Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805059
Meryem Ouahilal, M. E. Mohajir, M. Chahhou, Badr Eddine El Mohajir
Predicting stock prices is an important task of financial time series forecasting, which is of great interest to stock investors, stock traders and applied researchers. Many machine learning techniques have been used in recent times to predict the stock price, including regression algorithms which can be useful tools to provide good accuracy of financial time series forecasting. In this paper, we propose a novel hybrid approach which combines Support Vector Regression and Hodrick-Prescott filter in order to optimize the prediction of stock price. To assess the performance of this proposed approach, we have conducted several experiments using Maroc Telecom (IAM) financial time series. It is daily data collected during the period between 2004 and 2016. The experimental results confirm that the proposed model is more powerful in term of predicting stock prices.
{"title":"Optimizing stock market price prediction using a hybrid approach based on HP filter and support vector regression","authors":"Meryem Ouahilal, M. E. Mohajir, M. Chahhou, Badr Eddine El Mohajir","doi":"10.1109/CIST.2016.7805059","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805059","url":null,"abstract":"Predicting stock prices is an important task of financial time series forecasting, which is of great interest to stock investors, stock traders and applied researchers. Many machine learning techniques have been used in recent times to predict the stock price, including regression algorithms which can be useful tools to provide good accuracy of financial time series forecasting. In this paper, we propose a novel hybrid approach which combines Support Vector Regression and Hodrick-Prescott filter in order to optimize the prediction of stock price. To assess the performance of this proposed approach, we have conducted several experiments using Maroc Telecom (IAM) financial time series. It is daily data collected during the period between 2004 and 2016. The experimental results confirm that the proposed model is more powerful in term of predicting stock prices.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122239660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805042
Zouhair Ibn Batouta, R. Dehbi, M. Talea, Omar Hajoui
Automation and generation of complex solutions is a flowering field that is gaining ground day by day to this the need for a study to collect all the recent research development in this area. In fact, the research is very abundant in some point that research have not away or who are just redundant. The overall objective of this paper is to plot the landscape of published proposals in the field of automation and code generation, without restricting the search neither to a specific context nor to a particular programming language. We decide in our article to combine two interesting approaches which permit to focus effectively a given field: Tertiary review and Systematic mapping review; this combination is very constructive and allow us to enlarge and feed our study. Our review is based on a comprehensive set of 2450 selected resources over 6223 studies that were initially identified: 2347 secondary articles, and 103 primary articles selected. As a result of our study we conclude that there is need for research that validates and evaluates the existing proposals.
{"title":"Automation in code generation: Tertiary and systematic mapping review","authors":"Zouhair Ibn Batouta, R. Dehbi, M. Talea, Omar Hajoui","doi":"10.1109/CIST.2016.7805042","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805042","url":null,"abstract":"Automation and generation of complex solutions is a flowering field that is gaining ground day by day to this the need for a study to collect all the recent research development in this area. In fact, the research is very abundant in some point that research have not away or who are just redundant. The overall objective of this paper is to plot the landscape of published proposals in the field of automation and code generation, without restricting the search neither to a specific context nor to a particular programming language. We decide in our article to combine two interesting approaches which permit to focus effectively a given field: Tertiary review and Systematic mapping review; this combination is very constructive and allow us to enlarge and feed our study. Our review is based on a comprehensive set of 2450 selected resources over 6223 studies that were initially identified: 2347 secondary articles, and 103 primary articles selected. As a result of our study we conclude that there is need for research that validates and evaluates the existing proposals.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124701672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804974
Miguel Kpakpo, M. Itmi
The aim of this work in progress is to define a MAS model for cost optimization in an industrial environment. The system, a decision support instrument, must provide alerts and tips that maximize the benefits. In the following we highlight the MAS details. We mainly present the agents and give a detailed description for each one with its goals and its environment. The system purpose is to optimize the wind farms O&M cost.
