Summary form only given. In this talk we discuss our experience making state of the art software technologies including vector functional programming, collaborative analytics and visualization consumable by demanding customers we call Thinkers. The emerging discipline of Computational Science brings Thinkers and Software Experts together to create environments for Thinkers. Thinkers are well educated domain and problem focused computationally literate end users. On a day by day basis thinkers live in Big Data to collaboratively solve their business and technical challenges. Thinkers reject being passive misunderstood requirements changing Agile customers. They have no use for end user tools for dummies. They question the cost and complexity of accepted software engineering and IT approaches. Lacking better alternatives they often resort to hodge-podge collections of scripts and arcane tools. Thinkers need a capability to Think-Compute-See and to actively participate in problem solutions.
{"title":"Think? Compute! See!! End User Programming for Thinkers","authors":"Dave A. Thomas","doi":"10.1109/EDOC.2015.15","DOIUrl":"https://doi.org/10.1109/EDOC.2015.15","url":null,"abstract":"Summary form only given. In this talk we discuss our experience making state of the art software technologies including vector functional programming, collaborative analytics and visualization consumable by demanding customers we call Thinkers. The emerging discipline of Computational Science brings Thinkers and Software Experts together to create environments for Thinkers. Thinkers are well educated domain and problem focused computationally literate end users. On a day by day basis thinkers live in Big Data to collaboratively solve their business and technical challenges. Thinkers reject being passive misunderstood requirements changing Agile customers. They have no use for end user tools for dummies. They question the cost and complexity of accepted software engineering and IT approaches. Lacking better alternatives they often resort to hodge-podge collections of scripts and arcane tools. Thinkers need a capability to Think-Compute-See and to actively participate in problem solutions.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"97 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mukkamala, Janni Sorensen, Abid Hussain, Ravikiran Vatrapu
Social media crises pose significant challenges for organizations in terms of their rapid propagation and deterioration of brand parameters and can have sustained negative business impacts. This paper reports a multiple case study of four different corporate social media crises. The multiple case study was informed by crisis communication and management theories and employed multiple methods consisting of the novel approach to big social data analytics-social set analysis, nenography, and manual sentiment analysis and topic discovery. Empirical findings show the voluminous but also transient nature of social media crises, reveal the different strategies employed by the organizations to manage the crises and their outcomes, and a diversity of aggregate user behavioural patterns. Based on the findings, we recommend that companies should choose a response strategy that is suitable for the type of crisis they are experiencing as well as the industry sector they belong to. In summary, this paper is the first demonstration of the suitability and effectiveness of Social Set Analysis for conceptualizing, formalizing and analyzing big social data from content-driven social media platforms like Facebook for event studies such as unexpected crises and/or coordinated marketing campaigns.
{"title":"Social Set Analysis of Corporate Social Media Crises on Facebook","authors":"R. Mukkamala, Janni Sorensen, Abid Hussain, Ravikiran Vatrapu","doi":"10.1109/EDOC.2015.25","DOIUrl":"https://doi.org/10.1109/EDOC.2015.25","url":null,"abstract":"Social media crises pose significant challenges for organizations in terms of their rapid propagation and deterioration of brand parameters and can have sustained negative business impacts. This paper reports a multiple case study of four different corporate social media crises. The multiple case study was informed by crisis communication and management theories and employed multiple methods consisting of the novel approach to big social data analytics-social set analysis, nenography, and manual sentiment analysis and topic discovery. Empirical findings show the voluminous but also transient nature of social media crises, reveal the different strategies employed by the organizations to manage the crises and their outcomes, and a diversity of aggregate user behavioural patterns. Based on the findings, we recommend that companies should choose a response strategy that is suitable for the type of crisis they are experiencing as well as the industry sector they belong to. In summary, this paper is the first demonstration of the suitability and effectiveness of Social Set Analysis for conceptualizing, formalizing and analyzing big social data from content-driven social media platforms like Facebook for event studies such as unexpected crises and/or coordinated marketing campaigns.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123798298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jyothi Kunchala, Jian Yu, Quan Z. Sheng, Yanbo Han, Sira Yongchareon
In recent years, artifact-centric business process modeling is gaining momentum with its improved flexibility and extensibility. In order to support the rapid translation of the traditional activity-centric processes into this new type of processes, this paper proposes a novel approach to automatically transforming an activity-centric process model into a group of lifecycles of artifacts and their interactions, which represent the behavior of its corresponding artifact-centric process model. Algorithms on translating an activity-centric process model into a tree model, finding the dependencies between two object/artifact states based on the tree model, and synthesizing the lifecycles of artifacts have been proposed. Throughout the paper, we illustrate our approach with an order processing running scenario.
