Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943244
Rashmi Rupam, G. Dubey, S. Singh
The Fifth Generation communication technology is considered to be the most advanced and technically innovative entry in the progression of wireless communication. Starting from the preliminary phase of evolution, when hardwired telephones were replaced by mobile systems, till the cutting-edge where the all-IP standards have substituted the broadband and digital technologies, the communication world has observed a significant development. In this paper, we are discussing the vision of 5G and its future scope in Indian market. The introduction discusses the prospects of the fifth generation. It gives a glimpse of the key features of the earlier generations (1G-4G) and the driving forces for 5G. Further, the architecture section discusses the implementing technologies like Massive MIMO and Spatial Modulation that are capable of resolving the general issues encountered by the earlier generations. The third and last part focusses on the visions of 5G and its scope in Indian telecom market.
{"title":"5G-A deep insight and its future in India","authors":"Rashmi Rupam, G. Dubey, S. Singh","doi":"10.1109/CONFLUENCE.2017.7943244","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943244","url":null,"abstract":"The Fifth Generation communication technology is considered to be the most advanced and technically innovative entry in the progression of wireless communication. Starting from the preliminary phase of evolution, when hardwired telephones were replaced by mobile systems, till the cutting-edge where the all-IP standards have substituted the broadband and digital technologies, the communication world has observed a significant development. In this paper, we are discussing the vision of 5G and its future scope in Indian market. The introduction discusses the prospects of the fifth generation. It gives a glimpse of the key features of the earlier generations (1G-4G) and the driving forces for 5G. Further, the architecture section discusses the implementing technologies like Massive MIMO and Spatial Modulation that are capable of resolving the general issues encountered by the earlier generations. The third and last part focusses on the visions of 5G and its scope in Indian telecom market.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"20 1","pages":"714-720"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73667597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943213
Anshuman, S. Rao, Misha Kakkar
With the advent to social media the number of reviews for any particular product is in millions, as there exist thousand of websites where that particular product exists. As the numbers of reviews are very high the user ends up spending a lot of time for searching best product based on the experiences shared by review writers. This paper presents a sentiment based rating approach for food recipes which sorts food recipes present on various website on the basis of sentiments of review writers. The results are shown with the help of a mobile application: Foodoholic. The output of the application is an ordered list of recipes with user input as their core ingredient.
{"title":"A rating approach based on sentiment analysis","authors":"Anshuman, S. Rao, Misha Kakkar","doi":"10.1109/CONFLUENCE.2017.7943213","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943213","url":null,"abstract":"With the advent to social media the number of reviews for any particular product is in millions, as there exist thousand of websites where that particular product exists. As the numbers of reviews are very high the user ends up spending a lot of time for searching best product based on the experiences shared by review writers. This paper presents a sentiment based rating approach for food recipes which sorts food recipes present on various website on the basis of sentiments of review writers. The results are shown with the help of a mobile application: Foodoholic. The output of the application is an ordered list of recipes with user input as their core ingredient.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"19 1","pages":"557-562"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81675705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943200
A. Jayaram, S. Singal
Enterprise Resource Management System (ERMS) is used in the management of enterprise for the computerization of enterprise processes such as management of customer data, employee data, client data, financial data, sales reports, attendance reports, inventory details, equity details and payroll details. An ERMS can handle different user roles such as manager, CEO, employees, customers and has abstraction features for its users. It is the core software used by all enterprises as it provides an interface for the overall management of the enterprise. The proposed ERMS model is easy to use, easily configurable as well as economical in terms of time and cost. Moreover, it can adapt easily to any browser or device through its inbuilt bootstrap framework. Migration of data from the existing enterprise system is also feasible. Business Intelligence can be obtained by performing data mining and predictive analytics with the massive data obtained in the central cloud storage area of the proposed ERMS model. Implementation of the proposed ERMS model can be extremely beneficial for the enterprise as it can gain valuable insights regarding the running of its business, customers and competitors.
