Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201835
Yingmin Zhang, Chao Feng, Lianfeng Huang, Chaolin Ye, Le Weng
The current number of Android malicious applications is growing rapidly, which brings great troubles and losses to mobile phone users. Therefore, we propose a lightweight and efficient method for Android malicious family detection. The method uses DREBIN's Android malicious application dataset to build a detection model that using the application manifest information and machine learning algorithms. Through the training and testing of 10 types of Android malicious family samples, it is found that the detection model has the characteristics of low complexity and high classification accuracy, which can detect the Android malicious family very well and effectively protect the security of user mobile phones.
{"title":"Detection of Android Malicious Family Based on Manifest Information","authors":"Yingmin Zhang, Chao Feng, Lianfeng Huang, Chaolin Ye, Le Weng","doi":"10.1109/ICCSE49874.2020.9201835","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201835","url":null,"abstract":"The current number of Android malicious applications is growing rapidly, which brings great troubles and losses to mobile phone users. Therefore, we propose a lightweight and efficient method for Android malicious family detection. The method uses DREBIN's Android malicious application dataset to build a detection model that using the application manifest information and machine learning algorithms. Through the training and testing of 10 types of Android malicious family samples, it is found that the detection model has the characteristics of low complexity and high classification accuracy, which can detect the Android malicious family very well and effectively protect the security of user mobile phones.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a stacked model with autoencoder for financial time series prediction. A stacked autoencoder model is used for feature extraction of high-dimensional stock factors. The factors after dimensionality reduction serve as input to the stacked model to predict the next-day returns of the stocks. In this paper, the stacked autoencoder not only has the effect of reducing the dimension, but also eliminates the redundant information in the data to a certain extent, which can effectively improve the predictive capacity of the model. The constituent stocks of CSI300 are used as backtest samples, and the experiment shows that the stacked model with autoencoder can obtain more than 50% of excess return in 2019.
{"title":"Stacked Model with Autoencoder for Financial Time Series Prediction","authors":"Haiying Zhang, Qiaomei Liang, Rongqi Wang, Qingqiang Wu","doi":"10.1109/ICCSE49874.2020.9201745","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201745","url":null,"abstract":"In this paper, we propose a stacked model with autoencoder for financial time series prediction. A stacked autoencoder model is used for feature extraction of high-dimensional stock factors. The factors after dimensionality reduction serve as input to the stacked model to predict the next-day returns of the stocks. In this paper, the stacked autoencoder not only has the effect of reducing the dimension, but also eliminates the redundant information in the data to a certain extent, which can effectively improve the predictive capacity of the model. The constituent stocks of CSI300 are used as backtest samples, and the experiment shows that the stacked model with autoencoder can obtain more than 50% of excess return in 2019.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126039564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201713
Lingyun Wang, Caiquan Xiong, Na Deng
The joint extraction of entity and relation is an important task in information extraction. Previously, most models in entity relationship extraction assumed that the relationship was discrete. Unfortunately, this assumption is often violated. In order to solve the problem of overlapping in the entity relationship, considering the relationship between extraction under the premise of have the features of multiple targets, this paper puts forward a multi-objective depend on the relationship between extraction model, which transforms the relationship extraction task into a sequence-tagged task. The model uses Iterated Dilated Convolutional Neural Network (IDCNN) and BiLSTM to encode the words in order to more fully extract the semantics in the text. First, determine the target entity subject (s), and then predict all corresponding object (o) and relationship (r) according to s. Experiments show that our model is significantly better than the baseline methods.
