Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824983
A. Farooqi, Syed Imtiyaz Hassan, M. A. Alam
Designing a sustainable society is a key concern of the United Nations’ 2030 Sustainable Development Goals. Sustainable fog computing is the most prominent solution for most problems occurring in cloud data centers, such as latency, security, carbon footprint, electricity consumption and so on. It is an extended design of cloud computing that supports horizontal computing paradigm providing cloud-like services at the edge of user premises. After emerging IoT fog computing has become the first choice of time sensitive applications due to its residing closer to the devices and sensors. In this paper we have introduced fog computing and differentiated it from cloud, furthermore, we have discussed how we can achieve sustainability through fog in several applications areas. Also, we have presented some existing challenges of fog paradigm. Moreover, we have reviewed some existing work about fog computing.
{"title":"Sustainability and Fog Computing: Applications, Advantages and Challenges","authors":"A. Farooqi, Syed Imtiyaz Hassan, M. A. Alam","doi":"10.1109/ICCCT2.2019.8824983","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824983","url":null,"abstract":"Designing a sustainable society is a key concern of the United Nations’ 2030 Sustainable Development Goals. Sustainable fog computing is the most prominent solution for most problems occurring in cloud data centers, such as latency, security, carbon footprint, electricity consumption and so on. It is an extended design of cloud computing that supports horizontal computing paradigm providing cloud-like services at the edge of user premises. After emerging IoT fog computing has become the first choice of time sensitive applications due to its residing closer to the devices and sensors. In this paper we have introduced fog computing and differentiated it from cloud, furthermore, we have discussed how we can achieve sustainability through fog in several applications areas. Also, we have presented some existing challenges of fog paradigm. Moreover, we have reviewed some existing work about fog computing.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114073156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824798
Deva Priya Isravel, S. Silas, E. Rajsingh
Today’s networks provide a plethora of applications with heterogeneous characteristics. The network generates a huge volume of traffic because of its distributed nature and requires preferential treatment for controlling them. The existing traditional system lacks efficiency because of the diverse nature of the network and the need for the high-performance network is imminent. However, one of the predominant issues that demand high attention is traffic flow management. This paper explores the various traffic management approaches and analyses the significant role played by the next hop neighbor node selection in improving the performance of the network. To address this issue, the emerging software defined networking paradigm (SDN) is introduced to enable flexible traffic flow control. A novel method for traffic flow management by adopting the Simple Multi-Attribute Rating Technique (SMART) ranking method has been proposed for selecting the best next hop neighbor for forwarding the flows. A flow scheduling algorithm has been adopted for minimizing the maximum link utilization and provide improved performance. Simulation result shows that the proposed algorithm performs better in terms of throughput and latency.
{"title":"Preferential Multi-Attribute Rank based Forwarding Node Selection in Software Defined Networks","authors":"Deva Priya Isravel, S. Silas, E. Rajsingh","doi":"10.1109/ICCCT2.2019.8824798","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824798","url":null,"abstract":"Today’s networks provide a plethora of applications with heterogeneous characteristics. The network generates a huge volume of traffic because of its distributed nature and requires preferential treatment for controlling them. The existing traditional system lacks efficiency because of the diverse nature of the network and the need for the high-performance network is imminent. However, one of the predominant issues that demand high attention is traffic flow management. This paper explores the various traffic management approaches and analyses the significant role played by the next hop neighbor node selection in improving the performance of the network. To address this issue, the emerging software defined networking paradigm (SDN) is introduced to enable flexible traffic flow control. A novel method for traffic flow management by adopting the Simple Multi-Attribute Rating Technique (SMART) ranking method has been proposed for selecting the best next hop neighbor for forwarding the flows. A flow scheduling algorithm has been adopted for minimizing the maximum link utilization and provide improved performance. Simulation result shows that the proposed algorithm performs better in terms of throughput and latency.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824988
D. Prabakaran, R. Shyamala
In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.
{"title":"A Review On Performance Of Voice Feature Extraction Techniques","authors":"D. Prabakaran, R. Shyamala","doi":"10.1109/ICCCT2.2019.8824988","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824988","url":null,"abstract":"In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824949
K. Anitha, V. Saraswathy, K. Gayathri, S. Priya
Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.
{"title":"An Approach To Comment Analysis In Online Social Media","authors":"K. Anitha, V. Saraswathy, K. Gayathri, S. Priya","doi":"10.1109/ICCCT2.2019.8824949","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824949","url":null,"abstract":"Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824831
Bharath Ravi Prakash, S. S. Kulkarni
There is always a need for improvement in the scope of technology used in our daily life. This paper consists of one such aspect that mainly concentrates on location updates of user. This is made possible by using the concept of Fused location API. The Location APIs theoretical path points of interest in the area innovations, Fused Location Provider is utilized for obtaining area data with as decreased power use as could be expected under the circumstances and action acknowledgment for enabling applications to adjust to the present activity of the Client.One advantage of using Fused Location is the ability to connect friends even if they are from different locations at different periods of time.The main concept was to design and develop an application which helps to keep track of friends. The proposed application is able to gather information of the phone’s GPS locations from the phone and present the information in a simple and convenient way.
