Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692096
Sweety Sharma, N. Mittal
Wireless sensor network (WSN) communication has gathered a lot of attention of research scholars due to its various features such as high wireless data transmission. A large number of techniques have been developed till now in order to achieve an energy efficient network. The clustering and cluster head selection is the major and difficult task to perform in a network. LEACH serves as a basic for rest of the energy efficient clustering protocols. This study considers the LEACH-Mobile Fuzzy (LEACH-MF) as base for developing the proposed work. Fuzzy Inference System (FIS) with LEACH along with threshold based data transmission concept is developed in this work. The major objective of this work is to utilize the allotted energy to sensor nodes in an effective way. The proposed model is parted in two forms i.e. Modified Parameter-LEACH-MF (MP-LEACH-MF) and Limited Communication-LEACH-MF (LC-LEACH-MF). LC-LEACH-MF is a reactive protocol whereas the former one is periodic. In order to assure the performance efficiency of the proposed work, the parameters such as Packet Delivery Ratio (PDR), Last Node Dead (LND), Half Node Dead (HND), First Node Dead (FND), Energy Consumption of the network are evaluated and along with this a comparison analysis has been done with traditional LEACH, LEACH–Mobile (LEACH-M), LEACH-MF. After analyzing the obtained results it is concluded that the LC-LEACH-MF outnumbers the rest of the traditional energy efficient clustering techniques.
无线传感器网络(WSN)通信以其无线数据传输能力强等特点受到了研究学者的广泛关注。为了实现高效节能的网络,迄今为止已经开发了大量的技术。聚类和簇头选择是网络中最主要也是最困难的任务。LEACH是其他节能聚类协议的基础。本研究将leach -移动模糊(LEACH-MF)作为开展所提出工作的基础。本文开发了基于LEACH的模糊推理系统(FIS)和基于阈值的数据传输概念。本工作的主要目的是有效地利用分配给传感器节点的能量。该模型分为两种形式,即修改参数-浸出- mf (MP-LEACH-MF)和有限通信-浸出- mf (LC-LEACH-MF)。LC-LEACH-MF是一种反应性协议,而LC-LEACH-MF是一种周期性协议。为了保证所提工作的性能效率,评估了网络的包传送率(PDR)、最后节点死亡(LND)、半节点死亡(HND)、第一节点死亡(FND)、网络能耗等参数,并与传统LEACH、LEACH- mobile (LEACH- m)、LEACH- mf进行了比较分析。通过对所得结果的分析,得出了LC-LEACH-MF优于其他传统的节能聚类技术的结论。
{"title":"An Improved LEACH-MF Protocol to Prolong Lifetime of Wireless Sensor Networks","authors":"Sweety Sharma, N. Mittal","doi":"10.1109/IADCC.2018.8692096","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692096","url":null,"abstract":"Wireless sensor network (WSN) communication has gathered a lot of attention of research scholars due to its various features such as high wireless data transmission. A large number of techniques have been developed till now in order to achieve an energy efficient network. The clustering and cluster head selection is the major and difficult task to perform in a network. LEACH serves as a basic for rest of the energy efficient clustering protocols. This study considers the LEACH-Mobile Fuzzy (LEACH-MF) as base for developing the proposed work. Fuzzy Inference System (FIS) with LEACH along with threshold based data transmission concept is developed in this work. The major objective of this work is to utilize the allotted energy to sensor nodes in an effective way. The proposed model is parted in two forms i.e. Modified Parameter-LEACH-MF (MP-LEACH-MF) and Limited Communication-LEACH-MF (LC-LEACH-MF). LC-LEACH-MF is a reactive protocol whereas the former one is periodic. In order to assure the performance efficiency of the proposed work, the parameters such as Packet Delivery Ratio (PDR), Last Node Dead (LND), Half Node Dead (HND), First Node Dead (FND), Energy Consumption of the network are evaluated and along with this a comparison analysis has been done with traditional LEACH, LEACH–Mobile (LEACH-M), LEACH-MF. After analyzing the obtained results it is concluded that the LC-LEACH-MF outnumbers the rest of the traditional energy efficient clustering techniques.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134213267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692127
Bharti Saneja, Rinkle Rani
IoT and big data technologies have embarked the modern data science. As nowadays lots of data have been generated from wireless sensors connected via a network. Detecting anomalous events in this large amount of data is the topic undergoing intense study among researchers. Most of the existing solutions for the detection of anomalous events in big data are based on machine learning models. The proposed technique is a hybrid approach to detect outliers in weather sensor data. The approach comprises of three phases. Initially, for handling big data efficiently, dimensionality reduction is performed in the first phase. In the second phase, the detection of anomalous events is done using multiple classifiers. Finally in the third phase, for final classification, the results of the different classifiers are combined. With the aid of the proposed approach, we can extract the meaningful information from a complex dataset. It can be perceived from the experimental results that the proposed approach outperforms the various state-of-the-art algorithms for outlier detection.