{"title":"A Research on Overlapping Relationship Extraction Based on Multi-objective Dependency","authors":"Lingyun Wang, Caiquan Xiong, Na Deng","doi":"10.1109/ICCSE49874.2020.9201713","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201713","url":null,"abstract":"The joint extraction of entity and relation is an important task in information extraction. Previously, most models in entity relationship extraction assumed that the relationship was discrete. Unfortunately, this assumption is often violated. In order to solve the problem of overlapping in the entity relationship, considering the relationship between extraction under the premise of have the features of multiple targets, this paper puts forward a multi-objective depend on the relationship between extraction model, which transforms the relationship extraction task into a sequence-tagged task. The model uses Iterated Dilated Convolutional Neural Network (IDCNN) and BiLSTM to encode the words in order to more fully extract the semantics in the text. First, determine the target entity subject (s), and then predict all corresponding object (o) and relationship (r) according to s. Experiments show that our model is significantly better than the baseline methods.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201857
Luona Song, Xin Guo, Yiqi Fan
With the popularization of the internet and the increase of video facilities, the recognition and segmentation of actions in the video have become research highlights of high application value. Different from images, the information in the video is more complex and also brings time sequences as a new dimension. This paper proposes a video action recognition and segmentation model in the human keypoint detection task. The main contributions are as follows:1) Based on the speech signal processing method, this paper designs an analysis framework for video action, which consists of three steps. The first step is to obtain data from the key point frame of the human body; the second is the action segmentation model; the third is to visualize the model results;2)the dynamic time warping algorithm is used and improved from calculation cost and constraint conditions;3) a distance function is designed to measure the similarity between time series. Four kinds of features are introduced, and the final distance is the weighted sum of the four kinds of features;4) a non-maximum suppression method is designed to filter the overlapped segments to get the final results. Experiment design verifies the validity of the proposed model and the importance of proposed features is illustrated.
{"title":"Action Recognition in Video Using Human Keypoint Detection","authors":"Luona Song, Xin Guo, Yiqi Fan","doi":"10.1109/ICCSE49874.2020.9201857","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201857","url":null,"abstract":"With the popularization of the internet and the increase of video facilities, the recognition and segmentation of actions in the video have become research highlights of high application value. Different from images, the information in the video is more complex and also brings time sequences as a new dimension. This paper proposes a video action recognition and segmentation model in the human keypoint detection task. The main contributions are as follows:1) Based on the speech signal processing method, this paper designs an analysis framework for video action, which consists of three steps. The first step is to obtain data from the key point frame of the human body; the second is the action segmentation model; the third is to visualize the model results;2)the dynamic time warping algorithm is used and improved from calculation cost and constraint conditions;3) a distance function is designed to measure the similarity between time series. Four kinds of features are introduced, and the final distance is the weighted sum of the four kinds of features;4) a non-maximum suppression method is designed to filter the overlapped segments to get the final results. Experiment design verifies the validity of the proposed model and the importance of proposed features is illustrated.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127333703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201884
Xinggen Fan, Xingjian Zheng, Yongqi Ge
In terms of engineering vehicle faults, CAN communication faults account for a large proportion. In order to detect the CAN communication faults of electronic control units (ECUs) for diesel vehicles, this paper designs a CAN communication detection system for engineering vehicle ECUs, and a fault detection algorithm is proposed for diesel vehicle ECU based on CAN. This system can analyze and diagnose the physical link faults of CAN based on "handshake" theory for the engineering vehicle ECUs. The fault is determined by the "handshake" theory between the host computer and the ECU. In addition, the paper also designs the fault detection system based on LabVIEW. Experimental results show that this method can detect the type of CAN fault in given simulation environment.
{"title":"CAN Communication Detection System Design for Engineering Vehicle Electronic Control Unit","authors":"Xinggen Fan, Xingjian Zheng, Yongqi Ge","doi":"10.1109/ICCSE49874.2020.9201884","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201884","url":null,"abstract":"In terms of engineering vehicle faults, CAN communication faults account for a large proportion. In order to detect the CAN communication faults of electronic control units (ECUs) for diesel vehicles, this paper designs a CAN communication detection system for engineering vehicle ECUs, and a fault detection algorithm is proposed for diesel vehicle ECU based on CAN. This system can analyze and diagnose the physical link faults of CAN based on \"handshake\" theory for the engineering vehicle ECUs. The fault is determined by the \"handshake\" theory between the host computer and the ECU. In addition, the paper also designs the fault detection system based on LabVIEW. Experimental results show that this method can detect the type of CAN fault in given simulation environment.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201680
Sena Seneviratne, L. D. Silva, Jie Hu, Wenxing Hong, Judith Beveridge, D. Levy
In this paper, the introduction of the new OS kernel internals for the new metrics for the grid and cloud performance prediction is explained. This new introduction is named as Division of Load (DOL). The DOL method breaks down the CPU load by individual users and then separates the Disk IO load from the CPU load. In the first part, the concepts of the load signals are shown theoretically and experimentally as these metrics are introduced into the kernel for the first time. In the second part, the required code changes which are introduced to the OS kernel are discussed. The separation will help to collect the computer loads separately for individual users as CPU loads and Disk IOs loads. Such a move will open Grid, Cluster and Cloud Performance Predictors to use the divided data archives for better predictability of both CPU and Disk IO loads. Many existing Grid and Cloud resource prediction engines are going to be advantaged by this data purification and specialization.
