Pub Date : 2011-10-19DOI: 10.1007/978-3-642-24660-9_1
S. Ambroziak, R. Katulski, J. Sadowski, J. Stefanski
{"title":"Wireless systems of threats monitoring","authors":"S. Ambroziak, R. Katulski, J. Sadowski, J. Stefanski","doi":"10.1007/978-3-642-24660-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-24660-9_1","url":null,"abstract":"","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654964
D. Dumont
IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.
{"title":"Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems","authors":"D. Dumont","doi":"10.1109/THS.2010.5654964","DOIUrl":"https://doi.org/10.1109/THS.2010.5654964","url":null,"abstract":"IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655039
S. Nercessian, K. Panetta, S. Agaian
Image fusion combines multiple images into a single image containing the relevant information from each of the original source images. This paper introduces a new Parameterized Logarithmic Dual Tree Complex Wavelet Transform (PL-DT-CWT) and its application for image fusion. The new transform combines the Dual Tree Complex Wavelet Transform (DT-CWT) with the Parameterized Logarithmic Image Processing (PLIP) model, a nonlinear image processing framework for processing images. Experimental results via computer simulations illustrate the improved performance of the proposed algorithms by both qualitative and quantitative means.
{"title":"Image fusion using the Parameterized Logarithmic Dual Tree Complex Wavelet Transform","authors":"S. Nercessian, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5655039","DOIUrl":"https://doi.org/10.1109/THS.2010.5655039","url":null,"abstract":"Image fusion combines multiple images into a single image containing the relevant information from each of the original source images. This paper introduces a new Parameterized Logarithmic Dual Tree Complex Wavelet Transform (PL-DT-CWT) and its application for image fusion. The new transform combines the Dual Tree Complex Wavelet Transform (DT-CWT) with the Parameterized Logarithmic Image Processing (PLIP) model, a nonlinear image processing framework for processing images. Experimental results via computer simulations illustrate the improved performance of the proposed algorithms by both qualitative and quantitative means.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654968
Junjun Xia, K. Panetta, S. Agaian
This paper proposes two image enhancement algorithms that are based on utilizing histogram data gathered from wavelet transform domain coefficients. Computer simulations demonstrate that combining the spatial method of histogram equalization with the wavelet transform domain coefficient histograms achieves a much more balanced enhancement, which outperforms classical histogram equalization algorithms.
{"title":"Image enhancement based on transform coefficient histogram shifting and shaping","authors":"Junjun Xia, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5654968","DOIUrl":"https://doi.org/10.1109/THS.2010.5654968","url":null,"abstract":"This paper proposes two image enhancement algorithms that are based on utilizing histogram data gathered from wavelet transform domain coefficients. Computer simulations demonstrate that combining the spatial method of histogram equalization with the wavelet transform domain coefficient histograms achieves a much more balanced enhancement, which outperforms classical histogram equalization algorithms.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655037
K. Ignatyev, P. Munro, R. Speller, A. Olivo
X-ray Phase Contrast Imaging (XPCi) is a novel method which was proven to enhance the visibility of all details compared to conventional, absorption-based x-ray imaging. Here we propose the application of such a methodology to baggage scanners, a field in which XPCi had not been tested before, and we demonstrate improved detail visibility on a range of samples representing difficult cases in security inspections. A working prototype system has been built, and the results obtained by imaging several test objects mimicking possible components of threat objects. Test objects were also imaged with additional absorbing layers, to show that the method can be used with cluttered environment of baggage in realistic conditions. In all cases, all details were clearly detected with high contrast and high signal-to-noise ratio. Our laboratory-based system uses a conventional X-ray source and a commercially available X-ray detector for data generation. The system can be scaled up by using larger coded apertures.
{"title":"X-ray Phase Contrast Imaging with coded apertures for next generation baggage scanning systems","authors":"K. Ignatyev, P. Munro, R. Speller, A. Olivo","doi":"10.1109/THS.2010.5655037","DOIUrl":"https://doi.org/10.1109/THS.2010.5655037","url":null,"abstract":"X-ray Phase Contrast Imaging (XPCi) is a novel method which was proven to enhance the visibility of all details compared to conventional, absorption-based x-ray imaging. Here we propose the application of such a methodology to baggage scanners, a field in which XPCi had not been tested before, and we demonstrate improved detail visibility on a range of samples representing difficult cases in security inspections. A working prototype system has been built, and the results obtained by imaging several test objects mimicking possible components of threat objects. Test objects were also imaged with additional absorbing layers, to show that the method can be used with cluttered environment of baggage in realistic conditions. In all cases, all details were clearly detected with high contrast and high signal-to-noise ratio. Our laboratory-based system uses a conventional X-ray source and a commercially available X-ray detector for data generation. The system can be scaled up by using larger coded apertures.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125717262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655058
J. Brooks, D. Bodeau, J. Fedorowicz
The Emergency Preparedness and Response (EP&R) community has embraced a wide array of information and communications technologies (ICTs) to support information sharing and communication among participating agencies. Yet many existing and proposed technological solutions remain inadequate to support the unpredictable and frequently changing information sharing needs that arise during emergencies. Participants turn away from emergency ICTs when social and organizational concerns supersede available technological support. This paper highlights the articulation process through which emergency managers attempt to reconcile intersecting organizational, social and technological concerns during emergency incidents. Illustrative examples from observations of operational exercises and interviews with emergency response personnel in several U.S. states inform our discussion of the resulting system design challenges. We conclude the paper by presenting three design principles for information sharing systems which support adaptive social and organizational aspects of emergency management.