{"title":"A MAS model for O&M cost simulation and optimization: Case of a wind power operator","authors":"Miguel Kpakpo, M. Itmi","doi":"10.1109/CIST.2016.7804974","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804974","url":null,"abstract":"The aim of this work in progress is to define a MAS model for cost optimization in an industrial environment. The system, a decision support instrument, must provide alerts and tips that maximize the benefits. In the following we highlight the MAS details. We mainly present the agents and give a detailed description for each one with its goals and its environment. The system purpose is to optimize the wind farms O&M cost.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805063
M. E. H. Charaf, Salma Azzouzi
The paper presents some technical issues for testing distributed systems. The proposed approach consists on exploring the temporal properties that specify the time required to exchange messages between the various components of the distributed test application. Thereby taking into consideration the temporal properties in the specification of the behavior of conformance testing, it will provide a higher degree of expressiveness and flexibility. In other side, the paper show how to cope with problems encountered in distributed testing using timed distributed testing rules. Afterwards, we present our algorithm allowing the generation of such rules and a prototype of test using a Distributed Algorithmic and Rule-Based System (DARBS).
{"title":"Timed distributed testing rules for the distributed test architecture","authors":"M. E. H. Charaf, Salma Azzouzi","doi":"10.1109/CIST.2016.7805063","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805063","url":null,"abstract":"The paper presents some technical issues for testing distributed systems. The proposed approach consists on exploring the temporal properties that specify the time required to exchange messages between the various components of the distributed test application. Thereby taking into consideration the temporal properties in the specification of the behavior of conformance testing, it will provide a higher degree of expressiveness and flexibility. In other side, the paper show how to cope with problems encountered in distributed testing using timed distributed testing rules. Afterwards, we present our algorithm allowing the generation of such rules and a prototype of test using a Distributed Algorithmic and Rule-Based System (DARBS).","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804959
Abderrahim Abdellaoui, Anas Laksantini, H. Chaoui
With The advent of technologies such as 4G 5G, Smartphone and cloud computing, a new technology has emerged it is the mobile cloud computing. It's a concept that exploits the benefits of cloud computing in order to overcome some problems related to mobile systems such as computing capability, searching, and multimedia processing. However, the second architecture of mobile cloud computing composed of a cluster of mobile devices suffers from some security problems such as user's privacy when different node communicate with each other. Therefore, and in order to overcome this problem we propose to secure this architecture by integrating a multi-agents system which provides the required intelligence level so as to overcome privacy, availability issues and to support the computing performance.
{"title":"A security scheme for mobile cloud using multi-agents system","authors":"Abderrahim Abdellaoui, Anas Laksantini, H. Chaoui","doi":"10.1109/CIST.2016.7804959","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804959","url":null,"abstract":"With The advent of technologies such as 4G 5G, Smartphone and cloud computing, a new technology has emerged it is the mobile cloud computing. It's a concept that exploits the benefits of cloud computing in order to overcome some problems related to mobile systems such as computing capability, searching, and multimedia processing. However, the second architecture of mobile cloud computing composed of a cluster of mobile devices suffers from some security problems such as user's privacy when different node communicate with each other. Therefore, and in order to overcome this problem we propose to secure this architecture by integrating a multi-agents system which provides the required intelligence level so as to overcome privacy, availability issues and to support the computing performance.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805088
Khalid A. Al-Afandy, O. Faragallah, S. El-Rabaie, F. El-Samie, Ahmed Elmhalawy
This paper proposes a hybrid robust image watermarking scheme based on three levels of Discrete Stationary Wavelet Transform (DSWT) in the Discrete Cosine Transform (DCT) domain. The host image colors (red, green and blue) are separated, and then the DCT is applied on each color after separation. The DSWT is utilized to divide the DCT output into four sub-bands (3 levels). These sub-bands are (A, H, V, D) matrices with the same image size. The watermark is embedded on matrix A. The results of the proposed watermarking scheme are compared with other state-of-the-art schemes. The comparison is based on visualization to detect any degradation of the watermarked image, Peak Signal-to-Noise Ratio (PSNR) of the watermarked image, Normal Correlation (NC) of the extracted watermark after detection, applying attacks, and then calculating the PSNR and NC.