{"title":"A Hybrid Approach for Outlier Detection in Weather Sensor Data","authors":"Bharti Saneja, Rinkle Rani","doi":"10.1109/IADCC.2018.8692127","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692127","url":null,"abstract":"IoT and big data technologies have embarked the modern data science. As nowadays lots of data have been generated from wireless sensors connected via a network. Detecting anomalous events in this large amount of data is the topic undergoing intense study among researchers. Most of the existing solutions for the detection of anomalous events in big data are based on machine learning models. The proposed technique is a hybrid approach to detect outliers in weather sensor data. The approach comprises of three phases. Initially, for handling big data efficiently, dimensionality reduction is performed in the first phase. In the second phase, the detection of anomalous events is done using multiple classifiers. Finally in the third phase, for final classification, the results of the different classifiers are combined. With the aid of the proposed approach, we can extract the meaningful information from a complex dataset. It can be perceived from the experimental results that the proposed approach outperforms the various state-of-the-art algorithms for outlier detection.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692142
Priyanka Natrajan, Smruthi Rajmohan, S. Sundaram, S. Natarajan, R. Hebbar
Hyperspectral images (HSIs) are satellite images that provide spectral and spatial detail of a given region. This makes them uniquely suitable to classify objects in the scene. Classification of Hyperspectral images can be efficiently performed using the Convolutional Neural Network (CNN) in Machine Learning. In this research, a framework is proposed that leverages Transfer Learning and CNN to classify crop distributions of Horticulture Plantations. The Hyperspectral dataset consists of images and known labels, also known as groundtruth. However, some of the HSIs are unlabelled due to the lack of groundtruth available for the same. Hence, the proposed method adopts the Transfer Learning technique to overcome this. The model was trained on a publicly available and labelled hyperspectral dataset. This was then tested on the field samples of Chikkaballapur district of Karnataka, India which was provided by the Indian Space Research Organisation (ISRO). The CNN built leverages both the spectral and spatial correlations of the HSIs. Due to the amount of detail in HSIs, they are fed in as patches into the convolutional layers of the network. The diverse information provided by these images is exploited by deploying a three-dimensional kernel. This joint representation of both spectral and spatial information provides higher discriminating power, thus allowing a more accurate classification of the crop distributions in the field. The experimental results of this method prove that feeding images as patches trains the CNN better and applying Transfer Learning has a more generic and wider scope.
{"title":"A Transfer Learning based CNN approach for Classification of Horticulture plantations using Hyperspectral Images","authors":"Priyanka Natrajan, Smruthi Rajmohan, S. Sundaram, S. Natarajan, R. Hebbar","doi":"10.1109/IADCC.2018.8692142","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692142","url":null,"abstract":"Hyperspectral images (HSIs) are satellite images that provide spectral and spatial detail of a given region. This makes them uniquely suitable to classify objects in the scene. Classification of Hyperspectral images can be efficiently performed using the Convolutional Neural Network (CNN) in Machine Learning. In this research, a framework is proposed that leverages Transfer Learning and CNN to classify crop distributions of Horticulture Plantations. The Hyperspectral dataset consists of images and known labels, also known as groundtruth. However, some of the HSIs are unlabelled due to the lack of groundtruth available for the same. Hence, the proposed method adopts the Transfer Learning technique to overcome this. The model was trained on a publicly available and labelled hyperspectral dataset. This was then tested on the field samples of Chikkaballapur district of Karnataka, India which was provided by the Indian Space Research Organisation (ISRO). The CNN built leverages both the spectral and spatial correlations of the HSIs. Due to the amount of detail in HSIs, they are fed in as patches into the convolutional layers of the network. The diverse information provided by these images is exploited by deploying a three-dimensional kernel. This joint representation of both spectral and spatial information provides higher discriminating power, thus allowing a more accurate classification of the crop distributions in the field. The experimental results of this method prove that feeding images as patches trains the CNN better and applying Transfer Learning has a more generic and wider scope.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692099
Sai Sreekar Siddula, P. Jain, M. D. Upadhayay
Dams provide us with a wide range of social, economic, environmental benefits by helping us in controlling the flow of water, generating hydroelectric power, flood control, waste management, navigational purposes and act as habitats for aquatic life. India has progressed a lot in the construction of dams and water reservoirs after Independence and now we are among the best dam builders in the world. We have around 4300 dams in India and many more are already under the process of construction. But even today most of these dams use the conventional methods of dam management for controlling the dam gates and dam maintenance. In the current fast paced modern world where we are trying to automate all the processes around us, it’s high time that we revamp the management of our dams using Internet of Things. In this paper we have proposed and implemented a novel idea of automating the process of dam management from collecting the data of water level to control the dam gates. This idea will help us to streamline the control of dams throughout the country and reduce the manpower for dam maintenance.
