Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914221
M. M. Razali, N. Azmi, A. Zakaria, L. Kamarudin, S. M. Mamduh, K. Kamarudin, S. Shukor, A. Shakaff, N. A. Rahim, F. Saad
Traditionally, the variety of animal species are accessed using conventional method that is normally costly, consumed a lot of time and the most important missing element is that it does not equipped with any permanent recording device. In order to replace this conventional method, an automated sound recording device is developed. This device has the capability to record the animal vocalization and has the power system to be used in remote area. This paper presents the work of sound analyzers for acoustic and health monitoring of the forest. The sound analyzer is important for the researcher as it can be used for further analysis such as frequency of animal vocalization and pattern recognition. The developed system uses the LabVIEW (Laboratory Virtual Instrument Engineering Workbench) platform.
{"title":"Sound analyser for bioacoustic monitoring system using LabVIEW","authors":"M. M. Razali, N. Azmi, A. Zakaria, L. Kamarudin, S. M. Mamduh, K. Kamarudin, S. Shukor, A. Shakaff, N. A. Rahim, F. Saad","doi":"10.1109/I4CT.2014.6914221","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914221","url":null,"abstract":"Traditionally, the variety of animal species are accessed using conventional method that is normally costly, consumed a lot of time and the most important missing element is that it does not equipped with any permanent recording device. In order to replace this conventional method, an automated sound recording device is developed. This device has the capability to record the animal vocalization and has the power system to be used in remote area. This paper presents the work of sound analyzers for acoustic and health monitoring of the forest. The sound analyzer is important for the researcher as it can be used for further analysis such as frequency of animal vocalization and pattern recognition. The developed system uses the LabVIEW (Laboratory Virtual Instrument Engineering Workbench) platform.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127015075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914214
Sameer A. Dawood, M. Anuar, F. S. Abdullah, F. Malek, R. A. Fayadh, Mohd Hariz Mohd Fakri
Orthogonal frequency division multiplexing (OFDM) is a very interesting approach for high data rate transmission in a multipath fading environment that leads to intersymbol interference (ISI). In this paper, two steps are used to improve the error rate performance of OFDM system. First, the discrete multiwavelet transform (DMWT) is proposed instead of fast Fourier transform (FFT) to obtain high orthogonality between subcarriers and hence reduce (ISI). Second, the performance of OFDM based on DMWT is examined for different modulation schemes such as M-PSK (M-ary phase shift keying) and M-QAM (M-ary quadrature amplitude modulation) to achieve high data rate. The simulation results demonstrated that, for high capacity data rate transmission, the M-QAM modulation is better than the M-PSK modulation.
{"title":"Comparison the performance of OFDM system based on multiwavelet transform with different modulation schemes","authors":"Sameer A. Dawood, M. Anuar, F. S. Abdullah, F. Malek, R. A. Fayadh, Mohd Hariz Mohd Fakri","doi":"10.1109/I4CT.2014.6914214","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914214","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a very interesting approach for high data rate transmission in a multipath fading environment that leads to intersymbol interference (ISI). In this paper, two steps are used to improve the error rate performance of OFDM system. First, the discrete multiwavelet transform (DMWT) is proposed instead of fast Fourier transform (FFT) to obtain high orthogonality between subcarriers and hence reduce (ISI). Second, the performance of OFDM based on DMWT is examined for different modulation schemes such as M-PSK (M-ary phase shift keying) and M-QAM (M-ary quadrature amplitude modulation) to achieve high data rate. The simulation results demonstrated that, for high capacity data rate transmission, the M-QAM modulation is better than the M-PSK modulation.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914144
B. Chandrika, P. Aparna, D. S. Sumam
A perceptual model developed in spatial domain based on background luminance is combined with lossless compression frame work to remove visually redundant information. Block matching is applied on anatomical symmetry present in medical images to remove intra slice and inter slice correlations. The obtained results show better compression gains against lossless compression techniques, without any degradation in visual quality.
