Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200012
Satvik Sabarad, Shubham Gupta
With a massive leap of increment in overall energy efficiency through the paradigm shift from internal combustion engine vehicles to electric vehicles (EVs), people have evolved their ways to make the transition towards sustainable transportation. Regenerative braking in the automobiles is considered as one of the efficient ways to recover the energy wasted during braking of a vehicle. It is also a practical approach for EVs to extend their driving range. The energy accumulated due to regenerative braking heavily depends on the driving style and traffic conditions. There is much research done in the past related to regenerative braking but inculcation of driving style and traffic conditions in the quantification of energy is limited. The originality of this study is to determine if the regenerative braking is effective for an electric vehicle over a particular duty cycle. This work presents a physical data acquisition setup, which consists of various sensors, data recorders, and micro-controllers that acquire the driving data like velocities at different instances, coasting distance and duration from the vehicle. This work also proposes a mathematical model that uses the acquired data to quantify the amount of energy generated over a duty cycle in a particular electric vehicle. Currently, a two-wheeler electric bike is considered for the quantification of regenerated braking energy over various duty cycles viz. urban, semi-urban, and highway driving. The physical setup and the process of quantification can be extended to various electric vehicles to quantify the regenerative braking energy over different duty cycles. A different approach of energy conservation method is demonstrated for the development of the mathematical model to accurately quantify the regenerated braking energy. This work also focuses on the comparison of energy generated due to regenerative braking between a two-wheeler electric and internal combustion vehicle.
{"title":"Quantification of regenerative braking energy in a two-wheeler incorporating various duty cycles","authors":"Satvik Sabarad, Shubham Gupta","doi":"10.1109/ComPE49325.2020.9200012","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200012","url":null,"abstract":"With a massive leap of increment in overall energy efficiency through the paradigm shift from internal combustion engine vehicles to electric vehicles (EVs), people have evolved their ways to make the transition towards sustainable transportation. Regenerative braking in the automobiles is considered as one of the efficient ways to recover the energy wasted during braking of a vehicle. It is also a practical approach for EVs to extend their driving range. The energy accumulated due to regenerative braking heavily depends on the driving style and traffic conditions. There is much research done in the past related to regenerative braking but inculcation of driving style and traffic conditions in the quantification of energy is limited. The originality of this study is to determine if the regenerative braking is effective for an electric vehicle over a particular duty cycle. This work presents a physical data acquisition setup, which consists of various sensors, data recorders, and micro-controllers that acquire the driving data like velocities at different instances, coasting distance and duration from the vehicle. This work also proposes a mathematical model that uses the acquired data to quantify the amount of energy generated over a duty cycle in a particular electric vehicle. Currently, a two-wheeler electric bike is considered for the quantification of regenerated braking energy over various duty cycles viz. urban, semi-urban, and highway driving. The physical setup and the process of quantification can be extended to various electric vehicles to quantify the regenerative braking energy over different duty cycles. A different approach of energy conservation method is demonstrated for the development of the mathematical model to accurately quantify the regenerated braking energy. This work also focuses on the comparison of energy generated due to regenerative braking between a two-wheeler electric and internal combustion vehicle.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"40 1","pages":"469-474"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90622544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200153
Ketanpreet Kaur, Vikrant Sharma, M. Sachdeva
In this ever updating digitalized world, everything is connected with just few touches away. Our phone is connected with things around us, even we can see live video of our home, shop, institute or company on the phone. But we can’t track suspicious activity 24*7 hence needed a smart system to track down any suspicious activity taking place, so it automatically notifies us before any robbery or dangerous activity takes place. We have proposed a framework to tackle down this security matter with the help of sensors enabled cameras(IoT) connected through a FOG layer hence called FOGIoT which consists of small servers configured with Human Activity Analysis Algorithm. Any suspicious activity analyzed will be reported to responsible personnel and the due action will be taken place.
