Wenrui Li, Zhongxue Yang, Pengcheng Zhang, Zhijian Wang
Analyzing the composite service by manual is rather difficult and time-consuming. In the paper, we propose an approach to automatically verify the correctness of composite services by model checking based on a novel property specification universal Modal Sequence Diagrams(uMSDs). Because uMSDs can find a well-balance between simplicity of use and expressive power, the temporal properties of the composite service can be specified by uMSDs in an easy and intuitive way. Based on the formal syntax and semantics of uMSDs, a novel model checking approach is proposed to verify whether the model of WS-BPEL specification satisfies the properties represented by uMSDs. Finally, a series of experiments show the approach can effectively detect the logical errors in an On-the-Job Assistant case study.
{"title":"Model Checking WS-BPEL with Universal Modal Sequence Diagrams","authors":"Wenrui Li, Zhongxue Yang, Pengcheng Zhang, Zhijian Wang","doi":"10.1109/ICIS.2011.58","DOIUrl":"https://doi.org/10.1109/ICIS.2011.58","url":null,"abstract":"Analyzing the composite service by manual is rather difficult and time-consuming. In the paper, we propose an approach to automatically verify the correctness of composite services by model checking based on a novel property specification universal Modal Sequence Diagrams(uMSDs). Because uMSDs can find a well-balance between simplicity of use and expressive power, the temporal properties of the composite service can be specified by uMSDs in an easy and intuitive way. Based on the formal syntax and semantics of uMSDs, a novel model checking approach is proposed to verify whether the model of WS-BPEL specification satisfies the properties represented by uMSDs. Finally, a series of experiments show the approach can effectively detect the logical errors in an On-the-Job Assistant case study.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122095567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multipath based routing and switching can achieve network-wide load balancing and reduce the port contentions of switching devices. From this point of view, in this paper, after analyzing the feasibility of implementing multinext-hop in core switching networks comprehensively, it comes up with a switching scheme called MXRS (Multi-next-hop Rerouting Switch) which supports multi-next-hop dynamical rerouting. The MXRS scheme implements dynamical re-routing internal the switches according to congestion status to achieve real-time load balancing, and it can provide various traffic with different routing paths based on their QoS requirements. Theoretical analysis and simulation results show that switches equipped with MXRS can provide both good delay and throughput performance, and can reduce port contentions significantly.
{"title":"Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme","authors":"Hongchang Chen, Hong-chao Hu, P. Yi, Shuqiao Chen","doi":"10.1109/ICIS.2011.14","DOIUrl":"https://doi.org/10.1109/ICIS.2011.14","url":null,"abstract":"Multipath based routing and switching can achieve network-wide load balancing and reduce the port contentions of switching devices. From this point of view, in this paper, after analyzing the feasibility of implementing multinext-hop in core switching networks comprehensively, it comes up with a switching scheme called MXRS (Multi-next-hop Rerouting Switch) which supports multi-next-hop dynamical rerouting. The MXRS scheme implements dynamical re-routing internal the switches according to congestion status to achieve real-time load balancing, and it can provide various traffic with different routing paths based on their QoS requirements. Theoretical analysis and simulation results show that switches equipped with MXRS can provide both good delay and throughput performance, and can reduce port contentions significantly.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129041615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ecotourism and e-tourism are both perceived as the overwhelming trend for today¡¦s tourism industry, and share some common features on both demand and supply sides, which lays the foundation for the feasibility of the application of e-tourism to ecotourism. The objective of this paper is to identify the critical issues of integration between them two through the empirical analysis of Ecuadorian Galapagos, which is generally accepted as an exemplary demonstration for ecotourism initiatives in the world. A total number of eighty-six websites concerning tourism in Galapagos are found and categorized into three types in terms of their hosts or affiliations, namely, tourism companies, governments and non-governmental organizations and professional tourism websites. As the focus of this study, the seventy-two websites belonging to tourism companies are examined in great depth, from aspects of inclusion of travel information, customer relationship management, online transaction and advocacy of ecotourism. As the findings show, these website have made good use of the sound environment and unique resources of Galapagos to boost their business, and have done well in information provision and customer relationship management, but still have considerable room for improvement in advocating ecotourism or responsible travel through online environmental education and visitor management. Finally, a few recommendations are proposed accordingly.
