Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529372
N. J. Navimipour, Bahareh Alami Milani
Cloud computing as a new and popular IT-based technology is a large-scale distributed computing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities and performance characteristics of a storage system. It is based on the user demand and failure occurs during response time. In data cloud, the selection of replica is an important issue for users and to access a data file. Our research is mainly focused on replica selection mechanism in order to achieve the best performance. This research proposes new replica selection base on ant colony optimization to improve average access time. We use Java to evaluate the approach. The obtained result showed better performance of the proposed algorithm.
{"title":"Replica selection in the cloud environments using an ant colony algorithm","authors":"N. J. Navimipour, Bahareh Alami Milani","doi":"10.1109/DIPDMWC.2016.7529372","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529372","url":null,"abstract":"Cloud computing as a new and popular IT-based technology is a large-scale distributed computing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities and performance characteristics of a storage system. It is based on the user demand and failure occurs during response time. In data cloud, the selection of replica is an important issue for users and to access a data file. Our research is mainly focused on replica selection mechanism in order to achieve the best performance. This research proposes new replica selection base on ant colony optimization to improve average access time. We use Java to evaluate the approach. The obtained result showed better performance of the proposed algorithm.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128009405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529399
N. Miloslavskaya, A. Tolstoy
The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.
本文定义了组织为其信息安全维护(ISM)任务解决方案制定人员配置策略时应考虑的结构和基本要求。
{"title":"Staffing policy for information security maintenance tasks solution","authors":"N. Miloslavskaya, A. Tolstoy","doi":"10.1109/DIPDMWC.2016.7529399","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529399","url":null,"abstract":"The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529389
A. Epishkina, K. Kogos, N. Nikiforova
The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.
{"title":"A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology","authors":"A. Epishkina, K. Kogos, N. Nikiforova","doi":"10.1109/DIPDMWC.2016.7529389","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529389","url":null,"abstract":"The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529365
Opoku-Mensah Eugene, Fengli Zhang, B. Yellakuor
The use of Search Engine enables the information seeker to seek information from a wide range of categories. Cultural information is one of the unique categories among the classes of information searched by users. This is because, there exists a significant relationship between a cultural keyword and its' originating society. Naturally, societies are supposed to be the highest authoritative body over their own cultural keywords. However, current ranking schemes treat all queries as the same without considering the uniqueness of cultural keywords, and this easily misleads information seekers. Therefore, to evaluate search engines performance on cultural keywords, we conducted a survey using some Ghanaian's terms as our case study on the basis of trust, relevance and accessibility. Surprisingly, the results showed that several documents from external sources (regions outside the location of that culture) had higher rankings against that of the originating source. Further investigations using precision and discounted cumulative gain proved that the cultural term problem is more of ranking than retrieval. Upon our findings, we propose a ranking framework based on the keyword-source namely TermSource. It is centered on cultural information advocacy, cultural websites management, and usage adaptation. By the adoption of this framework, the web will be enriched not only with cultural information but also be improved in ranking efficiency.
{"title":"Towards ranking cultural terms from originating source","authors":"Opoku-Mensah Eugene, Fengli Zhang, B. Yellakuor","doi":"10.1109/DIPDMWC.2016.7529365","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529365","url":null,"abstract":"The use of Search Engine enables the information seeker to seek information from a wide range of categories. Cultural information is one of the unique categories among the classes of information searched by users. This is because, there exists a significant relationship between a cultural keyword and its' originating society. Naturally, societies are supposed to be the highest authoritative body over their own cultural keywords. However, current ranking schemes treat all queries as the same without considering the uniqueness of cultural keywords, and this easily misleads information seekers. Therefore, to evaluate search engines performance on cultural keywords, we conducted a survey using some Ghanaian's terms as our case study on the basis of trust, relevance and accessibility. Surprisingly, the results showed that several documents from external sources (regions outside the location of that culture) had higher rankings against that of the originating source. Further investigations using precision and discounted cumulative gain proved that the cultural term problem is more of ranking than retrieval. Upon our findings, we propose a ranking framework based on the keyword-source namely TermSource. It is centered on cultural information advocacy, cultural websites management, and usage adaptation. By the adoption of this framework, the web will be enriched not only with cultural information but also be improved in ranking efficiency.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529354
Shaojing Zhang, Xin-Bing Xu
Based on DIVA(Directions Into of Articulators) model, the paper attempts to construct a neural network model which can better simulate speech perception, speech acquisition and speech production. The model classifies speech phonemes from formant frequencies by unsupervised learning, and through the modifications of DIVA model speech mapping and self-organizing mapping algorithm, it simulates the natural process of human speech acquisition in auditory. What's more, by the comparison with achievements of psychological phonetics experiments, the simulation result shows that the model we build can better identify the difference between prototype and non-prototype and fully form auditory perception for vowels, so it better shows the natural process of the ability of human speech acquisition.
