Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645910
S. Thainimit, Luís A. Alexandre, Vasco M N de Almeida
Human iris recognition systems are an attractive form of non-intrusive bio-identification with many potential applications. However, the accuracy of these systems is still limited due to challenges presented by iris surface deformation. This paper provides an introduction to the physiology of the iris, describes the problem of iris deformation, and presents a review of past and current software approaches to iris recognition. The focus is on methods related to the physiology of the iris.
{"title":"Iris surface deformation and normalization","authors":"S. Thainimit, Luís A. Alexandre, Vasco M N de Almeida","doi":"10.1109/ISCIT.2013.6645910","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645910","url":null,"abstract":"Human iris recognition systems are an attractive form of non-intrusive bio-identification with many potential applications. However, the accuracy of these systems is still limited due to challenges presented by iris surface deformation. This paper provides an introduction to the physiology of the iris, describes the problem of iris deformation, and presents a review of past and current software approaches to iris recognition. The focus is on methods related to the physiology of the iris.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645821
Weikai Xu, Lin Wang, Zhuhan Jiang
In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.
{"title":"A new user cooperative protocol based on code-shifted differential chaos shift keying modulation","authors":"Weikai Xu, Lin Wang, Zhuhan Jiang","doi":"10.1109/ISCIT.2013.6645821","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645821","url":null,"abstract":"In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645829
Guofa Cai, Lin Wang, Tingting Huang
In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.
{"title":"Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel","authors":"Guofa Cai, Lin Wang, Tingting Huang","doi":"10.1109/ISCIT.2013.6645829","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645829","url":null,"abstract":"In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645929
A. P. Shrestha, Jai-Jin Jung, K. Kwak
Physical layer security schemes for wireless communication can prevent eavesdropping even without use of upper layer cryptographic algorithms. As such, physical layer security based on information theoretic constraint is gaining both theoretical and practical importance in research community. In this paper, we investigate the physical layer security for wireless multicasting scheme consisting of a single antenna transmitter with multiple receivers and eavesdroppers both equipped with multiple antennas under quasi-static Rayleigh fading channel. We develop new closed-form expressions for the analysis of probability of positive secrecy as well as outage probability. We show that the physical layer security can be maintained even in presence of multiple eavesdroppers consisting multiple antennas. Furthermore, we also analyze the effect of number of antennas, users and eavesdroppers in the numerical results.
{"title":"Secure wireless multicasting in presence of multiple eavesdroppers","authors":"A. P. Shrestha, Jai-Jin Jung, K. Kwak","doi":"10.1109/ISCIT.2013.6645929","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645929","url":null,"abstract":"Physical layer security schemes for wireless communication can prevent eavesdropping even without use of upper layer cryptographic algorithms. As such, physical layer security based on information theoretic constraint is gaining both theoretical and practical importance in research community. In this paper, we investigate the physical layer security for wireless multicasting scheme consisting of a single antenna transmitter with multiple receivers and eavesdroppers both equipped with multiple antennas under quasi-static Rayleigh fading channel. We develop new closed-form expressions for the analysis of probability of positive secrecy as well as outage probability. We show that the physical layer security can be maintained even in presence of multiple eavesdroppers consisting multiple antennas. Furthermore, we also analyze the effect of number of antennas, users and eavesdroppers in the numerical results.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645938
M. Phothisonothai, Yasunori Arita, Katsumi Watanabe
Measures of irregularity and complexity in time-series data can be quantified by using fractal dimension (FD) which may convey useful information and showing a strong correlation with the physiological data, e.g., speech. The time-dependent FD (TDFD) has been proven to be effective method in various physiological studies. However, the TDFD result depends on the time windowing, i.e., length and type which could provide different features. Therefore, in this paper, the effects of time windowing of TDFD by spanning 28 to 212-point length and four window functions were investigated. The FD was computed by using Higuchi's method. In experiment, speech data recorded from 15 Japanese utterances, 4 different ways of expression (accosting, wholehearted, normal, and uninterested). The obtained results were useful in selecting time windowing based on TDFD method in which could extract different intonations effectively.
