The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.
{"title":"Wireless Underground Sensor Network for Monitoring Various Fields Using Magnetic Induction","authors":"P. Manigandan, C. Balaji, M. Ramanan, S. Ragul","doi":"10.3233/apc210297","DOIUrl":"https://doi.org/10.3233/apc210297","url":null,"abstract":"The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan
The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology
{"title":"Deployment of Computer Assisted Instruction in Higher Educational Organization","authors":"N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan","doi":"10.3233/apc210229","DOIUrl":"https://doi.org/10.3233/apc210229","url":null,"abstract":"The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.
{"title":"Restoring and Enhancing Degraded Underwater Pipelines for Identifying and Detecting Corrosion","authors":"Vaibhav A. Parjane, Mohit Gangwar","doi":"10.3233/apc210249","DOIUrl":"https://doi.org/10.3233/apc210249","url":null,"abstract":"Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Lakshmi Narayanan, R. Niranjana, E. Francy Irudaya Rani, N. Subbulakshmi, R. Santhana Krishnan
Brain tumour detection is an evergreen topic to attract attention in the examination field of Information Technology innovation with biomedical designing, in view of the gigantic need of proficient and viable strategy for assessment of enormous measure of information. Image segmentation is considered as one of the most vital systems for visualizing tissues in an individual. To robotize image segmentation, we have proposed a calculation to get global optimal thresholding esteem for a specific brain MRI image, utilizing OTSU+Sauvola binarization strategy. The fundamental reason for feature collection is to diminish the quantity of structures utilized in classification while keeping up satisfactory classification exactness. One of the most extra-customary procedures applied for feature extraction is Discrete Wavelet Transform (DWT). Adequately it anticipates the estimation space on a plane to such an extent that the fluctuation of the information is ideally protected. We propose a justifiable model for brain tumours discovery and classification i.e., to classify whether the tumour is benign or malignant, utilizing SVM classification. SVM utilized here deals with basic hazard minimization to group the images for the tumour extraction, and a Graphical User Interface is created for the tumour classification operation, using the MATLAB platform.
{"title":"Powerful and Novel Tumour Detection in Brain MRI Images Employing Hybrid Computational Techniques","authors":"K. Lakshmi Narayanan, R. Niranjana, E. Francy Irudaya Rani, N. Subbulakshmi, R. Santhana Krishnan","doi":"10.3233/apc210279","DOIUrl":"https://doi.org/10.3233/apc210279","url":null,"abstract":"Brain tumour detection is an evergreen topic to attract attention in the examination field of Information Technology innovation with biomedical designing, in view of the gigantic need of proficient and viable strategy for assessment of enormous measure of information. Image segmentation is considered as one of the most vital systems for visualizing tissues in an individual. To robotize image segmentation, we have proposed a calculation to get global optimal thresholding esteem for a specific brain MRI image, utilizing OTSU+Sauvola binarization strategy. The fundamental reason for feature collection is to diminish the quantity of structures utilized in classification while keeping up satisfactory classification exactness. One of the most extra-customary procedures applied for feature extraction is Discrete Wavelet Transform (DWT). Adequately it anticipates the estimation space on a plane to such an extent that the fluctuation of the information is ideally protected. We propose a justifiable model for brain tumours discovery and classification i.e., to classify whether the tumour is benign or malignant, utilizing SVM classification. SVM utilized here deals with basic hazard minimization to group the images for the tumour extraction, and a Graphical User Interface is created for the tumour classification operation, using the MATLAB platform.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126836656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adnan Telwala, Ayush Pratap, Ketan Gaikwad, Tushar Chaudhari, S. Bhingarkar
Numerous online business sites empower the customers to create a product reviews along with feedback in the shape of ratings. This gives the organization work force a sign about their items’ remaining on the lookout, while likewise empowering individual customer to frame an assessment and help buy an item. As of late, Sentiment Analysis (SA) has gotten quite possibly interesting due to the potential business advantages of text analysis. One of the most important problems in confronting SA is the manner by which to remove feelings in the assessment, as well as how to identify counterfeit good reviews and negative surveys derived from assessment surveys. Besides, the assessment surveys acquired from clients can divided into two categories: positive and negative, which can be utilized by a shopper to choose an item. In this survey, we have thoroughly discussed about fake review detection of products as well as product rating by different SA techniques. Further, we have discussed the research direction in fake review detection and product rating.
{"title":"A Survey on Different Techniques for Product Fake Review Detection and Product Rating","authors":"Adnan Telwala, Ayush Pratap, Ketan Gaikwad, Tushar Chaudhari, S. Bhingarkar","doi":"10.3233/apc210207","DOIUrl":"https://doi.org/10.3233/apc210207","url":null,"abstract":"Numerous online business sites empower the customers to create a product reviews along with feedback in the shape of ratings. This gives the organization work force a sign about their items’ remaining on the lookout, while likewise empowering individual customer to frame an assessment and help buy an item. As of late, Sentiment Analysis (SA) has gotten quite possibly interesting due to the potential business advantages of text analysis. One of the most important problems in confronting SA is the manner by which to remove feelings in the assessment, as well as how to identify counterfeit good reviews and negative surveys derived from assessment surveys. Besides, the assessment surveys acquired from clients can divided into two categories: positive and negative, which can be utilized by a shopper to choose an item. In this survey, we have thoroughly discussed about fake review detection of products as well as product rating by different SA techniques. Further, we have discussed the research direction in fake review detection and product rating.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121756221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya
The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.
