Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398638
F. Tanaka, A. Matsubara, S. Nishifuji
Stochastic resonance is a phenomenon observed in nonlinear systems for which random noise with optimal level amplifies a weakly periodic signal. In some biological systems, stochastic resonance has been found to be utilized to improve signal transmission. Recently stochastic resonance have been evidenced in photic-driven human electroencephalogram (EEG) and demonstrated to improve performance of brain machine interface (BMI) based on steady state visual evoked potentials. The present study is aimed at giving evidence of stochastic resonance behavior in human auditory steady state response (ASSR) in EEG for developing a high-performance auditory BMI available without visual function. Seven healthy subjects aged 21-24 years old with normal hearing ability participated in the experiment in which their EEG responses to sinusoidally modulated tone with modulation frequency of 40 Hz contaminated by random noise were measured over the entire scalp with varying the carrier frequency (500 and 4,000 Hz), sound pressure of the tone (40-60 dB) and the random noise level (0-50 dB). In four subjects, ASSR amplitude showed a bell-shaped fluctuation with a maximum at noise level of 40 or 50 dB following an increase of noise level, hence the stochastic resonance effect may be elicited in the auditory system. Moreover in the four subjects, we investigated the times when ASSR significantly appeared under two conditions of no noise and the optimal noise that maximized ASSR amplitude. With addition of optimal noise, detection time of ASSR was shortened in three subjects, and ASSR was elicited in other subject. Detection time of ASSR at optimal noise was distributed between three and seven seconds across subjects. These results will be necessary in order to design novel ASSR-based BMIs. Further investigation on the stochastic resonance behavior would provide useful observation for development of auditory BMIs with high classification accuracy by improving the signal to noise ratio in the modulation of ASSR associated with user's intent.
{"title":"Evidence of stochastic resonance of auditory steady-state response in electroencephalogram for brain machine interface","authors":"F. Tanaka, A. Matsubara, S. Nishifuji","doi":"10.1109/GCCE.2015.7398638","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398638","url":null,"abstract":"Stochastic resonance is a phenomenon observed in nonlinear systems for which random noise with optimal level amplifies a weakly periodic signal. In some biological systems, stochastic resonance has been found to be utilized to improve signal transmission. Recently stochastic resonance have been evidenced in photic-driven human electroencephalogram (EEG) and demonstrated to improve performance of brain machine interface (BMI) based on steady state visual evoked potentials. The present study is aimed at giving evidence of stochastic resonance behavior in human auditory steady state response (ASSR) in EEG for developing a high-performance auditory BMI available without visual function. Seven healthy subjects aged 21-24 years old with normal hearing ability participated in the experiment in which their EEG responses to sinusoidally modulated tone with modulation frequency of 40 Hz contaminated by random noise were measured over the entire scalp with varying the carrier frequency (500 and 4,000 Hz), sound pressure of the tone (40-60 dB) and the random noise level (0-50 dB). In four subjects, ASSR amplitude showed a bell-shaped fluctuation with a maximum at noise level of 40 or 50 dB following an increase of noise level, hence the stochastic resonance effect may be elicited in the auditory system. Moreover in the four subjects, we investigated the times when ASSR significantly appeared under two conditions of no noise and the optimal noise that maximized ASSR amplitude. With addition of optimal noise, detection time of ASSR was shortened in three subjects, and ASSR was elicited in other subject. Detection time of ASSR at optimal noise was distributed between three and seven seconds across subjects. These results will be necessary in order to design novel ASSR-based BMIs. Further investigation on the stochastic resonance behavior would provide useful observation for development of auditory BMIs with high classification accuracy by improving the signal to noise ratio in the modulation of ASSR associated with user's intent.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"364 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398567
Rui-Cian Weng, Yen-Pei Lu, Jun-Li Zhang, Min-Yu Lin, Chi-Hung Wang
An infrared camera captures images of objects that emit radiation in the infrared region of the electromagnetic spectrum. In this study, a fluorescence imaging system involving a specifically designed infrared camera was developed. CCDs can detect infrared light in the invisible region of the electromagnetic spectrum (>780 nm); however, a low-pass filter is installed in front of the CCD to filter out most infrared light and prevent the light from affecting the quality of color photos. Although an ordinary camera can take infrared photos when an infrared filter is installed to its lens, a modified camera is impractical because the amount of infrared light entering the CCD is limited, resulting in the requirement of a longer exposure time. Therefore, the principle of modifying a high-speed infrared camera is to remove the low-pass filter and adopt an ordinary shutter speed to take infrared photos.
