Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676297
C. Pandey, V. Mishra, Neeraj Kumar Tiwari
Apart from how it can be used throughout the world, to generate various benefits and opportunities for everyone, Deepfakes can be optimally used. Technology can be empowered as it is powerful enabler. Due to research and development in AI and data science, new concepts and techniques have been introduced. It is strong benefits of AI is that it provide opportunities and capabilities for everyone regardless who are using it. In this paper, we try to go into deep about deepfakes possibility and opportunities of uses. I always try to find possibility in everything, although deepfake concept is used for negative purposes but as it a technology, I tried to find out possible benefits of it and how it can be useful for improvements of life of people, strengthen institution and communities.
{"title":"Deepfakes: When to Use It","authors":"C. Pandey, V. Mishra, Neeraj Kumar Tiwari","doi":"10.1109/SMART52563.2021.9676297","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676297","url":null,"abstract":"Apart from how it can be used throughout the world, to generate various benefits and opportunities for everyone, Deepfakes can be optimally used. Technology can be empowered as it is powerful enabler. Due to research and development in AI and data science, new concepts and techniques have been introduced. It is strong benefits of AI is that it provide opportunities and capabilities for everyone regardless who are using it. In this paper, we try to go into deep about deepfakes possibility and opportunities of uses. I always try to find possibility in everything, although deepfake concept is used for negative purposes but as it a technology, I tried to find out possible benefits of it and how it can be useful for improvements of life of people, strengthen institution and communities.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676240
Yashika Sharma, Richa Singh
A new dataset is being provided by the paper for analyzing traffic incidents. The mission is about addressing lack of publicly available data needed for research into automated spatiotemporal annotations for road safety. Because of the object sizes and sophistication of scenes, we found a substantial degradation of detection of object inside the pedestrian group in our dataset after analyzing it. We are using here 2 datasets one of them is the DETRAC dataset which is used for vehicle detection and the other one is CADP which contains the accidents and we are supposed to detect them. Car Accident Detection and Prediction (CADP) dataset contains YouTube video segments 1,416 around, of which 205 have absolute spatiotemporal annotations. Due to the object sizes and sophistication of the scenes, we found a major degradation of object detection in the pedestrian group of the CADP dataset. To this end, we suggest incorporating Augmented Context Mining (ACM) into the Faster version of R-CNN detector for the improvement of small pedestrian detection accuracy.
{"title":"Smart Vehicle Accident Detection System using Faster R-CNN","authors":"Yashika Sharma, Richa Singh","doi":"10.1109/SMART52563.2021.9676240","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676240","url":null,"abstract":"A new dataset is being provided by the paper for analyzing traffic incidents. The mission is about addressing lack of publicly available data needed for research into automated spatiotemporal annotations for road safety. Because of the object sizes and sophistication of scenes, we found a substantial degradation of detection of object inside the pedestrian group in our dataset after analyzing it. We are using here 2 datasets one of them is the DETRAC dataset which is used for vehicle detection and the other one is CADP which contains the accidents and we are supposed to detect them. Car Accident Detection and Prediction (CADP) dataset contains YouTube video segments 1,416 around, of which 205 have absolute spatiotemporal annotations. Due to the object sizes and sophistication of the scenes, we found a major degradation of object detection in the pedestrian group of the CADP dataset. To this end, we suggest incorporating Augmented Context Mining (ACM) into the Faster version of R-CNN detector for the improvement of small pedestrian detection accuracy.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121272202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/smart52563.2021.9676301
{"title":"[Front matter]","authors":"","doi":"10.1109/smart52563.2021.9676301","DOIUrl":"https://doi.org/10.1109/smart52563.2021.9676301","url":null,"abstract":"","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676302
Pradeep Kumar, Madhurendra Kumar, Kuldeep Singh, A. Tripathi, Aman Kumar
The commercial web application can benefit from Blockchain technology as it provides a high level of security. Blockchain technology has demonstrated its effectiveness in a multitude of fields, including online banking, supply chain management, machine learning, international payments, the Internet of Things, customer relationship management, and many others.The blockchain has the potential to be employed in the disruption detection area, as it can provide data storage integrity and process transparency. In this paper we can handle the condition of cybersecurity threats according to the propose blockchain detection condition model process.The aim of the model is to identify cyber threats and potential accidents using interruption detection systems, which are commonly used in computer networks. Collaborative interruption detection networks, which enable interruption detection system nodes to share data with each other, have been designed to improve the detection capabilities of a single interruption detection system.Current detection architecture is still plagued by data and trust management issues, which could jeopardize the efficacy of such systems. The blockchain technology has gained widespread adoption in the financial industry, mainly through the use of cryptocurrencies. Keywords: Interruption Detection Systems, Blockchain, Cryptocurrencies, Cybersecurity
