Working set size estimation (WSS) is of great significance to improve the efficiency of program executing and memory arrangement in modern operating systems. Previous work proposed several methods to estimate WSS, including self-balloning, Zballoning and so on. However, these methods which are based on virtual machine usually cause a large overhead. Thus, using those methods to estimate WSS is impractical. In this paper, we propose a novel framework to efficiently estimate WSS with eBPF (extended Berkeley Packet Filter), a cutting-edge technology which monitors and filters data by being attached to the kernel. With an eBPF program pinned into the kernel, we get the times of page fault and other information of memory allocation. Moreover, we collect WSS via vanilla tool to train a predictive model to complete estimation work with LightGBM, a useful tool which performs well on generating decision trees over continuous value. The experimental results illustrate that our framework can estimate WSS precisely with 98.5% reduction in overhead compared to traditional methods.
{"title":"eBPF-based Working Set Size Estimation in Memory Management","authors":"Zhilu Lian, Yangzi Li, Zhixiang Chen, Shiwen Shan, Baoxin Han, Yuxin Su","doi":"10.1109/ICSS55994.2022.00036","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00036","url":null,"abstract":"Working set size estimation (WSS) is of great significance to improve the efficiency of program executing and memory arrangement in modern operating systems. Previous work proposed several methods to estimate WSS, including self-balloning, Zballoning and so on. However, these methods which are based on virtual machine usually cause a large overhead. Thus, using those methods to estimate WSS is impractical. In this paper, we propose a novel framework to efficiently estimate WSS with eBPF (extended Berkeley Packet Filter), a cutting-edge technology which monitors and filters data by being attached to the kernel. With an eBPF program pinned into the kernel, we get the times of page fault and other information of memory allocation. Moreover, we collect WSS via vanilla tool to train a predictive model to complete estimation work with LightGBM, a useful tool which performs well on generating decision trees over continuous value. The experimental results illustrate that our framework can estimate WSS precisely with 98.5% reduction in overhead compared to traditional methods.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126821701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ICSS55994.2022.00046
Xiuwen Tang, Jiazhen Gan, Zigui Jiang
Smart contracts can be considered as a service in the blockchain system and have been applied in many fields, covering financial products, online games, real estate, transportation and logistics. However, smart contract technology is still in its infancy. Development task is facing many difficulties and challenges, thus providing a set of new or improved development aids for the smart contract ecosystem is an urgent problem that needs to be solved. This paper proposes a smart contract code recommendation method based on graph neural network, which aims to facilitate the development of smart contracts and help developers realize smart contracts faster and more securely. Experimental results show that this method is better than the existing model of smart contract code recommendation in terms of accuracy.
{"title":"A Graph Neural Network-based Code Recommendation Method for Smart Contract Development","authors":"Xiuwen Tang, Jiazhen Gan, Zigui Jiang","doi":"10.1109/ICSS55994.2022.00046","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00046","url":null,"abstract":"Smart contracts can be considered as a service in the blockchain system and have been applied in many fields, covering financial products, online games, real estate, transportation and logistics. However, smart contract technology is still in its infancy. Development task is facing many difficulties and challenges, thus providing a set of new or improved development aids for the smart contract ecosystem is an urgent problem that needs to be solved. This paper proposes a smart contract code recommendation method based on graph neural network, which aims to facilitate the development of smart contracts and help developers realize smart contracts faster and more securely. Experimental results show that this method is better than the existing model of smart contract code recommendation in terms of accuracy.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129461976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/icss55994.2022.00013
C. Min, Dongcheng Zhao, Hua Lu
With the innovation of business applications and the continuous growth of user scale, the network presents the characteristics of "high-speed, large-scale, multi access and unpredictable". The management and control methods and means of the traditional network have been difficult to solve the challenges of existing networks and future networks. Therefore, the network managers urgently need to subvert the monitoring and troubleshooting methods of the traditional network and put forward real-time and flexible measurement solutions that can deal with scenario use cases such as the network state measurement, network failure detection, fault location and recovery. Therefore, the paper proposes a system and method for how the In-band Network Telemetry (INT) technology of switching equipment is applied in complex public packet networks, to deal with scenario use cases such as the network state measurement, network failure detection, fault location and recovery. However, in a cross-domain network, it is difficult to implement the network telemetry in a cross-domain network. Therefore, this paper proposes a method to realize the network telemetry in the cross-domain network (the complex public packet networks) by using the tunneling technology to deal with scenario use cases such as the network state measurement, network failure detection, fault location and recovery.
