Pub Date : 1900-01-01DOI: 10.54473/ijtret.2022.6105
Subramanya.G. Bhagwath
These days, more and more People utilize the internet to access a range of services, while many businesses employ dispersed space to provide services to clients. Distributed computing systems allow the same / different computers and workstations to function as computer hotpots. In this case, operators can have similar access to local and remote resources to run processes. Users are not warned about which PCs their processes are operating on. This can create more or less complex security issues As a result, a distributed safe environment is required in which all operations and operations can be conducted securely.In distributed systems it is very important to provide the service anytime, anywhere to customers, this requires timely management of all computer and communication services, timely allocation of resources and their proper functioning. In a distributed area environmental safety is a major concern. This paper provides security reviews of distributed systems. This begins with a study of the different distributed systems in the literature. Different systems are discussed for the most recent highlights. Finally, various aspects of the safety of distributed systems and significant research tips are explored Keywords— distributed systems, security issues, grid computing
{"title":"UPDATES ON DEFENSE AND ATTACK ON DISTRIBUTED SYSTEMS","authors":"Subramanya.G. Bhagwath","doi":"10.54473/ijtret.2022.6105","DOIUrl":"https://doi.org/10.54473/ijtret.2022.6105","url":null,"abstract":"These days, more and more People utilize the internet to access a range of services, while many businesses employ dispersed space to provide services to clients. Distributed computing systems allow the same / different computers and workstations to function as computer hotpots. In this case, operators can have similar access to local and remote resources to run processes. Users are not warned about which PCs their processes are operating on. This can create more or less complex security issues As a result, a distributed safe environment is required in which all operations and operations can be conducted securely.In distributed systems it is very important to provide the service anytime, anywhere to customers, this requires timely management of all computer and communication services, timely allocation of resources and their proper functioning. In a distributed area environmental safety is a major concern. This paper provides security reviews of distributed systems. This begins with a study of the different distributed systems in the literature. Different systems are discussed for the most recent highlights. Finally, various aspects of the safety of distributed systems and significant research tips are explored Keywords— distributed systems, security issues, grid computing","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2021.5202
C. Lakshmi, A. Rajiv
In Modern Communication wireless communication uses MIMO technique to transmit and receive data. The data security is important in communication. The various cryptography algorithm are used to insure the security of wireless communication. The extensive literature review is conducted to study the various security issues in MIMO system
{"title":"WIRELESS COMMUNICATION SYSTEM: SECURITY ISSUES","authors":"C. Lakshmi, A. Rajiv","doi":"10.54473/ijtret.2021.5202","DOIUrl":"https://doi.org/10.54473/ijtret.2021.5202","url":null,"abstract":"In Modern Communication wireless communication uses MIMO technique to transmit and receive data. The data security is important in communication. The various cryptography algorithm are used to insure the security of wireless communication. The extensive literature review is conducted to study the various security issues in MIMO system","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This project can be used by shopkeepers who prefer to get benefited from new technology that will assist them in maximizing their profit via forecasting systems, stock monitoring, and demand forecasting with an add on of recommendation system. The purpose of this document is to describe the features, and interfaces to use the ML-Based Stock and Supply Regulation System and the requirements needed to develop it. It describes how the shopkeeper can take advantage of this product to empower the middleman, increase his/her profits, understand the pattern of supply and demand and increase customer relations using the ML-Based Stock and Supply Regulation System.
