Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603920
J. Hang, Shichuan Ding, Guoli Li, F. Xie
This paper presents a simple and reliable method for detecting the faults occurring in a permanent magnet synchronous generator (PMSG) connected with a three-phase uncontrolled rectifier bridge (TPURB), which is based on monitoring the output DC current. A PMSG connected with a TPURB at constant speed is discussed under two types of faults, namely phase winding faults and diode faults. An adaptive neuro-fuzzy inference system (ANFIS) is utilized to make decisions about the fault type. In order to demonstrate the effectiveness of the proposed method, finite element (FE) method is applied to generate virtual data applied to train the ANFIS. The simulation results show that the proposed method can effectively diagnose these faults.
{"title":"Fault diagnosis of a permanent magnet synchronous generator connected to a uncontrolled rectifier bridge","authors":"J. Hang, Shichuan Ding, Guoli Li, F. Xie","doi":"10.1109/ICIEA.2016.7603920","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603920","url":null,"abstract":"This paper presents a simple and reliable method for detecting the faults occurring in a permanent magnet synchronous generator (PMSG) connected with a three-phase uncontrolled rectifier bridge (TPURB), which is based on monitoring the output DC current. A PMSG connected with a TPURB at constant speed is discussed under two types of faults, namely phase winding faults and diode faults. An adaptive neuro-fuzzy inference system (ANFIS) is utilized to make decisions about the fault type. In order to demonstrate the effectiveness of the proposed method, finite element (FE) method is applied to generate virtual data applied to train the ANFIS. The simulation results show that the proposed method can effectively diagnose these faults.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123669598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603675
Deqing Zhai, Y. Soh, W. Cai
This paper aims to evaluate the high energy demand components in the buildings, such as HVAC system, with respect to the indoor environmental parameters, such as ambient air temperature and velocity. The Extreme Learning Machine (ELM) was chosen to be trained from the experimental data in the thermal laboratory due to its accuracy and less computational complexity from many previous researches and studies. Therefore the given physical environmental parameters are able to be predicting the energy consumptions level from the ELM model of Air Handling Unit (AHU) of HVAC systems.
{"title":"Operating points as communication bridge between energy evaluation with air temperature and velocity based on extreme learning machine (ELM) models","authors":"Deqing Zhai, Y. Soh, W. Cai","doi":"10.1109/ICIEA.2016.7603675","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603675","url":null,"abstract":"This paper aims to evaluate the high energy demand components in the buildings, such as HVAC system, with respect to the indoor environmental parameters, such as ambient air temperature and velocity. The Extreme Learning Machine (ELM) was chosen to be trained from the experimental data in the thermal laboratory due to its accuracy and less computational complexity from many previous researches and studies. Therefore the given physical environmental parameters are able to be predicting the energy consumptions level from the ELM model of Air Handling Unit (AHU) of HVAC systems.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603847
Huang Mingji, Li Lin
In recent years, more and more people are learning Chinese calligraphy, and for how to correctly brush pen and brush, the less people know about this. This topic combines the spatial point cloud data and gesture recognition technology, in view of the common brush pen gestures - five fingers penned method for the study of feature selection and extraction. Innovation point of this article is the gesture recognition technology, space motion capture technology, pattern recognition technology, etc., establish the platform of brushes gesture recognition on static feature and dynamic brush gestures characteristics for identification, guide people to correctly brush pen and brush.
{"title":"Study on brush gesture feature recognition based on the 3D point cloud","authors":"Huang Mingji, Li Lin","doi":"10.1109/ICIEA.2016.7603847","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603847","url":null,"abstract":"In recent years, more and more people are learning Chinese calligraphy, and for how to correctly brush pen and brush, the less people know about this. This topic combines the spatial point cloud data and gesture recognition technology, in view of the common brush pen gestures - five fingers penned method for the study of feature selection and extraction. Innovation point of this article is the gesture recognition technology, space motion capture technology, pattern recognition technology, etc., establish the platform of brushes gesture recognition on static feature and dynamic brush gestures characteristics for identification, guide people to correctly brush pen and brush.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603882
Charles Z. Liu, M. Kavakli
In this paper, we propose a data aware method to perform Quality of Experience (QoE) and/or Quality of Service (QoS) management. A data-aware QoE model is built based on Principle Component Analysis (PCA). Three main types of QoE-QoS management (optimal QoE management, optimal QoS management and QoE-QoS balance management) are discussed based on the proposed scheme. A QoE-QoS unified optimization is also presented in normalized scale space. An experiment is given to show how the proposed scheme works. With the proposed scheme, the operations for QoE-QoS management is simplified but flexible, and the optimal solution can be obtained analytically with balanced efficiency.