{"title":"Embracement of E-Tourism in Ecotourism: A Case Study of Tourism Websites for Galapagos","authors":"Meng Zhang, Wei Yu, Jun Yuan","doi":"10.1109/ICIS.2011.33","DOIUrl":"https://doi.org/10.1109/ICIS.2011.33","url":null,"abstract":"Ecotourism and e-tourism are both perceived as the overwhelming trend for today¡¦s tourism industry, and share some common features on both demand and supply sides, which lays the foundation for the feasibility of the application of e-tourism to ecotourism. The objective of this paper is to identify the critical issues of integration between them two through the empirical analysis of Ecuadorian Galapagos, which is generally accepted as an exemplary demonstration for ecotourism initiatives in the world. A total number of eighty-six websites concerning tourism in Galapagos are found and categorized into three types in terms of their hosts or affiliations, namely, tourism companies, governments and non-governmental organizations and professional tourism websites. As the focus of this study, the seventy-two websites belonging to tourism companies are examined in great depth, from aspects of inclusion of travel information, customer relationship management, online transaction and advocacy of ecotourism. As the findings show, these website have made good use of the sound environment and unique resources of Galapagos to boost their business, and have done well in information provision and customer relationship management, but still have considerable room for improvement in advocating ecotourism or responsible travel through online environmental education and visitor management. Finally, a few recommendations are proposed accordingly.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"173 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131544830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of malware over the Internet, generating their signatures for detecting via anti-virus (AV) scan engines becomes an important reactive security function. However, AV security products consume much of the PC memory and resources due to their large signature files. AV cloud computing becomes a popular solution for this problem. In this paper, a novel automatic malware signature discovery system for AV cloud (AMSDS) is proposed to generate malware signatures from both static and dynamic aspects. Our experiment on millions-scale samples indicates that AMSDS outperforms most automatic signature generation techniques of both industry and academia. The detection model of malware signature can provides research thinking for anti-virus technology to improve and enhance, especially on detecting and preventing unknown viruses or malware signature.
{"title":"Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing","authors":"Lihua Wu, Yu Zhang","doi":"10.1109/ICIS.2011.73","DOIUrl":"https://doi.org/10.1109/ICIS.2011.73","url":null,"abstract":"Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of malware over the Internet, generating their signatures for detecting via anti-virus (AV) scan engines becomes an important reactive security function. However, AV security products consume much of the PC memory and resources due to their large signature files. AV cloud computing becomes a popular solution for this problem. In this paper, a novel automatic malware signature discovery system for AV cloud (AMSDS) is proposed to generate malware signatures from both static and dynamic aspects. Our experiment on millions-scale samples indicates that AMSDS outperforms most automatic signature generation techniques of both industry and academia. The detection model of malware signature can provides research thinking for anti-virus technology to improve and enhance, especially on detecting and preventing unknown viruses or malware signature.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124552162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erbo Zhao, Shijie Jiang, Dan Luo, Yun Bao, Zhangang Han
Scaling exponent is used widely to measure the long-rang correlation of time series. The most typical original methods are Re-scale Range Analysis (R/S) and Detrended Fluctuation Analysis (DFA), both of which aim to calculate an effective exponent to characterize the given time series, but the latter is more effective to non-stationary series. In this paper, we firstly compare some typical series and find that when Hurst exponents are greater than 0.9, DFA is a better method to distinguish the two series with exponents of small difference in that range where non-stationary most likely exists. This is useful in solving the important open problem of telling whether the real financial data are Brownian motions. Furthermore, we reset the empirical series from stock market according to different time interval and employ the Binary Logistic Regression to estimate the prediction degree of the reset series with different exponents. Results prove that the model's predicting accuracy is significant when scaling exponent is beyond ± 0.1 deviation from 0.5, especially far less than 0.4 with non-stationary trait in raw series, showing the condition when predicting models should be introduced.
