Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627002
P. G. Humphrey, G. Bashford
An effort has been underway to develop a system for de novo sequencing of single DNA molecules with very long reads. The system operates by optically detecting the passage of fluorescently tagged DNA bases through a detection zone. A successful system would be revolutionary with respect to speed, read length, cost and minimized laboratory infrastructure. An important part of system development is modeling of the detection process. In particular, predicting the expected error from a set of sequencing parameters is helpful in system design. This paper describes variations on the Smith-Waterman algorithm for subsequence alignment used in a single-molecule detection model. The alignment algorithm is used to check the modeled output sequence generated from a known input sequence. Variations based on reasonable assumptions led to over an order of magnitude improvement in alignment speed
{"title":"Imposed constraints on the Smith-Waterman alignment algorithm for enhanced modeling of a single-molecule DNA sequencer","authors":"P. G. Humphrey, G. Bashford","doi":"10.1109/EIT.2005.1627002","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627002","url":null,"abstract":"An effort has been underway to develop a system for de novo sequencing of single DNA molecules with very long reads. The system operates by optically detecting the passage of fluorescently tagged DNA bases through a detection zone. A successful system would be revolutionary with respect to speed, read length, cost and minimized laboratory infrastructure. An important part of system development is modeling of the detection process. In particular, predicting the expected error from a set of sequencing parameters is helpful in system design. This paper describes variations on the Smith-Waterman algorithm for subsequence alignment used in a single-molecule detection model. The alignment algorithm is used to check the modeled output sequence generated from a known input sequence. Variations based on reasonable assumptions led to over an order of magnitude improvement in alignment speed","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627036
H. Kimm, S. Shin, Charlie Y. Shim
In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does
{"title":"Two approaches to improve Java MIDP record management system in wireless devices","authors":"H. Kimm, S. Shin, Charlie Y. Shim","doi":"10.1109/EIT.2005.1627036","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627036","url":null,"abstract":"In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627056
H. T. Sun
This paper introduces twelve defect detection techniques and describes a non-controlled experiment related to defect detection techniques to address the uncertainty of how to test an embedded software and find defects effectively. In this non-controlled experiment, three common testing techniques were applied to a large scale embedded system. This study is intended to evaluate different defect detection techniques that are actually used by software engineers using empirical software engineering method. The objective of empirical software engineering is to improve the software development processes and quality. This could be done by evaluating, comparing and controlling defect detection methods. This study is also intended to find a best method to reduce defects and increase the defect detection rate in a large scale embedded system, since defect detection is considered as one of the most costly development process in software development cycle
{"title":"Optimize defect detection techniques through empirical software engineering method","authors":"H. T. Sun","doi":"10.1109/EIT.2005.1627056","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627056","url":null,"abstract":"This paper introduces twelve defect detection techniques and describes a non-controlled experiment related to defect detection techniques to address the uncertainty of how to test an embedded software and find defects effectively. In this non-controlled experiment, three common testing techniques were applied to a large scale embedded system. This study is intended to evaluate different defect detection techniques that are actually used by software engineers using empirical software engineering method. The objective of empirical software engineering is to improve the software development processes and quality. This could be done by evaluating, comparing and controlling defect detection methods. This study is also intended to find a best method to reduce defects and increase the defect detection rate in a large scale embedded system, since defect detection is considered as one of the most costly development process in software development cycle","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626974
P. Raviraj, H. Sharif, M. Hempel, S. Ci, H. Ali, Jong-Hoon Youn
Several MAC protocols have been proposed for wireless sensor networks (WSNs). These include T-MAC, D-MAC and the more commonly utilized SMAC. In this paper, we propose a new MAC layer approach to support mobility in WSNs. The proposed technique utilizes an adaptive frame size approach to overcome the effect of frame losses caused by the Doppler shifts under mobile scenarios. An extended Kalman filter is used to predict the frame size for each transmission, which also directly enhances the energy efficiency of the system. Our results show that based on the adaptive frame size predictor and its comparison with the SMAC protocol, the proposed technique can improve overall system performance and deliver enhanced energy efficiency of 24% under mobility. The current implementation of ns-2 does not take into consideration the packet error rate. As another contribution of our work, we have developed a physical layer model for ns-2, which processes the received frame based not only on the fading characteristics of the signal but also the SNR and relative velocity between the nodes. To characterize a more accurate wireless sensor networks' physical layer, we have modeled the Mica-2 sensors in MATLAB and implemented the model in ns-2 for simulations
{"title":"A mobility based link layer approach for mobile wireless sensor networks","authors":"P. Raviraj, H. Sharif, M. Hempel, S. Ci, H. Ali, Jong-Hoon Youn","doi":"10.1109/EIT.2005.1626974","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626974","url":null,"abstract":"Several MAC protocols have been proposed for wireless sensor networks (WSNs). These include T-MAC, D-MAC and the more commonly utilized SMAC. In this paper, we propose a new MAC layer approach to support mobility in WSNs. The proposed technique utilizes an adaptive frame size approach to overcome the effect of frame losses caused by the Doppler shifts under mobile scenarios. An extended Kalman filter is used to predict the frame size for each transmission, which also directly enhances the energy efficiency of the system. Our results show that based on the adaptive frame size predictor and its comparison with the SMAC protocol, the proposed technique can improve overall system performance and deliver enhanced energy efficiency of 24% under mobility. The current implementation of ns-2 does not take into consideration the packet error rate. As another contribution of our work, we have developed a physical layer model for ns-2, which processes the received frame based not only on the fading characteristics of the signal but also the SNR and relative velocity between the nodes. To characterize a more accurate wireless sensor networks' physical layer, we have modeled the Mica-2 sensors in MATLAB and implemented the model in ns-2 for simulations","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627003
Ravi Shah, Abhinav Agarwal, Subramaniam Ganesan
The present paper puts forward real time implementation of an algorithm for Watermarking and the results obtained using a Frequency domain approach.. The paper emphasizes an Adaptive Frequency domain watermarking approach in real time, demonstrating robustness against intentional or unintentional attacks on the watermarked image. This is achieved by modifying the middle frequency coefficients. Since the image is analyzed and modified in the frequency domain the changes made are difficult to perceive. The algorithm steps and special consideration regarding the real-time implementation on TI’s TMS320C6711 DSP are presented. Applications of watermarking process in real time are also described.
