Pub Date : 2021-09-01DOI: 10.1109/CYBER.2003.1253424
T. Kunii, S. H. Soon, A. Sourin
The following topics on cyberworld are discussed: philosophy, ethics, law and security of cyberworlds; distributed simulation and distributed virtual environment; shared and virtual worlds; geometric modeling and visualization for cyberworlds; intelligent agents; datamining and warehousing; cyberbusiness; cyberlearning; cybermuseums; and cyberinformation.
{"title":"Proceedings. 2003 International Conference on Cyberworlds","authors":"T. Kunii, S. H. Soon, A. Sourin","doi":"10.1109/CYBER.2003.1253424","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253424","url":null,"abstract":"The following topics on cyberworld are discussed: philosophy, ethics, law and security of cyberworlds; distributed simulation and distributed virtual environment; shared and virtual worlds; geometric modeling and visualization for cyberworlds; intelligent agents; datamining and warehousing; cyberbusiness; cyberlearning; cybermuseums; and cyberinformation.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131387285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253436
Z. W. Zhao, I. Chen, Jun Zhang
This paper considers the capability of collaboration and interaction between agents in a new architecture of multi-agent systems (MAS) basing on the thought of network behavior and co-evolution. Actually, current development of MAS nearly synchronously accompanies with the development of communication networks ever increasingly because the approaches of information exchange are mainly depended on the modes of data transmission and the spectacular of advanced communication technologies. The real detailed complexity inside the media transmission platform is masked in the proposed architecture of MAS so that the complex processes of data dissemination can be coped with reasonably and simply by way of decentralized intelligent agents. According to the simulation result and the comparison with other typical models of MAS, the presented architecture of MAS and its running mechanism exhibit better advantages such as flexibility, robustness and expansibility suited to the collaboration and interaction among decentralized agents in MAS. Toward the future research, some related optimal algorithms and running mechanisms concerning the integrated performance and the complexity of the MAS's architecture will be investigated and developed.
{"title":"Robust collaboration and interaction in a multi-agent system basing on hierarchical networks","authors":"Z. W. Zhao, I. Chen, Jun Zhang","doi":"10.1109/CYBER.2003.1253436","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253436","url":null,"abstract":"This paper considers the capability of collaboration and interaction between agents in a new architecture of multi-agent systems (MAS) basing on the thought of network behavior and co-evolution. Actually, current development of MAS nearly synchronously accompanies with the development of communication networks ever increasingly because the approaches of information exchange are mainly depended on the modes of data transmission and the spectacular of advanced communication technologies. The real detailed complexity inside the media transmission platform is masked in the proposed architecture of MAS so that the complex processes of data dissemination can be coped with reasonably and simply by way of decentralized intelligent agents. According to the simulation result and the comparison with other typical models of MAS, the presented architecture of MAS and its running mechanism exhibit better advantages such as flexibility, robustness and expansibility suited to the collaboration and interaction among decentralized agents in MAS. Toward the future research, some related optimal algorithms and running mechanisms concerning the integrated performance and the complexity of the MAS's architecture will be investigated and developed.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116765256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253492
Qi Yutao, Lin Feng
Retrieving homologous sequences from existing databases, for instance, is a fundamental routine for the bioinformatics research community. Programs of the NCBI BLAST family have been widely used for retrieving homologous sequences from existing databases. This article briefly introduces and evaluates a parallelized version of the BLAST algorithm using Message Passing Interface (MPI) on a multi-node compute cluster, paraBLAST and its Web server, CyberparaBLAST. The CyberparaBLAST Web server can be accessed through Web browsers on intranet Web servers. CyberparaBLAST enables the researchers of institutes to query sequence databases in the real time when needed. Parallelized computing together with cyber access make the bioinformatics research more efficient with the aid of CyberparaBLAST.
