Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324858
R. Poenaru, M. Simon
brief description of the XRootD architecture and its purpose within the Worldwide Large Hadron Collider Computing Grid (WLCG), alongside an overview of the server-and client- sides of the XRootD framework are discussed in the present work. The client-side of XRootD has a relatively new feature called Declarative API. Its main objective is to provide the user with an asynchronous interface that is more in line with the modern C++ paradigm. A discussion on the development process for the new API is made, together with a case study that involves the implementation of an Erasure Coding plug-in for the client.
{"title":"C++ Declarative API – Implementation Overview Within the XRootD Framework","authors":"R. Poenaru, M. Simon","doi":"10.1109/RoEduNet51892.2020.9324858","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324858","url":null,"abstract":"brief description of the XRootD architecture and its purpose within the Worldwide Large Hadron Collider Computing Grid (WLCG), alongside an overview of the server-and client- sides of the XRootD framework are discussed in the present work. The client-side of XRootD has a relatively new feature called Declarative API. Its main objective is to provide the user with an asynchronous interface that is more in line with the modern C++ paradigm. A discussion on the development process for the new API is made, together with a case study that involves the implementation of an Erasure Coding plug-in for the client.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324869
{"title":"[Title page]","authors":"","doi":"10.1109/roedunet51892.2020.9324869","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324869","url":null,"abstract":"","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324890
Andra-Laura Antonache, S. Stegaru, M. Carutasiu, Cristian Pătru
This document describes an Artificial Neural Network (ANN) approach to modeling a thermal area to predict energy consumption. We propose the architecture for the ANN and explore the optimal configuration which yields the best results in terms of accuracy. Additionally, we validate our approach by using 3 months' data from the Passive House from the campus of University “Politehnica” of Bucharest (UPB). We implemented neural networks with various thermal energy consumption modeling (black box, grey-box) to compare the results achieved between them, but also with state of the art purely mathematically models. The best results achieved a total error of only 1.87% or 4.3 RMSE - the model and optimization of the ANN are discussed in this paper
{"title":"Modeling a Thermal Area for Energy Consumption Estimation using Artificial Neural Networks","authors":"Andra-Laura Antonache, S. Stegaru, M. Carutasiu, Cristian Pătru","doi":"10.1109/RoEduNet51892.2020.9324890","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324890","url":null,"abstract":"This document describes an Artificial Neural Network (ANN) approach to modeling a thermal area to predict energy consumption. We propose the architecture for the ANN and explore the optimal configuration which yields the best results in terms of accuracy. Additionally, we validate our approach by using 3 months' data from the Passive House from the campus of University “Politehnica” of Bucharest (UPB). We implemented neural networks with various thermal energy consumption modeling (black box, grey-box) to compare the results achieved between them, but also with state of the art purely mathematically models. The best results achieved a total error of only 1.87% or 4.3 RMSE - the model and optimization of the ANN are discussed in this paper","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324864
Dumitru Brigalda, N. Tapus
This paper proposes a hybrid system for indoor localization. It is composed of a core system and a validation subsystem. The core system is range-based which uses a lateration algorithm based on RSSI. This component also has a correction mechanism for the attenuation coefficient (Path Loss of the environment). This mechanism operates based on the feedback received from the known positions of the static devices located nearby. The correction mechanism is not enough to make the core system invulnerable to environmental noises. To ensure the robustness of the proposed hybrid system, a validation subsystem is used. It consists of an accelerometer and a magnetometer. This combination of sensors can provide movement tracking. It is used to validate the core's decisions. This subsystem is also able to take control when the range-based system doesn't have enough data to make a decision. The validation subsystem doesn't have the same problems as the core system because it is not RSSI based, but it has its own flaws. The main purpose of the hybrid system is to mitigate the disadvantages of each technology using their complementary advantages. The proposed system is accurate, robust in different environments and does not require any input from the user.