{"title":"Blockchain Security Detection Condition Light Module","authors":"Pradeep Kumar, Madhurendra Kumar, Kuldeep Singh, A. Tripathi, Aman Kumar","doi":"10.1109/SMART52563.2021.9676302","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676302","url":null,"abstract":"The commercial web application can benefit from Blockchain technology as it provides a high level of security. Blockchain technology has demonstrated its effectiveness in a multitude of fields, including online banking, supply chain management, machine learning, international payments, the Internet of Things, customer relationship management, and many others.The blockchain has the potential to be employed in the disruption detection area, as it can provide data storage integrity and process transparency. In this paper we can handle the condition of cybersecurity threats according to the propose blockchain detection condition model process.The aim of the model is to identify cyber threats and potential accidents using interruption detection systems, which are commonly used in computer networks. Collaborative interruption detection networks, which enable interruption detection system nodes to share data with each other, have been designed to improve the detection capabilities of a single interruption detection system.Current detection architecture is still plagued by data and trust management issues, which could jeopardize the efficacy of such systems. The blockchain technology has gained widespread adoption in the financial industry, mainly through the use of cryptocurrencies. Keywords: Interruption Detection Systems, Blockchain, Cryptocurrencies, Cybersecurity","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676274
J. Singh, P. Johri, Rishabh Jain, Rishabh Sharma, Faisal Anwar
The details or the main point provided by divergent source medical images procedure into a single combined image is represented by medical image fusion. The single combined image gives extra medical data which would be more useful in the treatment and diagnosis of a patient and for the study of various diseases. It is very important for the clinicians to completely analyze patient information from different modalities. The overall data of divergent medical images procedure is furnished by medical image fusion. A medical image fusion supported nonsubsampled shearlet transform domain is presented during an analysis of the paper. However, the model passes over the semantics of an image, which makes the clinical very hard to know the fused medical images. In this research paper will solve the problem of semantic loss of the fussed images by providing a new assessment parameter to calculate the semantic loss. The final result is very promising: The assessment of the final result shows the Excellence achievement in Quantitative and visual and lessen the semantic data loss and has a better optical result of the present medical image fusion.
{"title":"Semantic Medical Image Fusion based on NSST Domain","authors":"J. Singh, P. Johri, Rishabh Jain, Rishabh Sharma, Faisal Anwar","doi":"10.1109/SMART52563.2021.9676274","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676274","url":null,"abstract":"The details or the main point provided by divergent source medical images procedure into a single combined image is represented by medical image fusion. The single combined image gives extra medical data which would be more useful in the treatment and diagnosis of a patient and for the study of various diseases. It is very important for the clinicians to completely analyze patient information from different modalities. The overall data of divergent medical images procedure is furnished by medical image fusion. A medical image fusion supported nonsubsampled shearlet transform domain is presented during an analysis of the paper. However, the model passes over the semantics of an image, which makes the clinical very hard to know the fused medical images. In this research paper will solve the problem of semantic loss of the fussed images by providing a new assessment parameter to calculate the semantic loss. The final result is very promising: The assessment of the final result shows the Excellence achievement in Quantitative and visual and lessen the semantic data loss and has a better optical result of the present medical image fusion.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124441790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676246
Shrikant Chavate, Ravi Mishra, Pranay Yadav
Video shot boundary detection is the crucial step in the field of video processing. This makes the task of content-based video retrieval, indexing and browsing of videos. In the last decade, many researchers contributed for the shot boundary detection for different types of videos. Their remarkable efforts and outcomes have been studied and its comparison is showcased in this paper. This paper contains the survey of different methodologies implemented to achieve the task of Shot Boundary Detection along with key performance measurement parameters. This includes different preprocessing techniques, feature extraction methodologies, similarity computation techniques, etc. The outcomes of different approaches are framed with reference to accuracy, speed of computation and along with comparison of precision, recall and F1 score.
