Pub Date : 2012-10-31DOI: 10.5121/IJCSES.2012.3502
B. Sheta
The UAV industry is growing rapidly in an attempt to serve both military and commercial applications. A crucial aspect in the development of UAVs is the reduction of navigational sensor costs while maintaining accurate navigation. Advances in visual sensor solutions with traditional navigation sensors are proving to be significantly promising in replacing traditional IMU or GPS systems for many mission scenarios.
{"title":"Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV","authors":"B. Sheta","doi":"10.5121/IJCSES.2012.3502","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3502","url":null,"abstract":"The UAV industry is growing rapidly in an attempt to serve both military and commercial applications. A crucial aspect in the development of UAVs is the reduction of navigational sensor costs while maintaining accurate navigation. Advances in visual sensor solutions with traditional navigation sensors are proving to be significantly promising in replacing traditional IMU or GPS systems for many mission scenarios.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-31DOI: 10.5121/IJCSES.2012.3501
Muhammad Shahin Uddin, Nargis Aktar, Y. Jang
Recently Light Emitting Diodes (LEDs) are considered to represent the next generation of lighting and communication technology. LED-ID (Light Emitting Diode – Identification) is one of the key technologies for identification, data transmission and illumination simultaneously. This is the new paradigm in the identification technology environment. LED-ID system typically needs line of sight (LOS) to support narrow FOV transceivers links to achieve high data rate but reduced the coverage, increase the disconnection rate of the link. Also when the receiver moves horizontally or vertically, in that case coverage also varied and LOS relies upon direct link between transmitter and receiver. Link recovery is a new challenge for reliable LED-ID system. Fast link recovery techniques are essential for the making the system robust. In this paper we discuss about the horizontal and vertical coverage variation in terms of received power and fast link recovery technique for the LED-ID system considering both LOS and NLOS reflection.
{"title":"LED-ID SYSTEM : COVERAGE AND FAST LINK RECOVERY TECHNIQUE","authors":"Muhammad Shahin Uddin, Nargis Aktar, Y. Jang","doi":"10.5121/IJCSES.2012.3501","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3501","url":null,"abstract":"Recently Light Emitting Diodes (LEDs) are considered to represent the next generation of lighting and communication technology. LED-ID (Light Emitting Diode – Identification) is one of the key technologies for identification, data transmission and illumination simultaneously. This is the new paradigm in the identification technology environment. LED-ID system typically needs line of sight (LOS) to support narrow FOV transceivers links to achieve high data rate but reduced the coverage, increase the disconnection rate of the link. Also when the receiver moves horizontally or vertically, in that case coverage also varied and LOS relies upon direct link between transmitter and receiver. Link recovery is a new challenge for reliable LED-ID system. Fast link recovery techniques are essential for the making the system robust. In this paper we discuss about the horizontal and vertical coverage variation in terms of received power and fast link recovery technique for the LED-ID system considering both LOS and NLOS reflection.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-31DOI: 10.5121/IJCSES.2012.3504
M. Debbarma, S. K. Sen, Sudipta Roy, Guru Nānak
In ad hoc network, each node is equipped with a wireless transmitter and receiver (transceiver) that is powered by a battery. Two nodes willing to communicate with each other need to be either in the direct common range of each other or should be helped by other nodes to act as routers forwarding their packets. A node in a Mobile Ad hoc Network (MANET) acts as dual role of a host and a router as well. Designing routing algorithm for MANET is a difficult job compared to designing routing algorithm for wired networks. The important challenges in routing in MANET are due to same intrinsic characteristic of MANET, like limited battery power, highly dynamic nature of network topology, limited bandwidth, asymmetric links, scalability, mobility of nodes etc. In this paper, we analyzed DVR based routing protocols aiming to find suitable path through special neighbours between hops in MANET. This paper classified various routing protocols based on DVR for MANET and compared on the characteristics (routing metrics), performance and complexity.