{"title":"CyberparaBLAST: the parallelized BLAST Web server","authors":"Qi Yutao, Lin Feng","doi":"10.1109/CYBER.2003.1253492","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253492","url":null,"abstract":"Retrieving homologous sequences from existing databases, for instance, is a fundamental routine for the bioinformatics research community. Programs of the NCBI BLAST family have been widely used for retrieving homologous sequences from existing databases. This article briefly introduces and evaluates a parallelized version of the BLAST algorithm using Message Passing Interface (MPI) on a multi-node compute cluster, paraBLAST and its Web server, CyberparaBLAST. The CyberparaBLAST Web server can be accessed through Web browsers on intranet Web servers. CyberparaBLAST enables the researchers of institutes to query sequence databases in the real time when needed. Parallelized computing together with cyber access make the bioinformatics research more efficient with the aid of CyberparaBLAST.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125959817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253493
J. Khan, Qingping Tao
The paper presents an interesting study that how the user surfing behavior with respect to the organization of a Web space affects the performance of a prefetch enabled proxy. We have conducted experiments based on a novel hyperspace aware prefetch proxy and have studied the prefetch performance on tree and complete graph. The study assesses the system's responsiveness as well as the background loads for various user interaction duration, surfing and prefetch sequences. The results show that awareness about the Web space and surfing sequence can greatly help in improving prefetch performance. Schemes such as these also conversely may enable professional content developers to create prefetch friendly collection for increased site responsiveness.
{"title":"Webspace surfing patterns and their impact on Web prefetching","authors":"J. Khan, Qingping Tao","doi":"10.1109/CYBER.2003.1253493","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253493","url":null,"abstract":"The paper presents an interesting study that how the user surfing behavior with respect to the organization of a Web space affects the performance of a prefetch enabled proxy. We have conducted experiments based on a novel hyperspace aware prefetch proxy and have studied the prefetch performance on tree and complete graph. The study assesses the system's responsiveness as well as the background loads for various user interaction duration, surfing and prefetch sequences. The results show that awareness about the Web space and surfing sequence can greatly help in improving prefetch performance. Schemes such as these also conversely may enable professional content developers to create prefetch friendly collection for increased site responsiveness.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253460
R. Jegathese, G. L. Guan, L. Rajiv, E. Ng, D. Ghista, E. Prakash
This paper presents a model-based representation of the heart shape, and dynamics. The left ventricle (LV) of the heart is constructed as a mathematical model, close to the shape of actual LV. The model is made suitable for simulating the deformation of the heart during the cardiac cycle. A pseudo stress and strain analysis are conducted on the ventricular myocardium, and visualized. The visualization software is capable of simulating the conditions of a diseased heart. The interactive model and software implementation is useful for wide range of simulation studies that can be integrated with this virtual model that can help in fields like clinical treatment planning, manufacture of artificial heart, study of heart diseases etc.
{"title":"Cyber heart: the employment of an iterative design process to develop a left ventricular heart graphical display","authors":"R. Jegathese, G. L. Guan, L. Rajiv, E. Ng, D. Ghista, E. Prakash","doi":"10.1109/CYBER.2003.1253460","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253460","url":null,"abstract":"This paper presents a model-based representation of the heart shape, and dynamics. The left ventricle (LV) of the heart is constructed as a mathematical model, close to the shape of actual LV. The model is made suitable for simulating the deformation of the heart during the cardiac cycle. A pseudo stress and strain analysis are conducted on the ventricular myocardium, and visualized. The visualization software is capable of simulating the conditions of a diseased heart. The interactive model and software implementation is useful for wide range of simulation studies that can be integrated with this virtual model that can help in fields like clinical treatment planning, manufacture of artificial heart, study of heart diseases etc.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117169666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253438
Choo Tian Fook, Qingping Lin, Z. Liang
In order to achieve entity evolvement, enrich socialization of virtual community and optimize computer processing in the collaborative virtual environment (CVE), efficient collaborative interaction management (CIM) is a key to handle these issues. In this paper, we focus on functional extensibility in CVE, and give the solution by using the conceptual idea of our proposed CIM approach, called task-oriented interaction management. This approach has four important components, which are scene interaction manager, virtual entity interaction manager, interaction task agent, and scene role & rules. They have certain capabilities, like data distribution, load-balance, tasks migration, ownership transfer, entities' states consistency maintenance, database persistency management and etc. The motivation of this research is to develop an extensible and evolving CVE with extensible functionalities for creating large-scale collaborative interaction experience to users in a large-scale interconnected 3D virtual environment. Details of the conceptual framework of the task-oriented interaction management will be presented in this paper.
