With the increasing dependence on machines, the accidental and wear and tear costs has also risen, and even in some cases loss of lives also occur, all are due to improper or delayed information retrieval. In this project, our aim is to subside the machine related damages by designing a ubiquitous data acquisition system for various surrounding machines using hand held devices like Smartphone's or PDAs, pre-installed with required application software, and by analyzing the procured data sets (from smart sensors onto the mobiles), decisions are delivered. This framework combines various sensors like temperature, vibration, acoustic, current, voltage sensors etc linked to the machines and a handheld device like mobile. For data acquisition, mobile sets use the wireless telephony or internet services like GPRS or GSM/CDMA or 3G etc or even in built Bluetooth technologies of their mobile sets for shorter range information retrieval from various sensors fitted on machines and analysis is done by comparing the original and best performance data sets stored in a mobile database with the pre-fetched instant data sets and the deviations are calculated using pre-requisites formulae to judge the criticality of the situation. The mobile set is installed with a J2ME application with user-friendly interface, which do the above comparison, data analysis and decisions deliverance in the form of alerts and actions.
{"title":"Wireless machine monitoring embodiment using mobile computing","authors":"Bikramjit Singh, S. Puri, Prateek Kesarwani","doi":"10.1145/2007052.2007093","DOIUrl":"https://doi.org/10.1145/2007052.2007093","url":null,"abstract":"With the increasing dependence on machines, the accidental and wear and tear costs has also risen, and even in some cases loss of lives also occur, all are due to improper or delayed information retrieval.\u0000 In this project, our aim is to subside the machine related damages by designing a ubiquitous data acquisition system for various surrounding machines using hand held devices like Smartphone's or PDAs, pre-installed with required application software, and by analyzing the procured data sets (from smart sensors onto the mobiles), decisions are delivered.\u0000 This framework combines various sensors like temperature, vibration, acoustic, current, voltage sensors etc linked to the machines and a handheld device like mobile. For data acquisition, mobile sets use the wireless telephony or internet services like GPRS or GSM/CDMA or 3G etc or even in built Bluetooth technologies of their mobile sets for shorter range information retrieval from various sensors fitted on machines and analysis is done by comparing the original and best performance data sets stored in a mobile database with the pre-fetched instant data sets and the deviations are calculated using pre-requisites formulae to judge the criticality of the situation. The mobile set is installed with a J2ME application with user-friendly interface, which do the above comparison, data analysis and decisions deliverance in the form of alerts and actions.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116287720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The adhoc environment is accessible to both legitimate network users and malicious attackers. The adhoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The simulation experiments have been carried over network simulator (version 2.34) and the results have been computed using packet delivery fraction and average end to end delay with respect to both speed and pause time. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols.
{"title":"Secured routing over MANET with power management","authors":"A. Kush, Sunil Taneja","doi":"10.1145/2007052.2007081","DOIUrl":"https://doi.org/10.1145/2007052.2007081","url":null,"abstract":"Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The adhoc environment is accessible to both legitimate network users and malicious attackers. The adhoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The simulation experiments have been carried over network simulator (version 2.34) and the results have been computed using packet delivery fraction and average end to end delay with respect to both speed and pause time. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"73 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator. Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Activities on honeypots can be considiered suspicious by definition, as there is no point for benign users to interact with these systems. Honeypots come in many shapes and sizes; examples include dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users. Most honeypots are installed and configured inside the firewall programs so that they can be better controlled. In this paper, we are proposing the concept of Forward and Backward Ants (Swarm Intelligence) along with Honeypots to detect the network intrusion by following a pre-established concept of load balancer and Intrusion Detection System.
{"title":"Intrusion detection system using honeypots and swarm intelligence","authors":"Gurdip Kaur, Meenu Khurana, Monika Sethi","doi":"10.1145/2007052.2007060","DOIUrl":"https://doi.org/10.1145/2007052.2007060","url":null,"abstract":"As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator.\u0000 Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Activities on honeypots can be considiered suspicious by definition, as there is no point for benign users to interact with these systems. Honeypots come in many shapes and sizes; examples include dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users. Most honeypots are installed and configured inside the firewall programs so that they can be better controlled.\u0000 In this paper, we are proposing the concept of Forward and Backward Ants (Swarm Intelligence) along with Honeypots to detect the network intrusion by following a pre-established concept of load balancer and Intrusion Detection System.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124360621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart Camera Network [4] enables us to detect, classify, and trace visual events by means of a communication network channel of embedded computing devices equipped with camera sensors. Distributed smart cameras [2] use distributed computing architectures to analyze imagery from physically distributed cameras. Smart Camera gives an opportunity to capture image with high approximation, less computations, lower bandwidth wastage and real time results. Mobile devices can connect to the Smart Camera Network in distributed manner [2]. We demonstrate the system with a real time application for Smart Camera Network and Mobile Devices.
