Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364744
A. Trisanto, M. Yasser, Jianming Lu, T. Yahagi
This paper presents the fuzzy PID (FPID) controller using neural network (NN) for controlling the magnetic levitation system. Magnetic levitation systems are open loop unstable, uncertainly and inherently nonlinear systems. Consequently, controlling this kind of the system is very difficulty. The FPID controller is developed to provide nonlinear or linear control action that can improve performance of the controller in comparison with a conventional PID controller using only linear policy. Unfortunately, since FPID controller are nonlinear, it is more difficult to set the controller gains compared the linear PID controller. In this paper we propose a neural network to assist the FPID controller. The NN is added in parallel with FPID controller. The NN is used to compensate for inadequate FPID parameters and for stabilize the magnetic levitation system. The uniqueness our method is when the parameters of FPID are incorrect, then the NN takes over the controller, otherwise the NN does not operate. Online training and fast computing of the NN has been designed for that purposes. Finally, the experiment results showed the effectiveness of the proposed method
{"title":"Implementation of a Fuzzy PID Controller Using Neural Network on the Magnetic Levitation System","authors":"A. Trisanto, M. Yasser, Jianming Lu, T. Yahagi","doi":"10.1109/ISPACS.2006.364744","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364744","url":null,"abstract":"This paper presents the fuzzy PID (FPID) controller using neural network (NN) for controlling the magnetic levitation system. Magnetic levitation systems are open loop unstable, uncertainly and inherently nonlinear systems. Consequently, controlling this kind of the system is very difficulty. The FPID controller is developed to provide nonlinear or linear control action that can improve performance of the controller in comparison with a conventional PID controller using only linear policy. Unfortunately, since FPID controller are nonlinear, it is more difficult to set the controller gains compared the linear PID controller. In this paper we propose a neural network to assist the FPID controller. The NN is added in parallel with FPID controller. The NN is used to compensate for inadequate FPID parameters and for stabilize the magnetic levitation system. The uniqueness our method is when the parameters of FPID are incorrect, then the NN takes over the controller, otherwise the NN does not operate. Online training and fast computing of the NN has been designed for that purposes. Finally, the experiment results showed the effectiveness of the proposed method","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122621683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364834
Takanori Watanabe, K. Naito, K. Mori, Hideo Kobayashi
Ad-hoc network is an autonomous network that consists of only mobile terminals without an infrastructure such as base stations. The wireless LAN system with IEEE 802.11 standard is one of the candidate schemes to realize ad-hoc network. In IEEE 802.11, CSMA/CA (carrier sense multiple access with collision avoidance) is used as access control method. Moreover RTS/CTS (request to send/clear to send) mechanism is implemented to solve the hidden terminal problem. However it is well known that RTS/CTS mechanism causes the exposed terminal problem in which the communication route between terminals would be suppressed. In this paper, we clarify the effect of the exposed terminal problem to the ad-hoc networks. Moreover we propose a local alternative routing protocol method that prepares back up routes to avoid the temporary suppression of transmissions. Simulation results show that the proposed method can prevent the route reconstruction and improve the packet delivery ratio
Ad-hoc网络是一种仅由移动终端组成的自治网络,没有基站等基础设施。采用IEEE 802.11标准的无线局域网系统是实现自组织网络的备选方案之一。在IEEE 802.11中,使用CSMA/CA (carrier sense multiple access with collision avoidance)作为访问控制方法。此外,还实现了RTS/CTS(请求发送/清除发送)机制,解决了终端隐藏问题。然而,众所周知,RTS/CTS机制会导致终端暴露问题,终端之间的通信路由会受到抑制。本文阐明了终端暴露问题对自组织网络的影响。此外,我们还提出了一种本地备用路由协议方法,该方法准备备份路由以避免传输的临时抑制。仿真结果表明,该方法能够有效地防止路由重构,提高分组分发率
{"title":"Study of local alternative ad hoc routing protocol for the exposed terminal problem","authors":"Takanori Watanabe, K. Naito, K. Mori, Hideo Kobayashi","doi":"10.1109/ISPACS.2006.364834","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364834","url":null,"abstract":"Ad-hoc network is an autonomous network that consists of only mobile terminals without an infrastructure such as base stations. The wireless LAN system with IEEE 802.11 standard is one of the candidate schemes to realize ad-hoc network. In IEEE 802.11, CSMA/CA (carrier sense multiple access with collision avoidance) is used as access control method. Moreover RTS/CTS (request to send/clear to send) mechanism is implemented to solve the hidden terminal problem. However it is well known that RTS/CTS mechanism causes the exposed terminal problem in which the communication route between terminals would be suppressed. In this paper, we clarify the effect of the exposed terminal problem to the ad-hoc networks. Moreover we propose a local alternative routing protocol method that prepares back up routes to avoid the temporary suppression of transmissions. Simulation results show that the proposed method can prevent the route reconstruction and improve the packet delivery ratio","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364808
