Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346719
S. Gambhir, Vrisha Tickoo, Madhumita Kathuria
Wireless technology has earned many accolades from the very beginning. The unveiling of WBAN amazed researchers around the globe with its marvelous prospects. Since its birth in the last few years, researchers are busy digging out this field and finding different solutions to various issues present in the layered architecture of WBAN, congestion being one of the serious problems in the transport layer. In this paper, a protocol is proposed based on queue occupancy with packet loss for controlling congestion so that its effect could be minimized or totally vaporized. On comparing it with the conventional TCP's congestion control algorithms, the simulation results show that the overall throughput of the proposed protocol is better.
{"title":"Priority based congestion control in WBAN","authors":"S. Gambhir, Vrisha Tickoo, Madhumita Kathuria","doi":"10.1109/IC3.2015.7346719","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346719","url":null,"abstract":"Wireless technology has earned many accolades from the very beginning. The unveiling of WBAN amazed researchers around the globe with its marvelous prospects. Since its birth in the last few years, researchers are busy digging out this field and finding different solutions to various issues present in the layered architecture of WBAN, congestion being one of the serious problems in the transport layer. In this paper, a protocol is proposed based on queue occupancy with packet loss for controlling congestion so that its effect could be minimized or totally vaporized. On comparing it with the conventional TCP's congestion control algorithms, the simulation results show that the overall throughput of the proposed protocol is better.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346699
Abhinav Duhan, Bhupendra Singh, M. Zayed, H. Rana, Gagan Tiwari, S. Yadav
A monopole wideband antenna is demonstrated in this paper. The proposed antenna has wideband characteristics which work on three different bands can be used for WiMAX, WLAN, Bluetooth and 802.11y enabled devices. Additional resonances are excited by embedding two L-shaped notches in the ground plane. The return loss at each frequency is S11 <; -20 dB. The various antenna parameters like Return loss, VSWR and Radiation patterns of proposed antenna are presented in the paper.
{"title":"A compact monopole wideband antenna for WiMAX/WLAN/BLUETOOTH/IEEE 802.11y services","authors":"Abhinav Duhan, Bhupendra Singh, M. Zayed, H. Rana, Gagan Tiwari, S. Yadav","doi":"10.1109/IC3.2015.7346699","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346699","url":null,"abstract":"A monopole wideband antenna is demonstrated in this paper. The proposed antenna has wideband characteristics which work on three different bands can be used for WiMAX, WLAN, Bluetooth and 802.11y enabled devices. Additional resonances are excited by embedding two L-shaped notches in the ground plane. The return loss at each frequency is S11 <; -20 dB. The various antenna parameters like Return loss, VSWR and Radiation patterns of proposed antenna are presented in the paper.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346669
P. Mohan, Shrey Srivastava, Garvita Tiwari, R. Kala
Hand extraction and gesture recognition has always been a challenging problem in its general form. In this paper, we consider a fixed set of standard gestures and a reasonably structured environment and develop three effective procedures for extracting hand from the image, two of which are for plain non-complex static background and one for complex static background making it independent of the skin and background colours. The second part is of recognizing the gesture and making it scale and rotation invariant. For hand extraction, the three basic concepts used are 1. Gaussian distribution, 2. K-Mean classification and 3. Simple background subtraction and consecutive frame subtraction to find the palm region in the complete image. In gesture recognition, we extracted some features like centre of hand region, no. of fingers and the distance between the fingers. Using these features, the gestures are classified into seven standard hand gestures.
