Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530281
N. Arastouie, M. Razzazi
Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.
{"title":"Hunter: An Anti spyware for windows Operating System","authors":"N. Arastouie, M. Razzazi","doi":"10.1109/ICTTA.2008.4530281","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530281","url":null,"abstract":"Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530344
B.F. Saab, M. S. Hajji
This paper describes a framework for the rapid development of business applications. The framework XMAN differs from similar commercially available packages and provides some advantages over them. XMAN utilizes XML in a specified way in order to achieve the goals of making business applications development rapid, easy, flexible and, in the same time, open to necessary interventions. Change management is also considered. XMAN is multi-tier based. It provides the business application under development with representations for data model, business logic, privileges, component interfaces and user interfaces. The paper describes the layers, techniques and components of XMAN and explores possible future extensions.
{"title":"XMAN; A Framework for Rapid Development of Business Applications","authors":"B.F. Saab, M. S. Hajji","doi":"10.1109/ICTTA.2008.4530344","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530344","url":null,"abstract":"This paper describes a framework for the rapid development of business applications. The framework XMAN differs from similar commercially available packages and provides some advantages over them. XMAN utilizes XML in a specified way in order to achieve the goals of making business applications development rapid, easy, flexible and, in the same time, open to necessary interventions. Change management is also considered. XMAN is multi-tier based. It provides the business application under development with representations for data model, business logic, privileges, component interfaces and user interfaces. The paper describes the layers, techniques and components of XMAN and explores possible future extensions.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4529971
R. H. M'tir, L. Jéribi, B. Rumpler
The aim of our research is to build a cooperative e- Learning system adapted to different learners' profiles (knowledge levels, pedagogical preferences, goals, etc.). In order to improve e-Learning systems, we propose to capitalize and reuse learning experiences. The capitalization consists in modeling the learning situation of a given learner. The learning situation model includes the learner profile as well as the learning process features.The reuse consists in exploiting previous experiences in order to offer to the current learner the best suited experience to his needs. This experience should be already validated and evaluated by other learners having similar learning profiles. Our experiences reuse approach is based on the case- based reasoning. The case-based reasoning defines a reasoning approach based on the reuse concept.
{"title":"Learners Experiences Reuse to Improve Personalized E-Learning","authors":"R. H. M'tir, L. Jéribi, B. Rumpler","doi":"10.1109/ICTTA.2008.4529971","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529971","url":null,"abstract":"The aim of our research is to build a cooperative e- Learning system adapted to different learners' profiles (knowledge levels, pedagogical preferences, goals, etc.). In order to improve e-Learning systems, we propose to capitalize and reuse learning experiences. The capitalization consists in modeling the learning situation of a given learner. The learning situation model includes the learner profile as well as the learning process features.The reuse consists in exploiting previous experiences in order to offer to the current learner the best suited experience to his needs. This experience should be already validated and evaluated by other learners having similar learning profiles. Our experiences reuse approach is based on the case- based reasoning. The case-based reasoning defines a reasoning approach based on the reuse concept.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530103
N. Gribaa, N. Khlifa, K. Hamrouni
The paper focus on the problem of scintigraphic images restoration. These images are often disturbed by the bad detection equipment quality. The aim is to improve regions of interest perception, to help useful information extraction and so to allow good understanding of the pathological phenomenon. The restoration is an ill-posed problem. So, inverting the the distortion model in presence of additive noise is often numerically unstable. We propose, then, a new framework based on the Fourier and the Wavelet domain, in order to benefit from the advantages of each one. The Fourier regularized deconvolution exploits the Fourier representation efficiency of the colored noise. Whereas the wavelet packets denoising exploits the wavelet representation efficiency and the good localization of inherent noise in this domain. We noticed the performance of the proposed method in terms of edges preservation, contrast and uniformity in the images.
{"title":"Scintigraphic images restoration using jointly Fourier and Wavelet domains","authors":"N. Gribaa, N. Khlifa, K. Hamrouni","doi":"10.1109/ICTTA.2008.4530103","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530103","url":null,"abstract":"The paper focus on the problem of scintigraphic images restoration. These images are often disturbed by the bad detection equipment quality. The aim is to improve regions of interest perception, to help useful information extraction and so to allow good understanding of the pathological phenomenon. The restoration is an ill-posed problem. So, inverting the the distortion model in presence of additive noise is often numerically unstable. We propose, then, a new framework based on the Fourier and the Wavelet domain, in order to benefit from the advantages of each one. The Fourier regularized deconvolution exploits the Fourier representation efficiency of the colored noise. Whereas the wavelet packets denoising exploits the wavelet representation efficiency and the good localization of inherent noise in this domain. We noticed the performance of the proposed method in terms of edges preservation, contrast and uniformity in the images.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130650971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530244
Y. A. Siddeeq, Dean, Ammar A. Khuder, N. Muhammed, Abdullah
The estimation of hopping rate for frequency hoping signal has been done by using two simulation models based on, multiple-hop autocorrelation (MHAC) and multiple stages frequency hopping hop rate detector (MS-FH-HRD) processors.
