Aiming at the problem of the difficulty in the range alignment of HRRP because of more than one target in the window of radar image, this paper propose a alignment method for multiple targets in the target group by using an image segmentation method. First, we accumulate the HRRP of the target, and get the HRRP process diagram. By calculating the correlation coefficient between each frame of HRRP and the reference HRRP, the unaligned HRRP sequence is aligned roughly in frequency domain. After rough alignment, the image segmentation method is used to segment the range image of each target. In the end, the envelope alignment for the HRRP of each target is finished using FFT cross-correlation method. The algorithm is simple and fast, and can achieve a better alignment effect on multi object tracking. The effectiveness of the proposed method is verified by the analysis of the simulation data.
{"title":"The Range Alignment Algorithm for High-Resolution Range Profile Based on Image Segmentation","authors":"Jing Sheng, Hongmei Ren","doi":"10.1109/IIKI.2016.111","DOIUrl":"https://doi.org/10.1109/IIKI.2016.111","url":null,"abstract":"Aiming at the problem of the difficulty in the range alignment of HRRP because of more than one target in the window of radar image, this paper propose a alignment method for multiple targets in the target group by using an image segmentation method. First, we accumulate the HRRP of the target, and get the HRRP process diagram. By calculating the correlation coefficient between each frame of HRRP and the reference HRRP, the unaligned HRRP sequence is aligned roughly in frequency domain. After rough alignment, the image segmentation method is used to segment the range image of each target. In the end, the envelope alignment for the HRRP of each target is finished using FFT cross-correlation method. The algorithm is simple and fast, and can achieve a better alignment effect on multi object tracking. The effectiveness of the proposed method is verified by the analysis of the simulation data.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134546693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Comparing to one-dimensional high resolution range imaging, the two-dimensional high resolution range imaging with high resolution ability in the transverse direction, which gives one more dimensional resolution, has more extensive application potential. Combined with full-polarization technology, more detailed information of the targets can be obtained. Based on W-band, firstly, the imaging theory is presented, then followed the imaging results. Numerical simulations and experiments shows that comparing to single-polarimetric imaging, the methods which takes advantage of full-polarization technology gives more completed scattering centers and clearer outline. What's more, it has higher resolution and SNR, which has great value in the field of target detection, identification and classification.
{"title":"Research on W-Band Full Polarimetric Two-Dimensional Near Field Imaging","authors":"Fang Liu, Yang Bai","doi":"10.1109/IIKI.2016.34","DOIUrl":"https://doi.org/10.1109/IIKI.2016.34","url":null,"abstract":"Comparing to one-dimensional high resolution range imaging, the two-dimensional high resolution range imaging with high resolution ability in the transverse direction, which gives one more dimensional resolution, has more extensive application potential. Combined with full-polarization technology, more detailed information of the targets can be obtained. Based on W-band, firstly, the imaging theory is presented, then followed the imaging results. Numerical simulations and experiments shows that comparing to single-polarimetric imaging, the methods which takes advantage of full-polarization technology gives more completed scattering centers and clearer outline. What's more, it has higher resolution and SNR, which has great value in the field of target detection, identification and classification.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129357958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuan Gao, Ao Hong, Quan Zhou, Xiangyang Li, Shasha Liu, B. Shao
With the increasing number of mobile users and applications, data services and on-demand suggestions gradually play an important role in mobile life. In this work, based on the wireless personal communication network, we propose a novel prediction method of user traffic density and personal interest based on real time mobile traffic data and wireless positioning information. Service provider could send precise information to target users based on the prediction to ensure the quality and push service. Then we execute a simulation using real traffic data around Tsinghua University obtained from network service provider, and evaluate the accuracy of the prediction. Simulation results indicate that, our proposed method by using the traffic data and position jointly can significantly increase the rate of successful recommendation.