{"title":"The Processing Method of the Message Based on the In-band Network Telemetry Technology","authors":"C. Min, Dongcheng Zhao, Hua Lu","doi":"10.1109/icss55994.2022.00013","DOIUrl":"https://doi.org/10.1109/icss55994.2022.00013","url":null,"abstract":"With the innovation of business applications and the continuous growth of user scale, the network presents the characteristics of \"high-speed, large-scale, multi access and unpredictable\". The management and control methods and means of the traditional network have been difficult to solve the challenges of existing networks and future networks. Therefore, the network managers urgently need to subvert the monitoring and troubleshooting methods of the traditional network and put forward real-time and flexible measurement solutions that can deal with scenario use cases such as the network state measurement, network failure detection, fault location and recovery. Therefore, the paper proposes a system and method for how the In-band Network Telemetry (INT) technology of switching equipment is applied in complex public packet networks, to deal with scenario use cases such as the network state measurement, network failure detection, fault location and recovery. However, in a cross-domain network, it is difficult to implement the network telemetry in a cross-domain network. Therefore, this paper proposes a method to realize the network telemetry in the cross-domain network (the complex public packet networks) by using the tunneling technology to deal with scenario use cases such as the network state measurement, network failure detection, fault location and recovery.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/icss55994.2022.00012
Jiawei Wu, Yanchun Sun, Jiaqi Zhang
Software developers are encouraged to reuse mature third-party code repositories to accelerate their developing. The first step is to find some code repositories which satisfy developers’ demand for specific functionality. Repository hosting platforms, such as GitHub, NPM, etc. are good search databases. However, these platforms provide little retrieval function based on repositories’ functional semantics, which is not conducive for developers to get desired code repository by claing what functionality they require.To solve this problem, we propose and implement an open- source repository retrieval service. First, to extract structured functional semantics of open-source repositories, we design a NER (Named Entity Recognition) model to extract features of six different dimensions related to software development. Next, we construct a HIN (Heterogeneous Information Network) to represent nonstructured semantic information of repositories. Finally, by combining two modules preceding, we implement an open-source repository retrieval service, in which a software developer only needs to tell the service what functionality he (or she) wants and will get a ranked list of repositories as return. We further conduct experiments and the results demonstrate the effectiveness of the service.
{"title":"An Open-source Repository Retrieval Service Using Functional Semantics for Software Developers","authors":"Jiawei Wu, Yanchun Sun, Jiaqi Zhang","doi":"10.1109/icss55994.2022.00012","DOIUrl":"https://doi.org/10.1109/icss55994.2022.00012","url":null,"abstract":"Software developers are encouraged to reuse mature third-party code repositories to accelerate their developing. The first step is to find some code repositories which satisfy developers’ demand for specific functionality. Repository hosting platforms, such as GitHub, NPM, etc. are good search databases. However, these platforms provide little retrieval function based on repositories’ functional semantics, which is not conducive for developers to get desired code repository by claing what functionality they require.To solve this problem, we propose and implement an open- source repository retrieval service. First, to extract structured functional semantics of open-source repositories, we design a NER (Named Entity Recognition) model to extract features of six different dimensions related to software development. Next, we construct a HIN (Heterogeneous Information Network) to represent nonstructured semantic information of repositories. Finally, by combining two modules preceding, we implement an open-source repository retrieval service, in which a software developer only needs to tell the service what functionality he (or she) wants and will get a ranked list of repositories as return. We further conduct experiments and the results demonstrate the effectiveness of the service.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The attention mechanism is one of the research hotspots in deep learning. The attention mechanism in computer vision aims to make the network ignore irrelevant information and pay more attention to the practical knowledge of the critical point, which has the advantages of fewer parameters, fast calculation, and sound effects. In this paper, we introduce the mixed attention mechanism (CBAM) into the CenterNet object detection model to improve the performance of network detection on small data sets. At the same time, we used the ReLU6 activation function in the model to ensure that the model could be used in low-precision equipment. We use four small data sets extracted from COCO2017 to verify the model's validity, and the experimental results show that our improved model has better detection performance than the original model on small data sets.
