Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726639
V. Krishna, A. Monisha, S. Sadulla, J. Prathiba
This paper describes the design and implementation of an automatic beverages vending machine using FSM as this technique has more advantages compared to previous ones used in vending machine design. The whole design is functionally verified using Xilinx ISE simulator 13.1 and the generated bit stream file has implemented in Virtex 5 XC5VLX50T FPGA board and its physical design has performed using Cadence Encounter and evaluated its optimized parameters.
{"title":"Design and implementation of an automatic beverages vending machine and its performance evaluation using Xilinx ISE and Cadence","authors":"V. Krishna, A. Monisha, S. Sadulla, J. Prathiba","doi":"10.1109/ICCCNT.2013.6726639","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726639","url":null,"abstract":"This paper describes the design and implementation of an automatic beverages vending machine using FSM as this technique has more advantages compared to previous ones used in vending machine design. The whole design is functionally verified using Xilinx ISE simulator 13.1 and the generated bit stream file has implemented in Virtex 5 XC5VLX50T FPGA board and its physical design has performed using Cadence Encounter and evaluated its optimized parameters.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90261617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726476
Nitin Patel, N. Patel
Manufacturing processes are extremely complex, inducing manufacturers to consider testability as a requirement to assure the reliability and the functionality of each of their designed circuits. One of the most popular test techniques is called Built-In-Self-Test (BIST). A Universal Asynchronous Receive/Transmit (UART) with BIST capability has the objectives of testing the UART on chip itself and no external devices are required to perform the test. This paper focuses on the VHDL implementation of UART with embedded BIST capability using FPGA technology. The paper presents the architecture of UART with BILBO which tests the UART for its correctability. The whole design is synthesized and verified using Xilinx ISE Simulator and Modelsim Simulator.
{"title":"VHDL implementation of UART with BIST capability","authors":"Nitin Patel, N. Patel","doi":"10.1109/ICCCNT.2013.6726476","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726476","url":null,"abstract":"Manufacturing processes are extremely complex, inducing manufacturers to consider testability as a requirement to assure the reliability and the functionality of each of their designed circuits. One of the most popular test techniques is called Built-In-Self-Test (BIST). A Universal Asynchronous Receive/Transmit (UART) with BIST capability has the objectives of testing the UART on chip itself and no external devices are required to perform the test. This paper focuses on the VHDL implementation of UART with embedded BIST capability using FPGA technology. The paper presents the architecture of UART with BILBO which tests the UART for its correctability. The whole design is synthesized and verified using Xilinx ISE Simulator and Modelsim Simulator.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"74 5 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85944407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726836
Nimmy James, Able Eldhose, D. Das Krishna
Powerline Communication is found to be one of the cheapest and easiest communication techniques and electronic companies are looking forward for its applications in home automation, automatic energy reading, broadband etc. In this paper, we propose a new architecture for a PLC modem, which is cost efficient and easy to implement. This paper discusses low voltage narrowband powerline communication for PLC Modem. The proposed PLC modem design transmit and receive data for application such as controlling home equipments, meter reading etc. Proposed PLC modem uses CSMA/CA for error detection and collision.
{"title":"PLC modem for home automation over three phase powerline","authors":"Nimmy James, Able Eldhose, D. Das Krishna","doi":"10.1109/ICCCNT.2013.6726836","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726836","url":null,"abstract":"Powerline Communication is found to be one of the cheapest and easiest communication techniques and electronic companies are looking forward for its applications in home automation, automatic energy reading, broadband etc. In this paper, we propose a new architecture for a PLC modem, which is cost efficient and easy to implement. This paper discusses low voltage narrowband powerline communication for PLC Modem. The proposed PLC modem design transmit and receive data for application such as controlling home equipments, meter reading etc. Proposed PLC modem uses CSMA/CA for error detection and collision.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"115 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86032666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726541
Tukaram Gawali, R. B. Wagh
Spatial database is a database that is optimized to store and query data. In order to process spatial database a set of functions are needed to process spatial data types called geometry or feature. These set of function are designed by spatial database query framework called Open Geospatial Consortium (OGC). In this paper we have designed Open Geospatial Consortium that will process spatial and non-spatial queries. Open Geospatial Consortium will have simple features specification and set of standards for adding spatial functionality to database systems. The main purpose of this framework is to adapt SQL queries and provide the best result among the available techniques of spatial query processing. The experimental result shows that our framework can process spatial and non-spatial queries with optimal cost. The performance of the queries is measured in the terms of Estimated CPU Cost, Estimated Subtree Cost, Estimated Number of Rows, Estimated Rows Size and Cached plan size.
