Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377432
Jaeyeon Jang, Byungjun Kim, Kveo Re Lee, J. Kim
This essay explores significant cultural differences on startup discourses between United States and China by demonstrating a big data analysis through Structural Topic Modeling. Results and findings were interpreted with Hofstede”s cultural dimensions, indicating that the conventional theory of social science was applicable when it comes to explaining technological subjects
{"title":"A Cross-Cultural Comparative Study on the Startup Discourse in 2000–2019 between United States and China","authors":"Jaeyeon Jang, Byungjun Kim, Kveo Re Lee, J. Kim","doi":"10.1109/IMCOM51814.2021.9377432","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377432","url":null,"abstract":"This essay explores significant cultural differences on startup discourses between United States and China by demonstrating a big data analysis through Structural Topic Modeling. Results and findings were interpreted with Hofstede”s cultural dimensions, indicating that the conventional theory of social science was applicable when it comes to explaining technological subjects","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130794983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377369
Seiya Kobayashi, T. Miyazaki
This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.
{"title":"Authentication and Trustful Communication Protocol for IoT Devices","authors":"Seiya Kobayashi, T. Miyazaki","doi":"10.1109/IMCOM51814.2021.9377369","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377369","url":null,"abstract":"This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126656988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377370
Sungjin Chun, C. Son, Hyunseung Choo
With the wide availability of historical data from baseball games, one of the most popular sports, high accurate winner prediction has become a significant target of statistical analysis and machine learning. However, existing techniques for a pre-game prediction yield poor accuracies due to the incomplete player lists given in starting lineups and substitutions occurring during the game. We exploit the capability of Long Short-Term Memory (LSTM) in identifying hidden patterns of time series data to propose inter-dependent LSTM baseball game prediction with only the starting lineup information. Particularly, we preprocess historical data to generate a pair of pre-game and post-game records for each baseball game. The pre-game record indicates the incomplete player lists given in starting lineups, and the post-game one contains the list of all players who participated in the game. The inter-dependent LSTM model exploits the dependencies of the pairs to predict a game result with only pre-game input. Our experiment results show that the proposed model achieves up to 12% higher accuracy than the existing ones.
{"title":"Inter-dependent LSTM: Baseball Game Prediction with Starting and Finishing Lineups","authors":"Sungjin Chun, C. Son, Hyunseung Choo","doi":"10.1109/IMCOM51814.2021.9377370","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377370","url":null,"abstract":"With the wide availability of historical data from baseball games, one of the most popular sports, high accurate winner prediction has become a significant target of statistical analysis and machine learning. However, existing techniques for a pre-game prediction yield poor accuracies due to the incomplete player lists given in starting lineups and substitutions occurring during the game. We exploit the capability of Long Short-Term Memory (LSTM) in identifying hidden patterns of time series data to propose inter-dependent LSTM baseball game prediction with only the starting lineup information. Particularly, we preprocess historical data to generate a pair of pre-game and post-game records for each baseball game. The pre-game record indicates the incomplete player lists given in starting lineups, and the post-game one contains the list of all players who participated in the game. The inter-dependent LSTM model exploits the dependencies of the pairs to predict a game result with only pre-game input. Our experiment results show that the proposed model achieves up to 12% higher accuracy than the existing ones.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377417
Nader Bazyari, H. Sajedi
In this paper a new approach toward data processing is proposed that is inspired by all the prominent data clustering algorithms proposed by scholars. The main motif that drove this approach was to mix hierarchical clustering methods with Gaussian Estimators as to find a hidden structure in data that was not reachable using traditional bandwidth estimators. Instead the criteria for assessing similarity among data was the principles for Newtonian Physics.
{"title":"A Reconcile of Density Based and Hierarchical Clustering Based on the Laws of Physics","authors":"Nader Bazyari, H. Sajedi","doi":"10.1109/IMCOM51814.2021.9377417","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377417","url":null,"abstract":"In this paper a new approach toward data processing is proposed that is inspired by all the prominent data clustering algorithms proposed by scholars. The main motif that drove this approach was to mix hierarchical clustering methods with Gaussian Estimators as to find a hidden structure in data that was not reachable using traditional bandwidth estimators. Instead the criteria for assessing similarity among data was the principles for Newtonian Physics.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123053615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377383
Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo
During recent years, mobile edge computing is getting much attention from both academia and industry. However, many found that this emerging architecture needs a proper data privacy protection mechanism at mobile edge nodes against unintended data use by authorized data analysts. Due to the reason, the development of a proper lightweight privacy-preserving data analysis mechanism is of great urgency. Thus, we propose DP-FCNN, a light-weight Differential Privacy (DP) framework using Fuzzy Convolution Neural Network (FCNN) with Laplace Mechanism which injects noise into the personal data before uploading data from users generating the data into the storage so that the data is still useful but data privacy can be properly protected against unauthorized data analysis attempt. We implemented the proposed framework, and tested its performance in terms of scalability, processing time, and accuracy. The result shows that the proposed framework is very practical.