{"title":"Distributed smart camera network and mobile devices","authors":"Sumit Kumar, Santosh Kumar, Sukumar Nandi","doi":"10.1145/2007052.2007057","DOIUrl":"https://doi.org/10.1145/2007052.2007057","url":null,"abstract":"Smart Camera Network [4] enables us to detect, classify, and trace visual events by means of a communication network channel of embedded computing devices equipped with camera sensors. Distributed smart cameras [2] use distributed computing architectures to analyze imagery from physically distributed cameras. Smart Camera gives an opportunity to capture image with high approximation, less computations, lower bandwidth wastage and real time results. Mobile devices can connect to the Smart Camera Network in distributed manner [2]. We demonstrate the system with a real time application for Smart Camera Network and Mobile Devices.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web sites accessibility is a basic requirement to protect everyone's equal right of accessing the information in information society. These days it becomes mandatory that all kinds of vulnerable groups should be able to access information and acquire services from web sites. In the design process, enough attention has not been given to educational websites accessibility. After explaining the need of web engineering in websites design, the relation and the importance of web accessibility are studied and different kinds of vulnerable groups are identified. This paper introduces status of educational web accessibility and put forward the concept of educational web accessibility design. Firstly, role of web engineering in web accessibility is discussed; secondly, proposes five fundamental principals as different types of online learners and their relations with educational websites accessibility; thirdly, Function, design concept and seven principals of universal design are related with educational websites accessibility; fourthly, Design model of educational web accessibility is studied; lastly, it gives out basic design steps in designing accessible educational websites or in the end authors integrates the web accessibility into design process by using top down approach. Through these efforts of web engineering, design concept, principles and model of educational web accessibility, the levels of educational web accessibility will be improved.
{"title":"Educational web sites accessibility design model","authors":"J. Manhas","doi":"10.1145/2007052.2007055","DOIUrl":"https://doi.org/10.1145/2007052.2007055","url":null,"abstract":"Web sites accessibility is a basic requirement to protect everyone's equal right of accessing the information in information society. These days it becomes mandatory that all kinds of vulnerable groups should be able to access information and acquire services from web sites. In the design process, enough attention has not been given to educational websites accessibility. After explaining the need of web engineering in websites design, the relation and the importance of web accessibility are studied and different kinds of vulnerable groups are identified. This paper introduces status of educational web accessibility and put forward the concept of educational web accessibility design. Firstly, role of web engineering in web accessibility is discussed; secondly, proposes five fundamental principals as different types of online learners and their relations with educational websites accessibility; thirdly, Function, design concept and seven principals of universal design are related with educational websites accessibility; fourthly, Design model of educational web accessibility is studied; lastly, it gives out basic design steps in designing accessible educational websites or in the end authors integrates the web accessibility into design process by using top down approach. Through these efforts of web engineering, design concept, principles and model of educational web accessibility, the levels of educational web accessibility will be improved.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An Automated Taxi Dispatch System with Multi-agent approach [8] [10] is intends to serve all the customers in distributed fashion. The Automated Taxi System is a location based, traffic-sensing approach that incorporate distributed taxi booking and monitoring. Planning, Acting and Learning concepts of mobile robotics are requisite to implement the Automated Taxi System. In this paper we also concern with Localization and Mapping concept of Mobile Robotic to build up a map within an unknown environment and at the same time keeping of their current positions. The Proposed Path Navigation System (Automated Taxi System) is using A*(A-Star) algorithm to find the shortest path between source and destination. The proposed system is implemented using the Lego Mindstrom NXT platform and LeJOS NXJ (The programming language). We furthermore proposed another Heuristics based algorithm to accomplish the same objective that is rapid to implement and perform.
{"title":"Automated taxi/cab system using A* algorithm","authors":"Santosh Kumar, Sumit Kumar","doi":"10.1145/2007052.2007056","DOIUrl":"https://doi.org/10.1145/2007052.2007056","url":null,"abstract":"An Automated Taxi Dispatch System with Multi-agent approach [8] [10] is intends to serve all the customers in distributed fashion. The Automated Taxi System is a location based, traffic-sensing approach that incorporate distributed taxi booking and monitoring. Planning, Acting and Learning concepts of mobile robotics are requisite to implement the Automated Taxi System. In this paper we also concern with Localization and Mapping concept of Mobile Robotic to build up a map within an unknown environment and at the same time keeping of their current positions. The Proposed Path Navigation System (Automated Taxi System) is using A*(A-Star) algorithm to find the shortest path between source and destination. The proposed system is implemented using the Lego Mindstrom NXT platform and LeJOS NXJ (The programming language). We furthermore proposed another Heuristics based algorithm to accomplish the same objective that is rapid to implement and perform.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with risks associated with the loan Risk analysis and related adaptation strategies have grown in importance and complexity during last years. The large amount of data and information that needs to be handled and integrated requires specific methodologies and tools. So selecting a new loan applicant is a important issue of a financial organizations or Banks. There are so many different factors which effect on the selection of applicant who apply for loan. So, it's a problem for Banks and other private financers to choose right applicant so that minimum risk involved during loan process using fuzzy logic. We control this problem in quicker and cheapest way using knowledge and experience of experts which are involved in this process and having knowledge about this field. This paper provides risk analysis based on fuzzy inference system. And provide GUI based interface tool regarding different parameters of an applicant which effect loan risk assessment. The analysis of experimental results of different applicants checks the correctness and consistency of decision Support system for correct decision making.
