Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993956
R. Kamat, S. Oren
We analyze alternative market designs for a multi-settlement system for electricity in which the resolution of the transmission network model is increased as time approaches real-time, and uncertainty about congestion patterns is resolved. Variations of such systems are implemented or have been proposed in California and other parts of the U.S. We aim to compare welfare implications of such market designs against more centralized single-settlement systems, such as those implemented in the Northeastern control areas of the U.S. We model the multi-settlement system as a two period game and compute subgame perfect Cournot-Nash equilibria for the various market designs.
{"title":"Multi-settlement systems for electricity markets: zonal aggregation under network uncertainty and market power","authors":"R. Kamat, S. Oren","doi":"10.1109/HICSS.2002.993956","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993956","url":null,"abstract":"We analyze alternative market designs for a multi-settlement system for electricity in which the resolution of the transmission network model is increased as time approaches real-time, and uncertainty about congestion patterns is resolved. Variations of such systems are implemented or have been proposed in California and other parts of the U.S. We aim to compare welfare implications of such market designs against more centralized single-settlement systems, such as those implemented in the Northeastern control areas of the U.S. We model the multi-settlement system as a two period game and compute subgame perfect Cournot-Nash equilibria for the various market designs.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128101100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994198
J. Biggam
The building blocks of Knowledge Management include a range of activities, from the initial identification of knowledge goals to the maintenance and evaluation of knowledge repositories. An area of particular concern within the Knowledge Management cycle lies in the capture of knowledge. Soft issues such as cultural resistance and individual self-interest form considerable barriers to knowledge capture. Identifying the knowledge required for corporate knowledge portals, such as Web Sites, and highlighting the nature of the barriers to the capture of knowledge, is a major step towards successful knowledge capture. This paper illustrates how the Soft Systems Methodology (SSM) can be utilized to enhance the fuzzy, non-technical, issues surrounding the development of Web Site environments and, further, uses the concept of Knowledge Types to aid in the identification of knowledge.
{"title":"Exploiting soft systems methodology (SSM) and knowledge types to facilitate knowledge capture issues in a Web Site environment","authors":"J. Biggam","doi":"10.1109/HICSS.2002.994198","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994198","url":null,"abstract":"The building blocks of Knowledge Management include a range of activities, from the initial identification of knowledge goals to the maintenance and evaluation of knowledge repositories. An area of particular concern within the Knowledge Management cycle lies in the capture of knowledge. Soft issues such as cultural resistance and individual self-interest form considerable barriers to knowledge capture. Identifying the knowledge required for corporate knowledge portals, such as Web Sites, and highlighting the nature of the barriers to the capture of knowledge, is a major step towards successful knowledge capture. This paper illustrates how the Soft Systems Methodology (SSM) can be utilized to enhance the fuzzy, non-technical, issues surrounding the development of Web Site environments and, further, uses the concept of Knowledge Types to aid in the identification of knowledge.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993962
Shijie Deng, Wenjiang Jiang
We propose a class of alternative stochastic volatility models for electricity prices using the quantile function modeling approach. Specifically, we fit marginal distributions of power prices to two special classes of distributions by matching the quantile of an empirical distribution to that of a theoretical distribution. The distributions from the first class have closed form formulas for probability densities, probability distribution functions, and quantile functions, while the distributions from the second class may have extremely unbalanced tails. Having rich tail behaviors, both classes allow realistic modeling of the power price dynamics. The appealing features of this approach are that it can effectively model the heavy tail behavior of electricity prices caused by jumps and stochastic volatility and that the resulting distributions are easy to simulate. This latter feature enables us to perform both parameter estimation and derivative pricing tasks based on price data directly observed from real markets.