{"title":"An enterprise resource management model for business intelligence, data mining and predictive analytics","authors":"A. Jayaram, S. Singal","doi":"10.1109/CONFLUENCE.2017.7943200","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943200","url":null,"abstract":"Enterprise Resource Management System (ERMS) is used in the management of enterprise for the computerization of enterprise processes such as management of customer data, employee data, client data, financial data, sales reports, attendance reports, inventory details, equity details and payroll details. An ERMS can handle different user roles such as manager, CEO, employees, customers and has abstraction features for its users. It is the core software used by all enterprises as it provides an interface for the overall management of the enterprise. The proposed ERMS model is easy to use, easily configurable as well as economical in terms of time and cost. Moreover, it can adapt easily to any browser or device through its inbuilt bootstrap framework. Migration of data from the existing enterprise system is also feasible. Business Intelligence can be obtained by performing data mining and predictive analytics with the massive data obtained in the central cloud storage area of the proposed ERMS model. Implementation of the proposed ERMS model can be extremely beneficial for the enterprise as it can gain valuable insights regarding the running of its business, customers and competitors.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"26 1","pages":"485-490"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85909822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943247
S. Rathi, U. Gawande
Sign language is the only essential communicating tools, for deaf and dumb people. To ensure an independent life for hearing impaired and mute people, the automatic interpretation of sign language is an extensive era of research. Using sign languages, deaf and mute people can communicate among themselves but they find it tough to face the outside world. The aim of the proposed system is to make a dual way communication system between deaf-dumb and normal people. The paper presents a vision based approach where continuous sequences of frames of dynamic hand gestures have been taken. Preprocessing, Segmentation, Feature Extraction and Classification these four are the main steps to recognize dynamic hand gestures of ISL words. After that, dual way communication is performed. In that, first the recognized gesture has converted into text message and voice format, so that normal person can understand it. Second, voice has converted into text message and its corresponding gesture, so that physically impaired humans can understand it. Hence, the proposed system can definitely breaks the barrier between deaf-dumb and normal people.
{"title":"Development of full duplex intelligent communication system for deaf and dumb people","authors":"S. Rathi, U. Gawande","doi":"10.1109/CONFLUENCE.2017.7943247","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943247","url":null,"abstract":"Sign language is the only essential communicating tools, for deaf and dumb people. To ensure an independent life for hearing impaired and mute people, the automatic interpretation of sign language is an extensive era of research. Using sign languages, deaf and mute people can communicate among themselves but they find it tough to face the outside world. The aim of the proposed system is to make a dual way communication system between deaf-dumb and normal people. The paper presents a vision based approach where continuous sequences of frames of dynamic hand gestures have been taken. Preprocessing, Segmentation, Feature Extraction and Classification these four are the main steps to recognize dynamic hand gestures of ISL words. After that, dual way communication is performed. In that, first the recognized gesture has converted into text message and voice format, so that normal person can understand it. Second, voice has converted into text message and its corresponding gesture, so that physically impaired humans can understand it. Hence, the proposed system can definitely breaks the barrier between deaf-dumb and normal people.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"9 1","pages":"733-738"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84082448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943260
Ankur Choudhary, Piyush Malhotra, A. Baghel
The proposed approach put forward an effective estimation of the parameters for software reliability growth models with the help of Krill Herd Algorithm. The Software Reliability Growth model is considered to be incomplete, if the parameters of model are not known and are not validated over failure datasets. Many techniques are present for estimating parameters of model based on numerical estimation, but the scope of quality enhancement still remain open. The proposed Krill Herd Algorithm based approach outclasses the problems of numerical estimation. The proposed work is validated over four real-time datasets.
{"title":"Parameter estimation of software reliability growth models using Krill Herd Algorithm","authors":"Ankur Choudhary, Piyush Malhotra, A. Baghel","doi":"10.1109/CONFLUENCE.2017.7943260","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943260","url":null,"abstract":"The proposed approach put forward an effective estimation of the parameters for software reliability growth models with the help of Krill Herd Algorithm. The Software Reliability Growth model is considered to be incomplete, if the parameters of model are not known and are not validated over failure datasets. Many techniques are present for estimating parameters of model based on numerical estimation, but the scope of quality enhancement still remain open. The proposed Krill Herd Algorithm based approach outclasses the problems of numerical estimation. The proposed work is validated over four real-time datasets.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"78 1","pages":"804-808"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83906369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943197
Paurush Bhulania, M. Tripathy, Ayoub Khan
Network-on-Chip (NoC) on Microprocessor System-on-Chip (MPSoC) has emerged as the new generation communication infrastructure providing a promising solution to connect different IPs through a scalable, effective and modular communication network. NoC could bring significant improvement over crossbar interconnections and conventional bus. To design an efficient NoC, the choice of suitable network topology is very important. Wrong choices can affect the network performance. Critical factors of selection for correct topology are degree of the network, diameter of the network, throughput of the network and latency of the network. In this paper we are proposing the communication on 3D heterogeneous topology implementation on Microprocessor System on Chip. My work here explores the combination of 2D Mesh and 2D Hexagon in a 3D heterogeneous topology.