{"title":"Effects of time windowing for extraction of expression from Japanese speech: Higuchi's fractal dimension","authors":"M. Phothisonothai, Yasunori Arita, Katsumi Watanabe","doi":"10.1109/ISCIT.2013.6645938","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645938","url":null,"abstract":"Measures of irregularity and complexity in time-series data can be quantified by using fractal dimension (FD) which may convey useful information and showing a strong correlation with the physiological data, e.g., speech. The time-dependent FD (TDFD) has been proven to be effective method in various physiological studies. However, the TDFD result depends on the time windowing, i.e., length and type which could provide different features. Therefore, in this paper, the effects of time windowing of TDFD by spanning 28 to 212-point length and four window functions were investigated. The FD was computed by using Higuchi's method. In experiment, speech data recorded from 15 Japanese utterances, 4 different ways of expression (accosting, wholehearted, normal, and uninterested). The obtained results were useful in selecting time windowing based on TDFD method in which could extract different intonations effectively.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645931
Ratchanok Chaipraserth, A. Leelasantitham, S. Kiattisin
Nowadays, the growth of IT business are highly competitive both of development process and functionality of software to meet mostly customer requirements. Normally, software performance should develop to increase the high quality whilst it should reduce both of the cost and the time. The IT business is to start the attention with satisfaction of the customer for expanding opportunities of grown business. The problem of former software development is an operation under the pressure conditions affecting to see more bugs of the software in a period of testing system and delivering the program to the required customer. This paper presents an implementation of approach which is an agile development (If what we do that able to modify the code to meet the requirement in the future, that's call agile.) using Test Driven Development (TDD) in automation testing framework for software development process. It helps optimization of software testing as it can found early bug, flexible for requirement changes in the future, either to increase or change requirement without any effect on coding behavior. It also helps to reduce cost of software development as a human resource, time and rapid feedback of test result. We apply this approach with prototype in software development processes using the Point of care testing (POCT) system which is as an example to create test case with black-box and white-box testing techniques based on the requirements specification to improve more product quality.
{"title":"A test automation framework in POCT system using TDD techniques","authors":"Ratchanok Chaipraserth, A. Leelasantitham, S. Kiattisin","doi":"10.1109/ISCIT.2013.6645931","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645931","url":null,"abstract":"Nowadays, the growth of IT business are highly competitive both of development process and functionality of software to meet mostly customer requirements. Normally, software performance should develop to increase the high quality whilst it should reduce both of the cost and the time. The IT business is to start the attention with satisfaction of the customer for expanding opportunities of grown business. The problem of former software development is an operation under the pressure conditions affecting to see more bugs of the software in a period of testing system and delivering the program to the required customer. This paper presents an implementation of approach which is an agile development (If what we do that able to modify the code to meet the requirement in the future, that's call agile.) using Test Driven Development (TDD) in automation testing framework for software development process. It helps optimization of software testing as it can found early bug, flexible for requirement changes in the future, either to increase or change requirement without any effect on coding behavior. It also helps to reduce cost of software development as a human resource, time and rapid feedback of test result. We apply this approach with prototype in software development processes using the Point of care testing (POCT) system which is as an example to create test case with black-box and white-box testing techniques based on the requirements specification to improve more product quality.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645898
Chayanut Petpairote, S. Madarasmi
A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).
{"title":"Face recognition improvement by converting expression faces to neutral faces","authors":"Chayanut Petpairote, S. Madarasmi","doi":"10.1109/ISCIT.2013.6645898","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645898","url":null,"abstract":"A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645942
S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham
A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.
{"title":"Human body transfer function model for ultra wideband body area network","authors":"S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham","doi":"10.1109/ISCIT.2013.6645942","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645942","url":null,"abstract":"A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645923
C. Bunkhumpornpat, Sitthichoke Subpaiboonkit
In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.
{"title":"Safe level graph for synthetic minority over-sampling techniques","authors":"C. Bunkhumpornpat, Sitthichoke Subpaiboonkit","doi":"10.1109/ISCIT.2013.6645923","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645923","url":null,"abstract":"In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645854
S. Kungpisdan, Atipat Thongyon
Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.
{"title":"Improving identity privacy and authentication in SIP transactions","authors":"S. Kungpisdan, Atipat Thongyon","doi":"10.1109/ISCIT.2013.6645854","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645854","url":null,"abstract":"Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}