{"title":"Smooth query processing in spatial database","authors":"Tukaram Gawali, R. B. Wagh","doi":"10.1109/ICCCNT.2013.6726541","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726541","url":null,"abstract":"Spatial database is a database that is optimized to store and query data. In order to process spatial database a set of functions are needed to process spatial data types called geometry or feature. These set of function are designed by spatial database query framework called Open Geospatial Consortium (OGC). In this paper we have designed Open Geospatial Consortium that will process spatial and non-spatial queries. Open Geospatial Consortium will have simple features specification and set of standards for adding spatial functionality to database systems. The main purpose of this framework is to adapt SQL queries and provide the best result among the available techniques of spatial query processing. The experimental result shows that our framework can process spatial and non-spatial queries with optimal cost. The performance of the queries is measured in the terms of Estimated CPU Cost, Estimated Subtree Cost, Estimated Number of Rows, Estimated Rows Size and Cached plan size.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84728519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726809
Divya Kamboj, Wankui Liu, Neetika Gupta
Augmented reality is a widespread concept having application ranging from medicine to entertainment and education. AR faces many challenges like camera tracking, occlusion handling and inconsistent illumination. Real time illumination of virtual objects in dynamic environment is still a challenging task. Various methods have been proposed for real time rendering of virtual objects in real environment. The illumination techniques range over a number of different methods producing results of varied accuracy. In this paper we will discuss about the various illumination methods in augmented reality, the shortcomings and advantages of different technologies and the classification of different methods. The paper discusses about the problem the current techniques are facing and various scope of improvement in future. The classification suggests the applicability of different techniques in different scenarios and also best utilization of data available with better techniques.
{"title":"A review on illumination techniques in augmented reality","authors":"Divya Kamboj, Wankui Liu, Neetika Gupta","doi":"10.1109/ICCCNT.2013.6726809","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726809","url":null,"abstract":"Augmented reality is a widespread concept having application ranging from medicine to entertainment and education. AR faces many challenges like camera tracking, occlusion handling and inconsistent illumination. Real time illumination of virtual objects in dynamic environment is still a challenging task. Various methods have been proposed for real time rendering of virtual objects in real environment. The illumination techniques range over a number of different methods producing results of varied accuracy. In this paper we will discuss about the various illumination methods in augmented reality, the shortcomings and advantages of different technologies and the classification of different methods. The paper discusses about the problem the current techniques are facing and various scope of improvement in future. The classification suggests the applicability of different techniques in different scenarios and also best utilization of data available with better techniques.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"158 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90804578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726626
M. Kavitha, Shrikant S. Tangade, S. Manvi
Vehicular Ad-hoc Network (VANET) is a sub disciple of Mobile Ad-Hoc Networks. VANET provides wireless communication among vehicles and vehicle to road side equipments. The communication between vehicles is used for safety, comfort and entertainment (convenience). The performance of communication depends on how better the routing takes place in the network. Routing of data depends on the routing protocols being used in network. The life saving factor is also the key issue in this regard. Trust is key part of security and it is undoubtedly necessary to develop trust in vehicular network. Distributed trust management in VANET is a challenging task due to the lack of infrastructure, openness of wireless links and the usually highly dynamic network topology. In this paper, we have studied special characteristics of VANETs, existing trust management schemes, and proposed a distributed trust management strategy which helps in evaluation of time by the vehicle that would like to know whether he can trust the vehicle that broadcast the message.
