Pub Date : 2022-11-01DOI: 10.24271/psr.2022.160803
Dana Hasan Ahmed, Rebeen Rebwar HamaAmin
A firewall is one of the key components in securing an organization's network and computational assets against different network and application-based attacks. Most firewall solutions only consider one or two layers of TCP/IP networking architecture to protect against attacks, especially spoofing-based attacks. In contrast, there are some proposed solutions to protect against such attacks. However, these solutions work in areas such as clouds or Software Defined Networks (SDN), and legacy networks cannot utilize such techniques. Therefore, establishing a type of firewall that can be scalable, strong, and easy to implement is a challenge necessary for a new firewall technique to prevail. This paper presents a novel strategy to implement a multi-layered firewall to overcome the current state-of-art firewalls. Our firewall combines a packet-filtering approach (i.e., Internet and Transport layer) with an application layer firewall under the umbrella of Stateful-Packet-Inspection. The experiments were performed in a controlled environment with 1% legitimate packets, and 99% spoofed traffic on average. The Stateful-Packet-Inspection discards any packets based on their traffic flow given to them by the firewall while informing the network administrator about the system breach passively. The results of the experiments are benchmarked with previous works and showed improvement in accuracy by 13.5% and sensitivity by 13.75% while decreasing the false negative rate by 86.5% with minimal computational and network overhead.
{"title":"Multi-layered firewall to mitigate the impact of Distributed Denial of Service on a network","authors":"Dana Hasan Ahmed, Rebeen Rebwar HamaAmin","doi":"10.24271/psr.2022.160803","DOIUrl":"https://doi.org/10.24271/psr.2022.160803","url":null,"abstract":"A firewall is one of the key components in securing an organization's network and computational assets against different network and application-based attacks. Most firewall solutions only consider one or two layers of TCP/IP networking architecture to protect against attacks, especially spoofing-based attacks. In contrast, there are some proposed solutions to protect against such attacks. However, these solutions work in areas such as clouds or Software Defined Networks (SDN), and legacy networks cannot utilize such techniques. Therefore, establishing a type of firewall that can be scalable, strong, and easy to implement is a challenge necessary for a new firewall technique to prevail. This paper presents a novel strategy to implement a multi-layered firewall to overcome the current state-of-art firewalls. Our firewall combines a packet-filtering approach (i.e., Internet and Transport layer) with an application layer firewall under the umbrella of Stateful-Packet-Inspection. The experiments were performed in a controlled environment with 1% legitimate packets, and 99% spoofed traffic on average. The Stateful-Packet-Inspection discards any packets based on their traffic flow given to them by the firewall while informing the network administrator about the system breach passively. The results of the experiments are benchmarked with previous works and showed improvement in accuracy by 13.5% and sensitivity by 13.75% while decreasing the false negative rate by 86.5% with minimal computational and network overhead.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43587637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.24271/psr.2022.161691
Mardan A. Pirdawood, I. Hamad
This paper aims to use some nonstandard concepts to find a nonstandard analytic and non-analytic infinitely close solution of the first-order ordinary differential equation in the monad of its singularity, where the differential coefficients are either infinitesimal, unlimited or have basic differential form. The obtained nonstandard solutions are more precise and compatible than the conventional ones. We named such a non-analytic infinitely close solution to the singularity by shadow solution. These cases of solutions are sometimes impossible to obtain by conventional methods
{"title":"Some Nonstandard Treatment of the Singularity in the Differential Equation","authors":"Mardan A. Pirdawood, I. Hamad","doi":"10.24271/psr.2022.161691","DOIUrl":"https://doi.org/10.24271/psr.2022.161691","url":null,"abstract":"This paper aims to use some nonstandard concepts to find a nonstandard analytic and non-analytic infinitely close solution of the first-order ordinary differential equation in the monad of its singularity, where the differential coefficients are either infinitesimal, unlimited or have basic differential form. The obtained nonstandard solutions are more precise and compatible than the conventional ones. We named such a non-analytic infinitely close solution to the singularity by shadow solution. These cases of solutions are sometimes impossible to obtain by conventional methods","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42850003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.24271/psr.2022.160801
O. Y. Abdulhammed, P. J. Karim
Facebook and Twitter, as two known social media become popular sources of big data that give the right to people to share and express their feedback about products, services, politicians, events, and every aspect of life in the form of short texts. The classification of sentiments could be automated through machine learning and enhanced using appropriate feature extraction methods. In this work, we collected the most recent tweets about (Biden, Benzema, Apple, and NASA) using Twitter-API and assigned sentiment scores using a rule-based lexicon approach; after pre-processing stage, each dataset is divided into 80% as a training set, and rest 20% as testing set. After that, the Distributed bag of words, Distributed memory mean, Distributed Memory Concatenation, and Term Frequency-Inverse Document Frequency models are used for feature extraction from pre-processed tweets. Depending on the Shark smell optimizer algorithm, the SVM technique was used to classify the extracted features. The SSO was used to tune and select the best value for SVM parameters to optimize the overall model performance. The results display that these optimizers have an essential impact on increasing the model accuracy. After optimization, the model accuracy reached 92.12%, while the highest accuracy without optimization was 88.69% for various feature extraction methods.