{"title":"DVR-BASED MANET ROUTING PROTOCOLS TAXONOMY","authors":"M. Debbarma, S. K. Sen, Sudipta Roy, Guru Nānak","doi":"10.5121/IJCSES.2012.3504","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3504","url":null,"abstract":"In ad hoc network, each node is equipped with a wireless transmitter and receiver (transceiver) that is powered by a battery. Two nodes willing to communicate with each other need to be either in the direct common range of each other or should be helped by other nodes to act as routers forwarding their packets. A node in a Mobile Ad hoc Network (MANET) acts as dual role of a host and a router as well. Designing routing algorithm for MANET is a difficult job compared to designing routing algorithm for wired networks. The important challenges in routing in MANET are due to same intrinsic characteristic of MANET, like limited battery power, highly dynamic nature of network topology, limited bandwidth, asymmetric links, scalability, mobility of nodes etc. In this paper, we analyzed DVR based routing protocols aiming to find suitable path through special neighbours between hops in MANET. This paper classified various routing protocols based on DVR for MANET and compared on the characteristics (routing metrics), performance and complexity.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3401
M. Elhabiby, A. Elsharkawy, N. El-Sheimy
Edge detection is an important assignment in image processing, as it is used as a primary tool for pattern recognition, image segmentation and scene analysis. Simply put, an edge detector is a high-pass filter that can be applied for extracting the edge points within an image. Edge detection in the spatial domain is accomplished through convolution with a set of directional derivative masks in this domain. On one hand, the popular edge detection spatial operators such as; Roberts, Sobel, Prewitt, and Laplacian are all defined on a 3 by 3 pattern grid, which is efficient and easy to apply. On the other hand, working in the frequency domain has many advantages, starting from introducing an alternative description to the spatial representation and providing more efficient and faster computational schemes with less sensitivity to noise through high filtering, de-noising and compression algorithms. Fourier transforms, wavelet and curvelet transform are among the most widely used frequency-domain edge detection from satellite images. However, the Fourier transform is global and poorly adapted to local singularities. Some of these draw backs are solved by the wavelet transforms especially for singularities detection and computation. In this paper, the relatively new multi-resolution technique, curvelet transform, is assessed and introduced to overcome the wavelet transform limitation in directionality and scaling. In this research paper, the assessment of second generation curvelet transforms as an edge detection tool will be introduced and compared to traditional edge detectors such as wavelet transform and Canny Edge detector. Second generation curvelet transform provides optimally sparse representations of objects, which display smoothness except for discontinuity along the curve with bounded curvature. Preliminary results show the power of curvelet transform over the wavelet transform through the detection of nonvertical oriented edges, with detailed detection of curves and circular boundaries, such as non straight roads and shores. Conclusions and recommendations are given with respect to the suitability; accuracy and efficiency of the curvelet transform method compared to the other traditional methods
{"title":"Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data","authors":"M. Elhabiby, A. Elsharkawy, N. El-Sheimy","doi":"10.5121/IJCSES.2012.3401","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3401","url":null,"abstract":"Edge detection is an important assignment in image processing, as it is used as a primary tool for pattern recognition, image segmentation and scene analysis. Simply put, an edge detector is a high-pass filter that can be applied for extracting the edge points within an image. Edge detection in the spatial domain is accomplished through convolution with a set of directional derivative masks in this domain. On one hand, the popular edge detection spatial operators such as; Roberts, Sobel, Prewitt, and Laplacian are all defined on a 3 by 3 pattern grid, which is efficient and easy to apply. On the other hand, working in the frequency domain has many advantages, starting from introducing an alternative description to the spatial representation and providing more efficient and faster computational schemes with less sensitivity to noise through high filtering, de-noising and compression algorithms. Fourier transforms, wavelet and curvelet transform are among the most widely used frequency-domain edge detection from satellite images. However, the Fourier transform is global and poorly adapted to local singularities. Some of these draw backs are solved by the wavelet transforms especially for singularities detection and computation. In this paper, the relatively new multi-resolution technique, curvelet transform, is assessed and introduced to overcome the wavelet transform limitation in directionality and scaling. In this research paper, the assessment of second generation curvelet transforms as an edge detection tool will be introduced and compared to traditional edge detectors such as wavelet transform and Canny Edge detector. Second generation curvelet transform provides optimally sparse representations of objects, which display smoothness except for discontinuity along the curve with bounded curvature. Preliminary results show the power of curvelet transform over the wavelet transform through the detection of nonvertical oriented edges, with detailed detection of curves and circular boundaries, such as non straight roads and shores. Conclusions and recommendations are given with respect to the suitability; accuracy and efficiency of the curvelet transform method compared to the other traditional methods","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3402
Hossein Jadidoleslamy
One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding to occurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and tracking prevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.