{"title":"Synthesis of Artifact Lifecycles from Activity-centric Process Models","authors":"Jyothi Kunchala, Jian Yu, Quan Z. Sheng, Yanbo Han, Sira Yongchareon","doi":"10.1109/EDOC.2015.14","DOIUrl":"https://doi.org/10.1109/EDOC.2015.14","url":null,"abstract":"In recent years, artifact-centric business process modeling is gaining momentum with its improved flexibility and extensibility. In order to support the rapid translation of the traditional activity-centric processes into this new type of processes, this paper proposes a novel approach to automatically transforming an activity-centric process model into a group of lifecycles of artifacts and their interactions, which represent the behavior of its corresponding artifact-centric process model. Algorithms on translating an activity-centric process model into a tree model, finding the dependencies between two object/artifact states based on the tree model, and synthesizing the lifecycles of artifacts have been proposed. Throughout the paper, we illustrate our approach with an order processing running scenario.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the global digitalization, fast shifting business models and short technology lifecycles, modern enterprises need a strategy how to deal with those unpredictable changes in order to stay competitive. The concept of capability driven management like capability-based-planning or investment gets more and more attention by executives and scientists. In the last decade IS and management journals as well as conferences were publishing an increasing number of capability related articles, but a common understanding corresponding the identification of capabilities, their management, types or elements seems to be not existing. This work encapsulates the body of capability literature to provide an overview about capability research investigations over the last 15 years.
{"title":"An Exploration of Capability Research","authors":"M. Wißotzki","doi":"10.1109/EDOC.2015.33","DOIUrl":"https://doi.org/10.1109/EDOC.2015.33","url":null,"abstract":"Due to the global digitalization, fast shifting business models and short technology lifecycles, modern enterprises need a strategy how to deal with those unpredictable changes in order to stay competitive. The concept of capability driven management like capability-based-planning or investment gets more and more attention by executives and scientists. In the last decade IS and management journals as well as conferences were publishing an increasing number of capability related articles, but a common understanding corresponding the identification of capabilities, their management, types or elements seems to be not existing. This work encapsulates the body of capability literature to provide an overview about capability research investigations over the last 15 years.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"67 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Maamar, V. Burégio, Noura Faci, D. Benslimane, Quan Z. Sheng
Over the years, different development waves have shaped the Web. Introduced as a tool to browse Web sites, the Web now is a dynamic and robust platform upon which enterprises conduct e-Business. One of these waves known as Web 2.0 (or social Web) is putting pressure on how enterprises should ensure a productive use of Web 2.0 applications such as Facebook and Twitter. Misuse cases of these applications are on the rise and the lack of guidelines and awareness is a main reason. This paper presents an approach for "controlling" the social actions that Web 2.0 applications allow users to execute. These actions are identified after analyzing some representative Web 2.0 applications and then defined in terms of stakeholders, content, and tools. The control over these actions is defined with UML Object Constraint Language (OCL) and then demonstrated through a prototype system.
{"title":"\"Controlling\" Web 2.0 Applications in the Workplace","authors":"Z. Maamar, V. Burégio, Noura Faci, D. Benslimane, Quan Z. Sheng","doi":"10.1109/EDOC.2015.35","DOIUrl":"https://doi.org/10.1109/EDOC.2015.35","url":null,"abstract":"Over the years, different development waves have shaped the Web. Introduced as a tool to browse Web sites, the Web now is a dynamic and robust platform upon which enterprises conduct e-Business. One of these waves known as Web 2.0 (or social Web) is putting pressure on how enterprises should ensure a productive use of Web 2.0 applications such as Facebook and Twitter. Misuse cases of these applications are on the rise and the lack of guidelines and awareness is a main reason. This paper presents an approach for \"controlling\" the social actions that Web 2.0 applications allow users to execute. These actions are identified after analyzing some representative Web 2.0 applications and then defined in terms of stakeholders, content, and tools. The control over these actions is defined with UML Object Constraint Language (OCL) and then demonstrated through a prototype system.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Approximate query processing with relatively small random samples is an effective way to deal with many queries on large databases. However, small random samples might miss relevant records for highly selective queries due to insufficient coverage. A multidimensional index tree called the k-MDI was proposed as an effective sampling scheme for highly selective decision support queries. It has been shown to support a fast response time and high accuracy, whereas implementation of the k-MDI on database tables was not discussed. This paper proposes the Multidimensional Cluster Sampling View based on the k-MDI. The view can be implemented with ease using common database tables and can be manipulated by SQL statements. Furthermore, it is able to provide trustable approximate answers quickly for any query condition. The response time and accuracy of approximation are validated on a large dataset based on TPC-DS specifications.