{"title":"Prediction of Traffic Density and Interest Using Real Time Mobile Traffic Data","authors":"Yuan Gao, Ao Hong, Quan Zhou, Xiangyang Li, Shasha Liu, B. Shao","doi":"10.1109/IIKI.2016.31","DOIUrl":"https://doi.org/10.1109/IIKI.2016.31","url":null,"abstract":"With the increasing number of mobile users and applications, data services and on-demand suggestions gradually play an important role in mobile life. In this work, based on the wireless personal communication network, we propose a novel prediction method of user traffic density and personal interest based on real time mobile traffic data and wireless positioning information. Service provider could send precise information to target users based on the prediction to ensure the quality and push service. Then we execute a simulation using real traffic data around Tsinghua University obtained from network service provider, and evaluate the accuracy of the prediction. Simulation results indicate that, our proposed method by using the traffic data and position jointly can significantly increase the rate of successful recommendation.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conventional power distribution boxes have many problems for monitoring electricity consumption. This paper presents an intelligent power distribution service architecture, using a standard MQTT (Message Queuing Telemetry Transport) protocol and open source Big data processing software packages. This solution provides real-time electricity information checking, power consumption comparison, remote control, and historical data analysis. The evaluations and practical usage show that our proposed solution has high availability, very convenient for achieving smart building solutions.
{"title":"An Intelligent Power Distribution Service Architecture","authors":"Weishan Zhang, Gaowa Wulan, Faming Gong, Chun-yan Zhang, Changzhi Lv","doi":"10.1109/IIKI.2016.9","DOIUrl":"https://doi.org/10.1109/IIKI.2016.9","url":null,"abstract":"Conventional power distribution boxes have many problems for monitoring electricity consumption. This paper presents an intelligent power distribution service architecture, using a standard MQTT (Message Queuing Telemetry Transport) protocol and open source Big data processing software packages. This solution provides real-time electricity information checking, power consumption comparison, remote control, and historical data analysis. The evaluations and practical usage show that our proposed solution has high availability, very convenient for achieving smart building solutions.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116988743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is time for clinician to be more elegant in diagnosis, and at the same time the patient to be taken care of in an all-round way. The improving and opening of the health and medical data, as well as the wide use of the environment and the human body sensors, gives us the opportunity to do so. This paper proposes an "observant clinician and touchable patient" integrated architecture (OCTOPIA), which is for both clinician and patient and extendible. On the basis of integrated medical knowledge, human health and environmental data, OCTOPIA interacts with the patient in a heuristic way to analyze the patient's symptoms and likely diseases. Then, comprehensive data information will be presented to the clinician. In all key links, clinicians will have the opportunity to use their own experience to influence the final diagnosis. Broadly, OCTOPIA consists of five major components: data capture, symptom-disease graph, QA system, ranking likely diseases and visualization. This paper proposes an architecture integrating the environment and human body information, and presents the solutions of an interactive QA system for symptom, a multi-factor calculation model for disease and a visualization design. With the help of OCTOPIA, the patient's information and the state of the environment are more fully perceived, while clinician can make a more detailed diagnosis.
{"title":"OCTOPIA: An Observant-Clinician and Touchable-Patient Integrated Architecture","authors":"Guangzhi Zhang, Yunchuan Sun, R. Bie, Xianlin Ma","doi":"10.1109/IIKI.2016.27","DOIUrl":"https://doi.org/10.1109/IIKI.2016.27","url":null,"abstract":"It is time for clinician to be more elegant in diagnosis, and at the same time the patient to be taken care of in an all-round way. The improving and opening of the health and medical data, as well as the wide use of the environment and the human body sensors, gives us the opportunity to do so. This paper proposes an \"observant clinician and touchable patient\" integrated architecture (OCTOPIA), which is for both clinician and patient and extendible. On the basis of integrated medical knowledge, human health and environmental data, OCTOPIA interacts with the patient in a heuristic way to analyze the patient's symptoms and likely diseases. Then, comprehensive data information will be presented to the clinician. In all key links, clinicians will have the opportunity to use their own experience to influence the final diagnosis. Broadly, OCTOPIA consists of five major components: data capture, symptom-disease graph, QA system, ranking likely diseases and visualization. This paper proposes an architecture integrating the environment and human body information, and presents the solutions of an interactive QA system for symptom, a multi-factor calculation model for disease and a visualization design. With the help of OCTOPIA, the patient's information and the state of the environment are more fully perceived, while clinician can make a more detailed diagnosis.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"137 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information retrieval (IR) has become more and more important in our daily lives. But there are few graphical interfaces or tools that can represent complex data querying and the searching process. This paper proposes a visual tool for multi-attribute data retrieval. The tool provides a Voronoi treemap combined with a selected path tree (SPT) on one window to conduct information retrieval according to different attributes of data, which are organized by a Voronoi treemap, and the other window is used to show retrieval results synchronously. Herein, SPT is used to record user's selection of attributes and is visually superimposed on Voronoi treemap. It may be composed of different levels of nodes in Voronoi treemap and it records the operations of attributes - Union, Intersection and Complement- during the attributes selecting process. Users can also adjust the SPT interactively according to displayed results on the other window. Finally, the paper gives some examples of selecting historical relics in 3D digital museum design system based on double touch-screen. The results prove the usability and effectiveness of our work.