{"title":"Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems","authors":"Hossein Jadidoleslamy","doi":"10.5121/IJCSES.2012.3402","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3402","url":null,"abstract":"One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding to occurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and tracking prevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3404
Poonam Tanwar, T. V. Prasad, K. Datta
Knowledge representation (KR) and inference mechanism are most desirable thing to make the system intelligent. System is known to an intelligent if its intelligence is equivalent to the intelligence of human being for a particular domain or general. Because of incomplete ambiguous and uncertain information the task of making intelligent system is very difficult. The objective of this paper is to present the hybrid KR technique for making the system effective & Optimistic. The requirement for (effective & optimistic) is because the system must be able to reply the answer with a confidence of some factor. This paper also presents the comparison between various hybrid KR techniques with the proposed one.
{"title":"HYBRID TECHNIQUE FOR KNOWLEDGE REPRESENTATION & A COMPARATIVE STUDY","authors":"Poonam Tanwar, T. V. Prasad, K. Datta","doi":"10.5121/IJCSES.2012.3404","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3404","url":null,"abstract":"Knowledge representation (KR) and inference mechanism are most desirable thing to make the system intelligent. System is known to an intelligent if its intelligence is equivalent to the intelligence of human being for a particular domain or general. Because of incomplete ambiguous and uncertain information the task of making intelligent system is very difficult. The objective of this paper is to present the hybrid KR technique for making the system effective & Optimistic. The requirement for (effective & optimistic) is because the system must be able to reply the answer with a confidence of some factor. This paper also presents the comparison between various hybrid KR techniques with the proposed one.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3408
K. Ramya, K. Kumar, V. Rao
Target Tracking as it moves through a sensor network has become an increasingly important application in Wireless Sensor Networks. This paper examines some of the target tracking techniques in use today. An analysis of each technique is presented along with it advantages, problems and possible improvements. There are seven main categories explored in this paper. The survey promotes overview of recent research literature along with their performance comparison and evaluation.
{"title":"A Survey on Target Tracking Techniques in Wireless Sensor Networks","authors":"K. Ramya, K. Kumar, V. Rao","doi":"10.5121/IJCSES.2012.3408","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3408","url":null,"abstract":"Target Tracking as it moves through a sensor network has become an increasingly important application in Wireless Sensor Networks. This paper examines some of the target tracking techniques in use today. An analysis of each technique is presented along with it advantages, problems and possible improvements. There are seven main categories explored in this paper. The survey promotes overview of recent research literature along with their performance comparison and evaluation.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3407
Kishwar Sadaf, Mansaf Alam
The ever-increasing information on the web with its heterogeneity and dynamism needs an information retrieval system which serves searcher’s ambiguous, ill-formed, short queries with relevant result in a precise way. Web search result clustering has been emerged as a method which overcomes these drawbacks of conventional information retrieval (IR) systems. It is the clustering of results returned by the search engines into meaningful, thematic groups. This paper gives a succinct overview and categorizes various techniques that have been used in clustering of web search results.
