Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.017
Andrii Kalytka
Abstract: Nowadays, it is impossible to do without cli- mate control in enterprises, especially when these are en- terprises that manufacture products that can become unus- able under the influence of environmental factors such as high or low temperature, humidity, and dryness. Basically, in most enterprises, finding a solution to this issue is re- quired by state standards, which cannot be ignored, be- cause it can harm people. The problem of building a computer system for collect- ing data on the temperature and humidity of premises has been considered. The main means of indoor systems for collecting data on temperature and humidity have been defined, and their main disadvantages and advantages have been highlighted. The basic principles of operation of the new system have been developed. The main nodes required for system implementation have been given. Hardware components for the implementation of the new system have been put forward. The structural scheme of the computer system of protection of living space has been developed and considered. The practicality and expediency of developing a new system have been substantiated. The general algorithm of system operation has been developed and considered.
{"title":"A Computer System for Collecting Data on Temperature and Humidity on Premises","authors":"Andrii Kalytka","doi":"10.23939/acps2023.01.017","DOIUrl":"https://doi.org/10.23939/acps2023.01.017","url":null,"abstract":"Abstract: Nowadays, it is impossible to do without cli- mate control in enterprises, especially when these are en- terprises that manufacture products that can become unus- able under the influence of environmental factors such as high or low temperature, humidity, and dryness. Basically, in most enterprises, finding a solution to this issue is re- quired by state standards, which cannot be ignored, be- cause it can harm people. The problem of building a computer system for collect- ing data on the temperature and humidity of premises has been considered. The main means of indoor systems for collecting data on temperature and humidity have been defined, and their main disadvantages and advantages have been highlighted. The basic principles of operation of the new system have been developed. The main nodes required for system implementation have been given. Hardware components for the implementation of the new system have been put forward. The structural scheme of the computer system of protection of living space has been developed and considered. The practicality and expediency of developing a new system have been substantiated. The general algorithm of system operation has been developed and considered.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133703708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.043
Yaroslav M. Krainyk
The presented paper attempts to establish a generalized approach to the development of embedded systems multimedia applications. It is formalized in the form of a framework that defines rules and recommenda- tions for a developer on how to implement specific pieces of software that work with multimedia data. The basis for the development process is the division of the system’s func- tionality into stages with the following development of each stage. The framework also defines how touch sensor events may be elaborated. The proposed framework has been tested in a test scenario in an application with multiple stages. The results proved that the solution is feasible for multimedia applications (specifically, with graphics proc- essing) and can be regarded as a generalized approach to the development of embedded systems with multimedia functionality.
{"title":"Embedded Systems Multimedia Framework for Microcontroller Devices","authors":"Yaroslav M. Krainyk","doi":"10.23939/acps2023.01.043","DOIUrl":"https://doi.org/10.23939/acps2023.01.043","url":null,"abstract":"The presented paper attempts to establish a generalized approach to the development of embedded systems multimedia applications. It is formalized in the form of a framework that defines rules and recommenda- tions for a developer on how to implement specific pieces of software that work with multimedia data. The basis for the development process is the division of the system’s func- tionality into stages with the following development of each stage. The framework also defines how touch sensor events may be elaborated. The proposed framework has been tested in a test scenario in an application with multiple stages. The results proved that the solution is feasible for multimedia applications (specifically, with graphics proc- essing) and can be regarded as a generalized approach to the development of embedded systems with multimedia functionality.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.066
A. Obshta, Y. Biliak, Vladyslav Shugai
The purpose of the work is to develop an experimental model of the control system for compliance with turns along the control length of the pipeline. The open issue of detecting oil product leaks along the controlled section of the pipeline. Preliminary analysis of leak detection methods and principles of operation of hardware and software security diagnostics of the state of pipe transport networks has been considered. A method of studying experimental data and presenting results has been developed. Different literature sources have been analyzed, these literature sources provide information about real cases of pipeline system diagnostics and leak or defect detection. The software and hardware part of the control systems for conducting checks along the control part of the pipeline have been developed, and checks and evaluations of the results of the system checks have been carried out.