{"title":"Data-aware QoE-QoS management","authors":"Charles Z. Liu, M. Kavakli","doi":"10.1109/ICIEA.2016.7603882","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603882","url":null,"abstract":"In this paper, we propose a data aware method to perform Quality of Experience (QoE) and/or Quality of Service (QoS) management. A data-aware QoE model is built based on Principle Component Analysis (PCA). Three main types of QoE-QoS management (optimal QoE management, optimal QoS management and QoE-QoS balance management) are discussed based on the proposed scheme. A QoE-QoS unified optimization is also presented in normalized scale space. An experiment is given to show how the proposed scheme works. With the proposed scheme, the operations for QoE-QoS management is simplified but flexible, and the optimal solution can be obtained analytically with balanced efficiency.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603858
Tianxu Yang, Xiaoguang Hu
CPCI bus, as many buses more complex, aerospace test system the most widely used bus system, is ranging from high-grade hot swap technology and hot backup technology to achieve greater application needs. Its design, application methods and techniques applied in the transformation to meet the related equipment upgrades, but also instructive in higher levels of overall system design process. Especially important guiding significance for thermal measurement and control system design and overall system redundancy hot backup plan structure. Therefore, CPCI bus, hot-swappable and hot backup technology achieve the most representative. This issue is chosen the most representative system design example, according to the relevant standard design demonstration experiment platform, design the HILS system and Control System validate the hot redundancy of the system. On this basis the relevant technical report to verify the proposed theory is correct.
{"title":"Research and realization of digital export boards in CPCI test system based on high availability hot-swap technology","authors":"Tianxu Yang, Xiaoguang Hu","doi":"10.1109/ICIEA.2016.7603858","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603858","url":null,"abstract":"CPCI bus, as many buses more complex, aerospace test system the most widely used bus system, is ranging from high-grade hot swap technology and hot backup technology to achieve greater application needs. Its design, application methods and techniques applied in the transformation to meet the related equipment upgrades, but also instructive in higher levels of overall system design process. Especially important guiding significance for thermal measurement and control system design and overall system redundancy hot backup plan structure. Therefore, CPCI bus, hot-swappable and hot backup technology achieve the most representative. This issue is chosen the most representative system design example, according to the relevant standard design demonstration experiment platform, design the HILS system and Control System validate the hot redundancy of the system. On this basis the relevant technical report to verify the proposed theory is correct.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603726
Phat Huynh, R. Ross, Andrew Martchenko, J. Devlin
This paper describes and evaluates a novel 3D inspection system to detect anomalies in sewer pipes using stereo vision coupled with novel image processing algorithms. Currently, most commercial pipe inspection systems are designed with one or more Closed-circuit Television (CCTV) cameras. These systems are slow, costly and have limited accuracy (caused by human and environmental factors). More sophisticated systems (Laser-based, Infrared Thermography, Ultrasonic-based and Ground Penetrating Radar) suffer from: low resolution, high noise, high operational costs and an inability to detect water infiltration. The main objective of this research is to apply stereo vision and robust image processing to generate 3D images of anomalies in sewer pipes in order to achieve high efficiency and accuracy for pipe inspection. The results show that various types of defects are successfully detectable. In addition, the correspondence time can be reduced by up to 45% and the accuracy of disparity maps is maintained compared to traditional local correspondence algorithms. Each component of the proposed system was tested individually with real and simulated data sets.
