It introduces configuration and implementation method of integrated technology between transmission network model and distribution network model for Chinese power grid based on IEC 61970 series standards in this paper. It contains the transmission network model of CIM/E format is extracted from the business system in security zone of production & control, the distribution network model of CIM/XML format is extracted from the business system in security zone of management & information. It gives a method to translate the model format from CIM/E to CIM/XML, and then finish the technology verification. It achieves integrated and completed grid model from high voltage to low voltage at last. All of the above, it provides a technology program to get completed map of power grid.
{"title":"Research on Construction Method of Power Grid Topology Integration Based on IEC 61970 CIM","authors":"Jiran Zhu, Peng Liu, Guoqing Wang, Yiming Lu, Di Zhang, Xianguo Kang, Liming Wang, Sumei Guo","doi":"10.1145/3411016.3411159","DOIUrl":"https://doi.org/10.1145/3411016.3411159","url":null,"abstract":"It introduces configuration and implementation method of integrated technology between transmission network model and distribution network model for Chinese power grid based on IEC 61970 series standards in this paper. It contains the transmission network model of CIM/E format is extracted from the business system in security zone of production & control, the distribution network model of CIM/XML format is extracted from the business system in security zone of management & information. It gives a method to translate the model format from CIM/E to CIM/XML, and then finish the technology verification. It achieves integrated and completed grid model from high voltage to low voltage at last. All of the above, it provides a technology program to get completed map of power grid.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of low traceability accuracy in the existing grain traceability system due to the bulk of the grain, combined with the GTIN coding standard in the GS1 system, a stage traceability code is set for each link of the grain supply chain to achieve positioning to specific links. Aiming at the problems of long length, low security, and confusing expression and format after encryption of existing traceability code, based on the designed stage traceability code, combined with the improved PRESENT encryption algorithm and format-preserving algorithm to encrypt, We obtained a sixteen-digit final traceability code and tested the coding scheme proposed in this paper, The test results show that the proposed scheme is effective and valuable.
{"title":"Design and Implementation of Grain Traceability Code Coding Scheme","authors":"Miaolei Deng, Pan Feng","doi":"10.1145/3411016.3411018","DOIUrl":"https://doi.org/10.1145/3411016.3411018","url":null,"abstract":"Aiming at the problem of low traceability accuracy in the existing grain traceability system due to the bulk of the grain, combined with the GTIN coding standard in the GS1 system, a stage traceability code is set for each link of the grain supply chain to achieve positioning to specific links. Aiming at the problems of long length, low security, and confusing expression and format after encryption of existing traceability code, based on the designed stage traceability code, combined with the improved PRESENT encryption algorithm and format-preserving algorithm to encrypt, We obtained a sixteen-digit final traceability code and tested the coding scheme proposed in this paper, The test results show that the proposed scheme is effective and valuable.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thanks to the growing trend of the sharing economy and the increased need for innovative mobility solutions, the bike sharing sector has gained considerable importance. However, the privacy of the participants is at risk as their user and travel profiles are not only collected and used by bike sharing service providers. In addition, for the bike share provider, problems have arisen due to increased vandalism and theft of the vehicles on offer. Therefore, this experimental study shows why Blockchain could solve this problem by eliminating dependency on third parties and allowing an economical and user-friendly mode of transport between participants directly. As part of this research, we have "staged" the blockchain through service design in the context of bike sharing. Blockchain will only demonstrate its value when integrated into real service experiences. Our main conclusion is that "blockchain staging" is more important than the technological dimension of smart contracts.
{"title":"Staging Blockchain Technology In The Customer's Journey Through Service Design: A Bike-sharing Case Study To Improve Quality And Trust Perception","authors":"Evelyn Durugy, Oussama Darouichi, E. Fragnière","doi":"10.1145/3411016.3411161","DOIUrl":"https://doi.org/10.1145/3411016.3411161","url":null,"abstract":"Thanks to the growing trend of the sharing economy and the increased need for innovative mobility solutions, the bike sharing sector has gained considerable importance. However, the privacy of the participants is at risk as their user and travel profiles are not only collected and used by bike sharing service providers. In addition, for the bike share provider, problems have arisen due to increased vandalism and theft of the vehicles on offer. Therefore, this experimental study shows why Blockchain could solve this problem by eliminating dependency on third parties and allowing an economical and user-friendly mode of transport between participants directly. As part of this research, we have \"staged\" the blockchain through service design in the context of bike sharing. Blockchain will only demonstrate its value when integrated into real service experiences. Our main conclusion is that \"blockchain staging\" is more important than the technological dimension of smart contracts.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In cyber security field, anomaly detection is triggered when detected network data traffic behaves obviously differently from normal data traffic. Traditional approaches typically create or define the normal pattern for the data and compare the normal pattern with the detected object. When a significantly different object appears, it is regarded as abnormal data. This paper proposes a novel neural network structure for anomaly detection, called a metric learning network, which aims to directly learn the differences between abnormal and normal data rather than set up a normal pattern. The network comprises an auto-encoder, which is used to encode the abnormal and normal data, and a metric learning component, which is designed to understand the difference between abnormal and normal data via a comparison approach. A deviation score is produced by the metric learning component to recognize the detected object. Research based on the Modbus/Transmission Control Protocol (TCP) network demonstrates that this approach can not only learn the difference between normal data and outliers, but is suitable for anomaly detection tasks. Our method has greater overall detection rates than a baseline model.