{"title":"Frequency Domain Real Time Digital Image Watermarking","authors":"Ravi Shah, Abhinav Agarwal, Subramaniam Ganesan","doi":"10.1109/EIT.2005.1627003","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627003","url":null,"abstract":"The present paper puts forward real time implementation of an algorithm for Watermarking and the results obtained using a Frequency domain approach.. The paper emphasizes an Adaptive Frequency domain watermarking approach in real time, demonstrating robustness against intentional or unintentional attacks on the watermarked image. This is achieved by modifying the middle frequency coefficients. Since the image is analyzed and modified in the frequency domain the changes made are difficult to perceive. The algorithm steps and special consideration regarding the real-time implementation on TI’s TMS320C6711 DSP are presented. Applications of watermarking process in real time are also described.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626991
O. Korniyenko, M. Sharawi, D. Aloi
Kalman filter (KF) parameter tuning has been dealt with in a limited fashion and usually was left to engineering intuition due to unavailable measurements of process noise and high dimensionality of the problem. In this paper we present a simple Neural Network (NN) based approach to KF tuning problem. Since the approach trades number of KF runs required for the optimal filter tuning for KF performance, the result of the such tuning is the set of tuning parameters that gives suboptimal performance. Advantages of this approach are: 1) simple practical framework for optimal filter performance tuning, 2) the framework is independent of the type of a filter and 3) low number of filter runs required to obtain quasi optimal parameter set. The main disadvantage is the suboptimal filter performance that can be easily improved by increasing the number of filter runs. Two NN architectures were investigated, generalized regression neural network (GRNN) and regular radial basis networks (RBNN). RBNN showed much better performance for a given non-linear test function with a clear maximum peak. Performance measures along with computational efficiency for these methods were compared. A step-by-step tuning procedure is presented.
{"title":"Neural Network Based Approach for Tuning Kalman Filter","authors":"O. Korniyenko, M. Sharawi, D. Aloi","doi":"10.1109/EIT.2005.1626991","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626991","url":null,"abstract":"Kalman filter (KF) parameter tuning has been dealt with in a limited fashion and usually was left to engineering intuition due to unavailable measurements of process noise and high dimensionality of the problem. In this paper we present a simple Neural Network (NN) based approach to KF tuning problem. Since the approach trades number of KF runs required for the optimal filter tuning for KF performance, the result of the such tuning is the set of tuning parameters that gives suboptimal performance. Advantages of this approach are: 1) simple practical framework for optimal filter performance tuning, 2) the framework is independent of the type of a filter and 3) low number of filter runs required to obtain quasi optimal parameter set. The main disadvantage is the suboptimal filter performance that can be easily improved by increasing the number of filter runs. Two NN architectures were investigated, generalized regression neural network (GRNN) and regular radial basis networks (RBNN). RBNN showed much better performance for a given non-linear test function with a clear maximum peak. Performance measures along with computational efficiency for these methods were compared. A step-by-step tuning procedure is presented.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627008
R. Logeswaran, C. Eswaran
Magnetic resonance cholangio pancreatography (MRCP) has become a favorite imaging technique for diagnosis of liver diseases, especially those associated with the biliary track. In a typical MRCP examination, a large series of image acquisitions are taken, ranging from the positioning series, to the re-projected image sets of Tl- and T2-weighted image series. This paper describes several modeling techniques in 2D and 3D which may aid in highlighting features in the MRCP images, as well as promote some possible compression gains through replacement of certain raw images with the prescribed models
{"title":"Modeling of the biliary tree structure in MRCP images","authors":"R. Logeswaran, C. Eswaran","doi":"10.1109/EIT.2005.1627008","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627008","url":null,"abstract":"Magnetic resonance cholangio pancreatography (MRCP) has become a favorite imaging technique for diagnosis of liver diseases, especially those associated with the biliary track. In a typical MRCP examination, a large series of image acquisitions are taken, ranging from the positioning series, to the re-projected image sets of Tl- and T2-weighted image series. This paper describes several modeling techniques in 2D and 3D which may aid in highlighting features in the MRCP images, as well as promote some possible compression gains through replacement of certain raw images with the prescribed models","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626963
Seok-Yee Tang, S. Thilakawarda, R. Tafazolli, Y. Qian
In this paper, the concept of scalable resource allocation (ScRA) technique is introduced and the ScRA technique efficiency is investigated in a diverse and dynamic traffic scenario. Detailed performance analysis of the ScRA through simulations is also presented in this paper. Most importantly, our simulation results indicate that significant radio resource utilization gain can be achieved with the use of ScRA scheme over the conventional static resource allocation (StRA) technique. This superior performance is credited to its flexible and adaptive radio channel allocation (or re-allocation) between the multiple-services at each sampled time
