Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00102
Ma Ping, Shao Wei-ping, Zhang Lei, Wu De-sheng, Lu Tao
Based on the requirement to ensure the efficient and reliable operation of power wireless heterogeneous network, the intelligent management strategy of power wireless heterogeneous network link based on traffic balance is proposed. The strategy consists of four processes which are traffic collection process, traffic prediction analysis process, traffic diversion process and traffic balance management process. The algorithm of traffic balancing degree of the whole network is put forward, which is conducive to balancing the network traffic by adjusting the threshold of the link. This strategy has been widely used in many areas, which effectively improves the efficiency of link intelligent management in power wireless heterogeneous network.
{"title":"Intelligent Management Strategy of Power Wireless Heterogeneous Network Link Based on Traffic Balance","authors":"Ma Ping, Shao Wei-ping, Zhang Lei, Wu De-sheng, Lu Tao","doi":"10.1109/CISCE50729.2020.00102","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00102","url":null,"abstract":"Based on the requirement to ensure the efficient and reliable operation of power wireless heterogeneous network, the intelligent management strategy of power wireless heterogeneous network link based on traffic balance is proposed. The strategy consists of four processes which are traffic collection process, traffic prediction analysis process, traffic diversion process and traffic balance management process. The algorithm of traffic balancing degree of the whole network is put forward, which is conducive to balancing the network traffic by adjusting the threshold of the link. This strategy has been widely used in many areas, which effectively improves the efficiency of link intelligent management in power wireless heterogeneous network.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114279443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00097
Tianyu Xia, Zhanghao Ye, Haoning Wu, Yiding Liu
In order to achieve real-time and accurate data mining, this paper proposes a data association rules mining method based on RBF neural network optimization algorithm. On the basis of considering the constraint association rules, the data frequent itemsets are reduced to get the corresponding candidate data sets that meet the rules, and the update of the data frequent itemsets for user needs is completed. The candidate data set is input to RBF neural network for training, the network output is optimized by combining with rough set theory, the user demand data table and quadruple are constructed, the user demand attributes are described, and the user demand data is obtained by using upper bound pruning method. Through the upper bound pruning method, the user demand data is obtained and real-time mining is realized. Compared with other data mining algorithms, the simulation results show that the performance of the data mining algorithm proposed in this paper is less constrained by the proportion of redundant data and the size of data, the accuracy of data mining is higher, and it has better stability.
{"title":"Data Association Rules Mining Method Based on RBF Neural Network Optimization Algorithm","authors":"Tianyu Xia, Zhanghao Ye, Haoning Wu, Yiding Liu","doi":"10.1109/CISCE50729.2020.00097","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00097","url":null,"abstract":"In order to achieve real-time and accurate data mining, this paper proposes a data association rules mining method based on RBF neural network optimization algorithm. On the basis of considering the constraint association rules, the data frequent itemsets are reduced to get the corresponding candidate data sets that meet the rules, and the update of the data frequent itemsets for user needs is completed. The candidate data set is input to RBF neural network for training, the network output is optimized by combining with rough set theory, the user demand data table and quadruple are constructed, the user demand attributes are described, and the user demand data is obtained by using upper bound pruning method. Through the upper bound pruning method, the user demand data is obtained and real-time mining is realized. Compared with other data mining algorithms, the simulation results show that the performance of the data mining algorithm proposed in this paper is less constrained by the proportion of redundant data and the size of data, the accuracy of data mining is higher, and it has better stability.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00016
Ge Zheng, Yiping Yao, Dongdong Wang, J. Tian
This study is aiming at the application of DS (Direct Sequence)/FFH (Fast Frequency Hopping) hybrid spread spectrum technology in satellite communications. A system model was established and key technologies were analyzed. The DS/FFH synchronization of hybrid spread-spectrum satellite communication system includes two stages, such as acquisition and tracking. In the acquisition stage, the acquisition is based on the parallel waiting through PMF-FFT structure, which can achieve rapid acquisition; in the tracking stage, through the carrier phase lock loop and the pseudo code tracking loop, the accurate alignment of the carrier phase of the received signal and the phase of the direct spread pseudo code is realized respectively. Due to the group delay distortion the carrier phase is no longer continuous, which affects the reception synchronization. This paper proposes group delay equalization for the channel through the analysis of four type of group delay and corresponding cause in the signal transmission process. Finally, comparisons analysis of the anti-interference performance of the system under the conditions of broadband, narrowband, multi-frequency and partial frequency band interference is performed through simulation. The results can provide certain guiding significance for the system anti-interference design and engineering implementation.