{"title":"Articulation of social and organizational considerations in states' emergency management information sharing","authors":"J. Brooks, D. Bodeau, J. Fedorowicz","doi":"10.1109/THS.2010.5655058","DOIUrl":"https://doi.org/10.1109/THS.2010.5655058","url":null,"abstract":"The Emergency Preparedness and Response (EP&R) community has embraced a wide array of information and communications technologies (ICTs) to support information sharing and communication among participating agencies. Yet many existing and proposed technological solutions remain inadequate to support the unpredictable and frequently changing information sharing needs that arise during emergencies. Participants turn away from emergency ICTs when social and organizational concerns supersede available technological support. This paper highlights the articulation process through which emergency managers attempt to reconcile intersecting organizational, social and technological concerns during emergency incidents. Illustrative examples from observations of operational exercises and interviews with emergency response personnel in several U.S. states inform our discussion of the resulting system design challenges. We conclude the paper by presenting three design principles for information sharing systems which support adaptive social and organizational aspects of emergency management.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655087
D. Drusinsky, J. Michael, Thomas W. Otani, M. Shing, D. Wijesekera
Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system's requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.
{"title":"Computer-assisted validation and verification of cybersecurity requirements","authors":"D. Drusinsky, J. Michael, Thomas W. Otani, M. Shing, D. Wijesekera","doi":"10.1109/THS.2010.5655087","DOIUrl":"https://doi.org/10.1109/THS.2010.5655087","url":null,"abstract":"Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system's requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655093
M. Hanmandlu, J. Grover, V. Madasu, Shantaram Vasirkala
A multimodal biometric system amalgamates the information from multiple biometric sources to alleviate the limitations in performance of each individual biometric system. In this paper a multimodal biometric system employing hand based biometrics (i.e. palmprint, hand veins, and hand geometry) is developed. A general combination approach is proposed for the score level fusion which combines the matching scores from these hand based modalities using t-norms due to Hamacher, Yager, Weber, Schweizer and Sklar. This study aims at exploring the potential usefulness of t-norms for multimodal biometrics. These norms deal with the real challenge of uncertainty and imperfection pervading the different sources of knowledge (scores from different modalities). We construct the membership functions of fuzzy sets formed from the genuine and imposter scores of each of the modalities considered. The fused genuine score and imposter scores are obtained by integrating the fuzzified genuine scores and imposter scores respectively from each of the modalities. These norms are relatively very simple to apply unlike the other methods (example SVM, decision trees, discriminant analysis) as no training or any learning is required here. The proposed approach renders very good performance as it is quite computationally fast and outperforms the score level fusion using the conventional rules (min, max, sum, median) The experimental evaluation on a database of 100 users confirms the effectiveness of score level fusion. The preliminary results are encouraging in terms of decision accuracy and computing efficiency.
