Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549344
Magalí González, L. Cernuzzi, Nathalie Aquino, Ó. Pastor
This study presents the Architecture Specific Model (ASM) defined by the MoWebA approach to improve the development of web applications for different architectures. MoWebA is a model-driven approach to web applications development. The article presents a general overview of MoWebA, including the methodological aspects related to its modeling and transformation processes, the process of defining the ASM, and an example of an ASM model. We finally present a preliminary validation experience and its main results. The experience was structured according to the proposal of Runeson et al. for case studies.
{"title":"Developing web applications for different architectures: The MoWebA approach","authors":"Magalí González, L. Cernuzzi, Nathalie Aquino, Ó. Pastor","doi":"10.1109/RCIS.2016.7549344","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549344","url":null,"abstract":"This study presents the Architecture Specific Model (ASM) defined by the MoWebA approach to improve the development of web applications for different architectures. MoWebA is a model-driven approach to web applications development. The article presents a general overview of MoWebA, including the methodological aspects related to its modeling and transformation processes, the process of defining the ASM, and an example of an ASM model. We finally present a preliminary validation experience and its main results. The experience was structured according to the proposal of Runeson et al. for case studies.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115918074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549292
Souad Benomrane, Zied Sellami, Mounir Ben Ayed
In a changing environment, it is necessary to update the ontology to new knowledge and user needs. However, ontology evolution is still a time-consuming and complex task. In this paper we propose an extended approach of an earlier work in ontology evolution based on an adaptive multi-agent system (AMAS). In fact, we seek to personalize the results proposed by the AMAS to the ontologist-feedback. First, we enhance the agents with an adaptive behavior enabling them to react to the ontologist's feedback. The ontologist gives his/her action (elementary and composite changes) towards the AMAS proposals. He/She can also add new terms and concepts. Then, the AMAS reacts and self-organizes to produce an updated ontology with new proposals. This process is repeated until a satisfactory state of the ontology is obtained. The experiments prove that the adaptive skills we added to agents help them to detect the uselessness of some proposals, to avoid the useless and wrong ones and to propose others.
{"title":"Evolving ontologies using an adaptive multi-agent system based on ontologist-feedback","authors":"Souad Benomrane, Zied Sellami, Mounir Ben Ayed","doi":"10.1109/RCIS.2016.7549292","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549292","url":null,"abstract":"In a changing environment, it is necessary to update the ontology to new knowledge and user needs. However, ontology evolution is still a time-consuming and complex task. In this paper we propose an extended approach of an earlier work in ontology evolution based on an adaptive multi-agent system (AMAS). In fact, we seek to personalize the results proposed by the AMAS to the ontologist-feedback. First, we enhance the agents with an adaptive behavior enabling them to react to the ontologist's feedback. The ontologist gives his/her action (elementary and composite changes) towards the AMAS proposals. He/She can also add new terms and concepts. Then, the AMAS reacts and self-organizes to produce an updated ontology with new proposals. This process is repeated until a satisfactory state of the ontology is obtained. The experiments prove that the adaptive skills we added to agents help them to detect the uselessness of some proposals, to avoid the useless and wrong ones and to propose others.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549289
Amira Dhouib, Abdelwaheb Trabelsi, C. Kolski, M. Neji
The evaluation of interactive adaptive systems is the source of many difficulties for novice evaluators as well as for expert ones. Issues arise in the need to identify the appropriate evaluation methods to be used for a given evaluation context. This paper proposes an approach for the choice of evaluation methods for interactive adaptive systems with regard to their suitability depending on specific evaluation contexts. A multicriteria decision making approach, namely the Analytic Hierarchy Process, is proposed for the selection methodology. The approach is based on a pair-wise comparison of a number of criteria that affect the choice of the appropriate evaluation methods. Four user-centred evaluation methods in conjunction with the layered evaluation for interactive adaptive systems are presented in the cases studies. These methods are: user-as-wizard, heuristic evaluation, focus group, and user test. The proposed approach is flexible in the sense that it can be used in the case of different evaluation methods. The results depend on the evaluation context where the methods will be used. Hence, we illustrate the proposed approach in the case of two evaluation contexts.