{"title":"A novel approach for addressing extensibility issue in collaborative virtual environment","authors":"Choo Tian Fook, Qingping Lin, Z. Liang","doi":"10.1109/CYBER.2003.1253438","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253438","url":null,"abstract":"In order to achieve entity evolvement, enrich socialization of virtual community and optimize computer processing in the collaborative virtual environment (CVE), efficient collaborative interaction management (CIM) is a key to handle these issues. In this paper, we focus on functional extensibility in CVE, and give the solution by using the conceptual idea of our proposed CIM approach, called task-oriented interaction management. This approach has four important components, which are scene interaction manager, virtual entity interaction manager, interaction task agent, and scene role & rules. They have certain capabilities, like data distribution, load-balance, tasks migration, ownership transfer, entities' states consistency maintenance, database persistency management and etc. The motivation of this research is to develop an extensible and evolving CVE with extensible functionalities for creating large-scale collaborative interaction experience to users in a large-scale interconnected 3D virtual environment. Details of the conceptual framework of the task-oriented interaction management will be presented in this paper.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253485
Cédric Buche, R. Querrec, P. D. Loor, P. Chevaillier
This study concerns virtual environments for training in operational conditions. The principal developed idea is that these environments are heterogeneous and open multi-agent systems. The MASCARET model is proposed to organize the interactions between agents and to provide them reactive, cognitive and social abilities to simulate the physical and social environment. The physical environment represents, in a realistic way, the phenomena that learners and teachers have to take into account. The social environment is simulated by agents executing collaborative and adaptive tasks. These agents realize, in team, procedures that they have to adapt to the environment. The users participate to the training environment through their avatar. In this article, we explain how we integrated in MASCARET models necessary to the creation of Intelligent Tutoring System. We notably incorporate pedagogical strategies and pedagogical actions. We present pedagogical agents. To validate our model, the SECUREVI application for fire-fighters training is developed.
{"title":"MASCARET: pedagogical multi-agents systems for virtual environment for training","authors":"Cédric Buche, R. Querrec, P. D. Loor, P. Chevaillier","doi":"10.1109/CYBER.2003.1253485","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253485","url":null,"abstract":"This study concerns virtual environments for training in operational conditions. The principal developed idea is that these environments are heterogeneous and open multi-agent systems. The MASCARET model is proposed to organize the interactions between agents and to provide them reactive, cognitive and social abilities to simulate the physical and social environment. The physical environment represents, in a realistic way, the phenomena that learners and teachers have to take into account. The social environment is simulated by agents executing collaborative and adaptive tasks. These agents realize, in team, procedures that they have to adapt to the environment. The users participate to the training environment through their avatar. In this article, we explain how we integrated in MASCARET models necessary to the creation of Intelligent Tutoring System. We notably incorporate pedagogical strategies and pedagogical actions. We present pedagogical agents. To validate our model, the SECUREVI application for fire-fighters training is developed.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253452
M. M. O. Neto, M. Slater, J. Crowcroft
The Internet, as an accessible network with global connectivity, presents itself as the likely solution for the supporting infrastructure of cyberspace. In contrast, the field of virtual environments (VE) is fragmented with a wide proliferation of different systems, as a result of the current development trend. However, these divergent systems present a significant overlap of functionality that represents a waste of development resources and a detriment to innovation. This paper proposes Mayhem as a new approach to the design and development of VE systems. Our approach relies heavily on component design methodology coupled with a simple layered approach to system architectures. The combination of the two promotes the construction of systems from smaller building blocks, which may have been developed by different sources, each specializing in the supported functionality. Although Mayhem promotes the trend of middleware, it requires a common base infrastructure - the Java Adaptive Dynamic Environment (JADE). To demonstrate how to build a VE system using Mayhem, the paper describes a simple prototype of a VE and some of its key building blocks.
