Priti Narwal, Deepak Kumar, S. Singh, Peeyush Tewari
DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.
DoS(拒绝服务)攻击是目前最普遍的攻击。它给网络安全带来了重大风险。当这种攻击由一台单独的服务器机器上的许多传输机器推动时,它被称为DDoS(分布式拒绝服务)攻击。另外,DoS bypass on DHCP(动态主机配置协议)服务器攻击是一种新兴的、著名的系统攻击。作者提出了一种基于随机入侵检测博弈的安排,利用受控马尔可夫链在状态转移图中计算从一个状态到下一个状态的转移概率。首先,作者对这些攻击进行了推测,然后,他们提出了一种使用主从IPS(入侵防御系统)思想的方法。当映射到这些估计的攻击时,这种方法工作得很好,因此有助于识别云域中的这些攻击并采取反作用。
{"title":"Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud","authors":"Priti Narwal, Deepak Kumar, S. Singh, Peeyush Tewari","doi":"10.4018/jitr.2021100104","DOIUrl":"https://doi.org/10.4018/jitr.2021100104","url":null,"abstract":"DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"158 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128892508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carmen González García, Felicidad García-Sánchez, Juan Sebastián González Rodríguez
The aim of the didactics of color is to create a connection, a state of harmony between the observable color and color which is created. This objective unfolds in the teaching methods employed. On one hand, analytical observation must be taught, allowing the gaze to distinguish different shades of color, to organize hierarchically levels of light and darkness and to evaluate subtleties in the saturation of hues. On the other hand, rigorous instruction in color mixing must ensure that the observable color, that is, the desired color, can be approached in an intuitive and precise way. In this article, the authors discuss the difficulties faced teaching color to student artists and how digital tools can be used for training the concept of observation and the analysis of color. These tools allow color schemes to be created. Here the authors discuss how these tools can be applied, based on the experience obtained in introductory painting classes involving students from the University of Salamanca.
{"title":"Color Schemes for Training Artists: Didactic Experience Using Digital Tools That Aid in Color Visualization and Comparison","authors":"Carmen González García, Felicidad García-Sánchez, Juan Sebastián González Rodríguez","doi":"10.4018/jitr.2021100106","DOIUrl":"https://doi.org/10.4018/jitr.2021100106","url":null,"abstract":"The aim of the didactics of color is to create a connection, a state of harmony between the observable color and color which is created. This objective unfolds in the teaching methods employed. On one hand, analytical observation must be taught, allowing the gaze to distinguish different shades of color, to organize hierarchically levels of light and darkness and to evaluate subtleties in the saturation of hues. On the other hand, rigorous instruction in color mixing must ensure that the observable color, that is, the desired color, can be approached in an intuitive and precise way. In this article, the authors discuss the difficulties faced teaching color to student artists and how digital tools can be used for training the concept of observation and the analysis of color. These tools allow color schemes to be created. Here the authors discuss how these tools can be applied, based on the experience obtained in introductory painting classes involving students from the University of Salamanca.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IoT is emerging in all the dimensions of the physical world, and smart city is one of the most promising among them. This article focuses on the efficient utilisation of resources in an IoT system. IoT resources have been identified and classified in context to a smart city. The number and type of resources may grow dynamically in a smart city, and user's demand may also vary dynamically. Therefore, to maximise the throughput of the system, the resources must be deployed, managed, and used efficiently. This manuscript has identified the concept, role, and composition of the resource manager with respect to an IoT system and presents a game theoretic approach to manage the resources from provider point of view. Using a complete and dynamic use case, including the multiple resources, it illustrates the usability of the proposed approach. The major focus is on the efficient use of IoT resources in a smart city.
