In an era of mobile internet and big data, how to make the data access more efficient is worth researching because the mobile computing environments have some limitations such as the narrow bandwidth, the frequent disconnections of network and so on. To improve the response time of query, a good cache system is of vital importance. Besides, a good cache consistency method is essential to ensure the correctness. In this paper, a semantic cache supporting version-based consistency is proposed. This cache mainly have two advantages. On one hand, it can obviously improve the response time of query and the hit ratio of the cache. On the other hand, the version-based consistency enhances the stability of the system especially in high-concurrency situations. Several experiments has been carried out and the results are presented to show the performance of the cache.
{"title":"Toward a Semantic Cache Supporting Version-Based Consistency","authors":"Zhe Yang, Kun Ma, Jialin Zhong","doi":"10.1109/CISIS.2016.130","DOIUrl":"https://doi.org/10.1109/CISIS.2016.130","url":null,"abstract":"In an era of mobile internet and big data, how to make the data access more efficient is worth researching because the mobile computing environments have some limitations such as the narrow bandwidth, the frequent disconnections of network and so on. To improve the response time of query, a good cache system is of vital importance. Besides, a good cache consistency method is essential to ensure the correctness. In this paper, a semantic cache supporting version-based consistency is proposed. This cache mainly have two advantages. On one hand, it can obviously improve the response time of query and the hit ratio of the cache. On the other hand, the version-based consistency enhances the stability of the system especially in high-concurrency situations. Several experiments has been carried out and the results are presented to show the performance of the cache.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134422858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair "t, op" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.
{"title":"Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems","authors":"Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/CISIS.2016.122","DOIUrl":"https://doi.org/10.1109/CISIS.2016.122","url":null,"abstract":"A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair \"t, op\" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Liu, Shinji Sakamoto, L. Barolli, Evjola Spaho, Makoto Ikeda, F. Xhafa
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based systems (called FPRS1 and FPRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between the fuzzy-based reliability systems. Comparing the complexity of FPRS1 and FPRS2, the FPRS2 is more complex than FPRS1. However, it considers also the sustained communication time which makes the platform more reliable.
{"title":"Effects of Sustained Communication Time on Reliability of JXTA-Overlay P2P Platform: A Comparison Study for Two Fuzzy-Based Systems","authors":"Yi Liu, Shinji Sakamoto, L. Barolli, Evjola Spaho, Makoto Ikeda, F. Xhafa","doi":"10.1109/CISIS.2016.56","DOIUrl":"https://doi.org/10.1109/CISIS.2016.56","url":null,"abstract":"In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based systems (called FPRS1 and FPRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between the fuzzy-based reliability systems. Comparing the complexity of FPRS1 and FPRS2, the FPRS2 is more complex than FPRS1. However, it considers also the sustained communication time which makes the platform more reliable.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ishida, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita
Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems exist for individuals to solve problems of processing time and immediacy. However, problems of storage capacity exist in such systems. This research presents a deduplication technique of block data to solve problems of storage capacity. By incorporating this into the system, we aim at storage capacity reduction of backup data.
{"title":"Development of Distributed Backup System among Individuals by Introducing Deduplication","authors":"H. Ishida, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita","doi":"10.1109/CISIS.2016.78","DOIUrl":"https://doi.org/10.1109/CISIS.2016.78","url":null,"abstract":"Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems exist for individuals to solve problems of processing time and immediacy. However, problems of storage capacity exist in such systems. This research presents a deduplication technique of block data to solve problems of storage capacity. By incorporating this into the system, we aim at storage capacity reduction of backup data.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Optical pulse wave propagation in nonlinear and dispersive medium is simulated by constrained interpolated profile (CIP) method. In one dimensional space with dispersion and nonlinearity, Gaussian envelope pulse modulated by optical carrier wave propagates successfully with physically reliable manner for typical small and large amplitudes. The spreading and compressing behavior for small and large input amplitudes are caused by trade-off between linear dispersion and nonlinear refractive index modulation of the medium.
