Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798775
Q. Ngo, Duc Ngoc Minh Dang, Q. Trung, D. Lam
The IEEE 802.11ah standard has been released with extended communication range and improved energy efficiency used for the Internet of Things (IoT), Supporting massive number of IoT connections, the IEEE 802.11ah uses group-based contention and restricted access window for the medium access control. To leverage the reuse of resources in the IEEE 802.11ah, this paper proposed a novel directional medium access mechanism inside the restricted access window with geographical sectorized grouping. The proposed mechanism results in significant higher packet delivery ratio and system throughput than the original IEEE 802.11ah standard.
{"title":"A Novel Directional MAC in Restricted Access Window for IEEE 802.11ah Networks","authors":"Q. Ngo, Duc Ngoc Minh Dang, Q. Trung, D. Lam","doi":"10.1109/ICT.2019.8798775","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798775","url":null,"abstract":"The IEEE 802.11ah standard has been released with extended communication range and improved energy efficiency used for the Internet of Things (IoT), Supporting massive number of IoT connections, the IEEE 802.11ah uses group-based contention and restricted access window for the medium access control. To leverage the reuse of resources in the IEEE 802.11ah, this paper proposed a novel directional medium access mechanism inside the restricted access window with geographical sectorized grouping. The proposed mechanism results in significant higher packet delivery ratio and system throughput than the original IEEE 802.11ah standard.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798829
Waleed Al Sobhi, H. Aghvami
Data applications account for the magnitude of traffic generated in the Cellular Networks. To meet the ever-increasing traffic demand, advancement in resource allocation is crucial. Dense Heterogeneous Networks (HetNets) aim at meeting the high data rate requirements of the future 5G communications. The paper's main contribution is to maximize the capacity of 5G dense networks via machine learning type Q-learning control algorithms in the Downlink. For broader comparison, we proposed two Power Allocation Q-learning algorithms, namely Distributed and Formulated. To investigate the impact of femto user equipment (FUE) in the network, the location of macro user equipment (MUE) is considered in the reward function. Furthermore, a cooperative approach is utilized to decrease the time search complexity. This approach is complex and requires further improvement. The obtained simulation results showed that the proposed Distributed algorithm outperformed the Formulated and Cooperative approaches. Accordingly, in the latter approaches the number of served FUEs increased however, at the expenses of the MUE Quality of Service (QoS).
{"title":"QoS-Aware Resource Allocation of Two-tier HetNet: A Q-learning Approach","authors":"Waleed Al Sobhi, H. Aghvami","doi":"10.1109/ICT.2019.8798829","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798829","url":null,"abstract":"Data applications account for the magnitude of traffic generated in the Cellular Networks. To meet the ever-increasing traffic demand, advancement in resource allocation is crucial. Dense Heterogeneous Networks (HetNets) aim at meeting the high data rate requirements of the future 5G communications. The paper's main contribution is to maximize the capacity of 5G dense networks via machine learning type Q-learning control algorithms in the Downlink. For broader comparison, we proposed two Power Allocation Q-learning algorithms, namely Distributed and Formulated. To investigate the impact of femto user equipment (FUE) in the network, the location of macro user equipment (MUE) is considered in the reward function. Furthermore, a cooperative approach is utilized to decrease the time search complexity. This approach is complex and requires further improvement. The obtained simulation results showed that the proposed Distributed algorithm outperformed the Formulated and Cooperative approaches. Accordingly, in the latter approaches the number of served FUEs increased however, at the expenses of the MUE Quality of Service (QoS).","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798825
Fangchen Hu, Yiheng Zhao, Peng Zou, Yuanfan Liu, N. Chi
We proposed an extension of FlANN filter to compensate nonlinear effects in multi-bands CAP64 VLC system. The excellent performance of nonlinearity compensation and 9-sub-bands CAP64 transmission has been verified through experimental demonstration.
