Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113950
Veena N. Hegde, R. Deekshit, P. Satyanarayana
The electrocardiogram (ECG) is an important bioelectrical signal which gives valuable information about the functional aspects of the heart both in normal and abnormal conditions. For several decades a considerable amount of research activity has been directed towards advancement in the clinical diagnosing of this disease using surface ECG and symptoms. This paper compares different methods that have evolved over the years for elimination of different types of noise present in ECG and for characterizing ECG for the detection of myocardial ischemia and infarction which is a life threatening heart disease. The first part of the review gives broad overview of the research undergone in the area of denoising methods deployed and second part describes different types of ischemia and methods to detect the disease using ECG.
{"title":"Comparison of characterizing and data analysis methods for detecting abnormalities in ECG","authors":"Veena N. Hegde, R. Deekshit, P. Satyanarayana","doi":"10.1109/AHICI.2011.6113950","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113950","url":null,"abstract":"The electrocardiogram (ECG) is an important bioelectrical signal which gives valuable information about the functional aspects of the heart both in normal and abnormal conditions. For several decades a considerable amount of research activity has been directed towards advancement in the clinical diagnosing of this disease using surface ECG and symptoms. This paper compares different methods that have evolved over the years for elimination of different types of noise present in ECG and for characterizing ECG for the detection of myocardial ischemia and infarction which is a life threatening heart disease. The first part of the review gives broad overview of the research undergone in the area of denoising methods deployed and second part describes different types of ischemia and methods to detect the disease using ECG.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113926
C. Subash, M. Manohar, Nikita V. Patil, S. Shylaja, N. Parimala
Media streaming in mobile environments is becoming more and more important with the proliferation of 3G technologies and the popularity of online media services such as news clips, live sports, and movies. To avoid disconnection and/or service breakdown when the users keep moving, proper data management strategies must be taken by all parties. We propose a two-level framework and a set of new techniques for cooperative media streaming in mobile environments. Headlight prefetching is designed for the cooperation of streaming access points to deal with the uncertainty of client movement and the requirement of seamless service handoff. Dynamic chaining is for the cooperation among mobile users to maximize cache utilization and streaming benefit. On receiving a media segment request from a mobile client, the streaming access point starts a search for possible supplying partners before attempting to a remote media server
{"title":"Co-operative media streaming in mobile environments","authors":"C. Subash, M. Manohar, Nikita V. Patil, S. Shylaja, N. Parimala","doi":"10.1109/AHICI.2011.6113926","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113926","url":null,"abstract":"Media streaming in mobile environments is becoming more and more important with the proliferation of 3G technologies and the popularity of online media services such as news clips, live sports, and movies. To avoid disconnection and/or service breakdown when the users keep moving, proper data management strategies must be taken by all parties. We propose a two-level framework and a set of new techniques for cooperative media streaming in mobile environments. Headlight prefetching is designed for the cooperation of streaming access points to deal with the uncertainty of client movement and the requirement of seamless service handoff. Dynamic chaining is for the cooperation among mobile users to maximize cache utilization and streaming benefit. On receiving a media segment request from a mobile client, the streaming access point starts a search for possible supplying partners before attempting to a remote media server","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113928
Vinay Kumar
Session sidejacking is the term used to describe the theft of cookies used to authenticate the user to a web server. Session sidejacking attack is a form of session hijacking where the hacker uses packet sniffers to listen to the traffic between the client and server to steal the session cookie. Most of the websites use Hypertext Transfer Protocol Secure (HTTPS) only for Login purpose in order to protect the user name and password. However they revert back to Hypertext Transfer Protocol (HTTP) after this and all the cookies which are used to authenticate the user are sent to the server over an unsecure HTTP connection. Any hacker listening to this network using a packet sniffer can copy the cookies and use them to impersonate the victim and carry out activities on his behalf. Though the hacker won't know the password of the victim but he can still act on victim's behalf. A three tier session verification technique which is impervious to Session sidejacking is being proposed here. This technique allows the use of HTTP protocol and still protects the users from session sidejacking, however it assumes that the server uses a secure HTTPS connection for login purposes to avoid transmission of password in the clear. This technique uses a feature of Hyper Text Markup Language Version 5 (HTML5) called “local storage” to overcome the vulnerabilities of cookies and it foils any attempt to sidejack a session. This technique can be implemented using server side logic and client-side JavaScript.
