Mobility models play an influential role in the simulation studies of mobile ad hoc networks (MANETs). Realism and simplicity are two attractive properties of mobility models, and achieving both together in modeling mobility has been a challenging task. Recently, a framework of moblity models called destination guided mobility (DGM) models for MANETs was proposed. This framework can be used to develop several simple DGM models with increased realism. Connectivity is a fundamental requirement for communication between nodes. In this paper, we investigate the connectivity in two basic DGM models in comparison with the widely used random waypoint (RWP) model. Specifically, first we expand the DGM models development and analysis software tool to include connectivity analysis. Second, we provide the experimental evaluation of connectivity in the two basic DGM models in comparison with RWP model. Finally, through NS2 simulation, we study the performance impact of these mobility models on the Ad-hoc On-demand Distance Vector (AODV) routing protocol - one of the most popular routing protocols for MANET.
{"title":"Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility Models","authors":"M. A. Rahman, A. Aravind","doi":"10.1109/MUSIC.2012.10","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.10","url":null,"abstract":"Mobility models play an influential role in the simulation studies of mobile ad hoc networks (MANETs). Realism and simplicity are two attractive properties of mobility models, and achieving both together in modeling mobility has been a challenging task. Recently, a framework of moblity models called destination guided mobility (DGM) models for MANETs was proposed. This framework can be used to develop several simple DGM models with increased realism. Connectivity is a fundamental requirement for communication between nodes. In this paper, we investigate the connectivity in two basic DGM models in comparison with the widely used random waypoint (RWP) model. Specifically, first we expand the DGM models development and analysis software tool to include connectivity analysis. Second, we provide the experimental evaluation of connectivity in the two basic DGM models in comparison with RWP model. Finally, through NS2 simulation, we study the performance impact of these mobility models on the Ad-hoc On-demand Distance Vector (AODV) routing protocol - one of the most popular routing protocols for MANET.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, an extended Wang's kWTA network with stochastic output nodes has been studied. It is shown that this extended model converges asymptotically. In this paper, we further studies the convergence time of this model. The convergence time is defined as the time taken for the model to reach a finite region around the convergent. With this definition, an approximation of convergence time is derived and its viability is shown by simulation results.
{"title":"Convergence Time of Wang's kWTA Network with Stochastic Output Nodes","authors":"K. Ho, Wei-Bin Lee, Siu-Chung Lau, J. Sum","doi":"10.1109/MUSIC.2012.39","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.39","url":null,"abstract":"Recently, an extended Wang's kWTA network with stochastic output nodes has been studied. It is shown that this extended model converges asymptotically. In this paper, we further studies the convergence time of this model. The convergence time is defined as the time taken for the model to reach a finite region around the convergent. With this definition, an approximation of convergence time is derived and its viability is shown by simulation results.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Ou, Y. Zhen, Xiangzhen Li, Yiying Zhang, L. Zeng
Utilizing Internet of Things (IoT) technology in smart grid is an important approach to speed up the informatization of power grid system, and it is beneficial for effective management of the power grid infrastructure. Disaster prevention and reduction of power transmission line is one of the most important application fields of IoT. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the transmission lines, improve the reliability of power transmission and reduce economic loss. Focused on the characteristic of the construction and development of smart grid, this paper introduced the application of IoT in online monitoring system of power transmission line.
{"title":"Application of Internet of Things in Smart Grid Power Transmission","authors":"Q. Ou, Y. Zhen, Xiangzhen Li, Yiying Zhang, L. Zeng","doi":"10.1109/MUSIC.2012.24","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.24","url":null,"abstract":"Utilizing Internet of Things (IoT) technology in smart grid is an important approach to speed up the informatization of power grid system, and it is beneficial for effective management of the power grid infrastructure. Disaster prevention and reduction of power transmission line is one of the most important application fields of IoT. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the transmission lines, improve the reliability of power transmission and reduce economic loss. Focused on the characteristic of the construction and development of smart grid, this paper introduced the application of IoT in online monitoring system of power transmission line.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we describe a mobile application that synchronizes the playback of a video stream among a group of mobile devices while the video playback is controlled (e.g. pause, resume, seek) by one of the devices. This feature allows a group of people to collaborate remotely in real-time through watching the same video on their mobile devices. To make this application work for heterogeneous mobile devices and networks, we develop synchronization protocols and time-based video position prediction algorithms on top of a REST platform that is independent of programming languages, operating systems and transport protocols. A prototype system has been developed based on Android phones connected by 3G cellular network. The preliminary experiments show the approach is feasible and promising.
