Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409128
Dr Nikhil Kumar Marriwala, P. Rathee
A wireless sensor network consist of small devices, called sensor nodes that are equipped with sensors to monitor the physical and environmental conditions such as pressure, temperature, humidity, motion, speed etc. The nodes in the wireless sensor network were battery powered, so one of the important issues in wireless sensor network is the inherent limited battery power within network sensor nodes. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of sensor networks so if the power exhausted node would quit from the network, and it overall affect the network lifetime. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. In this paper there is improvement of lifetime of wireless sensor network in terms increasing alive nodes in network by using a different approach to select cluster head. The cluster head selection is based on the basis of maximum residual energy and minimum distance and chooses a optimal pat between the cluster heads to transmit to the base station.
{"title":"An approach to increase the wireless sensor network lifetime","authors":"Dr Nikhil Kumar Marriwala, P. Rathee","doi":"10.1109/WICT.2012.6409128","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409128","url":null,"abstract":"A wireless sensor network consist of small devices, called sensor nodes that are equipped with sensors to monitor the physical and environmental conditions such as pressure, temperature, humidity, motion, speed etc. The nodes in the wireless sensor network were battery powered, so one of the important issues in wireless sensor network is the inherent limited battery power within network sensor nodes. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of sensor networks so if the power exhausted node would quit from the network, and it overall affect the network lifetime. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. In this paper there is improvement of lifetime of wireless sensor network in terms increasing alive nodes in network by using a different approach to select cluster head. The cluster head selection is based on the basis of maximum residual energy and minimum distance and chooses a optimal pat between the cluster heads to transmit to the base station.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409225
Min Gu, Lixin Shen, Rui Gu, Bin Xu
Although there are some studies on chat log analysis, few focused on collaboration with clear boundary using IM (Instant Messaging) tool. This research captured a full chat log of a distributed collaboration work using popular IM software as the main communication medium. Then quantified analysis on the chat log was done with follow-up interviews to all participants. The comparison between count of messages sent and response intervals were classified by participants. Furthermore, the relation of response interval and message count was tested. The usage of emoticon was also counted and the implication was discussed. It is found that 99.95% of all IM messages contain less than 140 characters. Most of the participants reply within 24 seconds. The response interval has no signification correlation with the number of characters per message. Emoticon is an important part of IM that need further study.
{"title":"Collaboration using Instant Messaging tool: A chat log analysis","authors":"Min Gu, Lixin Shen, Rui Gu, Bin Xu","doi":"10.1109/WICT.2012.6409225","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409225","url":null,"abstract":"Although there are some studies on chat log analysis, few focused on collaboration with clear boundary using IM (Instant Messaging) tool. This research captured a full chat log of a distributed collaboration work using popular IM software as the main communication medium. Then quantified analysis on the chat log was done with follow-up interviews to all participants. The comparison between count of messages sent and response intervals were classified by participants. Furthermore, the relation of response interval and message count was tested. The usage of emoticon was also counted and the implication was discussed. It is found that 99.95% of all IM messages contain less than 140 characters. Most of the participants reply within 24 seconds. The response interval has no signification correlation with the number of characters per message. Emoticon is an important part of IM that need further study.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409115
S. Kolhe, Sudhir N. Dhage
Cloud Computing is the distributed architecture in which scalable resources are used to provide computing services to user using virtualization concept. Cloud requires virtual machine for accessing any guest operating system at local desktop, this is handled by software interface such as Virtual Machine Monitor (VMM) or hypervisor. This paper reveals not only its features architecture, working but also comparative analysis of Kernel Virtual Machine (KVM) and Xen using various benchmarking tools. Paper also explains test analysis of measuring CPU performance, network speed and disk access. From this analysis which hypervisor has to be used for the implementation of cloud computing system for getting better performance is decided.
