Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441290
K. Shankar, M. Ilayaraja
In cloud computing, research on security issues among outsourced encrypted data is trending topic. It has broad applications in area-based management, classification, and clustering. As any other normal utilized query for online applications, secure k-Nearest Neighbors (k-NN) calculation on encrypted cloud data is highly being considered now a days, and a few advanced answers have been produced. This paper proposed an innovative plan for encrypting the outsourced database and query points. The new plan can adequately support k-Nearest Neighbor (KNN) computation while preserving data privacy and query privacy. To improve the performance of the system, the Opposition-based Particle Swarm Optimization (OPSO) optimization algorithm is utilized to secure the data by Homomorphic Encryption (HE) method. The broad hypothetical and test assessments exhibit the adequacy of our plan with regards to security and performance.
{"title":"Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users","authors":"K. Shankar, M. Ilayaraja","doi":"10.1109/ICCCI.2018.8441290","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441290","url":null,"abstract":"In cloud computing, research on security issues among outsourced encrypted data is trending topic. It has broad applications in area-based management, classification, and clustering. As any other normal utilized query for online applications, secure k-Nearest Neighbors (k-NN) calculation on encrypted cloud data is highly being considered now a days, and a few advanced answers have been produced. This paper proposed an innovative plan for encrypting the outsourced database and query points. The new plan can adequately support k-Nearest Neighbor (KNN) computation while preserving data privacy and query privacy. To improve the performance of the system, the Opposition-based Particle Swarm Optimization (OPSO) optimization algorithm is utilized to secure the data by Homomorphic Encryption (HE) method. The broad hypothetical and test assessments exhibit the adequacy of our plan with regards to security and performance.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128712146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441490
Shreyash A. Pande, Shruti J. Sonar, Shubham K. Ingale
Wireless communication has become an indispensable part of our lives. Currently, RF spectrum is the most popular means available and hence is crowded with devices such as microwave ovens, video devices, radar systems, radio navigation and many more. Due to which the RF spectrum is on the verge of exhaustion. Clearly, we need to look out for alternatives to transmit the data wirelessly. The most promising alternative seems to be Li-Fi (Light Fidelity) [5]. Li-Fi, an example of OWC (optical wireless communication) can transmit data at a very high rate, moreover it can overcome certain challenges faced by Wi-Fi. It uses the visible light spectrum which is 10,000 times larger than the entire radio frequency spectrum [1]. Li-Fi can transmit data underwater, in aircraft (ensuring smooth working of its surroundings) and petrochemical industries (where using RF spectrum can prove to be lethal). Also, the light waves are not able to penetrate through walls, thus making it most secured form of wireless communication [1]. We have made a portable prototype of device that can establish a wireless communication between two or more personal computers using visible light spectrum. The portable device is compact and can ensure secured data transmission between devices within a room.
{"title":"Optical data transmission using portable USB Li-Fi module (dongle)","authors":"Shreyash A. Pande, Shruti J. Sonar, Shubham K. Ingale","doi":"10.1109/ICCCI.2018.8441490","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441490","url":null,"abstract":"Wireless communication has become an indispensable part of our lives. Currently, RF spectrum is the most popular means available and hence is crowded with devices such as microwave ovens, video devices, radar systems, radio navigation and many more. Due to which the RF spectrum is on the verge of exhaustion. Clearly, we need to look out for alternatives to transmit the data wirelessly. The most promising alternative seems to be Li-Fi (Light Fidelity) [5]. Li-Fi, an example of OWC (optical wireless communication) can transmit data at a very high rate, moreover it can overcome certain challenges faced by Wi-Fi. It uses the visible light spectrum which is 10,000 times larger than the entire radio frequency spectrum [1]. Li-Fi can transmit data underwater, in aircraft (ensuring smooth working of its surroundings) and petrochemical industries (where using RF spectrum can prove to be lethal). Also, the light waves are not able to penetrate through walls, thus making it most secured form of wireless communication [1]. We have made a portable prototype of device that can establish a wireless communication between two or more personal computers using visible light spectrum. The portable device is compact and can ensure secured data transmission between devices within a room.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441497
S. Vadivel, N. Nithya
Mixed signal systems plays major role in the communication systems. This paper presents the low power two stage dynamic latch comparator that works in greater speed with less power consumption when related to conventional two stage dynamic latch comparators. The proposed comparator consists of two stages such as dynamic latch and pre amplifier stage. S Edit, T Spice and W edit tool were used for simulating the comparator circuit in the 250nm technologies and the results show the power consumption of 5.761mW which is less compared to conventional comparator design power consumption and 5v input voltage is used for the simulation.