{"title":"Multidimensional Cluster Sampling View on Large Databases for Approximate Query Processing","authors":"Tomohiro Inoue, A. Krishna, R. Gopalan","doi":"10.1109/EDOC.2015.24","DOIUrl":"https://doi.org/10.1109/EDOC.2015.24","url":null,"abstract":"Approximate query processing with relatively small random samples is an effective way to deal with many queries on large databases. However, small random samples might miss relevant records for highly selective queries due to insufficient coverage. A multidimensional index tree called the k-MDI was proposed as an effective sampling scheme for highly selective decision support queries. It has been shown to support a fast response time and high accuracy, whereas implementation of the k-MDI on database tables was not discussed. This paper proposes the Multidimensional Cluster Sampling View based on the k-MDI. The view can be implemented with ease using common database tables and can be manipulated by SQL statements. Furthermore, it is able to provide trustable approximate answers quickly for any query condition. The response time and accuracy of approximation are validated on a large dataset based on TPC-DS specifications.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Maté, J. Trujillo, Elvis Koci, Konstantinos Zoumpatianos, J. Mylopoulos
Business analytics has emerged in the past decade as a top concern for business executives world-wide, surpassing earlier top concerns such as supply chain management and total quality management. Business analysis techniques analyze operational data for a variety of purposes including prediction, planning, monitoring, and trouble-shooting. In this paper we focus on one type of analysis, monitoring operational data to determine whether a business is on track relative to its strategic goals. If deviations exists, our approach narrows the search to the most problematic instances detected. Furthermore, we show how the process can be fully automated including the generation of all necessary queries. Finally, we show how the monitoring process has been implemented in our tool, Argus, which enables the analysis of arbitrary periods of time. Our prototype has been evaluated using a small data warehouse of synthetic data.
{"title":"Monitoring Strategic Business Goals with Argus","authors":"A. Maté, J. Trujillo, Elvis Koci, Konstantinos Zoumpatianos, J. Mylopoulos","doi":"10.1109/EDOC.2015.11","DOIUrl":"https://doi.org/10.1109/EDOC.2015.11","url":null,"abstract":"Business analytics has emerged in the past decade as a top concern for business executives world-wide, surpassing earlier top concerns such as supply chain management and total quality management. Business analysis techniques analyze operational data for a variety of purposes including prediction, planning, monitoring, and trouble-shooting. In this paper we focus on one type of analysis, monitoring operational data to determine whether a business is on track relative to its strategic goals. If deviations exists, our approach narrows the search to the most problematic instances detected. Furthermore, we show how the process can be fully automated including the generation of all necessary queries. Finally, we show how the monitoring process has been implemented in our tool, Argus, which enables the analysis of arbitrary periods of time. Our prototype has been evaluated using a small data warehouse of synthetic data.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos L. B. Azevedo, J. P. Almeida, M. V. Sinderen, L. F. Pires
Strategic planning aims at improving both the financial and behavioral performance of an enterprise. It concerns the enterprise and its desired future, helping set priorities, concentrate capabilities and resources on key operations, ensure that stakeholders are working toward common goals and assess and adjust the enterprise's direction. Although it motivates and drives Enterprise Architecture (EA) choices, strategic planning is currently not explicitly reflected in EA models. This paper addresses this gap by presenting a principled approach to support strategic planning modeling in EA. We first analyze the strategic planning literature, developing a conceptual model for strategic planning that is aligned with a foundational ontology. We then propose a language metamodel that incorporates the conceptual model into the Archi Mate modeling language. In order to show the usefulness of our approach, we use our proposed language constructs to model the strategic plan of a medium-to-large pension fund.
