Design verification must be included the power grid. Checking that the voltage on the power grid does not drop by more than some critical threshold is a very difficult problem, for at least two reasons: 1. the obviously large size of the power grids for modern high-performance chips, and 2. the difficulty of setting up the right simulation conditions for the power grid that provide some measure of a realistic worst case voltage drop. The huge number of possible circuit operational modes or workloads makes it impossible to do exhaustive analysis. We propose a static technique for power grid verification, where static is in the sense of static timing analysis, meaning that it does not depend on, nor require, user-specified stimulus to drive a simulation. The verification is posed as an optimization problem under user-supplied current constraints. We propose that current constraints are the right kind of abstraction to use in order to develop a practical methodology for power grid verification. We present our verification approach, and report on the results of applying it to a number of test-case power grids
{"title":"A static pattern-independent technique for power grid voltage integrity verification","authors":"D. Kouroussis, F. Najm","doi":"10.1145/775832.775861","DOIUrl":"https://doi.org/10.1145/775832.775861","url":null,"abstract":"Design verification must be included the power grid. Checking that the voltage on the power grid does not drop by more than some critical threshold is a very difficult problem, for at least two reasons: 1. the obviously large size of the power grids for modern high-performance chips, and 2. the difficulty of setting up the right simulation conditions for the power grid that provide some measure of a realistic worst case voltage drop. The huge number of possible circuit operational modes or workloads makes it impossible to do exhaustive analysis. We propose a static technique for power grid verification, where static is in the sense of static timing analysis, meaning that it does not depend on, nor require, user-specified stimulus to drive a simulation. The verification is posed as an optimization problem under user-supplied current constraints. We propose that current constraints are the right kind of abstraction to use in order to develop a practical methodology for power grid verification. We present our verification approach, and report on the results of applying it to a number of test-case power grids","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127610363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, Markov sources were shown to be effective in designing pseudo-random test pattern generators with low area overhead for built-in self-test of scan designs. This paper presents a new test pattern generation scheme based on a Markov source and a partial bit-fixing technique. A new method is proposed for the computation of the state transition probabilities of the Markov source based on the statistics of a deterministic test set. This is enhanced by partial bit-fixing logic, which fixes a group of consecutive inputs to all-0 or all-1. Experimental results show that the proposed BIST scheme can achieve 100% fault coverage for large benchmark circuits with reduced hardware overhead and reduced pattern counts compared to the earlier method using Markov sources.
{"title":"A scan BIST generation method using a Markov source and partial bit-fixing","authors":"Wei Li, Chaowen Yu, S. Reddy, I. Pomeranz","doi":"10.1145/775832.775974","DOIUrl":"https://doi.org/10.1145/775832.775974","url":null,"abstract":"Recently, Markov sources were shown to be effective in designing pseudo-random test pattern generators with low area overhead for built-in self-test of scan designs. This paper presents a new test pattern generation scheme based on a Markov source and a partial bit-fixing technique. A new method is proposed for the computation of the state transition probabilities of the Markov source based on the statistics of a deterministic test set. This is enhanced by partial bit-fixing logic, which fixes a group of consecutive inputs to all-0 or all-1. Experimental results show that the proposed BIST scheme can achieve 100% fault coverage for large benchmark circuits with reduced hardware overhead and reduced pattern counts compared to the earlier method using Markov sources.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127712420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Benini, A. Macii, E. Macii, Elvira Omerbegovic, Fabrizio Pro, M. Poncino
Differential power analysis is a very effective cryptanalysis technique that extracts information on secret keys by monitoring instantaneous power consumption of cryptoprocessors. To protect against differential power analysis, power supply noise is added in cryptographic computations, at the price of an increase in power consumption. We present a technique, based on well-known power-reducing transformations coupled with randomized clock gating, that introduces a significant amount of scrambling in the power profile without increasing (and, in some cases, by even reducing) circuit power consumption.