{"title":"Low Power Two Stage Dynamic Comparator Circuit Design for Analog to Digital Converters","authors":"S. Vadivel, N. Nithya","doi":"10.1109/ICCCI.2018.8441497","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441497","url":null,"abstract":"Mixed signal systems plays major role in the communication systems. This paper presents the low power two stage dynamic latch comparator that works in greater speed with less power consumption when related to conventional two stage dynamic latch comparators. The proposed comparator consists of two stages such as dynamic latch and pre amplifier stage. S Edit, T Spice and W edit tool were used for simulating the comparator circuit in the 250nm technologies and the results show the power consumption of 5.761mW which is less compared to conventional comparator design power consumption and 5v input voltage is used for the simulation.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441389
K. Ali, P. Sampath
In this paper, 32-bit floating-point representation of Particle Swarm Optimization (PSO) based Approximate Symbol Error Rate (A-SER) for Alamouti Decode and Forward (A-DF) Relaying Protocol is implemented using Field programmable gate arrays (FPGA). The A-SER for A-DF Relaying Protocol is described using Very High Speed Integrated Circuit Hardware Description Language (VHDL). From the PSO results, the updatation of velocities and current position achieve better performance in the A-SER and are named as current fitness function. Advantage of VLSI is to provide a single chip solution for A-SER in A-DF Relaying Protocol.
{"title":"FPGA implementation of PSO based Approximate SER for the Alamouti DF Relaying Protocol","authors":"K. Ali, P. Sampath","doi":"10.1109/ICCCI.2018.8441389","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441389","url":null,"abstract":"In this paper, 32-bit floating-point representation of Particle Swarm Optimization (PSO) based Approximate Symbol Error Rate (A-SER) for Alamouti Decode and Forward (A-DF) Relaying Protocol is implemented using Field programmable gate arrays (FPGA). The A-SER for A-DF Relaying Protocol is described using Very High Speed Integrated Circuit Hardware Description Language (VHDL). From the PSO results, the updatation of velocities and current position achieve better performance in the A-SER and are named as current fitness function. Advantage of VLSI is to provide a single chip solution for A-SER in A-DF Relaying Protocol.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126659550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441390
L. Naidoo, V. Srivastava
Electronic robotic system has a section of transmitter and receiver. For the receiver, to provide the required selectivity of frequencies, a filter is used. There is a wide variety of these filters that can be used within the Radio Frequency (RF) range. Radio frequencies range from 3 kHz to 300 GHz. This work analyzes the steps involved in the design and simulation of a 100 GHz (0.1 THz) third order active high pass filter. This filter uses the operational amplifier for the first stage and transistor for the further stage. By cascading these two stages a third order filter is designed. Using this model of filter a fine signal (command) can be given to robotic system.
{"title":"Application of High Pass Filter in Robotics: A Circuit Perspective","authors":"L. Naidoo, V. Srivastava","doi":"10.1109/ICCCI.2018.8441390","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441390","url":null,"abstract":"Electronic robotic system has a section of transmitter and receiver. For the receiver, to provide the required selectivity of frequencies, a filter is used. There is a wide variety of these filters that can be used within the Radio Frequency (RF) range. Radio frequencies range from 3 kHz to 300 GHz. This work analyzes the steps involved in the design and simulation of a 100 GHz (0.1 THz) third order active high pass filter. This filter uses the operational amplifier for the first stage and transistor for the further stage. By cascading these two stages a third order filter is designed. Using this model of filter a fine signal (command) can be given to robotic system.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441364
Abdulla Shahid, Mohd Wahab, Omar Farooq, N. Rafiuddin
Epilepsy is the most prevalent neural disorder characterized by abrupt and repetitive impairment of brain known as seizure, whose clinical symptoms are hyper synchronous activities of nerve cells in the brain. Since seizure, in general, occur very infrequently it is highly recommended for self-regulated disclosure of it during longstanding EEG measurement. The data handled in our work is publicly accessible online comprising of five classes. The segments in data set for each class were partitioned into two parts. Former comprised first 16 seconds (about 68%) of EEG which was used to train the network and rest of the signal were marked as test data. Statistical features for each class were evaluated. A supervised learning algorithm which is mostly used for classification and regression known as Support Vector Machine was used for classification of each set representing the different class. The classification results achieved taking all the five class was 91.42%. In order to confirm the accuracy of the classifier, the classifier is tested for different classification problem that were reported previously.