{"title":"A hybrid scheme for robust color image watermarking using DSWT in DCT domain","authors":"Khalid A. Al-Afandy, O. Faragallah, S. El-Rabaie, F. El-Samie, Ahmed Elmhalawy","doi":"10.1109/CIST.2016.7805088","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805088","url":null,"abstract":"This paper proposes a hybrid robust image watermarking scheme based on three levels of Discrete Stationary Wavelet Transform (DSWT) in the Discrete Cosine Transform (DCT) domain. The host image colors (red, green and blue) are separated, and then the DCT is applied on each color after separation. The DSWT is utilized to divide the DCT output into four sub-bands (3 levels). These sub-bands are (A, H, V, D) matrices with the same image size. The watermark is embedded on matrix A. The results of the proposed watermarking scheme are compared with other state-of-the-art schemes. The comparison is based on visualization to detect any degradation of the watermarked image, Peak Signal-to-Noise Ratio (PSNR) of the watermarked image, Normal Correlation (NC) of the extracted watermark after detection, applying attacks, and then calculating the PSNR and NC.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804997
K. B. Ahmed, M. Bouhorma, M. B. Ahmed, A. Radenski
Internet of things and social media platforms have changed the way people communicate and express themselves. People are now sharing their experiences and views in blogs, micro-blogs, comments, photos, videos, and other postings in social sites. It has been recognized that timely reactions to public opinions and sentiments and its proper use by city governments are of paramount importance to their missions. Despite of the widely recognized potential of sentiment analysis, relatively little is known about how to best harness its potential benefits for smart cities. The objective of this article is to help fill the void by reviewing the state of the art and opportunities of data sources and applications of sentiment analysis for smart cities. Additionally, The article explores deep features of photos shared by users in Twitter via transfer learning. Thus revealing interesting research opportunities and applications.
{"title":"Visual sentiment prediction with transfer learning and big data analytics for smart cities","authors":"K. B. Ahmed, M. Bouhorma, M. B. Ahmed, A. Radenski","doi":"10.1109/CIST.2016.7804997","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804997","url":null,"abstract":"Internet of things and social media platforms have changed the way people communicate and express themselves. People are now sharing their experiences and views in blogs, micro-blogs, comments, photos, videos, and other postings in social sites. It has been recognized that timely reactions to public opinions and sentiments and its proper use by city governments are of paramount importance to their missions. Despite of the widely recognized potential of sentiment analysis, relatively little is known about how to best harness its potential benefits for smart cities. The objective of this article is to help fill the void by reviewing the state of the art and opportunities of data sources and applications of sentiment analysis for smart cities. Additionally, The article explores deep features of photos shared by users in Twitter via transfer learning. Thus revealing interesting research opportunities and applications.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805031
El Mostapha Chakir, Y. I. Khamlichi, M. Moughit
Over the years, network intrusion detection systems have evolved to handle varying types of threats. These days, network managers expect network intrusion detection systems (IDS) to detect attacks and include anomaly-awareness, in addition to handling older threats that haven't disappeared. Researchers have proposed different methods and algorithms to improve intrusion detection systems (IDS). There are different types of these systems, most of them are capable of detecting many attacks, but cannot provide a clear idea to the analyst because of the huge number of the false alerts generated by these systems. This weakness has led to the emergence of many methods in which to deal with these alerts. The aim of conducted research in thisfield is to propose a new technique to handle the alerts, to reduce them and distinguish real attacks from false alerts and low importance events. In this paper a new alert classification algorithm for IDS proposed, that uses the Pattern Matching. The proposed algorithm reduces alerts and distinguishes serious alerts, low importance and irrelevant one with a high performance. By the experimental results on DARPA KDD cup 99 Dataset the system is able to classify alerts and causes reducing false alerts considerably.