{"title":"An approach for the selection of evaluation methods for interactive adaptive systems using analytic hierarchy process","authors":"Amira Dhouib, Abdelwaheb Trabelsi, C. Kolski, M. Neji","doi":"10.1109/RCIS.2016.7549289","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549289","url":null,"abstract":"The evaluation of interactive adaptive systems is the source of many difficulties for novice evaluators as well as for expert ones. Issues arise in the need to identify the appropriate evaluation methods to be used for a given evaluation context. This paper proposes an approach for the choice of evaluation methods for interactive adaptive systems with regard to their suitability depending on specific evaluation contexts. A multicriteria decision making approach, namely the Analytic Hierarchy Process, is proposed for the selection methodology. The approach is based on a pair-wise comparison of a number of criteria that affect the choice of the appropriate evaluation methods. Four user-centred evaluation methods in conjunction with the layered evaluation for interactive adaptive systems are presented in the cases studies. These methods are: user-as-wizard, heuristic evaluation, focus group, and user test. The proposed approach is flexible in the sense that it can be used in the case of different evaluation methods. The results depend on the evaluation context where the methods will be used. Hence, we illustrate the proposed approach in the case of two evaluation contexts.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549315
Sahar Abdelhedi, R. Bourguiba, Jaouhar Mouine, M. Baklouti
Population aging has become a worldwide problem. Falls are considered as the first source of disabilities among elderly people. Fall detection algorithms are the key to distinguish a fall from daily activities, automatically alert when a fall occurred and significantly decrease the time of rescue when the monitored patient falls down. The algorithm presented in this paper uses tri-axial accelerometer outputs to discriminate between falls and daily activities. It is mainly based on a two-thresholds approach and inactivity posture recognition after falling. The algorithm showed prominent results compared to existing works and will be improved and implemented on a Zynq board for future applications.
{"title":"Development of a two-threshold-based fall detection algorithm for elderly health monitoring","authors":"Sahar Abdelhedi, R. Bourguiba, Jaouhar Mouine, M. Baklouti","doi":"10.1109/RCIS.2016.7549315","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549315","url":null,"abstract":"Population aging has become a worldwide problem. Falls are considered as the first source of disabilities among elderly people. Fall detection algorithms are the key to distinguish a fall from daily activities, automatically alert when a fall occurred and significantly decrease the time of rescue when the monitored patient falls down. The algorithm presented in this paper uses tri-axial accelerometer outputs to discriminate between falls and daily activities. It is mainly based on a two-thresholds approach and inactivity posture recognition after falling. The algorithm showed prominent results compared to existing works and will be improved and implemented on a Zynq board for future applications.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549317
A. Derradji, A. Front, C. Verdier, Vincent Bouzon
A health care protocol for a chronic disease contains a set of actions that describe how the patient should treat his/her disease outside the hospital. The patient and possibly his healthcare team should follow the protocol in order to control the evolution of the chronic disease. The main problems are that (i) the patient can't interact and integrate in the protocol the expertise he acquired during his daily life with the disease and (ii) the health care team doesn't know how the protocol is concretely followed. Our main contribution in this paper is an approach for integrating the patient's expertise knowledge expressed in textual or verbal form, and representing this expertise with an ontological paradigm.
{"title":"An ontology for unexpected events and actions in chronic patient home care protocol","authors":"A. Derradji, A. Front, C. Verdier, Vincent Bouzon","doi":"10.1109/RCIS.2016.7549317","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549317","url":null,"abstract":"A health care protocol for a chronic disease contains a set of actions that describe how the patient should treat his/her disease outside the hospital. The patient and possibly his healthcare team should follow the protocol in order to control the evolution of the chronic disease. The main problems are that (i) the patient can't interact and integrate in the protocol the expertise he acquired during his daily life with the disease and (ii) the health care team doesn't know how the protocol is concretely followed. Our main contribution in this paper is an approach for integrating the patient's expertise knowledge expressed in textual or verbal form, and representing this expertise with an ontological paradigm.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549372
O. Parisot, Patrik Hitzelberger, Y. Didry, G. Vierke, Helmut Rieder
In order to analyze the descriptions of various active start-ups, we have developed a web application to retrieve and to analyze available textual data about them. The tool aims at extracting the frequent topics and applying semantic similarity analysis to the start-up descriptions.
{"title":"Text analytics on start-up descriptions","authors":"O. Parisot, Patrik Hitzelberger, Y. Didry, G. Vierke, Helmut Rieder","doi":"10.1109/RCIS.2016.7549372","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549372","url":null,"abstract":"In order to analyze the descriptions of various active start-ups, we have developed a web application to retrieve and to analyze available textual data about them. The tool aims at extracting the frequent topics and applying semantic similarity analysis to the start-up descriptions.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549312
A. Shahri, M. Hosseini, Malik Almaliki, Keith Phalp, Jacqui Taylor, Raian Ali
Software-based motivation refers to the use of technology to enhance the engagement and efficiency of people in performing tasks and following a certain behaviour. Instances of such paradigm include gamification, persuasive technology and entertainment computing. Despite its potential, an ad-hoc introduction of software-based motivation to a business environment may lead to detrimental effects such as creating pressure and tension, and also reducing quality and authenticity. Hence, we advocate the need for a systematic engineering process to develop software solutions for motivation requirements. One of the challenges is in the high diversity in users' perception and acceptance of motivation strategies and their software-based incarnations. In this paper, we propose the use of personas as an intermediate step which increases efficiency in the engineering process for both engineers and users. We conduct an empirical research and identify elements which describe people with regard to their perception and preferences towards software-based motivational techniques and create a set of exemplary personas to aid the engineering process. We also present guidelines and challenges related to using persona-based engineering methods for software-based motivation.