{"title":"ML BASED STOCK AND SUPPLY REGULATION SYSTEM","authors":"Vinay Kulkarni, Shraddha Mishra, Shreya Jamsandekar, Srushti Jadhav, Araju Mulla","doi":"10.54473/ijtret.2022.6401","DOIUrl":"https://doi.org/10.54473/ijtret.2022.6401","url":null,"abstract":"This project can be used by shopkeepers who prefer to get benefited from new technology that will assist them in maximizing their profit via forecasting systems, stock monitoring, and demand forecasting with an add on of recommendation system. The purpose of this document is to describe the features, and interfaces to use the ML-Based Stock and Supply Regulation System and the requirements needed to develop it. It describes how the shopkeeper can take advantage of this product to empower the middleman, increase his/her profits, understand the pattern of supply and demand and increase customer relations using the ML-Based Stock and Supply Regulation System.","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"260 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2022.6402
Vaishnavi M, A. S, Shunmuga Priya. B
The present paper is about ‘Student Leave Portal’ which is an application developed by us for our institution -National Engineering college. This is of utmost importance for any organization or college. The leave application will allow the users to apply for the leaves through the online mode by specifying a valid reason for the leave. This can also be implemented at the school and the college levels where the students can apply for the leave. The user interface must be simple and easy to understand. This system can be used to apply leave applications and their approvals online. There are features like cancellation of leave, approval of leave or rejection of leave, view tutor wards details, monthly attendance percentage, semester attendance percentage, view students leave details, forward the leave to HOD. The leave applications and the approvals are done manually. Students will be able to submit the leave form, check the status of leave requests and view completed leave history. This application can help in avoiding the leave application that needs to be given to the higher authority with great ease
{"title":"STUDENT LEAVE PORTAL","authors":"Vaishnavi M, A. S, Shunmuga Priya. B","doi":"10.54473/ijtret.2022.6402","DOIUrl":"https://doi.org/10.54473/ijtret.2022.6402","url":null,"abstract":"The present paper is about ‘Student Leave Portal’ which is an application developed by us for our institution -National Engineering college. This is of utmost importance for any organization or college. The leave application will allow the users to apply for the leaves through the online mode by specifying a valid reason for the leave. This can also be implemented at the school and the college levels where the students can apply for the leave. The user interface must be simple and easy to understand. This system can be used to apply leave applications and their approvals online. There are features like cancellation of leave, approval of leave or rejection of leave, view tutor wards details, monthly attendance percentage, semester attendance percentage, view students leave details, forward the leave to HOD. The leave applications and the approvals are done manually. Students will be able to submit the leave form, check the status of leave requests and view completed leave history. This application can help in avoiding the leave application that needs to be given to the higher authority with great ease","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134077883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Covid-19 pandemic has dramatically changed the way we have used to live. The pandemic has been causing significant devastations in economy, and health, inter alia. Mental health, especially, has become a growing concern due to employment terminations, income loss, family stress and other uncertainties. The pandemic disproportionally affected mental health of younger population. Nowadays risk of early death is increasing due to mental illness which is mostly caused due to depression. Depression creates suicidal thoughts causing serious impairments in daily life. Sentiment analysis is a hot topic that’s been on research for decades, which intends to find the nature of text and classifies into positive, negative and neutral. In today’s digital world lot of data can be made available for sentiment analysis. Hence, our aim is to focus on creating a depression detection system from text, video & audio analysis. Sentiment Analysis and Natural Language Processing methods will be used to develop this system. The system will classify text, audio and video cues as positive or negative depending on the emotions inferred from user’s input.
{"title":"SENTIMENT ANALYSIS FOR DEPRESSION DETECTION","authors":"Swarada Jalukar, Arati Ratnaparkhi, Priyanka Shinde, Simran Kunkulol, Vinaya Kulkarni","doi":"10.54473/ijtret.2022.6305","DOIUrl":"https://doi.org/10.54473/ijtret.2022.6305","url":null,"abstract":"The Covid-19 pandemic has dramatically changed the way we have used to live. The pandemic has been causing significant devastations in economy, and health, inter alia. Mental health, especially, has become a growing concern due to employment terminations, income loss, family stress and other uncertainties. The pandemic disproportionally affected mental health of younger population. Nowadays risk of early death is increasing due to mental illness which is mostly caused due to depression. Depression creates suicidal thoughts causing serious impairments in daily life. Sentiment analysis is a hot topic that’s been on research for decades, which intends to find the nature of text and classifies into positive, negative and neutral. In today’s digital world lot of data can be made available for sentiment analysis. Hence, our aim is to focus on creating a depression detection system from text, video & audio analysis. Sentiment Analysis and Natural Language Processing methods will be used to develop this system. The system will classify text, audio and video cues as positive or negative depending on the emotions inferred from user’s input.","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131326493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2021.5603
Dhvani Ajmera, Meet Saroliya