{"title":"Comparison and Investigation of Hopping Rate Estimation Processes","authors":"Y. A. Siddeeq, Dean, Ammar A. Khuder, N. Muhammed, Abdullah","doi":"10.1109/ICTTA.2008.4530244","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530244","url":null,"abstract":"The estimation of hopping rate for frequency hoping signal has been done by using two simulation models based on, multiple-hop autocorrelation (MHAC) and multiple stages frequency hopping hop rate detector (MS-FH-HRD) processors.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530195
K. shalghum, H. Sigiuk, K.A. Khalfalla, Y.S. Kshedan
WiMAX is currently one of the hottest technologies for broadband wireless access (BWA) systems which propose a wireless high-speed and high performance access system, with service differentiation for distinct classes of traffic and QoS requirements. IEEE802.16 standard specifies the PHY and MAC layers for BWA system and provides the flexibility of TDD and FDD allocation schemes. However, in spite of including the possibility of QoS support, the standard does not define how to schedule different types of traffic. In this paper, we present a modified scheme which is based on a reservation priority access control (RPAC) using FDD allocation approach, and we the behavior of this reservation scheme is analyzed and evaluated under balanced and unbalanced traffic conditions with the inclusion of variable priorities between stations.
{"title":"Performance Evaluation of IEEE802.16 Using a Modified Reservation Scheme Under Different Loading Conditions","authors":"K. shalghum, H. Sigiuk, K.A. Khalfalla, Y.S. Kshedan","doi":"10.1109/ICTTA.2008.4530195","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530195","url":null,"abstract":"WiMAX is currently one of the hottest technologies for broadband wireless access (BWA) systems which propose a wireless high-speed and high performance access system, with service differentiation for distinct classes of traffic and QoS requirements. IEEE802.16 standard specifies the PHY and MAC layers for BWA system and provides the flexibility of TDD and FDD allocation schemes. However, in spite of including the possibility of QoS support, the standard does not define how to schedule different types of traffic. In this paper, we present a modified scheme which is based on a reservation priority access control (RPAC) using FDD allocation approach, and we the behavior of this reservation scheme is analyzed and evaluated under balanced and unbalanced traffic conditions with the inclusion of variable priorities between stations.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530112
Youssef Zinbi, Youssef Chahir, Abder Elmoataz
The paper presents an object segmentation approach that combines optical flow and active contour model to characterize objects and follow them in video sequences. Our aims is to discriminate moving objects from a static background. The approach is based on a minimization of a functional of energy (E) which uses perceptual information in regions of interest (ROI) in an image, in conjunction with a mixture of Gaussian to model voxels of the background image and those of the visual objects. In this work, we compute the optical flow then we use the result of the optical flow as an input in an active contour model. Experiments with a number of test sequences are promising and extend the numerous works on this subject.
{"title":"Moving object Segmentation; using optical flow with active contour model","authors":"Youssef Zinbi, Youssef Chahir, Abder Elmoataz","doi":"10.1109/ICTTA.2008.4530112","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530112","url":null,"abstract":"The paper presents an object segmentation approach that combines optical flow and active contour model to characterize objects and follow them in video sequences. Our aims is to discriminate moving objects from a static background. The approach is based on a minimization of a functional of energy (E) which uses perceptual information in regions of interest (ROI) in an image, in conjunction with a mixture of Gaussian to model voxels of the background image and those of the visual objects. In this work, we compute the optical flow then we use the result of the optical flow as an input in an active contour model. Experiments with a number of test sequences are promising and extend the numerous works on this subject.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530007
P. Moradi, M. Ebrahim, M. Ebadzadeh
The increasing of the electronic documents and users has led to the creation of new paradigms of personalizing results of information retrieval systems and its goal is to better service to users based on their profiles. Personalized content retrieval aims at improving the retrieval process by taking into account the particular interests of individual users. The goal of information retrieval systems is to personalize ranking documents based on user profiles. In this paper we proposed new method for personalizing results of information retrieval systems based on extended fuzzy concept networks. In this method both pages and user profiles will be showed as extended fuzzy concept networks. In an extended fuzzy concept network, there are four kinds of fuzzy relationships between concepts (1) fuzzy positive association (2) fuzzy negative association (3) fuzzy generalization (4) fuzzy specialization. An extended fuzzy concept network can be modeled by a relation matrix and a relevance matrix, where the elements in a relation matrix represent the fuzzy relationships between concepts, and the elements in a relevance matrix indicate the degrees of relevance between concepts Advantage of this method is to find the most documents with respect to the user's query and more flexible and better showing user.