{"title":"3D implementation of heterogeneous topologies on MPSoC","authors":"Paurush Bhulania, M. Tripathy, Ayoub Khan","doi":"10.1109/CONFLUENCE.2017.7943197","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943197","url":null,"abstract":"Network-on-Chip (NoC) on Microprocessor System-on-Chip (MPSoC) has emerged as the new generation communication infrastructure providing a promising solution to connect different IPs through a scalable, effective and modular communication network. NoC could bring significant improvement over crossbar interconnections and conventional bus. To design an efficient NoC, the choice of suitable network topology is very important. Wrong choices can affect the network performance. Critical factors of selection for correct topology are degree of the network, diameter of the network, throughput of the network and latency of the network. In this paper we are proposing the communication on 3D heterogeneous topology implementation on Microprocessor System on Chip. My work here explores the combination of 2D Mesh and 2D Hexagon in a 3D heterogeneous topology.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"14 1","pages":"470-473"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82192592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943240
Falguni Gupta, S. Singal
Twitter is in deed the most sought after micro blogging site these days. It has had a great hand in voicing public opinion. The challenge lies in giving this voice a definition by extracting specific results so that we can head towards a better future keeping in mind the sentiments of the public. Although there have been many approaches to analyzing sentiments on Twitter but extremely few have been found which also consider region wise classification of the sentiment. The proposed work targets to use a novel approach which also considers region wise sentiments to give sentiment analysis a new platform. Also, recently in India there has been a drastic change due to demonetization of the economy. Our aim is to mine this data region wise and conclude whether region wise classification can give us more specific results or not.
{"title":"Sentiment analysis of the demonitization of economy 2016 India, Regionwise","authors":"Falguni Gupta, S. Singal","doi":"10.1109/CONFLUENCE.2017.7943240","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943240","url":null,"abstract":"Twitter is in deed the most sought after micro blogging site these days. It has had a great hand in voicing public opinion. The challenge lies in giving this voice a definition by extracting specific results so that we can head towards a better future keeping in mind the sentiments of the public. Although there have been many approaches to analyzing sentiments on Twitter but extremely few have been found which also consider region wise classification of the sentiment. The proposed work targets to use a novel approach which also considers region wise sentiments to give sentiment analysis a new platform. Also, recently in India there has been a drastic change due to demonetization of the economy. Our aim is to mine this data region wise and conclude whether region wise classification can give us more specific results or not.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"36 1","pages":"693-696"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79372657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943122
Paurush Bhulania, Heena Saxena, S. Tomar
Evolutionary is a study of immense curiosity to several researchers. Numerous fresh algorithmic rules are being developed on the natural processes in environment. Various form of the ρ resent algorithmic rules are also being evolved and the most advantageous method is being investigated. In this ρaper a concise opening to Practicalswarm Optimization (PSO) and a preface to differential evolution. Further, a explanation on the hybrid algorithm evolved with DE and PSO is e stablished and the consequent outcomes under procedure are also declared.