{"title":"Engineering software-based motivation: A persona-based approach","authors":"A. Shahri, M. Hosseini, Malik Almaliki, Keith Phalp, Jacqui Taylor, Raian Ali","doi":"10.1109/RCIS.2016.7549312","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549312","url":null,"abstract":"Software-based motivation refers to the use of technology to enhance the engagement and efficiency of people in performing tasks and following a certain behaviour. Instances of such paradigm include gamification, persuasive technology and entertainment computing. Despite its potential, an ad-hoc introduction of software-based motivation to a business environment may lead to detrimental effects such as creating pressure and tension, and also reducing quality and authenticity. Hence, we advocate the need for a systematic engineering process to develop software solutions for motivation requirements. One of the challenges is in the high diversity in users' perception and acceptance of motivation strategies and their software-based incarnations. In this paper, we propose the use of personas as an intermediate step which increases efficiency in the engineering process for both engineers and users. We conduct an empirical research and identify elements which describe people with regard to their perception and preferences towards software-based motivational techniques and create a set of exemplary personas to aid the engineering process. We also present guidelines and challenges related to using persona-based engineering methods for software-based motivation.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549361
Y. Hagos, Monica J. Garfield, Salehu Anteneh
Information Systems (IS) implementation in higher education is a large investment. Such investments are expected to bring increased efficiency and effectiveness, as well as better quality services to stakeholders. E-learning is one of the recent trends and major technological advancements in Information Technology (IT), reshaping the mode of delivery of education in universities. To effectively and efficiently evaluate the success of an e-learning system, success measurement factors must be identified and measured for any university that implements e-learning systems. This study explores and develops measurement factors model for e-learning systems success in Ethiopian higher Level Education Institutes (EHEIs). Both qualitative and quantitative research methodologies are used to perform the study. The study is based on the Information System Success (ISS) model and extends the model to investigate e-learning systems success measurement factors in developing countries such as Ethiopia. Our literature search did not find any study that examines the complete IS success model in order to identify measurement factors of e-learning systems success in Ethiopia that should be of value to higher learning institutions' management, e-learning systems designers and providers, and instructors when planning and implementing e-learning projects.
{"title":"Measurement factors model for e-learning systems success","authors":"Y. Hagos, Monica J. Garfield, Salehu Anteneh","doi":"10.1109/RCIS.2016.7549361","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549361","url":null,"abstract":"Information Systems (IS) implementation in higher education is a large investment. Such investments are expected to bring increased efficiency and effectiveness, as well as better quality services to stakeholders. E-learning is one of the recent trends and major technological advancements in Information Technology (IT), reshaping the mode of delivery of education in universities. To effectively and efficiently evaluate the success of an e-learning system, success measurement factors must be identified and measured for any university that implements e-learning systems. This study explores and develops measurement factors model for e-learning systems success in Ethiopian higher Level Education Institutes (EHEIs). Both qualitative and quantitative research methodologies are used to perform the study. The study is based on the Information System Success (ISS) model and extends the model to investigate e-learning systems success measurement factors in developing countries such as Ethiopia. Our literature search did not find any study that examines the complete IS success model in order to identify measurement factors of e-learning systems success in Ethiopia that should be of value to higher learning institutions' management, e-learning systems designers and providers, and instructors when planning and implementing e-learning projects.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549303
Tong Li, E. Paja, J. Mylopoulos, Jennifer Horkoff, Kristian Beckers
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.
{"title":"Security attack analysis using attack patterns","authors":"Tong Li, E. Paja, J. Mylopoulos, Jennifer Horkoff, Kristian Beckers","doi":"10.1109/RCIS.2016.7549303","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549303","url":null,"abstract":"Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549367
Nicolas Dugué, Jean-Charles Lamirel, Pascal Cuxac
We introduce Diachronic'Explorer, a toolbox to produce and visualize diachronic results, which is based on a new complete theoretic framework that we detail. This toolbox, which is dedicated to run diachronic algorithms from clustering results, allows also to explore the complex results at all the granularity levels through a web application.
{"title":"Diachronic'Explorer: Keep track of your clusters","authors":"Nicolas Dugué, Jean-Charles Lamirel, Pascal Cuxac","doi":"10.1109/RCIS.2016.7549367","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549367","url":null,"abstract":"We introduce Diachronic'Explorer, a toolbox to produce and visualize diachronic results, which is based on a new complete theoretic framework that we detail. This toolbox, which is dedicated to run diachronic algorithms from clustering results, allows also to explore the complex results at all the granularity levels through a web application.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}