{"title":"Cyber-Physical System for Diagnostic Along the Controlled Section of the Oil Pipeline","authors":"A. Obshta, Y. Biliak, Vladyslav Shugai","doi":"10.23939/acps2023.01.066","DOIUrl":"https://doi.org/10.23939/acps2023.01.066","url":null,"abstract":"The purpose of the work is to develop an experimental model of the control system for compliance with turns along the control length of the pipeline. The open issue of detecting oil product leaks along the controlled section of the pipeline. Preliminary analysis of leak detection methods and principles of operation of hardware and software security diagnostics of the state of pipe transport networks has been considered. A method of studying experimental data and presenting results has been developed. Different literature sources have been analyzed, these literature sources provide information about real cases of pipeline system diagnostics and leak or defect detection. The software and hardware part of the control systems for conducting checks along the control part of the pipeline have been developed, and checks and evaluations of the results of the system checks have been carried out.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.009
Vladyslav Bilyk, A. Sachenko
The aim of this work is to explore and analyze an unconventional style of programming based on a pro- pagator-oriented model of computation. The paradigm of propagation is characterized by networks of local, independent, stateless machines interconnected with stateful storage cells. This model allows for a highly modular design and multidirectional computation, enabling the creation of complex systems that can respond to changes and update their state accordingly. This work provides an overview of the propagator- oriented programming model, its motivations, and its advantages over other well-known alternative styles, using unsophisticated examples written in the Java programming language. We illustrate how propagator networks can be used to build flexible and efficient systems and present a basic framework for building such networks. The foun- dational components of the propagation model are imple- mented in Java as groundwork for the general-purpose framework. We demonstrate the power of propagator-oriented prog- ramming through an example of a Pythagorean Theorem implementation. The example shows how the model can be used to build complex systems of an arbitrary number of constraints and cells. We highlight the importance of information propagation over limited linear computation and the benefits of the multidirectional computation enabled by propagator networks.
{"title":"Propagator-Oriented Programming Model Using Java","authors":"Vladyslav Bilyk, A. Sachenko","doi":"10.23939/acps2023.01.009","DOIUrl":"https://doi.org/10.23939/acps2023.01.009","url":null,"abstract":"The aim of this work is to explore and analyze an unconventional style of programming based on a pro- pagator-oriented model of computation. The paradigm of propagation is characterized by networks of local, independent, stateless machines interconnected with stateful storage cells. This model allows for a highly modular design and multidirectional computation, enabling the creation of complex systems that can respond to changes and update their state accordingly. This work provides an overview of the propagator- oriented programming model, its motivations, and its advantages over other well-known alternative styles, using unsophisticated examples written in the Java programming language. We illustrate how propagator networks can be used to build flexible and efficient systems and present a basic framework for building such networks. The foun- dational components of the propagation model are imple- mented in Java as groundwork for the general-purpose framework. We demonstrate the power of propagator-oriented prog- ramming through an example of a Pythagorean Theorem implementation. The example shows how the model can be used to build complex systems of an arbitrary number of constraints and cells. We highlight the importance of information propagation over limited linear computation and the benefits of the multidirectional computation enabled by propagator networks.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122642265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.035
Busra Ozdenizci Kose, Alp Sardag, V. Coskun, Ali Mantar
The emergence of smart cards is a significant achievement in the field of information technology. They are growing in importance as they offer secure data storage and authentication, improve security, simplify processes, reduce costs, and have a variety of applications. In particu- lar, nowadays SIM cards play a vital role in the Telecom industry as an important type of smart card that allows a user to make calls, send messages, store details such as phone number and network authentication information, and provide various mobile data services. Currently, some leading companies take advantage of having their own smart card operating systems and have significant impact on the market on various issues (hardware on which the smart card operating system will run; security restrictions; control, permission and control of any application, etc.). It is important to work on creating a more flexible, adaptable and secure operating system infrastructure in order to overcome these limitations both in the customer perspective and in the ecosystem. The purpose of this research is to introduce the creation of a special Java Card operating system designed for SIM cards used in the Telecom indus- try. The study presents the software requirements and development steps of the proposed operating system and innovative architectural components necessary for its op- eration as a SIM card beyond being a Java Card operating system. The proposed new Java Card based SIM operating system is expected to pave the way for the development of eSIM operating system infrastructure as well as 5G tech- nology and offer valuable opportunities.