{"title":"Distributed trust & time management strategy in VANETs","authors":"M. Kavitha, Shrikant S. Tangade, S. Manvi","doi":"10.1109/ICCCNT.2013.6726626","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726626","url":null,"abstract":"Vehicular Ad-hoc Network (VANET) is a sub disciple of Mobile Ad-Hoc Networks. VANET provides wireless communication among vehicles and vehicle to road side equipments. The communication between vehicles is used for safety, comfort and entertainment (convenience). The performance of communication depends on how better the routing takes place in the network. Routing of data depends on the routing protocols being used in network. The life saving factor is also the key issue in this regard. Trust is key part of security and it is undoubtedly necessary to develop trust in vehicular network. Distributed trust management in VANET is a challenging task due to the lack of infrastructure, openness of wireless links and the usually highly dynamic network topology. In this paper, we have studied special characteristics of VANETs, existing trust management schemes, and proposed a distributed trust management strategy which helps in evaluation of time by the vehicle that would like to know whether he can trust the vehicle that broadcast the message.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"49 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90920202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726695
C. Abilash, B. Lakshminath
This paper mainly concentrates on the control of Lunar-bots and is also applicable to other kinds of robots like the one used in warfare, medical surgeries, and even the one that is used for UAV automation using the world wide accessed internet communication with Earth Moon Communication (EMC). This paper discusses the unique way in which we can control the robot deployed in the Moon for space research using EMC (Earth Moon Communication) technique and all other robots located anywhere in the world with the help of a simple webpage loaded with controls. Here a particular webpage is created over the internet whose administrator privileges are restricted to the authority. The robot in which this system is implemented also has access to the webpage, but is read only. The input to the webpage is designed by using simple LabVIEW programs interfacing sophisticated piezoelectric, tactile sensors and other sensor systems to provide gesture, speech, and image inputs. This LabVIEW program is then sourced to an administrative website. The robot is already programmed in such a way that it is able to understand and synchronize with these commands uniquely. The robot which is permanently connected to the internet with the help of wireless modem (3G/4G), can read these commands with ease. This control is extended to the moon by deploying EMC, developed from the existing ancient Moon Bounce technique. This is accomplished by replacing the Moon's rugged reflector surface by a parabolic reflector antenna. Two similar antennas are placed on diametrically opposite zones of Earth in order to maintain the path of sight with the Moon. BPSK (Binary Phase Shift Keying) modulation is employed here. Using this technique we can extend the internet connectivity to the lunar atmosphere. In addition, these robots are also pre-programmed with Artificial Intelligence (AI), in order to survive communication breakdowns. In this mode it acts precisely according to the sustaining environment.
{"title":"Earth Moon Communication incorporated Internet webpage based control for robots","authors":"C. Abilash, B. Lakshminath","doi":"10.1109/ICCCNT.2013.6726695","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726695","url":null,"abstract":"This paper mainly concentrates on the control of Lunar-bots and is also applicable to other kinds of robots like the one used in warfare, medical surgeries, and even the one that is used for UAV automation using the world wide accessed internet communication with Earth Moon Communication (EMC). This paper discusses the unique way in which we can control the robot deployed in the Moon for space research using EMC (Earth Moon Communication) technique and all other robots located anywhere in the world with the help of a simple webpage loaded with controls. Here a particular webpage is created over the internet whose administrator privileges are restricted to the authority. The robot in which this system is implemented also has access to the webpage, but is read only. The input to the webpage is designed by using simple LabVIEW programs interfacing sophisticated piezoelectric, tactile sensors and other sensor systems to provide gesture, speech, and image inputs. This LabVIEW program is then sourced to an administrative website. The robot is already programmed in such a way that it is able to understand and synchronize with these commands uniquely. The robot which is permanently connected to the internet with the help of wireless modem (3G/4G), can read these commands with ease. This control is extended to the moon by deploying EMC, developed from the existing ancient Moon Bounce technique. This is accomplished by replacing the Moon's rugged reflector surface by a parabolic reflector antenna. Two similar antennas are placed on diametrically opposite zones of Earth in order to maintain the path of sight with the Moon. BPSK (Binary Phase Shift Keying) modulation is employed here. Using this technique we can extend the internet connectivity to the lunar atmosphere. In addition, these robots are also pre-programmed with Artificial Intelligence (AI), in order to survive communication breakdowns. In this mode it acts precisely according to the sustaining environment.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"59 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89537019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726785
Amit Kumar, Prabhat Kumar, M. Singh
Wireless LANs (WLANs) are complex systems with many access points (APs) and thousands of clients. The rising amount of roaming users and broadband Internet services have created a very strong demand for fast, efficient, secure, and seamless roaming protocols. A handover roaming protocol allows an user to connect to another access point of same server with proper authentication establishing a session key in such a way that new AP recognizes it as legitimate user of the current network. This paper illustrates brief state-of-the-art survey of existing L2 type handover protocols and discusses pitfall of these protocols in detail. We have also presented briefly, the key challenges and future perspective of the existing wireless roaming protocols.