{"title":"Score level fusion of hand based biometrics using t-norms","authors":"M. Hanmandlu, J. Grover, V. Madasu, Shantaram Vasirkala","doi":"10.1109/THS.2010.5655093","DOIUrl":"https://doi.org/10.1109/THS.2010.5655093","url":null,"abstract":"A multimodal biometric system amalgamates the information from multiple biometric sources to alleviate the limitations in performance of each individual biometric system. In this paper a multimodal biometric system employing hand based biometrics (i.e. palmprint, hand veins, and hand geometry) is developed. A general combination approach is proposed for the score level fusion which combines the matching scores from these hand based modalities using t-norms due to Hamacher, Yager, Weber, Schweizer and Sklar. This study aims at exploring the potential usefulness of t-norms for multimodal biometrics. These norms deal with the real challenge of uncertainty and imperfection pervading the different sources of knowledge (scores from different modalities). We construct the membership functions of fuzzy sets formed from the genuine and imposter scores of each of the modalities considered. The fused genuine score and imposter scores are obtained by integrating the fuzzified genuine scores and imposter scores respectively from each of the modalities. These norms are relatively very simple to apply unlike the other methods (example SVM, decision trees, discriminant analysis) as no training or any learning is required here. The proposed approach renders very good performance as it is quite computationally fast and outperforms the score level fusion using the conventional rules (min, max, sum, median) The experimental evaluation on a database of 100 users confirms the effectiveness of score level fusion. The preliminary results are encouraging in terms of decision accuracy and computing efficiency.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655055
D. Bunker
Due to the nature of disasters as emergent scenarios involving diverse stakeholders, it is suggested that ESA should consider supplementing their traditional command and control ISM responses with varying repertoires of collaborative action. Collaborative management and integration of information and processes around the organizations, people, systems and ICT infrastructure that support CW & EIR represents a paradigmatic shift in our thinking. This paper firstly defines the areas of focus for ISM in CW & EIR and then examines data collected by the Victorian Bushfires Royal Commission to highlight ISM issues and problems in this scenario that impacted effective collaborative action. This analysis is summarized to focus on lessons learned and make preliminary recommendations in the development of a set of high-level scenario dependent, information and process management improvement guidelines. These recommendations are expressed through the combination of “command and control” structures with suggested “repertoires of collaboration” as well as ISM structural and management improvements and metrics.
{"title":"Information systems management (ISM): Repertoires of collaboration for community warning (CW) and emergency incident response (EIR)","authors":"D. Bunker","doi":"10.1109/THS.2010.5655055","DOIUrl":"https://doi.org/10.1109/THS.2010.5655055","url":null,"abstract":"Due to the nature of disasters as emergent scenarios involving diverse stakeholders, it is suggested that ESA should consider supplementing their traditional command and control ISM responses with varying repertoires of collaborative action. Collaborative management and integration of information and processes around the organizations, people, systems and ICT infrastructure that support CW & EIR represents a paradigmatic shift in our thinking. This paper firstly defines the areas of focus for ISM in CW & EIR and then examines data collected by the Victorian Bushfires Royal Commission to highlight ISM issues and problems in this scenario that impacted effective collaborative action. This analysis is summarized to focus on lessons learned and make preliminary recommendations in the development of a set of high-level scenario dependent, information and process management improvement guidelines. These recommendations are expressed through the combination of “command and control” structures with suggested “repertoires of collaboration” as well as ISM structural and management improvements and metrics.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655048
M. Orosz, Carl Southwell, A. Barrett, Jennifer Chen, Petros A. Ioannou, A. Abadi, I. Maya
Ports are important nodal points that stimulate the US economy. This is particularly true of the Ports of Los Angeles and Long Beach (POLA/LB). Over 40% of all containers shipped to and out of the US flow through this two-port complex. The POLA/LB along with other port complexes face many challenges — including maximizing operational efficiency while simultaneously minimizing risk from catastrophes, including terrorism and other man-made or natural disaster events and minimizing environmental impacts. Often these challenges are at odds with one another — increasing one often comes at the expense of achieving the other. The DHS-funded Center for Risk and Economic Analysis of Terrorism Events (CREATE) is developing a port security risk management and resource allocation system (PortSec). PortSec will support both tactical day-to-day security decision-making and long-term strategic security planning. An initial PortSec prototype (1.0) that supports tactical day-to-day risk assessment and resource allocation is currently undergoing evaluation at POLA/LB.
{"title":"PortSec: A port security risk analysis and resource allocation system","authors":"M. Orosz, Carl Southwell, A. Barrett, Jennifer Chen, Petros A. Ioannou, A. Abadi, I. Maya","doi":"10.1109/THS.2010.5655048","DOIUrl":"https://doi.org/10.1109/THS.2010.5655048","url":null,"abstract":"Ports are important nodal points that stimulate the US economy. This is particularly true of the Ports of Los Angeles and Long Beach (POLA/LB). Over 40% of all containers shipped to and out of the US flow through this two-port complex. The POLA/LB along with other port complexes face many challenges — including maximizing operational efficiency while simultaneously minimizing risk from catastrophes, including terrorism and other man-made or natural disaster events and minimizing environmental impacts. Often these challenges are at odds with one another — increasing one often comes at the expense of achieving the other. The DHS-funded Center for Risk and Economic Analysis of Terrorism Events (CREATE) is developing a port security risk management and resource allocation system (PortSec). PortSec will support both tactical day-to-day security decision-making and long-term strategic security planning. An initial PortSec prototype (1.0) that supports tactical day-to-day risk assessment and resource allocation is currently undergoing evaluation at POLA/LB.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}