本文试图在DIVA(Directions Into of Articulators)模型的基础上,构建一个能够更好地模拟语音感知、语音获取和语音产生的神经网络模型。该模型采用无监督学习的方法对语音音素进行共振频率分类,并通过对DIVA模型语音映射和自组织映射算法的改进,模拟了人类在听觉环境下语音习得的自然过程。此外,通过与心理语音学实验成果的对比,仿真结果表明,我们构建的模型能够更好地识别原型与非原型的区别,并对元音形成完整的听觉感知,从而更好地体现了人类语言习得能力的自然过程。
{"title":"Improvement and discussion on pronunciation method of DIVA model based on auditory perception space","authors":"Shaojing Zhang, Xin-Bing Xu","doi":"10.1109/DIPDMWC.2016.7529354","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529354","url":null,"abstract":"Based on DIVA(Directions Into of Articulators) model, the paper attempts to construct a neural network model which can better simulate speech perception, speech acquisition and speech production. The model classifies speech phonemes from formant frequencies by unsupervised learning, and through the modifications of DIVA model speech mapping and self-organizing mapping algorithm, it simulates the natural process of human speech acquisition in auditory. What's more, by the comparison with achievements of psychological phonetics experiments, the simulation result shows that the model we build can better identify the difference between prototype and non-prototype and fully form auditory perception for vowels, so it better shows the natural process of the ability of human speech acquisition.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115065226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529385
Zhaomin Chen, C. Yeo, Bu Sung Lee Francis, C. Lau
In this paper, we propose a network anomaly detection system which consists of a Maximal Information Coefficient based feature selection algorithm and a feature-based MSPCA detection algorithm, which can separate the anomalous information more efficiently. Maximal Information Coefficient can provide a good information measurement of any dependency between two random variables. MSPCA combines the benefit of PCA and wavelet analysis to reduce the effect of normal subspace contamination, which is the main challenge of PCA-based anomaly detection algorithm. We utilize multiple network flow features to describe the network traffic instead of using only volumes. To evaluate our proposed system, we test it on the DARPA 1999 dataset. The results indicate a large improvement when using our method compared to PCA-based anomaly detection algorithms.
{"title":"Combining MIC feature selection and feature-based MSPCA for network traffic anomaly detection","authors":"Zhaomin Chen, C. Yeo, Bu Sung Lee Francis, C. Lau","doi":"10.1109/DIPDMWC.2016.7529385","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529385","url":null,"abstract":"In this paper, we propose a network anomaly detection system which consists of a Maximal Information Coefficient based feature selection algorithm and a feature-based MSPCA detection algorithm, which can separate the anomalous information more efficiently. Maximal Information Coefficient can provide a good information measurement of any dependency between two random variables. MSPCA combines the benefit of PCA and wavelet analysis to reduce the effect of normal subspace contamination, which is the main challenge of PCA-based anomaly detection algorithm. We utilize multiple network flow features to describe the network traffic instead of using only volumes. To evaluate our proposed system, we test it on the DARPA 1999 dataset. The results indicate a large improvement when using our method compared to PCA-based anomaly detection algorithms.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133177323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529397
S. Kulik
The effective factographic information retrieval problem has been investigated in the paper. The primary objective of this paper is to outline factographic information retrieval and new Lemma related to properties of factographic information retrieval. The special curriculum has been developed for the set competences. The curriculum contains specialized disciplines. These disciplines use factographic information retrieval. Factographic information retrieval has effectiveness indicators. New Lemma about effectiveness and properties of factographic information retrieval was proved.
{"title":"Factographic information retrieval for competences forming","authors":"S. Kulik","doi":"10.1109/DIPDMWC.2016.7529397","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529397","url":null,"abstract":"The effective factographic information retrieval problem has been investigated in the paper. The primary objective of this paper is to outline factographic information retrieval and new Lemma related to properties of factographic information retrieval. The special curriculum has been developed for the set competences. The curriculum contains specialized disciplines. These disciplines use factographic information retrieval. Factographic information retrieval has effectiveness indicators. New Lemma about effectiveness and properties of factographic information retrieval was proved.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116103269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529384
Mingxiao Ma, Jos Weber, Jan van den Berg
In cloud computing, the paradigm of data outsourcing introduces security challenges, which requires an independent auditing service to check the data integrity in the cloud. Many existing integrity checking protocols cannot be applied to the auditing service because they can only deal with static data, but it is natural for the client to dynamically update their remotely stored data. Thus, an efficient and secure auditing protocol enabling data dynamics is desired to convince the client that the data are correctly stored in the cloud. In this work, we propose a privacy-preserving public auditing cloud storage protocol enabling data dynamics in the standard model. Inspired by a recent homomorphic network coding signature scheme, we employ a data integrity auditing protocol based on the strong RSA assumption, and extend it to enable a third party auditor to audit client's data without learning the data content. Then we further extend our auditing protocol to support the data dynamic operations (modification, insertion and deletion), which achieves high security level in the standard model. At last we prove the security and justify the performance of our proposed protocol through concrete experiments and comparisons with the state of the art.
