Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618251
A. Emanuel, Andreas Widjaja
This preliminary study presents a system capable of recognizing human gesture in real-time. The gesture is acquired from a Kinect2 sensor which provides skeleton joints represented by three-dimensional coordinate points. The model set consists of eight motion gestures is provided for basis of gesture recognition using Dynamic Time Warping (DTW) algorithm. DTW algorithm is utilized to identify in real time manner by measuring the shortest combined distances in x, y, and z coordinates in order to determined the matched gesture. It can be shown that the system is able to recognize these 8 motions in real time with some limitations. The findings of the this study will provide solid foundation of further research in which the ultimate goal of the research is to create system to automatically recognize sequence of motions in Indonesian traditional dances and convert them into standardized Resource Description Framework (RDF) scripts for the purpose of preserving these dances.
{"title":"Real-Time 3-D Motion Gesture Recognition using Kinect2 as Basis for Traditional Dance Scripting","authors":"A. Emanuel, Andreas Widjaja","doi":"10.1109/ICACSIS.2018.8618251","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618251","url":null,"abstract":"This preliminary study presents a system capable of recognizing human gesture in real-time. The gesture is acquired from a Kinect2 sensor which provides skeleton joints represented by three-dimensional coordinate points. The model set consists of eight motion gestures is provided for basis of gesture recognition using Dynamic Time Warping (DTW) algorithm. DTW algorithm is utilized to identify in real time manner by measuring the shortest combined distances in x, y, and z coordinates in order to determined the matched gesture. It can be shown that the system is able to recognize these 8 motions in real time with some limitations. The findings of the this study will provide solid foundation of further research in which the ultimate goal of the research is to create system to automatically recognize sequence of motions in Indonesian traditional dances and convert them into standardized Resource Description Framework (RDF) scripts for the purpose of preserving these dances.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/icacsis.2018.8618222
{"title":"ICACSIS 2018 Index","authors":"","doi":"10.1109/icacsis.2018.8618222","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618222","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618196
A. Fajar, S. Yazid
Web applications are one of the targets in information security attacks. Many security holes can be exploited can be source of damage and operational disruption of the application itself and even the IT infrastructure in it. Web Application Security Issues usually relate to problems that the developer or the owner may not aware or tend to ignore the issues. The main objective is to enumerate, describe and analyze security issues of the government official web application in Indonesia. The issues covers technical, environment and support issues of application development, configuration and security governance. Technical and environment issues identified using application vulnerability scanners tools. The result shows that web applications have most weakness in configuration issues, both application and security configuration. All of weaknesses that identified relate to technical development, application environment and support. The state of the art of the work lay on that how to improve the quality of web application development which often ignore security requirement during design, development, and deployment. That conditions may raise security issue when the web application has published that may affect other systems. The work recommend several approach to handle the security issues as a contribution to developer and the owner to fix the issues.
{"title":"Enumeration and Handling Security Issues of Government Official Web Application","authors":"A. Fajar, S. Yazid","doi":"10.1109/ICACSIS.2018.8618196","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618196","url":null,"abstract":"Web applications are one of the targets in information security attacks. Many security holes can be exploited can be source of damage and operational disruption of the application itself and even the IT infrastructure in it. Web Application Security Issues usually relate to problems that the developer or the owner may not aware or tend to ignore the issues. The main objective is to enumerate, describe and analyze security issues of the government official web application in Indonesia. The issues covers technical, environment and support issues of application development, configuration and security governance. Technical and environment issues identified using application vulnerability scanners tools. The result shows that web applications have most weakness in configuration issues, both application and security configuration. All of weaknesses that identified relate to technical development, application environment and support. The state of the art of the work lay on that how to improve the quality of web application development which often ignore security requirement during design, development, and deployment. That conditions may raise security issue when the web application has published that may affect other systems. The work recommend several approach to handle the security issues as a contribution to developer and the owner to fix the issues.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/icacsis.2018.8618245
{"title":"ICACSIS 2018 Cover Page","authors":"","doi":"10.1109/icacsis.2018.8618245","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618245","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127103182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618171
W. Hidayat, Setiadi Cahyono Putro, M. A. Gumilang, Indriana Hidayah
The use of Metacognitive Training System (MTS) is relatively new in Indonesia. Previously, a prototype of MTS has been developed and applied in Universitas Gadjah Mada. To become a massive product, the prototype of the MTS must be tested on a larger scale. It is intended to capture user impression about a new product. In this paper, we present User Experience (UX) measurement for the developed MTS in larger scale, involving 90 undergraduate students of informatics education at Universitas Negeri Malang. Two UX measurement methods are used, including User Experience Questionnaires (UEQ) and short-interview. UEQ is used for capturing general impressions, whereas, short-interview is conducted to get deeper feedback about the efficacy of the MTS in their studies. The UX measurement result is benchmarked and revealed that Attractiveness, Efficiency, and Stimulation categorized excellent and the interview result shows that more than 75% respondent responds with the positive answer in five questions. With this result, it could be concluded that the MTS is ready for massive product.