在网络安全领域,当检测到的网络数据流量行为与正常数据流量明显不同时,就会触发异常检测。传统方法通常为数据创建或定义正常模式,并将正常模式与检测到的对象进行比较。当出现明显不同的对象时,将其视为异常数据。本文提出了一种新的用于异常检测的神经网络结构,称为度量学习网络,其目的是直接学习异常和正常数据之间的差异,而不是建立正常模式。该网络包括一个自动编码器,用于对异常和正常数据进行编码,以及一个度量学习组件,旨在通过比较方法理解异常和正常数据之间的差异。度量学习组件产生偏差分数以识别检测到的对象。基于TCP (Modbus/Transmission Control Protocol)网络的研究表明,该方法不仅可以学习到正常数据和离群数据之间的区别,而且适用于异常检测任务。我们的方法比基线模型具有更高的总体检出率。
{"title":"Metric Learning with Neural Network for Modbus/TCP Anomaly Detection","authors":"Haicheng Qu, Jianzhong Zhou, Jitao Qin","doi":"10.1145/3411016.3411160","DOIUrl":"https://doi.org/10.1145/3411016.3411160","url":null,"abstract":"In cyber security field, anomaly detection is triggered when detected network data traffic behaves obviously differently from normal data traffic. Traditional approaches typically create or define the normal pattern for the data and compare the normal pattern with the detected object. When a significantly different object appears, it is regarded as abnormal data. This paper proposes a novel neural network structure for anomaly detection, called a metric learning network, which aims to directly learn the differences between abnormal and normal data rather than set up a normal pattern. The network comprises an auto-encoder, which is used to encode the abnormal and normal data, and a metric learning component, which is designed to understand the difference between abnormal and normal data via a comparison approach. A deviation score is produced by the metric learning component to recognize the detected object. Research based on the Modbus/Transmission Control Protocol (TCP) network demonstrates that this approach can not only learn the difference between normal data and outliers, but is suitable for anomaly detection tasks. Our method has greater overall detection rates than a baseline model.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130491836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The test preparation of flight products determines the length of the entire cycle from flight products entering the launch site to launch. The improvement of test efficiency is beneficial to the launch efficiency of the launch site. According to the test scheduling plan of flight products at the launch site, we propose test scheduling model based on related data-driven optimization and superimpose test elements on the test network schedule diagram. By means of the correlation between test item input, excitation and output response, the optimization strategy of test process was proposed to decompose and shorten the critical path on test network schedule. The strategy shortens the test cycle of flight products. Through practice, integration testing and good results have been obtained.
{"title":"Relativity-Driven Optimization for Test Schedule of Spaceflight Products at Launch Site","authors":"Litian Xiao, Nan Xiao, Mengyuan Li, Shanshan Xie","doi":"10.1145/3411016.3411158","DOIUrl":"https://doi.org/10.1145/3411016.3411158","url":null,"abstract":"The test preparation of flight products determines the length of the entire cycle from flight products entering the launch site to launch. The improvement of test efficiency is beneficial to the launch efficiency of the launch site. According to the test scheduling plan of flight products at the launch site, we propose test scheduling model based on related data-driven optimization and superimpose test elements on the test network schedule diagram. By means of the correlation between test item input, excitation and output response, the optimization strategy of test process was proposed to decompose and shorten the critical path on test network schedule. The strategy shortens the test cycle of flight products. Through practice, integration testing and good results have been obtained.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dealing with imbalanced data has always been a great challenge in statistical learning. In classification problems, instances for different classes are unequal in an imbalanced dataset. Therefore, traditional machine learning classification algorithms are usually sensitive to this imbalance both in the training and inference processes. In this paper, by addressing the class imbalance on the basis of Focal Loss, we introduce an approach to improve the performance of convolutional neural networks (CNNs) on the multi-label image classification with an extremely imbalanced dataset. As focal loss puts more focus on hard and misclassified examples when comparing with classic cross-entropy loss, our results demonstrate that such loss function indeed achieves a significant improvement of CNN models (ResNet-50, ResNet-101, and SE-ResNeXt-101) regarding the mean F2 scores on the test set.
