Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933805
A. Singh, Vaishali Singh
Keylogger is a spyware program that can record keystrokes and mouse click along with cursor movements for spying confidential information such as password. There are so many applications have been developed till now that recognizes keylogger programs and act like an antivirus software but there are so many keyloggers that can run without any interruption or failing antivirus programs to recognize itself. But there is a newly introduced technique has been proposed that claims for concealing password among bots key press that transforms actual password in an unreadable or encrypted patterns. But the technique can be cracked by analyzing key prints and its interval. Every time an actual keystroke conceals among few predefined bots keystrokes, but in a particular session; the same string gets printed. In a session, same encryption string can retrieve actual keystrokes or password by analyzing it and if a password is retrieved in a single session then no another encryption string can confuse keylogger or attacker because password has already been stolen that can be enrolled later. Sift attack is an attack based on deep analysis that allows extracting information on the basis of algorithm. This paper proposes a concept that can break security approach made against keylogger that may conceal passwords.
{"title":"Infringement of Prevention Technique against Keyloggers using Sift Attack","authors":"A. Singh, Vaishali Singh","doi":"10.1109/ICACAT.2018.8933805","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933805","url":null,"abstract":"Keylogger is a spyware program that can record keystrokes and mouse click along with cursor movements for spying confidential information such as password. There are so many applications have been developed till now that recognizes keylogger programs and act like an antivirus software but there are so many keyloggers that can run without any interruption or failing antivirus programs to recognize itself. But there is a newly introduced technique has been proposed that claims for concealing password among bots key press that transforms actual password in an unreadable or encrypted patterns. But the technique can be cracked by analyzing key prints and its interval. Every time an actual keystroke conceals among few predefined bots keystrokes, but in a particular session; the same string gets printed. In a session, same encryption string can retrieve actual keystrokes or password by analyzing it and if a password is retrieved in a single session then no another encryption string can confuse keylogger or attacker because password has already been stolen that can be enrolled later. Sift attack is an attack based on deep analysis that allows extracting information on the basis of algorithm. This paper proposes a concept that can break security approach made against keylogger that may conceal passwords.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85828058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933754
Anurag Saxena, V. Singh, Shiv Kumar, Asim Rahman Ansari
In this paper, a co-centric double hole shape patch antenna is designed and simulated in CST software. A textile material named as “Jeans” is used as a substrate in which presented antenna is simulated. The resonant frequency of co-centric double hole shape antenna is 3.12 GHz having long bandwidth from 2.44 GHz to 12.34 GHz. The design is simulated on Partial Ground having rectangular in shape. The size of substrate is 61 x 31 mm having thickness of 1 mm and dielectric constant is 1.7. This type of textile antenna can be wearable and can be used for single band applications.
{"title":"A Concentric Double Hole Shape Microstrip Patch Antenna at 3.12 GHz Resonant Frequency","authors":"Anurag Saxena, V. Singh, Shiv Kumar, Asim Rahman Ansari","doi":"10.1109/ICACAT.2018.8933754","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933754","url":null,"abstract":"In this paper, a co-centric double hole shape patch antenna is designed and simulated in CST software. A textile material named as “Jeans” is used as a substrate in which presented antenna is simulated. The resonant frequency of co-centric double hole shape antenna is 3.12 GHz having long bandwidth from 2.44 GHz to 12.34 GHz. The design is simulated on Partial Ground having rectangular in shape. The size of substrate is 61 x 31 mm having thickness of 1 mm and dielectric constant is 1.7. This type of textile antenna can be wearable and can be used for single band applications.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"41 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88685181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933713
P. Rai, Ayoush Johari, Shivoy Srivastava, Pooja R. Gupta
A Women safety band (WSB) is a technology used to protect women from various and unnecessary dangerous situation. This paper presents switch-over text messaging and also describes various uses advantages of women protection band and also compares the technologies developed in the field of women security. The device mainly works on the principle of global positioning system, Bluetooth, multiple functioning microcontroller and switch over methodology. Meanwhile, the device can be easily made compatible with the smartphone having an app named “ALERT” which can be downloaded from google play store.
{"title":"Design and Implementation of Women Safety Band with switch over methodology using Arduino Uno","authors":"P. Rai, Ayoush Johari, Shivoy Srivastava, Pooja R. Gupta","doi":"10.1109/ICACAT.2018.8933713","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933713","url":null,"abstract":"A Women safety band (WSB) is a technology used to protect women from various and unnecessary dangerous situation. This paper presents switch-over text messaging and also describes various uses advantages of women protection band and also compares the technologies developed in the field of women security. The device mainly works on the principle of global positioning system, Bluetooth, multiple functioning microcontroller and switch over methodology. Meanwhile, the device can be easily made compatible with the smartphone having an app named “ALERT” which can be downloaded from google play store.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"7 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84933047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933746
Sakshi Pandey, Manoj Kumar, Vivek Kumar
In today’s digital world, security plays an important role in the field of web applications. CAPTCHA is a challenge reaction test that segregates human from machine based automatic program that may harm data credentials. It is required to protect the website or user data from different kind of machine attacks. To ensure the security, CAPTCHA is a tool through which a turing test can be performed that denied robots to intervene with the systems. CAPTCHA stands for Completely Automated Public Turing Test to tell Computers and Human Apart. Machine based attacks can harm the database by enrolling junk entries and an account can be hacked through brute force attack. By having these problems on mind, there are so many CAPTCHA techniques have been introduced such as text based CAPTCHA that involves 3D text, moving letters, distorted text and other than the text based CAPTCHA there are also graphical CAPTCHA, Audio CAPTCHA. One Time Password based CAPTCHA have been carried out for better security concerns. So, there are so many ideas have been developed till now which claim better security approach and the motive of this paper is to review the previously proposed systems that may have some bugs and complicated for human to solve in less time. The paper also emphasizes the proposed solution or system that replaces the existing system and provides better level of accuracy.
