Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095948
Min-Fang Wei
As social media plays an increasingly important role in people's lives, microblog has become a very popular social platform in Chin. While microblog brings convenience to people in information transmission, it also brings the problem of many criminals using it to commit fraud., Fraud gangs use microblog to set language traps to defraud others of money and profit. In this regard, the sociogram is used to represent the social network of microblog. The network is a directed graph, with nodes representing microblog users and connecting lines representing the propagation path of microblog, so as to connect the initiation node of microblog and the forwarding node of microblog. In addition, this article will analyze the methods used by fraud groups through in-depth analysis of social networks and the use of data mining techniques. In the following paper, the structural composition and detailed characteristics of the microblog fraud group will be analyzed in detail. It looks for potential fraud groups on microblog to help users identify scams and avoid being tricked.
{"title":"Study on Mining Method of Network Fraud Gang Based on Big Data Analysis of Microblog","authors":"Min-Fang Wei","doi":"10.1109/IICSPI48186.2019.9095948","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095948","url":null,"abstract":"As social media plays an increasingly important role in people's lives, microblog has become a very popular social platform in Chin. While microblog brings convenience to people in information transmission, it also brings the problem of many criminals using it to commit fraud., Fraud gangs use microblog to set language traps to defraud others of money and profit. In this regard, the sociogram is used to represent the social network of microblog. The network is a directed graph, with nodes representing microblog users and connecting lines representing the propagation path of microblog, so as to connect the initiation node of microblog and the forwarding node of microblog. In addition, this article will analyze the methods used by fraud groups through in-depth analysis of social networks and the use of data mining techniques. In the following paper, the structural composition and detailed characteristics of the microblog fraud group will be analyzed in detail. It looks for potential fraud groups on microblog to help users identify scams and avoid being tricked.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123503773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9096038
Sun Zhen, Qingdang Li, Wang Lu, Jun-Tao Wu
The storage and intelligent retrieval of massive video data is a hot topic in the field of surveillance. This paper designs a system architecture for distributed storage, indexing, and querying of ultra-magnitude video and its source data. By adopting a loosely coupled architecture, the various processing modules and services are completely separated. The system supports full processing from storage to semantic retrieval, enabling seamless expansion of the system and supporting uninterrupted video streaming.
{"title":"A Distributed Video Monitoring System Architecture for Semantic Retrieval","authors":"Sun Zhen, Qingdang Li, Wang Lu, Jun-Tao Wu","doi":"10.1109/IICSPI48186.2019.9096038","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9096038","url":null,"abstract":"The storage and intelligent retrieval of massive video data is a hot topic in the field of surveillance. This paper designs a system architecture for distributed storage, indexing, and querying of ultra-magnitude video and its source data. By adopting a loosely coupled architecture, the various processing modules and services are completely separated. The system supports full processing from storage to semantic retrieval, enabling seamless expansion of the system and supporting uninterrupted video streaming.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9096011
Yuanyuan Zou, Xiaojin Guo
Mobile social networks are growing rapidly with the development of mobile terminals and wireless networks. However, the risk of leakage of trajectory privacy is increasing day by day. This paper proposed a personalized trajectory privacy preserving algorithm on mobile social networks. The algorithm solves the problem of over-protection under the traditional privacy protection according to the difference of privacy preserving requirements of mobile users. At the same time, the user forms an equivalence class by selecting a certain number of surrounding user partners to solve the privacy leakage problem caused by the excessive difference between the randomly generated false trajectory and the real trajectory. Finally, the experimental results show that the proposed scheme can generate trajectories similar to users, and the user's position and trajectory privacy average level exceeded 0.5, which proves the effectiveness of the algorithm.
{"title":"Personalized Trajectory Privacy-preserving Scheme for Mobile Social Networks","authors":"Yuanyuan Zou, Xiaojin Guo","doi":"10.1109/IICSPI48186.2019.9096011","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9096011","url":null,"abstract":"Mobile social networks are growing rapidly with the development of mobile terminals and wireless networks. However, the risk of leakage of trajectory privacy is increasing day by day. This paper proposed a personalized trajectory privacy preserving algorithm on mobile social networks. The algorithm solves the problem of over-protection under the traditional privacy protection according to the difference of privacy preserving requirements of mobile users. At the same time, the user forms an equivalence class by selecting a certain number of surrounding user partners to solve the privacy leakage problem caused by the excessive difference between the randomly generated false trajectory and the real trajectory. Finally, the experimental results show that the proposed scheme can generate trajectories similar to users, and the user's position and trajectory privacy average level exceeded 0.5, which proves the effectiveness of the algorithm.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124982053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095971
Taizhi Lv, Zhiwei Gan, Peng Wei, Tao Zhao
In recent years, catering safety problems have occurred frequently, and people increasingly hope that catering safety can be guaranteed. A catering safety tracing system is designed and developed to solve catering safety traceability problems. Block chain is a de-centralized database which uses distributed book database to store data. By block chain technology, this system can ensure the reliability of traceability information. By a web application and a hybrid APP, users can manage and query trace information. The SSM (Spring + Spring MVC+ Mybatis) framework which are used in the web application development simplifies the development and reduces the deployment difficulty.