{"title":"Framework for FOGIoT based Smart Video Surveillance System (SVSS)","authors":"Ketanpreet Kaur, Vikrant Sharma, M. Sachdeva","doi":"10.1109/ComPE49325.2020.9200153","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200153","url":null,"abstract":"In this ever updating digitalized world, everything is connected with just few touches away. Our phone is connected with things around us, even we can see live video of our home, shop, institute or company on the phone. But we can’t track suspicious activity 24*7 hence needed a smart system to track down any suspicious activity taking place, so it automatically notifies us before any robbery or dangerous activity takes place. We have proposed a framework to tackle down this security matter with the help of sensors enabled cameras(IoT) connected through a FOG layer hence called FOGIoT which consists of small servers configured with Human Activity Analysis Algorithm. Any suspicious activity analyzed will be reported to responsible personnel and the due action will be taken place.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"51 1","pages":"797-799"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90661855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200072
Utpal Shrivastava, Neelam Sharma
Monitoring of the data traffic is done by Intrusion detection system (IDS) in the network and identify possibility of attacks with can cause harm in the network. The growing digital age where so many host are connected to network and digital transaction take place, it becomes important to secure one’s data in the network. In the proposed work, NSL-KDD train dataset in ration 8:2 is used to train and test a model. To identify the impact of different set of dataset features considered by comparing the accuracy calculated.
{"title":"Feature Selection and Implementation of IDS using Boosting algorithm","authors":"Utpal Shrivastava, Neelam Sharma","doi":"10.1109/ComPE49325.2020.9200072","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200072","url":null,"abstract":"Monitoring of the data traffic is done by Intrusion detection system (IDS) in the network and identify possibility of attacks with can cause harm in the network. The growing digital age where so many host are connected to network and digital transaction take place, it becomes important to secure one’s data in the network. In the proposed work, NSL-KDD train dataset in ration 8:2 is used to train and test a model. To identify the impact of different set of dataset features considered by comparing the accuracy calculated.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"25 1","pages":"853-858"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89004009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200041
Sunita Saha, A. Papanikolaou, J. Martusewicz, R. Sitnik
Augmented reality is a field of presenting and visualizing the real-world problem enhanced by computer-generated algorithms. The computer-generated perceptual information becomes a premier research topic to solve various 3D problems. In this present age, it is very important to digitize the process of work and store it to keep track of the changes over time. This work is focused on storing digital documentation of the restoration of cultural heritage objects concerning the parameter of occurrences of surface geometry change on the surface of the objects. The paper shows the application of structured light techniques to the analysis of a cultural heritage object during restoration. In order to detect and visualize changes a global geometry analysis was applied and presented the outcome through a global distance histogram. The study also includes the discussion of facing possible challenges during the development of the algorithms for the change analysis.
{"title":"Augmented Reality in Tracking the Surface Geometry Change of Cultural Heritage Objects","authors":"Sunita Saha, A. Papanikolaou, J. Martusewicz, R. Sitnik","doi":"10.1109/ComPE49325.2020.9200041","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200041","url":null,"abstract":"Augmented reality is a field of presenting and visualizing the real-world problem enhanced by computer-generated algorithms. The computer-generated perceptual information becomes a premier research topic to solve various 3D problems. In this present age, it is very important to digitize the process of work and store it to keep track of the changes over time. This work is focused on storing digital documentation of the restoration of cultural heritage objects concerning the parameter of occurrences of surface geometry change on the surface of the objects. The paper shows the application of structured light techniques to the analysis of a cultural heritage object during restoration. In order to detect and visualize changes a global geometry analysis was applied and presented the outcome through a global distance histogram. The study also includes the discussion of facing possible challenges during the development of the algorithms for the change analysis.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"1 2 1","pages":"537-542"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89651949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200081
Mohammad Zeyad, S. M. Masum Ahmed, MD. Maruf, Md. Shehzad, Md. Abul Ala Walid
This paper shows such a form of protected remote control framework based on Microcontroller (ATmega328p) that will operate via an Android cell phone Application and offers powerful protection to secure home appliances from unwanted users. The intended application’s name is ‘HACA (Home Appliances Controlling Application)-App’. At first, to operate the app, Wi-Fi/Bluetooth/Mobile Data is needed to connect with the app. The user will set the password as per own will. Additionally, the user can change the password at any time. A dual password verification system will be included in the application as well as the system. After the password setting, the software should be ready to use to monitor the timing of the loading of home appliances ON/OFF. Through using this smartphone app the load could be managed without using any switches. No need for a manual fan speed controller as the fan speed can be controlled through the HACA mobile app. Although, user can control the selected home appliances through the system by using the app from any room of the flat. Moreover, remote control of these selected appliances will be performed through Bluetooth or Mobile Data or with Wi-Fi is accommodated in the system. Besides, accidentally keeping lights and fans ON can be stopped easily by using this device from anywhere. By doing this the loss of the electricity consumption can be prevented. The App aims to make human lives standard and prevent the loss of electricity consumption which will make humans daily life more comfortable.