{"title":"What is Informatics Education Students ' Impression of Using Metacognitive Training System at The First Time?","authors":"W. Hidayat, Setiadi Cahyono Putro, M. A. Gumilang, Indriana Hidayah","doi":"10.1109/ICACSIS.2018.8618171","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618171","url":null,"abstract":"The use of Metacognitive Training System (MTS) is relatively new in Indonesia. Previously, a prototype of MTS has been developed and applied in Universitas Gadjah Mada. To become a massive product, the prototype of the MTS must be tested on a larger scale. It is intended to capture user impression about a new product. In this paper, we present User Experience (UX) measurement for the developed MTS in larger scale, involving 90 undergraduate students of informatics education at Universitas Negeri Malang. Two UX measurement methods are used, including User Experience Questionnaires (UEQ) and short-interview. UEQ is used for capturing general impressions, whereas, short-interview is conducted to get deeper feedback about the efficacy of the MTS in their studies. The UX measurement result is benchmarked and revealed that Attractiveness, Efficiency, and Stimulation categorized excellent and the interview result shows that more than 75% respondent responds with the positive answer in five questions. With this result, it could be concluded that the MTS is ready for massive product.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618175
Noer Fitria Putra Setyono, D. Chahyati, M. I. Fanany
Technological developments in the field of Smart System is now growing and began to spread to various areas such as tourism sector. In this research, we developed a smart system for Betawi culinary tourism. Detection of traditional food names using images is a challenge because the variety of shape and direction of shooting is always different. The use of deep learning architecture is expected to overcome the problem, but the selection of effective deep learning architecture is also a problem. This study compares some deep learning architecture to determine the suitable architecture to detect culinary images. Based on our experimental results, DenseNet169 gives the best performance in terms of accuracy, error rate and training time when using CPU and ResNet50 when using GPU..
{"title":"Betawi Traditional Food Image Detection using ResNet and DenseNet","authors":"Noer Fitria Putra Setyono, D. Chahyati, M. I. Fanany","doi":"10.1109/ICACSIS.2018.8618175","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618175","url":null,"abstract":"Technological developments in the field of Smart System is now growing and began to spread to various areas such as tourism sector. In this research, we developed a smart system for Betawi culinary tourism. Detection of traditional food names using images is a challenge because the variety of shape and direction of shooting is always different. The use of deep learning architecture is expected to overcome the problem, but the selection of effective deep learning architecture is also a problem. This study compares some deep learning architecture to determine the suitable architecture to detect culinary images. Based on our experimental results, DenseNet169 gives the best performance in terms of accuracy, error rate and training time when using CPU and ResNet50 when using GPU..","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618249
H. Susanto, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
The emergence of online and new digital media such as mobile applications and social media changed the retail business model and its consumers behaviors. These changes bring new challenges for companies and their stores to manage various channels. This phenomenon creates new idea to integrate them into Omni-channel services. It requires the readiness and complex maintenance because each channel has different characteristics. The consumers find difficulties in ensuring their transactions to be accurate and trustable. This study aims to analyze the factors that influence consumers to use Omni-channel services. It adopts the UTAUT2 with two new variables, such as personal innovativeness and perceived security. The quantitative approach is demonstrated using PLS-SEM with 168 respondents. As the results, social influence variable becomes the most influencing factor on purchasing intention in Omni-channel services, followed by performance expectation, and security perception. These factors become priority when a company formulates strategies for its omni-channel.