{"title":"Navigation Technology to meet new people using Fused Location API","authors":"Bharath Ravi Prakash, S. S. Kulkarni","doi":"10.1109/ICCCT2.2019.8824831","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824831","url":null,"abstract":"There is always a need for improvement in the scope of technology used in our daily life. This paper consists of one such aspect that mainly concentrates on location updates of user. This is made possible by using the concept of Fused location API. The Location APIs theoretical path points of interest in the area innovations, Fused Location Provider is utilized for obtaining area data with as decreased power use as could be expected under the circumstances and action acknowledgment for enabling applications to adjust to the present activity of the Client.One advantage of using Fused Location is the ability to connect friends even if they are from different locations at different periods of time.The main concept was to design and develop an application which helps to keep track of friends. The proposed application is able to gather information of the phone’s GPS locations from the phone and present the information in a simple and convenient way.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133090780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824857
S. Subha, S. Priya
In the domain of E-learning, hundreds of dimensions can be taken and predictions can be made based on the browsing history of the users. Nowadays, web-based learning becomes an alternate to face to face education and E-learning becomes an effective tool in the learning process. E-Learning paves way for the learners to interact with the digitally delivered content and services. It focuses on making the learners to become more interested and efficient in their study process. This paper aims at designing strategies that will improvise the structure, assessment criteria and course completion rate in an e-learning environment. To achieve this aim, the following sub-objectives have been framed. The first objective is to provide a well-defined structure of the course whereas the second objective focuses on designing an e-learning system with specific assessment criteria. The third objective aims at achieving high completion rates for the registered students. By framing a defined structure, various assessment criteria can be fixed and calculated for a given student data set. Finally the active participation of enrolled candidates can be examined frequently. Machine Learning algorithms can be used efficiently in order to handle data in large amount.
{"title":"A Model For Enhancing The Structure And Strategy In An E-Learning Environment","authors":"S. Subha, S. Priya","doi":"10.1109/ICCCT2.2019.8824857","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824857","url":null,"abstract":"In the domain of E-learning, hundreds of dimensions can be taken and predictions can be made based on the browsing history of the users. Nowadays, web-based learning becomes an alternate to face to face education and E-learning becomes an effective tool in the learning process. E-Learning paves way for the learners to interact with the digitally delivered content and services. It focuses on making the learners to become more interested and efficient in their study process. This paper aims at designing strategies that will improvise the structure, assessment criteria and course completion rate in an e-learning environment. To achieve this aim, the following sub-objectives have been framed. The first objective is to provide a well-defined structure of the course whereas the second objective focuses on designing an e-learning system with specific assessment criteria. The third objective aims at achieving high completion rates for the registered students. By framing a defined structure, various assessment criteria can be fixed and calculated for a given student data set. Finally the active participation of enrolled candidates can be examined frequently. Machine Learning algorithms can be used efficiently in order to handle data in large amount.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824813
Sugandha Bhatia, J. Malhotra
The technology of cloud computing has been growing at an enormous speed. It is considered as one of the most prominent area of research in computer engineering and information technology. Cloud computing provides platforms, software, virtual machine, security and analytical services on the basis of pay as per usage policy. Hence, it furnishes economic advantage to cloud computing users and service providers. This new paradigm of information technology is very useful, even then, the privacy, security and forensic issues are the primary obstacles in the growth of cloud computing systems. It is need of the hour that cloud architecture should support and compatible with tools or techniques of digital forensics. Therefore, in this research paper an architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services.
{"title":"Forensic Based Cloud Computing Architecture – Exploration and Implementation","authors":"Sugandha Bhatia, J. Malhotra","doi":"10.1109/ICCCT2.2019.8824813","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824813","url":null,"abstract":"The technology of cloud computing has been growing at an enormous speed. It is considered as one of the most prominent area of research in computer engineering and information technology. Cloud computing provides platforms, software, virtual machine, security and analytical services on the basis of pay as per usage policy. Hence, it furnishes economic advantage to cloud computing users and service providers. This new paradigm of information technology is very useful, even then, the privacy, security and forensic issues are the primary obstacles in the growth of cloud computing systems. It is need of the hour that cloud architecture should support and compatible with tools or techniques of digital forensics. Therefore, in this research paper an architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114641771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824848
M. Parthasarathy, R. Aniruth, M. SureshKumar
Power transmission is one of the vital process in distribution of power in the widespread power supplying system. Even though various measures have been taken to discover a new consistent material with minimal power loss there are other ways to save and prevent loss of power and current by modifying the production and usage system in a sophisticated and efficient manner. There is a statistical need to collect the data in order to modify the system to distribute the generated power in a efficient way.The overall losses that we are facing according to the data collected by world bank the quantity of loss is aggregated near 8.25% all over the world. After conducting essential research and survey on the loses that we are facing during transmission and usage we have come up with a proposal that provides a initiative to develop a more efficient solution regarding this problem using IoT, Database, Machine learning, Embedded Systems and Sensor Components.
