{"id":598,"date":"2015-06-04T13:28:16","date_gmt":"2015-06-04T07:58:16","guid":{"rendered":"http:\/\/demo.renderbit.com\/iem-group\/college-of-engineering\/?page_id=598"},"modified":"2019-02-24T21:05:12","modified_gmt":"2019-02-24T15:35:12","slug":"paper-publications","status":"publish","type":"page","link":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","title":{"rendered":"Paper Publications"},"content":{"rendered":"<h3>Journal<\/h3>\n<p><strong>2012<\/strong><br \/>\n1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012<\/p>\n<p><strong>2013<\/strong><br \/>\n2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing Information about Everything Around Us&#8221;, International Journal of Report and Opinion, ISSN: 1553-9865, Vol. 5, Issue 4, pp:1-7, ISSN: April 2013.<br \/>\n3. Mr. Kaushik Banerjee, Mr. Subhas Das, Mr. Rahul Sourav Singh,Mr. Souren Jana &#8220;Automated Mineral Detection using Sonar Waves&#8221;, International of Scientific &amp; Engineering Research(IJSER),ISSN: 22295518, Volume 4,Issue 5, pp.112-115, May,2013<br \/>\n4. M. K Sarkar and T. Chatterjee, &#8220;Reverse Engineering: An Analysis of Dynamic Behavior of Object Oriented Programs by Extracting UML Interaction Diagram&#8221;, International Journal of Computer Technology &amp; Applications, ISSN: 2229-6093, Vol. 4, Issue 3, pp. 378 -383, May-June 2013.<br \/>\n5. M. K Sarkar, T. Chatterjee and D. Mukherjee, &#8220;Reverse Engineering: An Analysis of Static Behavior of Object Oriented Programs by Extracting UML Class Diagram&#8221;, International Journal of Advanced Computer Research, ISSN: 2249-7277, Vol. 3, Issue 12, Sept. 2013.<\/p>\n<p><strong>2014<\/strong><br \/>\n6. M. K Sarkar and T. Chatterjee, &#8220;Enhancing Data Storage Security in Cloud Computing Through Steganography&#8221;, ACEEE International Journal on Network Security, ISSN: 2152-5064, Vol. 5, Issue. 1, pp: 13-19, Jan 2014.<br \/>\n7. Rahul Sourav Singh,Rupayan Das, Dipta Mukherjee,Prannay Bothra , &#8220;RDR cube cipher an extension to Vignere Cipher&#8221;,IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:22788727 Volume 16, Issue 2, Ver. III(Mar-Apr.2014),PP 64-71.<br \/>\n8. Kaustab Pal,Rupayan Das,Rahul Sourav Singh, Dipta Mukherjee,&#8221;A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique&#8221;International Journal of Computer Applications 105(11):35-37,DOI: 10.5120\/18424-9742,November 2014.<br \/>\n9. Praveen Kumar Sharma, Sourav Saha, Saraswati Kumari -&#8220;Study and Design of a Shannon-Energy-Envelope based Phonocardiogram Peak Spacing Analysis for Estimating Arrhythmic Heart-Beat&#8221;,International Journal of Scientific and Research Publications- Volume 4, Issue 9, September 2014 Edition.<\/p>\n<p>10. Wrishin Sarkar, Himadri Nath Saha, Arpita Ghosh, Praveen Kr. Sharma-&#8221; Modified Greedy Methodology to Solve Travelling Salesperson Problem Using Ant Colony Optimization and Comfort Factor&#8221;- International Journal of Scientific and Research Publications- Volume 4, Issue 10, October 2014 Edition.<br \/>\n11. Wrishin Sarkar, Himadri Nath Saha,Sourav Kumar Dhar, Sandipan Roy &#8220;Advanced Heuristic Technique For Solving Travelling Salesperson Problem Using Ant Colony Optimization&#8221;, IJCSN International Journal of Computer Science and Network, Volume 3, Issue 3,ISSN: 2277-5420,pp.11 June 2014.<\/p>\n<p><strong>2015<\/strong><br \/>\n12. M. K Sarkar, R. Das and Dr. V S Dhaka &#8220;A Symmetric Key Based Framework for Data Security in Cloud Computing&#8221;, International Journal of Advanced Networking and Applications, ISSN: 0975-0282 Special Issue, Feb-2015.<br \/>\n13. T Chatterjee, M. K Sarkar and Dr. V S Dhaka &#8220;Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)&#8221;, IJCSN International Journal of Computer Science and Network, ISSN : 2277-5420, Volume 4, Issue 2, pp:198-207, April 2015.<\/p>\n<p><strong>2016<\/strong><br \/>\n16. Ratul Dey and Himadri Nath Saha &#8220;Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) \u00e2\u20ac\u201cA Review&#8221;, International Journal of Emerging Trends &amp; Technology in Computer Science (IJETTCS), Vol. 5, Issue 1 ISSN 2278 \u00e2\u20ac\u201c 6856 February 2016<\/p>\n<h3>CONFERENCE<\/h3>\n<p><strong>2013<\/strong><br \/>\n1. Dipta Mukherjee, Anandarup Mukherjee, Somen Nayak &#8220;A Hybrid Stegano- Cryptographic Approach to Data Obfuscation Using LSB Technique&#8221;, IEMCON, ISSN: 978-81-923777-9-7, 165-169, August 2013.<\/p>\n<p><strong>2014<\/strong><br \/>\n2. Anindya Shankar Shukla,Rupayan Das,Rahul Sourav Singh, Dipta Mukherjee &#8220;Bar Cipher: A Robust technique for data hiding using the concept of Barcode&#8221;, Proceedings of 1st International Science &amp; Technology Congress 2014,Elsevier publication,ISBN: 9789351072485.