{"title":"An inverse-quantile function approach for modeling electricity price","authors":"Shijie Deng, Wenjiang Jiang","doi":"10.1109/HICSS.2002.993962","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993962","url":null,"abstract":"We propose a class of alternative stochastic volatility models for electricity prices using the quantile function modeling approach. Specifically, we fit marginal distributions of power prices to two special classes of distributions by matching the quantile of an empirical distribution to that of a theoretical distribution. The distributions from the first class have closed form formulas for probability densities, probability distribution functions, and quantile functions, while the distributions from the second class may have extremely unbalanced tails. Having rich tail behaviors, both classes allow realistic modeling of the power price dynamics. The appealing features of this approach are that it can effectively model the heavy tail behavior of electricity prices caused by jumps and stochastic volatility and that the resulting distributions are easy to simulate. This latter feature enables us to perform both parameter estimation and derivative pricing tasks based on price data directly observed from real markets.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993970
P. Sauer
This paper presents alternative methods to compute the equilibrium condition immediately following a disturbance to an electric power system. The first uses the brute force method of simply integrating the dynamic model until it reaches steady state. The second uses the straightforward analytical choice of setting all time derivatives of the dynamic model to zero and solving the remaining algebraic equations for the equilibrium values of the dynamic states. This method requires the creation of new commercial software to solve the large-scale network algebraic equations simultaneously with the dynamic equilibrium equations. The third uses a method that takes advantage of existing commercial load flow software to perform the major portion of the solution process. These load flow solutions then iterate with the de-coupled algebraic equations for each generator.
{"title":"Post-contingency equilibrium analysis of power systems","authors":"P. Sauer","doi":"10.1109/HICSS.2002.993970","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993970","url":null,"abstract":"This paper presents alternative methods to compute the equilibrium condition immediately following a disturbance to an electric power system. The first uses the brute force method of simply integrating the dynamic model until it reaches steady state. The second uses the straightforward analytical choice of setting all time derivatives of the dynamic model to zero and solving the remaining algebraic equations for the equilibrium values of the dynamic states. This method requires the creation of new commercial software to solve the large-scale network algebraic equations simultaneously with the dynamic equilibrium equations. The third uses a method that takes advantage of existing commercial load flow software to perform the major portion of the solution process. These load flow solutions then iterate with the de-coupled algebraic equations for each generator.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993952
M. Bassiouni, R. Guha
We present an approach for modeling and analyzing the temporal failure and degradation behavior of critical infrastructure systems (CISs) using advanced temporal database management systems. We class the possible failure and/or degraded performance of CISs into different temporal categories, namely, crisp or exact intervals, nonvanishing imprecise intervals and vanishing imprecise intervals. The three temporal operators: Union (OR), Overlap (AND) and Not are extended to operate on the above categories of precise and imprecise intervals. The temporal operators are used recursively to capture the fault tolerance topology of CIS. For example, if a component of CIS has built-in redundancy for fault tolerance, the fault behavior of this component propagates to the outside only when all the redundant units of this component fail simultaneously. In this case, the failure temporal expressions of the redundant units are joined by temporal Overlap operators to indicate that the failure of the composite component is contingent on the failure of all units. We show how query languages with temporal extensions can be used to obtain useful answers for time-related queries and retrieve useful information about the exact and potential time points for degraded modes of operation. The storage overhead of incorporating the imprecise intervals in a temporal database is analyzed.
{"title":"Modeling and analysis of temporal failure and degradation behavior of critical infrastructure systems","authors":"M. Bassiouni, R. Guha","doi":"10.1109/HICSS.2002.993952","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993952","url":null,"abstract":"We present an approach for modeling and analyzing the temporal failure and degradation behavior of critical infrastructure systems (CISs) using advanced temporal database management systems. We class the possible failure and/or degraded performance of CISs into different temporal categories, namely, crisp or exact intervals, nonvanishing imprecise intervals and vanishing imprecise intervals. The three temporal operators: Union (OR), Overlap (AND) and Not are extended to operate on the above categories of precise and imprecise intervals. The temporal operators are used recursively to capture the fault tolerance topology of CIS. For example, if a component of CIS has built-in redundancy for fault tolerance, the fault behavior of this component propagates to the outside only when all the redundant units of this component fail simultaneously. In this case, the failure temporal expressions of the redundant units are joined by temporal Overlap operators to indicate that the failure of the composite component is contingent on the failure of all units. We show how query languages with temporal extensions can be used to obtain useful answers for time-related queries and retrieve useful information about the exact and potential time points for degraded modes of operation. The storage overhead of incorporating the imprecise intervals in a temporal database is analyzed.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"69 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994200
Jae-Hyeon Ahn, Suk-Gwon Chang
For the successful management of knowledge, knowledge needs to be measured. Without valid measurement, it is hard to manage it effectively. However, the intangible characteristic of knowledge makes knowledge measurement very challenging. In this paper, we do not measure knowledge directly, but assess how much knowledge contributes to the business performance. KP/sup 3/ methodology developed in this paper assesses the contribution of knowledge to business performance by employing product and process as intermediaries between the two.