{"title":"Real-Time Collaborative Video Watching on Mobile Devices with REST Services","authors":"S. Pan, Li Li, W. Chou","doi":"10.1109/MUSIC.2012.13","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.13","url":null,"abstract":"In this paper, we describe a mobile application that synchronizes the playback of a video stream among a group of mobile devices while the video playback is controlled (e.g. pause, resume, seek) by one of the devices. This feature allows a group of people to collaborate remotely in real-time through watching the same video on their mobile devices. To make this application work for heterogeneous mobile devices and networks, we develop synchronization protocols and time-based video position prediction algorithms on top of a REST platform that is independent of programming languages, operating systems and transport protocols. A prototype system has been developed based on Android phones connected by 3G cellular network. The preliminary experiments show the approach is feasible and promising.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Semantic Web aims to enrich the existing Web by building an infrastructure layer of a web of data. Three-quarters of the data on the Web come from relational databases. Thus, in the context of the Semantic Web, it has become one of the most important topics to generate OWL ontologies from the legacy databases. For this purpose, the existing approaches typically define how to map the databases to the ontologies. However, the mappings are designed to work under highly normalized database schemas and to be carried out through a batch process of dumping database contents to the ontology repository for ontology population. The approaches can't contribute usefully to the proliferation of ontologies. In this paper, we propose a new set of mapping rules based on a view-based approach, which enables ontologies to be served even without their population through the massive dump process in advance. Consequently, the ontologies out of our approach can play as the complete OWL-described view on the database because they explicitly represent the semantics of relational model objects and operations. Compared with existing approaches, our approach is applicable to a wider range of database schemas, and besides it is designed to extract more meaningful relationships between entities by reasoning.
{"title":"Generating OWL Ontology from Relational Database","authors":"Ji-Woong Choi, M. Kim","doi":"10.1109/MUSIC.2012.17","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.17","url":null,"abstract":"The Semantic Web aims to enrich the existing Web by building an infrastructure layer of a web of data. Three-quarters of the data on the Web come from relational databases. Thus, in the context of the Semantic Web, it has become one of the most important topics to generate OWL ontologies from the legacy databases. For this purpose, the existing approaches typically define how to map the databases to the ontologies. However, the mappings are designed to work under highly normalized database schemas and to be carried out through a batch process of dumping database contents to the ontology repository for ontology population. The approaches can't contribute usefully to the proliferation of ontologies. In this paper, we propose a new set of mapping rules based on a view-based approach, which enables ontologies to be served even without their population through the massive dump process in advance. Consequently, the ontologies out of our approach can play as the complete OWL-described view on the database because they explicitly represent the semantics of relational model objects and operations. Compared with existing approaches, our approach is applicable to a wider range of database schemas, and besides it is designed to extract more meaningful relationships between entities by reasoning.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won
Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.
{"title":"Database Encryption Implementation and Analysis Using Graphics Processing Unit","authors":"Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won","doi":"10.1109/MUSIC.2012.26","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.26","url":null,"abstract":"Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashraf E. Al-Fagih, F. Al-turjman, H. Hassanein, W. Alsalih
Radio Frequency IDentification (RFID) is a wireless technology that promises to facilitate many identification and tracking solutions. The placement problem, i.e. choosing the optimal locations for RFID readers, tags or both in a given RFID layout, is reviewed in this paper. Placement approaches are generally coverage-driven and vary according to the system's scopes and constraints. RFID coverage is associated with readers' interference, which requires applying redundancy elimination algorithms. In this paper, we propose a coverage-based categorization of RFID placement schemes based on the span of the readers' field. We also provide a comparative analysis of placement schemes based on their performance objectives, constraints, and potential applications. We finally discuss some open issues regarding RFID placement in terms of alternative objectives and systems' specifications.