{"title":"Three Tier Verification Technique to foil session sidejacking attempts","authors":"Vinay Kumar","doi":"10.1109/AHICI.2011.6113928","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113928","url":null,"abstract":"Session sidejacking is the term used to describe the theft of cookies used to authenticate the user to a web server. Session sidejacking attack is a form of session hijacking where the hacker uses packet sniffers to listen to the traffic between the client and server to steal the session cookie. Most of the websites use Hypertext Transfer Protocol Secure (HTTPS) only for Login purpose in order to protect the user name and password. However they revert back to Hypertext Transfer Protocol (HTTP) after this and all the cookies which are used to authenticate the user are sent to the server over an unsecure HTTP connection. Any hacker listening to this network using a packet sniffer can copy the cookies and use them to impersonate the victim and carry out activities on his behalf. Though the hacker won't know the password of the victim but he can still act on victim's behalf. A three tier session verification technique which is impervious to Session sidejacking is being proposed here. This technique allows the use of HTTP protocol and still protects the users from session sidejacking, however it assumes that the server uses a secure HTTPS connection for login purposes to avoid transmission of password in the clear. This technique uses a feature of Hyper Text Markup Language Version 5 (HTML5) called “local storage” to overcome the vulnerabilities of cookies and it foils any attempt to sidejack a session. This technique can be implemented using server side logic and client-side JavaScript.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113932
Subodh Paudel
This paper outlines the telecommunication network evolution from copper based technologies to fiber based next generation network (NGN). In addition, some practical issues are addressed, for instance migration from Time Division Multiplexing (TDM) network to Internet Protocol (IP) network, transformation from circuit switch network to packet switch network, and network design with under the NGN architecture. A case study of optical access network design and architecture at Nepal Telecom (NT) is done to perform the migration of TDM into NGN for the Fixed Wire-line Network.
{"title":"Migration of TDM network into NGN for the Fixed Wire-line access Network","authors":"Subodh Paudel","doi":"10.1109/AHICI.2011.6113932","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113932","url":null,"abstract":"This paper outlines the telecommunication network evolution from copper based technologies to fiber based next generation network (NGN). In addition, some practical issues are addressed, for instance migration from Time Division Multiplexing (TDM) network to Internet Protocol (IP) network, transformation from circuit switch network to packet switch network, and network design with under the NGN architecture. A case study of optical access network design and architecture at Nepal Telecom (NT) is done to perform the migration of TDM into NGN for the Fixed Wire-line Network.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113956
Chia-Yang Chiang, S. C. Jha, V. Bhargava
Since classical time-division-multiple-access based cooperative scheme suffers from lower data rate due to two time-slots based transmission approach, superposition modulation has recently gained huge research attention which enables single time-slot cooperative transmission. Therefore, in this paper we propose a novel superposition modulation based regenerate-and-forward cooperative transmission scheme with M-ary phase shift keying constellation signals. Closed-form expressions for average symbol error probability (SEP) and maximum power allocation for relay data are derived for proposed scheme. Simulation results show that proposed scheme outperforms classical cooperative scheme by providing higher spectral efficiency and lower SEP.
