Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942613
A. Pathrikar, R. Deshpande
In this paper we have designed Faster & Power Efficient Sense Amplifier for CMOS SRAM using VLSI Technology i.e. primarily schematic of sense amplifier is designed & simulated using ADS (Advanced Design System). The sense amplifier then implemented & analyzed at chip level using Microwind 3.1- a layout editor. The 45 nm & 32 nm technologies are used to analyze performance of Sense Amplifier. Our focus will be to reduce the size, to improve the power consumption and also to improve the response time of sense amplifier.
{"title":"Design of faster & power efficient sense amplifier using VLSI technology","authors":"A. Pathrikar, R. Deshpande","doi":"10.1109/ICAECCT.2016.7942613","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942613","url":null,"abstract":"In this paper we have designed Faster & Power Efficient Sense Amplifier for CMOS SRAM using VLSI Technology i.e. primarily schematic of sense amplifier is designed & simulated using ADS (Advanced Design System). The sense amplifier then implemented & analyzed at chip level using Microwind 3.1- a layout editor. The 45 nm & 32 nm technologies are used to analyze performance of Sense Amplifier. Our focus will be to reduce the size, to improve the power consumption and also to improve the response time of sense amplifier.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"173 1","pages":"358-361"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72690515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942619
Ruchi Luhadiya, Anagha P. Khedkar
There are critical applications which need high confidentiality and high security. For this, biometric devices are great tools. In the proposed system, the biometric authentication system using iris detection is presented. In this iris image is preprocessed then Hough transform is applied and finally, the image is normalized using Daugman's rubbersheet model. Feature extraction is done using Gray Level Co-occurrence (GLCM) technique and classification is done using multiclass SVM. This system is evaluated on UPOL database and it gives 94.23% accuracy.
{"title":"Iris detection for person identification using multiclass SVM","authors":"Ruchi Luhadiya, Anagha P. Khedkar","doi":"10.1109/ICAECCT.2016.7942619","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942619","url":null,"abstract":"There are critical applications which need high confidentiality and high security. For this, biometric devices are great tools. In the proposed system, the biometric authentication system using iris detection is presented. In this iris image is preprocessed then Hough transform is applied and finally, the image is normalized using Daugman's rubbersheet model. Feature extraction is done using Gray Level Co-occurrence (GLCM) technique and classification is done using multiclass SVM. This system is evaluated on UPOL database and it gives 94.23% accuracy.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"387-392"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75070507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942609
A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete
The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.
{"title":"Google Cloud Storage using tilt gesture","authors":"A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete","doi":"10.1109/ICAECCT.2016.7942609","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942609","url":null,"abstract":"The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"380 1","pages":"338-342"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76181724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942564
V. Mistry, R. Makwana
Road segmentation is one of the most challenging task in a vision based autonomous road navigation system. Adaptability to detect various types of roads and reduction in computational complexity are the two main challenges in existing vision based road navigation algorithms. This paper modifies existing vanishing point based road segmentation algorithm and presents computationally efficient reduced voter scheme for general road segmentation. The goal of this paper is to present an accurate and precise road segmentation algorithm that can work on structured, semi-structured and unstructured roads in presence of different surrounding environments and various illumination variations in daytime. The major contribution of this algorithm is reduction of total number of voters used for voting process of vanishing point detection and analysis of general road segmentation results for various types of roads. The algorithm is implemented on MATLAB. Various qualitative and quantitative results are presents.