Unmanned Aerial Vehicles (UAVs), which have uses in research, business, and public service, have recently emerged as a crucial component of the military’s operating environment. Drones of various varieties are being created to fulfil the demands of various users. As a result, the study topics in the UAV domain are expanding as the types and numbers of UAVs increase. In the recent years, the field of unmanned aerial vehicles has exploded. The nature of the study has been grouped into many groups, as well as an overview of existing research fields in the UAV sector. This category encompasses two types of studies: technical and operational research. The two categories of technical research are on-board and ground technologies. This overview is intended to serve as a starting point for beginners to the domain, guiding them in determining where to focus their research, identifying relevant research fields, and focusing on the correct topics. Key words—UAV (Unmanned Aerial Vehicle), Neural Networks, Deep Learning, Artificial Intelligence, Machine Learning
{"title":"Unmanned Aerial Vehicles (UAVs)-An Overview","authors":"Dhvani Ajmera, Meet Saroliya","doi":"10.54473/ijtret.2021.5603","DOIUrl":"https://doi.org/10.54473/ijtret.2021.5603","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs), which have uses in research, business, and public service, have recently emerged as a crucial component of the military’s operating environment. Drones of various varieties are being created to fulfil the demands of various users. As a result, the study topics in the UAV domain are expanding as the types and numbers of UAVs increase. In the recent years, the field of unmanned aerial vehicles has exploded. The nature of the study has been grouped into many groups, as well as an overview of existing research fields in the UAV sector. This category encompasses two types of studies: technical and operational research. The two categories of technical research are on-board and ground technologies. This overview is intended to serve as a starting point for beginners to the domain, guiding them in determining where to focus their research, identifying relevant research fields, and focusing on the correct topics. Key words—UAV (Unmanned Aerial Vehicle), Neural Networks, Deep Learning, Artificial Intelligence, Machine Learning","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2021.5104
D. Karthik, Umashankar
Lean six sigma is one of the systematic and chronological order approach to be focused for the greater the performance of the work , removal of unusual wastages and eliminating the defected work. The lean six sigma concept involves the ‘5’ principles. The primary and preliminary objective of these principles is to obtain the maximum benefits with optimized economy. It consists of processes such as identification of problem , elimination of the variations or defected work and then adopt a clear communication plan within the workers for the free flow of the creative ideas . Then initiate the entire frame work into a flexible and controlled process. By use of lean six sigma any kind of problems can be analysed in an to produce a good output. They can derive maximum benefits such as adequate satisfaction of work execution with neglected defects and complete work with minimum cost. . So that we can increase the profits and productivity and performance of the work. The tools involved in the lean six sigma are 5s system , value stream mapping, kai-zen and voice of the customer. So each and every tool has their own advantages to approach the problem and provide a solution. The term lean is adequately adopted in bushiness but as in case of construction lean can be adopted as productivity tool, so that they can improve the work performance and improve the efficiency. The lean can be adopted small sized projects with little amount of time frame.
{"title":"ADOPTION OF LEAN SIX SIGMA AND THEIR TOOLS IN CONSTRUCTION ASPECT","authors":"D. Karthik, Umashankar","doi":"10.54473/ijtret.2021.5104","DOIUrl":"https://doi.org/10.54473/ijtret.2021.5104","url":null,"abstract":"Lean six sigma is one of the systematic and chronological order approach to be focused for the greater the performance of the work , removal of unusual wastages and eliminating the defected work. The lean six sigma concept involves the ‘5’ principles. The primary and preliminary objective of these principles is to obtain the maximum benefits with optimized economy. It consists of processes such as identification of problem , elimination of the variations or defected work and then adopt a clear communication plan within the workers for the free flow of the creative ideas . Then initiate the entire frame work into a flexible and controlled process. By use of lean six sigma any kind of problems can be analysed in an to produce a good output. They can derive maximum benefits such as adequate satisfaction of work execution with neglected defects and complete work with minimum cost. . So that we can increase the profits and productivity and performance of the work. The tools involved in the lean six sigma are 5s system , value stream mapping, kai-zen and voice of the customer. So each and every tool has their own advantages to approach the problem and provide a solution. The term lean is adequately adopted in bushiness but as in case of construction lean can be adopted as productivity tool, so that they can improve the work performance and improve the efficiency. The lean can be adopted small sized projects with little amount of time frame.","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115350929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2022.6207
Nataraj K R, Manu K.S, Sowjanya C M
Demand for implementation of image processing algorithm on FPGA is exponentially increases in the present world. Many research works is carried for image processing applications and implementation on FPGA. Nowadays identification, classification, and recognition of an object in the highly sophisticated regions are big challenge. Tracking intended object in the congestion region is very difficult. CCTV is used to detect and track the object in the traffic regions. Sometimes it gives false alarm by capturing shadows due to change in the intensity levels in the dynamic background. In this paper an efficient background circuit is developed to detect the object in the dynamic/static background to avoid false alarm. The real time captured image is processed by the proposed background circuit, and it is implemented on FPGA. It has been observed that the result obtained from this proposed work is good in terms of processing time and area utilization.
