Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847695
Taoufiq Zarra, R. Chiheb, R. Faizi, A. El Afia
Currently the variety of possibilities of browsing the Web either via PCs, tablets or mobile phones has allowed learners to have access to a large repository of learning resources. However, given that most e-learning platforms, mainly used by universities and academic institutions around the world, do not actively follow the technological development as they usually require a lot of hardware and software resources, having recourse to Cloud computing technologies will certainly change the way applications are designed and accessed, and will, at the same time, contribute in cutting down costs. In this respect, the use of Web 2.0 technologies, which have completely revolutionized the way in which individuals communicate, are capable of enhancing the ways both learning and teaching are conducted. Our objective in this paper is, two-fold: examine the current state and the challenges of using cloud technologies in e-learning environments propose a cloud-based service that would monitor and foster students' learning and provide educators with recommendations to improve platforms and resources.
{"title":"Cloud computing and sentiment analysis in E-learning systems","authors":"Taoufiq Zarra, R. Chiheb, R. Faizi, A. El Afia","doi":"10.1109/CLOUDTECH.2016.7847695","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847695","url":null,"abstract":"Currently the variety of possibilities of browsing the Web either via PCs, tablets or mobile phones has allowed learners to have access to a large repository of learning resources. However, given that most e-learning platforms, mainly used by universities and academic institutions around the world, do not actively follow the technological development as they usually require a lot of hardware and software resources, having recourse to Cloud computing technologies will certainly change the way applications are designed and accessed, and will, at the same time, contribute in cutting down costs. In this respect, the use of Web 2.0 technologies, which have completely revolutionized the way in which individuals communicate, are capable of enhancing the ways both learning and teaching are conducted. Our objective in this paper is, two-fold: examine the current state and the challenges of using cloud technologies in e-learning environments propose a cloud-based service that would monitor and foster students' learning and provide educators with recommendations to improve platforms and resources.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847698
M'barek El Haloui, A. Kriouile
Market competitiveness and technological evolution encourage companies to seek IT solutions enabling to save costs, increase productivity, and focus on high value-added activities. Outsourcing and cloud computing activities become increasingly adopted choices. That is why, decision makers need to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article presents a maturity assessment model of a functional block information system in order to outsource it to Cloud. Basing on the enterprise architecture point of view, best practices repositories, basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provide new benefits for opened Enterprise Architectures to cloud computing.
{"title":"A decision-support model enabling a proactive vision of Cloud Computing adoption","authors":"M'barek El Haloui, A. Kriouile","doi":"10.1109/CLOUDTECH.2016.7847698","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847698","url":null,"abstract":"Market competitiveness and technological evolution encourage companies to seek IT solutions enabling to save costs, increase productivity, and focus on high value-added activities. Outsourcing and cloud computing activities become increasingly adopted choices. That is why, decision makers need to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article presents a maturity assessment model of a functional block information system in order to outsource it to Cloud. Basing on the enterprise architecture point of view, best practices repositories, basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provide new benefits for opened Enterprise Architectures to cloud computing.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133966435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847699
Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif
Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.
{"title":"ECC certificate for authentication in cloud-based RFID","authors":"Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif","doi":"10.1109/CLOUDTECH.2016.7847699","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847699","url":null,"abstract":"Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847694
S. Hemam, O. Hioual
In this paper, we investigate the cloud service selection model by taking into account the load-balancing across different clouds. Indeed, a number of service providers offer similar services at various prices and performance levels which made a real decision -making problem in a service selection. This problem occurs in a multi cloud environment when we need to select a service by taking into consideration the preference of users (minimizing both cost and response time) and the requirement of the system (load balancing between clouds). In this work, we present our solution which allows to select a cloud service by taking into account the preferences of the user and also which allows to balance the load between different clouds. The proposed solution is based on the MCDA: Multi Criteria Decision Analysis and the Markov Chain Model.