尺度指数被广泛用于度量时间序列的长程相关性。最典型的原始方法是重标度极差分析(Re-scale Range Analysis, R/S)和去趋势波动分析(Detrended Fluctuation Analysis, DFA),它们的目的都是计算一个有效指数来表征给定的时间序列,但后者对非平稳序列更有效。在本文中,我们首先比较了一些典型的序列,发现当Hurst指数大于0.9时,在最可能存在非平稳的范围内,DFA是区分指数差较小的两个序列的较好方法。这有助于解决一个重要的公开问题,即判断真实的金融数据是否属于布朗运动。此外,我们根据不同的时间间隔对股票市场的经验序列进行重置,并利用二元Logistic回归估计不同指数的重置序列的预测程度。结果表明,当尺度指数与0.5的偏差大于±0.1时,模型的预测精度是显著的,特别是在原始序列中具有非平稳特征的情况下,模型的预测精度远小于0.4,表明了应该引入预测模型的条件。
{"title":"Scaling Behavior of Time Series and an Empirical Indication to Financial Prediction","authors":"Erbo Zhao, Shijie Jiang, Dan Luo, Yun Bao, Zhangang Han","doi":"10.1109/ICIS.2011.28","DOIUrl":"https://doi.org/10.1109/ICIS.2011.28","url":null,"abstract":"Scaling exponent is used widely to measure the long-rang correlation of time series. The most typical original methods are Re-scale Range Analysis (R/S) and Detrended Fluctuation Analysis (DFA), both of which aim to calculate an effective exponent to characterize the given time series, but the latter is more effective to non-stationary series. In this paper, we firstly compare some typical series and find that when Hurst exponents are greater than 0.9, DFA is a better method to distinguish the two series with exponents of small difference in that range where non-stationary most likely exists. This is useful in solving the important open problem of telling whether the real financial data are Brownian motions. Furthermore, we reset the empirical series from stock market according to different time interval and employ the Binary Logistic Regression to estimate the prediction degree of the reset series with different exponents. Results prove that the model's predicting accuracy is significant when scaling exponent is beyond ± 0.1 deviation from 0.5, especially far less than 0.4 with non-stationary trait in raw series, showing the condition when predicting models should be introduced.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since recording technology has become more robust and easier to use, more and more universities are taking the opportunity to record their lectures and put them on the Web in order to make them accessable by students. The automatic speech recognition (ASR) techniques provide a valueable source for indexing and retrieval of lecture video materials. In this paper, we evaluate the state-of-the-art speech recognition software to find a solution for the automatic transcription of German lecture videos. Our experimental results show that the word error rates (WERs) was reduced by 12.8% when the speech training corpus of a lecturer is increased by 1.6 hours.
{"title":"German Speech Recognition: A Solution for the Analysis and Processing of Lecture Recordings","authors":"Haojin Yang, Christoph Oehlke, C. Meinel","doi":"10.1109/ICIS.2011.38","DOIUrl":"https://doi.org/10.1109/ICIS.2011.38","url":null,"abstract":"Since recording technology has become more robust and easier to use, more and more universities are taking the opportunity to record their lectures and put them on the Web in order to make them accessable by students. The automatic speech recognition (ASR) techniques provide a valueable source for indexing and retrieval of lecture video materials. In this paper, we evaluate the state-of-the-art speech recognition software to find a solution for the automatic transcription of German lecture videos. Our experimental results show that the word error rates (WERs) was reduced by 12.8% when the speech training corpus of a lecturer is increased by 1.6 hours.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given a distributed computation and a predicate, detection of the predicate in textit{Definitely} modality means checking whether in every path from the least state to the greatest state in the state space generated from the computation, which is a distributive lattice, there exists a state satisfying the predicate. The regular predicate is a class of predicates. All the states satisfying the predicate form a sub lattice of state space. Detection of a regular predicate in textit{Definitely} modality is proved to be coNP-complete. In this paper, we study a special kind of state spaces, the whole space, in which all states of the computation are consistent. We propose two polynomial algorithms for detection of regular predicates in textit{Definitely} modality in a whole space.
{"title":"Detection of Regular Predicates in a Whole Space in Distributed Computation","authors":"Hongtao Huang","doi":"10.1109/ICIS.2011.30","DOIUrl":"https://doi.org/10.1109/ICIS.2011.30","url":null,"abstract":"Given a distributed computation and a predicate, detection of the predicate in textit{Definitely} modality means checking whether in every path from the least state to the greatest state in the state space generated from the computation, which is a distributive lattice, there exists a state satisfying the predicate. The regular predicate is a class of predicates. All the states satisfying the predicate form a sub lattice of state space. Detection of a regular predicate in textit{Definitely} modality is proved to be coNP-complete. In this paper, we study a special kind of state spaces, the whole space, in which all states of the computation are consistent. We propose two polynomial algorithms for detection of regular predicates in textit{Definitely} modality in a whole space.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Effective destination management and marketing is fundamental to the creation of a successful tourism destination. Tourism destination industry can be seen as one of the first business sectors where business functions are almost exclusively using information and Communications Technologies (ICTs). The method of promoting regions through the development of provincial or regional tourist destination websites or portals using Internet technologies is increasingly being adopted both in China and around the world. In this work, we conducted a literature review on information and communication technologies (ICTs) used in destination management and marketing in China and found that ICT applications are mainly used at low-medium levels and there is lacking of an integrated application suite for this industry, similar to the situation existing in other developing countries. The survey also demonstrated a trend toward Chinese tourism destination which might extend beyond the tourism industry scene in the mainland China and facilitate the robust ICTs base needed for competing in the global tourism economy.