{"title":"A superposition modulation based cooperative transmission scheme in regenerate-and-forward relaying networks","authors":"Chia-Yang Chiang, S. C. Jha, V. Bhargava","doi":"10.1109/AHICI.2011.6113956","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113956","url":null,"abstract":"Since classical time-division-multiple-access based cooperative scheme suffers from lower data rate due to two time-slots based transmission approach, superposition modulation has recently gained huge research attention which enables single time-slot cooperative transmission. Therefore, in this paper we propose a novel superposition modulation based regenerate-and-forward cooperative transmission scheme with M-ary phase shift keying constellation signals. Closed-form expressions for average symbol error probability (SEP) and maximum power allocation for relay data are derived for proposed scheme. Simulation results show that proposed scheme outperforms classical cooperative scheme by providing higher spectral efficiency and lower SEP.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113947
S. Jagadish, R. Manivasakan
The key focus of our work is to analyse some jitter control algorithms. We study a jitter control algorithm proposed by Mansour et. al [1] for networks with guaranteed quality of service (QoS) from a competitive analysis point of view. The authors have analysed the proposed algorithm (on-line algorithm) and also compared its performance to the off-line algorithm. In this paper, the analysis of the on-line algorithm has been dealt with rigorously and relevant conditions have been derived. For delay jitter, we show that the on-line algorithm guarantees the same delay jitter as the off-line algorithm. Also, both the algorithms in their original forms are applicable only to a fixed number of packets. We extend the results to a more practical model in which we compare the off-line algorithm with n packets and the on-line algorithm with n1 (n1 > n) packets, arrival times for both the stream of packets being realised from the same statistical model. In this case, we show that there exists a expression for the ratio of buffer size needed in the off-line algorithm to the buffer size needed in the on-line algorithm, provided that the delay jitter in both the cases are equal.
{"title":"Analysis of jitter control algorithms in QoS networks","authors":"S. Jagadish, R. Manivasakan","doi":"10.1109/AHICI.2011.6113947","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113947","url":null,"abstract":"The key focus of our work is to analyse some jitter control algorithms. We study a jitter control algorithm proposed by Mansour et. al [1] for networks with guaranteed quality of service (QoS) from a competitive analysis point of view. The authors have analysed the proposed algorithm (on-line algorithm) and also compared its performance to the off-line algorithm. In this paper, the analysis of the on-line algorithm has been dealt with rigorously and relevant conditions have been derived. For delay jitter, we show that the on-line algorithm guarantees the same delay jitter as the off-line algorithm. Also, both the algorithms in their original forms are applicable only to a fixed number of packets. We extend the results to a more practical model in which we compare the off-line algorithm with n packets and the on-line algorithm with n1 (n1 > n) packets, arrival times for both the stream of packets being realised from the same statistical model. In this case, we show that there exists a expression for the ratio of buffer size needed in the off-line algorithm to the buffer size needed in the on-line algorithm, provided that the delay jitter in both the cases are equal.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130516300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113931
Donovan Gentles, S. Sankaranarayanan
Voting process in today's era is behind its time as it relates to the involvement of technology. The voting process is been fully manual and paper based. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were developed to resolve some of these issues like Electronic based voting that is been actively used for voting in countries like India and so. However these systems were still prone to electoral frauds and voters has to make tremendous effort in order to cast their ballots. With that said, there are a few very important areas which were identified that need to be addressed. These issues include Security which involve person be able to vote in secure manner, Time spent for voting by voters, Efficiency in counting of votes and Cost involved in employing manual people for voting. So taking the above into consideration we here have come with Biometric secured mobile voting technique that will address these issues. This is a novel technology and also first of its kind at present. Using fingerprint based biometric control information and encryption [1][2] along with SSL using VeriSign [3] would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. The mobile equipment that will be used for development of the system will be in the form of a smart phone using Android 3.0 (Honeycomb [4]. The details are presented in the paper.
{"title":"Biometric secured mobile voting","authors":"Donovan Gentles, S. Sankaranarayanan","doi":"10.1109/AHICI.2011.6113931","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113931","url":null,"abstract":"Voting process in today's era is behind its time as it relates to the involvement of technology. The voting process is been fully manual and paper based. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were developed to resolve some of these issues like Electronic based voting that is been actively used for voting in countries like India and so. However these systems were still prone to electoral frauds and voters has to make tremendous effort in order to cast their ballots. With that said, there are a few very important areas which were identified that need to be addressed. These issues include Security which involve person be able to vote in secure manner, Time spent for voting by voters, Efficiency in counting of votes and Cost involved in employing manual people for voting. So taking the above into consideration we here have come with Biometric secured mobile voting technique that will address these issues. This is a novel technology and also first of its kind at present. Using fingerprint based biometric control information and encryption [1][2] along with SSL using VeriSign [3] would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. The mobile equipment that will be used for development of the system will be in the form of a smart phone using Android 3.0 (Honeycomb [4]. The details are presented in the paper.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113942
H. Dhungana, S. Sah, Saroj Shakya, N. Pradhan
This paper is intended to provide knowledge of development of internet technologies in Nepal. It also depicts the current situation and facing challenges by our society and gives the future potential for supporting different aspects of social elements that can be beneficiated by use of internet. In the era of information super highway people around the world are making their lives more comfortable. This helps them in saving time and money and invoking improved service delivery. We the people of Nepal want our government to be more accountable more committed to people's right that's why we need e-Governance. The promise of e-Government is that it will be able to improve governance through citizen empowerment and participation, better delivery of government services, more efficient management, less corruption, more transparency, greater convenience, increased revenue, and reduced costs.