{"title":"Indoor localization with correction and validation","authors":"Dumitru Brigalda, N. Tapus","doi":"10.1109/roedunet51892.2020.9324864","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324864","url":null,"abstract":"This paper proposes a hybrid system for indoor localization. It is composed of a core system and a validation subsystem. The core system is range-based which uses a lateration algorithm based on RSSI. This component also has a correction mechanism for the attenuation coefficient (Path Loss of the environment). This mechanism operates based on the feedback received from the known positions of the static devices located nearby. The correction mechanism is not enough to make the core system invulnerable to environmental noises. To ensure the robustness of the proposed hybrid system, a validation subsystem is used. It consists of an accelerometer and a magnetometer. This combination of sensors can provide movement tracking. It is used to validate the core's decisions. This subsystem is also able to take control when the range-based system doesn't have enough data to make a decision. The validation subsystem doesn't have the same problems as the core system because it is not RSSI based, but it has its own flaws. The main purpose of the hybrid system is to mitigate the disadvantages of each technology using their complementary advantages. The proposed system is accurate, robust in different environments and does not require any input from the user.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128571025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324856
R. Poenaru, Dragos Ciobanu-Zabet
The full stack logging service provided by Elastic™ has become a powerful tool within the highperformance computing community due to its ease of use, lightweight impact on the machines, performance speeds, and scalability. In the current work, we attempt to deploy such a stack on a server inside our department, which will be used for ingesting, parsing, and analyzing logs coming from multiple clusters. By analyzing the overall performance of each machine that is under continuous monitoring, we can provide immediate support in case of any issues that might occur, and more importantly, we can improve the computing power of our clusters through optimizations in terms of system management, networking, and other specific features.
{"title":"ELK Stack – Improving the Computing Clusters at DFCTI Through Log Analysis","authors":"R. Poenaru, Dragos Ciobanu-Zabet","doi":"10.1109/roedunet51892.2020.9324856","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324856","url":null,"abstract":"The full stack logging service provided by Elastic™ has become a powerful tool within the highperformance computing community due to its ease of use, lightweight impact on the machines, performance speeds, and scalability. In the current work, we attempt to deploy such a stack on a server inside our department, which will be used for ingesting, parsing, and analyzing logs coming from multiple clusters. By analyzing the overall performance of each machine that is under continuous monitoring, we can provide immediate support in case of any issues that might occur, and more importantly, we can improve the computing power of our clusters through optimizations in terms of system management, networking, and other specific features.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324878
N. Chagas, F. B. Manolache, O. Rusu
In early 2020, remote teaching became a generalized life reality. Compared to in-person classes, the online educational experience is incomplete for students and technically frustrating for educators. The main cause is that the online educational process is just attempting to passively pass knowledge to students using unsuitable platforms which were developed for conference calls. This paper studies various components of the online teaching process, as observed at Carnegie Mellon University during 2020, and proposes improvement guidelines derived from the feedback offered by instructors and by students. The result is a series of guidelines, practical classroom configurations, and delivery methods which were appropriate for online or hybrid teaching, were scaling for a large number of instructors with various degrees of technical abilities, and were providing a student experience closer to in-person teaching. Of particular interest was enriching the interaction between instructors and students by allowing information flow in various ways which were neglected by the existing teleconferencing platforms.
{"title":"Exploring Practices and Systems for Remote Teaching","authors":"N. Chagas, F. B. Manolache, O. Rusu","doi":"10.1109/RoEduNet51892.2020.9324878","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324878","url":null,"abstract":"In early 2020, remote teaching became a generalized life reality. Compared to in-person classes, the online educational experience is incomplete for students and technically frustrating for educators. The main cause is that the online educational process is just attempting to passively pass knowledge to students using unsuitable platforms which were developed for conference calls. This paper studies various components of the online teaching process, as observed at Carnegie Mellon University during 2020, and proposes improvement guidelines derived from the feedback offered by instructors and by students. The result is a series of guidelines, practical classroom configurations, and delivery methods which were appropriate for online or hybrid teaching, were scaling for a large number of instructors with various degrees of technical abilities, and were providing a student experience closer to in-person teaching. Of particular interest was enriching the interaction between instructors and students by allowing information flow in various ways which were neglected by the existing teleconferencing platforms.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132684149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324861
Flavia Oprea, Horia Virgil Velciu, Andrei Seriţan, Laurenţiu Olteanu
There is a plethora of information that our voices carry about ourselves, irrespective of the message transmitted. This information we have only recently started to investigate, and the results point to a strong link between our voices' resonance, pitch and our medical condition. Mental illnesses are also detectable through the use of vocal analysis and there is a lot to consider with regards to our subconscious response to vocal cues, as can be seen by the use of voice-assisted assistants. In this project however, we aim to examine the effects vocal characteristics have on human interaction. We have chosen to study this interaction through the lens of dating, a context in which both interlocutors have no prior knowledge of one another, they are not influenced by physical aspect and their purpose is to familiarize themselves with one another.