{"title":"Energy-aware design techniques for differential power analysis protection","authors":"L. Benini, A. Macii, E. Macii, Elvira Omerbegovic, Fabrizio Pro, M. Poncino","doi":"10.1145/775832.775845","DOIUrl":"https://doi.org/10.1145/775832.775845","url":null,"abstract":"Differential power analysis is a very effective cryptanalysis technique that extracts information on secret keys by monitoring instantaneous power consumption of cryptoprocessors. To protect against differential power analysis, power supply noise is added in cryptographic computations, at the price of an increase in power consumption. We present a technique, based on well-known power-reducing transformations coupled with randomized clock gating, that introduces a significant amount of scrambling in the power profile without increasing (and, in some cases, by even reducing) circuit power consumption.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-06-02DOI: 10.1109/DAC.2003.1218937
C. Long, Lei He
Sleep transistors are effective to reduce dynamic and leakage power. The cluster-based design was proposed to reduce the sleep transistor area by clustering gates to minimize the simultaneous switching current per cluster and then inserting a sleep transistor per cluster. In the paper, we propose a novel distributed sleep transistor network (DSTN), and show that DSTN is intrinsically better than the cluster-based design in terms of the sleep transistor area and circuit performance. We reveal properties of optimal DSTN designs, and then develop an efficient algorithm for gate level DSTN synthesis. The algorithm obtains DSTN designs with up to 70.7% sleep transistor area reduction compared to cluster-based designs. Furthermore, we present custom layout designs to verify the area reduction by DSTN.
{"title":"Distributed sleep transistors network for power reduction","authors":"C. Long, Lei He","doi":"10.1109/DAC.2003.1218937","DOIUrl":"https://doi.org/10.1109/DAC.2003.1218937","url":null,"abstract":"Sleep transistors are effective to reduce dynamic and leakage power. The cluster-based design was proposed to reduce the sleep transistor area by clustering gates to minimize the simultaneous switching current per cluster and then inserting a sleep transistor per cluster. In the paper, we propose a novel distributed sleep transistor network (DSTN), and show that DSTN is intrinsically better than the cluster-based design in terms of the sleep transistor area and circuit performance. We reveal properties of optimal DSTN designs, and then develop an efficient algorithm for gate level DSTN synthesis. The algorithm obtains DSTN designs with up to 70.7% sleep transistor area reduction compared to cluster-based designs. Furthermore, we present custom layout designs to verify the area reduction by DSTN.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132620641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Early power analysis for systems-on-chip (SoC) is crucial for determining the appropriate packaging and cost. This early analysis commonly relies on evaluating power formulas for all cores for multiple configurations of voltage, frequency, technology and application parameters, which is a tedious and error-prone process. This work presents a methodology and algorithms for automating the power analysis of SoCs. Given the power state machines for individual cores, this work defines the product power state machine for the whole SoC and uses formal symbolic simulation algorithms for traversing and computing the minimum and maximum power dissipated by sets of power states in the SoC.
{"title":"State-based power analysis for systems-on-chip","authors":"R. Bergamaschi, Yunjian Jiang","doi":"10.1145/775832.775992","DOIUrl":"https://doi.org/10.1145/775832.775992","url":null,"abstract":"Early power analysis for systems-on-chip (SoC) is crucial for determining the appropriate packaging and cost. This early analysis commonly relies on evaluating power formulas for all cores for multiple configurations of voltage, frequency, technology and application parameters, which is a tedious and error-prone process. This work presents a methodology and algorithms for automating the power analysis of SoCs. Given the power state machines for individual cores, this work defines the product power state machine for the whole SoC and uses formal symbolic simulation algorithms for traversing and computing the minimum and maximum power dissipated by sets of power states in the SoC.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sungwoo Hur, Tung Cao, K. Rajagopal, Yegna Parasuram, Amit Chowdhary, V. Tiourin, Bill Halpin
This paper describes a new force directed global placement algorithm that exploits and extends techniques from two leading placers, force-directed according to H. Eisenmann and F.M. Johannes (1998) and T. Cao et al. (2003) and Mongrel by S. Hur and J. Lillis (2000). It combines the strengths of force directed global placement with Mongrel's cell congestion removal to significantly improve the quality of placement during the difficult overlap removal stage of global placement. This is accomplished by using the spreading force in according to H. Eisenmann and F. M. Johannes (1998) to direct and control Mongrel's ripple move optimization. This new placer is called force directed Mongrel (FD-Mongrel). FD-Mongrel also incorporates physical net constraints according to T. Cao et al. (2003), and improves the congestion model for sparse placements. We propose a new placement flow that uses a limited number of the spreading iterations of generic global placement by H. Eisenmann and F. M. Johannes (1998) to form a preliminary global placement. We then use the new FD-Mongrel described in this paper to remove cell overlaps, while meeting net constraints and optimizing wirelength. We present results on wirelength as well as timing driven placement flows.