{"title":"Personalizing Results of Information Retrieval Systems Using Extended Fuzzy Concept Networks","authors":"P. Moradi, M. Ebrahim, M. Ebadzadeh","doi":"10.1109/ICTTA.2008.4530007","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530007","url":null,"abstract":"The increasing of the electronic documents and users has led to the creation of new paradigms of personalizing results of information retrieval systems and its goal is to better service to users based on their profiles. Personalized content retrieval aims at improving the retrieval process by taking into account the particular interests of individual users. The goal of information retrieval systems is to personalize ranking documents based on user profiles. In this paper we proposed new method for personalizing results of information retrieval systems based on extended fuzzy concept networks. In this method both pages and user profiles will be showed as extended fuzzy concept networks. In an extended fuzzy concept network, there are four kinds of fuzzy relationships between concepts (1) fuzzy positive association (2) fuzzy negative association (3) fuzzy generalization (4) fuzzy specialization. An extended fuzzy concept network can be modeled by a relation matrix and a relevance matrix, where the elements in a relation matrix represent the fuzzy relationships between concepts, and the elements in a relevance matrix indicate the degrees of relevance between concepts Advantage of this method is to find the most documents with respect to the user's query and more flexible and better showing user.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530142
H. Youssef, H. Elmokdad, F. Ndagijimana, J. Jomaah
The transmission line matrix TLM method is a numerical time-domain technique that has been widely used for solving a great variety of electromagnetic wave propagation problems. The space to be modeled is divided into discrete meshes. A good description of arbitrary geometry and boundaries remains a significant challenge in electromagnetic modeling concerning the computer resources and simulation time. A Cartesian mesh can be used in TLM to describe a regular boundary. Curved walls are represented by piecewise straight boundaries which induce spurious modes that are not acceptable in some problems. For the study of the propagation of electromagnetic waves in volumes having curvilinear boundaries, we propose and investigate new curvilinear discrete mesh. A TLM algorithm is developed directly from integral Maxwell's equations. The formulation and the scattering matrices for curvilinear node are presented. The accuracy of a particular curvilinear node (cylindrical node) will be proved.
{"title":"A Three-Dimensional Transmission Line Matrix Method (TLM) In Curvilinear Coordinates","authors":"H. Youssef, H. Elmokdad, F. Ndagijimana, J. Jomaah","doi":"10.1109/ICTTA.2008.4530142","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530142","url":null,"abstract":"The transmission line matrix TLM method is a numerical time-domain technique that has been widely used for solving a great variety of electromagnetic wave propagation problems. The space to be modeled is divided into discrete meshes. A good description of arbitrary geometry and boundaries remains a significant challenge in electromagnetic modeling concerning the computer resources and simulation time. A Cartesian mesh can be used in TLM to describe a regular boundary. Curved walls are represented by piecewise straight boundaries which induce spurious modes that are not acceptable in some problems. For the study of the propagation of electromagnetic waves in volumes having curvilinear boundaries, we propose and investigate new curvilinear discrete mesh. A TLM algorithm is developed directly from integral Maxwell's equations. The formulation and the scattering matrices for curvilinear node are presented. The accuracy of a particular curvilinear node (cylindrical node) will be proved.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530306
H. Abed
After an earthquake, immediate damage inspections are needed to identify which buildings are safe and which will not resist to aftershocks following the main event. Inspections of damaged buildings are essential to avoid secondary disaster. It permits to identify buildings that can be entered and those that should be kept from entering or using. In Algeria, many disastrous earthquakes occurred these last years. The number of structural engineers is important but in such events, this number may be insufficient. In addition, the strain, the stress, the emotion generated by such situations affects the capacities of the experts. In this research, a case-based reasoning (CBR) system has been developed to assist the experts in the post-seismic damages diagnostics and in formulating recommendations. These recommendations concern the urgency measures (reparations and restorations of the structures) in the aim to provide security and to protect humans' lives.
{"title":"A knowledge based system for post seismic evaluations","authors":"H. Abed","doi":"10.1109/ICTTA.2008.4530306","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530306","url":null,"abstract":"After an earthquake, immediate damage inspections are needed to identify which buildings are safe and which will not resist to aftershocks following the main event. Inspections of damaged buildings are essential to avoid secondary disaster. It permits to identify buildings that can be entered and those that should be kept from entering or using. In Algeria, many disastrous earthquakes occurred these last years. The number of structural engineers is important but in such events, this number may be insufficient. In addition, the strain, the stress, the emotion generated by such situations affects the capacities of the experts. In this research, a case-based reasoning (CBR) system has been developed to assist the experts in the post-seismic damages diagnostics and in formulating recommendations. These recommendations concern the urgency measures (reparations and restorations of the structures) in the aim to provide security and to protect humans' lives.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126598229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}