Application mobility is a subcategory of service mobility, being defined as the process of migrating applications between different hosts during application execution. In this paper we present a decentralized architecture for web-based adaptive application mobility, using the WebRTC framework. To the best of our knowledge, our proposal is the first of its kind within the area. It is our purpose to show the feasibility of a decentralized system for web-based adaptive application mobility, and present WebRTC as a strong facilitator of that idea.
{"title":"Towards Implementing Web-Based Adaptive Application Mobility Using Web Real-Time Communications","authors":"Dan Johansson, Mikael Holmgren","doi":"10.1109/IMIS.2014.60","DOIUrl":"https://doi.org/10.1109/IMIS.2014.60","url":null,"abstract":"Application mobility is a subcategory of service mobility, being defined as the process of migrating applications between different hosts during application execution. In this paper we present a decentralized architecture for web-based adaptive application mobility, using the WebRTC framework. To the best of our knowledge, our proposal is the first of its kind within the area. It is our purpose to show the feasibility of a decentralized system for web-based adaptive application mobility, and present WebRTC as a strong facilitator of that idea.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces an algorithm for fast multi line tracking utilizing the GPUs (Graphic Processing Units). Video stream contains huge of information for manipulating the vehicle by itself. It is a sort of big data to analyze properly in real-time for autonomous flight. However, image processing is heavy work for computing unit which is equipped on small unmanned aerial vehicle. This paper presents feasible image processing system for vision based intelligent vehicle. The proposed techniques for multi-line tracking are Hough transform, Kalman filter and clustering with GPUs. Integration of these methods has advantages to reduce the computational load by prediction of next state during the tracking and being robust for noise and rapid change of line's position. Hough transform used for extraction of lines while the Kalman filter predicts future state. Hough transform is easy to implement and robust for noise, on the other hand, the resource consumption raises exponentially as the resolution of input image or when we need high precision in Hough space. One of the efficient ways to overcome this speed problem is performing image processing with GPU's massive parallel calculation capabilities. Performance evaluations show promising results with acceptable trade-off between speed and accuracy of algorithm. Improving in speed algorithm keeps accurate tracking in comparison with algorithm implementation on CPU that is unable to track and detect lines fast enough due to computation resource limitations. Experiments and performance analysis of algorithm verified with user-made multi lines.
{"title":"Fast Multi-line Detection and Tracking with CUDA for Vision-Based UAV Autopilot","authors":"V. Tyan, Doohyun Kim, Young-guk Ha, Dongwoon Jeon","doi":"10.1109/IMIS.2014.14","DOIUrl":"https://doi.org/10.1109/IMIS.2014.14","url":null,"abstract":"This paper introduces an algorithm for fast multi line tracking utilizing the GPUs (Graphic Processing Units). Video stream contains huge of information for manipulating the vehicle by itself. It is a sort of big data to analyze properly in real-time for autonomous flight. However, image processing is heavy work for computing unit which is equipped on small unmanned aerial vehicle. This paper presents feasible image processing system for vision based intelligent vehicle. The proposed techniques for multi-line tracking are Hough transform, Kalman filter and clustering with GPUs. Integration of these methods has advantages to reduce the computational load by prediction of next state during the tracking and being robust for noise and rapid change of line's position. Hough transform used for extraction of lines while the Kalman filter predicts future state. Hough transform is easy to implement and robust for noise, on the other hand, the resource consumption raises exponentially as the resolution of input image or when we need high precision in Hough space. One of the efficient ways to overcome this speed problem is performing image processing with GPU's massive parallel calculation capabilities. Performance evaluations show promising results with acceptable trade-off between speed and accuracy of algorithm. Improving in speed algorithm keeps accurate tracking in comparison with algorithm implementation on CPU that is unable to track and detect lines fast enough due to computation resource limitations. Experiments and performance analysis of algorithm verified with user-made multi lines.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoyuki Ishida, K. Takahagi, Y. Shimizu, Akira Sakuraba, Noriki Uchida, Y. Shibata
Each local government dispatches the municipal employee to the disaster site in order to check on the damage at the time of wide-scale disaster. The municipal employee take damage images with a digital camera etc., and bring image data back to the disaster countermeasures headquarters. Then, the municipal employee project damage images on a projector and report damage situations. However, this method takes much time for the disaster countermeasures headquarters to grasp damage situations. This may be unable to take a prompt action to disaster sites. In this research, we built the system which reports damage situations to the disaster countermeasures headquarters quickly at the time of wide-scale disaster. In this system, the images and animations of the disaster are automatically mapped on Web-GIS in real time. Thereby, users become possible confirming damage situations at one view from Web-GIS.
