Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019415
S. Girase, M. Sohani, Suraj Patil
Today, Cloud Computing become one of the most promising an emerging technology which will has a significant impact on IT Infrastructure. Still, Cloud Computing is infancy. In the current cloud computing environment there is numerous of application, consist of millions of module, these application serve from large quantity of users and user request becomes dynamic. So there must be provision that all resources are dynamically made available to satisfy the needs of requesting a user in a situation where the resource contention fierce is occurs. In this paper, we propose scheduling heuristic to allocate resource and schedule request for cloud system. An aim of proposed scheduling heuristic is to schedule request on Virtual Machine (VM) based on agreed Service Level Agreements (SLA) and creating new VM on physical resources based on availabilities of resources which considered priority based VM allocation, Load Balancing and Preemption Mechanism. And the experimental results of proposed heuristic helps to optimize performance and at the same time reduce the possibilities of SLA violations.
{"title":"Dynamic resource provisioning in Cloud Computing environment using priority based virtual machine's","authors":"S. Girase, M. Sohani, Suraj Patil","doi":"10.1109/ICACCCT.2014.7019415","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019415","url":null,"abstract":"Today, Cloud Computing become one of the most promising an emerging technology which will has a significant impact on IT Infrastructure. Still, Cloud Computing is infancy. In the current cloud computing environment there is numerous of application, consist of millions of module, these application serve from large quantity of users and user request becomes dynamic. So there must be provision that all resources are dynamically made available to satisfy the needs of requesting a user in a situation where the resource contention fierce is occurs. In this paper, we propose scheduling heuristic to allocate resource and schedule request for cloud system. An aim of proposed scheduling heuristic is to schedule request on Virtual Machine (VM) based on agreed Service Level Agreements (SLA) and creating new VM on physical resources based on availabilities of resources which considered priority based VM allocation, Load Balancing and Preemption Mechanism. And the experimental results of proposed heuristic helps to optimize performance and at the same time reduce the possibilities of SLA violations.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019344
Mayur Vyas, K. Verma
Handwritten character segmentation is the process of dividing a character into multiple segments so that it can be passed to the recognition system and on the basis of these segments the recognition system can recognize that particular character. In this process user provides the input through any touch devices like PDA, Mobiles or by the Tablets and the segmentation tool takes the input and break the character into segments. There are various techniques available which performs the segmentation of the handwritten input. The aim of this paper is to do survey of various techniques and find out the best among them.
{"title":"A comprehensive survey of handwritten character segmentation","authors":"Mayur Vyas, K. Verma","doi":"10.1109/ICACCCT.2014.7019344","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019344","url":null,"abstract":"Handwritten character segmentation is the process of dividing a character into multiple segments so that it can be passed to the recognition system and on the basis of these segments the recognition system can recognize that particular character. In this process user provides the input through any touch devices like PDA, Mobiles or by the Tablets and the segmentation tool takes the input and break the character into segments. There are various techniques available which performs the segmentation of the handwritten input. The aim of this paper is to do survey of various techniques and find out the best among them.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019337
C. Hariharan, C. Babu
Service Oriented Architecture (SOA) has been widely used during the past decade due to its ability to seamlessly integrate various applications developed using different technologies. Web services based on open standards are the most commonly used technology to realize an SOA. Business processes are executed by appropriate orchestration of various services from different departments that belong to a single organization or from multiple organizations. Security is an important quality attribute that has to be built into any application that is developed using SOA. XML is the underlying technology for Web Service Description Language (WSDL), SOAP protocol and Business Process Execution Language (BPEL). It is highly probable that an attacker could inject malicious information into these XML files to modify the flow of the business process. Further, SOAP was not designed with security in mind, it is possible to tamper the SOAP messages while they are in transit. There exist a number of such potential vulnerabilities which lead to possible security breach in the individual services. In an orchestrated business process, there are possibilities of more vulnerabilities. One of the existing tools namely WS-Attacker is only capable of testing the security of individual web services alone. In spite of the widespread usage of SOA, currently there is limited automatic tool support for testing the security provided by an entire SOA application involving service orchestration. In this context, this paper focuses on designing and implementing a plug-in for WS-Attacker to analyze a few security vulnerabilities present in SOA business processes.