{"title":"An Interactive Graphical Interface for Retrieving Multi-attribute Data: A Case Study on Historical Relics Retrieval in 3D Digital Museum","authors":"Xiyu Bao, Xiaowen Sun, Yulong Bian, Hao Liu, Chenglei Yang, Shijun Liu, L. Meng","doi":"10.1109/IIKI.2016.10","DOIUrl":"https://doi.org/10.1109/IIKI.2016.10","url":null,"abstract":"Information retrieval (IR) has become more and more important in our daily lives. But there are few graphical interfaces or tools that can represent complex data querying and the searching process. This paper proposes a visual tool for multi-attribute data retrieval. The tool provides a Voronoi treemap combined with a selected path tree (SPT) on one window to conduct information retrieval according to different attributes of data, which are organized by a Voronoi treemap, and the other window is used to show retrieval results synchronously. Herein, SPT is used to record user's selection of attributes and is visually superimposed on Voronoi treemap. It may be composed of different levels of nodes in Voronoi treemap and it records the operations of attributes - Union, Intersection and Complement- during the attributes selecting process. Users can also adjust the SPT interactively according to displayed results on the other window. Finally, the paper gives some examples of selecting historical relics in 3D digital museum design system based on double touch-screen. The results prove the usability and effectiveness of our work.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahid Mahmood, Huansheng Ning, A. Ghafoor, R. Mehmood, R. Bie
Wireless Sensor Networks (WSNs) is highly vulnerable to security attacks because of resource-constrained wireless devices. Complex and resource intensive security schemes are infeasible and reduce the network lifetime. We have explored polynomial distribution based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied, and it becomes more costly when these polynomials are regenerated dynamically after each node join or leave operations. To reduce the computation overhead on a cluster head, we have proposed XOR based key management scheme. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs. Proposed XOR based calculation reduces 65% computing cost. The reduction of memory overheads is from p-bits to m-bits where m
{"title":"Polynomial Subset Based Efficient Key Management for Lightweight Devices Networks","authors":"Zahid Mahmood, Huansheng Ning, A. Ghafoor, R. Mehmood, R. Bie","doi":"10.1109/IIKI.2016.30","DOIUrl":"https://doi.org/10.1109/IIKI.2016.30","url":null,"abstract":"Wireless Sensor Networks (WSNs) is highly vulnerable to security attacks because of resource-constrained wireless devices. Complex and resource intensive security schemes are infeasible and reduce the network lifetime. We have explored polynomial distribution based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied, and it becomes more costly when these polynomials are regenerated dynamically after each node join or leave operations. To reduce the computation overhead on a cluster head, we have proposed XOR based key management scheme. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs. Proposed XOR based calculation reduces 65% computing cost. The reduction of memory overheads is from p-bits to m-bits where m","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of the cloud computing, Linux containers are playing an important role in industrial use, however, the containers are suffering more and more cyber-attacks. A novel semantics-based anomaly detection approach of processes in Linux containers is presented and implemented in this paper, which extracts the features of processes by using the system calls produced by container behaviors, finds the relations between the processes, and builds the features tree of the processes. Experiments show that the approach we proposed can identify the abnormal processes effectively in Linux containers.