{"title":"Symmetry based perceptually lossless compression of 3D medical images in spatial domain","authors":"B. Chandrika, P. Aparna, D. S. Sumam","doi":"10.1109/I4CT.2014.6914144","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914144","url":null,"abstract":"A perceptual model developed in spatial domain based on background luminance is combined with lossless compression frame work to remove visually redundant information. Block matching is applied on anatomical symmetry present in medical images to remove intra slice and inter slice correlations. The obtained results show better compression gains against lossless compression techniques, without any degradation in visual quality.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128129073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914148
M. F. Kamaruzaman, M. H. Azahari
Children with autism have their own set of impairments that affect their developments. Thus, the chance to attain self-determination may be critical for most if not all of autistic children. However, it is essential for them to obtain vital skill system in order to achieve a certain level of independent. Thus, it is necessary for every autistic children to acquire basic counting skills to enhance their self-determination. With the emergence of assistive learning technology such as Smartphone, PDA, tablets and laptop with touch screen facility, there are new certain ways to enrich the quality of life for individuals with autism. This study aims to explore the basic counting skills based dynamic visual for children with autism that will possibly be of assistance to parents, educators and facilitators in the development of digital assistive learning tools to meet the needs of autistic children's learning environment. From the proposed theoretical framework, an application was designed and tested on some of autistic users. Based on the observation of the experiment, the users showed positive attitude towards the outcome of the application.
{"title":"Form design development study on autistic counting skill learning application","authors":"M. F. Kamaruzaman, M. H. Azahari","doi":"10.1109/I4CT.2014.6914148","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914148","url":null,"abstract":"Children with autism have their own set of impairments that affect their developments. Thus, the chance to attain self-determination may be critical for most if not all of autistic children. However, it is essential for them to obtain vital skill system in order to achieve a certain level of independent. Thus, it is necessary for every autistic children to acquire basic counting skills to enhance their self-determination. With the emergence of assistive learning technology such as Smartphone, PDA, tablets and laptop with touch screen facility, there are new certain ways to enrich the quality of life for individuals with autism. This study aims to explore the basic counting skills based dynamic visual for children with autism that will possibly be of assistance to parents, educators and facilitators in the development of digital assistive learning tools to meet the needs of autistic children's learning environment. From the proposed theoretical framework, an application was designed and tested on some of autistic users. Based on the observation of the experiment, the users showed positive attitude towards the outcome of the application.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914229
Noor Ashitah Abu Othman, Fakariah Hani Mohd Ali, Mashyum Binti Mohd Noh
SQL Injection Attacks (SQLIAs) become a major issue nowadays which open opportunities for unrestricted access to the database that underlie web applications. The purpose of this research is to develop a multi-level prevention techniques in order to cater the SQLIAs. The proposed prevention technique combines Query Tokenization and Adaptive Method that will be implemented on multiple platforms that using asp.net programming language. This technique was tested using 5 test cases to ensure it effectiveness. The outcome of this project is frameworks of prevention technique that can be used for other developer to make sure their web application being secured and avoid the hackers exploit the databases by using SQL injection.
{"title":"Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks","authors":"Noor Ashitah Abu Othman, Fakariah Hani Mohd Ali, Mashyum Binti Mohd Noh","doi":"10.1109/I4CT.2014.6914229","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914229","url":null,"abstract":"SQL Injection Attacks (SQLIAs) become a major issue nowadays which open opportunities for unrestricted access to the database that underlie web applications. The purpose of this research is to develop a multi-level prevention techniques in order to cater the SQLIAs. The proposed prevention technique combines Query Tokenization and Adaptive Method that will be implemented on multiple platforms that using asp.net programming language. This technique was tested using 5 test cases to ensure it effectiveness. The outcome of this project is frameworks of prevention technique that can be used for other developer to make sure their web application being secured and avoid the hackers exploit the databases by using SQL injection.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"14 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914182
Amirmohammad Sadeghian, M. Zamani, Azizah Abd Manaf
SQL injection is one of well-known web application vulnerabilities. SQL injection is a type of attack which attacker attempts to insert malicious SQL query through none sanitized variables into the web application. Consequently web application will concatenate the variable with the legitimate query and will send it to the database for execution. In result of a successful SQL injection attack, the attacker can read from the database or modify entities of the database (Insert, Delete, Update). Currently different types of defense systems are available to defeat this vulnerability. However some of these techniques needs to stop the existence web application and patch the vulnerability, and since this process might be time consuming, it is not very practical for companies to stop their online services. To address this problem we proposed a model which can generally patch the SQL injection vulnerability. The model is not dependent on the language which the web application is written in and the amount of necessary changes in the application is low. The model can be implemented as a library which can be include in the vulnerable web application by calling one line of code.
