Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711048
A. Sang, Xin Zhao, Hexin Chen, Silin Mang
Three-dimensional vector matrix discrete cosine transform coding (3DVMDCT) deals with each component of color image in a unified model, fully eliminates the correlation between them and gets an obvious advantage. But its block-size of image segmentation is fixed and does not fully take into account that there are different statistical properties in different regions. In this paper, we take gradient as the image measure activity (IAM), propose a new method—variable matrix-size three-dimensional vector matrix image segmentation (VMS-3DVMDCT), and implement the corresponding multi-dimensional vector matrix discrete cosine transform coding, experimental results show that, compared with the fixed block partition, the proposed algorithm improves PSNR at most 1dB, and the quality of the reconstructed image is improved in subject evaluation, much better than JPEG.
{"title":"Color image transform coding based on three dimensional variable vector matrix size segmentation","authors":"A. Sang, Xin Zhao, Hexin Chen, Silin Mang","doi":"10.1109/ICCIT.2010.5711048","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711048","url":null,"abstract":"Three-dimensional vector matrix discrete cosine transform coding (3DVMDCT) deals with each component of color image in a unified model, fully eliminates the correlation between them and gets an obvious advantage. But its block-size of image segmentation is fixed and does not fully take into account that there are different statistical properties in different regions. In this paper, we take gradient as the image measure activity (IAM), propose a new method—variable matrix-size three-dimensional vector matrix image segmentation (VMS-3DVMDCT), and implement the corresponding multi-dimensional vector matrix discrete cosine transform coding, experimental results show that, compared with the fixed block partition, the proposed algorithm improves PSNR at most 1dB, and the quality of the reconstructed image is improved in subject evaluation, much better than JPEG.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711067
Hiromichi Kobashi, S. Kawata, H. Usami, S. Kawata, M. Matsumoto, D. Barada
In this paper, we introduce a new framework called PSE Park for constructing a Problem Solving Environment (PSE); it enables us to construct PSEs easily. PSE Park outputs PSEs depending on user's demand/input. In this sense, PSE Park is a kind of PSE for PSE, and helps users to construct PSEs. PSE Park consists of four engines: PIPE server, core, registration engine, and console. A PSE designed and constructed in PSE Park consists of several cores, which are functions of a PSE. The PIPE server manages the cores on the basis of the core map, which expresses the flow of the cores for a specific PSE. The output of each core is retrieved and merged by the PIPE server. All outputs of the cores are saved and easily reused. The cores are independent of programming languages because each core is executed individually as a process in PSE Park. They are registered by using the registration engine, and users access the engines via the console. All data including the core itself, definitions related to the core, the core map, results, and so on are stored in a distributed key-value store on the cloud computing environment. PSE Park retrieves the data by using a key name that can identify individual data uniquely. We applied PSE Park to develop the job execution PSE and the PSE for partial differential equation (PDE)-based problems. The job execution PSE helps Finite Difference Time Domain (FDTD) simulation execution. This PSE outputs the simulation results of the electric field. PDE-based PSE supports some simulation steps. Seven cores were used to construct this example PSE. By using this PSE, users can execute a PDE-based simulation and obtain a detailed document about the simulation. We believe that the concept of PSE Park, i.e., a framework for PSE development, presents a meaningful new direction for problem solving environments.
{"title":"A meta Problem Solving Environment (PSE)","authors":"Hiromichi Kobashi, S. Kawata, H. Usami, S. Kawata, M. Matsumoto, D. Barada","doi":"10.1109/ICCIT.2010.5711067","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711067","url":null,"abstract":"In this paper, we introduce a new framework called PSE Park for constructing a Problem Solving Environment (PSE); it enables us to construct PSEs easily. PSE Park outputs PSEs depending on user's demand/input. In this sense, PSE Park is a kind of PSE for PSE, and helps users to construct PSEs. PSE Park consists of four engines: PIPE server, core, registration engine, and console. A PSE designed and constructed in PSE Park consists of several cores, which are functions of a PSE. The PIPE server manages the cores on the basis of the core map, which expresses the flow of the cores for a specific PSE. The output of each core is retrieved and merged by the PIPE server. All outputs of the cores are saved and easily reused. The cores are independent of programming languages because each core is executed individually as a process in PSE Park. They are registered by using the registration engine, and users access the engines via the console. All data including the core itself, definitions related to the core, the core map, results, and so on are stored in a distributed key-value store on the cloud computing environment. PSE Park retrieves the data by using a key name that can identify individual data uniquely. We applied PSE Park to develop the job execution PSE and the PSE for partial differential equation (PDE)-based problems. The job execution PSE helps Finite Difference Time Domain (FDTD) simulation execution. This PSE outputs the simulation results of the electric field. PDE-based PSE supports some simulation steps. Seven cores were used to construct this example PSE. By using this PSE, users can execute a PDE-based simulation and obtain a detailed document about the simulation. We believe that the concept of PSE Park, i.e., a framework for PSE development, presents a meaningful new direction for problem solving environments.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711071
W. Bholsithi, Natthawadee Phichitchaiphan, C. Sinthanayothin
Dental cast models along with dental identification data have been extensively applied in cephalometric analysis and dental identification. However, the lack of database to handle both dental cast models along with dental identification data has prevent the researchers and dentists from making an access into the dental information for further dental researches. The solution is to create the online dental model database to collect both 2D and 3D dental cast images with the search function from the information of both dentists who collect the dental model images and other dentists who are database users. Furthermore, the online dental database has facilities to record the dental identification data from individual teeth and the overall dental structure in details useful for dealing with the missing persons by matching the postmortem dental artifacts with the dental records from dental model and dental identification data.