{"title":"Focal Loss Improves the Model Performance on Multi-Label Image Classifications with Imbalanced Data","authors":"Jianxiang Dong","doi":"10.1145/3411016.3411020","DOIUrl":"https://doi.org/10.1145/3411016.3411020","url":null,"abstract":"Dealing with imbalanced data has always been a great challenge in statistical learning. In classification problems, instances for different classes are unequal in an imbalanced dataset. Therefore, traditional machine learning classification algorithms are usually sensitive to this imbalance both in the training and inference processes. In this paper, by addressing the class imbalance on the basis of Focal Loss, we introduce an approach to improve the performance of convolutional neural networks (CNNs) on the multi-label image classification with an extremely imbalanced dataset. As focal loss puts more focus on hard and misclassified examples when comparing with classic cross-entropy loss, our results demonstrate that such loss function indeed achieves a significant improvement of CNN models (ResNet-50, ResNet-101, and SE-ResNeXt-101) regarding the mean F2 scores on the test set.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
On the basis of making full use of the rich color information of color images, an edge detection method based on entropy operator in 1αβ space is proposed. In the color image space of 1αβ with the least correlation, the two-threshold method based on Shiozaki entropy operator is adopted to extract the edge of color image, which can effectively detect the edge of the region with little change in brightness, chroma or the region with dark light, and obtain rich edge information.
{"title":"A color image edge detection method based on entropy operator","authors":"Wang Na","doi":"10.1145/3411016.3411022","DOIUrl":"https://doi.org/10.1145/3411016.3411022","url":null,"abstract":"On the basis of making full use of the rich color information of color images, an edge detection method based on entropy operator in 1αβ space is proposed. In the color image space of 1αβ with the least correlation, the two-threshold method based on Shiozaki entropy operator is adopted to extract the edge of color image, which can effectively detect the edge of the region with little change in brightness, chroma or the region with dark light, and obtain rich edge information.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naixi Liu, Jingcai Liu, Linming Gong, Xingxing Jia, Daoshun Wang
Image steganography is one of the secure methods of information communication. Based on deep learning, the steganography models have obtained better performance than those based on handcraft features, but they can not ensure absolute correctness when extracting bit message. To improve extracting accuracy, we propose a new redundant embedding method. Also, to improve robustness and security against steganalysis, we introduce generative adversarial training into our model. From the experimental results, our proposed methods reduce the extracting inaccuracy significantly while maintaining the capability of resisting steganalysis attack. What's more, our proposed methods can be easily generalized to cover images with different size and embedding capacity of different bit message length. Therefore, the proposed model can have a wider application in real use.
{"title":"Convolutional Network for Image Steganography With Redundant Embedding","authors":"Naixi Liu, Jingcai Liu, Linming Gong, Xingxing Jia, Daoshun Wang","doi":"10.1145/3411016.3411026","DOIUrl":"https://doi.org/10.1145/3411016.3411026","url":null,"abstract":"Image steganography is one of the secure methods of information communication. Based on deep learning, the steganography models have obtained better performance than those based on handcraft features, but they can not ensure absolute correctness when extracting bit message. To improve extracting accuracy, we propose a new redundant embedding method. Also, to improve robustness and security against steganalysis, we introduce generative adversarial training into our model. From the experimental results, our proposed methods reduce the extracting inaccuracy significantly while maintaining the capability of resisting steganalysis attack. What's more, our proposed methods can be easily generalized to cover images with different size and embedding capacity of different bit message length. Therefore, the proposed model can have a wider application in real use.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to the characteristics of the localized operating system, the network system division is analyzed and the network protocol test method is proposed. Two methods are used to verify its function and performance, i.e. to check the test data of communication transmission rate through the TCP mode and UDP mode in hub and direct connection environment, and to check the test data of communication transmission rate between different system on the same machine. The dynamic test covers throughput test, packet loss rate test and delay test. The experimental results show that these two methods can ensure the correctness of the network test function and performance of the localized operating system, and meet the relevant network speed test requirements.