{"title":"Improve the performance of CenterNet through hybrid attention mechanism CBAM","authors":"Tianyang Li, Tibing Zhang, Jian Wang, Zhongjie Wang, Ting He, Yufeng Zhang","doi":"10.1109/ICSS55994.2022.00043","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00043","url":null,"abstract":"The attention mechanism is one of the research hotspots in deep learning. The attention mechanism in computer vision aims to make the network ignore irrelevant information and pay more attention to the practical knowledge of the critical point, which has the advantages of fewer parameters, fast calculation, and sound effects. In this paper, we introduce the mixed attention mechanism (CBAM) into the CenterNet object detection model to improve the performance of network detection on small data sets. At the same time, we used the ReLU6 activation function in the model to ensure that the model could be used in low-precision equipment. We use four small data sets extracted from COCO2017 to verify the model's validity, and the experimental results show that our improved model has better detection performance than the original model on small data sets.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/icss55994.2022.00027
Zongpeng Du, Zhiqiang Li, Xiaodong Duan, Jing Wang
In this paper, we analyze the service information informing problem in the Computing Aware Networking (CAN). We introduce the motivation and the key use case of the Computing Aware Networking. For the service information informing, we describe the related mechanisms and an example procedure. Meanwhile, we explore the way to measure the computing in CAN. This paper provides a general overview of service information informing in CAN, explores the key technologies, and targets to work as a reference for the further study of CAN.
{"title":"Service Information Informing in Computing Aware Networking","authors":"Zongpeng Du, Zhiqiang Li, Xiaodong Duan, Jing Wang","doi":"10.1109/icss55994.2022.00027","DOIUrl":"https://doi.org/10.1109/icss55994.2022.00027","url":null,"abstract":"In this paper, we analyze the service information informing problem in the Computing Aware Networking (CAN). We introduce the motivation and the key use case of the Computing Aware Networking. For the service information informing, we describe the related mechanisms and an example procedure. Meanwhile, we explore the way to measure the computing in CAN. This paper provides a general overview of service information informing in CAN, explores the key technologies, and targets to work as a reference for the further study of CAN.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the emergence of terminal services such as VR, Internet of Vehicles, and autonomous driving that require enormous computing resources and network transmission resources, the computing power and network load of existing 5G base stations have been difficult to bear. Mobile edge computing technology effectively integrates the two technologies of mobile network and Internet, adding computing, storage, data processing and other functions on the mobile network side, which building an open platform to implant applications. The existing technology has shortcomings such as insufficient computing power of communication base stations, limited resources of a single edge computing node, etc., It is difficult to meet the development needs of the industry. Therefore, this paper proposes a base station computing power load balancing method based on distributed machine learning. Through distributed machine learning, the communication base station is used as a computing node, and the idle computing power of the base station is called to achieve a reasonable allocation of the computing power resources of the base station.
{"title":"Base station computing force resource load balancing strategy for distributed machine learning*","authors":"Mingkang Song, Mengke Yao, Xiaobin Wang, Jianming Zhou, Tenghui Ke, Peng Dai, Weidong Li, Xiaolong Zhou","doi":"10.1109/ICSS55994.2022.00030","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00030","url":null,"abstract":"With the emergence of terminal services such as VR, Internet of Vehicles, and autonomous driving that require enormous computing resources and network transmission resources, the computing power and network load of existing 5G base stations have been difficult to bear. Mobile edge computing technology effectively integrates the two technologies of mobile network and Internet, adding computing, storage, data processing and other functions on the mobile network side, which building an open platform to implant applications. The existing technology has shortcomings such as insufficient computing power of communication base stations, limited resources of a single edge computing node, etc., It is difficult to meet the development needs of the industry. Therefore, this paper proposes a base station computing power load balancing method based on distributed machine learning. Through distributed machine learning, the communication base station is used as a computing node, and the idle computing power of the base station is called to achieve a reasonable allocation of the computing power resources of the base station.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/icss55994.2022.00029
Huijuan Yao, Xiaodong Duan, Yuexia Fu
Facing the development trend of computing and network deep convergence, this paper proposes a computing-aware routing protocol(CARP), which introduces computing information as a cost into the network. CARP provides the capability to jointly schedule service requests to optimal service endpoints along network path, and guarantee the quality of service (QoS) for end users. Moreover, in order to make the network aware of the computing resource information, we develop the computing resource discovery and advertisement scheme, which achieves a better trade-off between network resource consumed by routing path and signaling load for computing resource information updates. Finally, The test results show that under the ideal network load, the system capacity of the proposed system can be increased by 33.17% compared with the existing MEC system, and the end-to-end average latency can be increased by 35.29%. Therefore, the performance analyses show that our proposed scheme can substantially achieve the joint optimization of computing and networking resources through a tighter integration of computing and networking.