{"title":"Introduction of the new Operating System Kernel Internals for the New Metrics for the Performance Prediction on the Clouds","authors":"Sena Seneviratne, L. D. Silva, Jie Hu, Wenxing Hong, Judith Beveridge, D. Levy","doi":"10.1109/ICCSE49874.2020.9201680","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201680","url":null,"abstract":"In this paper, the introduction of the new OS kernel internals for the new metrics for the grid and cloud performance prediction is explained. This new introduction is named as Division of Load (DOL). The DOL method breaks down the CPU load by individual users and then separates the Disk IO load from the CPU load. In the first part, the concepts of the load signals are shown theoretically and experimentally as these metrics are introduced into the kernel for the first time. In the second part, the required code changes which are introduced to the OS kernel are discussed. The separation will help to collect the computer loads separately for individual users as CPU loads and Disk IOs loads. Such a move will open Grid, Cluster and Cloud Performance Predictors to use the divided data archives for better predictability of both CPU and Disk IO loads. Many existing Grid and Cloud resource prediction engines are going to be advantaged by this data purification and specialization.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"158 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9202382
J. Xuan, Hezhi Lin, Lianfeng Huang
In this paper, in order to solve the limitations of a single signal for the laryngeal health analysis, we propose a laryngeal data acquisition and processing system based on the concept of multi-modal. The system we designed is small and portable. In the system design, real-time, synchronous, and high-precision collection of multi-modal data of the throat is realized by calling each modal sensor. At the same time, the development of terminal software has realized the wireless transmission of multi-modal data, real-time storage, dynamic display, preliminary processing, and put forward new ideas for analyzing laryngeal problems.
{"title":"Multi-modal laryngeal data acquisition and processing system","authors":"J. Xuan, Hezhi Lin, Lianfeng Huang","doi":"10.1109/ICCSE49874.2020.9202382","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9202382","url":null,"abstract":"In this paper, in order to solve the limitations of a single signal for the laryngeal health analysis, we propose a laryngeal data acquisition and processing system based on the concept of multi-modal. The system we designed is small and portable. In the system design, real-time, synchronous, and high-precision collection of multi-modal data of the throat is realized by calling each modal sensor. At the same time, the development of terminal software has realized the wireless transmission of multi-modal data, real-time storage, dynamic display, preliminary processing, and put forward new ideas for analyzing laryngeal problems.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201833
Weina Cheng, Xinguo Yu
The development of intelligent technology has given birth to the emergence of new elements and relations in education, as well as the upgrading and transformation of the notification of old ones. An education model can help us better clarifying the core elements and their relations in education, so as to accurately discovering and grasping the primary contradictions and problems in the future work. This paper makes a literature review and finds that there are gaps between theory and technology, technology and industry, which make obstacles to the application of intelligent technology in education. The research first proposes a four-factor education reference model based on the perspective of embodied cognitive theory, and further elaborates the research status of each element in the model and its corresponding education problems. Secondly, the research and application of intelligent technology in solving educational problems are mainly discussed. Then, from three perspectives of teaching, learning, resources and space construction, this paper discusses how to solve the education problems with intelligent technology in recent years. Finally, this paper integrates the existing experience and the development trend of intelligent technology and proposes strategies for advancing the development of intelligent technology in the field of education from two aspects: dialogue between theory and technology, technology landing industry.