{"title":"A Comparative Analysis of Video Shot Boundary Detection using Different Approaches","authors":"Shrikant Chavate, Ravi Mishra, Pranay Yadav","doi":"10.1109/SMART52563.2021.9676246","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676246","url":null,"abstract":"Video shot boundary detection is the crucial step in the field of video processing. This makes the task of content-based video retrieval, indexing and browsing of videos. In the last decade, many researchers contributed for the shot boundary detection for different types of videos. Their remarkable efforts and outcomes have been studied and its comparison is showcased in this paper. This paper contains the survey of different methodologies implemented to achieve the task of Shot Boundary Detection along with key performance measurement parameters. This includes different preprocessing techniques, feature extraction methodologies, similarity computation techniques, etc. The outcomes of different approaches are framed with reference to accuracy, speed of computation and along with comparison of precision, recall and F1 score.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676306
A. K. Singh
The kinetics of alkali catalyzed hydrolysis of ethyl caprylate water-acetone mixture has been studied at different range of temperature 20 to 40°c. and covering composition range of 30 to 70% (v/v) of Acetone. With increasing composition of solvent, it has been observed to decrease in reaction rate. Activation energy has been found decreases with increasing percentage of acetone content of the medium. The influence of water and dielectric constant on reaction rate has been also studied. The thermodynamic parameters (ΔG*, ΔH* & ΔS*) has been determined which showed strong dependency on solvent composition.
{"title":"Kinetics Investigation of Solvent Polarity on Reaction Rate for Solvolysis of Ethyl Caprylate Ester in Binary Solvent System","authors":"A. K. Singh","doi":"10.1109/SMART52563.2021.9676306","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676306","url":null,"abstract":"The kinetics of alkali catalyzed hydrolysis of ethyl caprylate water-acetone mixture has been studied at different range of temperature 20 to 40°c. and covering composition range of 30 to 70% (v/v) of Acetone. With increasing composition of solvent, it has been observed to decrease in reaction rate. Activation energy has been found decreases with increasing percentage of acetone content of the medium. The influence of water and dielectric constant on reaction rate has been also studied. The thermodynamic parameters (ΔG*, ΔH* & ΔS*) has been determined which showed strong dependency on solvent composition.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676292
Vikas Attri, Ankush Kapoor
On the e-commerce websites people buy/ sell products or services by making monetary transactions through online payment system like debit card, credit card, UPI, payment wallet, internet banking. By 2021, mostly company depends on analytics techniques to increase the ROI of the business. Today, online social networking websites are providing a platform to the businesses to promote their products or services on social media sites and e-commerce sites. Today e-commerce websites not only provides huge data for e-commerce companies, but also provide insights data using so many analytics techniques which shows how people behave after seeing their ads and many more. This integration of e-commerce using analytics is the main area of the present research. The growth in electronic commerce has contributed to a major rise in demand for information for businesses. E-commerce turns old economic relationships into modern economic relationships characterized by end-to-end relationship management solutions. In this paper we study and compare the existing models of E-Commerce that based on business analytics models.
