Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238441
P. Saravanan, Nithya Rajadurai, P. Kalpana
In this modern era of electronics almost all day to day activities are governed by electronic devices. Even money transactions have been made electronic with the advent of smart cards. These smart cards contain small controller chips which executes encryption algorithm to make the transactions secure. Though the software algorithm is powerful, their security is weakened when implemented in hardware, as they are vulnerable to power analysis attacks. This paper explores the vulnerability of the widely used 8051 microcontroller to simple power analysis attack.
{"title":"Power analysis attack on 8051 microcontrollers","authors":"P. Saravanan, Nithya Rajadurai, P. Kalpana","doi":"10.1109/ICCIC.2014.7238441","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238441","url":null,"abstract":"In this modern era of electronics almost all day to day activities are governed by electronic devices. Even money transactions have been made electronic with the advent of smart cards. These smart cards contain small controller chips which executes encryption algorithm to make the transactions secure. Though the software algorithm is powerful, their security is weakened when implemented in hardware, as they are vulnerable to power analysis attacks. This paper explores the vulnerability of the widely used 8051 microcontroller to simple power analysis attack.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238442
Dhan V. Sagar, P. Sivakumar, R. V. Anand
Identification of root causes of a performance problem is very difficult in case of large scale IT environment. A model which is scalable and reasonably accurate is required for such complex scenarios. This paper proposes a hybrid model using random forest and statistical change point detection, for root cause localization. Based on impurity measure and change in error rates, random forest identifies the features which can be a potential cause for the problem. Since it is a tree based approach, it does not require any prior information about the measured features. To reduce the number of false classifications, a second level of selection using change point analysis is done. The ability of random forest to work well on very large dataset makes the solution scalable and accurate. Proposed model is applied and verified by identifying the root causes for Service Level Objective Violations in enterprise IT systems.
{"title":"Random forest and change point detection for root cause localization in large scale systems","authors":"Dhan V. Sagar, P. Sivakumar, R. V. Anand","doi":"10.1109/ICCIC.2014.7238442","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238442","url":null,"abstract":"Identification of root causes of a performance problem is very difficult in case of large scale IT environment. A model which is scalable and reasonably accurate is required for such complex scenarios. This paper proposes a hybrid model using random forest and statistical change point detection, for root cause localization. Based on impurity measure and change in error rates, random forest identifies the features which can be a potential cause for the problem. Since it is a tree based approach, it does not require any prior information about the measured features. To reduce the number of false classifications, a second level of selection using change point analysis is done. The ability of random forest to work well on very large dataset makes the solution scalable and accurate. Proposed model is applied and verified by identifying the root causes for Service Level Objective Violations in enterprise IT systems.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"402 1-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238316
P. S. Anitha Kumar, G. Radhakrishnan, V. Gopalakrishnan
Power flow control and stability improvement of a transmission line connected with three energy sources for different loads are studied, in which Flexible AC Transmission system (FACTS) controllers are used to balance the power flow in transmission lines and increase the effective use of transmission line by improving stability of the power system. The Interline Power Flow Controller is the FACTS device used, it consists of static synchronous series compensator to reduce low frequency oscillation, and damping produced is reduced by designing an oscillation damping controller. Among the three sources of energy to transmission line one is considered as renewable wind farm that are capable of producing 9MW power. A Simulink system is developed for the proposed system and the output waveforms are analyzed for various parameters such as voltage, real and reactive power.
{"title":"Stability improvement and power flow control of a grid connected offshore wind farm system using IPFC","authors":"P. S. Anitha Kumar, G. Radhakrishnan, V. Gopalakrishnan","doi":"10.1109/ICCIC.2014.7238316","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238316","url":null,"abstract":"Power flow control and stability improvement of a transmission line connected with three energy sources for different loads are studied, in which Flexible AC Transmission system (FACTS) controllers are used to balance the power flow in transmission lines and increase the effective use of transmission line by improving stability of the power system. The Interline Power Flow Controller is the FACTS device used, it consists of static synchronous series compensator to reduce low frequency oscillation, and damping produced is reduced by designing an oscillation damping controller. Among the three sources of energy to transmission line one is considered as renewable wind farm that are capable of producing 9MW power. A Simulink system is developed for the proposed system and the output waveforms are analyzed for various parameters such as voltage, real and reactive power.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131588255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238484
Kaveri Talawar, Poonam Hosamani
Reversible logic plays a vital role in Quantum computing and Nanotechnology which in future can be applied for low power processor applications. In this paper, we propose, ultra area efficient reversible quantum multiplier based on Radix-2 Booth's recoding algorithm. The Non-Fault tolerant Radix-2 Booth's recoding architecture is designed and optimized for Quantum Cost and Garbage Outputs. The proposed methodology for reversible quantum multiplier shows the improvement in terms of Quantum Cost, Garbage Outputs and gates count compared to all the existing reversible quantum multiplier designs.