{"title":"Real Time Monitoring and Controlling of Water Level in Dams using IoT","authors":"Sai Sreekar Siddula, P. Jain, M. D. Upadhayay","doi":"10.1109/IADCC.2018.8692099","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692099","url":null,"abstract":"Dams provide us with a wide range of social, economic, environmental benefits by helping us in controlling the flow of water, generating hydroelectric power, flood control, waste management, navigational purposes and act as habitats for aquatic life. India has progressed a lot in the construction of dams and water reservoirs after Independence and now we are among the best dam builders in the world. We have around 4300 dams in India and many more are already under the process of construction. But even today most of these dams use the conventional methods of dam management for controlling the dam gates and dam maintenance. In the current fast paced modern world where we are trying to automate all the processes around us, it’s high time that we revamp the management of our dams using Internet of Things. In this paper we have proposed and implemented a novel idea of automating the process of dam management from collecting the data of water level to control the dam gates. This idea will help us to streamline the control of dams throughout the country and reduce the manpower for dam maintenance.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692087
P. Das, C. Giri
Elliptic curve cryptography (ECC) is an emerging and efficient cryptography technique which can be applied in various fields of application such as sensor network, network security, authentication, signature verification and in the different applications of the internet of things (IOT). ECC is lightweight, efficient and more secure compare to any other public key cryptography. Different methods have been proposed in the literature to convert input message to elliptic curve point but all of them lack in security, scalability and computationally inefficient for large input size. So, a scalable and computationally efficient algorithm is highly required. In this paper, we propose two different algorithms for input message to elliptic curve point conversion which will reduce communication cost and computational cost of encryption and decryption. The experimental result also shows that the proposed algorithms give better performance and best suitable for large size input text compared to any other existing algorithms.
{"title":"An Efficient Method for text Encryption using Elliptic Curve Cryptography","authors":"P. Das, C. Giri","doi":"10.1109/IADCC.2018.8692087","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692087","url":null,"abstract":"Elliptic curve cryptography (ECC) is an emerging and efficient cryptography technique which can be applied in various fields of application such as sensor network, network security, authentication, signature verification and in the different applications of the internet of things (IOT). ECC is lightweight, efficient and more secure compare to any other public key cryptography. Different methods have been proposed in the literature to convert input message to elliptic curve point but all of them lack in security, scalability and computationally inefficient for large input size. So, a scalable and computationally efficient algorithm is highly required. In this paper, we propose two different algorithms for input message to elliptic curve point conversion which will reduce communication cost and computational cost of encryption and decryption. The experimental result also shows that the proposed algorithms give better performance and best suitable for large size input text compared to any other existing algorithms.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692109
Riti Kushwaha, N. Nain, Gaurav Singal
Person authentication using footprint is still an abandoned field even though it has physiological and behavioral both types of available features due to unavailibilty of dataset. To examine the credibility of footprint we have collected the footprint dataset. This dataset collection is done in 2 phases. 1) We have collected the 2 footprint samples of each foot from 110 persons and 2) We have collected the 5 footprint sample of each foot from 80 people. The paper scanner is used for the data collection and whole footprint is captured. The collected samples are taken at different orientations and position, sometimes scanner is not aligned and creates noise.To overcome these problem a footprint image requires extensive preprocessing. To make any image invariant to translation and rotation, we use Hu’s 7 moment invariant features. It can efficiently check that an input image belongs to a particular person or not even after translation, scaling and rotation. The probability of translation and scaling is very less in footprint, but slight rotation in foot image is noticeable, which could result in different geometry features for same person. This technique is not suitable for the authentication but it can surely reduce the sample space by rejecting the samples. If the difference of 3rd order moment invariant value of two samples is more then the decided threshold, then samples surely does not belong to the same person. This reduced sample size could be used further in authentication. It reduces the time complexity and computation cost. We tested it on 1320 images with the FMR of 4.52% and FNMR of 5.18%. It leads us to the conclusion that 3rd order of moment is enough to make any image rotation invariant.