{"title":"A Relative Study on Existing Models of e-Commerce Sites Based on Analytics","authors":"Vikas Attri, Ankush Kapoor","doi":"10.1109/SMART52563.2021.9676292","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676292","url":null,"abstract":"On the e-commerce websites people buy/ sell products or services by making monetary transactions through online payment system like debit card, credit card, UPI, payment wallet, internet banking. By 2021, mostly company depends on analytics techniques to increase the ROI of the business. Today, online social networking websites are providing a platform to the businesses to promote their products or services on social media sites and e-commerce sites. Today e-commerce websites not only provides huge data for e-commerce companies, but also provide insights data using so many analytics techniques which shows how people behave after seeing their ads and many more. This integration of e-commerce using analytics is the main area of the present research. The growth in electronic commerce has contributed to a major rise in demand for information for businesses. E-commerce turns old economic relationships into modern economic relationships characterized by end-to-end relationship management solutions. In this paper we study and compare the existing models of E-Commerce that based on business analytics models.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130230350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9676217
P. B. Devi, K. Sharmila
Information blend implies the trade-off of confirmation presented by various sources of information to make a decision. With respect to biometrics, evidence compromise expects an essential part in updating the affirmation precision of human confirmation systems and is insinuated as multibiometric. Multibiometric systems join the information presented by various biometric sensors, estimations, tests, units, or characteristics. Besides overhauling planning with execution, these systems are depended upon to additionally foster people consideration, predict spoofing, and give variation to non-basic inability to biometric applications. Thinning is the important step in preprocessing phase of fingerprint and iris recognition System. This paper dissects the importance to analyze the pixel variations and the nerve abnormalities observed in the fused modality using bag of pixel volatility image classification (BOPVIC)algorithm. The thinning algorithms such as Zhang- Suen’s and Guo-Hall’s are incorporated in order to analyze the correlative loss of tissues, along with conceivably identifying the lap in the compression/ repression of eye ridges that could be a consequent to pitted keratolysis.
{"title":"Anatomizing Hybrid Biometric Modality to Identify Tissue Loss and Pitted Keratolysis using BOPVIC Algorithm in Humans","authors":"P. B. Devi, K. Sharmila","doi":"10.1109/SMART52563.2021.9676217","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676217","url":null,"abstract":"Information blend implies the trade-off of confirmation presented by various sources of information to make a decision. With respect to biometrics, evidence compromise expects an essential part in updating the affirmation precision of human confirmation systems and is insinuated as multibiometric. Multibiometric systems join the information presented by various biometric sensors, estimations, tests, units, or characteristics. Besides overhauling planning with execution, these systems are depended upon to additionally foster people consideration, predict spoofing, and give variation to non-basic inability to biometric applications. Thinning is the important step in preprocessing phase of fingerprint and iris recognition System. This paper dissects the importance to analyze the pixel variations and the nerve abnormalities observed in the fused modality using bag of pixel volatility image classification (BOPVIC)algorithm. The thinning algorithms such as Zhang- Suen’s and Guo-Hall’s are incorporated in order to analyze the correlative loss of tissues, along with conceivably identifying the lap in the compression/ repression of eye ridges that could be a consequent to pitted keratolysis.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130240896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-10DOI: 10.1109/SMART52563.2021.9675307
R. Kulkarni, Chirag Jain, Luv Gupta, Pravesh Ganwani, V. Hole
In this modern era, high-rise buildings and skyscrapers are almost everywhere and the average number of floors in a building is almost 40. Thus, elevators play a crucial role in minimizing the time taken by people to reach their desired floor. We as computer scientists need to analyze how the elevators function and thus need to study the working of elevators to improve upon the existing algorithms. The following paper is a comparative study of various elevator dispatching algorithms, their working, and the results after simulating those algorithms. It first describes the Backtracking algorithm followed by the Q-learning approach and finally the Deep Q-learning approach to tackle the optimal control problem of elevator dispatching to minimize the waiting time of the passengers. The present research was conducted to study and investigate the merits and demerits of each of these techniques and how efficiently they solve the problem at hand.
{"title":"Performance Benchmarking and Analysis of Various Elevator Dispatching Strategies","authors":"R. Kulkarni, Chirag Jain, Luv Gupta, Pravesh Ganwani, V. Hole","doi":"10.1109/SMART52563.2021.9675307","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9675307","url":null,"abstract":"In this modern era, high-rise buildings and skyscrapers are almost everywhere and the average number of floors in a building is almost 40. Thus, elevators play a crucial role in minimizing the time taken by people to reach their desired floor. We as computer scientists need to analyze how the elevators function and thus need to study the working of elevators to improve upon the existing algorithms. The following paper is a comparative study of various elevator dispatching algorithms, their working, and the results after simulating those algorithms. It first describes the Backtracking algorithm followed by the Q-learning approach and finally the Deep Q-learning approach to tackle the optimal control problem of elevator dispatching to minimize the waiting time of the passengers. The present research was conducted to study and investigate the merits and demerits of each of these techniques and how efficiently they solve the problem at hand.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}