{"title":"Computationally efficient vanishing point detection algorithm based road segmentation in road images","authors":"V. Mistry, R. Makwana","doi":"10.1109/ICAECCT.2016.7942564","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942564","url":null,"abstract":"Road segmentation is one of the most challenging task in a vision based autonomous road navigation system. Adaptability to detect various types of roads and reduction in computational complexity are the two main challenges in existing vision based road navigation algorithms. This paper modifies existing vanishing point based road segmentation algorithm and presents computationally efficient reduced voter scheme for general road segmentation. The goal of this paper is to present an accurate and precise road segmentation algorithm that can work on structured, semi-structured and unstructured roads in presence of different surrounding environments and various illumination variations in daytime. The major contribution of this algorithm is reduction of total number of voters used for voting process of vanishing point detection and analysis of general road segmentation results for various types of roads. The algorithm is implemented on MATLAB. Various qualitative and quantitative results are presents.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"54 1","pages":"103-110"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74173458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942592
Priyanka A. Dhande, A. Kadam
In cloud applications, distributed file system is very core technology. Many functionalities of computing applications can be performed with the help of file system, such applications is rely on the distributed programming and having a number of distributed chunks are assign to each nodes; node receive each separate chunk that performs in parallel. But failure of node is the major issue, this issue may be recovered in cloud also replaced and added to the nodes. Facing load imbalance problem; that is, the file chunks are not assigning correctly among all the nodes. For that purpose the load rebalancing technique comes into picture, load rebalancing has the more efficiency that makes system more efficient. For load imbalance we use a secure load rebalancing algorithm that merges with the MD5 with DES encryption algorithm. The result shows performs the system in terms of security parameters message overhead and the movement cost for our proposed scheme. For this work we are implementing in distributed file system of the EC2.
{"title":"New approach for load rebalancer, scheduler in big data with security mechanism in cloud environment","authors":"Priyanka A. Dhande, A. Kadam","doi":"10.1109/ICAECCT.2016.7942592","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942592","url":null,"abstract":"In cloud applications, distributed file system is very core technology. Many functionalities of computing applications can be performed with the help of file system, such applications is rely on the distributed programming and having a number of distributed chunks are assign to each nodes; node receive each separate chunk that performs in parallel. But failure of node is the major issue, this issue may be recovered in cloud also replaced and added to the nodes. Facing load imbalance problem; that is, the file chunks are not assigning correctly among all the nodes. For that purpose the load rebalancing technique comes into picture, load rebalancing has the more efficiency that makes system more efficient. For load imbalance we use a secure load rebalancing algorithm that merges with the MD5 with DES encryption algorithm. The result shows performs the system in terms of security parameters message overhead and the movement cost for our proposed scheme. For this work we are implementing in distributed file system of the EC2.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"247-250"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83166556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942554
S.S. Gundecha, M. Naidu
A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.
{"title":"Multilevel biometric authentication by using different techniques","authors":"S.S. Gundecha, M. Naidu","doi":"10.1109/ICAECCT.2016.7942554","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942554","url":null,"abstract":"A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"49 1","pages":"50-54"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84871317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942571
Kaveri V Sonani, M. Zaveri, Sanjay Garg
In this paper, we propose an algorithm for human gesture analysis for the action recognition using Microsoft kinect sensor to build physiotherapy application. Kinect is able to generate depth image from RGB image and generate human skeleton from the depth image. In this method, therapist may record the exercise and patients are required to mimic that exercise at home. This system is able to track their progress as well as recognize the action of patients. If a patient do not perform properly, then it gives the suggestion based on the information of angle between joints of human skeleton. We design codebook for each action, which contains different key posture frames for each action. To find the match between two frames, we make the use of the concept of star distance. We evaluate our proposed system with large number of scenarios and analysed with Hidden Markov Model to recognise the action.
{"title":"Human gesture analysis for action recognition","authors":"Kaveri V Sonani, M. Zaveri, Sanjay Garg","doi":"10.1109/ICAECCT.2016.7942571","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942571","url":null,"abstract":"In this paper, we propose an algorithm for human gesture analysis for the action recognition using Microsoft kinect sensor to build physiotherapy application. Kinect is able to generate depth image from RGB image and generate human skeleton from the depth image. In this method, therapist may record the exercise and patients are required to mimic that exercise at home. This system is able to track their progress as well as recognize the action of patients. If a patient do not perform properly, then it gives the suggestion based on the information of angle between joints of human skeleton. We design codebook for each action, which contains different key posture frames for each action. To find the match between two frames, we make the use of the concept of star distance. We evaluate our proposed system with large number of scenarios and analysed with Hidden Markov Model to recognise the action.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"6 1","pages":"144-149"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87569670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942605
Swarupa Mahesh Deshpande, B. Ainapure
The KVM (Kernel-based Virtual Machine Manager) hypervisor manages many VMs (Virtual Machine) on single host. The virtualization environment for cloud systems in IaaS (Infrastructure as a Service) layer supports heterogeneous operating systems in homogeneous environment. An Intelligent Virtualization Monitoring System Using KVM monitors the virtual machines under KVM hypervisor. The KVM is a type II hypervisor that is Linux kernel based virtual machine manager which comes with Linux OS. The VMs are the target for the malicious or abnormal attacks. To protect the VMs from the attack, the proposed system uses the VM monitoring script to get the status of the VMs. An intelligent virtualization monitoring system is incorporated as a part of KVM by sending the status of each VM running on hypervisor. The intelligent system categorizes attack patterns and actively rectify the attack. The necessary action taken will be communicated through the cloud API.