{"title":"A survey on wireless LAN internal roaming protocols","authors":"Amit Kumar, Prabhat Kumar, M. Singh","doi":"10.1109/ICCCNT.2013.6726785","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726785","url":null,"abstract":"Wireless LANs (WLANs) are complex systems with many access points (APs) and thousands of clients. The rising amount of roaming users and broadband Internet services have created a very strong demand for fast, efficient, secure, and seamless roaming protocols. A handover roaming protocol allows an user to connect to another access point of same server with proper authentication establishing a session key in such a way that new AP recognizes it as legitimate user of the current network. This paper illustrates brief state-of-the-art survey of existing L2 type handover protocols and discusses pitfall of these protocols in detail. We have also presented briefly, the key challenges and future perspective of the existing wireless roaming protocols.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87288170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726470
S. Muniyappan, A. Allirani, S. Saraswathi
A novel approach for image enhancement by using contrast limited adaptive histogram equalization method will produces a good contrast images such as medical images. In this paper, we propose a new method for image enhancement by using contrast limited adaptive histogram equalization method. We propose a general framework with a adaptive histogram equalization method. We are going to prove its effectiveness in comparison to other contrast enhancement method.
{"title":"A novel approach for image enhancement by using contrast limited adaptive histogram equalization method","authors":"S. Muniyappan, A. Allirani, S. Saraswathi","doi":"10.1109/ICCCNT.2013.6726470","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726470","url":null,"abstract":"A novel approach for image enhancement by using contrast limited adaptive histogram equalization method will produces a good contrast images such as medical images. In this paper, we propose a new method for image enhancement by using contrast limited adaptive histogram equalization method. We propose a general framework with a adaptive histogram equalization method. We are going to prove its effectiveness in comparison to other contrast enhancement method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"130 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87784849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICCCNT.2013.6726552
C. Gode, M. S. Madankar
Experimental laboratories in technical institute are important part of the education areas. It demonstrates course concepts and brings theoretical ideas alive so students can more visualize and understand facts of theoretical concepts. Natural phenomenon affects the real world measurement and control the working algorithm. However, equipping a laboratory ubiquitously is an effective in cost and its maintenance can be difficult. Teaching assistants are required to instruct and setting up the well equipped laboratory, and grade the student report. These time-consuming and costly tasks turns in relatively low equipped laboratory also when teaching assistants and laboratory equipment are available experiments can be driven out. A lightweight web server as well as website interface has been developed, which restricts cost efficient laboratory equipment and measures electronic devices as “virtual laboratory” for any technical institute experiments to undergraduate as well as post graduate students. It uses standard browsers without additional plug-ins to provide interface to any user. The present interface is flexible and could be expanded to many other devices and instruments.
{"title":"A remote experimentation using virtual laboratory","authors":"C. Gode, M. S. Madankar","doi":"10.1109/ICCCNT.2013.6726552","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726552","url":null,"abstract":"Experimental laboratories in technical institute are important part of the education areas. It demonstrates course concepts and brings theoretical ideas alive so students can more visualize and understand facts of theoretical concepts. Natural phenomenon affects the real world measurement and control the working algorithm. However, equipping a laboratory ubiquitously is an effective in cost and its maintenance can be difficult. Teaching assistants are required to instruct and setting up the well equipped laboratory, and grade the student report. These time-consuming and costly tasks turns in relatively low equipped laboratory also when teaching assistants and laboratory equipment are available experiments can be driven out. A lightweight web server as well as website interface has been developed, which restricts cost efficient laboratory equipment and measures electronic devices as “virtual laboratory” for any technical institute experiments to undergraduate as well as post graduate students. It uses standard browsers without additional plug-ins to provide interface to any user. The present interface is flexible and could be expanded to many other devices and instruments.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88387145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}