本文描述了一种新的力导向全局放置算法,该算法利用并扩展了两种领先的放置技术,即H. Eisenmann和F.M. Johannes(1998)以及T. Cao等人(2003)的力导向技术,以及S. Hur和J. Lillis(2000)的Mongrel。它结合了力定向全局布局的优势和Mongrel的蜂窝拥塞去除,在全局布局的困难重叠去除阶段显著提高了布局质量。根据H. Eisenmann和F. M. Johannes(1998)的说法,这是通过使用扩展力来指导和控制Mongrel的涟漪移动优化来实现的。这种新的砂矿被称为力定向混合砂矿(FD-Mongrel)。根据T. Cao等人(2003),FD-Mongrel还纳入了物理网络约束,并改进了稀疏位置的拥塞模型。我们提出了一种新的安置流程,该流程使用H. Eisenmann和F. M. Johannes(1998)的通用全局安置的有限数量的传播迭代来形成初步的全局安置。然后,我们使用本文中描述的新的FD-Mongrel来去除单元重叠,同时满足网络约束并优化无线长度。我们提出的结果在无线以及定时驱动的安置流。
{"title":"Force directed Mongrel with physical net constraints","authors":"Sungwoo Hur, Tung Cao, K. Rajagopal, Yegna Parasuram, Amit Chowdhary, V. Tiourin, Bill Halpin","doi":"10.1145/775832.775888","DOIUrl":"https://doi.org/10.1145/775832.775888","url":null,"abstract":"This paper describes a new force directed global placement algorithm that exploits and extends techniques from two leading placers, force-directed according to H. Eisenmann and F.M. Johannes (1998) and T. Cao et al. (2003) and Mongrel by S. Hur and J. Lillis (2000). It combines the strengths of force directed global placement with Mongrel's cell congestion removal to significantly improve the quality of placement during the difficult overlap removal stage of global placement. This is accomplished by using the spreading force in according to H. Eisenmann and F. M. Johannes (1998) to direct and control Mongrel's ripple move optimization. This new placer is called force directed Mongrel (FD-Mongrel). FD-Mongrel also incorporates physical net constraints according to T. Cao et al. (2003), and improves the congestion model for sparse placements. We propose a new placement flow that uses a limited number of the spreading iterations of generic global placement by H. Eisenmann and F. M. Johannes (1998) to form a preliminary global placement. We then use the new FD-Mongrel described in this paper to remove cell overlaps, while meeting net constraints and optimizing wirelength. We present results on wirelength as well as timing driven placement flows.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-06-02DOI: 10.1109/DAC.2003.1219046
Xianfeng Li, T. Mitra, Abhik Roychoudhury
Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysis, but also modeling the effects of complex micro-architectural features in modern processors. Speculative execution and caching are very common in current processors. Hence one needs to model the effects of these features on the Worst Case Execution (WCET) of a program. Even though the individual effects of these features have been studied recently, their combined effects have not been investigated. We do so in this paper. This is a non-trivial task because speculative execution can indirectly affect cache performance (e.g., speculatively executed blocks can cause additional cache misses). Our technique starts from the control flow graph of the embedded program, and uses integer linear programming to estimate the program's WCET. The accuracy of our modeling is illustrated by tight estimates obtained on realistic benchmarks.
{"title":"Accurate timing analysis by modeling caches, speculation and their interaction","authors":"Xianfeng Li, T. Mitra, Abhik Roychoudhury","doi":"10.1109/DAC.2003.1219046","DOIUrl":"https://doi.org/10.1109/DAC.2003.1219046","url":null,"abstract":"Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysis, but also modeling the effects of complex micro-architectural features in modern processors. Speculative execution and caching are very common in current processors. Hence one needs to model the effects of these features on the Worst Case Execution (WCET) of a program. Even though the individual effects of these features have been studied recently, their combined effects have not been investigated. We do so in this paper. This is a non-trivial task because speculative execution can indirectly affect cache performance (e.g., speculatively executed blocks can cause additional cache misses). Our technique starts from the control flow graph of the embedded program, and uses integer linear programming to estimate the program's WCET. The accuracy of our modeling is illustrated by tight estimates obtained on realistic benchmarks.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115344451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Dahlberg, S. Rawat, J. Bernier, G. Gloski, Aurangzeb Khan, K. Patel, P. Ruddy, N. Sherwani, R. Vasishta
Increasingly, system houses are attracted to the customer-owned tooling (COT) model to gain more control of their schedules and costs. COT project risk and cost are high, often seeming more like customer owned "trouble," so the design team needs to be expertly prepared. The pathways to implement a COT design include (a) Manage the sourcing (internal or third party resources) of individual supply chain and cost reduction functions; (b) Use an integrated design-to-parts service; or (c) A hybrid of these two extremes. This panel will consider the pros and cons for each approach.