{"title":"Non-linear Compensation based on Polynomial Function Linked ANN in Multi-band CAP VLC System","authors":"Fangchen Hu, Yiheng Zhao, Peng Zou, Yuanfan Liu, N. Chi","doi":"10.1109/ICT.2019.8798825","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798825","url":null,"abstract":"We proposed an extension of FlANN filter to compensate nonlinear effects in multi-bands CAP64 VLC system. The excellent performance of nonlinearity compensation and 9-sub-bands CAP64 transmission has been verified through experimental demonstration.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798812
Kai Sun, Ge-Fan Li, W. Huang
Intensive users equipments (UEs) often make small base station (SBSs) work under full load so that subsequent access requests of UEs will be difficult to get real-time services in hot spots such as campus, dense office area or large business district. To solve this problem, device-to-device (D2D) offloading has been advocated in recent small cell architecture design. In this paper, we propose a relay-assisted D2D network offloading method without extra spectrum for ultra-dense small cell network. UEs who have new communication request in full load SBS are offloaded to the adjacent light load SBS by exploiting D2D receiver as a relay. We formulated the problem with three sub-problems: firstly, how to select the relay destination SBS; secondly, how to select the D2D relay UE; finally, how to allocate resources and control D2D UE transmitting power. Toward this end, a relay-assisted D2D communication network offloading algorithm is proposed to allocate channel resource and transmit power of D2D UE under the condition of satisfying the signal to interference plus noise ratio (SINR) of cellular UEs. The proposed scheme is evaluated through computer simulation and the results show that it can enable a significant increase in the number of accessible UEs of the network.
{"title":"Performance Analysis of Relay-Assisted D2D Network Offloading in Ultra-Dense Networks","authors":"Kai Sun, Ge-Fan Li, W. Huang","doi":"10.1109/ICT.2019.8798812","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798812","url":null,"abstract":"Intensive users equipments (UEs) often make small base station (SBSs) work under full load so that subsequent access requests of UEs will be difficult to get real-time services in hot spots such as campus, dense office area or large business district. To solve this problem, device-to-device (D2D) offloading has been advocated in recent small cell architecture design. In this paper, we propose a relay-assisted D2D network offloading method without extra spectrum for ultra-dense small cell network. UEs who have new communication request in full load SBS are offloaded to the adjacent light load SBS by exploiting D2D receiver as a relay. We formulated the problem with three sub-problems: firstly, how to select the relay destination SBS; secondly, how to select the D2D relay UE; finally, how to allocate resources and control D2D UE transmitting power. Toward this end, a relay-assisted D2D communication network offloading algorithm is proposed to allocate channel resource and transmit power of D2D UE under the condition of satisfying the signal to interference plus noise ratio (SINR) of cellular UEs. The proposed scheme is evaluated through computer simulation and the results show that it can enable a significant increase in the number of accessible UEs of the network.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798842
Fenghe Hu, Ayda Babaei, H. Aghvami
Physical layer security (PHYLS) has become an important factor to consider with the deployment of 5G small-cell network and the application of massive multiple-input-multiple-output (MIMO). In a real small-cell network, the environment contains various objects which may affect a propagating signal. Accordingly, this work investigates the performance of different strategies by building a propagation model for PHYLS in the presence of random terrains. The Monte Carlo simulation is used to perform the simulation for the affect of terrains under different scenarios. Furthermore, two different approaches for improving PHYLS in the outlined environment and their influence is discussed. This includes separate antenna selection (SAS) and strategical artificial noise (SAN). The performance of each approach is simulated and the results are analysed. Our findings indicate that the existence of terrain may negatively affect the PHYLS performance. However, by implementing the aforementioned techniques we can compensate for degrading PHYLS with the cost of radio frequency (RF) resources.