Arthur Segard, Frangois Verdier, David Declercq, Pascal Urardt
Low-density parity check codes (LDPC) are a class of channel decoding codes used in digital communications. Very high error correcting performances can be reached with such codes but they require both a great computing effort and randomly constructed decoding matrices. LDPC codes are used to perform the channel coding of the satellite television broadcast standard DVB-S2. This paper proposes a way to design massively parallel hardware architecture of DVB-S2 compliant LDPC decoders. It is based on a particular way to schedule all the algorithm's calculations. The proposed architecture speeds-up the decoding process, allowing the algorithm to converge faster with no significant performance loss. Moreover, a particular data update mechanism has been developed in order to avoid all data conflicts inherent to DVB-S2 matrices even for highly parallel implementations. This paper describes our hardware LDPC decoder architecture and its processing elements. Estimated silicon area of this decoder is 11 mm in ST 90 nm technology and the decoding throughput reaches 591 M bps at 300 MHz for rate 1/2 and code size of 64800
低密度奇偶校验码(LDPC)是一种用于数字通信的信道解码码。这种码可以达到很高的纠错性能,但需要大量的计算量和随机构造的译码矩阵。LDPC码用于执行卫星电视广播标准DVB-S2的信道编码。提出了一种适合DVB-S2标准的LDPC解码器的大规模并行硬件架构设计方法。它基于一种特殊的方式来安排所有算法的计算。所提出的架构加快了解码过程,使算法在没有显著性能损失的情况下更快地收敛。此外,为了避免DVB-S2矩阵固有的所有数据冲突,甚至对于高度并行的实现,也开发了一种特定的数据更新机制。本文介绍了我们的硬件LDPC解码器体系结构及其处理元件。在ST 90纳米技术下,该解码器的硅面积估计为11毫米,解码吞吐量在300 MHz下达到591 M bps,速率为1/2,代码大小为64800
{"title":"A DVB-S2 compliant LDPC decoder integrating the Horizontal Shuffle Scheduling","authors":"Arthur Segard, Frangois Verdier, David Declercq, Pascal Urardt","doi":"10.1109/ISPACS.2006.364808","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364808","url":null,"abstract":"Low-density parity check codes (LDPC) are a class of channel decoding codes used in digital communications. Very high error correcting performances can be reached with such codes but they require both a great computing effort and randomly constructed decoding matrices. LDPC codes are used to perform the channel coding of the satellite television broadcast standard DVB-S2. This paper proposes a way to design massively parallel hardware architecture of DVB-S2 compliant LDPC decoders. It is based on a particular way to schedule all the algorithm's calculations. The proposed architecture speeds-up the decoding process, allowing the algorithm to converge faster with no significant performance loss. Moreover, a particular data update mechanism has been developed in order to avoid all data conflicts inherent to DVB-S2 matrices even for highly parallel implementations. This paper describes our hardware LDPC decoder architecture and its processing elements. Estimated silicon area of this decoder is 11 mm in ST 90 nm technology and the decoding throughput reaches 591 M bps at 300 MHz for rate 1/2 and code size of 64800","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364882
Sung-Uk Jung, Jang-Hee Yoo
We propose a novel method of eye detection that is robust to obstacles such as the surrounding illumination, hair, glasses and etc. The obstacles above the face images are the constraints to detect eye position. These constraints affect the performance of face application systems such as face recognition, gaze tracking, and video indexing system. To overcome this problem, our method for eye detection consists of three steps. In preprocess, we apply SQI (self quotient image) to the face images to reduce illumination effect. Then, we extract the eye candidates by using the gradient descent which is simple and fast computing method. Finally, the classifier which has trained by using AdaBoost algorithm selects the eyes from all of the eye candidates. The usefulness of proposed method has been demonstrated in experiments with the eye detection performance
{"title":"Robust Eye Detection Using Self Quotient image","authors":"Sung-Uk Jung, Jang-Hee Yoo","doi":"10.1109/ISPACS.2006.364882","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364882","url":null,"abstract":"We propose a novel method of eye detection that is robust to obstacles such as the surrounding illumination, hair, glasses and etc. The obstacles above the face images are the constraints to detect eye position. These constraints affect the performance of face application systems such as face recognition, gaze tracking, and video indexing system. To overcome this problem, our method for eye detection consists of three steps. In preprocess, we apply SQI (self quotient image) to the face images to reduce illumination effect. Then, we extract the eye candidates by using the gradient descent which is simple and fast computing method. Finally, the classifier which has trained by using AdaBoost algorithm selects the eyes from all of the eye candidates. The usefulness of proposed method has been demonstrated in experiments with the eye detection performance","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133019316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364842