{"title":"Comparative study on Virtual Machine Monitors for cloud","authors":"S. Kolhe, Sudhir N. Dhage","doi":"10.1109/WICT.2012.6409115","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409115","url":null,"abstract":"Cloud Computing is the distributed architecture in which scalable resources are used to provide computing services to user using virtualization concept. Cloud requires virtual machine for accessing any guest operating system at local desktop, this is handled by software interface such as Virtual Machine Monitor (VMM) or hypervisor. This paper reveals not only its features architecture, working but also comparative analysis of Kernel Virtual Machine (KVM) and Xen using various benchmarking tools. Paper also explains test analysis of measuring CPU performance, network speed and disk access. From this analysis which hypervisor has to be used for the implementation of cloud computing system for getting better performance is decided.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125264459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409240
S. H. Shafin, Li Zhang, Xi Xu
As Web Services becomes mature and popular, they are always integrated together, forming systems to carry out coherent tasks. The distributed application of Web Services involves many standard protocols and various runtime behaviors and thus makes the systems' automated testing more difficult. In this paper we propose a series of applicable automated testing methods for Web Services system. First, deduce abstract test cases from interaction requirement properties of Web Services system. Second, specify test cases according to SWRL (Semantic Web Rule Language) properties and abstract test cases. Finally, generate mutants under AOP (Aspect-Oriented Programming) technology support, drive them by specific test cases using improved Fit (Framework for Integrated Test), and then kill mutants based on business logic. Experiments have shown that our algorithms meet the applied demands and perform well as an automated testing tool for Web Services system.
{"title":"Automated testing of Web Services system based on OWL-S","authors":"S. H. Shafin, Li Zhang, Xi Xu","doi":"10.1109/WICT.2012.6409240","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409240","url":null,"abstract":"As Web Services becomes mature and popular, they are always integrated together, forming systems to carry out coherent tasks. The distributed application of Web Services involves many standard protocols and various runtime behaviors and thus makes the systems' automated testing more difficult. In this paper we propose a series of applicable automated testing methods for Web Services system. First, deduce abstract test cases from interaction requirement properties of Web Services system. Second, specify test cases according to SWRL (Semantic Web Rule Language) properties and abstract test cases. Finally, generate mutants under AOP (Aspect-Oriented Programming) technology support, drive them by specific test cases using improved Fit (Framework for Integrated Test), and then kill mutants based on business logic. Experiments have shown that our algorithms meet the applied demands and perform well as an automated testing tool for Web Services system.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409229
Jianping Zheng, Jing Gao
The statistical model is used for analysis of the characteristic over the stratospheric communication channel, the structure and algorithm of Turbo encoding and decoding in DVB - RCS are studied, the encoder and decoder over the stratospheric communication channel are established using Turbo coding in DVB - RCS. Numerical results show the effects of different interleaving depth and different interleaving length on the properties of channel, the channel capacity and different coding rates of Turbo code in Rayleigh fading using QPSK modulation are simulated too.
{"title":"Turbo coding in DVB — RCS standard over the stratospheric communication channel","authors":"Jianping Zheng, Jing Gao","doi":"10.1109/WICT.2012.6409229","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409229","url":null,"abstract":"The statistical model is used for analysis of the characteristic over the stratospheric communication channel, the structure and algorithm of Turbo encoding and decoding in DVB - RCS are studied, the encoder and decoder over the stratospheric communication channel are established using Turbo coding in DVB - RCS. Numerical results show the effects of different interleaving depth and different interleaving length on the properties of channel, the channel capacity and different coding rates of Turbo code in Rayleigh fading using QPSK modulation are simulated too.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409053
T. Arunprasath, M. Rajasekaran, S. Kannan, V. A. Kalasalingam
This paper addresses a nonlinear PET Brain image reconstruction based on a weighted least-square (WLS). In previous years, the analytical approach was used to reconstruct the Positron Emission Tomography (PET). This approach requires a minimization of a convex cost function and accompanied by many problems related to the computational complexity. The poles apart iteration methods are Conjugate Gradient (CG), Coordinate Descent (CD) and Image Space Reconstruction Algorithm (ISRA). It has many advantages compared to conventional approach. The functional protocol used here is CG iteration method. This statistical fashion can provide better and high PSNR along with lowest noise in the PET Brain image. An assortment of image quality parameters is considered to analyze the PET brain image in this algorithm. The PET brain image is constructed and simulated in MATLAB /Simulink package.