{"title":"Physical Layer Security in Cellular Network in the Presence of Terrains","authors":"Fenghe Hu, Ayda Babaei, H. Aghvami","doi":"10.1109/ICT.2019.8798842","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798842","url":null,"abstract":"Physical layer security (PHYLS) has become an important factor to consider with the deployment of 5G small-cell network and the application of massive multiple-input-multiple-output (MIMO). In a real small-cell network, the environment contains various objects which may affect a propagating signal. Accordingly, this work investigates the performance of different strategies by building a propagation model for PHYLS in the presence of random terrains. The Monte Carlo simulation is used to perform the simulation for the affect of terrains under different scenarios. Furthermore, two different approaches for improving PHYLS in the outlined environment and their influence is discussed. This includes separate antenna selection (SAS) and strategical artificial noise (SAN). The performance of each approach is simulated and the results are analysed. Our findings indicate that the existence of terrain may negatively affect the PHYLS performance. However, by implementing the aforementioned techniques we can compensate for degrading PHYLS with the cost of radio frequency (RF) resources.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798781
Tien Nguyen Van, Vinh Truong Hoang
Kinship verification is one of the interesting and challenging topics which is related to face analysis. Most of existing methods have been trying to find out the relevant information between two persons (edge nose, lip, eyes) to increase the verification rate. In this paper, we propose to apply the Local Binary Pattern for Kinship on different color space. Then the features are computed by $chi^{2}$ distance and apply feature selection to reduce the noisy and irrelevant features. The Support Vector Machine is used to train and predict the model. We analyze the effectiveness of our method by carrying out experiments on two popular databases such as KinFaceW-I and KinFaceW-II.
{"title":"Kinship Verification based on Local Binary Pattern features coding in different color space","authors":"Tien Nguyen Van, Vinh Truong Hoang","doi":"10.1109/ICT.2019.8798781","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798781","url":null,"abstract":"Kinship verification is one of the interesting and challenging topics which is related to face analysis. Most of existing methods have been trying to find out the relevant information between two persons (edge nose, lip, eyes) to increase the verification rate. In this paper, we propose to apply the Local Binary Pattern for Kinship on different color space. Then the features are computed by $chi^{2}$ distance and apply feature selection to reduce the noisy and irrelevant features. The Support Vector Machine is used to train and predict the model. We analyze the effectiveness of our method by carrying out experiments on two popular databases such as KinFaceW-I and KinFaceW-II.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we proposed a novel directional polarization modulation (DPM) scheme based on dual-polarized antennas. This scheme can be applied in physical layer secure communication. By utilizing the direction-dependent characteristic of DPM, our scheme can protect signals in the legitimate direction, and simultaneously distort the constellation in other directions. Firstly, we discover the direction-dependent characteristic of DPM. Secondly, a dual-polarized dipole array design method is proposed to enhance the DPM's direction-dependent characteristic. Moreover, a method to precisely control the DPM's secure transmission direction is proposed. Finally, the simulations are carried out to verify the secure transmission performance.
{"title":"A Dual-polarized Antennas Based Directional Modulation Scheme","authors":"Qiaoyu Zhang, Zhaoyang Yang, Wen Wang, Junxing Ren, Wei-qing Huang, Ning Zhang","doi":"10.1109/ICT.2019.8798807","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798807","url":null,"abstract":"In this paper, we proposed a novel directional polarization modulation (DPM) scheme based on dual-polarized antennas. This scheme can be applied in physical layer secure communication. By utilizing the direction-dependent characteristic of DPM, our scheme can protect signals in the legitimate direction, and simultaneously distort the constellation in other directions. Firstly, we discover the direction-dependent characteristic of DPM. Secondly, a dual-polarized dipole array design method is proposed to enhance the DPM's direction-dependent characteristic. Moreover, a method to precisely control the DPM's secure transmission direction is proposed. Finally, the simulations are carried out to verify the secure transmission performance.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"6 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114096012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798836
Weiqi Dai, Deshan Xiao, Hai Jin, Xia Xie
The blockchain technology is more and more important in computer security. The core of the blockchain system is consensus. However, many consensus mechanisms reward those groups that own the majority of the resources. In addition, the performance of these consensus mechanisms is poor. In this paper we first present Proof of Value (POV), an incentive mechanism that rewards the value creators. With the help of POV, we reward the user who creates value and control the number of coins through the incentive coefficient adjustment algorithm. To improve the performance of POV in permissioned blockchain, we designed Hypernet, an off-chain transaction system. By designing the transaction system Hy-pernet, the transaction can be handled without blockchain. Finally, we evaluate our system by generating random parameters to invoke the contract. Then we record the real time for issuing the rewards. The test results show that the loss of the system is about 2% when the POV is added. The performance of the Hypernet is four times higher than the traditional permissioned blockchain transaction system.