T. Akimoto, N. Hagita
We are developing a type of robotics technology called a "network robot system." Such a system can provide robot-based services that are not realized by a single robot but a combination of robots, ubiquitous sensors, PCs, and cellular phones. Using various types of robot technology in a network helps to improve people's understanding of their situation and environment. In this paper, we introduce a network robot system and discuss some examples of the system in which robots directly interact with their users
{"title":"Introduction to a Network Robot System","authors":"T. Akimoto, N. Hagita","doi":"10.1109/ISPACS.2006.364842","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364842","url":null,"abstract":"We are developing a type of robotics technology called a \"network robot system.\" Such a system can provide robot-based services that are not realized by a single robot but a combination of robots, ubiquitous sensors, PCs, and cellular phones. Using various types of robot technology in a network helps to improve people's understanding of their situation and environment. In this paper, we introduce a network robot system and discuss some examples of the system in which robots directly interact with their users","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364713
Manabu Serata, Yutaka Hatakeyama, Kaoru Hirota
For automatic image annotation, a method based on rough sets with visual keys is proposed. Using rough set theory the method constructs decision rules about each visual key used for image indexing and about keywords from training set of already annotated images. Then target image is annotated according to constructed decision rules about visual keys which the target image is indexed by. The method is evaluated with training sets of 900 images and with test sets of 100 images on 1,000 manually annotated images in COREL database. Experiments show that recall rates tend to rise easily compared with precision rates on image retrieval with query-by-keywords
{"title":"Automatic Image Annotation based-on Rough Set Theory with Visual Keys","authors":"Manabu Serata, Yutaka Hatakeyama, Kaoru Hirota","doi":"10.1109/ISPACS.2006.364713","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364713","url":null,"abstract":"For automatic image annotation, a method based on rough sets with visual keys is proposed. Using rough set theory the method constructs decision rules about each visual key used for image indexing and about keywords from training set of already annotated images. Then target image is annotated according to constructed decision rules about visual keys which the target image is indexed by. The method is evaluated with training sets of 900 images and with test sets of 100 images on 1,000 manually annotated images in COREL database. Experiments show that recall rates tend to rise easily compared with precision rates on image retrieval with query-by-keywords","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364843
M. Shimizu, H. Nakada
RFIDs are an interesting approach to accessing anything through the network. The most commonly mentioned variant is the passive RFID, but it has several serious problems. This paper focuses on the "active" RFID to realize "ubiquitous communication". First, the principle of active tags is mentioned, and the problem of readout rate is considered. Several actual applications using active RFIDs are introduced
{"title":"The Practical Example Case of Active RFID","authors":"M. Shimizu, H. Nakada","doi":"10.1109/ISPACS.2006.364843","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364843","url":null,"abstract":"RFIDs are an interesting approach to accessing anything through the network. The most commonly mentioned variant is the passive RFID, but it has several serious problems. This paper focuses on the \"active\" RFID to realize \"ubiquitous communication\". First, the principle of active tags is mentioned, and the problem of readout rate is considered. Several actual applications using active RFIDs are introduced","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364773
Shin'ichi Koike
This paper presents an adaptive filtering system where impulse noise is present at filter input. To study adverse, or favorable, effects of such impulse noise on adaptive filter performance, we develop transient and steady-state analysis of adaptive filters using the LMS algorithm (LMSA) and signed regressor LMS algorithm (SRA). Through analysis and experiment, we find that the SRA exhibits significantly higher robustness against the impulse noise than the LMSA. For the SRA, we find that mean square tap weight misalignment (MSTWM) decreases as the impulse noise variance increases, attaining a minimum before the filter diverges.
