Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062766
J. Senthil Kumar, C. Mahalakshmi
The Advanced Encryption Standard is the recent data security standard referred to as Federal Information Processing Standard 197 (FIPS 197) acquired worldwide by several private and public sectors for protective needs of data storage and secure data application from mobile consumer products to high end user. Most of the AES implementation for reconfigurable devices, however based on the configurable logic such as flip-flops and lookup tables. In this paper AES implementation focuas on embedded function inside of Xilinx devices such as large dual ported BRAM and DSP blocks with the goal of minimizing the use of register and lookup tables that those may be used for other functions. The paper presents a hardware implementation of AES algorithm on FPGA. The proposed model of AES algorithm was implemented in FPGA using Virtex 5 kit and Xilinx ISE development suite.
{"title":"Implementation of pipelined hardware architecture for AES algorithm using FPGA","authors":"J. Senthil Kumar, C. Mahalakshmi","doi":"10.1109/CNT.2014.7062766","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062766","url":null,"abstract":"The Advanced Encryption Standard is the recent data security standard referred to as Federal Information Processing Standard 197 (FIPS 197) acquired worldwide by several private and public sectors for protective needs of data storage and secure data application from mobile consumer products to high end user. Most of the AES implementation for reconfigurable devices, however based on the configurable logic such as flip-flops and lookup tables. In this paper AES implementation focuas on embedded function inside of Xilinx devices such as large dual ported BRAM and DSP blocks with the goal of minimizing the use of register and lookup tables that those may be used for other functions. The paper presents a hardware implementation of AES algorithm on FPGA. The proposed model of AES algorithm was implemented in FPGA using Virtex 5 kit and Xilinx ISE development suite.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062724
G. Jaffino, A. Banumathi, U. Gurunathan, J. Prabin Jose
Dental biometrics is used to identify the individuals in the forensic domain. Forensic identification is used to identify the person by comparing postmortem and ante mortem dental images. The dental radiograph image provides the information about teeth, tooth contours and in addition to that dental work (DW) is one of the notable issues for forensic identification. This dental work includes crown filling, root canal and crown mineralization for tooth. In this paper addresses the dental work identification for different radiographic images such as bitewing, periapical and panoramic dental images with Mahalanobis distance based matching. The proposed system contains preprocessing, feature extraction and matching. Experimental evaluation gives the satisfied results which will abet for dental biometrics.
{"title":"Dental work extraction for different radiographic Images in human Forensic Identification","authors":"G. Jaffino, A. Banumathi, U. Gurunathan, J. Prabin Jose","doi":"10.1109/CNT.2014.7062724","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062724","url":null,"abstract":"Dental biometrics is used to identify the individuals in the forensic domain. Forensic identification is used to identify the person by comparing postmortem and ante mortem dental images. The dental radiograph image provides the information about teeth, tooth contours and in addition to that dental work (DW) is one of the notable issues for forensic identification. This dental work includes crown filling, root canal and crown mineralization for tooth. In this paper addresses the dental work identification for different radiographic images such as bitewing, periapical and panoramic dental images with Mahalanobis distance based matching. The proposed system contains preprocessing, feature extraction and matching. Experimental evaluation gives the satisfied results which will abet for dental biometrics.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062742
K. Balasubramanian
In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.
{"title":"Variants of RSA and their cryptanalysis","authors":"K. Balasubramanian","doi":"10.1109/CNT.2014.7062742","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062742","url":null,"abstract":"In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062740
C. B. Lakshmi, S. K. Mohan Rao
Recent advances in Compact and wireless embedded Systems coupled with the technological innovations in Micro Electro Mechanical Systems(MEMS), Wireless Communications and networks paved the way for the development of small, resource constrained devices called Sensor Nodes (SNs). Performance of Sensor Node is highly dependent on the effective and efficient usage of the available limited resources with it, leading to maximum lifetime of Wireless Sensor Network (WSN) which is a primary concern of WSNs. The depletion of a SN energy leads to change in topology of WSNs often over a period of time. Therefore, protocols which consider the dynamic nature of WSNs are crucial for improving the network lifetime. In this paper, we propose bio inspired Ant Colony optimization based Self healing routing scheme inspired by swarm Intelligence technique to improve lifetime of a WSN.
{"title":"Bio-inspired self-healing routing to improve lifetime of wireless sensor networks","authors":"C. B. Lakshmi, S. K. Mohan Rao","doi":"10.1109/CNT.2014.7062740","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062740","url":null,"abstract":"Recent advances in Compact and wireless embedded Systems coupled with the technological innovations in Micro Electro Mechanical Systems(MEMS), Wireless Communications and networks paved the way for the development of small, resource constrained devices called Sensor Nodes (SNs). Performance of Sensor Node is highly dependent on the effective and efficient usage of the available limited resources with it, leading to maximum lifetime of Wireless Sensor Network (WSN) which is a primary concern of WSNs. The depletion of a SN energy leads to change in topology of WSNs often over a period of time. Therefore, protocols which consider the dynamic nature of WSNs are crucial for improving the network lifetime. In this paper, we propose bio inspired Ant Colony optimization based Self healing routing scheme inspired by swarm Intelligence technique to improve lifetime of a WSN.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062718
K. Vimala Devi, S. Vetha
Cloud computing is a new technology in computer field which provides various resources over the Internet. It serves different types of the resources in virtualized form. Resource allocation and better utilization of the virtualized resources can be done by using scheduling. This paper analyses various types of scheduling algorithms for resource allocation in cloud computing. We propose a new algorithm to allocate resources in efficient manner. The developed resource allocation algorithm is based on different parameters like number of processor requests, capacity requests etc. Our proposal algorithm can be used for a better resource allocation of jobs in the cloud environment.