{"title":"The Mechanism of Intelligent Technology Reforming Education Based on the Perspective of Embodied Cognitive Theory*","authors":"Weina Cheng, Xinguo Yu","doi":"10.1109/ICCSE49874.2020.9201833","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201833","url":null,"abstract":"The development of intelligent technology has given birth to the emergence of new elements and relations in education, as well as the upgrading and transformation of the notification of old ones. An education model can help us better clarifying the core elements and their relations in education, so as to accurately discovering and grasping the primary contradictions and problems in the future work. This paper makes a literature review and finds that there are gaps between theory and technology, technology and industry, which make obstacles to the application of intelligent technology in education. The research first proposes a four-factor education reference model based on the perspective of embodied cognitive theory, and further elaborates the research status of each element in the model and its corresponding education problems. Secondly, the research and application of intelligent technology in solving educational problems are mainly discussed. Then, from three perspectives of teaching, learning, resources and space construction, this paper discusses how to solve the education problems with intelligent technology in recent years. Finally, this paper integrates the existing experience and the development trend of intelligent technology and proposes strategies for advancing the development of intelligent technology in the field of education from two aspects: dialogue between theory and technology, technology landing industry.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201788
Honghong Chen, Xu Wang, Liangguang Pan
With the rapid development of software industry, software testing, as an important means of software quality assurance, has been paid more and more attention by software enterprises. It has become an urgent need to train professional software testing talents, so software testing teaching is of great significance. This paper analyzes the current situation and existing problems of software testing curriculum teaching, discusses and improves the teaching methods of software testing courses, and develops a simple suspicious codes recognition tool based on abstract grammar tree and state machine for the difficulties of teaching content which based on defected modes testing , so as to help improve the quality of classroom teaching and better train professional software testing talents suitable for market demand.
{"title":"Research On Teaching Methods And Tools Of Software Testing","authors":"Honghong Chen, Xu Wang, Liangguang Pan","doi":"10.1109/ICCSE49874.2020.9201788","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201788","url":null,"abstract":"With the rapid development of software industry, software testing, as an important means of software quality assurance, has been paid more and more attention by software enterprises. It has become an urgent need to train professional software testing talents, so software testing teaching is of great significance. This paper analyzes the current situation and existing problems of software testing curriculum teaching, discusses and improves the teaching methods of software testing courses, and develops a simple suspicious codes recognition tool based on abstract grammar tree and state machine for the difficulties of teaching content which based on defected modes testing , so as to help improve the quality of classroom teaching and better train professional software testing talents suitable for market demand.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116078705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201727
Siyuan Chang, Caiquan Xiong, Dahai Xia
In marine navigation, we need to calculate the maneuver scheme of ships. The existing solution is lack of intelligence, which generally use the method of manual drawing for calculation, is also inevitably to increase the cost of manpower and time. For solving this problem, this paper proposes a ship maneuvering algorithm based on triangle transformation, which includes three aspects of approach maneuver, occupation position maneuver and avoidance maneuver. The algorithm takes the relative bearing, speed and position of target ship as inputs, predicts the relative bearing and the time required to complete the maneuver, and provides the support of decision for maritime tactical operations. Finally, the algorithm is implemented by Java programming language and simulated in all directions by MATLAB. The results show that the ship maneuvering scheme predicted by this method has a good fit with the actual situation, which verifies that the proposed algorithm has higher reliability and effectiveness.
{"title":"Algorithm and Simulation of Ship Maneuver Scheme in Marine Environment","authors":"Siyuan Chang, Caiquan Xiong, Dahai Xia","doi":"10.1109/ICCSE49874.2020.9201727","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201727","url":null,"abstract":"In marine navigation, we need to calculate the maneuver scheme of ships. The existing solution is lack of intelligence, which generally use the method of manual drawing for calculation, is also inevitably to increase the cost of manpower and time. For solving this problem, this paper proposes a ship maneuvering algorithm based on triangle transformation, which includes three aspects of approach maneuver, occupation position maneuver and avoidance maneuver. The algorithm takes the relative bearing, speed and position of target ship as inputs, predicts the relative bearing and the time required to complete the maneuver, and provides the support of decision for maritime tactical operations. Finally, the algorithm is implemented by Java programming language and simulated in all directions by MATLAB. The results show that the ship maneuvering scheme predicted by this method has a good fit with the actual situation, which verifies that the proposed algorithm has higher reliability and effectiveness.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116156389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}