{"title":"Analysis of Factors that Influence Purchase Intention on Omni-channel Services","authors":"H. Susanto, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICACSIS.2018.8618249","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618249","url":null,"abstract":"The emergence of online and new digital media such as mobile applications and social media changed the retail business model and its consumers behaviors. These changes bring new challenges for companies and their stores to manage various channels. This phenomenon creates new idea to integrate them into Omni-channel services. It requires the readiness and complex maintenance because each channel has different characteristics. The consumers find difficulties in ensuring their transactions to be accurate and trustable. This study aims to analyze the factors that influence consumers to use Omni-channel services. It adopts the UTAUT2 with two new variables, such as personal innovativeness and perceived security. The quantitative approach is demonstrated using PLS-SEM with 168 respondents. As the results, social influence variable becomes the most influencing factor on purchasing intention in Omni-channel services, followed by performance expectation, and security perception. These factors become priority when a company formulates strategies for its omni-channel.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618260
D. Pratama, R. F. Aji, S. Yazid
Monitoring system is a crucial part in establishing sophisticated IT infrastructure. Monitoring of IT infrastructure becomes indispensable for knowing the status and performance of technology components. Complex infrastructure, such as virtualization and cloud computing systems, boost up the number of nodes to be monitored. Notifications accumulate, which makes it more difficult to track problems. With lots of unneccessary notifications, the challenge to provide availabmty and improve service quality becomes more complex. A monitoring system that can deliver accurate monitoring information is needed. This research proposed a method to manage IT infrastructure monitoring system using Lean method. Lean method is a popular method of process management and has been successfully used in several IT process improvement projects. The results of this research show that lean methods can be applied to increase the quality of monitoring system, through the process stages that have been described in the lean implementation principle. Quantitatively it is known that after the lean method is applied, the number of network elements, nodes and interfaces monitored increases by 39%, 105% and 1%, respectively. While the alerts and events generated decreased by 77% and 49%, respectively. Qualitatively based on the identification of value achievement, the system can deliver the value expected by the customer, in which case the customer is a user of monitoring system.
{"title":"Implementation of Lean Methods on Management of IT Infrastructure Monitoring System: A Case Study of PT Kalbe Farma","authors":"D. Pratama, R. F. Aji, S. Yazid","doi":"10.1109/ICACSIS.2018.8618260","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618260","url":null,"abstract":"Monitoring system is a crucial part in establishing sophisticated IT infrastructure. Monitoring of IT infrastructure becomes indispensable for knowing the status and performance of technology components. Complex infrastructure, such as virtualization and cloud computing systems, boost up the number of nodes to be monitored. Notifications accumulate, which makes it more difficult to track problems. With lots of unneccessary notifications, the challenge to provide availabmty and improve service quality becomes more complex. A monitoring system that can deliver accurate monitoring information is needed. This research proposed a method to manage IT infrastructure monitoring system using Lean method. Lean method is a popular method of process management and has been successfully used in several IT process improvement projects. The results of this research show that lean methods can be applied to increase the quality of monitoring system, through the process stages that have been described in the lean implementation principle. Quantitatively it is known that after the lean method is applied, the number of network elements, nodes and interfaces monitored increases by 39%, 105% and 1%, respectively. While the alerts and events generated decreased by 77% and 49%, respectively. Qualitatively based on the identification of value achievement, the system can deliver the value expected by the customer, in which case the customer is a user of monitoring system.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618142
F. Saputra, Yani Nurhadryani
The amount of public opinion can be very much against a trendy thing. Seeing this, it is not possible to read every opinion manually to get a conclusion from all opinions because it will take quite a lot of time. Sentiment analysis can be used as a solution to the problem. However, public opinion is not always written in just one sentence, it can even be written in more than one sentence. It should also be noted that sentences in Indonesian are divided into two based on their forms, namely simple sentences and compound sentences. Simple sentences only consist of one clause, while compound sentences consist of one or more clauses. Each clause in compound sentences can have differences based on whether there is denial the clause or not. Seeing this, this paper seeks to improve performance by considering the denial, sentence form in Indonesian, and punctuation that is used as a paused or finished intonation. Data used in this paper obtained from Twitter during the campaign of the election in West Java 2018. The methodology of model building consist of 4 stages: data preprocessing, feature extraction, classification, and evaluation. The model resulted in this paper has improved accuracy by 3% from 60.15% to 63.7%.