{"title":"Towards Capturing Strategic Planning in EA","authors":"Carlos L. B. Azevedo, J. P. Almeida, M. V. Sinderen, L. F. Pires","doi":"10.1109/EDOC.2015.31","DOIUrl":"https://doi.org/10.1109/EDOC.2015.31","url":null,"abstract":"Strategic planning aims at improving both the financial and behavioral performance of an enterprise. It concerns the enterprise and its desired future, helping set priorities, concentrate capabilities and resources on key operations, ensure that stakeholders are working toward common goals and assess and adjust the enterprise's direction. Although it motivates and drives Enterprise Architecture (EA) choices, strategic planning is currently not explicitly reflected in EA models. This paper addresses this gap by presenting a principled approach to support strategic planning modeling in EA. We first analyze the strategic planning literature, developing a conceptual model for strategic planning that is aligned with a foundational ontology. We then propose a language metamodel that incorporates the conceptual model into the Archi Mate modeling language. In order to show the usefulness of our approach, we use our proposed language constructs to model the strategic plan of a medium-to-large pension fund.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to achieve efficiency and effectiveness gains, concepts such as standardization and automation originating in the manufacturing industry are adopted by IT service providers. ERP systems are tools to implement such concepts in manufacturing companies. This research examines if and how ERP systems are used by IT service providers. To answer this question, an interview-based exploratory multiple-case study is conducted because only very limited findings on the topic exist. Representatives of 24 IT service providers and ERP vendors were interviewed. We found that ERP systems are used by the studied companies: 21 out of 24 use ERP systems. Seven selected companies are presented in greater detail: one that doesn't use an ERP system and six that do. We describe which functional areas are covered by their ERP systems and which ones are covered by other application systems. For instance, all of the six companies use the material management module of their ERP system, but four out of five cases used a non-ERP standard application system for ticketing. Finally, we found no case that used traditional production and planning capabilities of ERP systems as suggested by previous design science work.
{"title":"ERP Systems' Usage in the German IT Service Industry: An Exploratory Multi-case Study","authors":"Johannes Hintsch, Frederik Kramer, K. Turowski","doi":"10.1109/EDOC.2015.32","DOIUrl":"https://doi.org/10.1109/EDOC.2015.32","url":null,"abstract":"In order to achieve efficiency and effectiveness gains, concepts such as standardization and automation originating in the manufacturing industry are adopted by IT service providers. ERP systems are tools to implement such concepts in manufacturing companies. This research examines if and how ERP systems are used by IT service providers. To answer this question, an interview-based exploratory multiple-case study is conducted because only very limited findings on the topic exist. Representatives of 24 IT service providers and ERP vendors were interviewed. We found that ERP systems are used by the studied companies: 21 out of 24 use ERP systems. Seven selected companies are presented in greater detail: one that doesn't use an ERP system and six that do. We describe which functional areas are covered by their ERP systems and which ones are covered by other application systems. For instance, all of the six companies use the material management module of their ERP system, but four out of five cases used a non-ERP standard application system for ticketing. Finally, we found no case that used traditional production and planning capabilities of ERP systems as suggested by previous design science work.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Monitoring the performances of a business process is a key issue in many organizations, especially when predefined constraints exist on them, due to contracts or internal requirements. Several approaches were defined recently in the literature for predicting the performances of a single process instance. However, in many real situations, process-oriented performance metrics and associated constraints are defined in an aggregated form, on a time-window basis. This work right addresses the problem of predicting whether (the process instances in) each time window will infringe an aggregate performance constraint, at a series of checkpoints within the window. To this end, at each checkpoint, three kinds of measures are to be estimated: what performance outcome each ongoing process instance will yield, how many process instances will start in the rest of the window, and what their aggregate performance outcomes will be. The approach proposed is general (it can reuse a wide range of regression methods), and it can be embedded in a continuous monitoring-and-learning scheme. Tests on real-life logs showed its validity in terms of prediction accuracy.
{"title":"A Prediction Framework for Proactively Monitoring Aggregate Process-Performance Indicators","authors":"Francesco Folino, M. Guarascio, L. Pontieri","doi":"10.1109/EDOC.2015.27","DOIUrl":"https://doi.org/10.1109/EDOC.2015.27","url":null,"abstract":"Monitoring the performances of a business process is a key issue in many organizations, especially when predefined constraints exist on them, due to contracts or internal requirements. Several approaches were defined recently in the literature for predicting the performances of a single process instance. However, in many real situations, process-oriented performance metrics and associated constraints are defined in an aggregated form, on a time-window basis. This work right addresses the problem of predicting whether (the process instances in) each time window will infringe an aggregate performance constraint, at a series of checkpoints within the window. To this end, at each checkpoint, three kinds of measures are to be estimated: what performance outcome each ongoing process instance will yield, how many process instances will start in the rest of the window, and what their aggregate performance outcomes will be. The approach proposed is general (it can reuse a wide range of regression methods), and it can be embedded in a continuous monitoring-and-learning scheme. Tests on real-life logs showed its validity in terms of prediction accuracy.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}