{"title":"The Information Sharing System Using Web-GIS at the Time of Wide-Scale Disaster","authors":"Tomoyuki Ishida, K. Takahagi, Y. Shimizu, Akira Sakuraba, Noriki Uchida, Y. Shibata","doi":"10.1109/IMIS.2014.16","DOIUrl":"https://doi.org/10.1109/IMIS.2014.16","url":null,"abstract":"Each local government dispatches the municipal employee to the disaster site in order to check on the damage at the time of wide-scale disaster. The municipal employee take damage images with a digital camera etc., and bring image data back to the disaster countermeasures headquarters. Then, the municipal employee project damage images on a projector and report damage situations. However, this method takes much time for the disaster countermeasures headquarters to grasp damage situations. This may be unable to take a prompt action to disaster sites. In this research, we built the system which reports damage situations to the disaster countermeasures headquarters quickly at the time of wide-scale disaster. In this system, the images and animations of the disaster are automatically mapped on Web-GIS in real time. Thereby, users become possible confirming damage situations at one view from Web-GIS.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125123306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Working out at a gym is a favorite pastime for many people these days. To gain a competitive edge, many gyms have installed systems to log exercise data. An individual's exercise data can be used to track personal progress, as well as to provide positive feedback and motivation. The majority of these recorded data comes from rotation based exercise equipment, such as stationary bikes, treadmills, ellipticals, and rowing machines, because it is easy to log data with rotational sensors or electromechanical resistance. To the best of our knowledge, there is currently no method of recording exercise data from gym equipment that utilizes weight stacks and pulleys as resistance. The objective of this work is to propose an exercise data logging system that collects data from retrofitted weight stack equipment using off-the-shelf sensors and microcontrollers. This data logger has been designed and implemented with a simple web-based user interface.
{"title":"An Exercise Data Logging System for Retrofitting Gym Equipment","authors":"C. Patch, K. F. Li, B. Gooch","doi":"10.1109/IMIS.2014.21","DOIUrl":"https://doi.org/10.1109/IMIS.2014.21","url":null,"abstract":"Working out at a gym is a favorite pastime for many people these days. To gain a competitive edge, many gyms have installed systems to log exercise data. An individual's exercise data can be used to track personal progress, as well as to provide positive feedback and motivation. The majority of these recorded data comes from rotation based exercise equipment, such as stationary bikes, treadmills, ellipticals, and rowing machines, because it is easy to log data with rotational sensors or electromechanical resistance. To the best of our knowledge, there is currently no method of recording exercise data from gym equipment that utilizes weight stacks and pulleys as resistance. The objective of this work is to propose an exercise data logging system that collects data from retrofitted weight stack equipment using off-the-shelf sensors and microcontrollers. This data logger has been designed and implemented with a simple web-based user interface.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127254265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The NFC (Near Field Communication) became a popular short distance wireless communication technology by providing many convenient services such as an easy payment in a store. It has fast connection ability between devices and provides certain secure communication. However, after studying NFC protocols deeply, we found six threats to protecting the confidential data and users' privacy are unsolved. This paper summaries four standards of NFC protocols, and presents the security issues and unsolved privacy threats in current application environment.