多年来,网络入侵检测系统已经发展到可以处理各种类型的威胁。如今,网络管理人员希望网络入侵检测系统(IDS)除了处理尚未消失的旧威胁外,还能检测攻击并包括异常感知。研究人员提出了不同的方法和算法来改进入侵检测系统。这些系统有不同的类型,其中大多数能够检测到许多攻击,但由于这些系统产生的大量错误警报,因此无法向分析师提供清晰的想法。这一弱点导致了许多处理这些警报的方法的出现。在这一领域进行研究的目的是提出一种新的技术来处理警报,减少它们,区分真实的攻击,假警报和低重要性事件。本文提出了一种新的基于模式匹配的入侵检测警报分类算法。该算法能够有效地区分严重告警、低重要性告警和不相关告警。通过在DARPA KDD cup 99数据集上的实验结果,该系统能够对警报进行分类,大大减少了误报。
{"title":"Handling alerts for intrusion detection system using stateful pattern matching","authors":"El Mostapha Chakir, Y. I. Khamlichi, M. Moughit","doi":"10.1109/CIST.2016.7805031","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805031","url":null,"abstract":"Over the years, network intrusion detection systems have evolved to handle varying types of threats. These days, network managers expect network intrusion detection systems (IDS) to detect attacks and include anomaly-awareness, in addition to handling older threats that haven't disappeared. Researchers have proposed different methods and algorithms to improve intrusion detection systems (IDS). There are different types of these systems, most of them are capable of detecting many attacks, but cannot provide a clear idea to the analyst because of the huge number of the false alerts generated by these systems. This weakness has led to the emergence of many methods in which to deal with these alerts. The aim of conducted research in thisfield is to propose a new technique to handle the alerts, to reduce them and distinguish real attacks from false alerts and low importance events. In this paper a new alert classification algorithm for IDS proposed, that uses the Pattern Matching. The proposed algorithm reduces alerts and distinguishes serious alerts, low importance and irrelevant one with a high performance. By the experimental results on DARPA KDD cup 99 Dataset the system is able to classify alerts and causes reducing false alerts considerably.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"70 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805036
Sara Jebbor, A. E. Afia, R. Chiheb, F. Ouzayd
Nowadays, scientific researches attribute a crucial importance to hospital sector. The improvement of this sector is considered by the literature as strongly depending on well mastered hospital supply chain, more exactly drug supply chain. Hence, several research studies have worked on the management of drug supply chain by offering diverse approaches and management models. In this paper, we focus on stochastic drug supply chain and our goal is to present a literature review about the drug supply chain and drug supply and inventory management methods, in order to establish a comparative analysis of the methods and approaches recently proposed by various research projects to identify the most appropriate one.
{"title":"Comparative analysis of drug supply and inventory management methods literature review","authors":"Sara Jebbor, A. E. Afia, R. Chiheb, F. Ouzayd","doi":"10.1109/CIST.2016.7805036","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805036","url":null,"abstract":"Nowadays, scientific researches attribute a crucial importance to hospital sector. The improvement of this sector is considered by the literature as strongly depending on well mastered hospital supply chain, more exactly drug supply chain. Hence, several research studies have worked on the management of drug supply chain by offering diverse approaches and management models. In this paper, we focus on stochastic drug supply chain and our goal is to present a literature review about the drug supply chain and drug supply and inventory management methods, in order to establish a comparative analysis of the methods and approaches recently proposed by various research projects to identify the most appropriate one.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805061
A. Dahbi, Mohammed Mouhir, Y. Balouki, T. Gadi
Association rule mining is one of the most relevant techniques in data mining, aiming to extract correlation among sets of items or products in transactional databases. The huge number of association rules extracted represents the main obstacle that a decision maker faces. Hence, many interestingness measures have been proposed to evaluate the association rules. However, the abundance of these measures caused a new problem, which is the selection of measures that is best suited to the users. To bypass this problem, we propose an approach based on K-means algorithm to classify and to store Association Rules without favoring or excluding any measures. The experiments, performed on numerous datasets, show a significant performance of the proposed approach and it effectively classify the association rules.
{"title":"Classification of association rules based on K-means algorithm","authors":"A. Dahbi, Mohammed Mouhir, Y. Balouki, T. Gadi","doi":"10.1109/CIST.2016.7805061","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805061","url":null,"abstract":"Association rule mining is one of the most relevant techniques in data mining, aiming to extract correlation among sets of items or products in transactional databases. The huge number of association rules extracted represents the main obstacle that a decision maker faces. Hence, many interestingness measures have been proposed to evaluate the association rules. However, the abundance of these measures caused a new problem, which is the selection of measures that is best suited to the users. To bypass this problem, we propose an approach based on K-means algorithm to classify and to store Association Rules without favoring or excluding any measures. The experiments, performed on numerous datasets, show a significant performance of the proposed approach and it effectively classify the association rules.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"87 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}