Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267188
R. Mehmood, Muhammad Usman Ali, I. A. Taj
In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In this paper we presented a robust and efficient tracking approach using structural features along with histogram based Bhattacharya coefficient similarity measure for tracking non rigid objects. It is proposed that integrating the edge based target information as post processing step for updating estimated mean shift centroid in KBOT improves the localization problem. Experimental results show the updated algorithm has achieve more precise tracking results as compared to original kernel based object tracking
{"title":"Applying centroid based adjustment to kernel based object tracking for improving localization","authors":"R. Mehmood, Muhammad Usman Ali, I. A. Taj","doi":"10.1109/ICICT.2009.5267188","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267188","url":null,"abstract":"In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In this paper we presented a robust and efficient tracking approach using structural features along with histogram based Bhattacharya coefficient similarity measure for tracking non rigid objects. It is proposed that integrating the edge based target information as post processing step for updating estimated mean shift centroid in KBOT improves the localization problem. Experimental results show the updated algorithm has achieve more precise tracking results as compared to original kernel based object tracking","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129585071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267177
A. A. Siddiqi, Munir Ahmed, Y. Alginahi, Abdulrahman Alharby
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis and design of Comprehensive Patient Healthcare System (CPHS), which comprises two large subsystems, Computerized Patient Record System (CPRS) and Mobile Computing Clinical System (MCCS). It is anticipated that, this innovated system would not only serve as an application of state-of-the-art information and mobile computing technologies, but it would also provide clinical services at point of care in Saudi Arabia hospitals. Use of such technologies with highly efficient techniques for essential information gathering in a timely and cost effective manner in hospital sites is critical in order to understand how to enhance quality health care services to improve the life of patients and rapid decisions making. The design and development of CPHS would therefore pave the way for opening new venues in which such highly advanced information and mobile computing technologies are employed in the hospitals and other sectors beyond the field of medical care.
{"title":"Use of information and mobile computing technologies in healthcare facilities of Saudi Arabia","authors":"A. A. Siddiqi, Munir Ahmed, Y. Alginahi, Abdulrahman Alharby","doi":"10.1109/ICICT.2009.5267177","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267177","url":null,"abstract":"Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis and design of Comprehensive Patient Healthcare System (CPHS), which comprises two large subsystems, Computerized Patient Record System (CPRS) and Mobile Computing Clinical System (MCCS). It is anticipated that, this innovated system would not only serve as an application of state-of-the-art information and mobile computing technologies, but it would also provide clinical services at point of care in Saudi Arabia hospitals. Use of such technologies with highly efficient techniques for essential information gathering in a timely and cost effective manner in hospital sites is critical in order to understand how to enhance quality health care services to improve the life of patients and rapid decisions making. The design and development of CPHS would therefore pave the way for opening new venues in which such highly advanced information and mobile computing technologies are employed in the hospitals and other sectors beyond the field of medical care.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267181
F. Ahmed, Z. Howard
Relaying in wireless communication can improve power and quality of service. Multiple nodes share channel resources to achieve optimized power. We consider a model with fixed source, destination and relay nodes. Our model finds the optimal values for power transmission for direct and relayed transmitting nodes. In our problem we compare amplify and forward and decode and forward transmission protocols. Unlike other researchers who use constant achievable rates as objective function and power as constraint, we use the strategy of minimizing relay and source power with achievable and target rates as constraints. We simulate various scenarios and our results indicate optimal values for both source and relay transmission powers.
{"title":"Power optimization of relay channels","authors":"F. Ahmed, Z. Howard","doi":"10.1109/ICICT.2009.5267181","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267181","url":null,"abstract":"Relaying in wireless communication can improve power and quality of service. Multiple nodes share channel resources to achieve optimized power. We consider a model with fixed source, destination and relay nodes. Our model finds the optimal values for power transmission for direct and relayed transmitting nodes. In our problem we compare amplify and forward and decode and forward transmission protocols. Unlike other researchers who use constant achievable rates as objective function and power as constraint, we use the strategy of minimizing relay and source power with achievable and target rates as constraints. We simulate various scenarios and our results indicate optimal values for both source and relay transmission powers.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267178
Q. Ul-Ann, O. Loffeld, H. Nies, Robert Wang
This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.
{"title":"Considerations on the validity constraints for the bistatic SAR processing","authors":"Q. Ul-Ann, O. Loffeld, H. Nies, Robert Wang","doi":"10.1109/ICICT.2009.5267178","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267178","url":null,"abstract":"This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267211
S. Mahmood, S. Iftikhar, H. F. Ahmad, F. Mahmood
In this paper we have analyzed and developed a formal specification of a Trust Model in Semantic Grid Registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in Pi-Calculus. Finally we transformed the specification to Pi- ADL and generated code using Archware tool. We have already developed a Semantic Grid Registry.