{"title":"Security testing of orchestrated business processes in SOA","authors":"C. Hariharan, C. Babu","doi":"10.1109/ICACCCT.2014.7019337","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019337","url":null,"abstract":"Service Oriented Architecture (SOA) has been widely used during the past decade due to its ability to seamlessly integrate various applications developed using different technologies. Web services based on open standards are the most commonly used technology to realize an SOA. Business processes are executed by appropriate orchestration of various services from different departments that belong to a single organization or from multiple organizations. Security is an important quality attribute that has to be built into any application that is developed using SOA. XML is the underlying technology for Web Service Description Language (WSDL), SOAP protocol and Business Process Execution Language (BPEL). It is highly probable that an attacker could inject malicious information into these XML files to modify the flow of the business process. Further, SOAP was not designed with security in mind, it is possible to tamper the SOAP messages while they are in transit. There exist a number of such potential vulnerabilities which lead to possible security breach in the individual services. In an orchestrated business process, there are possibilities of more vulnerabilities. One of the existing tools namely WS-Attacker is only capable of testing the security of individual web services alone. In spite of the widespread usage of SOA, currently there is limited automatic tool support for testing the security provided by an entire SOA application involving service orchestration. In this context, this paper focuses on designing and implementing a plug-in for WS-Attacker to analyze a few security vulnerabilities present in SOA business processes.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019315
Prashant Manuja, Ravi Saharan
Secret information sharing has been the need of hour. The author exploited the opportunity to enhance the amount of information passed through images and above that asserting its security level on a bigger scale. This enhancement of security can be attributed to the development of a new methodology of random pixel block selection. The information to be passed is embedded by altering the pixel values of R, G and B individually or collectively depending upon the amount of information that has to be embedded. The proposed paper presents a steganography technique by pushing its information holding capacity to an all new level whereas at the same time not compromising with its robustness and reliability. Since change in the pixel value is minute and as per a predetermined rule as proposed by the author, the difference between original and stego image is imperceptible to normal human eye. An additional authentication scheme is also added for stego image.
{"title":"Statistical pixel block selection","authors":"Prashant Manuja, Ravi Saharan","doi":"10.1109/ICACCCT.2014.7019315","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019315","url":null,"abstract":"Secret information sharing has been the need of hour. The author exploited the opportunity to enhance the amount of information passed through images and above that asserting its security level on a bigger scale. This enhancement of security can be attributed to the development of a new methodology of random pixel block selection. The information to be passed is embedded by altering the pixel values of R, G and B individually or collectively depending upon the amount of information that has to be embedded. The proposed paper presents a steganography technique by pushing its information holding capacity to an all new level whereas at the same time not compromising with its robustness and reliability. Since change in the pixel value is minute and as per a predetermined rule as proposed by the author, the difference between original and stego image is imperceptible to normal human eye. An additional authentication scheme is also added for stego image.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019193
A. Sahoo, Amardeep Das, Mayank Tiwary
Firewalls are very important elements in network security. Working of firewall rules for enterprise network has become complex, error-prone and time-consuming. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. The main issue is the slow filtering action during heavy load. To reduce the time consumption there is a very urgent need of optimized firewall engine, which runs on GPU's. We mainly focus on the creating parallel algorithms for desktop firewall which reduces the time consumption and at the same time it can allow for strong threat detection, intrusion detection of incoming packets. In our paper we have created parallel optimized algorithms for intrusion detection, threat detection, packet filtering and network address translation which runs on NVIDIA's GPU card and it is based on CUDA programming. For our experimental analysis, we have created test packets and for virus scanning we have used the virus-signatures from Clam-AV.
{"title":"Firewall engine based on Graphics Processing Unit","authors":"A. Sahoo, Amardeep Das, Mayank Tiwary","doi":"10.1109/ICACCCT.2014.7019193","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019193","url":null,"abstract":"Firewalls are very important elements in network security. Working of firewall rules for enterprise network has become complex, error-prone and time-consuming. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. The main issue is the slow filtering action during heavy load. To reduce the time consumption there is a very urgent need of optimized firewall engine, which runs on GPU's. We mainly focus on the creating parallel algorithms for desktop firewall which reduces the time consumption and at the same time it can allow for strong threat detection, intrusion detection of incoming packets. In our paper we have created parallel optimized algorithms for intrusion detection, threat detection, packet filtering and network address translation which runs on NVIDIA's GPU card and it is based on CUDA programming. For our experimental analysis, we have created test packets and for virus scanning we have used the virus-signatures from Clam-AV.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019395
Chinmayee Sadhu, R. Rane, Nandini Waghmare, A. Patki
Presently, firms in financial services sector like banking and insurance make profits by investing their clients' money in stock markets, the strategies for which are heavily infrastructure dependent and unknown outside the organization. This paper discusses the development of an android application which can be made available directly to the common investors from unorganized sector. The application uses rule based fuzzy logic [1, 2, 3, 4] for analyzing the direction of stock market movement. We report emulation on BlueStacks App Player [5].