{"title":"Simulation of Optical Pulse Propagation in Nonlinear and Dispersive Medium by Constrained Interpolated Profile Method","authors":"H. Maeda, M. Čada, Jianming Jin, Kazuya Tomiura","doi":"10.1109/CISIS.2016.88","DOIUrl":"https://doi.org/10.1109/CISIS.2016.88","url":null,"abstract":"Optical pulse wave propagation in nonlinear and dispersive medium is simulated by constrained interpolated profile (CIP) method. In one dimensional space with dispersion and nonlinearity, Gaussian envelope pulse modulated by optical carrier wave propagates successfully with physically reliable manner for typical small and large amplitudes. The spreading and compressing behavior for small and large input amplitudes are caused by trade-off between linear dispersion and nonlinear refractive index modulation of the medium.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116140481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wearable robots recently become a hopeful technology for support and assist of human activity in many fields. A major issue discussed in this research field to this date is limb mobility of a person wearing a wearable robot. It is considered that the mobility receives influence from factors such as alignment of a wearable robot mechanism on human limbs, control of the robot, mechanical design of the mechanism etc. This paper considers two mechanical designs of the mechanism for motion support of a human elbow joint, and compare those mobility based on relative motion between a human arm and the mechanism, under an assumption that the mechanism does not receive special care for its alignment on a human arm. The comparison of the mobility obtained from measured data of persons wearing the mechanism does not statistically exhibit significant difference between the mechanical designs, however, it also brings up some issues for future study.
{"title":"A Study on Evaluating Wearing Mobility of Wearable Robot Mechanisms","authors":"T. Morizono, Shuhei Oda, Takashi Motomura, Kazuya Sakamoto, Shutaro Takeshita, Hiroyuki Matsubara","doi":"10.1109/CISIS.2016.85","DOIUrl":"https://doi.org/10.1109/CISIS.2016.85","url":null,"abstract":"Wearable robots recently become a hopeful technology for support and assist of human activity in many fields. A major issue discussed in this research field to this date is limb mobility of a person wearing a wearable robot. It is considered that the mobility receives influence from factors such as alignment of a wearable robot mechanism on human limbs, control of the robot, mechanical design of the mechanism etc. This paper considers two mechanical designs of the mechanism for motion support of a human elbow joint, and compare those mobility based on relative motion between a human arm and the mechanism, under an assumption that the mechanism does not receive special care for its alignment on a human arm. The comparison of the mobility obtained from measured data of persons wearing the mechanism does not statistically exhibit significant difference between the mechanical designs, however, it also brings up some issues for future study.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116230364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, people with lifestyle-related diseases are increasing, because of lack of exercise, overeating, stress and smoking. With this situation, applications of Personal Computer (PC) or smart phone which support healthy life are widespread. Turning to the system dealing with meal information, there are two type systems. One is that meal records are inputted by hand and managed as meal logs. Another one is that a meal image is shot by a smart phone, and meal contents are recorded by image recognition. However, these systems need a lot of time for inputting of meal contents or shooting of meal images. Therefore, it is difficult to continue use. Moreover, the second system has a problem for accuracy of image recognition. In this paper, to solve these problems, we propose a meal information collection system which uses IoT wireless tags. An IoT wireless tag is corresponded to a meal and the system can automatically get meal information such as meal contents, meal sequence, meal time and so on. We implemented the meal information collection system which aims automatic collection and getting of various information which do not get at other systems. From the evaluation results of collection accuracy and comparison with conventional systems, we verified effectiveness of the proposed system.
{"title":"Design and Implementation of Meal Information Collection System Using IoT Wireless Tags","authors":"Kohei Kaiya, A. Koyama","doi":"10.1109/CISIS.2016.66","DOIUrl":"https://doi.org/10.1109/CISIS.2016.66","url":null,"abstract":"In recent years, people with lifestyle-related diseases are increasing, because of lack of exercise, overeating, stress and smoking. With this situation, applications of Personal Computer (PC) or smart phone which support healthy life are widespread. Turning to the system dealing with meal information, there are two type systems. One is that meal records are inputted by hand and managed as meal logs. Another one is that a meal image is shot by a smart phone, and meal contents are recorded by image recognition. However, these systems need a lot of time for inputting of meal contents or shooting of meal images. Therefore, it is difficult to continue use. Moreover, the second system has a problem for accuracy of image recognition. In this paper, to solve these problems, we propose a meal information collection system which uses IoT wireless tags. An IoT wireless tag is corresponded to a meal and the system can automatically get meal information such as meal contents, meal sequence, meal time and so on. We implemented the meal information collection system which aims automatic collection and getting of various information which do not get at other systems. From the evaluation results of collection accuracy and comparison with conventional systems, we verified effectiveness of the proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129274179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching module. Business-logic module includes user-defined command rule files and a rule file parsing program. The grammar of user-defined command rule is concise and easy. The rule file parsing program parses rule files into command tree which is disposed in the memory. Command-matching module consists of user commands handling program and command tokens matching program. The former program divides user commands into command tokens. The latter program matches command tokens with command tree to locate the command handling function. We present the design of such a parser using ECPM and apply it to new network devices. The result shows that the ECPM improves the variability, extensibility and flexibility of network devices parsing system.
