid utility Current is compared with and without Statcom to meet the IEEE-519-1992 Standards.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}