{"title":"Effects of Impulse Noise at Filter Input on Performance of Adaptive Filters Using the LMS and Signed Regressor LMS Algorithms","authors":"Shin'ichi Koike","doi":"10.1109/ISPACS.2006.364773","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364773","url":null,"abstract":"This paper presents an adaptive filtering system where impulse noise is present at filter input. To study adverse, or favorable, effects of such impulse noise on adaptive filter performance, we develop transient and steady-state analysis of adaptive filters using the LMS algorithm (LMSA) and signed regressor LMS algorithm (SRA). Through analysis and experiment, we find that the SRA exhibits significantly higher robustness against the impulse noise than the LMSA. For the SRA, we find that mean square tap weight misalignment (MSTWM) decreases as the impulse noise variance increases, attaining a minimum before the filter diverges.","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364887
Pan Xiuqin, Li Xiali, Lu Yong, Cao Yongcun, Zhao Yue
In this paper, an object recognition algorithm of ship noise is presented combined a new kind of information processing technology with pattern matching. The procedure of processing acoustic signal of human being's hearing is imitated to extract the auditory correlation spectrum (ARS) as feature in the algorithm. Then, a novel feature named as summation of auditory correlation spectrum (SARS) is defined. Consequently the simulation on the presented algorithm and that based on power spectrum and based on neural network is carried out. The results illustrate that the given algorithm is effective and efficient
{"title":"Research on the Algorithm of Object Recognition of Ship noise Based on Auditory Feature and Pattern-matching","authors":"Pan Xiuqin, Li Xiali, Lu Yong, Cao Yongcun, Zhao Yue","doi":"10.1109/ISPACS.2006.364887","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364887","url":null,"abstract":"In this paper, an object recognition algorithm of ship noise is presented combined a new kind of information processing technology with pattern matching. The procedure of processing acoustic signal of human being's hearing is imitated to extract the auditory correlation spectrum (ARS) as feature in the algorithm. Then, a novel feature named as summation of auditory correlation spectrum (SARS) is defined. Consequently the simulation on the presented algorithm and that based on power spectrum and based on neural network is carried out. The results illustrate that the given algorithm is effective and efficient","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123699819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-01DOI: 10.1109/ISPACS.2006.364698
Hiroki Matsumoto, T. Kashihara, Toshihiro Furukawat
In a teleconference system, a cause of deterioration for sound quality is echo signals. A convectional echo canceller had to stop updating parameters during the double talk. So, the reliability of transmitted signals deteriorate during the double talk. Therefore, blind signal separation (BSS) method is the method that is suitable for echo cancellers, because the method doesn't need to stop updating parameters during double talk. However, it is difficult to directly apply, because BSS method has two faults. So we solve these faults by using system structure of the echo canceller. As the result, we can apply BSS method to echo canceller. And, it has a higher reliability of transmitted signals
{"title":"A Proposal of Echo Canceller using Blind Signal Separation method","authors":"Hiroki Matsumoto, T. Kashihara, Toshihiro Furukawat","doi":"10.1109/ISPACS.2006.364698","DOIUrl":"https://doi.org/10.1109/ISPACS.2006.364698","url":null,"abstract":"In a teleconference system, a cause of deterioration for sound quality is echo signals. A convectional echo canceller had to stop updating parameters during the double talk. So, the reliability of transmitted signals deteriorate during the double talk. Therefore, blind signal separation (BSS) method is the method that is suitable for echo cancellers, because the method doesn't need to stop updating parameters during double talk. However, it is difficult to directly apply, because BSS method has two faults. So we solve these faults by using system structure of the echo canceller. As the result, we can apply BSS method to echo canceller. And, it has a higher reliability of transmitted signals","PeriodicalId":178644,"journal":{"name":"2006 International Symposium on Intelligent Signal Processing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124201999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}