{"title":"3D anomaly inspection system for sewer pipes using stereo vision and novel image processing","authors":"Phat Huynh, R. Ross, Andrew Martchenko, J. Devlin","doi":"10.1109/ICIEA.2016.7603726","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603726","url":null,"abstract":"This paper describes and evaluates a novel 3D inspection system to detect anomalies in sewer pipes using stereo vision coupled with novel image processing algorithms. Currently, most commercial pipe inspection systems are designed with one or more Closed-circuit Television (CCTV) cameras. These systems are slow, costly and have limited accuracy (caused by human and environmental factors). More sophisticated systems (Laser-based, Infrared Thermography, Ultrasonic-based and Ground Penetrating Radar) suffer from: low resolution, high noise, high operational costs and an inability to detect water infiltration. The main objective of this research is to apply stereo vision and robust image processing to generate 3D images of anomalies in sewer pipes in order to achieve high efficiency and accuracy for pipe inspection. The results show that various types of defects are successfully detectable. In addition, the correspondence time can be reduced by up to 45% and the accuracy of disparity maps is maintained compared to traditional local correspondence algorithms. Each component of the proposed system was tested individually with real and simulated data sets.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603774
Yunhua Li, Chengguang Huang, Dehong Zhou, Jin Zhao
A five-leg back-to-back converter-fed induction motor drive, consisted of coupled rectifier and inverter sharing one leg between them, is discussed in this paper. This topology can be applied for fault-tolerant system when one leg of conventional back-to-back converter fails. However, this kind of system poses a two-object control problem. Moreover, the inherent DC bus voltage distribution between rectifier and inverter limit the performance of system. The poor DC bus voltage utilization of carrier modulation makes the situation worse. A novel zero sequence signal calculation algorithm is presented to achieve independent control of rectifier and inverter and improve the voltage utilization. The simulation is implemented to verify effectiveness of the scheme.
{"title":"A carrier-based control scheme for five-leg back-to-back converter-fed induction motor drive","authors":"Yunhua Li, Chengguang Huang, Dehong Zhou, Jin Zhao","doi":"10.1109/ICIEA.2016.7603774","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603774","url":null,"abstract":"A five-leg back-to-back converter-fed induction motor drive, consisted of coupled rectifier and inverter sharing one leg between them, is discussed in this paper. This topology can be applied for fault-tolerant system when one leg of conventional back-to-back converter fails. However, this kind of system poses a two-object control problem. Moreover, the inherent DC bus voltage distribution between rectifier and inverter limit the performance of system. The poor DC bus voltage utilization of carrier modulation makes the situation worse. A novel zero sequence signal calculation algorithm is presented to achieve independent control of rectifier and inverter and improve the voltage utilization. The simulation is implemented to verify effectiveness of the scheme.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603695
F. Han, Long Xu, Xinghuo Yu, Z. Tari, Yong Feng, Jiankun Hu
This paper proposes a sliding-mode observer for real-time DDoS detection on network routers, which will be used for connection-oriented services. The developed observers estimate the traffics going through the routers and identify those connections without the following-up packets based on the real-time queue length information inside the routers. These identified traffics are suspicious DDoS attacks which are considered as disturbance in the simplified TCP/IP model of the router. With the observers in use, when DDoS attacks are launched, it has an abrupt change in the disturbance component which could be recognized easily. The proposed observer-based DDoS detection could be installed inside the routers associated with the firewalls. The web server has an overall picture of the entire system, based on which the priority service could be implemented. As a result, the suspicious anomalous could be ranked as the lowest priority for processing and may lead to deep investigation to those suspicious traffics. This proposed mechanism makes optimal use of resource at the bottleneck links to ensure the diverse QoS requirements for high security applications that requires real-time DDoS detection. NS-2 simulation results validate the effectiveness of the proposed method.