{"title":"Design & Implementation of a Micro-Controller based Home Appliances Controlling with Dual Verification Application System","authors":"Mohammad Zeyad, S. M. Masum Ahmed, MD. Maruf, Md. Shehzad, Md. Abul Ala Walid","doi":"10.1109/ComPE49325.2020.9200081","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200081","url":null,"abstract":"This paper shows such a form of protected remote control framework based on Microcontroller (ATmega328p) that will operate via an Android cell phone Application and offers powerful protection to secure home appliances from unwanted users. The intended application’s name is ‘HACA (Home Appliances Controlling Application)-App’. At first, to operate the app, Wi-Fi/Bluetooth/Mobile Data is needed to connect with the app. The user will set the password as per own will. Additionally, the user can change the password at any time. A dual password verification system will be included in the application as well as the system. After the password setting, the software should be ready to use to monitor the timing of the loading of home appliances ON/OFF. Through using this smartphone app the load could be managed without using any switches. No need for a manual fan speed controller as the fan speed can be controlled through the HACA mobile app. Although, user can control the selected home appliances through the system by using the app from any room of the flat. Moreover, remote control of these selected appliances will be performed through Bluetooth or Mobile Data or with Wi-Fi is accommodated in the system. Besides, accidentally keeping lights and fans ON can be stopped easily by using this device from anywhere. By doing this the loss of the electricity consumption can be prevented. The App aims to make human lives standard and prevent the loss of electricity consumption which will make humans daily life more comfortable.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"25 1","pages":"665-670"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86673740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200067
Supriya Katwe, N. Iyer
The main task in navigation of an autonomous vehicle is to have accurate and robust localization. There are variety of localization techniques in study using particle filter; for localization with or without using map information in the measurements. There is a lack of study in localization methods employing map data in particle filter. This paper summarizes the localization techniques that use map information in particle filter for estimation. The study of various literature in the particle filter for localization using map data shows that, accurate and robust localization can be achieved for an autonomous vehicle provided the map to be used in the measurements is constructed precisely with the necessary features like road curbs, edges, trajectories etc.
{"title":"Map-Based Particle Filter for Localization: Autonomous Vehicle","authors":"Supriya Katwe, N. Iyer","doi":"10.1109/ComPE49325.2020.9200067","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200067","url":null,"abstract":"The main task in navigation of an autonomous vehicle is to have accurate and robust localization. There are variety of localization techniques in study using particle filter; for localization with or without using map information in the measurements. There is a lack of study in localization methods employing map data in particle filter. This paper summarizes the localization techniques that use map information in particle filter for estimation. The study of various literature in the particle filter for localization using map data shows that, accurate and robust localization can be achieved for an autonomous vehicle provided the map to be used in the measurements is constructed precisely with the necessary features like road curbs, edges, trajectories etc.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"35 1","pages":"303-304"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85627727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200060
A. Mishra, Dr. Brijesh Kumar Tripathi, Sudhir Singh Soam
Multiple sequence alignment (MSA) is an elementary task of bioinformatics where the alignment of three or more biological sequences is produced in a way that helps to identify the homologous regions in the sequences. This research paper proposes a genetic algorithm-based optimization approach that can enhance the value of multiple sequence alignment (MSA) generated by the progressive technique. Mutation operators like gap insertion mutation and gap removal mutations are applied to enhance the value of the MSA obtained by the progressive technique of alignment.
{"title":"A Genetic Algorithm based Approach for the Optimization of Multiple Sequence Alignment","authors":"A. Mishra, Dr. Brijesh Kumar Tripathi, Sudhir Singh Soam","doi":"10.1109/ComPE49325.2020.9200060","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200060","url":null,"abstract":"Multiple sequence alignment (MSA) is an elementary task of bioinformatics where the alignment of three or more biological sequences is produced in a way that helps to identify the homologous regions in the sequences. This research paper proposes a genetic algorithm-based optimization approach that can enhance the value of multiple sequence alignment (MSA) generated by the progressive technique. Mutation operators like gap insertion mutation and gap removal mutations are applied to enhance the value of the MSA obtained by the progressive technique of alignment.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"9 1","pages":"415-418"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82233213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200004
N. Das, Kaushik Chandra Deva Sarma
A theoretical process of obtaining depletion width for surrounded channel Junction less field effect transistor is presented. Solution of 1-D Poisson’s equation under partial depletion leads to development of depletion width model. An analysis on how depletion width values varies with applied gate field, gate dielectric thickness, gate dielectric materials and channel position is also performed.