{"title":"Scalable resource allocation of dynamic multiple-services for next generation wireless networks","authors":"Seok-Yee Tang, S. Thilakawarda, R. Tafazolli, Y. Qian","doi":"10.1109/EIT.2005.1626963","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626963","url":null,"abstract":"In this paper, the concept of scalable resource allocation (ScRA) technique is introduced and the ScRA technique efficiency is investigated in a diverse and dynamic traffic scenario. Detailed performance analysis of the ScRA through simulations is also presented in this paper. Most importantly, our simulation results indicate that significant radio resource utilization gain can be achieved with the use of ScRA scheme over the conventional static resource allocation (StRA) technique. This superior performance is credited to its flexible and adaptive radio channel allocation (or re-allocation) between the multiple-services at each sampled time","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626998
S. Jafar, A. Krings, T. Gautier, Jean-Louis Roch
In this paper a new checkpoint/recovery protocol called theft-induced checkpointing is defined for dataflow computations in large heterogeneous environments. The protocol is especially useful in massively parallel multi-threaded computations as found in cluster or grid computing and utilizes the principle of work-stealing to distribute work. By basing the state of executions on a macro dataflow graph, the protocol shows extreme flexibility with respect to rollback. Specifically, it allows local rollback in dynamic heterogeneous systems, even under a different number of processors and processes. To maximize run-time efficiency, the overhead associated with checkpointing is shifted to the rollback operations whenever possible. Experimental results show the overhead induced is very small
{"title":"Theft-induced checkpointing for reconfigurable dataflow applications","authors":"S. Jafar, A. Krings, T. Gautier, Jean-Louis Roch","doi":"10.1109/EIT.2005.1626998","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626998","url":null,"abstract":"In this paper a new checkpoint/recovery protocol called theft-induced checkpointing is defined for dataflow computations in large heterogeneous environments. The protocol is especially useful in massively parallel multi-threaded computations as found in cluster or grid computing and utilizes the principle of work-stealing to distribute work. By basing the state of executions on a macro dataflow graph, the protocol shows extreme flexibility with respect to rollback. Specifically, it allows local rollback in dynamic heterogeneous systems, even under a different number of processors and processes. To maximize run-time efficiency, the overhead associated with checkpointing is shifted to the rollback operations whenever possible. Experimental results show the overhead induced is very small","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626992
S. Krishnamurthy, B. Bazuin, M. Atashbar
This paper describes a prototype burst transceiver operating in the industrial, scientific and medical band that can be used to power, interrogate and receive response from a wireless passive surface acoustic wave sensor. While the transceiver architecture for this system has been previously described, this paper focuses on the prototype construction and component and system level performance testing. Key performance factors for the transceiver include the isolation provided by various radio frequency (RF) switches, the appropriate switch timing, and the digitization and collection of burst response signals for further processing. The isolation provided by RF switches generates the signal burst, switches the transceiver from the transmission to receiving mode, and provide receiver isolation from the transmission signal and path. The measurements taken in testing the transmitter and receiver sections are presented. In addition, the frequency spectrum of the in-phase and quadrature signals obtained after digitization and data collection is shown and briefly described
{"title":"Wireless SAW sensors reader: architecture and design","authors":"S. Krishnamurthy, B. Bazuin, M. Atashbar","doi":"10.1109/EIT.2005.1626992","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626992","url":null,"abstract":"This paper describes a prototype burst transceiver operating in the industrial, scientific and medical band that can be used to power, interrogate and receive response from a wireless passive surface acoustic wave sensor. While the transceiver architecture for this system has been previously described, this paper focuses on the prototype construction and component and system level performance testing. Key performance factors for the transceiver include the isolation provided by various radio frequency (RF) switches, the appropriate switch timing, and the digitization and collection of burst response signals for further processing. The isolation provided by RF switches generates the signal burst, switches the transceiver from the transmission to receiving mode, and provide receiver isolation from the transmission signal and path. The measurements taken in testing the transmitter and receiver sections are presented. In addition, the frequency spectrum of the in-phase and quadrature signals obtained after digitization and data collection is shown and briefly described","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}