{"title":"WEB SEARCH RESULT CLUSTERING - A REVIEW","authors":"Kishwar Sadaf, Mansaf Alam","doi":"10.5121/IJCSES.2012.3407","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3407","url":null,"abstract":"The ever-increasing information on the web with its heterogeneity and dynamism needs an information retrieval system which serves searcher’s ambiguous, ill-formed, short queries with relevant result in a precise way. Web search result clustering has been emerged as a method which overcomes these drawbacks of conventional information retrieval (IR) systems. It is the clustering of results returned by the search engines into meaningful, thematic groups. This paper gives a succinct overview and categorizes various techniques that have been used in clustering of web search results.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3406
D. Koundal, Savita Gupta, Sukhwinder Singh
Diagnostic imaging is an important tool in medical science due to the constrained observations of the expert and uncertainties in medical knowledge. A thyroid ultrasound is a non-invasive imaging study used to detect and classify abnormalities of the thyroid gland. Computerized system is a valuable and beneficial means for feature extraction and classification of thyroid nodule in order to eliminate operator dependency and to improve the diagnostic accuracy. The aim of this paper is to review existing approaches to the automatic classification of nodules in thyroid ultrasound images, highlighting the keypoints and main differences between the used strategies. The aim of this paper is to review existing approaches for the diagnosis of Nodules in thyroid ultrasound images with their performance measures.
{"title":"Computer-Aided Diagnosis of Thyroid Nodule: A Review","authors":"D. Koundal, Savita Gupta, Sukhwinder Singh","doi":"10.5121/IJCSES.2012.3406","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3406","url":null,"abstract":"Diagnostic imaging is an important tool in medical science due to the constrained observations of the expert and uncertainties in medical knowledge. A thyroid ultrasound is a non-invasive imaging study used to detect and classify abnormalities of the thyroid gland. Computerized system is a valuable and beneficial means for feature extraction and classification of thyroid nodule in order to eliminate operator dependency and to improve the diagnostic accuracy. The aim of this paper is to review existing approaches to the automatic classification of nodules in thyroid ultrasound images, highlighting the keypoints and main differences between the used strategies. The aim of this paper is to review existing approaches for the diagnosis of Nodules in thyroid ultrasound images with their performance measures.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-31DOI: 10.5121/IJCSES.2012.3403
T. Santhanam
Text Extraction plays a major role in finding vital and valuable information. Text extraction involves detection, localization, tracking, binarization, extraction, enhancement and recognition of the text from the given image. These text characters are difficult to be detected and recognized due to their deviation of size, font, style, orientation, alignment, contrast, complex colored, textured background. Due to rapid growth of available multimedia documents and growing requirement for information, identification, indexing and retrieval, many researches have been done on text extraction in images.Several techniques have been developed for extracting the text from an image. The proposed methods were based on morphological operators, wavelet transform, artificial neural network,skeletonization operation,edge detection algorithm, histogram technique etc. All these techniques have their benefits and restrictions. This article discusses various schemes proposed earlier for extracting the text from an image. This paper also provides the performance comparison of several existing methods proposed by researchers in extracting the text from an image.
{"title":"A SURVEY ON VARIOUS APPROACHES OF TEXT EXTRACTION IN IMAGES","authors":"T. Santhanam","doi":"10.5121/IJCSES.2012.3403","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3403","url":null,"abstract":"Text Extraction plays a major role in finding vital and valuable information. Text extraction involves detection, localization, tracking, binarization, extraction, enhancement and recognition of the text from the given image. These text characters are difficult to be detected and recognized due to their deviation of size, font, style, orientation, alignment, contrast, complex colored, textured background. Due to rapid growth of available multimedia documents and growing requirement for information, identification, indexing and retrieval, many researches have been done on text extraction in images.Several techniques have been developed for extracting the text from an image. The proposed methods were based on morphological operators, wavelet transform, artificial neural network,skeletonization operation,edge detection algorithm, histogram technique etc. All these techniques have their benefits and restrictions. This article discusses various schemes proposed earlier for extracting the text from an image. This paper also provides the performance comparison of several existing methods proposed by researchers in extracting the text from an image.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}