{"title":"A computing-aware routing protocol for Computing Force Network","authors":"Huijuan Yao, Xiaodong Duan, Yuexia Fu","doi":"10.1109/icss55994.2022.00029","DOIUrl":"https://doi.org/10.1109/icss55994.2022.00029","url":null,"abstract":"Facing the development trend of computing and network deep convergence, this paper proposes a computing-aware routing protocol(CARP), which introduces computing information as a cost into the network. CARP provides the capability to jointly schedule service requests to optimal service endpoints along network path, and guarantee the quality of service (QoS) for end users. Moreover, in order to make the network aware of the computing resource information, we develop the computing resource discovery and advertisement scheme, which achieves a better trade-off between network resource consumed by routing path and signaling load for computing resource information updates. Finally, The test results show that under the ideal network load, the system capacity of the proposed system can be increased by 33.17% compared with the existing MEC system, and the end-to-end average latency can be increased by 35.29%. Therefore, the performance analyses show that our proposed scheme can substantially achieve the joint optimization of computing and networking resources through a tighter integration of computing and networking.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"126 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ICSS55994.2022.00020
Guiling Wang, Jun Fang, Jing Wang, Jian Yu, Liang Zhang, Yanbo Han
By leveraging IoT Big Data, BPM can gain real-time physical world information to make faster and more accurate decisions, but there is a technical gap between IoT sensors and businesses. To bridge the gap, an event penetration mechanism from IoT sensors to business processes is proposed along a practical case study. This paper presents a concrete IoT-BPM application case dealing with seaborne safety ensurance in transporting liquefied natural gas (LNG), analyzes its technical challenges, and examines the feasibility and supposed effects of the BRIBOT approach.
{"title":"Service-Based Event Penetration from IoT Sensors to Businesses: a Case Study","authors":"Guiling Wang, Jun Fang, Jing Wang, Jian Yu, Liang Zhang, Yanbo Han","doi":"10.1109/ICSS55994.2022.00020","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00020","url":null,"abstract":"By leveraging IoT Big Data, BPM can gain real-time physical world information to make faster and more accurate decisions, but there is a technical gap between IoT sensors and businesses. To bridge the gap, an event penetration mechanism from IoT sensors to business processes is proposed along a practical case study. This paper presents a concrete IoT-BPM application case dealing with seaborne safety ensurance in transporting liquefied natural gas (LNG), analyzes its technical challenges, and examines the feasibility and supposed effects of the BRIBOT approach.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.1109/ICSS55994.2022.00023
Florian Gallik, Yusuf Kirikkayis, M. Reichert
Enhancing business process management (BPM) with IoT capabilities offers promising perspectives for bridging the gap between digital processes and physical world. Although there exist many approaches for modeling IoT-aware processes, only few of them enable executing and monitoring these processes. This paper gives insights into our approach to model, execute and monitor IoT-aware processes by extending the Business Process Model and Notation 2.0 (BPMN 2.0) with IoT-specific artifacts and events. A particular focus of this paper is put on the engine enabling the execution and monitoring of IoT-aware processes. It has been fully implemented and validated for various IoT-aware processes. Due to the web-based access to the execution engine and loosely coupling IoT services, the approach may be applied in a wide variety of application domains.
{"title":"Modeling, Executing and Monitoring IoT-Aware Processes with BPM Technology","authors":"Florian Gallik, Yusuf Kirikkayis, M. Reichert","doi":"10.1109/ICSS55994.2022.00023","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00023","url":null,"abstract":"Enhancing business process management (BPM) with IoT capabilities offers promising perspectives for bridging the gap between digital processes and physical world. Although there exist many approaches for modeling IoT-aware processes, only few of them enable executing and monitoring these processes. This paper gives insights into our approach to model, execute and monitor IoT-aware processes by extending the Business Process Model and Notation 2.0 (BPMN 2.0) with IoT-specific artifacts and events. A particular focus of this paper is put on the engine enabling the execution and monitoring of IoT-aware processes. It has been fully implemented and validated for various IoT-aware processes. Due to the web-based access to the execution engine and loosely coupling IoT services, the approach may be applied in a wide variety of application domains.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121817279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}