NFC (Near Field Communication,近距离无线通信)通过提供在商店中轻松付款等许多便利的服务,成为流行的短距离无线通信技术。它具有设备间快速连接的能力,并提供一定的安全通信。然而,在深入研究NFC协议后,我们发现在保护机密数据和用户隐私方面的六个威胁尚未得到解决。总结了近场通信协议的四种标准,提出了当前应用环境中存在的安全问题和未解决的隐私威胁。
{"title":"NFC Attacks Analysis and Survey","authors":"C. Chen, I. Lin, Chou-Chen Yang","doi":"10.1109/IMIS.2014.66","DOIUrl":"https://doi.org/10.1109/IMIS.2014.66","url":null,"abstract":"The NFC (Near Field Communication) became a popular short distance wireless communication technology by providing many convenient services such as an easy payment in a store. It has fast connection ability between devices and provides certain secure communication. However, after studying NFC protocols deeply, we found six threats to protecting the confidential data and users' privacy are unsolved. This paper summaries four standards of NFC protocols, and presents the security issues and unsolved privacy threats in current application environment.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122732148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Pokric, S. Krco, D. Drajić, Maja Pokric, I. Jokic, Milena Jovaevic Stojanovic
This paper presents the environmental monitoring solution ekoNET, developed for a real-time monitoring of air pollution and other atmospheric condition parameters such as temperature, air pressure and humidity. The system is based on low-cost gas, PM and meteorological sensors providing cost-efficient, simple to deploy, use and maintain solution targeted for the usage within the Internet of Things domain of smart cities and smart enterprises. The paper gives an overview of the system architecture, encompassing the ekoNET device, back-end cloud infrastructure, data handling and visualization engine as well as the application-level components and modules. Furthermore, initial field trial data of twelve ekoNET devices is presented, enabling the overall system operation performance testing.
{"title":"ekoNET - Environmental Monitoring Using Low-Cost Sensors for Detecting Gases, Particulate Matter, and Meteorological Parameters","authors":"B. Pokric, S. Krco, D. Drajić, Maja Pokric, I. Jokic, Milena Jovaevic Stojanovic","doi":"10.1109/IMIS.2014.57","DOIUrl":"https://doi.org/10.1109/IMIS.2014.57","url":null,"abstract":"This paper presents the environmental monitoring solution ekoNET, developed for a real-time monitoring of air pollution and other atmospheric condition parameters such as temperature, air pressure and humidity. The system is based on low-cost gas, PM and meteorological sensors providing cost-efficient, simple to deploy, use and maintain solution targeted for the usage within the Internet of Things domain of smart cities and smart enterprises. The paper gives an overview of the system architecture, encompassing the ekoNET device, back-end cloud infrastructure, data handling and visualization engine as well as the application-level components and modules. Furthermore, initial field trial data of twelve ekoNET devices is presented, enabling the overall system operation performance testing.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen
This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major purpose in this work. Hence, to select the relay stations for signal transmission could be the important scheme to achieve the best system performance. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, a solution with a greedy algorithm applied to the relay selection scheme is proposed. With different situations of the communication systems, the performances evaluations obtained by both the proposed method and the exhaustive search method are given for comparison. It shows the proposed algorithm could provide a solution approaches to the optimal one. It is better to apply the proposed scheme when the number of relay stations is much larger than that of destination stations.