{"title":"SQL injection vulnerability general patch using header sanitization","authors":"Amirmohammad Sadeghian, M. Zamani, Azizah Abd Manaf","doi":"10.1109/I4CT.2014.6914182","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914182","url":null,"abstract":"SQL injection is one of well-known web application vulnerabilities. SQL injection is a type of attack which attacker attempts to insert malicious SQL query through none sanitized variables into the web application. Consequently web application will concatenate the variable with the legitimate query and will send it to the database for execution. In result of a successful SQL injection attack, the attacker can read from the database or modify entities of the database (Insert, Delete, Update). Currently different types of defense systems are available to defeat this vulnerability. However some of these techniques needs to stop the existence web application and patch the vulnerability, and since this process might be time consuming, it is not very practical for companies to stop their online services. To address this problem we proposed a model which can generally patch the SQL injection vulnerability. The model is not dependent on the language which the web application is written in and the amount of necessary changes in the application is low. The model can be implemented as a library which can be include in the vulnerable web application by calling one line of code.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130896860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914197
A. Sayegh, M. Z. Mohd Jenu, S. Z. Sapuan
Printed Circuit Board (PCB) traces are one of most important PCB Radiated Emissions (RE) sources. These traces is becoming electrically long as the trace length is comparable with the wavelength resulting in higher RE. Therefore, it is essential to predict the RE to avoid out of compliance test issues. In this paper, a neural network Multi-Layer Percetron (MLP) model is developed to predict the radiated emissions of PCB traces. The MLP model is then trained and tested using data set generated based recently developed closed-form equations. Results had shown that a good estimate of the radiated emissions can be obtained using this developed model avoiding both the time-consuming simulations and expensive prototype testing in the compliance chambers. Double-layer PCB is fabricated to validate the proposed neural network model by measurement in a Semi Anechoic Chamber (SAC). Moreover, reasonable agreements are obtained between the measurement and proposed model results.
{"title":"Neural network based model for radiated emissions prediction from high speed PCB traces","authors":"A. Sayegh, M. Z. Mohd Jenu, S. Z. Sapuan","doi":"10.1109/I4CT.2014.6914197","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914197","url":null,"abstract":"Printed Circuit Board (PCB) traces are one of most important PCB Radiated Emissions (RE) sources. These traces is becoming electrically long as the trace length is comparable with the wavelength resulting in higher RE. Therefore, it is essential to predict the RE to avoid out of compliance test issues. In this paper, a neural network Multi-Layer Percetron (MLP) model is developed to predict the radiated emissions of PCB traces. The MLP model is then trained and tested using data set generated based recently developed closed-form equations. Results had shown that a good estimate of the radiated emissions can be obtained using this developed model avoiding both the time-consuming simulations and expensive prototype testing in the compliance chambers. Double-layer PCB is fabricated to validate the proposed neural network model by measurement in a Semi Anechoic Chamber (SAC). Moreover, reasonable agreements are obtained between the measurement and proposed model results.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914140
M. A. Miskam, O. Sidek, Inzarulfaisham Abd Rahim, M. Q. Omar, M. Z. Ishak, Mohd Zalmi Yop, Mohamed Azmil Irfan Mohamed Amiruddin, Siti Zulaikha Hashim
This paper presents the deployment wireless sensor network for paddy field crop application. The system can monitor pH level and water level in the paddy field crop. The calibration and system design of the sensor nodes were discussed. The sensor nodes installed at the Titi Serong Paddy field Crop, Malaysia. The system uses wireless data transmission to enable farmers to monitor continuously the water level and pH level at home without constant visits to the paddy field. This system can significantly reduce farmer workload while increasing crop yield.