{"title":"Capacity based resource allocation in cloud","authors":"K. Vimala Devi, S. Vetha","doi":"10.1109/CNT.2014.7062718","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062718","url":null,"abstract":"Cloud computing is a new technology in computer field which provides various resources over the Internet. It serves different types of the resources in virtualized form. Resource allocation and better utilization of the virtualized resources can be done by using scheduling. This paper analyses various types of scheduling algorithms for resource allocation in cloud computing. We propose a new algorithm to allocate resources in efficient manner. The developed resource allocation algorithm is based on different parameters like number of processor requests, capacity requests etc. Our proposal algorithm can be used for a better resource allocation of jobs in the cloud environment.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124976152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062731
C. Morris, R. Rajesh
Image fusion is widely recognized as an important technique in pattern recognition and computer vision. The object of image fusion is fuse one or more source images with different focus points in to one image, so that the result of image fusion is an image which is more clarity and better information. This paper presents a novel and improved pixel-level multifocal image fusion technique has been implemented. A proposed spatial domain technique is presented by Max, Min, PCA, Max-Min, Max-PCA and Min-PCA of image fusion techniques is done. The proposed spatial domain technique outperforms the state of the art spatial domain techniques. The experimental results demonstrate that the proposed approach performs better in both visual and quantitative scales.
{"title":"A novel and improved Spatial domain fusion method using Simple—PCA techniques","authors":"C. Morris, R. Rajesh","doi":"10.1109/CNT.2014.7062731","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062731","url":null,"abstract":"Image fusion is widely recognized as an important technique in pattern recognition and computer vision. The object of image fusion is fuse one or more source images with different focus points in to one image, so that the result of image fusion is an image which is more clarity and better information. This paper presents a novel and improved pixel-level multifocal image fusion technique has been implemented. A proposed spatial domain technique is presented by Max, Min, PCA, Max-Min, Max-PCA and Min-PCA of image fusion techniques is done. The proposed spatial domain technique outperforms the state of the art spatial domain techniques. The experimental results demonstrate that the proposed approach performs better in both visual and quantitative scales.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062778
S. Devaraj, R. Helen, Vedanayagi Anita, J. Christa
In Mobile Ad-hoc Networks (MANETs), mobile node act as router themselves and keeping the route information to reach other mobile nodes and helps to forward data packets from one mobile to another mobile node. The performance of the different mobility models such as Random Walk (RW), Random Waypoint (RWP), Manhattan Mobility (MM), Reference Point Group Mobility (RPGM) are widely analyzed in the environment using NS2.34 software under Linux platform (Fedora). Depending on the type of TCP (Transmission Control Protocol) implementation the behavior was different for each mobility models and it's due to the activation or missing of the following algorithms Slow Start, Congestion Avoidance and Congestion Detection. The performance of TCP flows in an Mobile ad-hoc network is analyzed using four different mobility models with Ad hoc On- Demand Distance Vector (AODV) as the routing protocol and TCP/TCP New Reno as the transport protocol.
在移动自组织网络(manet)中,移动节点本身充当路由器,保留到达其他移动节点的路由信息,并帮助将数据包从一个移动节点转发到另一个移动节点。在Linux平台(Fedora)下,采用NS2.34软件,对随机行走(RW)、随机路径点(RWP)、曼哈顿移动(MM)、参考点群移动(RPGM)等不同移动模型的性能进行了分析。根据TCP(传输控制协议)实现的类型,每种移动模型的行为是不同的,这是由于激活或缺少以下算法慢启动,拥塞避免和拥塞检测。以Ad hoc随需应变距离矢量(AODV)为路由协议,TCP/TCP New Reno为传输协议,采用四种不同的移动模型,分析了移动自组织网络中TCP流的性能。
{"title":"Comparative analysis of random based mobility models using TCP variant in MANETs","authors":"S. Devaraj, R. Helen, Vedanayagi Anita, J. Christa","doi":"10.1109/CNT.2014.7062778","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062778","url":null,"abstract":"In Mobile Ad-hoc Networks (MANETs), mobile node act as router themselves and keeping the route information to reach other mobile nodes and helps to forward data packets from one mobile to another mobile node. The performance of the different mobility models such as Random Walk (RW), Random Waypoint (RWP), Manhattan Mobility (MM), Reference Point Group Mobility (RPGM) are widely analyzed in the environment using NS2.34 software under Linux platform (Fedora). Depending on the type of TCP (Transmission Control Protocol) implementation the behavior was different for each mobility models and it's due to the activation or missing of the following algorithms Slow Start, Congestion Avoidance and Congestion Detection. The performance of TCP flows in an Mobile ad-hoc network is analyzed using four different mobility models with Ad hoc On- Demand Distance Vector (AODV) as the routing protocol and TCP/TCP New Reno as the transport protocol.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"23 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128433000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062764
A. Kamaraj, Abinaya, S. Ramya
Quantum Cellular Automata (QCA) is a promising future to the CMOS technology with ultra operating speed and low power consumption. The realization of QCA with Reversible Logic is the Green Computing. A router is the key component in the internet core for transmitting data packets. Being the technology beyond CMOS, the work has been proposed to design a Router in QCA. In addition to that, crossing in Router architecture is done in Multilayer with reversible logic. This proposed architecture guarantees efficient data routing in Router. Also it provides reduced cell area, high operating speed, and minimum complexity.