{"title":"Study of an Application of Hybrid Spread Spectrum Technology in Satellite Communication","authors":"Ge Zheng, Yiping Yao, Dongdong Wang, J. Tian","doi":"10.1109/CISCE50729.2020.00016","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00016","url":null,"abstract":"This study is aiming at the application of DS (Direct Sequence)/FFH (Fast Frequency Hopping) hybrid spread spectrum technology in satellite communications. A system model was established and key technologies were analyzed. The DS/FFH synchronization of hybrid spread-spectrum satellite communication system includes two stages, such as acquisition and tracking. In the acquisition stage, the acquisition is based on the parallel waiting through PMF-FFT structure, which can achieve rapid acquisition; in the tracking stage, through the carrier phase lock loop and the pseudo code tracking loop, the accurate alignment of the carrier phase of the received signal and the phase of the direct spread pseudo code is realized respectively. Due to the group delay distortion the carrier phase is no longer continuous, which affects the reception synchronization. This paper proposes group delay equalization for the channel through the analysis of four type of group delay and corresponding cause in the signal transmission process. Finally, comparisons analysis of the anti-interference performance of the system under the conditions of broadband, narrowband, multi-frequency and partial frequency band interference is performed through simulation. The results can provide certain guiding significance for the system anti-interference design and engineering implementation.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00037
Hongrui Peng
With the prosperity of the information era and the maturity of computer technology, artificial intelligence has attracted much more attention. The emergence of Graph Neural Networks (GNNs) as a theory that can process non-Euclidean structure data such as graph data makes more applications possible. Graph Convolutional Neural Networks (GCNs), as a theoretical branch of GNNs, uses new theories to innovate and optimize on the basis of inheriting the ideas of predecessors, allowing the rapid development of this field. In this article, the author mainly introduces the basic theory of converting graph data into Euclidean structure data, which is the most important part of GCNs, distinguishing from Convolutional Neural Networks (CNNs). The successful applications of GCNs in the fields of recommendation systems and traffic prediction are also listed. Through the analysis of theory and applications, the shortcomings and development prospects of GNNs are discussed. Finally, the author points out that GCNs still have room for improvement in terms of data scale, network layers, and dynamics and complex nature of graph data.
{"title":"Graph Convolutional Networks: An Analysis of Method and Applications in Different Fields and Systems","authors":"Hongrui Peng","doi":"10.1109/CISCE50729.2020.00037","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00037","url":null,"abstract":"With the prosperity of the information era and the maturity of computer technology, artificial intelligence has attracted much more attention. The emergence of Graph Neural Networks (GNNs) as a theory that can process non-Euclidean structure data such as graph data makes more applications possible. Graph Convolutional Neural Networks (GCNs), as a theoretical branch of GNNs, uses new theories to innovate and optimize on the basis of inheriting the ideas of predecessors, allowing the rapid development of this field. In this article, the author mainly introduces the basic theory of converting graph data into Euclidean structure data, which is the most important part of GCNs, distinguishing from Convolutional Neural Networks (CNNs). The successful applications of GCNs in the fields of recommendation systems and traffic prediction are also listed. Through the analysis of theory and applications, the shortcomings and development prospects of GNNs are discussed. Finally, the author points out that GCNs still have room for improvement in terms of data scale, network layers, and dynamics and complex nature of graph data.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00075
Dengqiang Li, Hongliang Zhang
In order to obtain the uniform distribution of sound field in the target region, the least square method is usually used to obtain the approximate solution based on free field. However, the assumption of free field does not take into account the complexity of the actual transfer function, and the least square method does not take into account the error of measurement transfer function and the ill-condition of the least square solution. To solve this problem, the transfer function of non-free field array is obtained experimentally. The error of the transfer function is taken into account by the total least square method and the ill-condition of the solution is suppressed by truncating singular value decomposition. Simulation and experiment show that this method can obtain more uniform sound field distribution in the target area