{"title":"An efficient hybrid approach using differential evolution and practical swarm optimization","authors":"Paurush Bhulania, Heena Saxena, S. Tomar","doi":"10.1109/CONFLUENCE.2017.7943122","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943122","url":null,"abstract":"Evolutionary is a study of immense curiosity to several researchers. Numerous fresh algorithmic rules are being developed on the natural processes in environment. Various form of the ρ resent algorithmic rules are also being evolved and the most advantageous method is being investigated. In this ρaper a concise opening to Practicalswarm Optimization (PSO) and a preface to differential evolution. Further, a explanation on the hybrid algorithm evolved with DE and PSO is e stablished and the consequent outcomes under procedure are also declared.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"21 1","pages":"47-51"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78437659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943164
Akshay Arora, Abhirup Khanna, Anmol Rastogi, A. Agarwal
In the past couple of years Cloud Computing has become an eminent part of the IT industry. As a result of its economic benefits more and more people are heading towards Cloud adoption. In present times there are numerous Cloud Service providers (CSP) allowing customers to host their applications and data onto Cloud. However Cloud Security continues to be the biggest obstacle in Cloud adoption and thereby prevents customers from accessing its services. Various techniques have been implemented by provides in order to mitigate risks pertaining to Cloud security. In this paper, we present a Hybrid Cryptographic System (HCS) that combines the benefits of both symmetric and asymmetric encryption thus resulting in a secure Cloud environment. The paper focuses on creating a secure Cloud ecosystem wherein we make use of multi-factor authentication along with multiple levels of hashing and encryption. The proposed system along with the algorithm are simulated using the CloudSim simulator. To this end, we illustrate the working of our proposed system along with the simulated results.
{"title":"Cloud security ecosystem for data security and privacy","authors":"Akshay Arora, Abhirup Khanna, Anmol Rastogi, A. Agarwal","doi":"10.1109/CONFLUENCE.2017.7943164","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943164","url":null,"abstract":"In the past couple of years Cloud Computing has become an eminent part of the IT industry. As a result of its economic benefits more and more people are heading towards Cloud adoption. In present times there are numerous Cloud Service providers (CSP) allowing customers to host their applications and data onto Cloud. However Cloud Security continues to be the biggest obstacle in Cloud adoption and thereby prevents customers from accessing its services. Various techniques have been implemented by provides in order to mitigate risks pertaining to Cloud security. In this paper, we present a Hybrid Cryptographic System (HCS) that combines the benefits of both symmetric and asymmetric encryption thus resulting in a secure Cloud environment. The paper focuses on creating a secure Cloud ecosystem wherein we make use of multi-factor authentication along with multiple levels of hashing and encryption. The proposed system along with the algorithm are simulated using the CloudSim simulator. To this end, we illustrate the working of our proposed system along with the simulated results.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"5 1","pages":"288-292"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87073451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943246
Abhinav Mathur, V. Saxena, S. Singh
Multimedia data has be en playing an important role in comprehending meaningful information to make it more entertaining and interactive. Most of the video contents may contain sarcastic, ironic or metaphorical conversation. To detect the presence of sarcastic words, words in subtitles of the video are being used to infer the information that is being conveyed. However, downloading subtitles of any video containing sarcasm and the η understanding it becomes a monotonous process. Many times, words in subtitles may not be sarcastic but are spoken sarcastically by changing the tone, pitch etc which is difficult to access by linguistic analysis alone. In this paper, we resolve the this issue of deleting sarcastic speech using a combination of audio mining technique and spectral features. The proposed work has two distinct modules. The first one is Audio Extraction which converts an input audio file of any format to .wav format, followed by second module Sarcastic Speech Recognition of the extracted .wav file using pitch as a major parameter. Our proposed approach has reported accuracy of 70%.
{"title":"Understanding sarcasm in speech using mel-frequency cepstral coefficent","authors":"Abhinav Mathur, V. Saxena, S. Singh","doi":"10.1109/CONFLUENCE.2017.7943246","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943246","url":null,"abstract":"Multimedia data has be en playing an important role in comprehending meaningful information to make it more entertaining and interactive. Most of the video contents may contain sarcastic, ironic or metaphorical conversation. To detect the presence of sarcastic words, words in subtitles of the video are being used to infer the information that is being conveyed. However, downloading subtitles of any video containing sarcasm and the η understanding it becomes a monotonous process. Many times, words in subtitles may not be sarcastic but are spoken sarcastically by changing the tone, pitch etc which is difficult to access by linguistic analysis alone. In this paper, we resolve the this issue of deleting sarcastic speech using a combination of audio mining technique and spectral features. The proposed work has two distinct modules. The first one is Audio Extraction which converts an input audio file of any format to .wav format, followed by second module Sarcastic Speech Recognition of the extracted .wav file using pitch as a major parameter. Our proposed approach has reported accuracy of 70%.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"25 1","pages":"728-732"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83255934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}