{"title":"Reconstruction of PET Brain image using Conjugate Gradient algorithm","authors":"T. Arunprasath, M. Rajasekaran, S. Kannan, V. A. Kalasalingam","doi":"10.1109/WICT.2012.6409053","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409053","url":null,"abstract":"This paper addresses a nonlinear PET Brain image reconstruction based on a weighted least-square (WLS). In previous years, the analytical approach was used to reconstruct the Positron Emission Tomography (PET). This approach requires a minimization of a convex cost function and accompanied by many problems related to the computational complexity. The poles apart iteration methods are Conjugate Gradient (CG), Coordinate Descent (CD) and Image Space Reconstruction Algorithm (ISRA). It has many advantages compared to conventional approach. The functional protocol used here is CG iteration method. This statistical fashion can provide better and high PSNR along with lowest noise in the PET Brain image. An assortment of image quality parameters is considered to analyze the PET brain image in this algorithm. The PET brain image is constructed and simulated in MATLAB /Simulink package.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409142
N. Ambika, G. Raju
Scarcity of security, increase in sneaking of information over a network. Wireless sensor network consists of hundreds to thousands of sensors deployed in hostile environment. As these networks are not presided over by any supervision, the security to the network is one of the elementary aspects. Due to lack of security, the nodes tend to get compromised by the adversaries. These nodes tend to attract the data towards itself and either modifies the data or denies forwarding it. This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes. The intensity of the transmission is scrutinized to discover the compromised node in the network. The detector in the cluster joins hands in scrutinizing the network. Based on these findings, encryption keys are generated. This approach secures nodes from Sybil attack by 34%, Wormhole attack by 27.8% and Sinkhole attack by 29.8%.
{"title":"MA WSN — Manifold authentication in wireless sensor network","authors":"N. Ambika, G. Raju","doi":"10.1109/WICT.2012.6409142","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409142","url":null,"abstract":"Scarcity of security, increase in sneaking of information over a network. Wireless sensor network consists of hundreds to thousands of sensors deployed in hostile environment. As these networks are not presided over by any supervision, the security to the network is one of the elementary aspects. Due to lack of security, the nodes tend to get compromised by the adversaries. These nodes tend to attract the data towards itself and either modifies the data or denies forwarding it. This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes. The intensity of the transmission is scrutinized to discover the compromised node in the network. The detector in the cluster joins hands in scrutinizing the network. Based on these findings, encryption keys are generated. This approach secures nodes from Sybil attack by 34%, Wormhole attack by 27.8% and Sinkhole attack by 29.8%.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123102433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409092
J. Hajgude, L. Ragha
Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing emails contains messages to lure victims into performing certain actions, such as clicking on a URL where a phishing website is hosted, or executing a malware code. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. URL and textual content analysis of email will results in a highly accurate anti phishing email classifier. We propose a technique where we consider the advantages of blacklist, white list and heuristic technique for increasing accuracy and reducing false positive rate. In heuristic technique we are using textual analysis and URL analysis of e-mail. Since most of the phishing mails have similar contents, our proposed method will increase the performance by analysing textual contents of mail and lexical URL analysis. It will detect phishing mail if DNS in actual link is present in blacklist. DNS is present in white list then it is considered as legitimate DNS. If it is not present in blacklist as well as white list then it is analyzed by using pattern matching with existing phishing DNS, contents found in mail and analysis of actual URL. With the help blacklist and white list we are avoiding detection time for phishing and legitimate email. At the same time we are decreasing false positive rate by combining features of DNS, textual content analysis of email and URL analysis.