{"title":"Load balancing issue in cloud services selection by using MCDA and Markov Chain Model approaches","authors":"S. Hemam, O. Hioual","doi":"10.1109/CLOUDTECH.2016.7847694","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847694","url":null,"abstract":"In this paper, we investigate the cloud service selection model by taking into account the load-balancing across different clouds. Indeed, a number of service providers offer similar services at various prices and performance levels which made a real decision -making problem in a service selection. This problem occurs in a multi cloud environment when we need to select a service by taking into consideration the preference of users (minimizing both cost and response time) and the requirement of the system (load balancing between clouds). In this work, we present our solution which allows to select a cloud service by taking into account the preferences of the user and also which allows to balance the load between different clouds. The proposed solution is based on the MCDA: Multi Criteria Decision Analysis and the Markov Chain Model.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132794484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847682
Khalid El Makkaoui, Abdellah Ezzati, A. Beni-Hssane, C. Motamed
Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a major barrier to cloud services adoption. Indeed, many research works have been done to identify cloud security and privacy issues. It is in this context that in this paper, we will provide a new cloud security and privacy model (CSPM) into layers which can be taken into account by cloud providers during all the stages of cloud services building and monitoring. This model will permit to overcome this cloud services barrier adoption and thus, to build confidence in cloud services and also to provide secure services. Finally, we will present some security threats and attacks, and propose, according to CSPM, some countermeasures.
{"title":"Cloud security and privacy model for providing secure cloud services","authors":"Khalid El Makkaoui, Abdellah Ezzati, A. Beni-Hssane, C. Motamed","doi":"10.1109/CLOUDTECH.2016.7847682","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847682","url":null,"abstract":"Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a major barrier to cloud services adoption. Indeed, many research works have been done to identify cloud security and privacy issues. It is in this context that in this paper, we will provide a new cloud security and privacy model (CSPM) into layers which can be taken into account by cloud providers during all the stages of cloud services building and monitoring. This model will permit to overcome this cloud services barrier adoption and thus, to build confidence in cloud services and also to provide secure services. Finally, we will present some security threats and attacks, and propose, according to CSPM, some countermeasures.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847722
S. Ha, D. Venzano, P. Brown, P. Michiardi
In this work we study the I/O performance of long, sequential workloads that mimic those of Big Data applications, to understand the implications of system virtualization on data-intensive frameworks such as Apache Hadoop and Spark, which are frequently run in clusters of Virtual Machines (VMs). We do so through an experimental measurement campaign that collects low-level traces and metrics, to show the role played by important parameters such as the I/O schedulers and caching mechanisms involved in the I/O path, and the VM configuration in terms of dedicated resources. Our findings are important, especially for determining appropriate deployment strategies for today's emerging Analytics Services hosted both on public and private clouds.
{"title":"On the impact of virtualization on the I/O performance of analytic workloads","authors":"S. Ha, D. Venzano, P. Brown, P. Michiardi","doi":"10.1109/CLOUDTECH.2016.7847722","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847722","url":null,"abstract":"In this work we study the I/O performance of long, sequential workloads that mimic those of Big Data applications, to understand the implications of system virtualization on data-intensive frameworks such as Apache Hadoop and Spark, which are frequently run in clusters of Virtual Machines (VMs). We do so through an experimental measurement campaign that collects low-level traces and metrics, to show the role played by important parameters such as the I/O schedulers and caching mechanisms involved in the I/O path, and the VM configuration in terms of dedicated resources. Our findings are important, especially for determining appropriate deployment strategies for today's emerging Analytics Services hosted both on public and private clouds.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847686
Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati
Task scheduling is one of the most challenging aspects in cloud computing nowadays, which plays an important role to improve the overall performance and services of the cloud such as response time, cost, makespan, throughput etc. Mostly a non-optimal task scheduling algorithm can be a key tool in over utilization or under utilization of cloud resources. In order to solve these problems, this paper proposes a novel architecture to schedule the tasks in cloud computing on the basis of a new Dynamic Dispatch Queues Algorithm (DDQA) and Particle Swarm Optimization (PSO) algorithm. The proposed algorithm DDQA-PSO gives full consideration to the dynamic characteristics of the cloud computing environment. The experimental results based on CloudSim simulator show that the proposed architecture can effectively achieve good performance, load balancing, and improve the resource utilization.
{"title":"A novel architecture for task scheduling based on Dynamic Queues and Particle Swarm Optimization in cloud computing","authors":"Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati","doi":"10.1109/CLOUDTECH.2016.7847686","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847686","url":null,"abstract":"Task scheduling is one of the most challenging aspects in cloud computing nowadays, which plays an important role to improve the overall performance and services of the cloud such as response time, cost, makespan, throughput etc. Mostly a non-optimal task scheduling algorithm can be a key tool in over utilization or under utilization of cloud resources. In order to solve these problems, this paper proposes a novel architecture to schedule the tasks in cloud computing on the basis of a new Dynamic Dispatch Queues Algorithm (DDQA) and Particle Swarm Optimization (PSO) algorithm. The proposed algorithm DDQA-PSO gives full consideration to the dynamic characteristics of the cloud computing environment. The experimental results based on CloudSim simulator show that the proposed architecture can effectively achieve good performance, load balancing, and improve the resource utilization.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847685
B. Mohamed, Khamlichi Idrissi Youness, Moughit Mohamed
Recently, with the rapid growth of distributed computing, high performance computing and cloud services, trust issue is a primary concern and become a hot topic. Furthermore, the lack of trust comes from a lack of transparency, loss of control over data and unclear security assurances, which impedes its large-scale adoption. To fill these gaps, the authors have dissected the challenges related to cloud computing trust and the virtual environment, components of trust and approaches able to establish an acceptable level of trust in the minds of users.