{"title":"Coverage-Based Placement in RFID Networks: An Overview","authors":"Ashraf E. Al-Fagih, F. Al-turjman, H. Hassanein, W. Alsalih","doi":"10.1109/MUSIC.2012.45","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.45","url":null,"abstract":"Radio Frequency IDentification (RFID) is a wireless technology that promises to facilitate many identification and tracking solutions. The placement problem, i.e. choosing the optimal locations for RFID readers, tags or both in a given RFID layout, is reviewed in this paper. Placement approaches are generally coverage-driven and vary according to the system's scopes and constraints. RFID coverage is associated with readers' interference, which requires applying redundancy elimination algorithms. In this paper, we propose a coverage-based categorization of RFID placement schemes based on the span of the readers' field. We also provide a comparative analysis of placement schemes based on their performance objectives, constraints, and potential applications. We finally discuss some open issues regarding RFID placement in terms of alternative objectives and systems' specifications.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the design, optimization and performance evaluation of artificial neural network for the efficient classification of Electromyography (EMG) signals. The EMG signals are collected for different types of volunteer hand motion which are processed to extract some predefined features as inputs to the neural network. The time and time-frequency based extracted feature sets are used to train the neural network. A back-propagation neural network with Levenberg-Marquardt training algorithm has been employed for the classification of EMG signals. The results show that the designed and optimized network able to classify single channel EMG signals with an average success rate of 88.4%.
{"title":"The Use of Artificial Neural Network in the Classification of EMG Signals","authors":"M. R. Ahsan, M. Ibrahimy, O. Khalifa","doi":"10.1109/MUSIC.2012.46","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.46","url":null,"abstract":"This paper presents the design, optimization and performance evaluation of artificial neural network for the efficient classification of Electromyography (EMG) signals. The EMG signals are collected for different types of volunteer hand motion which are processed to extract some predefined features as inputs to the neural network. The time and time-frequency based extracted feature sets are used to train the neural network. A back-propagation neural network with Levenberg-Marquardt training algorithm has been employed for the classification of EMG signals. The results show that the designed and optimized network able to classify single channel EMG signals with an average success rate of 88.4%.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"855 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syeda Uzma Gardazi, A. A. Shahid, Christine Salimbene
The United States legislation known as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is aimed at strengthening patient rights, increasing efficiency and decreasing administrative costs in the healthcare industry. Under HIPAA all Covered Entities are required to ensure compliance with certain privacy and security rules concerned with protecting private patient health information. Building upon the objectives of HIPAA, the American Recovery and Reinvestment Act (ARRA) of 2009, in Section 13411 of the Health Information Technology for Economic and Clinical Health (HITECH) Act, required the Department of Health and Human Services (HHS) to conduct periodic audits of Covered Entities against HIPAA Security Rule. This paper presents and evaluates a new approach which might be used by Covered Entities to achieve compliance with HIPAA by adopting the ISO 9001 guidelines. A United States based Healthcare IT Company (UHITC) with a backup office in Pakistan was taken as a case study for this approach. UHITC develops software for mobile devices along with providing third party medical billing services. In connection with its achieving ISO 9001 certification since 2004, UHITC had already developed a company-wide quality audit protocol based on the ISO 9001 standard. For purposes of conforming the ISO standards to the HIPAA audit protocol in a streamlined fashion, UHITC examined the HIPAA requirements to determine whether the existing protocol could be tailored to achieve HIPAA compliance. In order to accomplish this evaluation, the two standards were compared by cross-mapping their components. The comparison revealed that the controls mentioned in the ISO 9001 guideline meet or exceed the HIPAA Security Rule for 36% of the implementation requirements. UHITC was also able to increase customer satisfaction by achieving compliance with HIPAA Security Rule using a quality management system (QMS) model. At the next level, Compliance Attributes (CA) were derived from these requirements and classified as architectural and non-architectural in nature. A new approach to define compliance oriented software architecture using compliance tactic was also proposed.