手部提取和手势识别一直是一个具有挑战性的问题。在本文中,我们考虑了一组固定的标准手势和一个合理结构的环境,并开发了三种有效的从图像中提取手的程序,其中两种用于简单的非复杂静态背景,另一种用于复杂静态背景,使其独立于皮肤和背景颜色。第二部分是识别手势并使其缩放和旋转不变。对于手提取,使用的三个基本概念是:1。高斯分布,2。3. k -均值分类;简单的背景减法和连续的帧减法,在完整的图像中找到手掌区域。在手势识别中,我们提取了一些特征,如手的中心区域,没有。手指和手指之间的距离。利用这些特征,手势被分为七种标准手势。
{"title":"Background and skin colour independent hand region extraction and static gesture recognition","authors":"P. Mohan, Shrey Srivastava, Garvita Tiwari, R. Kala","doi":"10.1109/IC3.2015.7346669","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346669","url":null,"abstract":"Hand extraction and gesture recognition has always been a challenging problem in its general form. In this paper, we consider a fixed set of standard gestures and a reasonably structured environment and develop three effective procedures for extracting hand from the image, two of which are for plain non-complex static background and one for complex static background making it independent of the skin and background colours. The second part is of recognizing the gesture and making it scale and rotation invariant. For hand extraction, the three basic concepts used are 1. Gaussian distribution, 2. K-Mean classification and 3. Simple background subtraction and consecutive frame subtraction to find the palm region in the complete image. In gesture recognition, we extracted some features like centre of hand region, no. of fingers and the distance between the fingers. Using these features, the gestures are classified into seven standard hand gestures.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346732
T. K. Mishra, S. Tripathi
Congestion is a major issue in both wired and wireless communication system. Many techniques are applied in data link, network, and transport layer to control congestion. Out of which, flow control plays an important role in controlling the congestion. Again, several techniques are also used to control flows, i.e., AIMD, AISD, MIMD, etc. Still, packet drop occurs at the intermediate nodes due to buffer overwhelming. In this paper, we propose Explicit Throughput and Buffer Notification (ETBN) based congestion control mechanism by regulating the flow rate at the sender side. In this proposed approach, the receiver sends two notifications explicitly regarding its status in terms throughput and buffer availability using cross layer approach. The proposed model is simulated extensively using a self simulator and found that it shows better performance in terms of throughput, buffer utilization when compared with AIMD approach.
{"title":"Explicit Throughput and Buffer Notification based congestion control: A cross layer approach","authors":"T. K. Mishra, S. Tripathi","doi":"10.1109/IC3.2015.7346732","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346732","url":null,"abstract":"Congestion is a major issue in both wired and wireless communication system. Many techniques are applied in data link, network, and transport layer to control congestion. Out of which, flow control plays an important role in controlling the congestion. Again, several techniques are also used to control flows, i.e., AIMD, AISD, MIMD, etc. Still, packet drop occurs at the intermediate nodes due to buffer overwhelming. In this paper, we propose Explicit Throughput and Buffer Notification (ETBN) based congestion control mechanism by regulating the flow rate at the sender side. In this proposed approach, the receiver sends two notifications explicitly regarding its status in terms throughput and buffer availability using cross layer approach. The proposed model is simulated extensively using a self simulator and found that it shows better performance in terms of throughput, buffer utilization when compared with AIMD approach.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel and intuitive way of scheduling entities on a heterogeneous multiprocessing system is presented. The key idea is to understand the behavioral characteristics (foreground/background, IO-bound/CPU-bound) of a scheduling entity to predict the need for its processing bandwidth. This is then used by the scheduler to influence the selection of the big cluster (high-performance) or the LITTLE cluster (power-saving) for optimal performance and power gains. The experimental results confirm that this method leverages the characteristics of a heterogeneous architecture to achieve the desired benefits.
{"title":"Task behaviour inputs to a heterogeneous multiprocessor scheduler","authors":"Aniruddha Banerjee, Sharan Kumar Allur, Syam Prasad Kuncha","doi":"10.1109/IC3.2015.7346647","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346647","url":null,"abstract":"A novel and intuitive way of scheduling entities on a heterogeneous multiprocessing system is presented. The key idea is to understand the behavioral characteristics (foreground/background, IO-bound/CPU-bound) of a scheduling entity to predict the need for its processing bandwidth. This is then used by the scheduler to influence the selection of the big cluster (high-performance) or the LITTLE cluster (power-saving) for optimal performance and power gains. The experimental results confirm that this method leverages the characteristics of a heterogeneous architecture to achieve the desired benefits.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"76 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346737
Vidur S. Bhatnagar, Rachit Magon, Rashi Srivastava, M. Thakur
Sign Language Recognition has been a field of great interest for researchers across the globe because of the wide variety of applications that can be developed with the results. This paper presents a holistic approach to develop a real time and cost effective glove based system, to convert the static subset of a sign language to voice, using statistical template matching. The proposed system aims to build an affordable assistive device for the disabled masses, affected with speech impairment or `mutism'.