{"title":"Sentiment Analysis using SVM-based SSO Intelligence Algorithm","authors":"O. Y. Abdulhammed, P. J. Karim","doi":"10.24271/psr.2022.160801","DOIUrl":"https://doi.org/10.24271/psr.2022.160801","url":null,"abstract":"Facebook and Twitter, as two known social media become popular sources of big data that give the right to people to share and express their feedback about products, services, politicians, events, and every aspect of life in the form of short texts. The classification of sentiments could be automated through machine learning and enhanced using appropriate feature extraction methods. In this work, we collected the most recent tweets about (Biden, Benzema, Apple, and NASA) using Twitter-API and assigned sentiment scores using a rule-based lexicon approach; after pre-processing stage, each dataset is divided into 80% as a training set, and rest 20% as testing set. After that, the Distributed bag of words, Distributed memory mean, Distributed Memory Concatenation, and Term Frequency-Inverse Document Frequency models are used for feature extraction from pre-processed tweets. Depending on the Shark smell optimizer algorithm, the SVM technique was used to classify the extracted features. The SSO was used to tune and select the best value for SVM parameters to optimize the overall model performance. The results display that these optimizers have an essential impact on increasing the model accuracy. After optimization, the model accuracy reached 92.12%, while the highest accuracy without optimization was 88.69% for various feature extraction methods.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47627105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.24271/psr.2022.160800
H. Sharif, M. Ghareb, Tara Kaka Muhamad
This Research has examined how video game affects the performance of the player. Unity tool has been used to create an interactive game with several ball objects that accrue additional points for each participant. Different methods have been used to strike the balls, using the mouse, keyboard, combination of both, and facial emotion. Image processing techniques have been used to match the facial expression with the EMOGI of the balls the players hit. The performance of the game has been affected by facial expressions. The study demonstrates how widely used, and highly engaging face-emotion techniques are in video games. The usage of visual observation concerning traditional input control and emotion input has been examined, and the differences are demonstrated. Our results show that facial emotions improve the technology for video games; in our game, we tested three types of facial emotions: sad, happy, and angry.
{"title":"The Impact of Emotions on the Speed and Score of Computer Games","authors":"H. Sharif, M. Ghareb, Tara Kaka Muhamad","doi":"10.24271/psr.2022.160800","DOIUrl":"https://doi.org/10.24271/psr.2022.160800","url":null,"abstract":"This Research has examined how video game affects the performance of the player. Unity tool has been used to create an interactive game with several ball objects that accrue additional points for each participant. Different methods have been used to strike the balls, using the mouse, keyboard, combination of both, and facial emotion. Image processing techniques have been used to match the facial expression with the EMOGI of the balls the players hit. The performance of the game has been affected by facial expressions. The study demonstrates how widely used, and highly engaging face-emotion techniques are in video games. The usage of visual observation concerning traditional input control and emotion input has been examined, and the differences are demonstrated. Our results show that facial emotions improve the technology for video games; in our game, we tested three types of facial emotions: sad, happy, and angry.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44483464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.24271/psr.2022.161643
A. A. Abdulrahman
A neural network is a series of algorithms that endeavour to recognize underlying relationships in a set of data through a process that mimics the operations of a human brain. It may have uses in many different real-life applications, such as: speech and voice recognition, eCommerce, cybersecurity, and others. The network convergence time is the one of the most important parts of neural networks, which affects the performance of neural network applications. Convergence of the neural network contributes to the process of determining the optimal number of training iterations required to produce the fewest number of errors. In this paper, a specific method based on the mathematical property found in physical systems called "proteretic" is presented. Three learning methods (standard Hopfield, hysteretic Hopfield, and modified proteretic Hopfield) are applied to the Walsh-based distributed memory application. It mathematically and practically demonstrated and approved that using the modified proteretic method causes the network to reach convergence faster than other methods. It’s approved that using the proteretic property with the Walsh-based memory enhances the performance of the storage by accelerating the network's convergence relative to other neural network operations.