{"title":"A Game Theoretic Mechanism for Management of IoT Resources in a Smart City","authors":"Priya Matta, B. Pant, Sachin Sharma","doi":"10.4018/jitr.2021100109","DOIUrl":"https://doi.org/10.4018/jitr.2021100109","url":null,"abstract":"IoT is emerging in all the dimensions of the physical world, and smart city is one of the most promising among them. This article focuses on the efficient utilisation of resources in an IoT system. IoT resources have been identified and classified in context to a smart city. The number and type of resources may grow dynamically in a smart city, and user's demand may also vary dynamically. Therefore, to maximise the throughput of the system, the resources must be deployed, managed, and used efficiently. This manuscript has identified the concept, role, and composition of the resource manager with respect to an IoT system and presents a game theoretic approach to manage the resources from provider point of view. Using a complete and dynamic use case, including the multiple resources, it illustrates the usability of the proposed approach. The major focus is on the efficient use of IoT resources in a smart city.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128663527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a technology to store, process, and manage the data virtually over remote data centers through the internet. Due to the rapid growth of cloud services, the content distribution network broadly uses them to deliver data all over the globe. Due to the rapid generation of the data, delivering on the network is a challenging problem. As the number of replicas increases, the storage cost will be increased. This is a major issue in cloud-based content delivery networks. To overcome this issue, the authors developed a new model for cloud-based CDN with cost optimization algorithm STLM (storage, traffic, latency, cost minimization) to reduce the number of replicas in order to optimize the cost of storage and cost of content delivery. The authors have compared their proposed STLM algorithm with other existing algorithms. They adopt simulation with YouTube e-learning data retrieval. The proposed algorithm is used to place the contents in an efficient way to the geologically dispersed proxy servers in the cloud to encounter quality of service (QoS) and quality of experience (QoE).
{"title":"Cost Optimization for Dynamic Content Delivery in Cloud-Based Content Delivery Network","authors":"S. Sajithabanu, S. Balasundaram","doi":"10.4018/jitr.2021100102","DOIUrl":"https://doi.org/10.4018/jitr.2021100102","url":null,"abstract":"Cloud computing is a technology to store, process, and manage the data virtually over remote data centers through the internet. Due to the rapid growth of cloud services, the content distribution network broadly uses them to deliver data all over the globe. Due to the rapid generation of the data, delivering on the network is a challenging problem. As the number of replicas increases, the storage cost will be increased. This is a major issue in cloud-based content delivery networks. To overcome this issue, the authors developed a new model for cloud-based CDN with cost optimization algorithm STLM (storage, traffic, latency, cost minimization) to reduce the number of replicas in order to optimize the cost of storage and cost of content delivery. The authors have compared their proposed STLM algorithm with other existing algorithms. They adopt simulation with YouTube e-learning data retrieval. The proposed algorithm is used to place the contents in an efficient way to the geologically dispersed proxy servers in the cloud to encounter quality of service (QoS) and quality of experience (QoE).","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125290028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The heterogeneity and the increasing amount of the news published on the web create challenges in accessing them. In the authors' previous studies, they introduced a semantic web-based sports news aggregation system called BKSport, which manages to generate metadata for every news item. Providing an intuitive and expressive way to retrieve information and exploiting the advantages of semantic search technique is within their consideration. In this paper, they propose a method to transform natural language questions into SPARQL queries, which could be applied to existing semantic data. This method is mainly based on the following tasks: the construction of a semantic model representing a question, detection of ontology vocabularies and knowledge base elements in question, and their mapping to generate a query. Experiments are performed on a set of questions belonging to various categories, and the results show that the proposed method provides high precision.
{"title":"Semantic Querying of News Articles With Natural Language Questions","authors":"T. Cao, Quang-Minh Nguyen","doi":"10.4018/jitr.2021070103","DOIUrl":"https://doi.org/10.4018/jitr.2021070103","url":null,"abstract":"The heterogeneity and the increasing amount of the news published on the web create challenges in accessing them. In the authors' previous studies, they introduced a semantic web-based sports news aggregation system called BKSport, which manages to generate metadata for every news item. Providing an intuitive and expressive way to retrieve information and exploiting the advantages of semantic search technique is within their consideration. In this paper, they propose a method to transform natural language questions into SPARQL queries, which could be applied to existing semantic data. This method is mainly based on the following tasks: the construction of a semantic model representing a question, detection of ontology vocabularies and knowledge base elements in question, and their mapping to generate a query. Experiments are performed on a set of questions belonging to various categories, and the results show that the proposed method provides high precision.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"1492 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper has statically investigated the source code of open source software (OSS) projects to uncover the presence of vulnerabilities in the code. The conducted research emphasizes that the presence of vulnerabilities has adverse effects on the overall software quality. The authors found the increasing trends in the vulnerabilities as the lines of code (LOC) increases during the software evolution. This signifies the fact that the addition of new features or change requests into the OSS project may cause an increase in vulnerability. Further, the relation between software vulnerabilities and popularity is also examined. This research does not find the existence of any relationship among software vulnerabilities and popularity. This research will provide significant implications to the developers and project managers to better understand the present state of the software.