{"title":"A cost effective Sign Language to voice emulation system","authors":"Vidur S. Bhatnagar, Rachit Magon, Rashi Srivastava, M. Thakur","doi":"10.1109/IC3.2015.7346737","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346737","url":null,"abstract":"Sign Language Recognition has been a field of great interest for researchers across the globe because of the wide variety of applications that can be developed with the results. This paper presents a holistic approach to develop a real time and cost effective glove based system, to convert the static subset of a sign language to voice, using statistical template matching. The proposed system aims to build an affordable assistive device for the disabled masses, affected with speech impairment or `mutism'.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115388413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346693
Oshin Anand, Praveen Ranjan Srivastava
Past few years have seen an escalated addition in ecommerce websites along with the users, with significant additions from both male and female populations. With the proliferated competition knowing your customer base becomes important. The disquisition focuses on the parallel evaluation of these websites for both genders. The factors individuate itself for males and females, which has been considered in the comparative evaluation. This segregation has been done through calculation of weights using fuzzy AHP which is inputted to TOPSIS for the culminating evaluation. The differentiation of the factor behaviour for males and females provides the industry with the improvement area to enhance their customer base in both the bifurcations, with the findings concreting facts and needs of both the genders.
{"title":"A comparative gender based evaluation of e-commerce website: A hybrid MCDM approach","authors":"Oshin Anand, Praveen Ranjan Srivastava","doi":"10.1109/IC3.2015.7346693","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346693","url":null,"abstract":"Past few years have seen an escalated addition in ecommerce websites along with the users, with significant additions from both male and female populations. With the proliferated competition knowing your customer base becomes important. The disquisition focuses on the parallel evaluation of these websites for both genders. The factors individuate itself for males and females, which has been considered in the comparative evaluation. This segregation has been done through calculation of weights using fuzzy AHP which is inputted to TOPSIS for the culminating evaluation. The differentiation of the factor behaviour for males and females provides the industry with the improvement area to enhance their customer base in both the bifurcations, with the findings concreting facts and needs of both the genders.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346670
Anuranjan Kumar, Sahil Gupta, S. Singh, K. K. Shukla
Collaborative filtering technique for generating recommendation uses user's preferences to find other users most similar to the active user and recommends new items to the user. The task of calculating the similarity is the heart of collaborative filtering approach. In this paper, we have compared various similarity metrics which are used in collaborative filtering approach for recommendation system. We have studied these metrics for both user-based approach, which determines relationships among users of similar taste and item-based approach, which aims to determine the relationships indirectly, by considering the relationship among different items. For each of the two approaches, we have compared similarity and distance metrics like Euclidean distance, Tanimoto coefficient, Pearson correlation etc. To evaluate these metrics for both user-based and item-based approach of collaborative filtering, we conducted a simple data mining experiment on MovieLens dataset for building a movie recommendation system. Finally for performance evaluation we compared our result against performance measures like accuracy, sensitivity, Mathew's coefficient etc.
{"title":"Comparison of various metrics used in collaborative filtering for recommendation system","authors":"Anuranjan Kumar, Sahil Gupta, S. Singh, K. K. Shukla","doi":"10.1109/IC3.2015.7346670","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346670","url":null,"abstract":"Collaborative filtering technique for generating recommendation uses user's preferences to find other users most similar to the active user and recommends new items to the user. The task of calculating the similarity is the heart of collaborative filtering approach. In this paper, we have compared various similarity metrics which are used in collaborative filtering approach for recommendation system. We have studied these metrics for both user-based approach, which determines relationships among users of similar taste and item-based approach, which aims to determine the relationships indirectly, by considering the relationship among different items. For each of the two approaches, we have compared similarity and distance metrics like Euclidean distance, Tanimoto coefficient, Pearson correlation etc. To evaluate these metrics for both user-based and item-based approach of collaborative filtering, we conducted a simple data mining experiment on MovieLens dataset for building a movie recommendation system. Finally for performance evaluation we compared our result against performance measures like accuracy, sensitivity, Mathew's coefficient etc.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124125339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346722
Anup Nandy, P. Chakraborty
Analysis of human gait helps to find an intrinsic gait signature through which ubiquitous human identification and medical disorder problems can be investigated in a broad spectrum. The gait biometric provides an unobtrusive feature by which video gait data can be captured at a larger distance without prior awareness of the subject. In this paper, a new technique has been addressed to study the human gait analysis with Kinect Xbox device. It ensures us to minimize the segmentation errors with automated background subtraction technique. The closely similar human skeleton model can be generated from background subtracted gait images, altered by covariate conditions, such as change in walking speed and variations in clothing type. The gait signatures are captured from joint angle trajectories of left hip, left knee, right hip and right knee of subject's skeleton model. The experimental verification on Kinect gait data has been compared with our in-house development of sensor based biometric suit, Intelligent Gait Oscillation Detector (IGOD). An endeavor has been taken to investigate whether this sensor based biometric suit can be altered with a Kinect device for the proliferation of robust gait identification system. The Fisher discriminant analysis has been applied on training gait signature to look into the discriminatory power of feature vector. The Naïve Bayesian classifier demonstrates an encouraging classification result with estimation of errors on limited dataset captured by Kinect sensor.