{"title":"Secure public-auditing cloud storage enabling data dynamics in the standard model","authors":"Mingxiao Ma, Jos Weber, Jan van den Berg","doi":"10.1109/DIPDMWC.2016.7529384","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529384","url":null,"abstract":"In cloud computing, the paradigm of data outsourcing introduces security challenges, which requires an independent auditing service to check the data integrity in the cloud. Many existing integrity checking protocols cannot be applied to the auditing service because they can only deal with static data, but it is natural for the client to dynamically update their remotely stored data. Thus, an efficient and secure auditing protocol enabling data dynamics is desired to convince the client that the data are correctly stored in the cloud. In this work, we propose a privacy-preserving public auditing cloud storage protocol enabling data dynamics in the standard model. Inspired by a recent homomorphic network coding signature scheme, we employ a data integrity auditing protocol based on the strong RSA assumption, and extend it to enable a third party auditor to audit client's data without learning the data content. Then we further extend our auditing protocol to support the data dynamic operations (modification, insertion and deletion), which achieves high security level in the standard model. At last we prove the security and justify the performance of our proposed protocol through concrete experiments and comparisons with the state of the art.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126400438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529398
J. Domashova, Elena Pisarchik
The paper discusses identification of core disciplines for the most effective development of basic professional competences set forth by “Financial monitoring specialist (in the area of anti-money laundering and combating financing of terrorism)” professional standard. It builds on an earlier effort to translate the capabilities of the professional standard into educational standard competences and outlines the steps that were carried out to identify and align the disciplines essential for fostering the core capabilities of the standard.
{"title":"Identifying core disciplines to foster the development of professional competences","authors":"J. Domashova, Elena Pisarchik","doi":"10.1109/DIPDMWC.2016.7529398","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529398","url":null,"abstract":"The paper discusses identification of core disciplines for the most effective development of basic professional competences set forth by “Financial monitoring specialist (in the area of anti-money laundering and combating financing of terrorism)” professional standard. It builds on an earlier effort to translate the capabilities of the professional standard into educational standard competences and outlines the steps that were carried out to identify and align the disciplines essential for fostering the core capabilities of the standard.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529395
Erik L. Moore
Professionals entering the information security field need new models to manage user reactions to the loss of control over their digital identities. Escalations in authentication technologies like behavioral blocks and biometric data breaches are reducing the user's control over the management of their digital identities. Simultaneously, users are becoming more digitally dependant regarding financial transactions, buying food, emotionally connecting with loved ones on social media, managing personal information, and writing personal documents. This research presents a tool to address this issue pulled from the fields of education, political science, psychology, and cyber security. It is combined as a set of models to be delivered as part of information security curricula. Recent analysis of brain scans and population behavior studies have suggested that when people feel their identity at risk and feel disempowered they will have a stronger disposition towards authoritarianism, desire for retribution, and a desire for simplistic solutions instead of acting with reasoned and adaptive responses. Indicators in other fields suggest that the way professionals and educators characterize incidents that threaten digital identity can habituate different types of societal attitudes about the Internet and institutional data usage. The model presented herein should help cyber security educators characterize user responds to digital identity threats, and provides a scale for evaluating those responses.
{"title":"Managing the loss of control over cyber identity","authors":"Erik L. Moore","doi":"10.1109/DIPDMWC.2016.7529395","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529395","url":null,"abstract":"Professionals entering the information security field need new models to manage user reactions to the loss of control over their digital identities. Escalations in authentication technologies like behavioral blocks and biometric data breaches are reducing the user's control over the management of their digital identities. Simultaneously, users are becoming more digitally dependant regarding financial transactions, buying food, emotionally connecting with loved ones on social media, managing personal information, and writing personal documents. This research presents a tool to address this issue pulled from the fields of education, political science, psychology, and cyber security. It is combined as a set of models to be delivered as part of information security curricula. Recent analysis of brain scans and population behavior studies have suggested that when people feel their identity at risk and feel disempowered they will have a stronger disposition towards authoritarianism, desire for retribution, and a desire for simplistic solutions instead of acting with reasoned and adaptive responses. Indicators in other fields suggest that the way professionals and educators characterize incidents that threaten digital identity can habituate different types of societal attitudes about the Internet and institutional data usage. The model presented herein should help cyber security educators characterize user responds to digital identity threats, and provides a scale for evaluating those responses.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}