{"title":"Power Efficiency and Automation Based on IoT","authors":"M. Parthasarathy, R. Aniruth, M. SureshKumar","doi":"10.1109/ICCCT2.2019.8824848","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824848","url":null,"abstract":"Power transmission is one of the vital process in distribution of power in the widespread power supplying system. Even though various measures have been taken to discover a new consistent material with minimal power loss there are other ways to save and prevent loss of power and current by modifying the production and usage system in a sophisticated and efficient manner. There is a statistical need to collect the data in order to modify the system to distribute the generated power in a efficient way.The overall losses that we are facing according to the data collected by world bank the quantity of loss is aggregated near 8.25% all over the world. After conducting essential research and survey on the loses that we are facing during transmission and usage we have come up with a proposal that provides a initiative to develop a more efficient solution regarding this problem using IoT, Database, Machine learning, Embedded Systems and Sensor Components.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124957635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824913
C. L. Krishna, P. V. Reddy
The amount of data being stored in various repositories has been growing rapidly. In order to uncover hidden information from such data, there is a need for information extraction techniques. This resulted in the use of Data Mining and Machine Learning tasks such as Classification. One among the industries producing huge number of records on a daily basis is the Healthcare system. Data associated with medical field deal with the diagnosis of patients, higher accuracy in decision making is expected. In this work, we deal with the analysis of Cleveland Heart Disease data which contains 303 instances of patients records. Four classifiers are applied on the processed data to measure the accuracy of classification. Our results show that Deep Neural Net MLP classifier is able to diagnose the status of a patient with more accuracy.
{"title":"An Efficient Deep Neural Network Multilayer Perceptron Based Classifier in Healthcare System","authors":"C. L. Krishna, P. V. Reddy","doi":"10.1109/ICCCT2.2019.8824913","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824913","url":null,"abstract":"The amount of data being stored in various repositories has been growing rapidly. In order to uncover hidden information from such data, there is a need for information extraction techniques. This resulted in the use of Data Mining and Machine Learning tasks such as Classification. One among the industries producing huge number of records on a daily basis is the Healthcare system. Data associated with medical field deal with the diagnosis of patients, higher accuracy in decision making is expected. In this work, we deal with the analysis of Cleveland Heart Disease data which contains 303 instances of patients records. Four classifiers are applied on the processed data to measure the accuracy of classification. Our results show that Deep Neural Net MLP classifier is able to diagnose the status of a patient with more accuracy.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824873
M. Kiranmayi, N. Maheswari, M. Sivagami
Social Network is one of the most desired platform where an immense amount of data are available from many different social platforms. Publishing data without hiding sensitive data or diplomatic data about individuals is a crucial problem which cannot guarantees the privacy. Therefore published data needs to remove identifying particulars of the individuals (anonymized) before the data is released. Anonymizing data is more challenging and a popular privacy preserving model for data publishing in social networks. However even after anonymizing the data sets, attackers try to find new methods to derive private information of individuals with some background knowledge and identify them. One of such method is attribute couplet attack where the attacker has some background information about the data and derive the identity using a pair of node attributes. In the existing approach, the k-couplet anonymity achieves the privacy under the attribute couplet attack by using edge modification approach. This will change the distance properties between nodes and might also introduce undesirable and misleading fake relations. In this paper, we design an algorithm named Couplet Anonymization by using node addition approach. Adding new nodes and connecting them to some of the nodes in the original network can avoid this attribute couplet attack and gives a better chance to preserve the network properties. This node addition helps to reduce the misleading fake relations and also preserves the utility of the social networks.
{"title":"Preservation of Attribute Couplet Attack by Node Addition in Social Networks","authors":"M. Kiranmayi, N. Maheswari, M. Sivagami","doi":"10.1109/ICCCT2.2019.8824873","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824873","url":null,"abstract":"Social Network is one of the most desired platform where an immense amount of data are available from many different social platforms. Publishing data without hiding sensitive data or diplomatic data about individuals is a crucial problem which cannot guarantees the privacy. Therefore published data needs to remove identifying particulars of the individuals (anonymized) before the data is released. Anonymizing data is more challenging and a popular privacy preserving model for data publishing in social networks. However even after anonymizing the data sets, attackers try to find new methods to derive private information of individuals with some background knowledge and identify them. One of such method is attribute couplet attack where the attacker has some background information about the data and derive the identity using a pair of node attributes. In the existing approach, the k-couplet anonymity achieves the privacy under the attribute couplet attack by using edge modification approach. This will change the distance properties between nodes and might also introduce undesirable and misleading fake relations. In this paper, we design an algorithm named Couplet Anonymization by using node addition approach. Adding new nodes and connecting them to some of the nodes in the original network can avoid this attribute couplet attack and gives a better chance to preserve the network properties. This node addition helps to reduce the misleading fake relations and also preserves the utility of the social networks.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}