{"title":"Ultra area efficient reversible Quantum Radix-2 booth's recoding multiplier for low power applications","authors":"Kaveri Talawar, Poonam Hosamani","doi":"10.1109/ICCIC.2014.7238484","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238484","url":null,"abstract":"Reversible logic plays a vital role in Quantum computing and Nanotechnology which in future can be applied for low power processor applications. In this paper, we propose, ultra area efficient reversible quantum multiplier based on Radix-2 Booth's recoding algorithm. The Non-Fault tolerant Radix-2 Booth's recoding architecture is designed and optimized for Quantum Cost and Garbage Outputs. The proposed methodology for reversible quantum multiplier shows the improvement in terms of Quantum Cost, Garbage Outputs and gates count compared to all the existing reversible quantum multiplier designs.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238516
Sahil Sobti, Vivek Shah, B. Tripathy
Clustering is a familiar concept in the realm of Data mining and has wide applications in areas like image processing, pattern recognition and rule generation. Uncertainty in present day databases is a common feature. In order to handle these datasets, several clustering algorithms have been formulated in the literature. The first one being the Fuzzy C-Means (FCM) algorithm and it was followed by the Rough C-Means (RCM) by Lingras. In the paper Lingras has refined his previous algorithm. We combine this algorithm with the fuzzy C-means algorithm to generate a rough fuzzy C-Means (RFCM) algorithm in this paper. Also, we provide a comparative analysis with earlier RFCM algorithm introduced by Mitra et al and establish that our algorithm performs better. We use both numeric as well as image datasets as input and use the performance indices DB and D for this purpose.
{"title":"A refined rough fuzzy clustering algorithm","authors":"Sahil Sobti, Vivek Shah, B. Tripathy","doi":"10.1109/ICCIC.2014.7238516","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238516","url":null,"abstract":"Clustering is a familiar concept in the realm of Data mining and has wide applications in areas like image processing, pattern recognition and rule generation. Uncertainty in present day databases is a common feature. In order to handle these datasets, several clustering algorithms have been formulated in the literature. The first one being the Fuzzy C-Means (FCM) algorithm and it was followed by the Rough C-Means (RCM) by Lingras. In the paper Lingras has refined his previous algorithm. We combine this algorithm with the fuzzy C-means algorithm to generate a rough fuzzy C-Means (RFCM) algorithm in this paper. Also, we provide a comparative analysis with earlier RFCM algorithm introduced by Mitra et al and establish that our algorithm performs better. We use both numeric as well as image datasets as input and use the performance indices DB and D for this purpose.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238343
Rachna Patel, Mukesh Patel
Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech (audio) or even video and the cover can be chosen accordingly from either a text, an image, an audio or a video. The traditional method uses image as a cover which has the limitation of embedding dimension. So, cover should be a video to overcome the limitation of embedding dimension. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools are checking for information hided by LSB, DCT, Frequency Domain Analysis etc and finds whether the video has hidden or secret data or not. In this paper, the video based steganography techniques are discussed specifically, video in another video technique this means that the cover is video and MATLAB based implementation is done to simulate the results.
{"title":"Steganography over video file by hiding video in another video file, random byte hiding and LSB technique","authors":"Rachna Patel, Mukesh Patel","doi":"10.1109/ICCIC.2014.7238343","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238343","url":null,"abstract":"Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech (audio) or even video and the cover can be chosen accordingly from either a text, an image, an audio or a video. The traditional method uses image as a cover which has the limitation of embedding dimension. So, cover should be a video to overcome the limitation of embedding dimension. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools are checking for information hided by LSB, DCT, Frequency Domain Analysis etc and finds whether the video has hidden or secret data or not. In this paper, the video based steganography techniques are discussed specifically, video in another video technique this means that the cover is video and MATLAB based implementation is done to simulate the results.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238502
A. Akzhalova, A. Kornev, D. Mukharsky
The paper considers the problem of finding maximum number of the radiation sources that are located on the plain field by group of mobile agents with limited time. We formulate both physical and mathematical models that describe the environment and the behavior of mobile agents by including a topology of communication between agents. We propose MPSO-Optima which is improved version of Particle Swarm Optimization (PSO) algorithm adapted to changes in the velocity directions by the conjugate gradient method and optimizing magnitude of the inertia ratio. Both improvements lead to the higher convergence rate that proved by numerical experiments. As a result of the study, the method demonstrates increased resistance to the variation of the acceleration coefficients. The algorithm is tested on virtual simulator environment.