{"title":"Uniform Sound Field Reconstruction Algorithm Based on Total Least Squares in Non-Free Field","authors":"Dengqiang Li, Hongliang Zhang","doi":"10.1109/CISCE50729.2020.00075","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00075","url":null,"abstract":"In order to obtain the uniform distribution of sound field in the target region, the least square method is usually used to obtain the approximate solution based on free field. However, the assumption of free field does not take into account the complexity of the actual transfer function, and the least square method does not take into account the error of measurement transfer function and the ill-condition of the least square solution. To solve this problem, the transfer function of non-free field array is obtained experimentally. The error of the transfer function is taken into account by the total least square method and the ill-condition of the solution is suppressed by truncating singular value decomposition. Simulation and experiment show that this method can obtain more uniform sound field distribution in the target area","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117113185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00053
Yunlong Li, Yingan Mai, Zijian Lin, Shufen Liang
The blossom of online transaction has given rise to fraud, especially credit card fraud. Thus, Fraud Detection algorithm has become a critical issue, and several attempts have been made to detect transaction fraud using data mining methods. However, these methods suffer from lack of data or inadequate feature engineering. In this paper, we applied sufficient feature engineering and proposed a fraud detection algorithm based on Catboost. The experimental result indicates that our model outperforms other classical models, such as Logistic Regression, Support Vector Machine, and Random Forest. Moreover, we also illustrate the feature importance, which is valuable for feature selection and performance tuning.
{"title":"Online Transaction Detection Method Using Catboost Model","authors":"Yunlong Li, Yingan Mai, Zijian Lin, Shufen Liang","doi":"10.1109/CISCE50729.2020.00053","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00053","url":null,"abstract":"The blossom of online transaction has given rise to fraud, especially credit card fraud. Thus, Fraud Detection algorithm has become a critical issue, and several attempts have been made to detect transaction fraud using data mining methods. However, these methods suffer from lack of data or inadequate feature engineering. In this paper, we applied sufficient feature engineering and proposed a fraud detection algorithm based on Catboost. The experimental result indicates that our model outperforms other classical models, such as Logistic Regression, Support Vector Machine, and Random Forest. Moreover, we also illustrate the feature importance, which is valuable for feature selection and performance tuning.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00049
Yongliang Li
The spirit of craftsmanship is the core concept of modern apprenticeship. It is a good professional spirit and cultivated and formed in practical work. Students in higher vocational colleges have the spirit of craftsmanship, which is conducive to the development of professional teaching courses, improving students’ practical ability and the quality of students’ training in higher vocational colleges. Computer major is an important professional content of higher vocational colleges. Practical teaching is an important teaching link. In the computer training of higher vocational colleges, in order to realize the cultivation of artisan spirit, the construction of school-enterprise cooperation training base should be strengthened, and student management should be reinforced. The article expounds the significance of cultivating students’ craftsmanship in computer training, and proposes an effective way to train artisans.
{"title":"Research on the Cultivation Path of Craftsman Spirit in Higher Vocational Students","authors":"Yongliang Li","doi":"10.1109/CISCE50729.2020.00049","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00049","url":null,"abstract":"The spirit of craftsmanship is the core concept of modern apprenticeship. It is a good professional spirit and cultivated and formed in practical work. Students in higher vocational colleges have the spirit of craftsmanship, which is conducive to the development of professional teaching courses, improving students’ practical ability and the quality of students’ training in higher vocational colleges. Computer major is an important professional content of higher vocational colleges. Practical teaching is an important teaching link. In the computer training of higher vocational colleges, in order to realize the cultivation of artisan spirit, the construction of school-enterprise cooperation training base should be strengthened, and student management should be reinforced. The article expounds the significance of cultivating students’ craftsmanship in computer training, and proposes an effective way to train artisans.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rise of e-commerce in the Internet era, more and more people are willing to shop through the Internet. However, in the process of shopping, sometimes the goods are delayed, damaged or lost due to the non e-commerce subjective will such as logistics, weather and disaster, which will directly affect the service perception of online store customers. Based on the related research of attribution theory, consumer sentiment and repurchase intention, this paper uses quantitative empirical research method to study the influence of non subjective fault behavior of e-commerce on consumer sentiment and repurchase intention.