<br \/>\n3. Ratul Dey, Sanjay Chakraborty, Lopamudra Dey, &#8220;Weather Forecasting using Convex Hull &amp; K-mean Technique an Approach&#8221; in proc. of ELSEVIER, IEM CONGRESS &#8211; 2014, pp. 288-295<\/p>\n<p><strong>2015<\/strong><br \/>\n4. M. K Sarkar and R. Das, Dr. V S Dhaka &#8220;A Symmetric Key Based Framework for Data Security in Cloud Computing &#8220;, in National Conference on Current Research Trends in Cloud Computing &amp; Big Data &#8211; CRTCCBD on Feb 6-7, 2015.<\/p>\n<p>5. M. Singh, R. Das, M. K Sarkar, K. Majumder, S. K Sarkar&#8221; KT3F: A Key based Two Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network&#8221; in International Conference on Computer and Communication Technologies &#8211; IC3T on July 24-26, 2015, AISC series of Springer 11156.<\/p>\n<p>6. Angshuman Khan,Souvik Saha,Asmita Chakraborty,Rupayan Das,&#8221;Digital Multiplier to Multiply Special Integers using ancient Vedic Mathematics&#8221;,International Conference on Inter Disciplinary Research in Engineering and Technology 2015 (ICIDRET 2015).<\/p>\n<p>7. Angshuman Khan,Rupayan Das,&#8221;Novel Approach of Multiplier Design using ancient Vedic Mathematics&#8221;,Second International Conference on Information systems Design and Intelligent Applications(INDIA-2015),Springer series of Advances in Intelligent Systems and Computing(AISC) Volume-340,pp.265-272,DOI:10.1007\/978-81-322,247-7_28,January,2015.<\/p>\n<p>8. Ratul Dey, Sanjay Chakraborty, &#8220;Convex-hull &amp; DBSCAN clustering to predict future weather&#8221; in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-8.<\/p>\n<p>9. Saptarshi Banerjee, Arnab Majumdar, Himadri Nath Saha and Ratul Dey &#8220;Modified Ant Colony Optimization (ACO) based routing protocol for MANET,&#8221; in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-7.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal 2012 1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; <a href=\"https:\/\/uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":451,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-598","page","type-page","status-publish","hentry","wpautop"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paper Publications - UEM Kolkata<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paper Publications - UEM Kolkata\" \/>\n<meta property=\"og:description\" content=\"Journal 2012 1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; Continued\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/\" \/>\n<meta property=\"og:site_name\" content=\"UEM Kolkata\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-24T15:35:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dev.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/\",\"url\":\"https:\\\/\\\/dev.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/\",\"name\":\"Paper Publications - UEM Kolkata\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/#website\"},\"datePublished\":\"2015-06-04T07:58:16+00:00\",\"dateModified\":\"2019-02-24T15:35:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dev.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dev.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dev.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Science and Engineering (CSE ) College in Kolkata\",\"item\":\"https:\\\/\\\/dev.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Paper Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/#website\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/\",\"name\":\"UEM Kolkata\",\"description\":\"University of Engineering and Management Kolkata\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper Publications - UEM Kolkata","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","og_locale":"en_US","og_type":"article","og_title":"Paper Publications - UEM Kolkata","og_description":"Journal 2012 1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; Continued","og_url":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","og_site_name":"UEM Kolkata","article_modified_time":"2019-02-24T15:35:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","url":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","name":"Paper Publications - UEM Kolkata","isPartOf":{"@id":"https:\/\/uem.edu.in\/uem-kolkata\/#website"},"datePublished":"2015-06-04T07:58:16+00:00","dateModified":"2019-02-24T15:35:12+00:00","breadcrumb":{"@id":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uem.edu.in\/uem-kolkata\/"},{"@type":"ListItem","position":2,"name":"Computer Science and Engineering (CSE ) College in Kolkata","item":"https:\/\/dev.uem.edu.in\/uem-kolkata\/department-of-cse\/"},{"@type":"ListItem","position":3,"name":"Paper Publications"}]},{"@type":"WebSite","@id":"https:\/\/uem.edu.in\/uem-kolkata\/#website","url":"https:\/\/uem.edu.in\/uem-kolkata\/","name":"UEM