{"title":"How to build virtual environment systems with component frameworks","authors":"M. M. O. Neto, M. Slater, J. Crowcroft","doi":"10.1109/CYBER.2003.1253452","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253452","url":null,"abstract":"The Internet, as an accessible network with global connectivity, presents itself as the likely solution for the supporting infrastructure of cyberspace. In contrast, the field of virtual environments (VE) is fragmented with a wide proliferation of different systems, as a result of the current development trend. However, these divergent systems present a significant overlap of functionality that represents a waste of development resources and a detriment to innovation. This paper proposes Mayhem as a new approach to the design and development of VE systems. Our approach relies heavily on component design methodology coupled with a simple layered approach to system architectures. The combination of the two promotes the construction of systems from smaller building blocks, which may have been developed by different sources, each specializing in the supported functionality. Although Mayhem promotes the trend of middleware, it requires a common base infrastructure - the Java Adaptive Dynamic Environment (JADE). To demonstrate how to build a VE system using Mayhem, the paper describes a simple prototype of a VE and some of its key building blocks.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126611970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253483
N. Fujii, S. Yukita, N. Koike, T. Kunii
New top-down eLearning tools for hardware logic design courses using the cellular methods are presented that enable students to keep focusing on their primary interests so that they can achieve complex logic circuits design successfully. In a modern logic design classroom, hardware description languages such as VerilogHDL are mostly used to describe circuits for FPGAs. The circuit in each module is described in VerilogHDL and the entire circuit is implemented by combination of designed modules. These HDL descriptions are wrapped in XML and enriched by a specially extended XML vocabulary, in order to share designed modules among learners on the Web. Although XML gives us a common and convenient Web framework, it becomes difficult to verify, validate, and maintain conformance among designed modules if the system becomes very large. To overcome this problem, we employed the cellular models that ensure the consistency among design modules and support a top-down design methodology. The proposed top-down eLearning tools can generate these circuit design data, distribute them to the learner, and manage the design database. The circuit design data wrapped in XML vocabulary are offered to the learner as a self-learning material of the courseware using the top-down (i.e. goal-oriented) method, according to the demand.
{"title":"Top-down eLearning tools for hardware logic design","authors":"N. Fujii, S. Yukita, N. Koike, T. Kunii","doi":"10.1109/CYBER.2003.1253483","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253483","url":null,"abstract":"New top-down eLearning tools for hardware logic design courses using the cellular methods are presented that enable students to keep focusing on their primary interests so that they can achieve complex logic circuits design successfully. In a modern logic design classroom, hardware description languages such as VerilogHDL are mostly used to describe circuits for FPGAs. The circuit in each module is described in VerilogHDL and the entire circuit is implemented by combination of designed modules. These HDL descriptions are wrapped in XML and enriched by a specially extended XML vocabulary, in order to share designed modules among learners on the Web. Although XML gives us a common and convenient Web framework, it becomes difficult to verify, validate, and maintain conformance among designed modules if the system becomes very large. To overcome this problem, we employed the cellular models that ensure the consistency among design modules and support a top-down design methodology. The proposed top-down eLearning tools can generate these circuit design data, distribute them to the learner, and manage the design database. The circuit design data wrapped in XML vocabulary are offered to the learner as a self-learning material of the courseware using the top-down (i.e. goal-oriented) method, according to the demand.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116093638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253451
P. Bao, D. Gourlay, Youfu Li
Depth images, comprising pixel intensities and depth map, are viewed as a compact model of 3D scenes and used in 3D image warping for the distributed or collaborative virtual environment to enable the distributed rendering of complex 3D scenes at relatively low cost. The major overhead of the model is the transmission of the depth images of the initial reference and the subsequent new views that may be up to a few Mbs in size depending on the screen resolution. This paper presents efficient compression techniques specifically designed for the depth images. Additionally we experiment with the warped image quality by reducing the resolution of the depth map. We show that significant compression can be achieved at a cost of a very modest impairment in the perceptual quality of the warped image.
{"title":"Context modeling based depth image compression for distributed virtual environment","authors":"P. Bao, D. Gourlay, Youfu Li","doi":"10.1109/CYBER.2003.1253451","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253451","url":null,"abstract":"Depth images, comprising pixel intensities and depth map, are viewed as a compact model of 3D scenes and used in 3D image warping for the distributed or collaborative virtual environment to enable the distributed rendering of complex 3D scenes at relatively low cost. The major overhead of the model is the transmission of the depth images of the initial reference and the subsequent new views that may be up to a few Mbs in size depending on the screen resolution. This paper presents efficient compression techniques specifically designed for the depth images. Additionally we experiment with the warped image quality by reducing the resolution of the depth map. We show that significant compression can be achieved at a cost of a very modest impairment in the perceptual quality of the warped image.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"73 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133558727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}