{"title":"Investigation of the Software Code Vulnerabilities' Impact on the Popularity of Open Source Software Projects","authors":"Madanjit Singh, Munish Saini, Manevpreet Kaur","doi":"10.4018/jitr.2021070104","DOIUrl":"https://doi.org/10.4018/jitr.2021070104","url":null,"abstract":"This paper has statically investigated the source code of open source software (OSS) projects to uncover the presence of vulnerabilities in the code. The conducted research emphasizes that the presence of vulnerabilities has adverse effects on the overall software quality. The authors found the increasing trends in the vulnerabilities as the lines of code (LOC) increases during the software evolution. This signifies the fact that the addition of new features or change requests into the OSS project may cause an increase in vulnerability. Further, the relation between software vulnerabilities and popularity is also examined. This research does not find the existence of any relationship among software vulnerabilities and popularity. This research will provide significant implications to the developers and project managers to better understand the present state of the software.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123833157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected devices, sensors, networks, and software. The internet of things keeps on extending with the number of its different equipment segments for smart cities, healthcare, smart homes, assisted living, smart vehicles, transportation, framework, and many more are the areas where the internet of things benefits human lives. IoT networks are meant to be monitored on real-time events, and if these devices get attacked, it can have an unfavorable effect on the system. This paper discussed many possible attacks at IoT networks and distributed denial of service (DDoS) attack is one of the most dangerous among them. Blockchain technology can be utilized to develop a framework to protect IoT systems; blockchain is a new technology used for cryptocurrency transactions. This paper proposed BIoTIDS an intrusion detection system for the IoT network using blockchain. BIoTIDS is able to detect an intruder in the IoT network and also able to identify DDoS attacks in IoT networks.
{"title":"A Novel Intrusion Detection System for Internet of Things Network Security","authors":"Arun Kumar Bediya, Rajendra Kumar","doi":"10.4018/jitr.2021070102","DOIUrl":"https://doi.org/10.4018/jitr.2021070102","url":null,"abstract":"Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected devices, sensors, networks, and software. The internet of things keeps on extending with the number of its different equipment segments for smart cities, healthcare, smart homes, assisted living, smart vehicles, transportation, framework, and many more are the areas where the internet of things benefits human lives. IoT networks are meant to be monitored on real-time events, and if these devices get attacked, it can have an unfavorable effect on the system. This paper discussed many possible attacks at IoT networks and distributed denial of service (DDoS) attack is one of the most dangerous among them. Blockchain technology can be utilized to develop a framework to protect IoT systems; blockchain is a new technology used for cryptocurrency transactions. This paper proposed BIoTIDS an intrusion detection system for the IoT network using blockchain. BIoTIDS is able to detect an intruder in the IoT network and also able to identify DDoS attacks in IoT networks.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"51 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents some possibilities of distance learning in music teacher education. The research presented two teacher training programs at Kazan Federal University. The distance learning tools allowed to realize some important subject-oriented principles include self-education, self-realization, and creative approach. The result data were collected from tests results and analysis of self-assessment and questionnaires by quantitative and qualitative experimental methods. The results of the level of musical knowledge and creative activity were increased in the second distance learning group, but not in the first traditional group. Based on the experimental research work, the authors concluded that distance learning environment is a perspective way for develop education system. A distance tool allows us to reflect modern society changes where online format became the priority way for getting new competencies including professional skills in music teacher education.