{"title":"Real-time, near-infrared fluorescence imaging system","authors":"Rui-Cian Weng, Yen-Pei Lu, Jun-Li Zhang, Min-Yu Lin, Chi-Hung Wang","doi":"10.1109/GCCE.2015.7398567","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398567","url":null,"abstract":"An infrared camera captures images of objects that emit radiation in the infrared region of the electromagnetic spectrum. In this study, a fluorescence imaging system involving a specifically designed infrared camera was developed. CCDs can detect infrared light in the invisible region of the electromagnetic spectrum (>780 nm); however, a low-pass filter is installed in front of the CCD to filter out most infrared light and prevent the light from affecting the quality of color photos. Although an ordinary camera can take infrared photos when an infrared filter is installed to its lens, a modified camera is impractical because the amount of infrared light entering the CCD is limited, resulting in the requirement of a longer exposure time. Therefore, the principle of modifying a high-speed infrared camera is to remove the low-pass filter and adopt an ordinary shutter speed to take infrared photos.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398649
Masato Hibino, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita
Agent-oriented computing is a technique to run a big-scale system by cooperation among plural agents. An agent with learning ability is called a "Learning Agent". A learning agent learns past actions, and changes the movement knowledge dynamically. A learning agent can solve a complicated problem in intellectual action. However, when a user wants to use a learning agent, little support exists for the development of a learning agent in an agent framework. Therefore, we introduce the development support of learning agent into the DASH agent framework.
{"title":"Development support of Nash-Q learning agent on agent framework DASH","authors":"Masato Hibino, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita","doi":"10.1109/GCCE.2015.7398649","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398649","url":null,"abstract":"Agent-oriented computing is a technique to run a big-scale system by cooperation among plural agents. An agent with learning ability is called a \"Learning Agent\". A learning agent learns past actions, and changes the movement knowledge dynamically. A learning agent can solve a complicated problem in intellectual action. However, when a user wants to use a learning agent, little support exists for the development of a learning agent in an agent framework. Therefore, we introduce the development support of learning agent into the DASH agent framework.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"43 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125888843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A proposal is made to use blockchain technology for recording contracts. A new protocol using the technology is described that makes it possible to confirm that contractor consent has been obtained and to archive the contractual document in the blockchain.
{"title":"Blockchain contract: A complete consensus using blockchain","authors":"Hiroki Watanabe, Shigeru Fujimura, Atsushi Nakadaira, Yasuhiko Miyazaki, Akihito Akutsu, J. Kishigami","doi":"10.1109/GCCE.2015.7398721","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398721","url":null,"abstract":"A proposal is made to use blockchain technology for recording contracts. A new protocol using the technology is described that makes it possible to confirm that contractor consent has been obtained and to archive the contractual document in the blockchain.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398729
K. Nohara, Y. Nozaki, M. Yoshikawa
Recently, portable devices and wearable devices are widely used. The security is the most important problem for these devices. Usually, the confidential information in these devices is protected by encrypting data. These portable devices have area constraint. Therefore, AES, which is the most popular encryption standard, cannot be applied to these devices. Lightweight block ciphers require small area for their implementations. Therefore, lightweight block ciphers are used in portable devices. On the other hands, the threat of hardware Trojan against cipher circuit in electric devices has been pointed out. This study proposes a new hardware Trojan and examines to the characteristic of the proposed hardware Trojan by using a FPGA.