{"title":"Taking account of trust when adopting cloud computing architecture","authors":"B. Mohamed, Khamlichi Idrissi Youness, Moughit Mohamed","doi":"10.1109/CLOUDTECH.2016.7847685","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847685","url":null,"abstract":"Recently, with the rapid growth of distributed computing, high performance computing and cloud services, trust issue is a primary concern and become a hot topic. Furthermore, the lack of trust comes from a lack of transparency, loss of control over data and unclear security assurances, which impedes its large-scale adoption. To fill these gaps, the authors have dissected the challenges related to cloud computing trust and the virtual environment, components of trust and approaches able to establish an acceptable level of trust in the minds of users.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115608643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-24DOI: 10.1109/CLOUDTECH.2016.7847684
E. Barrah, Said Safi, A. Malaoui
In this paper, we describe a texture analysis which plays an important role in face analysis. Many studies have used texture image to characterize a face. Local Binary Pattern (LBP) coding is a state-of-the-art technique characterized by it's simplicity and efficiency. In the proposed method, we associate Local Binary Pattern with integral image representation, which permits to evaluate the sum of values over rectangular regions, in the Singular Value Decomposition (SVD) domain. Finally, the obtained results, using the proposed method, will be compared with those obtained from other local approaches.
{"title":"New technique for face recognition based on Singular Value Decomposition (SVD)","authors":"E. Barrah, Said Safi, A. Malaoui","doi":"10.1109/CLOUDTECH.2016.7847684","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847684","url":null,"abstract":"In this paper, we describe a texture analysis which plays an important role in face analysis. Many studies have used texture image to characterize a face. Local Binary Pattern (LBP) coding is a state-of-the-art technique characterized by it's simplicity and efficiency. In the proposed method, we associate Local Binary Pattern with integral image representation, which permits to evaluate the sum of values over rectangular regions, in the Singular Value Decomposition (SVD) domain. Finally, the obtained results, using the proposed method, will be compared with those obtained from other local approaches.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through internet. It enables IT managers to provision services to users faster and in a cost-effective way. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intruders. Indeed, one of the major security issues in Cloud is to protect against distributed attacks and other malicious activities on the network that can affect confidentiality, availability and integrity of Cloud resources. In order to solve these problems, we propose a Collaborative Network Intrusion Detection System (C-NIDS) to detect network attacks in Cloud by monitoring network traffic, while offering high accuracy by addressing newer challenges, namely, intrusion detection in virtual network, monitoring high traffic, scalability and resistance capability. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Support Vector Machine (SVM). Moreover, in this framework, the NIDS sensors deployed in Cloud operate in collaborative way to oppose the coordinated attacks against cloud infrastructure and knowledge base remains up-to-date.
{"title":"A collaborative framework for intrusion detection (C-NIDS) in Cloud computing","authors":"Zayed Alhaddad, Mostafa Hanoune, Abdelaziz Mamouni","doi":"10.1109/CLOUDTECH.2016.7847708","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847708","url":null,"abstract":"In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through internet. It enables IT managers to provision services to users faster and in a cost-effective way. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intruders. Indeed, one of the major security issues in Cloud is to protect against distributed attacks and other malicious activities on the network that can affect confidentiality, availability and integrity of Cloud resources. In order to solve these problems, we propose a Collaborative Network Intrusion Detection System (C-NIDS) to detect network attacks in Cloud by monitoring network traffic, while offering high accuracy by addressing newer challenges, namely, intrusion detection in virtual network, monitoring high traffic, scalability and resistance capability. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Support Vector Machine (SVM). Moreover, in this framework, the NIDS sensors deployed in Cloud operate in collaborative way to oppose the coordinated attacks against cloud infrastructure and knowledge base remains up-to-date.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}