{"title":"Improving Professional Skills of Music Teachers Through the Use of Distance Learning","authors":"S. Karkina, R. Valeeva, A. I. Starčič","doi":"10.4018/JITR.2021040110","DOIUrl":"https://doi.org/10.4018/JITR.2021040110","url":null,"abstract":"This paper presents some possibilities of distance learning in music teacher education. The research presented two teacher training programs at Kazan Federal University. The distance learning tools allowed to realize some important subject-oriented principles include self-education, self-realization, and creative approach. The result data were collected from tests results and analysis of self-assessment and questionnaires by quantitative and qualitative experimental methods. The results of the level of musical knowledge and creative activity were increased in the second distance learning group, but not in the first traditional group. Based on the experimental research work, the authors concluded that distance learning environment is a perspective way for develop education system. A distance tool allows us to reflect modern society changes where online format became the priority way for getting new competencies including professional skills in music teacher education.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article presents a novel technique for retrieval of lung images from the collection of medical CT images. The proposed content-based medical image retrieval (CBMIR) technique uses an automated image segmentation technique called Delaunay triangulation (DT) in order to segment lung organ (region of interest) from the original medical image. The proposed method extracts novel and discriminant features from the segmented lung region instead of extracting novel features from the whole original image. For the extraction of shape features, the authors employ edge histogram descriptor (EHD) and geometric moments (GM), and for the extraction of texture features, the authors use gray-level co-occurrence matrix (GLCM) technique. The shape and texture features are combined to form the hybrid feature which is used for retrieval of similar lung images. The proposed method is evaluated using two benchmark datasets of lung CT images. The simulation results prove that the proposed CBMIR framework shows improved performance in terms of retrieval accuracy and retrieval time.
{"title":"Content-Based Medical Image Retrieval Using Delaunay Triangulation Segmentation Technique","authors":"Sneha Kugunavar, C. J. Prabhakar","doi":"10.4018/JITR.2021040103","DOIUrl":"https://doi.org/10.4018/JITR.2021040103","url":null,"abstract":"This article presents a novel technique for retrieval of lung images from the collection of medical CT images. The proposed content-based medical image retrieval (CBMIR) technique uses an automated image segmentation technique called Delaunay triangulation (DT) in order to segment lung organ (region of interest) from the original medical image. The proposed method extracts novel and discriminant features from the segmented lung region instead of extracting novel features from the whole original image. For the extraction of shape features, the authors employ edge histogram descriptor (EHD) and geometric moments (GM), and for the extraction of texture features, the authors use gray-level co-occurrence matrix (GLCM) technique. The shape and texture features are combined to form the hybrid feature which is used for retrieval of similar lung images. The proposed method is evaluated using two benchmark datasets of lung CT images. The simulation results prove that the proposed CBMIR framework shows improved performance in terms of retrieval accuracy and retrieval time.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although there have been numerous studies committed to MOOCs integrated with learning analytics, fewer of them have systematically reviewed the related literature. Using clustering techniques, bibliographic network visualization, content analysis, and STARLITE method, this study systematically reviews the literature in terms of learning analytics models, platforms of MOOCs, effect of learning analytics, effect of engagement, self-regulation, motivation, and online interactions, as well as other influencing factors of the effectiveness of MOOCs integrated with learning analytics. It provides constructive suggestions for designers, researchers, learners, and instructors of MOOCs so as to lower down learner dropout rates, increase completion rates, enhance learner engagement, and better learning outcomes. Future research into MOOCs could focus on the improvements on learning analytics because learning analytics could exert an essential influence on the effectiveness of MOOCs.
{"title":"A Literature Review on MOOCs Integrated With Learning Analytics","authors":"Zhonggen Yu","doi":"10.4018/JITR.2021040104","DOIUrl":"https://doi.org/10.4018/JITR.2021040104","url":null,"abstract":"Although there have been numerous studies committed to MOOCs integrated with learning analytics, fewer of them have systematically reviewed the related literature. Using clustering techniques, bibliographic network visualization, content analysis, and STARLITE method, this study systematically reviews the literature in terms of learning analytics models, platforms of MOOCs, effect of learning analytics, effect of engagement, self-regulation, motivation, and online interactions, as well as other influencing factors of the effectiveness of MOOCs integrated with learning analytics. It provides constructive suggestions for designers, researchers, learners, and instructors of MOOCs so as to lower down learner dropout rates, increase completion rates, enhance learner engagement, and better learning outcomes. Future research into MOOCs could focus on the improvements on learning analytics because learning analytics could exert an essential influence on the effectiveness of MOOCs.","PeriodicalId":296080,"journal":{"name":"J. Inf. Technol. Res.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121565034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}