{"title":"Online dental information database for dental identification system","authors":"W. Bholsithi, Natthawadee Phichitchaiphan, C. Sinthanayothin","doi":"10.1109/ICCIT.2010.5711071","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711071","url":null,"abstract":"Dental cast models along with dental identification data have been extensively applied in cephalometric analysis and dental identification. However, the lack of database to handle both dental cast models along with dental identification data has prevent the researchers and dentists from making an access into the dental information for further dental researches. The solution is to create the online dental model database to collect both 2D and 3D dental cast images with the search function from the information of both dentists who collect the dental model images and other dentists who are database users. Furthermore, the online dental database has facilities to record the dental identification data from individual teeth and the overall dental structure in details useful for dealing with the missing persons by matching the postmortem dental artifacts with the dental records from dental model and dental identification data.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711147
Liangliang Sun, W. Liu, Baoxing Xu, T. Chai
The steel-making and continuous casting process is the connection between the iron process and the rolling process; it is the bottleneck in the iron and steel production. A better scheduling of this process is the key factor to ensure the whole production in a well-organized rhythm for iron and steel production manufacturing productivity. The branch and cut method in the standard commercial solver CPLEX is introduced to solve the scheduling problem. The linearization methods for the linear conversion are highlighted. Due to the limited calculation time requirement about the scheduling results and the scale of the problem, special methods for the efficiency tuning are applied according to the characters of the problem. Numerical testing supported by Shanghai Bashan steel plant demonstrated that the computational results show significant improvement compared to the traditional manual scheduling results.
{"title":"The scheduling of steel-making and continuous casting process using branch and cut method via CPLEX optimization","authors":"Liangliang Sun, W. Liu, Baoxing Xu, T. Chai","doi":"10.1109/ICCIT.2010.5711147","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711147","url":null,"abstract":"The steel-making and continuous casting process is the connection between the iron process and the rolling process; it is the bottleneck in the iron and steel production. A better scheduling of this process is the key factor to ensure the whole production in a well-organized rhythm for iron and steel production manufacturing productivity. The branch and cut method in the standard commercial solver CPLEX is introduced to solve the scheduling problem. The linearization methods for the linear conversion are highlighted. Due to the limited calculation time requirement about the scheduling results and the scale of the problem, special methods for the efficiency tuning are applied according to the characters of the problem. Numerical testing supported by Shanghai Bashan steel plant demonstrated that the computational results show significant improvement compared to the traditional manual scheduling results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711154
Zhao Shide, X. Xue
In order to achieve effective cooperation of the engineering project team, this paper constructed the cooperation model of the engineering project team and analyzed the cultural regulating, profit regulating and institution regulating in the engineering project team form the viewing angle of system theory based on existing research results. Furthermore, this paper proposed four kinds of management methods of engineering project team cooperation, such as team reliance management, team conflict management, team study management and team encouragement management.
{"title":"An framework for team cooperation in engineering project management","authors":"Zhao Shide, X. Xue","doi":"10.1109/ICCIT.2010.5711154","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711154","url":null,"abstract":"In order to achieve effective cooperation of the engineering project team, this paper constructed the cooperation model of the engineering project team and analyzed the cultural regulating, profit regulating and institution regulating in the engineering project team form the viewing angle of system theory based on existing research results. Furthermore, this paper proposed four kinds of management methods of engineering project team cooperation, such as team reliance management, team conflict management, team study management and team encouragement management.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130993675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711209
Kil-Sang Yoo
In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.
{"title":"A recoverable watermarking for authentication using Singular Value Decomposition","authors":"Kil-Sang Yoo","doi":"10.1109/ICCIT.2010.5711209","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711209","url":null,"abstract":"In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131451338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711113
Kullapat Theera-angkananon, P. Bhattarakosol
Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became the hackers' stimuli in breaking the protection mechanisms. Therefore, this paper proposes a protection mechanism, Byte Encoding Protection (BENPro), for preventing an audio file, such as mp3 format from copying and distributing by illegal distributors. The aim of this paper is that the protection mechanism cannot be recognized from hackers and users. The result of this experiment indicates that most users believe that the defects occur from the transfer mechanism rather than the protection mechanism. Thus, the protection of IP is maintained as expected.