{"title":"Formal modeling of trust in Semantic Grid Registry","authors":"S. Mahmood, S. Iftikhar, H. F. Ahmad, F. Mahmood","doi":"10.1109/ICICT.2009.5267211","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267211","url":null,"abstract":"In this paper we have analyzed and developed a formal specification of a Trust Model in Semantic Grid Registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in Pi-Calculus. Finally we transformed the specification to Pi- ADL and generated code using Archware tool. We have already developed a Semantic Grid Registry.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267179
Murad Habib, R. Khan, J. L. Piracha
Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (Analytic Hierarchy Process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a decision model. The research paper discusses the use of the ANP, a general form of Saaty's analytic Network process, as a model to evaluate the value of competing R&D projects.
{"title":"Analytic network process applied to R&D project selection","authors":"Murad Habib, R. Khan, J. L. Piracha","doi":"10.1109/ICICT.2009.5267179","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267179","url":null,"abstract":"Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (Analytic Hierarchy Process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a decision model. The research paper discusses the use of the ANP, a general form of Saaty's analytic Network process, as a model to evaluate the value of competing R&D projects.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267184
B. Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications.
{"title":"An open source service oriented Mobile Business Intelligence Tool (MBIT)","authors":"B. Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq","doi":"10.1109/ICICT.2009.5267184","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267184","url":null,"abstract":"Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267199
S. Ullah, Z. Hussain
An Artificial Neural Network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced to only those attributes which contribute in the training process. Then after, the whole dataset is partitioned into n clusters which are finally fed into Multilayer Perceptrons network based on backpropagation algorithm to carry out blockwise and parallel training.
{"title":"A two-step approach for improving efficiency of feedforward Multilayer Perceptrons network","authors":"S. Ullah, Z. Hussain","doi":"10.1109/ICICT.2009.5267199","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267199","url":null,"abstract":"An Artificial Neural Network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced to only those attributes which contribute in the training process. Then after, the whole dataset is partitioned into n clusters which are finally fed into Multilayer Perceptrons network based on backpropagation algorithm to carry out blockwise and parallel training.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123124704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267206
K. Shehzad, A. Ali, F. Rasool, R. Hashmi, A. Zubair, R. Ali
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of Broadband Wireless Access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has been handled by introducing an inter-base station handshake process, allowing effective management of fast moving users. Automated Frequency Distribution, Management and Assignment (AFDMA) provides maximum bandwidth optimization in order to ensure increased network performance and Quality of Service (QoS).
{"title":"Automated Frequency Distribution, Management & Assignment (AFDMA) in IEEE 802.16","authors":"K. Shehzad, A. Ali, F. Rasool, R. Hashmi, A. Zubair, R. Ali","doi":"10.1109/ICICT.2009.5267206","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267206","url":null,"abstract":"Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of Broadband Wireless Access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has been handled by introducing an inter-base station handshake process, allowing effective management of fast moving users. Automated Frequency Distribution, Management and Assignment (AFDMA) provides maximum bandwidth optimization in order to ensure increased network performance and Quality of Service (QoS).","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131036728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267215
M. A. Azad, R. Mahmood, T. Mehmood
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data and congestion control mechanism as well. In this research text, we have worked out the behavior of video applications over DCCP environment. We have analyzed the performance of MPEG4 video over transport layer using DCCP variants, UDP and TCP under competing and non-competing topology. Delay, throughput, jitter and packet loss are used to assess the performance of these protocols. Our results show that DCCP can be used as a transport layer protocol for video applications, which may result in improved throughput, reduced packet loss as compared to UDP but the delay and jitter of UDP is much lesser than DCCP variants. According to the results DCCP assures better QoS than other transport protocols for video transmission under congestion.
{"title":"A comparative analysis of DCCP variants (CCID2, CCID3), TCP and UDP for MPEG4 video applications","authors":"M. A. Azad, R. Mahmood, T. Mehmood","doi":"10.1109/ICICT.2009.5267215","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267215","url":null,"abstract":"New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data and congestion control mechanism as well. In this research text, we have worked out the behavior of video applications over DCCP environment. We have analyzed the performance of MPEG4 video over transport layer using DCCP variants, UDP and TCP under competing and non-competing topology. Delay, throughput, jitter and packet loss are used to assess the performance of these protocols. Our results show that DCCP can be used as a transport layer protocol for video applications, which may result in improved throughput, reduced packet loss as compared to UDP but the delay and jitter of UDP is much lesser than DCCP variants. According to the results DCCP assures better QoS than other transport protocols for video transmission under congestion.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}