{"title":"Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing","authors":"Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo","doi":"10.1109/IMCOM51814.2021.9377383","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377383","url":null,"abstract":"During recent years, mobile edge computing is getting much attention from both academia and industry. However, many found that this emerging architecture needs a proper data privacy protection mechanism at mobile edge nodes against unintended data use by authorized data analysts. Due to the reason, the development of a proper lightweight privacy-preserving data analysis mechanism is of great urgency. Thus, we propose DP-FCNN, a light-weight Differential Privacy (DP) framework using Fuzzy Convolution Neural Network (FCNN) with Laplace Mechanism which injects noise into the personal data before uploading data from users generating the data into the storage so that the data is still useful but data privacy can be properly protected against unauthorized data analysis attempt. We implemented the proposed framework, and tested its performance in terms of scalability, processing time, and accuracy. The result shows that the proposed framework is very practical.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116778646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377395
Tao Wang, Yaokai Feng, K. Sakurai
In recent years, the DDoS (Distributed Denial of Service) attack continues to be one of the most dangerous threats even in the SDN (Software Defined Networking) environment. Many approaches have been proposed to deal with the DDoS attacks in the SDN environment. Among those approaches, the two-step detection, in which a trigger mechanism is added before the detection algorithm is called, is gaining more and more attention. In other words, it is the trigger, not the resource-consuming detection algorithm, that constantly monitors network traffic. Thus, the detection algorithm is only called when it is triggered. However, in the existing two-step methods, the trigger uses a static threshold to determine whether or not to start the detection process. In practice, it is difficult to determine an appropriate threshold, and the threshold has a decisive effect on the frequency of the detection process being called and ultimately, it impacts detection performance. In this paper, we propose a self-feedback dynamic thresholding system in which the threshold used in the trigger is dynamically adjusted based on the previous results of trigger and detection. Experimental results and our discussion show that our proposal significantly reduces the number of calls to the resource-consuming detection algorithm with no sacrifice of detection result.
{"title":"Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding","authors":"Tao Wang, Yaokai Feng, K. Sakurai","doi":"10.1109/IMCOM51814.2021.9377395","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377395","url":null,"abstract":"In recent years, the DDoS (Distributed Denial of Service) attack continues to be one of the most dangerous threats even in the SDN (Software Defined Networking) environment. Many approaches have been proposed to deal with the DDoS attacks in the SDN environment. Among those approaches, the two-step detection, in which a trigger mechanism is added before the detection algorithm is called, is gaining more and more attention. In other words, it is the trigger, not the resource-consuming detection algorithm, that constantly monitors network traffic. Thus, the detection algorithm is only called when it is triggered. However, in the existing two-step methods, the trigger uses a static threshold to determine whether or not to start the detection process. In practice, it is difficult to determine an appropriate threshold, and the threshold has a decisive effect on the frequency of the detection process being called and ultimately, it impacts detection performance. In this paper, we propose a self-feedback dynamic thresholding system in which the threshold used in the trigger is dynamically adjusted based on the previous results of trigger and detection. Experimental results and our discussion show that our proposal significantly reduces the number of calls to the resource-consuming detection algorithm with no sacrifice of detection result.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377390
ShaoPeng Che, Dongyan Nan, Pim Kamphuis, Xinvu Jin, J. Kim
The COVID-19 pandemic has had a significant impact on tourism-driven industries worldwide. As East Asia is gaining control in the fight against the coronavirus, countries in this region started easing their travel restrictions. Tourist-oriented retail stores are slowly preparing to receive international visitors again, and to be well adjusted, it is crucial to understand foreign customers' perceptions. From the seven most popular tourism platforms in China, we collected comments about Lotte Young Plaza in South Korea and applied semantic network analysis to understand its perception among young Chinese customers. Based on this analysis, we divided the conclusions into 6 aspects: People whose main purpose is to buy clothes, people who have communication needs in Chinese, the Lotte Department Store's driving force on customer flow to Lotte Young Plaza, young people, features of Lotte Young Plaza (mouthwash) and cosmetics.
{"title":"A Cluster Analysis of Lotte Young Plaza Using Semantic Network Analysis Method","authors":"ShaoPeng Che, Dongyan Nan, Pim Kamphuis, Xinvu Jin, J. Kim","doi":"10.1109/IMCOM51814.2021.9377390","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377390","url":null,"abstract":"The COVID-19 pandemic has had a significant impact on tourism-driven industries worldwide. As East Asia is gaining control in the fight against the coronavirus, countries in this region started easing their travel restrictions. Tourist-oriented retail stores are slowly preparing to receive international visitors again, and to be well adjusted, it is crucial to understand foreign customers' perceptions. From the seven most popular tourism platforms in China, we collected comments about Lotte Young Plaza in South Korea and applied semantic network analysis to understand its perception among young Chinese customers. Based on this analysis, we divided the conclusions into 6 aspects: People whose main purpose is to buy clothes, people who have communication needs in Chinese, the Lotte Department Store's driving force on customer flow to Lotte Young Plaza, young people, features of Lotte Young Plaza (mouthwash) and cosmetics.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131123683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377367
Koki Ohtsuka, D. Kitayama, K. Sumiya, Kazushi Fujita, Goto Shin, Isshu Munemasa
There have been many studies on automatic generation of artificial maps, but few have focused on the objects displayed on artificial maps. Therefore, in this research, we analyzed an object extraction method for automatically generating artificial map. In this research, objects are extracted using Biased Page Rank. Biased Page Rank is a method for improving the quality of search results by changing the rank source according to the interests and interests of individual users. By using this method for object extraction, it is possible to display the objects with a high evaluation value among the objects existing in a specific area on artificial map.