{"title":"Classification of Seizure Through SVM Based Classifier","authors":"Abdulla Shahid, Mohd Wahab, Omar Farooq, N. Rafiuddin","doi":"10.1109/ICCCI.2018.8441364","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441364","url":null,"abstract":"Epilepsy is the most prevalent neural disorder characterized by abrupt and repetitive impairment of brain known as seizure, whose clinical symptoms are hyper synchronous activities of nerve cells in the brain. Since seizure, in general, occur very infrequently it is highly recommended for self-regulated disclosure of it during longstanding EEG measurement. The data handled in our work is publicly accessible online comprising of five classes. The segments in data set for each class were partitioned into two parts. Former comprised first 16 seconds (about 68%) of EEG which was used to train the network and rest of the signal were marked as test data. Statistical features for each class were evaluated. A supervised learning algorithm which is mostly used for classification and regression known as Support Vector Machine was used for classification of each set representing the different class. The classification results achieved taking all the five class was 91.42%. In order to confirm the accuracy of the classifier, the classifier is tested for different classification problem that were reported previously.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129722807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441483
Gandluri Yasmeen, S. Arun, J. N. Swaminathan, S. Jilani, S. Asif
In this paper, we are describing the hand gesture recognition mechanism using the accelerometer values of the TI Sensor Tag for controlling the Traffic lights. The TI Sensor Tag is aBLE (Bluetooth Low Energy) device which consumes very low power during its operation and it uses single coin battery for months of life. It uses the Bluez Library for reading the data from different sensors of Sensor Tag. Now-a-days the traffic on the road has been increasing drastically due to increase in number of vehicle users. On the other hand the simple time based traffic control system is not sufficient for controlling the uneven traffic on the roads during peak hours, which calls for a new Traffic control system. The gesture technology has become very popular for HMI (Human Machine Interface), which provides a virtual environment for controlling devices by giving Gestures. Here we used the Ti Sensor Tag for Hand Gesture Recognition.
{"title":"Efficient Hand Gesture Recognition for Traffic Control System Using ti Sensor Tag","authors":"Gandluri Yasmeen, S. Arun, J. N. Swaminathan, S. Jilani, S. Asif","doi":"10.1109/ICCCI.2018.8441483","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441483","url":null,"abstract":"In this paper, we are describing the hand gesture recognition mechanism using the accelerometer values of the TI Sensor Tag for controlling the Traffic lights. The TI Sensor Tag is aBLE (Bluetooth Low Energy) device which consumes very low power during its operation and it uses single coin battery for months of life. It uses the Bluez Library for reading the data from different sensors of Sensor Tag. Now-a-days the traffic on the road has been increasing drastically due to increase in number of vehicle users. On the other hand the simple time based traffic control system is not sufficient for controlling the uneven traffic on the roads during peak hours, which calls for a new Traffic control system. The gesture technology has become very popular for HMI (Human Machine Interface), which provides a virtual environment for controlling devices by giving Gestures. Here we used the Ti Sensor Tag for Hand Gesture Recognition.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441219
N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar
This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.
{"title":"Image Encryption with an Encrypted QR, Random Phase Encoding, and Logistic Map","authors":"N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar","doi":"10.1109/ICCCI.2018.8441219","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441219","url":null,"abstract":"This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441400
S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan
Security plays a vital role in the world of communication. In applications such as banking, making access to any personal resource of an individual via wireless media requires the validation of authorized user at every moment. Static passwords have been in use which is vulnerable to attacks such as reply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant property required for OTPs. True randomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software-based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users.
{"title":"OTP on Demand - An Embedded System for User Authentication","authors":"S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441400","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441400","url":null,"abstract":"Security plays a vital role in the world of communication. In applications such as banking, making access to any personal resource of an individual via wireless media requires the validation of authorized user at every moment. Static passwords have been in use which is vulnerable to attacks such as reply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant property required for OTPs. True randomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software-based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441347
Vruddhi Mehta, Sakshi More
Contracts, a set of legally negotiated rules between the transacting parties are often the prime cause of legal as well as business disputes. Due to this discord, they are generally viewed with contempt. The need to revolutionize contracts has been much felt by the attorneys and the business professionals, so as to avoid these daedal contract conflicts. This resulted in the advent of smart contracts that was led by Blockchain technology. It is a blend of legalese from lawyers and computer code. A smart contract is a versatile system capable of facilitating, automating and enforcing an agreement (i.e. contract). In this paper, we preview as well as analyze smart contract based on blockchain technology for a decentralized system.
{"title":"Smart Contracts: Automated Stipulations on Blockchain","authors":"Vruddhi Mehta, Sakshi More","doi":"10.1109/ICCCI.2018.8441347","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441347","url":null,"abstract":"Contracts, a set of legally negotiated rules between the transacting parties are often the prime cause of legal as well as business disputes. Due to this discord, they are generally viewed with contempt. The need to revolutionize contracts has been much felt by the attorneys and the business professionals, so as to avoid these daedal contract conflicts. This resulted in the advent of smart contracts that was led by Blockchain technology. It is a blend of legalese from lawyers and computer code. A smart contract is a versatile system capable of facilitating, automating and enforcing an agreement (i.e. contract). In this paper, we preview as well as analyze smart contract based on blockchain technology for a decentralized system.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}