{"title":"Extensible Command Parsing Method for Network Device","authors":"Ning Li, Lingcui Zhang, Qiaoduo Zhang, Fenghua Li","doi":"10.1109/CISIS.2016.62","DOIUrl":"https://doi.org/10.1109/CISIS.2016.62","url":null,"abstract":"Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching module. Business-logic module includes user-defined command rule files and a rule file parsing program. The grammar of user-defined command rule is concise and easy. The rule file parsing program parses rule files into command tree which is disposed in the memory. Command-matching module consists of user commands handling program and command tokens matching program. The former program divides user commands into command tokens. The latter program matches command tokens with command tree to locate the command handling function. We present the design of such a parser using ECPM and apply it to new network devices. The result shows that the ECPM improves the variability, extensibility and flexibility of network devices parsing system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130208340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The adoption of Cloud computing involves many advantages in terms of flexibility, scalability and reliability, but also implies new challenges on security, data privacy and protection of personal data. Since more and more sensitive applications and data are moved to the cloud, the verification of the digital identity of the participants in the electronic communication has become a crucial challenge. Currently, the use of biometric techniques can be considered as an effective solution to ensure a significant increase of security in the authentication protocols managed by modern authentication servers. However the use of biometric data for the logical access to IT services is a more challenging and still unsolved problem. The project Cloud for SME integrates a biometric authentication based on fingerprints with a cloud computing platform, investigating how highly secure authentication methods can increase the adoption of cloud computing technologies among small and medium enterprises.
{"title":"Accessing Cloud Services through Biometrics Authentication","authors":"P. Ruiu, G. Caragnano, G. Masala, E. Grosso","doi":"10.1109/CISIS.2016.76","DOIUrl":"https://doi.org/10.1109/CISIS.2016.76","url":null,"abstract":"The adoption of Cloud computing involves many advantages in terms of flexibility, scalability and reliability, but also implies new challenges on security, data privacy and protection of personal data. Since more and more sensitive applications and data are moved to the cloud, the verification of the digital identity of the participants in the electronic communication has become a crucial challenge. Currently, the use of biometric techniques can be considered as an effective solution to ensure a significant increase of security in the authentication protocols managed by modern authentication servers. However the use of biometric data for the logical access to IT services is a more challenging and still unsolved problem. The project Cloud for SME integrates a biometric authentication based on fingerprints with a cloud computing platform, investigating how highly secure authentication methods can increase the adoption of cloud computing technologies among small and medium enterprises.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125683850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed autonomous elements like sensors networks, intelligent devices etc. are nowadays widely used. Here, one of the most difficult task is the automatic re-planning when something goes wrong: new planning algorithms have to be coped with existing ones in order to fulfill performance and soundness requirements. In this work we present a modelling methodology and a planning technique based on multi-agent models. The planning methodology exploits both classical and a new counter-example based approaches in order to build an effective multi-expert system able to face with increasing complexity of these systems, implementing procedures that make possible the reaching of desired goals within temporal constraints.
{"title":"An Agent-Based Model for Autonomous Planning","authors":"F. Amato, Francesco Moscato","doi":"10.1109/CISIS.2016.135","DOIUrl":"https://doi.org/10.1109/CISIS.2016.135","url":null,"abstract":"Distributed autonomous elements like sensors networks, intelligent devices etc. are nowadays widely used. Here, one of the most difficult task is the automatic re-planning when something goes wrong: new planning algorithms have to be coped with existing ones in order to fulfill performance and soundness requirements. In this work we present a modelling methodology and a planning technique based on multi-agent models. The planning methodology exploits both classical and a new counter-example based approaches in order to build an effective multi-expert system able to face with increasing complexity of these systems, implementing procedures that make possible the reaching of desired goals within temporal constraints.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"61 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}