{"title":"Depletion Width Modelling of Surrounded Channel Junctionless Field Effect Transistor","authors":"N. Das, Kaushik Chandra Deva Sarma","doi":"10.1109/ComPE49325.2020.9200004","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200004","url":null,"abstract":"A theoretical process of obtaining depletion width for surrounded channel Junction less field effect transistor is presented. Solution of 1-D Poisson’s equation under partial depletion leads to development of depletion width model. An analysis on how depletion width values varies with applied gate field, gate dielectric thickness, gate dielectric materials and channel position is also performed.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"11 1","pages":"611-614"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81779481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200144
Bolivia Konthoujam, Satyabrat Malla Bujar Baruah, Soumik Roy
Synapse is the point of impulse conduction between neurons. After receiving action potential at the axonal terminal, the presynaptic neuron releases neurotransmitter chemicals to the postsynaptic neuron. The agonist molecules bind to the receptors of the postsynaptic neuron and change its functions. The proposed work is centered on interference in two synaptic system due to mobility of NMDA neurotransmitter with probability of leaking to the nearby synapse. Such leaky event of neurotransmitters from one synapse to nearby synapses could contribute either positively or negatively, depending on the type of ion channels it opens. The proposed model suggests change in amplitude and strength of the post-synaptic received signal significantly depends upon this leaky parameter. The model suggests increase in leakage of NMDA neurotransmitter results in lowered depolarization of post-synaptic potential and increased depolarization in nearby post-synapse and vice versa.
{"title":"Interference Model for NMDA Receptor","authors":"Bolivia Konthoujam, Satyabrat Malla Bujar Baruah, Soumik Roy","doi":"10.1109/ComPE49325.2020.9200144","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200144","url":null,"abstract":"Synapse is the point of impulse conduction between neurons. After receiving action potential at the axonal terminal, the presynaptic neuron releases neurotransmitter chemicals to the postsynaptic neuron. The agonist molecules bind to the receptors of the postsynaptic neuron and change its functions. The proposed work is centered on interference in two synaptic system due to mobility of NMDA neurotransmitter with probability of leaking to the nearby synapse. Such leaky event of neurotransmitters from one synapse to nearby synapses could contribute either positively or negatively, depending on the type of ion channels it opens. The proposed model suggests change in amplitude and strength of the post-synaptic received signal significantly depends upon this leaky parameter. The model suggests increase in leakage of NMDA neurotransmitter results in lowered depolarization of post-synaptic potential and increased depolarization in nearby post-synapse and vice versa.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"191 1","pages":"715-718"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82707275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/ComPE49325.2020.9200000
A. K. Raibaruah, Angshumala Talukdar, Kaushik Chandra Deva Sarma
We present here characteristics study of an undoped Double gate Junctionless field effect transistor (UnDGJLFET). The body of the device is intrinsic in nature. A comparative simulation study on electrical performance of the undoped DGJLFET and a DGJLFET with a doping concentration of 1019/cm3 has been done in TCAD. The study shows that the UnDGJLFET exhibits much lower subthreshold swing and higher threshold voltage than the doped one. However due to less number of charge carriers the on current is much lower for the UnDGJLFET compared to that of doped JLFET.
{"title":"Undoped Junctionless Field Effect Transistor","authors":"A. K. Raibaruah, Angshumala Talukdar, Kaushik Chandra Deva Sarma","doi":"10.1109/ComPE49325.2020.9200000","DOIUrl":"https://doi.org/10.1109/ComPE49325.2020.9200000","url":null,"abstract":"We present here characteristics study of an undoped Double gate Junctionless field effect transistor (UnDGJLFET). The body of the device is intrinsic in nature. A comparative simulation study on electrical performance of the undoped DGJLFET and a DGJLFET with a doping concentration of 1019/cm3 has been done in TCAD. The study shows that the UnDGJLFET exhibits much lower subthreshold swing and higher threshold voltage than the doped one. However due to less number of charge carriers the on current is much lower for the UnDGJLFET compared to that of doped JLFET.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"111 1","pages":"725-727"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82693771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}