{"title":"HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program","authors":"Syeda Uzma Gardazi, A. A. Shahid, Christine Salimbene","doi":"10.1109/MUSIC.2012.50","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.50","url":null,"abstract":"The United States legislation known as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is aimed at strengthening patient rights, increasing efficiency and decreasing administrative costs in the healthcare industry. Under HIPAA all Covered Entities are required to ensure compliance with certain privacy and security rules concerned with protecting private patient health information. Building upon the objectives of HIPAA, the American Recovery and Reinvestment Act (ARRA) of 2009, in Section 13411 of the Health Information Technology for Economic and Clinical Health (HITECH) Act, required the Department of Health and Human Services (HHS) to conduct periodic audits of Covered Entities against HIPAA Security Rule. This paper presents and evaluates a new approach which might be used by Covered Entities to achieve compliance with HIPAA by adopting the ISO 9001 guidelines. A United States based Healthcare IT Company (UHITC) with a backup office in Pakistan was taken as a case study for this approach. UHITC develops software for mobile devices along with providing third party medical billing services. In connection with its achieving ISO 9001 certification since 2004, UHITC had already developed a company-wide quality audit protocol based on the ISO 9001 standard. For purposes of conforming the ISO standards to the HIPAA audit protocol in a streamlined fashion, UHITC examined the HIPAA requirements to determine whether the existing protocol could be tailored to achieve HIPAA compliance. In order to accomplish this evaluation, the two standards were compared by cross-mapping their components. The comparison revealed that the controls mentioned in the ISO 9001 guideline meet or exceed the HIPAA Security Rule for 36% of the implementation requirements. UHITC was also able to increase customer satisfaction by achieving compliance with HIPAA Security Rule using a quality management system (QMS) model. At the next level, Compliance Attributes (CA) were derived from these requirements and classified as architectural and non-architectural in nature. A new approach to define compliance oriented software architecture using compliance tactic was also proposed.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari
The purpose of this research is determining the Success of Innovation Ideas in Social Computing Technologies area by an intelligent system. Here two Fuzzy Expert Systems have been designed with the consideration of some effective variables on Ideas Barriers for first system and some other effective variables on Ideas Attractiveness for second system. The Innovation Ideas Success is determined on basis of these systems outputs. The rules of systems have been extracted from some entrepreneurship experts and the systems have been developed with the use of FIS tool of MATLAB software. The final result contains two anticipating models for evaluating level of barriers and level of attractiveness which determines level of success of innovative ideas in social computing technologies area based on two derived output variables from sub models. The presented steps have been run for idea of a new platform named WBB as the empirical study.
{"title":"Evaluating Success of Innovation Ideas in Social Computing Technologies Using Fuzzy Expert System","authors":"A. Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari","doi":"10.1109/MUSIC.2012.21","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.21","url":null,"abstract":"The purpose of this research is determining the Success of Innovation Ideas in Social Computing Technologies area by an intelligent system. Here two Fuzzy Expert Systems have been designed with the consideration of some effective variables on Ideas Barriers for first system and some other effective variables on Ideas Attractiveness for second system. The Innovation Ideas Success is determined on basis of these systems outputs. The rules of systems have been extracted from some entrepreneurship experts and the systems have been developed with the use of FIS tool of MATLAB software. The final result contains two anticipating models for evaluating level of barriers and level of attractiveness which determines level of success of innovative ideas in social computing technologies area based on two derived output variables from sub models. The presented steps have been run for idea of a new platform named WBB as the empirical study.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}