{"title":"Deployment of wireless sensor network at Titi Serong Paddy field Crop, Malaysia","authors":"M. A. Miskam, O. Sidek, Inzarulfaisham Abd Rahim, M. Q. Omar, M. Z. Ishak, Mohd Zalmi Yop, Mohamed Azmil Irfan Mohamed Amiruddin, Siti Zulaikha Hashim","doi":"10.1109/I4CT.2014.6914140","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914140","url":null,"abstract":"This paper presents the deployment wireless sensor network for paddy field crop application. The system can monitor pH level and water level in the paddy field crop. The calibration and system design of the sensor nodes were discussed. The sensor nodes installed at the Titi Serong Paddy field Crop, Malaysia. The system uses wireless data transmission to enable farmers to monitor continuously the water level and pH level at home without constant visits to the paddy field. This system can significantly reduce farmer workload while increasing crop yield.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122785017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914149
A. Sohail, P. Dominic, K. Shahzad
Researches on resource allocations in business process management systems leave an impact to adopt a concrete method for resource performance analysis and evaluations. One established way is a posterior performance evaluation. The ultimate aim in these evaluation methods is identification of most appropriate combination of resources. But, it is found that different types of resources are showing different behavior with the same task. The literature shows that relationship (task to resource) based evaluation of resources is not well understood and use of business process intelligence techniques are not adequately explored. The aim of this research is to present a business process intelligence based resource evaluation method that also provide act of improvement to decision maker. Resources in business process environment are classified into human resources (human agents) and non-human resources (aka tools, machine and software). The two types of resources are not equally similar in behaviors and showing different impact on process performance. This research presents resource classification based evaluation method that identifies a set of relationship between two types of resources and task (named competence, suitability and preference). However, only non-human resource's relationship with task is presented in detail as a resource suitability model. A user guided resources suitability method is developed for the suitability model. Health care case study is used to illustrate the applicability of the method.
{"title":"A process warehouse based resource suitability evaluation method for business process improvement","authors":"A. Sohail, P. Dominic, K. Shahzad","doi":"10.1109/I4CT.2014.6914149","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914149","url":null,"abstract":"Researches on resource allocations in business process management systems leave an impact to adopt a concrete method for resource performance analysis and evaluations. One established way is a posterior performance evaluation. The ultimate aim in these evaluation methods is identification of most appropriate combination of resources. But, it is found that different types of resources are showing different behavior with the same task. The literature shows that relationship (task to resource) based evaluation of resources is not well understood and use of business process intelligence techniques are not adequately explored. The aim of this research is to present a business process intelligence based resource evaluation method that also provide act of improvement to decision maker. Resources in business process environment are classified into human resources (human agents) and non-human resources (aka tools, machine and software). The two types of resources are not equally similar in behaviors and showing different impact on process performance. This research presents resource classification based evaluation method that identifies a set of relationship between two types of resources and task (named competence, suitability and preference). However, only non-human resource's relationship with task is presented in detail as a resource suitability model. A user guided resources suitability method is developed for the suitability model. Health care case study is used to illustrate the applicability of the method.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129908405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914143
LinShen Liew, W. Wong
A novel indoor positioning method based on user's inertial measurements, measured radio signal strength indicator (RSSI), and compass readings is presented. Based on distance travelled derived from inertial measurements and heading direction from compass readings, the user's position is initially computed using Dead-Reckoning (DR) method. Then the estimated position, under certain condition, will be further corrected based on the RSSI and compass reading. Experiment results are presented to show the feasibility of the proposed method.
{"title":"Indoor positioning method based on inertial data, RSSI and compass from handheld smart-device","authors":"LinShen Liew, W. Wong","doi":"10.1109/I4CT.2014.6914143","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914143","url":null,"abstract":"A novel indoor positioning method based on user's inertial measurements, measured radio signal strength indicator (RSSI), and compass readings is presented. Based on distance travelled derived from inertial measurements and heading direction from compass readings, the user's position is initially computed using Dead-Reckoning (DR) method. Then the estimated position, under certain condition, will be further corrected based on the RSSI and compass reading. Experiment results are presented to show the feasibility of the proposed method.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}