{"title":"Real Time Tracing and Alerting System for Vehicles and Children to Ensure Safety and Security Using Labview","authors":"Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya","doi":"10.3233/apc210177","DOIUrl":"https://doi.org/10.3233/apc210177","url":null,"abstract":"The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Prathipa, M. Premkumar, M. Arun, S. Sathiya Priya
Handheld mobile devices are a dime a dozen in the industry, thanks to rapid technological advancements. However, none of the algorithms currently available on the market can remove reflections in a hand-held camera system in real time. Our Algorithm is intended to mitigate this loop as it is designed especially for smart phones, we’re taking two photos of the same goal here. One shot will be taken with the flashlight turned OFF, while the other will be taken with the flash turned ON. After that, we’ll perform a simple pre-processing phase called aligning the image, which involves extracting features. We will eventually get the final desired picture of good quality after all the planned operations are completed.
{"title":"Removal of Specular Reflection on Handheld Camera Devices","authors":"R. Prathipa, M. Premkumar, M. Arun, S. Sathiya Priya","doi":"10.3233/apc210276","DOIUrl":"https://doi.org/10.3233/apc210276","url":null,"abstract":"Handheld mobile devices are a dime a dozen in the industry, thanks to rapid technological advancements. However, none of the algorithms currently available on the market can remove reflections in a hand-held camera system in real time. Our Algorithm is intended to mitigate this loop as it is designed especially for smart phones, we’re taking two photos of the same goal here. One shot will be taken with the flashlight turned OFF, while the other will be taken with the flash turned ON. After that, we’ll perform a simple pre-processing phase called aligning the image, which involves extracting features. We will eventually get the final desired picture of good quality after all the planned operations are completed.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Reji, Bhavadharani N, Shridhar.B, K. Chaitra Sri
In this paper, various optically controlled switch performances are studied and analysed. Different types of optically controlled materials are considered in this paper to control the electrical frequency with a modified and simpler structure. Roger and Fr-4 materials are used as substrate material for the basic system design with the dielectric constant of 3.0 and 4.4 respectively. Materials like silicon, germanium, graphene, and polymers are considered for analysis in the proposed system and the semiconductor metals are etched in the middle of the copper strip. The thickness of the copper is 0.008 mm with the standard conductivity of 5.814e7 S/m and the length and width of the copper strip are 2.54x2.54mm. A Copper strip is printed on the substrate to test the performance of the switches. The operating frequency of the given optical signal of silicon is around 1GHz to 25GHz, graphene is around 1GHz to 30GHz, germanium is around1GHz to 30GHz and polymer is around 1GHz to25GHz. The S11 parameter of all the proposed systems is analysed by sonnet simulation software.
{"title":"Optical Switch Performance for Electronic Applications","authors":"V. Reji, Bhavadharani N, Shridhar.B, K. Chaitra Sri","doi":"10.3233/apc210284","DOIUrl":"https://doi.org/10.3233/apc210284","url":null,"abstract":"In this paper, various optically controlled switch performances are studied and analysed. Different types of optically controlled materials are considered in this paper to control the electrical frequency with a modified and simpler structure. Roger and Fr-4 materials are used as substrate material for the basic system design with the dielectric constant of 3.0 and 4.4 respectively. Materials like silicon, germanium, graphene, and polymers are considered for analysis in the proposed system and the semiconductor metals are etched in the middle of the copper strip. The thickness of the copper is 0.008 mm with the standard conductivity of 5.814e7 S/m and the length and width of the copper strip are 2.54x2.54mm. A Copper strip is printed on the substrate to test the performance of the switches. The operating frequency of the given optical signal of silicon is around 1GHz to 25GHz, graphene is around 1GHz to 30GHz, germanium is around1GHz to 30GHz and polymer is around 1GHz to25GHz. The S11 parameter of all the proposed systems is analysed by sonnet simulation software.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131614145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string
{"title":"Identification of Fake Video Using Smart Contracts and SHA Algorithm","authors":"SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav","doi":"10.3233/apc210227","DOIUrl":"https://doi.org/10.3233/apc210227","url":null,"abstract":"Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent spread of the COVID-19 has pushed us to a situation to reduce human contacts in crowded areas. The main objective of this work is to protect the audience from the spread of contagious and non-contagious diseases or infections by introducing automation in maintenance and management of sport stadiums. Taking some primary precautions such as social distancing, wearing masks, avoiding crowded areas, cleaning hands, and checking the temperature is very important. This work provides primary check-ups for the audience to pass through, to ensure that no symptomatic person is let inside the stadium. Social distancing is properly maintained using ultrasonic sensors placed inside the stadium, so that nobody sits over the sensor attached seats. To ensure the maintenance of audience data, tickets are being replaced with RFID tags and checking is done automatically through RFID readers. The information is stored and maintained automatically in the server through IoT.
{"title":"Sports Ground Audience Health Monitoring System [For COVID-19] Using Smart Wireless Sensor Network","authors":"Dharshini V, Aiswarya S, Ashwin R, Usha A","doi":"10.3233/apc210295","DOIUrl":"https://doi.org/10.3233/apc210295","url":null,"abstract":"The recent spread of the COVID-19 has pushed us to a situation to reduce human contacts in crowded areas. The main objective of this work is to protect the audience from the spread of contagious and non-contagious diseases or infections by introducing automation in maintenance and management of sport stadiums. Taking some primary precautions such as social distancing, wearing masks, avoiding crowded areas, cleaning hands, and checking the temperature is very important. This work provides primary check-ups for the audience to pass through, to ensure that no symptomatic person is let inside the stadium. Social distancing is properly maintained using ultrasonic sensors placed inside the stadium, so that nobody sits over the sensor attached seats. To ensure the maintenance of audience data, tickets are being replaced with RFID tags and checking is done automatically through RFID readers. The information is stored and maintained automatically in the server through IoT.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}