{"title":"A Concurrent Optimization Consensus System Based on Blockchain","authors":"Weiqi Dai, Deshan Xiao, Hai Jin, Xia Xie","doi":"10.1109/ICT.2019.8798836","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798836","url":null,"abstract":"The blockchain technology is more and more important in computer security. The core of the blockchain system is consensus. However, many consensus mechanisms reward those groups that own the majority of the resources. In addition, the performance of these consensus mechanisms is poor. In this paper we first present Proof of Value (POV), an incentive mechanism that rewards the value creators. With the help of POV, we reward the user who creates value and control the number of coins through the incentive coefficient adjustment algorithm. To improve the performance of POV in permissioned blockchain, we designed Hypernet, an off-chain transaction system. By designing the transaction system Hy-pernet, the transaction can be handled without blockchain. Finally, we evaluate our system by generating random parameters to invoke the contract. Then we record the real time for issuing the rewards. The test results show that the loss of the system is about 2% when the POV is added. The performance of the Hypernet is four times higher than the traditional permissioned blockchain transaction system.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798799
Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li
The expanding volume of HTTPS traffic (both legitimate and malicious) creates even more challenges for mobile network security and management. In this work, we propose AIBMF(Application Identification Based on Multi-view Features), a fine-grained approach to classify HTTPS traffic by their application type. The key idea of AIBMF is to combine three kinds of features—payload convolution features, packet size sequence and packet content type sequence. Based on these different view features, a deep learning model (using CNN, embedding and RNN) is constructed for HTTPS traffic identification task. To evaluate the effectiveness of AIBMF, we run a comprehensive set of experiments on a real-world dataset (about 100,000+ flows), which shows that our approach achieves 96.06% accuracy and outperforms the state-of-the-art method (3.6% on F1 score).
{"title":"Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features","authors":"Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li","doi":"10.1109/ICT.2019.8798799","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798799","url":null,"abstract":"The expanding volume of HTTPS traffic (both legitimate and malicious) creates even more challenges for mobile network security and management. In this work, we propose AIBMF(Application Identification Based on Multi-view Features), a fine-grained approach to classify HTTPS traffic by their application type. The key idea of AIBMF is to combine three kinds of features—payload convolution features, packet size sequence and packet content type sequence. Based on these different view features, a deep learning model (using CNN, embedding and RNN) is constructed for HTTPS traffic identification task. To evaluate the effectiveness of AIBMF, we run a comprehensive set of experiments on a real-world dataset (about 100,000+ flows), which shows that our approach achieves 96.06% accuracy and outperforms the state-of-the-art method (3.6% on F1 score).","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798797
Xiaoqian Wang, Xin Su, Bei Liu
With the development of heterogeneous wireless networks, it is particularly important to build a reasonable network selection mechanism of user in the 5G heterogeneous networks. In this paper, we improve the reward function in Q-Learning using the AHP (Analytic Hierarchy Process) method and make a simple analysis about network resources competition in the case of multi-agent scenario. Then we propose two network selection algorithms: SANSA (single agent network selection algorithm) and MANSA (multi-agent network selection algorithm) which are based on Q-Learning and Nash Q-Learning respectively to deal with the network selection problem. Simulations show that our proposed algorithms have a better performance of network load balancing than the contrast scheme. In addition, the MANSA can effectively reduce the system total power consumption.
{"title":"A Novel Network Selection Approach in 5G Heterogeneous Networks Using Q-Learning","authors":"Xiaoqian Wang, Xin Su, Bei Liu","doi":"10.1109/ICT.2019.8798797","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798797","url":null,"abstract":"With the development of heterogeneous wireless networks, it is particularly important to build a reasonable network selection mechanism of user in the 5G heterogeneous networks. In this paper, we improve the reward function in Q-Learning using the AHP (Analytic Hierarchy Process) method and make a simple analysis about network resources competition in the case of multi-agent scenario. Then we propose two network selection algorithms: SANSA (single agent network selection algorithm) and MANSA (multi-agent network selection algorithm) which are based on Q-Learning and Nash Q-Learning respectively to deal with the network selection problem. Simulations show that our proposed algorithms have a better performance of network load balancing than the contrast scheme. In addition, the MANSA can effectively reduce the system total power consumption.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}