{"title":"BENPro: A blinding protection method in digital right management","authors":"Kullapat Theera-angkananon, P. Bhattarakosol","doi":"10.1109/ICCIT.2010.5711113","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711113","url":null,"abstract":"Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became the hackers' stimuli in breaking the protection mechanisms. Therefore, this paper proposes a protection mechanism, Byte Encoding Protection (BENPro), for preventing an audio file, such as mp3 format from copying and distributing by illegal distributors. The aim of this paper is that the protection mechanism cannot be recognized from hackers and users. The result of this experiment indicates that most users believe that the defects occur from the transfer mechanism rather than the protection mechanism. Thus, the protection of IP is maintained as expected.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711165
Wang Xuetong
20 factors are selected to frame a primary factor set from 38 factors obtained through literature study. The methods of Mean Score and Ranking Agreement Factor are applied to calculate the sorting order and analyze the consistency of market survey data. The results show that 17 factors concerning owner's engineering capabilities, owner's preferences to project construction, project properties, and lump-sum contracting market conditions exert a profound influence on the decision-making of lump-sum contracting project delivery methods. Finally, countermeasures and suggestions are proposed to promote a rapid and sound development of lump-sum contracting system in Chinese construction industry.
{"title":"Key factors influencing the decision-making of lump-sum contracting project delivery methods in China","authors":"Wang Xuetong","doi":"10.1109/ICCIT.2010.5711165","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711165","url":null,"abstract":"20 factors are selected to frame a primary factor set from 38 factors obtained through literature study. The methods of Mean Score and Ranking Agreement Factor are applied to calculate the sorting order and analyze the consistency of market survey data. The results show that 17 factors concerning owner's engineering capabilities, owner's preferences to project construction, project properties, and lump-sum contracting market conditions exert a profound influence on the decision-making of lump-sum contracting project delivery methods. Finally, countermeasures and suggestions are proposed to promote a rapid and sound development of lump-sum contracting system in Chinese construction industry.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711175
Z. Chen
Analyzed individual's main role in tacit knowledge transfer between organizations. Based on social network theory and method, the relationships of tacit knowledge transfer among members of different organizations were taken as a social network. Tacit knowledge transfer network of UIC as an example is analyzed from both qualitative and quantitative perspective, the network's structure and characteristics were measured and analyzed, then the effect of network's formal and informal transfer channels on tacit knowledge transfer was revealed. Obtained conclusions that inter-organizational tacit knowledge transfer network has the features of social network and obvious hierarchy, the degree of close contact within the organization is greater than that between organizations, network which has both formal and informal channels in the dependence of intermediary role is far below than the one which has only informal channel, formal transfer channel can increase network centralization and improve transfer efficiency, while informal channel reduces network intermediary and vulnerability.
{"title":"Study on the inter-organizational tacit knowledge transfer network","authors":"Z. Chen","doi":"10.1109/ICCIT.2010.5711175","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711175","url":null,"abstract":"Analyzed individual's main role in tacit knowledge transfer between organizations. Based on social network theory and method, the relationships of tacit knowledge transfer among members of different organizations were taken as a social network. Tacit knowledge transfer network of UIC as an example is analyzed from both qualitative and quantitative perspective, the network's structure and characteristics were measured and analyzed, then the effect of network's formal and informal transfer channels on tacit knowledge transfer was revealed. Obtained conclusions that inter-organizational tacit knowledge transfer network has the features of social network and obvious hierarchy, the degree of close contact within the organization is greater than that between organizations, network which has both formal and informal channels in the dependence of intermediary role is far below than the one which has only informal channel, formal transfer channel can increase network centralization and improve transfer efficiency, while informal channel reduces network intermediary and vulnerability.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711058
F. Xiaoling, Gao Hua
In the news video, As a high-level semantic features, video text play a crucial role for the semantics understanding, video analysis, quick video clips retrieval of news video. We propose a new video character extraction method that is gray-based. It makes full use of gray information of the video image and the news video text features to detect the video frame which contain text information, and uses mathematical statistical method to find the location where text appears, then do the binary processing of the candidate region image, at last uses OCR software package to recognize the text. This article also finish a simple news video retrieval system, and text extraction algorithm is applied to the system. Experiment results on Chinese CCTV news video show the encouraging performance of the proposed algorithm.
{"title":"Gray-based news video text extraction approach","authors":"F. Xiaoling, Gao Hua","doi":"10.1109/ICCIT.2010.5711058","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711058","url":null,"abstract":"In the news video, As a high-level semantic features, video text play a crucial role for the semantics understanding, video analysis, quick video clips retrieval of news video. We propose a new video character extraction method that is gray-based. It makes full use of gray information of the video image and the news video text features to detect the video frame which contain text information, and uses mathematical statistical method to find the location where text appears, then do the binary processing of the candidate region image, at last uses OCR software package to recognize the text. This article also finish a simple news video retrieval system, and text extraction algorithm is applied to the system. Experiment results on Chinese CCTV news video show the encouraging performance of the proposed algorithm.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}