{"title":"A Retrospect on Different side of CAPTCHA Techniques","authors":"Sakshi Pandey, Manoj Kumar, Vivek Kumar","doi":"10.1109/ICACAT.2018.8933746","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933746","url":null,"abstract":"In today’s digital world, security plays an important role in the field of web applications. CAPTCHA is a challenge reaction test that segregates human from machine based automatic program that may harm data credentials. It is required to protect the website or user data from different kind of machine attacks. To ensure the security, CAPTCHA is a tool through which a turing test can be performed that denied robots to intervene with the systems. CAPTCHA stands for Completely Automated Public Turing Test to tell Computers and Human Apart. Machine based attacks can harm the database by enrolling junk entries and an account can be hacked through brute force attack. By having these problems on mind, there are so many CAPTCHA techniques have been introduced such as text based CAPTCHA that involves 3D text, moving letters, distorted text and other than the text based CAPTCHA there are also graphical CAPTCHA, Audio CAPTCHA. One Time Password based CAPTCHA have been carried out for better security concerns. So, there are so many ideas have been developed till now which claim better security approach and the motive of this paper is to review the previously proposed systems that may have some bugs and complicated for human to solve in less time. The paper also emphasizes the proposed solution or system that replaces the existing system and provides better level of accuracy.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"174 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83254728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933617
Jagrati Gupta, S. Agrawal
Switching median filter is actively used and continuously modified by the researchers to remove noise out of corrupted images. Fuzzy based filters are under development to improve the performance of filtering. In literature survey, fuzzy based switching median filter is studied and modified it in our proposed work. Output of the fuzzy system is set to vary the value from 0 to 1 and it is considered as a gain factor for filtering process. After putting gain factor into the filtering equation, the results has been improved in terms of PSNR value as shown in results. The simulation is performed on mixed noise. Mixed noise is taken as a combination of salt & pepper noise which varies from 1% to 10% and Gaussian noise with zero mean and 0.01 variance.
{"title":"Fuzzy Logic Gain Factor Based Improved Switching Median Filter for Mixed Noise","authors":"Jagrati Gupta, S. Agrawal","doi":"10.1109/ICACAT.2018.8933617","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933617","url":null,"abstract":"Switching median filter is actively used and continuously modified by the researchers to remove noise out of corrupted images. Fuzzy based filters are under development to improve the performance of filtering. In literature survey, fuzzy based switching median filter is studied and modified it in our proposed work. Output of the fuzzy system is set to vary the value from 0 to 1 and it is considered as a gain factor for filtering process. After putting gain factor into the filtering equation, the results has been improved in terms of PSNR value as shown in results. The simulation is performed on mixed noise. Mixed noise is taken as a combination of salt & pepper noise which varies from 1% to 10% and Gaussian noise with zero mean and 0.01 variance.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"62 4","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91496858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933628
Debabrata Swain, Kushankur Chakraborty, A. Dombe, Ashitosh Ashture, N. Valakunde
The H1 B visa is the most demanded visa world-wide. The H1 B visa applications are very heavily varied across many fields i.e. job, job title, year of petition, accountable wages, city of work etc. The purpose of this research is to estimate the likelihood of visa approval on the basis of metadata provided. We shall consider all aspects by which the petition may be approved or otherwise, strictly working on the data provided in the application. The designed classifier in the after mentioned report serves a dual purpose of H1B applicants and hopeful employers to measure the probability of getting certified prior to and after applying the petition.
{"title":"Prediction of H1B Visa Using Machine Learning Algorithms","authors":"Debabrata Swain, Kushankur Chakraborty, A. Dombe, Ashitosh Ashture, N. Valakunde","doi":"10.1109/ICACAT.2018.8933628","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933628","url":null,"abstract":"The H1 B visa is the most demanded visa world-wide. The H1 B visa applications are very heavily varied across many fields i.e. job, job title, year of petition, accountable wages, city of work etc. The purpose of this research is to estimate the likelihood of visa approval on the basis of metadata provided. We shall consider all aspects by which the petition may be approved or otherwise, strictly working on the data provided in the application. The designed classifier in the after mentioned report serves a dual purpose of H1B applicants and hopeful employers to measure the probability of getting certified prior to and after applying the petition.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"59 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91186770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933612
Ankit Tariyal, Sachin Goyal, Neeraj Tantububay
In todays e-commerce market where online shopping and tourism is fastly growing so it very important to analyze such huge amount of large data present in web. So it is very important to create a method which classify the web data. Sentiment analysis is a method to classify the web data such as product reviews, views in to various polarities such a positive, negative or neutral. In this paper we classify the reviews by using various machine learning techniques, In this we create a various classification model and compute the performance of each models and select the best classification models based on their performance computation. We will use a combination of simple linear method (LDA), nonlinear methods (CART, KNN) and complex nonlinear methods (SVM, RF, C5.0).