{"title":"Continuous Proteretic Hopfield Neural Network in Walsh-based Distributed Storage","authors":"A. A. Abdulrahman","doi":"10.24271/psr.2022.161643","DOIUrl":"https://doi.org/10.24271/psr.2022.161643","url":null,"abstract":"A neural network is a series of algorithms that endeavour to recognize underlying relationships in a set of data through a process that mimics the operations of a human brain. It may have uses in many different real-life applications, such as: speech and voice recognition, eCommerce, cybersecurity, and others. The network convergence time is the one of the most important parts of neural networks, which affects the performance of neural network applications. Convergence of the neural network contributes to the process of determining the optimal number of training iterations required to produce the fewest number of errors. In this paper, a specific method based on the mathematical property found in physical systems called \"proteretic\" is presented. Three learning methods (standard Hopfield, hysteretic Hopfield, and modified proteretic Hopfield) are applied to the Walsh-based distributed memory application. It mathematically and practically demonstrated and approved that using the modified proteretic method causes the network to reach convergence faster than other methods. It’s approved that using the proteretic property with the Walsh-based memory enhances the performance of the storage by accelerating the network's convergence relative to other neural network operations.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45346872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.24271/psr.2022.161680
M. Ghareb, Dyaree Jamal Hamid, Sako Dilshad Sabr, Zhyar Tofiq
One of the most beneficial uses of image processing is face recognition, which is essential in today's technology environment. Particularly when it comes to tracking student attendance, the identification of a human face is a popular issue in the authentication sector. A face recognition attendance system is a technique for identifying pupils based on high-definition surveillance and other computer technologies that employ face biostatistics. The purpose of creating this system is to electronically replace the conventional procedure of recording attendance by calling names and maintaining paper records. The existing procedures for taking attendance are cumbersome and time-consuming. Our goal and ambition for this article is to use the OpenCV library to develop an attendance management system that can identify faces and store them in a database so that colleges, businesses, and other institutions may use it to track attendance. This research will use a combination method of using Open CV and HOG library detecting the face in boundary box with accuracy %99.38. Adding more, it has been proposing new idea of using these techniques in all halls and labs in any educational institutes in recording the student's attendance precisely.
{"title":"New approach for Attendance System using Face Detection and Recognition","authors":"M. Ghareb, Dyaree Jamal Hamid, Sako Dilshad Sabr, Zhyar Tofiq","doi":"10.24271/psr.2022.161680","DOIUrl":"https://doi.org/10.24271/psr.2022.161680","url":null,"abstract":"One of the most beneficial uses of image processing is face recognition, which is essential in today's technology environment. Particularly when it comes to tracking student attendance, the identification of a human face is a popular issue in the authentication sector. A face recognition attendance system is a technique for identifying pupils based on high-definition surveillance and other computer technologies that employ face biostatistics. The purpose of creating this system is to electronically replace the conventional procedure of recording attendance by calling names and maintaining paper records. The existing procedures for taking attendance are cumbersome and time-consuming. Our goal and ambition for this article is to use the OpenCV library to develop an attendance management system that can identify faces and store them in a database so that colleges, businesses, and other institutions may use it to track attendance. This research will use a combination method of using Open CV and HOG library detecting the face in boundary box with accuracy %99.38. Adding more, it has been proposing new idea of using these techniques in all halls and labs in any educational institutes in recording the student's attendance precisely.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45853216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.24271/psr.2022.161698
Muaathe A. Ibraheem, Frederik J. Davis, N. Spencer, J. Mckendrick
Polypyrrole (Ppy) was synthesized via a chemical oxidization method with FeCl3.6H2O (FCHH) on electrospun polystyrene fibres ESPSF. The spinning process was achieved using Electrospinning for three solutions of polystyrene PS including 3, 5, and 9 % wt/v of FCHH in dimethyl formamide (DMF). The fibres diameters were monitored by scanning electron microscope SEM before and after coating, and it was found that the best results were achieved at low concentrations of FCHH. The Ppy coating was applied under four exposure periods (90, 150, 200, and 270 minutes) at 22C; Fibre diameter and coating quality are directly related in the study. The technique suggests a potential route towards producing conducting fibres with micro/nanoscale dimensions using Electrospinning followed by vapor chemical polymerization of pyrrole.