{"title":"Voice Based Dating Application","authors":"Flavia Oprea, Horia Virgil Velciu, Andrei Seriţan, Laurenţiu Olteanu","doi":"10.1109/RoEduNet51892.2020.9324861","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324861","url":null,"abstract":"There is a plethora of information that our voices carry about ourselves, irrespective of the message transmitted. This information we have only recently started to investigate, and the results point to a strong link between our voices' resonance, pitch and our medical condition. Mental illnesses are also detectable through the use of vocal analysis and there is a lot to consider with regards to our subconscious response to vocal cues, as can be seen by the use of voice-assisted assistants. In this project however, we aim to examine the effects vocal characteristics have on human interaction. We have chosen to study this interaction through the lens of dating, a context in which both interlocutors have no prior knowledge of one another, they are not influenced by physical aspect and their purpose is to familiarize themselves with one another.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116681782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324887
Calin-Marian Iurian, I. Ivanciu, Beniamin Mihai Marian, Daniel Zinca, V. Dobrota
In order to evaluate the ONOS controller for Software Defined Networks (SDN) in an Internet of Things (IoT) context, Mininet was installed and configured in a virtual machine. Two different scenarios were created: the first one tests the general functionality of the proposed architecture with the IoT data being sent from the MQTT.fx client to the Orange Live Objects platform. For the second scenario different flow rules were configured in order to send the time-critical IoT data from the Mosquitto client to the broker on the path with the lowest delay. The proposed solution can easily be extended to accommodate other types of IoT devices and platforms.
为了在物联网(IoT)环境中评估软件定义网络(SDN)的ONOS控制器,Mininet在虚拟机中安装和配置。创建了两个不同的场景:第一个场景使用从MQTT发送的IoT数据测试所提议架构的一般功能。fx客户端到Orange Live Objects平台。对于第二个场景,配置了不同的流规则,以便将时间关键的IoT数据从mosquito发送到客户端,以最低的延迟发送到路径上的代理。所提出的解决方案可以很容易地扩展到适应其他类型的物联网设备和平台。
{"title":"An SDN Architecture for IoT Networks Using ONOS Controller","authors":"Calin-Marian Iurian, I. Ivanciu, Beniamin Mihai Marian, Daniel Zinca, V. Dobrota","doi":"10.1109/RoEduNet51892.2020.9324887","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324887","url":null,"abstract":"In order to evaluate the ONOS controller for Software Defined Networks (SDN) in an Internet of Things (IoT) context, Mininet was installed and configured in a virtual machine. Two different scenarios were created: the first one tests the general functionality of the proposed architecture with the IoT data being sent from the MQTT.fx client to the Orange Live Objects platform. For the second scenario different flow rules were configured in order to send the time-critical IoT data from the Mosquitto client to the broker on the path with the lowest delay. The proposed solution can easily be extended to accommodate other types of IoT devices and platforms.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324852
Denis Iorga, D. Corlatescu, Octavian Grigorescu, Cristian Sandescu, M. Dascalu, R. Rughinis
The drawbacks of traditional methods of cybernetic vulnerability detection relate to the required time to identify new threats, to register them in the Common Vulnerabilities and Exposures (CVE) records, and to score them with the Common Vulnerabilities Scoring System (CVSS). These problems can be mitigated by early vulnerability detection systems relying on social media and open-source data. This paper presents a model that aims to identify emerging cybernetic vulnerabilities in cybersecurity news articles, as part of a system for automatic detection of early cybernetic threats using Open Source Intelligence (OSINT). Three machine learning models were trained on a novel dataset of 1000 labeled news articles to create a strong baseline for classifying cybersecurity articles as relevant (i.e., introducing new security threats), or irrelevant: Support Vector Machines, a Multinomial Naïve Bayes classifier, and a finetuned BERT model. The BERT model obtained the best performance with a mean accuracy of 88.45% on the test dataset. Our experiments support the conclusion that Natural Language Processing (NLP) models are an appropriate choice for early vulnerability detection systems in order to extract relevant information from cybersecurity news articles.