{"title":"QoS Based Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward Mode","authors":"J. Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen","doi":"10.1109/IMIS.2014.68","DOIUrl":"https://doi.org/10.1109/IMIS.2014.68","url":null,"abstract":"This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major purpose in this work. Hence, to select the relay stations for signal transmission could be the important scheme to achieve the best system performance. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, a solution with a greedy algorithm applied to the relay selection scheme is proposed. With different situations of the communication systems, the performances evaluations obtained by both the proposed method and the exhaustive search method are given for comparison. It shows the proposed algorithm could provide a solution approaches to the optimal one. It is better to apply the proposed scheme when the number of relay stations is much larger than that of destination stations.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neng-Chung Wang, Y. Chiang, Young-Long Chen, Chih-Hung Hsieh
In this paper, we propose a dual-path-based data aggregation scheme (DPBDAS) for grid-based wireless sensor networks (WSNs). We build a grid infrastructure by equally partitioning the whole sensor field into a grid of cells. The sensor nodes are randomly classified as type A and type B. All sensor nodes of type A and type B in the grid are further organized as group A and group B, respectively. Each cell has a head for each type. We construct dual paths by linking each cell head of each group, respectively. Each group has a leader randomly chosen from cell heads on its own path, responsible for directly transmitting the data to the base station (BS). For data gathering in each round, each cell head aggregates its own data with the data received from the other nodes of the same type in the cell and then transmits to the neighboring cell head toward its own leader. As a result, all gathered data are almost equally transmitted via dual paths so that the energy consumed by each sensor is approximately even. Besides, the group leader is randomly chosen among cell heads of its own path such that the energy load of each cell head is uniform. It greatly benefits the lifetime of the WSN. Simulation results show that the proposed DPBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.
{"title":"A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks","authors":"Neng-Chung Wang, Y. Chiang, Young-Long Chen, Chih-Hung Hsieh","doi":"10.1109/IMIS.2014.69","DOIUrl":"https://doi.org/10.1109/IMIS.2014.69","url":null,"abstract":"In this paper, we propose a dual-path-based data aggregation scheme (DPBDAS) for grid-based wireless sensor networks (WSNs). We build a grid infrastructure by equally partitioning the whole sensor field into a grid of cells. The sensor nodes are randomly classified as type A and type B. All sensor nodes of type A and type B in the grid are further organized as group A and group B, respectively. Each cell has a head for each type. We construct dual paths by linking each cell head of each group, respectively. Each group has a leader randomly chosen from cell heads on its own path, responsible for directly transmitting the data to the base station (BS). For data gathering in each round, each cell head aggregates its own data with the data received from the other nodes of the same type in the cell and then transmits to the neighboring cell head toward its own leader. As a result, all gathered data are almost equally transmitted via dual paths so that the energy consumed by each sensor is approximately even. Besides, the group leader is randomly chosen among cell heads of its own path such that the energy load of each cell head is uniform. It greatly benefits the lifetime of the WSN. Simulation results show that the proposed DPBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study utilized Vector Auto-regression method to investigate the impulse response effect. Our empirical results showed that the amount and signal of media coverage have impact on stock return. However, enterprises might release the fake news to attain some purposes. Hence, this study suggests that investors also should pay more attention to the truth of the media coverage while making the investment decisions.
{"title":"Media Coverage and Stock Return an Impulse Response Analysis","authors":"Kuei-Yuan Wang, Chien-Kuo Chen, Hsiao-Chi Wei","doi":"10.1109/IMIS.2014.83","DOIUrl":"https://doi.org/10.1109/IMIS.2014.83","url":null,"abstract":"This study utilized Vector Auto-regression method to investigate the impulse response effect. Our empirical results showed that the amount and signal of media coverage have impact on stock return. However, enterprises might release the fake news to attain some purposes. Hence, this study suggests that investors also should pay more attention to the truth of the media coverage while making the investment decisions.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible Authentication Protocol (EAP). EAP is widely used protocol for access control in local area networks such Wireless (802.11) and wired (802.3). This work presents an integration of the EAP frame into IEEE 802.15.4 frames, demonstrating that EAP protocol and some of its mechanisms are feasible to be applied in constrained devices, such as the devices that are populating the IoT networks.
{"title":"Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks","authors":"M. P. Pawlowski, A. Jara, M. Ogorzałek","doi":"10.1109/IMIS.2014.93","DOIUrl":"https://doi.org/10.1109/IMIS.2014.93","url":null,"abstract":"Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible Authentication Protocol (EAP). EAP is widely used protocol for access control in local area networks such Wireless (802.11) and wired (802.3). This work presents an integration of the EAP frame into IEEE 802.15.4 frames, demonstrating that EAP protocol and some of its mechanisms are feasible to be applied in constrained devices, such as the devices that are populating the IoT networks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}