Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511523
Jun Wang, A. Al-Banna
Full duplex cable networks are built and analyzed in theoretical models based on the RF performance of their building blocks, including nodes, cables, taps, pluggable devices for taps and cable modems, etc. The key performance-degrading factors in FDX systems are analyzed in the models and the results are proven by experimental results.
{"title":"Modelling and Analysis of FDX cable Systems","authors":"Jun Wang, A. Al-Banna","doi":"10.1109/ICT52184.2021.9511523","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511523","url":null,"abstract":"Full duplex cable networks are built and analyzed in theoretical models based on the RF performance of their building blocks, including nodes, cables, taps, pluggable devices for taps and cable modems, etc. The key performance-degrading factors in FDX systems are analyzed in the models and the results are proven by experimental results.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511529
Dali Zhu, Hongju Sun, Di Wu
In public safety scenarios, target objects identification and tracking is an important application, and two positioning methods including wireless and computer vision are respectively used for applications. In this article, we combine the wireless signal and computer vision, and propose a novel object identification and tracking technology. The positioning method based on computer vision helps to improve the accuracy of positioning, and we can easily distinguish different users according to wireless device information. Based on our proposed trajectory association technology, the visual trajectory is accurately matched to the corresponding wireless trajectory, and the identity of the visual trajectory is confirmed. Combined with the analysis of the position change and appearance change of visual objects, wireless positioning results are fused to correct the affected visual trajectory to improve overall system performance. A tracking system was deployed in the real world. The fusion path is proved to be closer to the real path and 90% of the errors were less than 1m. We have also implemented large-scale simulation experiments to evaluate our approach. The results show that our association algorithm has a high matching success rate and is insensitive to synchronization errors.
{"title":"Fusion of Wireless Signal and Computer Vision for Identification and Tracking","authors":"Dali Zhu, Hongju Sun, Di Wu","doi":"10.1109/ICT52184.2021.9511529","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511529","url":null,"abstract":"In public safety scenarios, target objects identification and tracking is an important application, and two positioning methods including wireless and computer vision are respectively used for applications. In this article, we combine the wireless signal and computer vision, and propose a novel object identification and tracking technology. The positioning method based on computer vision helps to improve the accuracy of positioning, and we can easily distinguish different users according to wireless device information. Based on our proposed trajectory association technology, the visual trajectory is accurately matched to the corresponding wireless trajectory, and the identity of the visual trajectory is confirmed. Combined with the analysis of the position change and appearance change of visual objects, wireless positioning results are fused to correct the affected visual trajectory to improve overall system performance. A tracking system was deployed in the real world. The fusion path is proved to be closer to the real path and 90% of the errors were less than 1m. We have also implemented large-scale simulation experiments to evaluate our approach. The results show that our association algorithm has a high matching success rate and is insensitive to synchronization errors.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511537
K. Ystgaard, K. Moor
Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands on how humans can and wish (or do not wish) to engage with the connected network. The ubiquitous nature of the 6G network evolution enables increased involvement and affords more power to networks and machines (and those designing them) versus humans. This paper advocates that human-centric 6G networks should put humans' interests and potential first and foremost, in a holistic manner. There is a need to critically monitor, (r)evaluate, and adjust the above power implications. Human-centric design perspectives applied to future network technologies incorporate the human element more broadly. Thus, meaningful user control, empowerment, and agency should be key features of future network technologies beyond 5G and 6G. The network system's ability to protect human potential and humanity first, to serve multiple normative standards, while balancing the interests of all parties, can become a catalyst for stimulating better governing practices and for managing consensus building between individuals, communities, governments, and networked machines embedded with human-like capabilities. However, realising this vision and potential requires a thorough alignment with the human- and humanity-centric paradigm and a renewal of its operationalisation and implementation. This paper overviews a set of human-centric design interpretations and discusses the next challenges and implications in a beyond 5G and 6G context.