近年来,餐饮安全问题频频发生,人们越来越希望餐饮安全能够得到保障。为解决餐饮安全溯源问题,设计开发了餐饮安全溯源系统。区块链是一种去中心化的数据库,它使用分布式图书数据库来存储数据。该系统通过区块链技术,保证了可追溯信息的可靠性。通过web应用程序和混合APP,用户可以对跟踪信息进行管理和查询。在web应用程序开发中使用SSM (Spring + Spring MVC+ Mybatis)框架,简化了开发,降低了部署难度。
{"title":"The Design and Implementation of Catering Safety Tracing System Based on Block Chain","authors":"Taizhi Lv, Zhiwei Gan, Peng Wei, Tao Zhao","doi":"10.1109/IICSPI48186.2019.9095971","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095971","url":null,"abstract":"In recent years, catering safety problems have occurred frequently, and people increasingly hope that catering safety can be guaranteed. A catering safety tracing system is designed and developed to solve catering safety traceability problems. Block chain is a de-centralized database which uses distributed book database to store data. By block chain technology, this system can ensure the reliability of traceability information. By a web application and a hybrid APP, users can manage and query trace information. The SSM (Spring + Spring MVC+ Mybatis) framework which are used in the web application development simplifies the development and reduces the deployment difficulty.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095949
Xiaoyun Huang, Huang Andi, Jingpeng Shao
In a deregulated system, the income of a power generation company will strongly depend on the scheduling of the generation. The traditional hydro scheduling method that has the goal of minimum production cost is no longer valid. This paper presents a novel approach to the short-term hydro power scheduling under the electricity market environment. The hydro power here includes the pump-storage power plant and the conventional hydro power plant. A suitable model for the deregulated market is built. The algorithm based on dynamic programming is developed. To cope with the uncertainty of the spot price and the inflow, the Monte-Carlo method is implemented through the construction of different scenarios of spot price and inflow according to specific probability distribution. The calculation for the test case shows that the algorithm is a practical one.
{"title":"Short-term Hydro Power Scheduling under the Electricity Market Environment","authors":"Xiaoyun Huang, Huang Andi, Jingpeng Shao","doi":"10.1109/IICSPI48186.2019.9095949","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095949","url":null,"abstract":"In a deregulated system, the income of a power generation company will strongly depend on the scheduling of the generation. The traditional hydro scheduling method that has the goal of minimum production cost is no longer valid. This paper presents a novel approach to the short-term hydro power scheduling under the electricity market environment. The hydro power here includes the pump-storage power plant and the conventional hydro power plant. A suitable model for the deregulated market is built. The algorithm based on dynamic programming is developed. To cope with the uncertainty of the spot price and the inflow, the Monte-Carlo method is implemented through the construction of different scenarios of spot price and inflow according to specific probability distribution. The calculation for the test case shows that the algorithm is a practical one.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095903
Bo Xiao, Minghua Zhu
Vibration fault detection becomes increasingly used for economical and safety reasons. However, current research reveals some problems such as low accuracy of fault detection, few effective in-depth calculation of vibration data and few flexible architectures in that area. In this paper, a vibration fault detection Cyber-Physical System (CPS)with service support (S-VFDCPS) is presented. From the Service-Oriented Architecture (SOA) point of view, S-VFDCPS consists of enterprise level, gateway level and endpoint level, with relevant vibration detection services on each level. From the Cyber-Physical system (CPS) point of view, it contains three layers: the monitoring and control layer, the network layer and the device layer. Data processing algorithms and services are proposed quantifying the criteria of fault evaluation. It is shown by testing results that our proposed approach and the improvement in design make S-VFDCPS more flexible and accurate in real-time vibration fault detection.
{"title":"Vibration Fault Detection Cyber-physical System with Service Support","authors":"Bo Xiao, Minghua Zhu","doi":"10.1109/IICSPI48186.2019.9095903","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095903","url":null,"abstract":"Vibration fault detection becomes increasingly used for economical and safety reasons. However, current research reveals some problems such as low accuracy of fault detection, few effective in-depth calculation of vibration data and few flexible architectures in that area. In this paper, a vibration fault detection Cyber-Physical System (CPS)with service support (S-VFDCPS) is presented. From the Service-Oriented Architecture (SOA) point of view, S-VFDCPS consists of enterprise level, gateway level and endpoint level, with relevant vibration detection services on each level. From the Cyber-Physical system (CPS) point of view, it contains three layers: the monitoring and control layer, the network layer and the device layer. Data processing algorithms and services are proposed quantifying the criteria of fault evaluation. It is shown by testing results that our proposed approach and the improvement in design make S-VFDCPS more flexible and accurate in real-time vibration fault detection.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"10 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9096005
Yanfen Gan, Jixiang Yang
Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.