{"title":"A Geographical Object Extraction Method Using User's Trajectories for Generating Artificial Maps","authors":"Koki Ohtsuka, D. Kitayama, K. Sumiya, Kazushi Fujita, Goto Shin, Isshu Munemasa","doi":"10.1109/IMCOM51814.2021.9377367","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377367","url":null,"abstract":"There have been many studies on automatic generation of artificial maps, but few have focused on the objects displayed on artificial maps. Therefore, in this research, we analyzed an object extraction method for automatically generating artificial map. In this research, objects are extracted using Biased Page Rank. Biased Page Rank is a method for improving the quality of search results by changing the rank source according to the interests and interests of individual users. By using this method for object extraction, it is possible to display the objects with a high evaluation value among the objects existing in a specific area on artificial map.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377348
Jin Young Byun, J. Jeon
Face detection is currently one of the most common technologies used in a variety of applications. This paper presents the design and implementation of face detection with some local patterns for achieving real-time performance. It is designed to process the image received in real time from an industrial camera using local patterns to detect the face on the FPGA. Each development result is separately analyzed specifically in terms of hardware resources.
{"title":"Face Detection using Local Patterns in FPGA","authors":"Jin Young Byun, J. Jeon","doi":"10.1109/IMCOM51814.2021.9377348","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377348","url":null,"abstract":"Face detection is currently one of the most common technologies used in a variety of applications. This paper presents the design and implementation of face detection with some local patterns for achieving real-time performance. It is designed to process the image received in real time from an industrial camera using local patterns to detect the face on the FPGA. Each development result is separately analyzed specifically in terms of hardware resources.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123002586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-04DOI: 10.1109/IMCOM51814.2021.9377362
Jun-Woo Won, K. Kim, Tae-Jin Lee
In cellular networks, User Equipments (UEs) must perform a Random Access (RA) process in which UEs are allocated resources for data transmission from the Base Station (BS). The 5G network using the high-frequency band adopts the beamforming technology in order to overcome the high path-loss. As the narrow coverage characteristic of the beam, the BS and UEs use the beam-sweeping and beam-switching methods at the RA process. In this paper, we propose an Enhanced Random Access (E-RA) process, in which the UE selects multiple preambles and transmits them through the beam-sweeping method, and transmits the Connection Request Message (Msg3) through the random beam-switching method. Furthermore, we also propose an improved re-access process that begins with Msg3 retransmission. Through the E-RA process, we can reduce the access delay of the network and the number of transmitted messages causing the energy consumption of the UE and increase the success probability of the RA process.
在蜂窝网络中,用户设备(ue)必须执行随机访问(RA)过程,在此过程中,ue被分配资源用于从基站(BS)传输数据。使用高频频段的5G网络采用波束形成技术,以克服高路径损耗。由于波束的窄覆盖特性,BS和ue在RA过程中采用了波束扫描和波束切换方法。本文提出了一种增强型随机接入(Enhanced Random Access, E-RA)过程,该过程中终端选择多个前导,通过波束扫描方式发送,通过随机波束切换方式发送连接请求消息(Msg3)。此外,我们还提出了一个改进的重访问过程,从Msg3重传开始。通过E-RA过程,我们可以减少网络的接入延迟和传输消息的数量,从而降低终端的能耗,提高RA过程的成功概率。
{"title":"Enhanced Random Access with Beamforming Techniques in 5G Networks","authors":"Jun-Woo Won, K. Kim, Tae-Jin Lee","doi":"10.1109/IMCOM51814.2021.9377362","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377362","url":null,"abstract":"In cellular networks, User Equipments (UEs) must perform a Random Access (RA) process in which UEs are allocated resources for data transmission from the Base Station (BS). The 5G network using the high-frequency band adopts the beamforming technology in order to overcome the high path-loss. As the narrow coverage characteristic of the beam, the BS and UEs use the beam-sweeping and beam-switching methods at the RA process. In this paper, we propose an Enhanced Random Access (E-RA) process, in which the UE selects multiple preambles and transmits them through the beam-sweeping method, and transmits the Connection Request Message (Msg3) through the random beam-switching method. Furthermore, we also propose an improved re-access process that begins with Msg3 retransmission. Through the E-RA process, we can reduce the access delay of the network and the number of transmitted messages causing the energy consumption of the UE and increase the success probability of the RA process.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}