{"title":"Sentiment Analysis of Tweets Using Various Machine Learning Techniques","authors":"Ankit Tariyal, Sachin Goyal, Neeraj Tantububay","doi":"10.1109/ICACAT.2018.8933612","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933612","url":null,"abstract":"In todays e-commerce market where online shopping and tourism is fastly growing so it very important to analyze such huge amount of large data present in web. So it is very important to create a method which classify the web data. Sentiment analysis is a method to classify the web data such as product reviews, views in to various polarities such a positive, negative or neutral. In this paper we classify the reviews by using various machine learning techniques, In this we create a various classification model and compute the performance of each models and select the best classification models based on their performance computation. We will use a combination of simple linear method (LDA), nonlinear methods (CART, KNN) and complex nonlinear methods (SVM, RF, C5.0).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"32 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84165933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933703
Ruby Bhatt, P. Maheshwary, P. Shukla
Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.
{"title":"Application of Fruit Fly optimization Algorithm for Node Capture Attack in Wireless Sensor Network","authors":"Ruby Bhatt, P. Maheshwary, P. Shukla","doi":"10.1109/ICACAT.2018.8933703","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933703","url":null,"abstract":"Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"15 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83625125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933710
Ankita Trivedi, A. Shrivastava, A. Saxena, M. Manoria
This paper evaluates the correlation between the immune system of human and systems which detects intrusion. Intrusion is an unofficial and not permitted access or action in a computer system. For detection of any of these malicious activities and for security of our computer systems, Intrusion detection technologies are becoming extremely important. The paper initiates by introducing intrusion detection systems and its types. An outline of the immune system of human is presented and the prominent features which are beneficial to the design of Intrusion detection system are analyzed. Researchers are always inspired by environment. Security of computer is no exclusion. Artificial Immune system provoked from Natural Immune system works proficiently for detecting any outer threat in a network. Human body provides two levels of defense against any foreign body. The primary layer of defense is Innate Immune system and the secondary is Adaptive Immune system.
{"title":"Survey Analysis on Immunological Approach to Intrusion Detection","authors":"Ankita Trivedi, A. Shrivastava, A. Saxena, M. Manoria","doi":"10.1109/ICACAT.2018.8933710","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933710","url":null,"abstract":"This paper evaluates the correlation between the immune system of human and systems which detects intrusion. Intrusion is an unofficial and not permitted access or action in a computer system. For detection of any of these malicious activities and for security of our computer systems, Intrusion detection technologies are becoming extremely important. The paper initiates by introducing intrusion detection systems and its types. An outline of the immune system of human is presented and the prominent features which are beneficial to the design of Intrusion detection system are analyzed. Researchers are always inspired by environment. Security of computer is no exclusion. Artificial Immune system provoked from Natural Immune system works proficiently for detecting any outer threat in a network. Human body provides two levels of defense against any foreign body. The primary layer of defense is Innate Immune system and the secondary is Adaptive Immune system.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"34 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89000305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933665
Ashutosh Mishra, Manish Gupta, Pankaj Sharma
Basically, the contrast and sharpness of the images captured in underwater will be significantly deteriorated and diminished caused by the less perceptibility of the image which is due to the water medium’s physical properties. In this work, Improved version of CLAHE mechanism is used. In this technique, First of all input color image gets enhanced by using dynamic histogram equalization technique and then apply CLAHE technique to improve contrast of an input image. DHE technique enhances an input image without loss of imput image details. Proposed experimental results show that the accuracy of proposed technique is much more better than the previously proposed technique(Tri-threshold based fuzzy intensification operator) for under water images in terms of PSNR and entropy value.
{"title":"Enhancement of Underwater Images using Improved CLAHE","authors":"Ashutosh Mishra, Manish Gupta, Pankaj Sharma","doi":"10.1109/ICACAT.2018.8933665","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933665","url":null,"abstract":"Basically, the contrast and sharpness of the images captured in underwater will be significantly deteriorated and diminished caused by the less perceptibility of the image which is due to the water medium’s physical properties. In this work, Improved version of CLAHE mechanism is used. In this technique, First of all input color image gets enhanced by using dynamic histogram equalization technique and then apply CLAHE technique to improve contrast of an input image. DHE technique enhances an input image without loss of imput image details. Proposed experimental results show that the accuracy of proposed technique is much more better than the previously proposed technique(Tri-threshold based fuzzy intensification operator) for under water images in terms of PSNR and entropy value.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"163 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77062212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}