{"title":"Valuation of knowledge: a business performance-oriented methodology","authors":"Jae-Hyeon Ahn, Suk-Gwon Chang","doi":"10.1109/HICSS.2002.994200","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994200","url":null,"abstract":"For the successful management of knowledge, knowledge needs to be measured. Without valid measurement, it is hard to manage it effectively. However, the intangible characteristic of knowledge makes knowledge measurement very challenging. In this paper, we do not measure knowledge directly, but assess how much knowledge contributes to the business performance. KP/sup 3/ methodology developed in this paper assesses the contribution of knowledge to business performance by employing product and process as intermediaries between the two.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130175128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994250
E. Clemons, R. M. Dewan, R. Kauffman
Putting into place a sound economic footing for technology strategies has gained new interest and importance after a spate of dot dotcom failures and a downturn in spending in information technology. Management science is replacing trial and error in evaluating technology initiatives. A number of prominent researchers from around the world have come together in this mini-track to critically examine business models, assess the apparent value of information technology investments, and provide strategies for evolving models to survive in the competitive marketplace for capital and customers. Under what conditions do investments in information technology payoff? This is the question addressed by the first paper in the mini-track. Using an extended data sample and a panel of experts to rate the use of IT in firms, Richardson and Zmud examined stock price reactions to IT investment announcements. Multivariate analysis reveals that firms that use IT to transform or informate business strategy development. These effects are shown through get a statistically significant and positive stock price reactions, as reported in the article. The information goods industry has been most transformed by developments in e-commerce. Digitization and digital communication have transformed the way many intellectual property based property-based goods are created and distributed. Traditional channels are increasingly in the danger of being disintermediated. Clemons, Gu and Lang combine the theories of resource-based based competitive advantage and that of newly vulnerable markets to create a framework to determine which markets are ripe for attack
{"title":"Competitive strategy and information systems","authors":"E. Clemons, R. M. Dewan, R. Kauffman","doi":"10.1109/HICSS.2002.994250","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994250","url":null,"abstract":"Putting into place a sound economic footing for technology strategies has gained new interest and importance after a spate of dot dotcom failures and a downturn in spending in information technology. Management science is replacing trial and error in evaluating technology initiatives. A number of prominent researchers from around the world have come together in this mini-track to critically examine business models, assess the apparent value of information technology investments, and provide strategies for evolving models to survive in the competitive marketplace for capital and customers. Under what conditions do investments in information technology payoff? This is the question addressed by the first paper in the mini-track. Using an extended data sample and a panel of experts to rate the use of IT in firms, Richardson and Zmud examined stock price reactions to IT investment announcements. Multivariate analysis reveals that firms that use IT to transform or informate business strategy development. These effects are shown through get a statistically significant and positive stock price reactions, as reported in the article. The information goods industry has been most transformed by developments in e-commerce. Digitization and digital communication have transformed the way many intellectual property based property-based goods are created and distributed. Traditional channels are increasingly in the danger of being disintermediated. Clemons, Gu and Lang combine the theories of resource-based based competitive advantage and that of newly vulnerable markets to create a framework to determine which markets are ripe for attack","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994248
Fion S. L. Lee, Douglas R. Vogel, M. Limayem
The virtual community has just recently emerged with divergent opinions on the basic understanding of it. This study aims at collecting different definitions and classifications in the virtual community, and offers a working definition. It also addresses research conducted in the field by referring to Information Systems journals. The research categorizes the different stages in virtual community growth to show the transition of research in this area. A survey is also conducted on the extent of the adoption of informatics in virtual community web sites.