{"title":"COT - customer owned trouble","authors":"R. Dahlberg, S. Rawat, J. Bernier, G. Gloski, Aurangzeb Khan, K. Patel, P. Ruddy, N. Sherwani, R. Vasishta","doi":"10.1145/775832.775858","DOIUrl":"https://doi.org/10.1145/775832.775858","url":null,"abstract":"Increasingly, system houses are attracted to the customer-owned tooling (COT) model to gain more control of their schedules and costs. COT project risk and cost are high, often seeming more like customer owned \"trouble,\" so the design team needs to be expertly prepared. The pathways to implement a COT design include (a) Manage the sourcing (internal or third party resources) of individual supply chain and cost reduction functions; (b) Use an integrated design-to-parts service; or (c) A hybrid of these two extremes. This panel will consider the pros and cons for each approach.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115418217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact with the external workload. However, the energy savings are ultimately limited by the set of power-saving modes available to the power manager. This paper proposes new power-saving opportunities to existing system-level power managers by handling each desired mode change in terms of an optimal sequence of mode transitions involving multiple components. We employ algorithms to optimize these transition sequences in polynomial time, making them applicable to static and dynamic policies. The decoupling between policies and mechanisms also makes this approach modular and scalable to devices with complex modes and intricate dependencies on other devices in the system. Experimental results show significant energy savings due to these sequentialized mode-change opportunities that would otherwise be difficult to discover manually even by experienced designers.
{"title":"Scalable modeling and optimization of mode transitions based on decoupled power management architecture","authors":"Dexin Li, Q. Xie, P. Chou","doi":"10.1145/775832.775866","DOIUrl":"https://doi.org/10.1145/775832.775866","url":null,"abstract":"To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact with the external workload. However, the energy savings are ultimately limited by the set of power-saving modes available to the power manager. This paper proposes new power-saving opportunities to existing system-level power managers by handling each desired mode change in terms of an optimal sequence of mode transitions involving multiple components. We employ algorithms to optimize these transition sequences in polynomial time, making them applicable to static and dynamic policies. The decoupling between policies and mechanisms also makes this approach modular and scalable to devices with complex modes and intricate dependencies on other devices in the system. Experimental results show significant energy savings due to these sequentialized mode-change opportunities that would otherwise be difficult to discover manually even by experienced designers.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A time-domain algorithm for computation of the noise power spectral density (PSD) is proposed by V. Vasudevan. When applied to periodically varying circuits, this formulation requires efficient methods to obtain the quasi-periodic steady-state solution of a set of linear time-varying ordinary differential equations. We use both the mixed frequency-time technique (MFT) and the shooting Newton method for this computation. We show that, at each frequency for which the spectral density is sought, MFT requires only two integrations over the duration of the clock period. The results are compared with published experimental and computed data.
V. Vasudevan提出了一种时域噪声功率谱密度(PSD)计算算法。当应用于周期变化电路时,需要有效的方法来获得一组线性时变常微分方程的准周期稳态解。我们使用混合频时技术(MFT)和射击牛顿法进行计算。我们表明,在寻求谱密度的每个频率上,MFT只需要在时钟周期内进行两次积分。结果与已发表的实验和计算数据进行了比较。
{"title":"Computation of noise spectral density in switched capacitor circuits using the mixed-frequency-time technique","authors":"V. Vasudevan, M. Ramakrishna","doi":"10.1145/775832.775968","DOIUrl":"https://doi.org/10.1145/775832.775968","url":null,"abstract":"A time-domain algorithm for computation of the noise power spectral density (PSD) is proposed by V. Vasudevan. When applied to periodically varying circuits, this formulation requires efficient methods to obtain the quasi-periodic steady-state solution of a set of linear time-varying ordinary differential equations. We use both the mixed frequency-time technique (MFT) and the shooting Newton method for this computation. We show that, at each frequency for which the spectral density is sought, MFT requires only two integrations over the duration of the clock period. The results are compared with published experimental and computed data.","PeriodicalId":167477,"journal":{"name":"Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122656561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}