{"title":"Sliding-mode observers for real-time DDoS detection","authors":"F. Han, Long Xu, Xinghuo Yu, Z. Tari, Yong Feng, Jiankun Hu","doi":"10.1109/ICIEA.2016.7603695","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603695","url":null,"abstract":"This paper proposes a sliding-mode observer for real-time DDoS detection on network routers, which will be used for connection-oriented services. The developed observers estimate the traffics going through the routers and identify those connections without the following-up packets based on the real-time queue length information inside the routers. These identified traffics are suspicious DDoS attacks which are considered as disturbance in the simplified TCP/IP model of the router. With the observers in use, when DDoS attacks are launched, it has an abrupt change in the disturbance component which could be recognized easily. The proposed observer-based DDoS detection could be installed inside the routers associated with the firewalls. The web server has an overall picture of the entire system, based on which the priority service could be implemented. As a result, the suspicious anomalous could be ranked as the lowest priority for processing and may lead to deep investigation to those suspicious traffics. This proposed mechanism makes optimal use of resource at the bottleneck links to ensure the diverse QoS requirements for high security applications that requires real-time DDoS detection. NS-2 simulation results validate the effectiveness of the proposed method.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603850
Nan Donglei, Jian Zhixin, Li Wei
RBF neural network algorithm refers to a kind of new method promoted according to the fact that failure data volume is small while the distributed model cannot be distinguished. For the problem that non-teaching study in current RBF neural network algorithm should be deter-mined by experts' experience, AP is promoted to improve the current algorithm based on which a new p value is de-signed to make the number of clustering centers in new algorithm determinable for that of original samples. By creating variable groups of data arbitrarily, the BWP and NRMSE value are used for comparing the effects of clustering and extending result repeatedly analyzing new or old algorithms. The failure data of one kind of numerical control machines is analyzed and calculated repeatedly to test the validity of new algorithm in which the identifiable rate of distributed model is promoted, compared with original algorithm.
{"title":"Improved RBF neural network algorithm for reliability data","authors":"Nan Donglei, Jian Zhixin, Li Wei","doi":"10.1109/ICIEA.2016.7603850","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603850","url":null,"abstract":"RBF neural network algorithm refers to a kind of new method promoted according to the fact that failure data volume is small while the distributed model cannot be distinguished. For the problem that non-teaching study in current RBF neural network algorithm should be deter-mined by experts' experience, AP is promoted to improve the current algorithm based on which a new p value is de-signed to make the number of clustering centers in new algorithm determinable for that of original samples. By creating variable groups of data arbitrarily, the BWP and NRMSE value are used for comparing the effects of clustering and extending result repeatedly analyzing new or old algorithms. The failure data of one kind of numerical control machines is analyzed and calculated repeatedly to test the validity of new algorithm in which the identifiable rate of distributed model is promoted, compared with original algorithm.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-05DOI: 10.1109/ICIEA.2016.7603931
R. Reine, Z. Zang
Multiuser orthogonal frequency division multiplexing (MU-OFDM) communication systems have higher system efficiency compared to single user OFDM systems. However, the high peak-to-average power ratio (PAPR) of the MU-OFDM signal is considered as one of the major drawbacks of the MU-OFDM systems. This paper proposes to use computationally efficient optimisation approach to design a set of orthogonal pulse shaping waveforms to reduce the PAPR of the MU-OFDM signal. Autocorrelation and cross-correlation of the pulse shaping waveforms are specified in the constraints in order to minimise intersymbol interference (ISI) and co-channel interference (CCI). Methods to solve the optimal waveform set design problem are presented. Numerical results illustrate that the designed set of pulse shaping waveforms is efficient in reducing the PAPR of the OFDM signal in multiuser communication systems.
{"title":"Pulse shaping approach to PAPR reduction for multiuser OFDM systems","authors":"R. Reine, Z. Zang","doi":"10.1109/ICIEA.2016.7603931","DOIUrl":"https://doi.org/10.1109/ICIEA.2016.7603931","url":null,"abstract":"Multiuser orthogonal frequency division multiplexing (MU-OFDM) communication systems have higher system efficiency compared to single user OFDM systems. However, the high peak-to-average power ratio (PAPR) of the MU-OFDM signal is considered as one of the major drawbacks of the MU-OFDM systems. This paper proposes to use computationally efficient optimisation approach to design a set of orthogonal pulse shaping waveforms to reduce the PAPR of the MU-OFDM signal. Autocorrelation and cross-correlation of the pulse shaping waveforms are specified in the constraints in order to minimise intersymbol interference (ISI) and co-channel interference (CCI). Methods to solve the optimal waveform set design problem are presented. Numerical results illustrate that the designed set of pulse shaping waveforms is efficient in reducing the PAPR of the OFDM signal in multiuser communication systems.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125733580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}