{"title":"Research on the Influence of E-commerce Non-subjective Fault Behavior on Consumers’ Repurchase Intention","authors":"Xin Liu, Hui Xu, Pengcheng Xue, Xiaohan Liu, Zhuochun Xu","doi":"10.1109/CISCE50729.2020.00050","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00050","url":null,"abstract":"With the rise of e-commerce in the Internet era, more and more people are willing to shop through the Internet. However, in the process of shopping, sometimes the goods are delayed, damaged or lost due to the non e-commerce subjective will such as logistics, weather and disaster, which will directly affect the service perception of online store customers. Based on the related research of attribution theory, consumer sentiment and repurchase intention, this paper uses quantitative empirical research method to study the influence of non subjective fault behavior of e-commerce on consumer sentiment and repurchase intention.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00059
Daoqu Geng, Qilin Liu
Equipment is the carrier to produce products, which plays an extremely important role in the industrial field and daily life. In the production process, to make the equipment run stably, it is necessary to maintain the equipment in time. At present, the equipment is developing, becoming more and more mechanized, automated and intelligent, and the requirements for equipment maintenance are also higher. In this paper, Semantic Web technology is introduced into the field of equipment maintenance, using Semantic annotation, rule-based reasoning and Semantic query to achieve equipment maintenance early warning. The experimental results show that the system can send out maintenance warning messages in time, and can meet the corresponding standards of equipment maintenance.
{"title":"Semantic-based early warning system for equipment maintenance","authors":"Daoqu Geng, Qilin Liu","doi":"10.1109/CISCE50729.2020.00059","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00059","url":null,"abstract":"Equipment is the carrier to produce products, which plays an extremely important role in the industrial field and daily life. In the production process, to make the equipment run stably, it is necessary to maintain the equipment in time. At present, the equipment is developing, becoming more and more mechanized, automated and intelligent, and the requirements for equipment maintenance are also higher. In this paper, Semantic Web technology is introduced into the field of equipment maintenance, using Semantic annotation, rule-based reasoning and Semantic query to achieve equipment maintenance early warning. The experimental results show that the system can send out maintenance warning messages in time, and can meet the corresponding standards of equipment maintenance.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/CISCE50729.2020.00011
Bixing Yan, B. Zhu, Huihe Chen, Yueqi Yang, Jianqiao Yang
With the boost demand of localization-based service, indoor positioning has been drawn on highly awareness. However, although there are already many solutions to deal with this problem, comparisons of them are still of great significance. This paper compares the precision and the robustness of traditional indoor localization methods in wireless sensor network (WSN). Exponential model is applied to analogy a 2.4GHz indoor channel. Based on different types of sensors, several specific algorithms, such as TOA, TDOA, Least Square Method, Triangular Localization, Centroid Localization and AOA are illustrated in a two-dimensional indoor model. In addition, these methods are compared under the same condition to get their respective results and errors. From the comparison of them, different methods are decided to use based on different kind of sensors. AOA and TDOA are chosen when sensors only can measure the angle and the time respectively. When the sensor can merely receive the signal strength, triangular localization method is the best way.
{"title":"Comparison of Indoor localization Methods in Two-Dimensional Wireless Sensor Network","authors":"Bixing Yan, B. Zhu, Huihe Chen, Yueqi Yang, Jianqiao Yang","doi":"10.1109/CISCE50729.2020.00011","DOIUrl":"https://doi.org/10.1109/CISCE50729.2020.00011","url":null,"abstract":"With the boost demand of localization-based service, indoor positioning has been drawn on highly awareness. However, although there are already many solutions to deal with this problem, comparisons of them are still of great significance. This paper compares the precision and the robustness of traditional indoor localization methods in wireless sensor network (WSN). Exponential model is applied to analogy a 2.4GHz indoor channel. Based on different types of sensors, several specific algorithms, such as TOA, TDOA, Least Square Method, Triangular Localization, Centroid Localization and AOA are illustrated in a two-dimensional indoor model. In addition, these methods are compared under the same condition to get their respective results and errors. From the comparison of them, different methods are decided to use based on different kind of sensors. AOA and TDOA are chosen when sensors only can measure the angle and the time respectively. When the sensor can merely receive the signal strength, triangular localization method is the best way.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}