{"title":"An Intelligent Virtual Machine Monitoring System Using KVM for Reliable And Secure Environment in Cloud","authors":"Swarupa Mahesh Deshpande, B. Ainapure","doi":"10.1109/ICAECCT.2016.7942605","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942605","url":null,"abstract":"The KVM (Kernel-based Virtual Machine Manager) hypervisor manages many VMs (Virtual Machine) on single host. The virtualization environment for cloud systems in IaaS (Infrastructure as a Service) layer supports heterogeneous operating systems in homogeneous environment. An Intelligent Virtualization Monitoring System Using KVM monitors the virtual machines under KVM hypervisor. The KVM is a type II hypervisor that is Linux kernel based virtual machine manager which comes with Linux OS. The VMs are the target for the malicious or abnormal attacks. To protect the VMs from the attack, the proposed system uses the VM monitoring script to get the status of the VMs. An intelligent virtualization monitoring system is incorporated as a part of KVM by sending the status of each VM running on hypervisor. The intelligent system categorizes attack patterns and actively rectify the attack. The necessary action taken will be communicated through the cloud API.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"59 1","pages":"314-319"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84915785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942580
Aakanksha Sharaff, Hari Shrawgi, Priyank Arora, Anshul Verma
Digital documents are ubiquitous in this age and every person faces an inundation of data today. In an era where being expeditious in work is becoming a necessity, providing people with the gist of verbose documents is an essential task. Thus in this paper, we document the process of Text Summarization in which a concise summary of a larger text is generated. We propose an Extractive Model of Document Summarization based on Agglomerative clustering which ranks sentences and forms a summary of the highly ranked sentences.
{"title":"Document Summarization by Agglomerative nested clustering approach","authors":"Aakanksha Sharaff, Hari Shrawgi, Priyank Arora, Anshul Verma","doi":"10.1109/ICAECCT.2016.7942580","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942580","url":null,"abstract":"Digital documents are ubiquitous in this age and every person faces an inundation of data today. In an era where being expeditious in work is becoming a necessity, providing people with the gist of verbose documents is an essential task. Thus in this paper, we document the process of Text Summarization in which a concise summary of a larger text is generated. We propose an Extractive Model of Document Summarization based on Agglomerative clustering which ranks sentences and forms a summary of the highly ranked sentences.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"31 1","pages":"187-191"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73771408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942628
R. Atyali, S. R. Khot
An important information provided by the medical image to diagnose the disease can be enhanced through image fusion using different modalities. This paper introduces the fusion process which allows combination of features of different modality images. It consists of application of Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA) based fusion to multi-modality medical images, results in an easy and reliable technique to detect cancerous tissues through image fusion. The system defined below covers the PCA and DWT based image fusion quality analysis for detection of cancer tumour and the experimental results gives the effectiveness of fusion rule based on principal component analysis and discrete wavelet transform which preserves the original structural information from source image and also enhances the relevant information from the same.
{"title":"An enhancement in detection of brain cancer through image fusion","authors":"R. Atyali, S. R. Khot","doi":"10.1109/ICAECCT.2016.7942628","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942628","url":null,"abstract":"An important information provided by the medical image to diagnose the disease can be enhanced through image fusion using different modalities. This paper introduces the fusion process which allows combination of features of different modality images. It consists of application of Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA) based fusion to multi-modality medical images, results in an easy and reliable technique to detect cancerous tissues through image fusion. The system defined below covers the PCA and DWT based image fusion quality analysis for detection of cancer tumour and the experimental results gives the effectiveness of fusion rule based on principal component analysis and discrete wavelet transform which preserves the original structural information from source image and also enhances the relevant information from the same.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"9 1","pages":"438-442"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74262234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}