{"title":"FPGA IMPLEMENTATION OF OBJECT DETECTION IN BACKGROUND MODELING USING GAUSSIAN MIXTURE MODEL","authors":"Nataraj K R, Manu K.S, Sowjanya C M","doi":"10.54473/ijtret.2022.6207","DOIUrl":"https://doi.org/10.54473/ijtret.2022.6207","url":null,"abstract":"Demand for implementation of image processing algorithm on FPGA is exponentially increases in the present world. Many research works is carried for image processing applications and implementation on FPGA. Nowadays identification, classification, and recognition of an object in the highly sophisticated regions are big challenge. Tracking intended object in the congestion region is very difficult. CCTV is used to detect and track the object in the traffic regions. Sometimes it gives false alarm by capturing shadows due to change in the intensity levels in the dynamic background. In this paper an efficient background circuit is developed to detect the object in the dynamic/static background to avoid false alarm. The real time captured image is processed by the proposed background circuit, and it is implemented on FPGA. It has been observed that the result obtained from this proposed work is good in terms of processing time and area utilization.","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2021.5101
Omprakash Yadav, Atharva Jadhav, Abdul Hannan Sunsara, Idris Vohra
Visually impaired individuals face various types of difficulties as they cannot visualize the natural environment. To overcome this problem, the proposed system would automatically generate captions for an input images and convert the generated caption to an audio format so that visually impaired individuals can listen to the generated captions. Captioning is performed using Deep Learning algorithm Convolution Neural Network (CNN), Recurrent Neural Network (RNN) and Long Short-Term Memory.
{"title":"AUDIO CAPTION GENERATION FROM IMAGES USING DEEP LEARNING","authors":"Omprakash Yadav, Atharva Jadhav, Abdul Hannan Sunsara, Idris Vohra","doi":"10.54473/ijtret.2021.5101","DOIUrl":"https://doi.org/10.54473/ijtret.2021.5101","url":null,"abstract":"Visually impaired individuals face various types of difficulties as they cannot visualize the natural environment. To overcome this problem, the proposed system would automatically generate captions for an input images and convert the generated caption to an audio format so that visually impaired individuals can listen to the generated captions. Captioning is performed using Deep Learning algorithm Convolution Neural Network (CNN), Recurrent Neural Network (RNN) and Long Short-Term Memory.","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128479907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.54473/ijtret.2023.7109
Visanthi. V.P
A CMOS Full Adder is designed using Tanner EDA Tool based on 0.25µm CMOS Technology. In the arithmetic logic unit (ALU), the full adder cell is one of the most frequently utilized digital circuit components and the fundamental functional unit of all computational circuits. Right now, a lot of work has been done to improve the architecture and functionality of full adder circuit designs. In this research, two innovative 1-bit full adder cell designs are developed using ten transistors and 0.25mm CMOS technology (10-T). Tanner software tools will be used in the design of the CMOS full adder to simulate the schematic and layout as well as compare the schematic and layout for the purpose of determining precise design limitations. As part of this, we are going to perform the simulation of the CMOS full adder using T-SPICE of Tanner EDA and its layout design using the Microwind tool. The parameters such as power consumption, Area, Propagation Delay, and Power Delay Product (PDP) are evaluated to analyze the proposed one-bit full adder
{"title":"FULL ADDER CIRCUIT DESIGN WITH LOW POWER AND HIGH SPEED AT 0.25µM CMOS TECHNOLOGY USING TANNER EDA","authors":"Visanthi. V.P","doi":"10.54473/ijtret.2023.7109","DOIUrl":"https://doi.org/10.54473/ijtret.2023.7109","url":null,"abstract":"A CMOS Full Adder is designed using Tanner EDA Tool based on 0.25µm CMOS Technology. In the arithmetic logic unit (ALU), the full adder cell is one of the most frequently utilized digital circuit components and the fundamental functional unit of all computational circuits. Right now, a lot of work has been done to improve the architecture and functionality of full adder circuit designs. In this research, two innovative 1-bit full adder cell designs are developed using ten transistors and 0.25mm CMOS technology (10-T). Tanner software tools will be used in the design of the CMOS full adder to simulate the schematic and layout as well as compare the schematic and layout for the purpose of determining precise design limitations. As part of this, we are going to perform the simulation of the CMOS full adder using T-SPICE of Tanner EDA and its layout design using the Microwind tool. The parameters such as power consumption, Area, Propagation Delay, and Power Delay Product (PDP) are evaluated to analyze the proposed one-bit full adder","PeriodicalId":127327,"journal":{"name":"International Journal Of Trendy Research In Engineering And Technology","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115293280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}