{"title":"Analysis of Indonesian Sentiments Using Indonesian Sentiment Lexicon by Considering Denial","authors":"F. Saputra, Yani Nurhadryani","doi":"10.1109/ICACSIS.2018.8618142","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618142","url":null,"abstract":"The amount of public opinion can be very much against a trendy thing. Seeing this, it is not possible to read every opinion manually to get a conclusion from all opinions because it will take quite a lot of time. Sentiment analysis can be used as a solution to the problem. However, public opinion is not always written in just one sentence, it can even be written in more than one sentence. It should also be noted that sentences in Indonesian are divided into two based on their forms, namely simple sentences and compound sentences. Simple sentences only consist of one clause, while compound sentences consist of one or more clauses. Each clause in compound sentences can have differences based on whether there is denial the clause or not. Seeing this, this paper seeks to improve performance by considering the denial, sentence form in Indonesian, and punctuation that is used as a paused or finished intonation. Data used in this paper obtained from Twitter during the campaign of the election in West Java 2018. The methodology of model building consist of 4 stages: data preprocessing, feature extraction, classification, and evaluation. The model resulted in this paper has improved accuracy by 3% from 60.15% to 63.7%.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618220
Valentinus Paramarta, Muhammad Jihad, Ardhian Dharma, Ika Chandra Hapsari, P. Sandhyaduhita, A. Hidayanto
Facebook, Twitter, and Instagram are the most often and most widely used social-media sites, especially in Indonesia. The number of social-media users is increasing every year, accompanied by increased risks. One of those risks is to the security and privacy of users, as shown by the user-data leak experienced by Facebook in 2018. These issues led the authors to conduct research relating to the influence of privacy concerns, trust, and user awareness on the readiness to share personal information via social-media sites. A research model was developed based on several hypotheses. The research model was confirmed, and experiment was conducted from 340 social-media users through a questionnaire-based online survey over a period of 2 months. To confirm the structural model used in this research, reliability and validity analyses were performed. Structural equation model (SEM) analysis was used to detect relationships among constructs in the research model. The results of this research show that user awareness, trust, and privacy concerns have a positive and significant effect on sharing personal data on social media. Then we discussed the implications of our results for policy-making, practice, and future research.
{"title":"Impact of User Awareness, Trust, and Privacy Concerns on Sharing Personal Information on Social Media: Facebook, Twitter, and Instagram","authors":"Valentinus Paramarta, Muhammad Jihad, Ardhian Dharma, Ika Chandra Hapsari, P. Sandhyaduhita, A. Hidayanto","doi":"10.1109/ICACSIS.2018.8618220","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618220","url":null,"abstract":"Facebook, Twitter, and Instagram are the most often and most widely used social-media sites, especially in Indonesia. The number of social-media users is increasing every year, accompanied by increased risks. One of those risks is to the security and privacy of users, as shown by the user-data leak experienced by Facebook in 2018. These issues led the authors to conduct research relating to the influence of privacy concerns, trust, and user awareness on the readiness to share personal information via social-media sites. A research model was developed based on several hypotheses. The research model was confirmed, and experiment was conducted from 340 social-media users through a questionnaire-based online survey over a period of 2 months. To confirm the structural model used in this research, reliability and validity analyses were performed. Structural equation model (SEM) analysis was used to detect relationships among constructs in the research model. The results of this research show that user awareness, trust, and privacy concerns have a positive and significant effect on sharing personal data on social media. Then we discussed the implications of our results for policy-making, practice, and future research.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128704257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}