{"title":"An Effective Scheme for Copy-move Forgery Detection Using Polar Sine Transform","authors":"Yanfen Gan, Jixiang Yang","doi":"10.1109/IICSPI48186.2019.9096005","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9096005","url":null,"abstract":"Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116553178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095967
Jianye Wang, Chengshuo Deng, Shibo Zhang, Xiaoshuai Guo, Guoan Yang
With the severe piping vibration caused by the gas pulsation of the reciprocating compressor, installing the orifice plate near the large container of the pipe system is an effective and simple solution for decreasing the gas pulsation in the field. In this paper, the fluid dynamics analysis proves that the improved orifice tube structure can better decrease the gas pulsation, and it is effective to reduce the piping vibration of a reciprocating compressor unit which is caused by the gas pulsation. The gas pulsation amplitude in the compressor pipeline system is decreased fundamentally by using the orifice tube, and the unit is in good running condition after the transformation, which effectively guarantees the long-term stable operation of the unit.
{"title":"Research on Vibration Control in a Reciprocating Compressor Piping System Using an Orifice Tube Structure","authors":"Jianye Wang, Chengshuo Deng, Shibo Zhang, Xiaoshuai Guo, Guoan Yang","doi":"10.1109/IICSPI48186.2019.9095967","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095967","url":null,"abstract":"With the severe piping vibration caused by the gas pulsation of the reciprocating compressor, installing the orifice plate near the large container of the pipe system is an effective and simple solution for decreasing the gas pulsation in the field. In this paper, the fluid dynamics analysis proves that the improved orifice tube structure can better decrease the gas pulsation, and it is effective to reduce the piping vibration of a reciprocating compressor unit which is caused by the gas pulsation. The gas pulsation amplitude in the compressor pipeline system is decreased fundamentally by using the orifice tube, and the unit is in good running condition after the transformation, which effectively guarantees the long-term stable operation of the unit.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134245367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095911
Peng-Xia Cao, Wen-Xin Li, Wei-Ping Ma
For markerless tracking registration methods, there exist a lot of problems like tracking registration failure and slow speed in the complex environment. To solve the problem, a random fern classifier is applied to the process of the markerless augmented reality tracking registration. This method uses a target object image in a real scene as a template, and the target of each frame of image is detected by the random fern classifier. By estimating the three-dimensional pose, the registered virtual object can be rendered to implement the augmented reality tracking registration. This method can solves the problems of tracking registration failures due to the change of ambient lighting or the targets were occluded. It has better real-time performance than the traditional wide baseline matching algorithm.
{"title":"Tracking Registration Algorithm for Augmented Reality based on Random Fern","authors":"Peng-Xia Cao, Wen-Xin Li, Wei-Ping Ma","doi":"10.1109/IICSPI48186.2019.9095911","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095911","url":null,"abstract":"For markerless tracking registration methods, there exist a lot of problems like tracking registration failure and slow speed in the complex environment. To solve the problem, a random fern classifier is applied to the process of the markerless augmented reality tracking registration. This method uses a target object image in a real scene as a template, and the target of each frame of image is detected by the random fern classifier. By estimating the three-dimensional pose, the registered virtual object can be rendered to implement the augmented reality tracking registration. This method can solves the problems of tracking registration failures due to the change of ambient lighting or the targets were occluded. It has better real-time performance than the traditional wide baseline matching algorithm.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129137606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095968
Yang Bai, Liping Zhang, Sheng Yan
In order to solve the problem of rare comments and low quality, a method of automatically generating code comments by comment reuse and program parsing is proposed. First, the clone code is detected by Nicad, and the codes and their comments are extracted. Then, through a series of heuristic rules such as dedrying and generalization, the code and the relatively simple code comments are streamlined and optimized. For complex code comments with obvious semantic characteristics, the program parsing method is used to optimize, finally, the comments are mapped to the code to automatically generate comments for the target code. In order to verify the validity of the experiment, the code comments in the 14 target software were manually verified, the comment results were evaluated, and then the five softwares were compared with the previous methods of ours team. The experimental results show that 33.69% of the code comments are good, the generated comments are 14.13% higher than the previous experimental methods, and the quality is improved by about 5%.
{"title":"Automatic Generation of Code Comments Based on Comment Reuse and Program Parsing","authors":"Yang Bai, Liping Zhang, Sheng Yan","doi":"10.1109/IICSPI48186.2019.9095968","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095968","url":null,"abstract":"In order to solve the problem of rare comments and low quality, a method of automatically generating code comments by comment reuse and program parsing is proposed. First, the clone code is detected by Nicad, and the codes and their comments are extracted. Then, through a series of heuristic rules such as dedrying and generalization, the code and the relatively simple code comments are streamlined and optimized. For complex code comments with obvious semantic characteristics, the program parsing method is used to optimize, finally, the comments are mapped to the code to automatically generate comments for the target code. In order to verify the validity of the experiment, the code comments in the 14 target software were manually verified, the comment results were evaluated, and then the five softwares were compared with the previous methods of ours team. The experimental results show that 33.69% of the code comments are good, the generated comments are 14.13% higher than the previous experimental methods, and the quality is improved by about 5%.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}