{"title":"Virtual community informatics: what we know and what we need to know","authors":"Fion S. L. Lee, Douglas R. Vogel, M. Limayem","doi":"10.1109/HICSS.2002.994248","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994248","url":null,"abstract":"The virtual community has just recently emerged with divergent opinions on the basic understanding of it. This study aims at collecting different definitions and classifications in the virtual community, and offers a working definition. It also addresses research conducted in the field by referring to Information Systems journals. The research categorizes the different stages in virtual community growth to show the transition of research in this area. A survey is also conducted on the extent of the adoption of informatics in virtual community web sites.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123367642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994142
R. Kauffman, H. Mohtadi
This article presents an economic model of a monopoly retailer with supply and demand uncertainties that enables the study of incentives for B2B e-procurement technology investments that permit inventory coordination and operating cost control. In this context, we focus on the information technology (IT) adoption behavior of firms, emphasizing the trade-offs they make between managing supply procurement uncertainties and procurement costs. We distinguish among three kinds of B2B e-procurement technology platforms: traditional interorganizational systems (IOSs), open B2B platforms (especially electronic markets), and hybrid solutions. We find that larger firms tend to adopt costlier, but rely upon more certain procurement technologies, such as proprietary EDI. Smaller firms tend to adopt less costly procurement technologies that entail greater supply uncertainties, such as open B2B procurement platforms.
{"title":"Information technology in B2B e-procurement: open vs. proprietary systems","authors":"R. Kauffman, H. Mohtadi","doi":"10.1109/HICSS.2002.994142","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994142","url":null,"abstract":"This article presents an economic model of a monopoly retailer with supply and demand uncertainties that enables the study of incentives for B2B e-procurement technology investments that permit inventory coordination and operating cost control. In this context, we focus on the information technology (IT) adoption behavior of firms, emphasizing the trade-offs they make between managing supply procurement uncertainties and procurement costs. We distinguish among three kinds of B2B e-procurement technology platforms: traditional interorganizational systems (IOSs), open B2B platforms (especially electronic markets), and hybrid solutions. We find that larger firms tend to adopt costlier, but rely upon more certain procurement technologies, such as proprietary EDI. Smaller firms tend to adopt less costly procurement technologies that entail greater supply uncertainties, such as open B2B procurement platforms.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115140836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994129
A. Wakatani
In medical images, ROI (Region Of Interest) is an area which contains important information and must be stored without any distortion. We propose a digital watermarking method which avoids the distortion of the image data in ROI by embedding signature information into other area than the ROI. Signature image compressed by a progressive coding algorithm is used as the signature information. The most significant information of the signature information is embedded in the nearest area to the ROI. The proposed method can detect the signature image with moderate quality from a clipped image including the ROI. Furthermore, by dividing the contour of the ROI into several regions and embedding the signature information in the regions respectively, the signature image with moderate quality can be acquired from a clipped image including only part of the ROI.
在医学图像中,感兴趣区域(Region Of Interest, ROI)是包含重要信息的区域,必须在不失真的情况下进行存储。提出了一种通过将签名信息嵌入到感兴趣区域以外的区域来避免感兴趣区域图像数据失真的数字水印方法。采用渐进式编码算法压缩后的签名图像作为签名信息。签名信息中最重要的信息嵌入到距离ROI最近的区域。该方法可以从包含ROI的剪切图像中检测出中等质量的签名图像。进一步,将感兴趣区域的轮廓划分为若干区域,分别在这些区域内嵌入签名信息,可以从只包含部分感兴趣区域的剪切图像中获得质量适中的签名图像。
{"title":"Digital watermarking for ROI medical images by using compressed signature image","authors":"A. Wakatani","doi":"10.1109/HICSS.2002.994129","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994129","url":null,"abstract":"In medical images, ROI (Region Of Interest) is an area which contains important information and must be stored without any distortion. We propose a digital watermarking method which avoids the distortion of the image data in ROI by embedding signature information into other area than the ROI. Signature image compressed by a progressive coding algorithm is used as the signature information. The most significant information of the signature information is embedded in the nearest area to the ROI. The proposed method can detect the signature image with moderate quality from a clipped image including the ROI. Furthermore, by dividing the contour of the ROI into several regions and embedding the signature information in the regions respectively, the signature image with moderate quality can be acquired from a clipped image including only part of the ROI.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124365889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}