{"title":"Early Detection of Vulnerabilities from News Websites using Machine Learning Models","authors":"Denis Iorga, D. Corlatescu, Octavian Grigorescu, Cristian Sandescu, M. Dascalu, R. Rughinis","doi":"10.1109/roedunet51892.2020.9324852","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324852","url":null,"abstract":"The drawbacks of traditional methods of cybernetic vulnerability detection relate to the required time to identify new threats, to register them in the Common Vulnerabilities and Exposures (CVE) records, and to score them with the Common Vulnerabilities Scoring System (CVSS). These problems can be mitigated by early vulnerability detection systems relying on social media and open-source data. This paper presents a model that aims to identify emerging cybernetic vulnerabilities in cybersecurity news articles, as part of a system for automatic detection of early cybernetic threats using Open Source Intelligence (OSINT). Three machine learning models were trained on a novel dataset of 1000 labeled news articles to create a strong baseline for classifying cybersecurity articles as relevant (i.e., introducing new security threats), or irrelevant: Support Vector Machines, a Multinomial Naïve Bayes classifier, and a finetuned BERT model. The BERT model obtained the best performance with a mean accuracy of 88.45% on the test dataset. Our experiments support the conclusion that Natural Language Processing (NLP) models are an appropriate choice for early vulnerability detection systems in order to extract relevant information from cybersecurity news articles.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128093004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324884
F. Stancu, R. Rughinis, C. Tranca, Ioana Laura Popescu
Cyber-attacks on critical infrastructure, industrial systems such as SCADA (Supervisory Control and Data Acquisition), have become ambitious over the past years, where a successful execution could lead to dangerous real world consequences such as power outages and expensive pieces of equipment receiving permanent damage. Additionally, the recently popular “Industry 4.0” trend brings Internet connectivity to sensitive industrial machinery, requesting improved cyber security practices to offset the extended attack surface. We present an affordable, realtime hardware firewall solution for securely isolating the cyber-physical devices from the untrusted, Internet facing networks, while still being able to remotely control them from trusted devices. We take on the insecure Modbus protocol and enhance it to ensure an authenticated industrial communication channel while keeping its strict latency requirements satistifed. Our architecture employs the Trusted Execution Technologies available on modern PCs such that operators will able to securely monitor and control their critical equipment from anywhere on the Internet, proposing a careful approach on the new industrial revolution.
{"title":"Trusted Industrial Modbus Firewall for Critical Infrastructure Systems","authors":"F. Stancu, R. Rughinis, C. Tranca, Ioana Laura Popescu","doi":"10.1109/RoEduNet51892.2020.9324884","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324884","url":null,"abstract":"Cyber-attacks on critical infrastructure, industrial systems such as SCADA (Supervisory Control and Data Acquisition), have become ambitious over the past years, where a successful execution could lead to dangerous real world consequences such as power outages and expensive pieces of equipment receiving permanent damage. Additionally, the recently popular “Industry 4.0” trend brings Internet connectivity to sensitive industrial machinery, requesting improved cyber security practices to offset the extended attack surface. We present an affordable, realtime hardware firewall solution for securely isolating the cyber-physical devices from the untrusted, Internet facing networks, while still being able to remotely control them from trusted devices. We take on the insecure Modbus protocol and enhance it to ensure an authenticated industrial communication channel while keeping its strict latency requirements satistifed. Our architecture employs the Trusted Execution Technologies available on modern PCs such that operators will able to securely monitor and control their critical equipment from anywhere on the Internet, proposing a careful approach on the new industrial revolution.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126266138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}