{"title":"Problems and prospects of internet in new e-Nepal","authors":"H. Dhungana, S. Sah, Saroj Shakya, N. Pradhan","doi":"10.1109/AHICI.2011.6113942","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113942","url":null,"abstract":"This paper is intended to provide knowledge of development of internet technologies in Nepal. It also depicts the current situation and facing challenges by our society and gives the future potential for supporting different aspects of social elements that can be beneficiated by use of internet. In the era of information super highway people around the world are making their lives more comfortable. This helps them in saving time and money and invoking improved service delivery. We the people of Nepal want our government to be more accountable more committed to people's right that's why we need e-Governance. The promise of e-Government is that it will be able to improve governance through citizen empowerment and participation, better delivery of government services, more efficient management, less corruption, more transparency, greater convenience, increased revenue, and reduced costs.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113941
Kyuhong Lee, Heesang Lee
Energy efficiency is a critical factor for operation of a wireless sensor network. In general, wireless sensor networks perform clustering and routing using localized neighbor information and simple rules only. In this paper, we propose an energy efficient clustering and routing method for wireless sensor networks by exploiting energy state information of neighbor sensor nodes for selection of cluster heads. We compared the performance of the proposed method with that of a well known clustering and routing protocol. Our computational experiments demonstrate that the lifetime and distribution of energy consumptions of the proposed method are better than those of the compared method.
{"title":"EECR: Energy efficient clustering and routing approach for wireless sensor networks","authors":"Kyuhong Lee, Heesang Lee","doi":"10.1109/AHICI.2011.6113941","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113941","url":null,"abstract":"Energy efficiency is a critical factor for operation of a wireless sensor network. In general, wireless sensor networks perform clustering and routing using localized neighbor information and simple rules only. In this paper, we propose an energy efficient clustering and routing method for wireless sensor networks by exploiting energy state information of neighbor sensor nodes for selection of cluster heads. We compared the performance of the proposed method with that of a well known clustering and routing protocol. Our computational experiments demonstrate that the lifetime and distribution of energy consumptions of the proposed method are better than those of the compared method.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-29DOI: 10.1109/AHICI.2011.6113951
S. Bhirud, V. Katkar
Heavily used intra-domain protocols (like IP, ARP) do not have protection mechanism against malicious activities by network clients. As a result IP and ARP spoofing are used by attackers to launch Man In The Middle (MITM), Denial of Service (DoS) and other attacks. These attacks are severe threats to the organizations. Detecting and preventing IP-ARP spoofing will enhance the security to great extent. This paper presents a simple and light-weight mechanism for detection and prevention of IP-ARP spoofing attacks. Experimental results are also provided to support the proposal.
{"title":"Light weight approach for IP-ARP spoofing detection and prevention","authors":"S. Bhirud, V. Katkar","doi":"10.1109/AHICI.2011.6113951","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113951","url":null,"abstract":"Heavily used intra-domain protocols (like IP, ARP) do not have protection mechanism against malicious activities by network clients. As a result IP and ARP spoofing are used by attackers to launch Man In The Middle (MITM), Denial of Service (DoS) and other attacks. These attacks are severe threats to the organizations. Detecting and preventing IP-ARP spoofing will enhance the security to great extent. This paper presents a simple and light-weight mechanism for detection and prevention of IP-ARP spoofing attacks. Experimental results are also provided to support the proposal.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121220600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}