{"title":"Fuzzy logic based decision support system for loan risk assessment","authors":"Sangeet Kumar, Nitin Bhatia, Namarta Kapoor","doi":"10.1145/2007052.2007089","DOIUrl":"https://doi.org/10.1145/2007052.2007089","url":null,"abstract":"This paper is concerned with risks associated with the loan Risk analysis and related adaptation strategies have grown in importance and complexity during last years. The large amount of data and information that needs to be handled and integrated requires specific methodologies and tools. So selecting a new loan applicant is a important issue of a financial organizations or Banks. There are so many different factors which effect on the selection of applicant who apply for loan. So, it's a problem for Banks and other private financers to choose right applicant so that minimum risk involved during loan process using fuzzy logic. We control this problem in quicker and cheapest way using knowledge and experience of experts which are involved in this process and having knowledge about this field. This paper provides risk analysis based on fuzzy inference system. And provide GUI based interface tool regarding different parameters of an applicant which effect loan risk assessment. The analysis of experimental results of different applicants checks the correctness and consistency of decision Support system for correct decision making.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firewalls are now an integral part of network security. An intelligent firewall that prevents unauthorized access to a system has been developed. Artificial intelligence applications are uniquely suited for the ever-changing, ever-evolving world of network security. Typical firewalls are only as good as the information provided by the Network Administrator. A new type of attack creates vulnerabilities, which a static firewall does not have the ability to avoid without human direction. An AI-managed firewall service, however, can protect a computer network from known and future threats. We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate a smart detection engine into a firewall. The smart detection engine will aim at not only detecting anomalous network traffic as in classical IDSs, but also detecting unusual structures data packets that suggest the presence of virus data. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.
{"title":"Artificial intelligent firewall","authors":"A. Mishra, Abhishek Agrawal, R. Ranjan","doi":"10.1145/2007052.2007094","DOIUrl":"https://doi.org/10.1145/2007052.2007094","url":null,"abstract":"Firewalls are now an integral part of network security. An intelligent firewall that prevents unauthorized access to a system has been developed. Artificial intelligence applications are uniquely suited for the ever-changing, ever-evolving world of network security. Typical firewalls are only as good as the information provided by the Network Administrator. A new type of attack creates vulnerabilities, which a static firewall does not have the ability to avoid without human direction. An AI-managed firewall service, however, can protect a computer network from known and future threats. We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate a smart detection engine into a firewall. The smart detection engine will aim at not only detecting anomalous network traffic as in classical IDSs, but also detecting unusual structures data packets that suggest the presence of virus data. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116568624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task. As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.
{"title":"Security threats to mobile agents","authors":"Snehi Jyoti, Snehi Manish, Sudha Goyal","doi":"10.1145/2007052.2007098","DOIUrl":"https://doi.org/10.1145/2007052.2007098","url":null,"abstract":"Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task.\u0000 As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125264861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emerging computational grid infrastructure consists of heterogeneous resource in widely distributed autonomous domain, which makes resources scheduling even more challenging. The most common objective function of task scheduling problem is makespan. In this paper, I have proposed an efficient Job scheduling algorithm for the grid environment so that the jobs are executed in minimum time and also all nodes of grid execute equal load relative to their executing power. This technique fetches the jobs from the job queue that is ready to execute and assign these jobs to the best nodes of the grid.
{"title":"An efficient job scheduling algorithm for grid computing","authors":"Sarpreet Singh, R. K. Bawa","doi":"10.1145/2007052.2007097","DOIUrl":"https://doi.org/10.1145/2007052.2007097","url":null,"abstract":"The emerging computational grid infrastructure consists of heterogeneous resource in widely distributed autonomous domain, which makes resources scheduling even more challenging. The most common objective function of task scheduling problem is makespan. In this paper, I have proposed an efficient Job scheduling algorithm for the grid environment so that the jobs are executed in minimum time and also all nodes of grid execute equal load relative to their executing power. This technique fetches the jobs from the job queue that is ready to execute and assign these jobs to the best nodes of the grid.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122920031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}