{"title":"Enhancing SIM Card Technology: Developing an Advanced Operating System","authors":"Busra Ozdenizci Kose, Alp Sardag, V. Coskun, Ali Mantar","doi":"10.23939/acps2023.01.035","DOIUrl":"https://doi.org/10.23939/acps2023.01.035","url":null,"abstract":"The emergence of smart cards is a significant achievement in the field of information technology. They are growing in importance as they offer secure data storage and authentication, improve security, simplify processes, reduce costs, and have a variety of applications. In particu- lar, nowadays SIM cards play a vital role in the Telecom industry as an important type of smart card that allows a user to make calls, send messages, store details such as phone number and network authentication information, and provide various mobile data services. Currently, some leading companies take advantage of having their own smart card operating systems and have significant impact on the market on various issues (hardware on which the smart card operating system will run; security restrictions; control, permission and control of any application, etc.). It is important to work on creating a more flexible, adaptable and secure operating system infrastructure in order to overcome these limitations both in the customer perspective and in the ecosystem. The purpose of this research is to introduce the creation of a special Java Card operating system designed for SIM cards used in the Telecom indus- try. The study presents the software requirements and development steps of the proposed operating system and innovative architectural components necessary for its op- eration as a SIM card beyond being a Java Card operating system. The proposed new Java Card based SIM operating system is expected to pave the way for the development of eSIM operating system infrastructure as well as 5G tech- nology and offer valuable opportunities.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122654140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.074
Roman Yakubovskyi, Yuriy Morozov
The main purpose of this work is to analyze and compare several technologies used for training speech models, including traditional approaches as Hidden Markov Models (HMMs) and more recent methods as Deep Neural Networks (DNNs). The technologies have been explained and compared using word error rate metric based on the input of 1000 words by a user with 15 decibel background noise. Word error rate metric has been ex- plained and calculated. Potential replacements for com- pared technologies have been provided, including: Atten- tion-based, Generative, Sparse and Quantum-inspired models. Pros and cons of those techniques as a potential replacement have been analyzed and listed. Data analyzing tools and methods have been explained and most common datasets used for HMM and DNN technologies have been described. Real life usage examples of both methods have been provided and systems based on them have been ana- lyzed.
{"title":"Speech Models Training Technologies Comparison Using Word Error Rate","authors":"Roman Yakubovskyi, Yuriy Morozov","doi":"10.23939/acps2023.01.074","DOIUrl":"https://doi.org/10.23939/acps2023.01.074","url":null,"abstract":"The main purpose of this work is to analyze and compare several technologies used for training speech models, including traditional approaches as Hidden Markov Models (HMMs) and more recent methods as Deep Neural Networks (DNNs). The technologies have been explained and compared using word error rate metric based on the input of 1000 words by a user with 15 decibel background noise. Word error rate metric has been ex- plained and calculated. Potential replacements for com- pared technologies have been provided, including: Atten- tion-based, Generative, Sparse and Quantum-inspired models. Pros and cons of those techniques as a potential replacement have been analyzed and listed. Data analyzing tools and methods have been explained and most common datasets used for HMM and DNN technologies have been described. Real life usage examples of both methods have been provided and systems based on them have been ana- lyzed.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.025
Nazarii Klymyshyn
This article explores the implementation of network load balancing in decentralized systems using OpenWrt, Quality of Service (QoS), and traffic balancing techniques. The increasing demand for high-quality net- work services and the surge in network traffic requires the adoption of more efficient load-balancing methods to main- tain network performance. This paper discusses the use of OpenWrt, an open-source firmware for network routers, to configure and manage network traffic. The article also covers the implementation of QoS and traffic balancing techniques to optimize network performance and reduce network congestion. The study employs iperf3 to evaluate network performance and demonstrates the effectiveness of the proposed network load-balancing approach. The index terms include OpenWrt, QoS, balancing, traffic, and ip- erf3.
{"title":"The Network Load Balancer in Decentrilized Systems","authors":"Nazarii Klymyshyn","doi":"10.23939/acps2023.01.025","DOIUrl":"https://doi.org/10.23939/acps2023.01.025","url":null,"abstract":"This article explores the implementation of network load balancing in decentralized systems using OpenWrt, Quality of Service (QoS), and traffic balancing techniques. The increasing demand for high-quality net- work services and the surge in network traffic requires the adoption of more efficient load-balancing methods to main- tain network performance. This paper discusses the use of OpenWrt, an open-source firmware for network routers, to configure and manage network traffic. The article also covers the implementation of QoS and traffic balancing techniques to optimize network performance and reduce network congestion. The study employs iperf3 to evaluate network performance and demonstrates the effectiveness of the proposed network load-balancing approach. The index terms include OpenWrt, QoS, balancing, traffic, and ip- erf3.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.23939/acps2023.01.001
T. Balaban, A. Sachenko
The main purpose of this article is to de- scribethe process of creating a web application designed specifically for blind individuals to take tests. The author discusses the challenges that visually impaired individuals face when taking tests and how the new web application addresses these challenges. The application has been devel- oped using web accessibility guidelines and includes features such as screen reader compatibility, speech recognition, keyboard navigation, and high-contrast options. The author also discusses the testing process used to ensure that the application was effective and accessible for visually impaired users. The results of the study indicate that the application was successful in providing an accessible platform for blind individuals to take tests. The article provides valuable in- sights for developers interested in creating accessible web applications for individuals with disabilities.