{"title":"Design of router using Reversible Logic in Quantum Cellular Automata","authors":"A. Kamaraj, Abinaya, S. Ramya","doi":"10.1109/CNT.2014.7062764","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062764","url":null,"abstract":"Quantum Cellular Automata (QCA) is a promising future to the CMOS technology with ultra operating speed and low power consumption. The realization of QCA with Reversible Logic is the Green Computing. A router is the key component in the internet core for transmitting data packets. Being the technology beyond CMOS, the work has been proposed to design a Router in QCA. In addition to that, crossing in Router architecture is done in Multilayer with reversible logic. This proposed architecture guarantees efficient data routing in Router. Also it provides reduced cell area, high operating speed, and minimum complexity.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062723
G. Prema, R. Karthiyayini
Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum is a scarce resource and it used efficiently by incorporating beamforming in the multi-antenna relay for cognitive networks. In this paper, both the adaptive beamforming for the relay networks and the performance estimation at the secondary user receiver in cognitive networks were discussed. Special attention is given to the system capacity of the cognitive networks at the secondary user receiver.
{"title":"A review on beamforming techniques for cognitive multi-antenna relay network","authors":"G. Prema, R. Karthiyayini","doi":"10.1109/CNT.2014.7062723","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062723","url":null,"abstract":"Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum is a scarce resource and it used efficiently by incorporating beamforming in the multi-antenna relay for cognitive networks. In this paper, both the adaptive beamforming for the relay networks and the performance estimation at the secondary user receiver in cognitive networks were discussed. Special attention is given to the system capacity of the cognitive networks at the secondary user receiver.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062774
B. Anoob, C. Unni
This paper presents the design of a planar printed antenna with ground plate is in coplanar configuration. The target of this paper is to introduce an antenna that supports all mobile and wireless services with low SAR value. The antenna operates for most of the mobile applications such as the GSM 850, GSM 900, DCS 1800, PCS 1900, and UMTS 2100. The antenna also support WiMAX, wireless local area network (WLAN), and the Industrial, Scientific, and Medical (ISM) bands. The proposed antenna consists of monopole, meander line, and a spiral EBG structure. Higher frequency bands are supported by both the meander line and the monopole since they acts as traveling-wave antennas at the high frequency bands. The high impedance surface property of the EBG structure is utilized here to reduce the radiation at the resonant frequency of the mobile band. The proposed antenna exhibits certain features such compact size, the multiband operation including the low frequency bands, and the low SAR radiation. The simulations were carried out in CST Microwave studio.
本文设计了一种平面印刷天线,其接地板为共面结构。本文的目标是介绍一种支持低SAR值的所有移动和无线业务的天线。该天线适用于大多数移动应用,如GSM 850、GSM 900、DCS 1800、PCS 1900和UMTS 2100。该天线还支持WiMAX、无线局域网(WLAN)和ISM (Industrial, Scientific, and Medical)频段。该天线由单极子、弯曲线和螺旋型EBG结构组成。较高的频段由曲线和单极子支持,因为它们在高频段充当行波天线。利用EBG结构的高阻抗表面特性来减小移动频段共振频率处的辐射。该天线具有体积小、包括低频在内的多波段工作、低SAR辐射等特点。仿真在CST微波工作室进行。
{"title":"Investigation on Specific Absorption Rate due to electromagnetic radiation","authors":"B. Anoob, C. Unni","doi":"10.1109/CNT.2014.7062774","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062774","url":null,"abstract":"This paper presents the design of a planar printed antenna with ground plate is in coplanar configuration. The target of this paper is to introduce an antenna that supports all mobile and wireless services with low SAR value. The antenna operates for most of the mobile applications such as the GSM 850, GSM 900, DCS 1800, PCS 1900, and UMTS 2100. The antenna also support WiMAX, wireless local area network (WLAN), and the Industrial, Scientific, and Medical (ISM) bands. The proposed antenna consists of monopole, meander line, and a spiral EBG structure. Higher frequency bands are supported by both the meander line and the monopole since they acts as traveling-wave antennas at the high frequency bands. The high impedance surface property of the EBG structure is utilized here to reduce the radiation at the resonant frequency of the mobile band. The proposed antenna exhibits certain features such compact size, the multiband operation including the low frequency bands, and the low SAR radiation. The simulations were carried out in CST Microwave studio.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}