{"title":"Bring the human to the network: 5G and beyond","authors":"K. Ystgaard, K. Moor","doi":"10.1109/ICT52184.2021.9511537","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511537","url":null,"abstract":"Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands on how humans can and wish (or do not wish) to engage with the connected network. The ubiquitous nature of the 6G network evolution enables increased involvement and affords more power to networks and machines (and those designing them) versus humans. This paper advocates that human-centric 6G networks should put humans' interests and potential first and foremost, in a holistic manner. There is a need to critically monitor, (r)evaluate, and adjust the above power implications. Human-centric design perspectives applied to future network technologies incorporate the human element more broadly. Thus, meaningful user control, empowerment, and agency should be key features of future network technologies beyond 5G and 6G. The network system's ability to protect human potential and humanity first, to serve multiple normative standards, while balancing the interests of all parties, can become a catalyst for stimulating better governing practices and for managing consensus building between individuals, communities, governments, and networked machines embedded with human-like capabilities. However, realising this vision and potential requires a thorough alignment with the human- and humanity-centric paradigm and a renewal of its operationalisation and implementation. This paper overviews a set of human-centric design interpretations and discusses the next challenges and implications in a beyond 5G and 6G context.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511464
Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, R. Liu
Enabling ultra-reliable and low latency communications (URLLC) under severe fading is really challenging. We study how to realize URLLC under $kappa-mu$ shadowed fading, because we can unify multiple traditional fading models by using the $kappa-mu$ shadowed fading model. For the MIMO system with two single-transmit-antenna users and $L$ receive antennas, we derive the probability density function (PDF) of the signal-to-noise ratio (SNR) of minimum mean squared error detection. In particular, we accomplish the above work in both perfect channel state information (CSI) and imperfect CSI. Then, the error probability can be calculated by the finite blocklength information theory, in accordance with constrained latency and given length of pilots. The simulation results show that we can configure the system parameters according to the $kappa-mu$ parameters, to satisfy the requirements for both latency and reliability. Hence, multiple fading models can be unified by the $hslash-mu$ shadowed fading model to study how to realize URLLC.
{"title":"Enabling URLLC under $kappa-mu$ Shadowed Fading","authors":"Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, R. Liu","doi":"10.1109/ICT52184.2021.9511464","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511464","url":null,"abstract":"Enabling ultra-reliable and low latency communications (URLLC) under severe fading is really challenging. We study how to realize URLLC under $kappa-mu$ shadowed fading, because we can unify multiple traditional fading models by using the $kappa-mu$ shadowed fading model. For the MIMO system with two single-transmit-antenna users and $L$ receive antennas, we derive the probability density function (PDF) of the signal-to-noise ratio (SNR) of minimum mean squared error detection. In particular, we accomplish the above work in both perfect channel state information (CSI) and imperfect CSI. Then, the error probability can be calculated by the finite blocklength information theory, in accordance with constrained latency and given length of pilots. The simulation results show that we can configure the system parameters according to the $kappa-mu$ parameters, to satisfy the requirements for both latency and reliability. Hence, multiple fading models can be unified by the $hslash-mu$ shadowed fading model to study how to realize URLLC.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ict52184.2021.9511458
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ict52184.2021.9511458","DOIUrl":"https://doi.org/10.1109/ict52184.2021.9511458","url":null,"abstract":"","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131496220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Client certificate authentication (CCA) is gaining greater significance, as more and more security-critical private activities such like e-bank and e-health are being conducted online, posing strong needs for mutual authentication. Unlike server certificates, active measurement of client certificates via probing techniques is infeasible since CCA is non-mandatory in the TLS protocol. Passive measurement is technically feasible but requires consistent access to large-scale Internet traffic to be comprehensive and convincing, which puts very high requirements on the research conditions. In this paper, we present a comprehensive study of the client certificate ecosystem, as the outcome of by far the largest passive measurement of client certificates in literature. As many as 97 million unique client certificates have been collected from the top-level academic network in China during six months. We analyze the actual use of CCA and classify the client certificates into three categories according to purposes: device authentication, user authentication, and application authentication. We discuss the security of client certificates with respect to the certificate attributes and make comparisons between client and server certificates. We also evaluate the risk of privacy leakage caused by client certificates, indicating the severity and the culprit. We hope our work would benefit the community by depicting an intuitive overview of the client certificate ecosystem and inspiring new thoughts on certificate usage in all kinds of scenarios.