{"title":"Development of a Web Application for Taking Tests by Blind People","authors":"T. Balaban, A. Sachenko","doi":"10.23939/acps2023.01.001","DOIUrl":"https://doi.org/10.23939/acps2023.01.001","url":null,"abstract":"The main purpose of this article is to de- scribethe process of creating a web application designed specifically for blind individuals to take tests. The author discusses the challenges that visually impaired individuals face when taking tests and how the new web application addresses these challenges. The application has been devel- oped using web accessibility guidelines and includes features such as screen reader compatibility, speech recognition, keyboard navigation, and high-contrast options. The author also discusses the testing process used to ensure that the application was effective and accessible for visually impaired users. The results of the study indicate that the application was successful in providing an accessible platform for blind individuals to take tests. The article provides valuable in- sights for developers interested in creating accessible web applications for individuals with disabilities.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.23939/acps2022.02.063
Vladyslav Barsiienko, Yevhenii Vavruk
The paper presents the stages of creating a software service for optimizing law firms' work processes and examines its operation's effectiveness. The relevance of development is due to the need to increase the efficiency of work done in conservative spheres such as the law segment. The authors focus on considering the essential components of the designed system. The main operation algorithms have been presented, and the effectiveness of their development has been proved. A comparison has been made, and the prospects for developing optimization services have been emphasized.
{"title":"Software Service for Optimization of the Work Processes in Law Firms","authors":"Vladyslav Barsiienko, Yevhenii Vavruk","doi":"10.23939/acps2022.02.063","DOIUrl":"https://doi.org/10.23939/acps2022.02.063","url":null,"abstract":"The paper presents the stages of creating a software service for optimizing law firms' work processes and examines its operation's effectiveness. The relevance of development is due to the need to increase the efficiency of work done in conservative spheres such as the law segment. The authors focus on considering the essential components of the designed system. The main operation algorithms have been presented, and the effectiveness of their development has been proved. A comparison has been made, and the prospects for developing optimization services have been emphasized.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121429161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.23939/acps2022.02.070
V. Bilenko, Mohammed Kadhim Rahma, V. Hlukhov
The goal of the publication is to test the random codes generator of the built-in crypto-protection system Following the list of critical technologies in the production of weapons field and military equipment (following the Decree of the Cabinet of Ministers of Ukraine dated 30.08.2017 No. 600-r), an embedded microcontroller system for the protection of information for on-board equipment has been developed. A valuable stage of the system introduction is its research and testing. One of the stages of testing is the verification of the generator of random codes to use for the generation of encryption keys and digital signatures. Based on the previous works and research of the Kalyna algorithm, methods and tools for creating a random code generator have been studied to use in the built-in cryptographic data protection system for data encryption/decryption and for working with a digital signature. Means of checking generated random codes and comparing them with existing counterparts have been developed. The purpose of this article is to check the generator of random codes before using it in the built-in information protection system.
{"title":"Testing of the Random Codes Generator of Embedded Crypto Protection System","authors":"V. Bilenko, Mohammed Kadhim Rahma, V. Hlukhov","doi":"10.23939/acps2022.02.070","DOIUrl":"https://doi.org/10.23939/acps2022.02.070","url":null,"abstract":"The goal of the publication is to test the random codes generator of the built-in crypto-protection system Following the list of critical technologies in the production of weapons field and military equipment (following the Decree of the Cabinet of Ministers of Ukraine dated 30.08.2017 No. 600-r), an embedded microcontroller system for the protection of information for on-board equipment has been developed. A valuable stage of the system introduction is its research and testing. One of the stages of testing is the verification of the generator of random codes to use for the generation of encryption keys and digital signatures. Based on the previous works and research of the Kalyna algorithm, methods and tools for creating a random code generator have been studied to use in the built-in cryptographic data protection system for data encryption/decryption and for working with a digital signature. Means of checking generated random codes and comparing them with existing counterparts have been developed. The purpose of this article is to check the generator of random codes before using it in the built-in information protection system.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}