{"title":"Polypyrrole-coated electrospun polystyrene-Fe (III) composite fibres","authors":"Muaathe A. Ibraheem, Frederik J. Davis, N. Spencer, J. Mckendrick","doi":"10.24271/psr.2022.161698","DOIUrl":"https://doi.org/10.24271/psr.2022.161698","url":null,"abstract":"Polypyrrole (Ppy) was synthesized via a chemical oxidization method with FeCl3.6H2O (FCHH) on electrospun polystyrene fibres ESPSF. The spinning process was achieved using Electrospinning for three solutions of polystyrene PS including 3, 5, and 9 % wt/v of FCHH in dimethyl formamide (DMF). The fibres diameters were monitored by scanning electron microscope SEM before and after coating, and it was found that the best results were achieved at low concentrations of FCHH. The Ppy coating was applied under four exposure periods (90, 150, 200, and 270 minutes) at 22C; Fibre diameter and coating quality are directly related in the study. The technique suggests a potential route towards producing conducting fibres with micro/nanoscale dimensions using Electrospinning followed by vapor chemical polymerization of pyrrole.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47988414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-26DOI: 10.24271/psr.2022.344758.1134
Zana Azeez Kakarash, Nawroz Fadhil Ahmed, Karwan Mohammad Hamakarim
Recommendation Systems (RSs) have significant applications in many industrial systems. The duty of a recommender algorithm is to operate available data (users/items contextual data and rating (or purchase) the consumption history for items), as well as to provide a recommendation list for any target user. The recommended items should be selected so that the target user is compelled to give them positive reviews. In this manuscript, we propose a novel of RS algorithm that makes advantage of user-user trust relationships, rating histories, and their frequency of occurrence. We also provide a brand new overlapping community detection algorithm. The information about the users’ community structure is used to handle the cold-start and sparsity problems. We compare the performance of the proposed RS algorithm with a number of state-of-the-art algorithms on the extended Epinions dataset, which has both information on trust relations and the timing of the ratings. Numerical simulations reveal the superiority of the proposed algorithm over others. We also investigate how the algorithms perform when only cold-start users and items are considered. As a cold-start user (item) we consider those that have made (received) less than five ratings. The experiments show significant outperformance of the proposed algorithm over others, which is mainly due to the use of information on overlapping community structures between users.
{"title":"A Temporal and Social Network-based Recommender using Graph Clustering","authors":"Zana Azeez Kakarash, Nawroz Fadhil Ahmed, Karwan Mohammad Hamakarim","doi":"10.24271/psr.2022.344758.1134","DOIUrl":"https://doi.org/10.24271/psr.2022.344758.1134","url":null,"abstract":"Recommendation Systems (RSs) have significant applications in many industrial systems. The duty of a recommender algorithm is to operate available data (users/items contextual data and rating (or purchase) the consumption history for items), as well as to provide a recommendation list for any target user. The recommended items should be selected so that the target user is compelled to give them positive reviews. In this manuscript, we propose a novel of RS algorithm that makes advantage of user-user trust relationships, rating histories, and their frequency of occurrence. We also provide a brand new overlapping community detection algorithm. The information about the users’ community structure is used to handle the cold-start and sparsity problems. We compare the performance of the proposed RS algorithm with a number of state-of-the-art algorithms on the extended Epinions dataset, which has both information on trust relations and the timing of the ratings. Numerical simulations reveal the superiority of the proposed algorithm over others. We also investigate how the algorithms perform when only cold-start users and items are considered. As a cold-start user (item) we consider those that have made (received) less than five ratings. The experiments show significant outperformance of the proposed algorithm over others, which is mainly due to the use of information on overlapping community structures between users.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43106670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-07DOI: 10.24271/psr.2022.350395.1140
Ari A. Yatem
Silver (Ag) thin-film nanostructures are prepared on the glass surface through a dependable method called spin coating. Silver nitrate (AgNO 3 ) has been utilized as precursors, proceeded by the thermal reduction in the H 2 atmosphere, and some of the chemical reductions such as sodium borohydride (NaBH 4 ) solution, and hydrazine hydrate solution (N 2 H 4 ). The effects of several reductants have been discussed. The structure, morphology, and absorbance spectra of the deposited silver thin films have been characterized and measured by using the following techniques X-ray diffraction (XRD), Scanning electron microscope (SEM), as well as UV-visible- NIR absorption spectroscopy, to study more about how the reduction procedure affects the formation of silver nanoparticles. As a result, thermal reduction in the H 2 atmosphere is more effective than the chemical reduction in aqueous sodium borohydride and hydrazine hydrate solution for growing consistently sized dispersed silver nanoparticles.
{"title":"Effect of reduction through the Spin Coating growing Silver thin Films Nanostructure","authors":"Ari A. Yatem","doi":"10.24271/psr.2022.350395.1140","DOIUrl":"https://doi.org/10.24271/psr.2022.350395.1140","url":null,"abstract":"Silver (Ag) thin-film nanostructures are prepared on the glass surface through a dependable method called spin coating. Silver nitrate (AgNO 3 ) has been utilized as precursors, proceeded by the thermal reduction in the H 2 atmosphere, and some of the chemical reductions such as sodium borohydride (NaBH 4 ) solution, and hydrazine hydrate solution (N 2 H 4 ). The effects of several reductants have been discussed. The structure, morphology, and absorbance spectra of the deposited silver thin films have been characterized and measured by using the following techniques X-ray diffraction (XRD), Scanning electron microscope (SEM), as well as UV-visible- NIR absorption spectroscopy, to study more about how the reduction procedure affects the formation of silver nanoparticles. As a result, thermal reduction in the H 2 atmosphere is more effective than the chemical reduction in aqueous sodium borohydride and hydrazine hydrate solution for growing consistently sized dispersed silver nanoparticles.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44268456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}