{"title":"MIRA : Moment Invariability Analysis of Footprint Features","authors":"Riti Kushwaha, N. Nain, Gaurav Singal","doi":"10.1109/IADCC.2018.8692109","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692109","url":null,"abstract":"Person authentication using footprint is still an abandoned field even though it has physiological and behavioral both types of available features due to unavailibilty of dataset. To examine the credibility of footprint we have collected the footprint dataset. This dataset collection is done in 2 phases. 1) We have collected the 2 footprint samples of each foot from 110 persons and 2) We have collected the 5 footprint sample of each foot from 80 people. The paper scanner is used for the data collection and whole footprint is captured. The collected samples are taken at different orientations and position, sometimes scanner is not aligned and creates noise.To overcome these problem a footprint image requires extensive preprocessing. To make any image invariant to translation and rotation, we use Hu’s 7 moment invariant features. It can efficiently check that an input image belongs to a particular person or not even after translation, scaling and rotation. The probability of translation and scaling is very less in footprint, but slight rotation in foot image is noticeable, which could result in different geometry features for same person. This technique is not suitable for the authentication but it can surely reduce the sample space by rejecting the samples. If the difference of 3rd order moment invariant value of two samples is more then the decided threshold, then samples surely does not belong to the same person. This reduced sample size could be used further in authentication. It reduces the time complexity and computation cost. We tested it on 1320 images with the FMR of 4.52% and FNMR of 5.18%. It leads us to the conclusion that 3rd order of moment is enough to make any image rotation invariant.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IADCC.2018.8692114
Shefali Arora, M. Bhatia
Biometric systems are playing an important role in identifying a person, thus contributing to global security. There are many possible biometrics, for example height, DNA, handwriting etc., but computer vision based biometrics have found an important place in the domain of human identification. Computer vision based biometrics include identification of face, fingerprints, iris etc. and using their abilities to create efficient authentication systems. In this paper, we work on a dataset [1] of iris images and make use of deep learning to identify and verify the iris of a person. Hyperparameter tuning for deep networks and optimization techniques have been taken into account in this system. The proposed system is trained using a combination of Convolutional Neural Networks and Softmax classifier to extract features from localized regions of the input iris images. This is followed by classification into one out of 224 classes of the dataset. From the results, we conclude that the choice of hyperparameters and optimizers affects the efficiency of our proposed system. Our proposed approach outperforms existing approaches by attaining a high accuracy of 98 percent.
{"title":"A Computer Vision System for Iris Recognition Based on Deep Learning","authors":"Shefali Arora, M. Bhatia","doi":"10.1109/IADCC.2018.8692114","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692114","url":null,"abstract":"Biometric systems are playing an important role in identifying a person, thus contributing to global security. There are many possible biometrics, for example height, DNA, handwriting etc., but computer vision based biometrics have found an important place in the domain of human identification. Computer vision based biometrics include identification of face, fingerprints, iris etc. and using their abilities to create efficient authentication systems. In this paper, we work on a dataset [1] of iris images and make use of deep learning to identify and verify the iris of a person. Hyperparameter tuning for deep networks and optimization techniques have been taken into account in this system. The proposed system is trained using a combination of Convolutional Neural Networks and Softmax classifier to extract features from localized regions of the input iris images. This is followed by classification into one out of 224 classes of the dataset. From the results, we conclude that the choice of hyperparameters and optimizers affects the efficiency of our proposed system. Our proposed approach outperforms existing approaches by attaining a high accuracy of 98 percent.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CIMCA.2018.8739721
S. Shankar, R. Suresh, Viswanath Talasila, Vinay Sridhar
Rapid advancement in the development of Internet of Things (IoT) based smart wearable devices has motivated us to develop a device which can monitor the performance and analyze the shooting form of basketball players remotely. In this paper, we present the design of a system that can measure and analyze in real time, the free throw shooting action of a professional basketball player. A new heuristic tool has also been developed to analyse every phase of the shooting action to segment out an ideal shooting action of individual players. The developed tool is proven to be more efficient than the conventional k-map clustering approach.
{"title":"Performance measurement and analysis of shooting form of basketball players using a wearable IoT system","authors":"S. Shankar, R. Suresh, Viswanath Talasila, Vinay Sridhar","doi":"10.1109/CIMCA.2018.8739721","DOIUrl":"https://doi.org/10.1109/CIMCA.2018.8739721","url":null,"abstract":"Rapid advancement in the development of Internet of Things (IoT) based smart wearable devices has motivated us to develop a device which can monitor the performance and analyze the shooting form of basketball players remotely. In this paper, we present the design of a system that can measure and analyze in real time, the free throw shooting action of a professional basketball player. A new heuristic tool has also been developed to analyse every phase of the shooting action to segment out an ideal shooting action of individual players. The developed tool is proven to be more efficient than the conventional k-map clustering approach.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}