{"title":"Hardware Trojan for ultra lightweight block cipher Piccolo","authors":"K. Nohara, Y. Nozaki, M. Yoshikawa","doi":"10.1109/GCCE.2015.7398729","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398729","url":null,"abstract":"Recently, portable devices and wearable devices are widely used. The security is the most important problem for these devices. Usually, the confidential information in these devices is protected by encrypting data. These portable devices have area constraint. Therefore, AES, which is the most popular encryption standard, cannot be applied to these devices. Lightweight block ciphers require small area for their implementations. Therefore, lightweight block ciphers are used in portable devices. On the other hands, the threat of hardware Trojan against cipher circuit in electric devices has been pointed out. This study proposes a new hardware Trojan and examines to the characteristic of the proposed hardware Trojan by using a FPGA.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398689
Kento Yamamoto, T. Nagasaki, M. Toda, Keiji Hirata, H. Matsubara
In this paper, we propose the power saving method of the intelligent bus stop for demand responsive bus. To save the power of the intelligent bus stop, we use normally off computing to execute its function only when users use it. When we practice a demonstration experiment in Nanae town, the error rate of pyroelectric sensor to detect users is 37 %. The power consumption of communication function to communicate with bus server is the biggest of all functions in it. To save the power consumption, we reduce the communications to the server by improving detection using a camera.
{"title":"Power-saving evaluation of the demand responsive intelligent bus stop system using a camera","authors":"Kento Yamamoto, T. Nagasaki, M. Toda, Keiji Hirata, H. Matsubara","doi":"10.1109/GCCE.2015.7398689","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398689","url":null,"abstract":"In this paper, we propose the power saving method of the intelligent bus stop for demand responsive bus. To save the power of the intelligent bus stop, we use normally off computing to execute its function only when users use it. When we practice a demonstration experiment in Nanae town, the error rate of pyroelectric sensor to detect users is 37 %. The power consumption of communication function to communicate with bus server is the biggest of all functions in it. To save the power consumption, we reduce the communications to the server by improving detection using a camera.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129449577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398718
Nobuaki Kobayashi, M. Nakagawa
BCI (Brain-computer Interface) has been attracting attention as an interface to connect the brain to external devices. However, it is essential to establish methods to recognize the brain state accurately in order to implement BCI, and a number of challenges still remain. Here, we suggest a novel BCI system that accurately recognizes and isolates emotions like delight, anger, sorrow, and pleasure using an Emotion Fractal Analysis Method (EFAM), which can quantify emotions based on data obtained by electroencephalography, and control an electric wheelchair using the information. With this method, a high average rate of recognizing emotions (delight, anger, sorrow, and pleasure) of 55-60% and markedly high rate of isolating them of over 97% can be achieved. We developed the BCI circuit to control an electric wheelchair based on data on emotions obtained in realtime by EFAM. Using this circuit, the speed of an electric wheelchair can be adjusted by the intensity of emotions.
{"title":"BCI-based control of electric wheelchair","authors":"Nobuaki Kobayashi, M. Nakagawa","doi":"10.1109/GCCE.2015.7398718","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398718","url":null,"abstract":"BCI (Brain-computer Interface) has been attracting attention as an interface to connect the brain to external devices. However, it is essential to establish methods to recognize the brain state accurately in order to implement BCI, and a number of challenges still remain. Here, we suggest a novel BCI system that accurately recognizes and isolates emotions like delight, anger, sorrow, and pleasure using an Emotion Fractal Analysis Method (EFAM), which can quantify emotions based on data obtained by electroencephalography, and control an electric wheelchair using the information. With this method, a high average rate of recognizing emotions (delight, anger, sorrow, and pleasure) of 55-60% and markedly high rate of isolating them of over 97% can be achieved. We developed the BCI circuit to control an electric wheelchair based on data on emotions obtained in realtime by EFAM. Using this circuit, the speed of an electric wheelchair can be adjusted by the intensity of emotions.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398563
Kenta Ishihara, Takahiro Ogawa, M. Haseyama
This paper presents the performance improvement of Helicobacter pylori (H. pylori) infection detection using Kernel Local Fisher Discriminant Analysis (KLFDA)-based decision fusion. As the biggest contribution of this paper, the proposed method extracts more discriminative features based on KLFDA for the decision fusion. Since the decision fusion employed in this paper can consider not only the detection results but also the visual features, by calculating more discriminative features via KLFDA, more accurate decision fusion becomes feasible. Furthermore, experimental results show the effectiveness of the proposed method.