{"title":"Android application for stock market prediction by fuzzy logic","authors":"Chinmayee Sadhu, R. Rane, Nandini Waghmare, A. Patki","doi":"10.1109/ICACCCT.2014.7019395","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019395","url":null,"abstract":"Presently, firms in financial services sector like banking and insurance make profits by investing their clients' money in stock markets, the strategies for which are heavily infrastructure dependent and unknown outside the organization. This paper discusses the development of an android application which can be made available directly to the common investors from unorganized sector. The application uses rule based fuzzy logic [1, 2, 3, 4] for analyzing the direction of stock market movement. We report emulation on BlueStacks App Player [5].","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131592546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019168
I. Renuka, C. Bala Subramanian
Distributed sensors deployed in huge numbers in the observant field forming an ad hoc network is called as Wireless Sensor Networks (WSN). The issue of uncertainty of location of a sensor node is called as localization. For identifying the location of a sensor node, a single mobile anchor has been utilized. The path of the mobile anchor is based on SCAN algorithm. Localization with single mobile anchor does not exhibit much accuracy. The data transfer of the gathered information is low. In our paper we propose a mechanism by customizing two mobile anchors in the same observant field. Our proposed method will achieve efficient data transfer rate and optimal localization of all the anchor nodes.
{"title":"Enhanced route planning for mobile anchors in localization of WSN","authors":"I. Renuka, C. Bala Subramanian","doi":"10.1109/ICACCCT.2014.7019168","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019168","url":null,"abstract":"Distributed sensors deployed in huge numbers in the observant field forming an ad hoc network is called as Wireless Sensor Networks (WSN). The issue of uncertainty of location of a sensor node is called as localization. For identifying the location of a sensor node, a single mobile anchor has been utilized. The path of the mobile anchor is based on SCAN algorithm. Localization with single mobile anchor does not exhibit much accuracy. The data transfer of the gathered information is low. In our paper we propose a mechanism by customizing two mobile anchors in the same observant field. Our proposed method will achieve efficient data transfer rate and optimal localization of all the anchor nodes.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019365
S. Bhattacharjee, S. Yadav, S. K. Patra
In recent years Graphics Processing Unit (GPU) has evolved as a high performance data processing technology allowing users to compute large blocks of parallel data using an array of low complexity processors. This paper proposes the implementation of compute intensive portions of 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) physical layer using GPU. LTE employs Orthogonal Frequency Division Multiple Access (OFDMA) in downlink and Single Carrier Frequency Division Multiple Access (SC-FDMA) in uplink. Both these demand computationally complex Inverse Fast Fourier Transform (IFFT) and Fast Fourier Transform (FFT) processing at the transmitter and the receiver. The computational requirements at the base station increases significantly with the increase in number of users. This paper presents a simulation model utilizing the massively parallel architecture of GPU to reduce computation time of IFFT and FFT operations. Simulation results demonstrate that GPU provides a framework for fast data processing in this application.
{"title":"LTE physical layer implementation using GPU based high performance computing","authors":"S. Bhattacharjee, S. Yadav, S. K. Patra","doi":"10.1109/ICACCCT.2014.7019365","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019365","url":null,"abstract":"In recent years Graphics Processing Unit (GPU) has evolved as a high performance data processing technology allowing users to compute large blocks of parallel data using an array of low complexity processors. This paper proposes the implementation of compute intensive portions of 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) physical layer using GPU. LTE employs Orthogonal Frequency Division Multiple Access (OFDMA) in downlink and Single Carrier Frequency Division Multiple Access (SC-FDMA) in uplink. Both these demand computationally complex Inverse Fast Fourier Transform (IFFT) and Fast Fourier Transform (FFT) processing at the transmitter and the receiver. The computational requirements at the base station increases significantly with the increase in number of users. This paper presents a simulation model utilizing the massively parallel architecture of GPU to reduce computation time of IFFT and FFT operations. Simulation results demonstrate that GPU provides a framework for fast data processing in this application.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019169
N. Jagatheesh, P. Muthukumaran, S. Prince
A novel wide band hybrid ring coupler is proposed in this paper. The change in length of transmission line is calculated and it is converted in to equivalent impedance. Impedance of the circuit is varied using variable capacitor. The device is to be fabricated and tested for frequency range 800-1200MHz. The circuit shows improved isolation and return loss. The circuit is reduced by using Koch fractal curve method. The results for both conventional and the reduced Koch hybrid coupler are simulated and the results are compared.
{"title":"Design and implementation of hybrid ring coupler for 800MHz–1200 MHz","authors":"N. Jagatheesh, P. Muthukumaran, S. Prince","doi":"10.1109/ICACCCT.2014.7019169","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019169","url":null,"abstract":"A novel wide band hybrid ring coupler is proposed in this paper. The change in length of transmission line is calculated and it is converted in to equivalent impedance. Impedance of the circuit is varied using variable capacitor. The device is to be fabricated and tested for frequency range 800-1200MHz. The circuit shows improved isolation and return loss. The circuit is reduced by using Koch fractal curve method. The results for both conventional and the reduced Koch hybrid coupler are simulated and the results are compared.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134112090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019227
R. Dhaya, M. Poongodi
Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.
{"title":"Detecting software vulnerabilities in android using static analysis","authors":"R. Dhaya, M. Poongodi","doi":"10.1109/ICACCCT.2014.7019227","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019227","url":null,"abstract":"Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}