{"title":"A new paradigm of human gait analysis with Kinect","authors":"Anup Nandy, P. Chakraborty","doi":"10.1109/IC3.2015.7346722","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346722","url":null,"abstract":"Analysis of human gait helps to find an intrinsic gait signature through which ubiquitous human identification and medical disorder problems can be investigated in a broad spectrum. The gait biometric provides an unobtrusive feature by which video gait data can be captured at a larger distance without prior awareness of the subject. In this paper, a new technique has been addressed to study the human gait analysis with Kinect Xbox device. It ensures us to minimize the segmentation errors with automated background subtraction technique. The closely similar human skeleton model can be generated from background subtracted gait images, altered by covariate conditions, such as change in walking speed and variations in clothing type. The gait signatures are captured from joint angle trajectories of left hip, left knee, right hip and right knee of subject's skeleton model. The experimental verification on Kinect gait data has been compared with our in-house development of sensor based biometric suit, Intelligent Gait Oscillation Detector (IGOD). An endeavor has been taken to investigate whether this sensor based biometric suit can be altered with a Kinect device for the proliferation of robust gait identification system. The Fisher discriminant analysis has been applied on training gait signature to look into the discriminatory power of feature vector. The Naïve Bayesian classifier demonstrates an encouraging classification result with estimation of errors on limited dataset captured by Kinect sensor.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/IC3.2015.7346682
M. HarikrishnaD., M. GurunathReddy, K. S. Rao
In this paper, we propose a multi-stage children story speech synthesis system for Hindi language. The proposed system performs the following tasks: (i) classification of stories into different genres based on text, (ii) prediction of emotion from story text, (iii) deriving prosody rules (modification factors) specific to emotions and story genres and (iv) synthesis of story speech using mark-up language and prosody modification factors. Keyword and part-of-speech (POS) features are used for story-genre classification and emotion prediction. The prosody modification factors are derived carefully by analyzing the perceptual differences between synthesized neutral speech utterances and their respective utterances narrated by a storyteller. The story is synthesized by the festival based concatenative speech synthesizer with annotated story in the form of SABLE mark-up language. The quality and naturalness of the synthesized story speech is evaluated using subjective tests.
{"title":"Multi-stage children story speech synthesis for Hindi","authors":"M. HarikrishnaD., M. GurunathReddy, K. S. Rao","doi":"10.1109/IC3.2015.7346682","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346682","url":null,"abstract":"In this paper, we propose a multi-stage children story speech synthesis system for Hindi language. The proposed system performs the following tasks: (i) classification of stories into different genres based on text, (ii) prediction of emotion from story text, (iii) deriving prosody rules (modification factors) specific to emotions and story genres and (iv) synthesis of story speech using mark-up language and prosody modification factors. Keyword and part-of-speech (POS) features are used for story-genre classification and emotion prediction. The prosody modification factors are derived carefully by analyzing the perceptual differences between synthesized neutral speech utterances and their respective utterances narrated by a storyteller. The story is synthesized by the festival based concatenative speech synthesizer with annotated story in the form of SABLE mark-up language. The quality and naturalness of the synthesized story speech is evaluated using subjective tests.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131585137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}