{"title":"Information and Communication Technologies in Destination Management and Marketing: The China Scene","authors":"Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou","doi":"10.1109/ICIS.2011.66","DOIUrl":"https://doi.org/10.1109/ICIS.2011.66","url":null,"abstract":"Effective destination management and marketing is fundamental to the creation of a successful tourism destination. Tourism destination industry can be seen as one of the first business sectors where business functions are almost exclusively using information and Communications Technologies (ICTs). The method of promoting regions through the development of provincial or regional tourist destination websites or portals using Internet technologies is increasingly being adopted both in China and around the world. In this work, we conducted a literature review on information and communication technologies (ICTs) used in destination management and marketing in China and found that ICT applications are mainly used at low-medium levels and there is lacking of an integrated application suite for this industry, similar to the situation existing in other developing countries. The survey also demonstrated a trend toward Chinese tourism destination which might extend beyond the tourism industry scene in the mainland China and facilitate the robust ICTs base needed for competing in the global tourism economy.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130254310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growing need of integration and sharing of spatial data located in different places on the network, distributed spatial database technology has become a hot research field. Meanwhile, spatial information security, especially access control, has attracted more and more attention in practice. Access control for distributed spatial databases has two challenges: realization of fine-grained and spatially aware access control, check access requests against authorization information and make access decision. The general methods to meet these challenges are fairly complicated and difficult to accomplish. Therefore, we propose using views to implement access control functionality for distributed spatial database, whose P2P architecture is firstly described. Then we discuss the definition and authorization of distributed views and their management. Finally, we put forward the reference framework and explain the control procedure.
{"title":"Geospatially-Aware Access Control for Distributed Spatial Database Based on View Mechanism","authors":"L. Shu, Jiayuan Lin, Jiliu Zhou","doi":"10.1109/ICIS.2011.11","DOIUrl":"https://doi.org/10.1109/ICIS.2011.11","url":null,"abstract":"With the growing need of integration and sharing of spatial data located in different places on the network, distributed spatial database technology has become a hot research field. Meanwhile, spatial information security, especially access control, has attracted more and more attention in practice. Access control for distributed spatial databases has two challenges: realization of fine-grained and spatially aware access control, check access requests against authorization information and make access decision. The general methods to meet these challenges are fairly complicated and difficult to accomplish. Therefore, we propose using views to implement access control functionality for distributed spatial database, whose P2P architecture is firstly described. Then we discuss the definition and authorization of distributed views and their management. Finally, we put forward the reference framework and explain the control procedure.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou, Jingjing Guo
This paper examines the development of Information and Communication Technologies (ICTs) in the tourism industry, focusing mainly on their impact on the sectors of hospitality, travel agent, electronic travel intermediary, tourism destination organizations, and airlines. The key question raised by this study is how the ICTs are affecting the business running and management in these sectors. This article analyzes trends in internet-based sales of a range of different travel and tourism services in the past five years in the mainland China. The study result demonstrates that the internet-based travel and tourism services market in the mainland China has been increasing dramatically during last a few years. The Internet-based Intermediaries have increased their share of online sales as well.
{"title":"A Preliminary Study on the Use of the ICTs in the Tourism Industry in China","authors":"Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou, Jingjing Guo","doi":"10.1109/ICIS.2011.65","DOIUrl":"https://doi.org/10.1109/ICIS.2011.65","url":null,"abstract":"This paper examines the development of Information and Communication Technologies (ICTs) in the tourism industry, focusing mainly on their impact on the sectors of hospitality, travel agent, electronic travel intermediary, tourism destination organizations, and airlines. The key question raised by this study is how the ICTs are affecting the business running and management in these sectors. This article analyzes trends in internet-based sales of a range of different travel and tourism services in the past five years in the mainland China. The study result demonstrates that the internet-based travel and tourism services market in the mainland China has been increasing dramatically during last a few years. The Internet-based Intermediaries have increased their share of online sales as well.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}