Kolkata","description":"University of Engineering and Management Kolkata","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uem.edu.in\/uem-kolkata\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack-related-posts":[{"id":433,"url":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/","url_meta":{"origin":598,"position":0},"title":"Paper Publication","author":"UEM Group","date":"May 22, 2015","format":false,"excerpt":"Dr. Debika Bhattacharyya Professor & HoD \u2013 Computer Science and Engineering bdebika@yahoo.com POST DOCTORAL PUBLICATIONS Book Chapter: Dr. Debika Bhattacharyya et al., \u201cOverview of End-to-End Wimax Network Achitecture\u201d, accepted as a book chapter for the book \u201cWimax Security and Quality of Service: Providing an End-to-End Explanation\u201d, Book editors: Seok-Yee Tang,\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1844,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-electrical-engineering\/paper-publications\/","url_meta":{"origin":598,"position":1},"title":"Paper Publications","author":"UEM Group","date":"March 16, 2016","format":false,"excerpt":"Books Published: Sl No Name Details 1 Dr. N. K. Mandal A Text Book of Electrical Technology NabaPrakashani, Kolkata(2017) Book Chapter Published: Sl No Name Details 1 Dr. N. K. Mandal Chapter 5: Performance Evaluation of Robotic Systems Book Name: Novel Perspective of Engineering Research Book Publisher International ISBN: 978-93-5547-166-6\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6690,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-computer-applications\/achievements\/","url_meta":{"origin":598,"position":2},"title":"Achievements","author":"UEM Group","date":"February 9, 2019","format":false,"excerpt":"Student Achievements: Research Paper Published (International Journal): Sl no Name Details 1 Sayan Kumar Dey, Deepjyoti Chakraborty, Aritra Ghosal, Shadab Akhtar \u201cCharacter Segmentation for Handwritten Bangla Words using Image Processing\u201d, P.Mitra, K.Bhattacharjee, A.Das, et. al., in American Journal of Electronics & Communication (AJEC), Vol. 1, Issue 3, Pp. 8 -\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1828,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-ece\/paper-publications\/","url_meta":{"origin":598,"position":3},"title":"List Of Publications","author":"UEM Group","date":"March 16, 2016","format":false,"excerpt":"\u00a0 Soumen Banerjee, and Susanta Kumar Parui, \u201cCompact One-Sixth Mode Substrate Integrated Waveguide based Antennas for Wireless Communication and Public Safety Systems,\u201d Wireless Personal Communications, Springer, vol. 103, no. 4, pp. 2909\u20132925, Dec. 2018. Soumen Banerjee, Biswarup Rana, and Susanta Kumar Parui, \u201cGain Augmentation of a HMSIW based Equilateral Triangular\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1786,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-computer-applications\/paper-publications\/","url_meta":{"origin":598,"position":4},"title":"Paper Publications","author":"UEM Group","date":"March 16, 2016","format":false,"excerpt":"1. Sandip Das, Soumitra Kumar Mandal, \"Performance Analysis of QPSK ModulationTechnique in WCDMA downlink over AWGN and Rayleigh Fading Channel\" in National Conference on \"Emerging Trends in Information and Communication Technology\" - 2011. 2. Sandip Das, Soumitra Kumar Mandal, \"Performance Analysis of WCDMA Downlink Spreading in Rayleigh Multipath Fading Channel\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6684,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-computer-applications\/research-and-publications\/","url_meta":{"origin":598,"position":5},"title":"Research and Publications","author":"UEM Group","date":"February 9, 2019","format":false,"excerpt":"Research Areas Image Processing IOT Blockchain List of Publications :- Book Published: \u00a0 S no Name Details 1 Prof. (Dr.) Anirban Das Windows Programming using Visual C++ & Allied Languages , SCITECH Publications, March 2018, ISBN: 9789385983559 2 Prof. (Dr.) Anirban Das Optimized Reach of International Digital Library in Indian\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/P7ldC2-9E","_links":{"self":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/comments?post=598"}],"version-history":[{"count":7,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/598\/revisions"}],"predecessor-version":[{"id":7336,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/598\/revisions\/7336"}],"up":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/451"}],"wp:attachment":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/media?parent=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}