{"title":"Research on network test technology of localized operating system","authors":"Yingbei Niu","doi":"10.1145/3411016.3411024","DOIUrl":"https://doi.org/10.1145/3411016.3411024","url":null,"abstract":"According to the characteristics of the localized operating system, the network system division is analyzed and the network protocol test method is proposed. Two methods are used to verify its function and performance, i.e. to check the test data of communication transmission rate through the TCP mode and UDP mode in hub and direct connection environment, and to check the test data of communication transmission rate between different system on the same machine. The dynamic test covers throughput test, packet loss rate test and delay test. The experimental results show that these two methods can ensure the correctness of the network test function and performance of the localized operating system, and meet the relevant network speed test requirements.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of containers in the informatics industry is increasing rapidly day by day. Although containers have many advantages, such as flexibility, readiness, easy configurability, scalability and low resource consumption, previous researches showed that there are momentous decrements in network performance in containerized cluster environments. Yielded packet sizes and data transfer methods play important roles in the network performance for the networking solutions used in container clusters. As different applications apply different packet sizes and transfer methods, it is of the essence to find and use the best performing networking solution according to application needs. Hence, it is quite important to identify the most convenient container networking solution, especially in production environments. This research analyzed the throughput and latency at varying message sizes on bulk and HTTP-like data transfer methods for container cluster networking solutions, which are Libnetwork, Flannel, Calico, Weave and Open Virtual Networking for Open vSwitch. Furthermore, it compared the performance of cluster networking solutions with a native host. As a result of the experiments, Open Virtual Networking for Open vSwitch and Calico were found to be the most adequate solutions for production environments with the highest throughput and minimum latency values depending on selected message sizes and transfer methods. In addition, a bare-metal host generally outperforms all the container networking solutions except HTTP-like transfer throughput results at a large message size. Hence, this study also demonstrates the offloading impact in container networking solutions.
容器在信息产业中的应用日益迅速。尽管容器具有许多优点,如灵活性、就绪性、易配置性、可扩展性和低资源消耗,但先前的研究表明,在容器化集群环境中,网络性能会有很大的下降。生成的数据包大小和数据传输方法在容器集群中使用的网络解决方案的网络性能中起着重要作用。由于不同的应用程序采用不同的数据包大小和传输方式,因此根据应用程序的需要找到并使用性能最佳的网络解决方案至关重要。因此,确定最方便的容器网络解决方案非常重要,尤其是在生产环境中。本研究分析了容器集群网络解决方案(Libnetwork, Flannel, Calico, Weave和Open Virtual networking for Open vSwitch)的批量和类http数据传输方法在不同消息大小下的吞吐量和延迟。此外,还比较了集群网络解决方案与本机主机的性能。作为实验的结果,Open vSwitch和Calico的Open Virtual Networking被发现是最适合生产环境的解决方案,具有最高的吞吐量和最小的延迟值,具体取决于所选的消息大小和传输方法。此外,裸机主机通常优于所有容器网络解决方案,除了在大消息大小时类似http的传输吞吐量结果。因此,本研究也证明了卸载对容器网络解决方案的影响。
{"title":"A Performance Analysis of Container Cluster Networking Alternatives","authors":"Gulsum Atici, Pinar Sarisaray Boluk","doi":"10.1145/3411016.3411019","DOIUrl":"https://doi.org/10.1145/3411016.3411019","url":null,"abstract":"The use of containers in the informatics industry is increasing rapidly day by day. Although containers have many advantages, such as flexibility, readiness, easy configurability, scalability and low resource consumption, previous researches showed that there are momentous decrements in network performance in containerized cluster environments. Yielded packet sizes and data transfer methods play important roles in the network performance for the networking solutions used in container clusters. As different applications apply different packet sizes and transfer methods, it is of the essence to find and use the best performing networking solution according to application needs. Hence, it is quite important to identify the most convenient container networking solution, especially in production environments. This research analyzed the throughput and latency at varying message sizes on bulk and HTTP-like data transfer methods for container cluster networking solutions, which are Libnetwork, Flannel, Calico, Weave and Open Virtual Networking for Open vSwitch. Furthermore, it compared the performance of cluster networking solutions with a native host. As a result of the experiments, Open Virtual Networking for Open vSwitch and Calico were found to be the most adequate solutions for production environments with the highest throughput and minimum latency values depending on selected message sizes and transfer methods. In addition, a bare-metal host generally outperforms all the container networking solutions except HTTP-like transfer throughput results at a large message size. Hence, this study also demonstrates the offloading impact in container networking solutions.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}