{"title":"“Phish mail guard: Phishing mail detection technique by using textual and URL analysis”","authors":"J. Hajgude, L. Ragha","doi":"10.1109/WICT.2012.6409092","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409092","url":null,"abstract":"Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing emails contains messages to lure victims into performing certain actions, such as clicking on a URL where a phishing website is hosted, or executing a malware code. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. URL and textual content analysis of email will results in a highly accurate anti phishing email classifier. We propose a technique where we consider the advantages of blacklist, white list and heuristic technique for increasing accuracy and reducing false positive rate. In heuristic technique we are using textual analysis and URL analysis of e-mail. Since most of the phishing mails have similar contents, our proposed method will increase the performance by analysing textual contents of mail and lexical URL analysis. It will detect phishing mail if DNS in actual link is present in blacklist. DNS is present in white list then it is considered as legitimate DNS. If it is not present in blacklist as well as white list then it is analyzed by using pattern matching with existing phishing DNS, contents found in mail and analysis of actual URL. With the help blacklist and white list we are avoiding detection time for phishing and legitimate email. At the same time we are decreasing false positive rate by combining features of DNS, textual content analysis of email and URL analysis.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409124
M. Sangeetha, V. Bhaskar
In this paper, we consider the BER performance of chaotic modulation schemes in Single-Input-Multiple-Output (SIMO) Nakagami fading channels. In particular, we focus on a system that employs Differential chaos Shift keying (DCSK). We consider transceiver scheme which require no channel state information at either the transmitter or the receiver. A distinct chaotic sequence is used at the transmit antenna to spread the data symbols and transmits omni directionally. At each receive antenna, the corresponding differential detection statistics is performed and these statistics are combined with maximum ratio combining for symbol detection. Simulation results show that the proposed schemes can effectively exploit spatial diversity of the underlying SIMO system. The performance of the system is evaluated for both chaotic sequence and PN sequence in terms of Bit Error Rate (BER) for various space diversity levels and average SNRs. Also, the BER performance of these systems is evaluated for various spreading code lengths.
{"title":"PN codes Vs chaotic sequences: BER comparison perspective","authors":"M. Sangeetha, V. Bhaskar","doi":"10.1109/WICT.2012.6409124","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409124","url":null,"abstract":"In this paper, we consider the BER performance of chaotic modulation schemes in Single-Input-Multiple-Output (SIMO) Nakagami fading channels. In particular, we focus on a system that employs Differential chaos Shift keying (DCSK). We consider transceiver scheme which require no channel state information at either the transmitter or the receiver. A distinct chaotic sequence is used at the transmit antenna to spread the data symbols and transmits omni directionally. At each receive antenna, the corresponding differential detection statistics is performed and these statistics are combined with maximum ratio combining for symbol detection. Simulation results show that the proposed schemes can effectively exploit spatial diversity of the underlying SIMO system. The performance of the system is evaluated for both chaotic sequence and PN sequence in terms of Bit Error Rate (BER) for various space diversity levels and average SNRs. Also, the BER performance of these systems is evaluated for various spreading code lengths.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409088
B. S. Gouda, A. B. Mandai, K. Narayana
In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power. In order to utilize this energy equipped devices resourcefully for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two routing protocols like Ad-Hoc on Demand Distance Vector Protocol (AODV) and Destination Sequenced Distance Vector Routing Protocol (DSDV). The comparison results prove that AODV protocol can be adopted for any routing strategy, in order to increase the performance of the network lifetime in comparison with DSDV.
{"title":"Simulation and comparative analysis of energy conservation performance metric for ERAODV, AODV and DSDV routing protocols in MANET","authors":"B. S. Gouda, A. B. Mandai, K. Narayana","doi":"10.1109/WICT.2012.6409088","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409088","url":null,"abstract":"In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power. In order to utilize this energy equipped devices resourcefully for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two routing protocols like Ad-Hoc on Demand Distance Vector Protocol (AODV) and Destination Sequenced Distance Vector Routing Protocol (DSDV). The comparison results prove that AODV protocol can be adopted for any routing strategy, in order to increase the performance of the network lifetime in comparison with DSDV.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}