{"title":"Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild","authors":"Wei Xia, Mingxin Cui, Wen Wang, Yangyang Guan, Zhenzhen Li, Zhen Li, G. Xiong","doi":"10.1109/ICT52184.2021.9511513","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511513","url":null,"abstract":"Client certificate authentication (CCA) is gaining greater significance, as more and more security-critical private activities such like e-bank and e-health are being conducted online, posing strong needs for mutual authentication. Unlike server certificates, active measurement of client certificates via probing techniques is infeasible since CCA is non-mandatory in the TLS protocol. Passive measurement is technically feasible but requires consistent access to large-scale Internet traffic to be comprehensive and convincing, which puts very high requirements on the research conditions. In this paper, we present a comprehensive study of the client certificate ecosystem, as the outcome of by far the largest passive measurement of client certificates in literature. As many as 97 million unique client certificates have been collected from the top-level academic network in China during six months. We analyze the actual use of CCA and classify the client certificates into three categories according to purposes: device authentication, user authentication, and application authentication. We discuss the security of client certificates with respect to the certificate attributes and make comparisons between client and server certificates. We also evaluate the risk of privacy leakage caused by client certificates, indicating the severity and the culprit. We hope our work would benefit the community by depicting an intuitive overview of the client certificate ecosystem and inspiring new thoughts on certificate usage in all kinds of scenarios.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511461
Ayes Chinmay, H. K. Pati
The IEEE 802.11 standard is commonly used to provide wireless networking capabilities for different applications. Although the format was designed mainly to provide data transmission capability, it also became a common medium for speech communication. The reasons are twofold: extensive Wireless Local Area Network (WLAN) connectivity and the low cost of making voice calls on this network. To provide the Quality-of-Service (QoS) of Voice over WiFi (VoWiFi) calls, an appropriate policy for call admission control is required. Such a policy requires VoWiFi user capacity of the WLAN cell. In this paper, we have proposed an analytical model to estimate the number of VoWiFi calls possible in IEEE 802.11ax standard Access Point (AP) (i.e. sixth generation Wireless Fidelity (WiFi) standard) and compared with earlier standards like IEEE 802.11b/g/n/ac. We have used DCF Inter-frame Spacing (DIFS) to detect channel status before transmitting data from one station to another and Short Inter-frame Spacing (SIFS) before sending acknowledgement, Request To Send (RTS) and Clear To Send (CTS) frames. We have used the Compressed RTP (cRTP) protocol to enhance VoWiFi cell capacity. We have measured VoWiFi cell capacity using G.729 voice codec.
IEEE 802.11标准通常用于为不同的应用程序提供无线网络功能。虽然这种格式的设计主要是为了提供数据传输能力,但它也成为语音通信的常用媒介。原因有两个:广泛的无线局域网(WLAN)连接和在该网络上进行语音通话的低成本。为了提供VoWiFi (Voice over WiFi)呼叫的QoS (Quality-of-Service),需要适当的呼叫准入控制策略。这种策略需要WLAN小区的VoWiFi用户容量。在本文中,我们提出了一个分析模型来估计IEEE 802.11ax标准接入点(AP)(即第六代无线保真度(WiFi)标准)中可能的VoWiFi呼叫数量,并与IEEE 802.11b/g/n/ac等早期标准进行比较。我们使用DCF帧间间隔(DIFS)在将数据从一个站传输到另一个站之前检测信道状态,在发送确认,请求发送(RTS)和清除发送(CTS)帧之前使用短帧间间隔(SIFS)。我们使用压缩RTP (cRTP)协议来增强VoWiFi小区容量。我们使用G.729语音编解码器测量了VoWiFi小区容量。
{"title":"VoWiFi Cell Capacity Estimation using IEEE 802.11ax","authors":"Ayes Chinmay, H. K. Pati","doi":"10.1109/ICT52184.2021.9511461","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511461","url":null,"abstract":"The IEEE 802.11 standard is commonly used to provide wireless networking capabilities for different applications. Although the format was designed mainly to provide data transmission capability, it also became a common medium for speech communication. The reasons are twofold: extensive Wireless Local Area Network (WLAN) connectivity and the low cost of making voice calls on this network. To provide the Quality-of-Service (QoS) of Voice over WiFi (VoWiFi) calls, an appropriate policy for call admission control is required. Such a policy requires VoWiFi user capacity of the WLAN cell. In this paper, we have proposed an analytical model to estimate the number of VoWiFi calls possible in IEEE 802.11ax standard Access Point (AP) (i.e. sixth generation Wireless Fidelity (WiFi) standard) and compared with earlier standards like IEEE 802.11b/g/n/ac. We have used DCF Inter-frame Spacing (DIFS) to detect channel status before transmitting data from one station to another and Short Inter-frame Spacing (SIFS) before sending acknowledgement, Request To Send (RTS) and Clear To Send (CTS) frames. We have used the Compressed RTP (cRTP) protocol to enhance VoWiFi cell capacity. We have measured VoWiFi cell capacity using G.729 voice codec.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-16DOI: 10.36227/TECHRXIV.14572548.V1
Vaibhav Kumar, M. Flanagan, D. B. D. Costa, Le-Nam Tran
In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.
{"title":"On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper","authors":"Vaibhav Kumar, M. Flanagan, D. B. D. Costa, Le-Nam Tran","doi":"10.36227/TECHRXIV.14572548.V1","DOIUrl":"https://doi.org/10.36227/TECHRXIV.14572548.V1","url":null,"abstract":"In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-12DOI: 10.1109/ICT52184.2021.9511519
K. Mehmood, H. V. K. Mendis, Katina Kralevska, P. Heegaard
5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.
{"title":"Intent-based Network Management and Orchestration for Smart Distribution Grids","authors":"K. Mehmood, H. V. K. Mendis, Katina Kralevska, P. Heegaard","doi":"10.1109/ICT52184.2021.9511519","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511519","url":null,"abstract":"5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}