提出了基于核局部Fisher判别分析(Kernel Local Fisher Discriminant Analysis, KLFDA)的决策融合方法,提高了幽门螺杆菌(Helicobacter pylori)感染检测的性能。本文最大的贡献是基于KLFDA提取更多的判别特征进行决策融合。由于本文采用的决策融合不仅考虑检测结果,而且考虑视觉特征,因此通过KLFDA计算更多的判别特征,使得更准确的决策融合成为可能。实验结果表明了该方法的有效性。
{"title":"Helicobacter pylori infection detection from gastric X-ray images using KLFDA-based decision fusion","authors":"Kenta Ishihara, Takahiro Ogawa, M. Haseyama","doi":"10.1109/GCCE.2015.7398563","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398563","url":null,"abstract":"This paper presents the performance improvement of Helicobacter pylori (H. pylori) infection detection using Kernel Local Fisher Discriminant Analysis (KLFDA)-based decision fusion. As the biggest contribution of this paper, the proposed method extracts more discriminative features based on KLFDA for the decision fusion. Since the decision fusion employed in this paper can consider not only the detection results but also the visual features, by calculating more discriminative features via KLFDA, more accurate decision fusion becomes feasible. Furthermore, experimental results show the effectiveness of the proposed method.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128680791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398624
M. Ishihara, Taichi Miyazaki, Pujana Paliyawan, C. Chu, Tomohiro Harada, R. Thawonmas
This paper investigates AIs that increase their players' amount of exercise by encouraging the usage of various skills in fighting game FightingICE, recently used in a number of game AI competitions. Our research aim is to develop such AIs for promoting players' health with fighting games that use Kinect as the input interface. In our experiment, two types of AIs are used as the opponent against a human player. One of the AIs is based on the k-nearest neighbor algorithm and fuzzy control, and the other is based on UCT, a variation of Monte-Carlo Tree Search. Our results show that the players, participating in the experiment, use more different skills, thus demonstrating higher action entropy, when playing the game against the UCT AI.
{"title":"Investigating Kinect-based fighting game AIs that encourage their players to use various skills","authors":"M. Ishihara, Taichi Miyazaki, Pujana Paliyawan, C. Chu, Tomohiro Harada, R. Thawonmas","doi":"10.1109/GCCE.2015.7398624","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398624","url":null,"abstract":"This paper investigates AIs that increase their players' amount of exercise by encouraging the usage of various skills in fighting game FightingICE, recently used in a number of game AI competitions. Our research aim is to develop such AIs for promoting players' health with fighting games that use Kinect as the input interface. In our experiment, two types of AIs are used as the opponent against a human player. One of the AIs is based on the k-nearest neighbor algorithm and fuzzy control, and the other is based on UCT, a variation of Monte-Carlo Tree Search. Our results show that the players, participating in the experiment, use more different skills, thus demonstrating higher action entropy, when playing the game against the UCT AI.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398554
Shohei Ueno, Atsushi Kanai, S. Tanimoto, Hiroyuki Sato
The security level of conventional secure protocols is fixed after security environment negotiation. However, communications differ in confidentiality in accordance with their contents. For this reason, a conventional protocol that always keeps the security level constant throughout the whole session is considered to be more secure than necessary. Since transmission efficiency is generally improved by lowering the security level, transmission efficiency is sacrificed when a conventional secure protocol is used. In this study, the secure protocol that dynamically and optimally changes the security level is proposed to solve this problem. Specifically, a variable security level is achieved by using a secret sharing scheme and multiple channels. Furthermore, the proposed protocol is theoretically evaluated.
{"title":"Secure protocol with variable security level using secret sharing scheme","authors":"Shohei Ueno, Atsushi Kanai, S. Tanimoto, Hiroyuki Sato","doi":"10.1109/GCCE.2015.7398554","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398554","url":null,"abstract":"The security level of conventional secure protocols is fixed after security environment negotiation. However, communications differ in confidentiality in accordance with their contents. For this reason, a conventional protocol that always keeps the security level constant throughout the whole session is considered to be more secure than necessary. Since transmission efficiency is generally improved by lowering the security level, transmission efficiency is sacrificed when a conventional secure protocol is used. In this study, the secure protocol that dynamically and optimally changes the security level is proposed to solve this problem. Specifically, a variable security level is achieved by using a secret sharing scheme and multiple channels. Furthermore, the proposed protocol is theoretically evaluated.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}