{"title":"Intelligent control technique for autonomous collective robotics systems","authors":"A. Akzhalova, A. Kornev, D. Mukharsky","doi":"10.1109/ICCIC.2014.7238502","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238502","url":null,"abstract":"The paper considers the problem of finding maximum number of the radiation sources that are located on the plain field by group of mobile agents with limited time. We formulate both physical and mathematical models that describe the environment and the behavior of mobile agents by including a topology of communication between agents. We propose MPSO-Optima which is improved version of Particle Swarm Optimization (PSO) algorithm adapted to changes in the velocity directions by the conjugate gradient method and optimizing magnitude of the inertia ratio. Both improvements lead to the higher convergence rate that proved by numerical experiments. As a result of the study, the method demonstrates increased resistance to the variation of the acceleration coefficients. The algorithm is tested on virtual simulator environment.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128892238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238312
R. J. Anita, Dr Narayana Rao Appini
Cloud-assisted mobile health (mHealth) monitoring is a revolutionary approach to provide decision support in the health care sector. It employs not only mobile communications but also cloud computing technologies to deliver timely suggestions. Its main objective is to not only improve the quality of healthcare service but also to decrease the healthcare expenditure. In spite of the benefits it offers, needless to say the acceptance of such a mobile health monitoring system is affected as it doesn't shield the patients' personal data and also the data of the medicare service providers. As a result of which the wide deployment of mHealth technology is hindered and the patients' consent to participate in such a mobile medicare monitoring scheme is abated. Cloud Facilitated Privacy Shielding Leakage Resilient Mobile Health Monitoring addresses the fore mentioned limitations by offering a privacy shield to the involved parties and their data in addition to handling the side channel attack. To take into consideration the resource constraints of the parties involved, outsourcing decryption and proxy re-encryption are implemented to transfer the computational effort of the privacy shielding scheme to the cloud server without affecting the personal data of the clients and that of the Medicare providers. The side channel attack is handled by implementing a Virtual machine policing approach.
{"title":"CPLM: Cloud facilitated privacy shielding leakage resilient mobile health monitoring","authors":"R. J. Anita, Dr Narayana Rao Appini","doi":"10.1109/ICCIC.2014.7238312","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238312","url":null,"abstract":"Cloud-assisted mobile health (mHealth) monitoring is a revolutionary approach to provide decision support in the health care sector. It employs not only mobile communications but also cloud computing technologies to deliver timely suggestions. Its main objective is to not only improve the quality of healthcare service but also to decrease the healthcare expenditure. In spite of the benefits it offers, needless to say the acceptance of such a mobile health monitoring system is affected as it doesn't shield the patients' personal data and also the data of the medicare service providers. As a result of which the wide deployment of mHealth technology is hindered and the patients' consent to participate in such a mobile medicare monitoring scheme is abated. Cloud Facilitated Privacy Shielding Leakage Resilient Mobile Health Monitoring addresses the fore mentioned limitations by offering a privacy shield to the involved parties and their data in addition to handling the side channel attack. To take into consideration the resource constraints of the parties involved, outsourcing decryption and proxy re-encryption are implemented to transfer the computational effort of the privacy shielding scheme to the cloud server without affecting the personal data of the clients and that of the Medicare providers. The side channel attack is handled by implementing a Virtual machine policing approach.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238332
J. S. M. Lenord Melvix, K. Sundararamabalasubramanian, M. Madhan
This paper presents an intelligent battery monitoring system to aid in maintaining lead acid batteries used in solar powered lighting systems. In addition to this, the proposed system also employs maximum power point tracking algorithm to optimize battery performance. Remote monitoring of battery system has been implemented using an embedded web server that transfers State of Charge information of battery via Ethernet Network to multiple clients. The system also assists in faster fault rectification by reporting critical conditions that require immediate attention with escalated priorities. This paper explicates salient features of proposed design and also analyzes the performance of developed system.
{"title":"Development of intelligent battery monitoring system for solar powered lighting applications","authors":"J. S. M. Lenord Melvix, K. Sundararamabalasubramanian, M. Madhan","doi":"10.1109/ICCIC.2014.7238332","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238332","url":null,"abstract":"This paper presents an intelligent battery monitoring system to aid in maintaining lead acid batteries used in solar powered lighting systems. In addition to this, the proposed system also employs maximum power point tracking algorithm to optimize battery performance. Remote monitoring of battery system has been implemented using an embedded web server that transfers State of Charge information of battery via Ethernet Network to multiple clients. The system also assists in faster fault rectification by reporting critical conditions that require immediate attention with escalated priorities. This paper explicates salient features of proposed design and also analyzes the performance of developed system.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238455
V. Eswaramurthy, A. Raghavendra
A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.
{"title":"High level performance in multiple relay networks","authors":"V. Eswaramurthy, A. Raghavendra","doi":"10.1109/ICCIC.2014.7238455","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238455","url":null,"abstract":"A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124551348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}