{"title":"Semantics-Based Anomaly Detection of Processes in Linux Containers","authors":"Hongliang Liang, Qichen Hao, Mingyu Li, Yini Zhang","doi":"10.1109/IIKI.2016.99","DOIUrl":"https://doi.org/10.1109/IIKI.2016.99","url":null,"abstract":"With the development of the cloud computing, Linux containers are playing an important role in industrial use, however, the containers are suffering more and more cyber-attacks. A novel semantics-based anomaly detection approach of processes in Linux containers is presented and implemented in this paper, which extracts the features of processes by using the system calls produced by container behaviors, finds the relations between the processes, and builds the features tree of the processes. Experiments show that the approach we proposed can identify the abnormal processes effectively in Linux containers.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126224046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a concept of autonomous blockchain based negotiation to select the most convenient electric vehicle charging station. The enabling blockchain technologies are well known fundament of cryptocurrencies, but offer many other possible applications areas, such as automated trusted machine-to-machine transactions, including auctions, bidding and payments. Compared to traditional centralized approaches, such a solution does not require any central entities and can be fully automated, including the payment for the energy. Based on e.g. the planned route, car battery status, real-time traffic information and drivers' preferences, a car could request charging bids from various charging stations along the route, by executing blockchain based smart contracts related to these charging stations. It would then select the most appropriate one based on offered prices, but other input parameters could be also taken into account, e.g. waiting times, estimated charging duration and alike. The smart contract execution could be extended to reservation and payment, too. In the paper we briefly present blockchain technologies, with the focus on Ethereum, and explain the role of smart contracts. We outline the architecture of a simple system for autonomous selection for electric vehicle charging station and provide a UML model to depict the activities of the actors involved in these operations and to clarify the role and the requirements of various blockchain related entities. The aim of our research paper is to outline a possible use-case for a blockchain prototype implementation. The implementation, which is not presented here, will serve for investigation of practical aspects of smart node development and operation, like transaction performance measurements, practical system requirement evaluations and comparison of reliability of various Ethereum clients. By our research we hope to support the investigation of novel applications and blending Internet of things with blockchain technologies, and in particular for elaboration of possible new use cases in the domain of electrical energy and mobility.
{"title":"Blockchain Based Autonomous Selection of Electric Vehicle Charging Station","authors":"M. Pustišek, A. Kos, Urban Sedlar","doi":"10.1109/IIKI.2016.60","DOIUrl":"https://doi.org/10.1109/IIKI.2016.60","url":null,"abstract":"This paper introduces a concept of autonomous blockchain based negotiation to select the most convenient electric vehicle charging station. The enabling blockchain technologies are well known fundament of cryptocurrencies, but offer many other possible applications areas, such as automated trusted machine-to-machine transactions, including auctions, bidding and payments. Compared to traditional centralized approaches, such a solution does not require any central entities and can be fully automated, including the payment for the energy. Based on e.g. the planned route, car battery status, real-time traffic information and drivers' preferences, a car could request charging bids from various charging stations along the route, by executing blockchain based smart contracts related to these charging stations. It would then select the most appropriate one based on offered prices, but other input parameters could be also taken into account, e.g. waiting times, estimated charging duration and alike. The smart contract execution could be extended to reservation and payment, too. In the paper we briefly present blockchain technologies, with the focus on Ethereum, and explain the role of smart contracts. We outline the architecture of a simple system for autonomous selection for electric vehicle charging station and provide a UML model to depict the activities of the actors involved in these operations and to clarify the role and the requirements of various blockchain related entities. The aim of our research paper is to outline a possible use-case for a blockchain prototype implementation. The implementation, which is not presented here, will serve for investigation of practical aspects of smart node development and operation, like transaction performance measurements, practical system requirement evaluations and comparison of reliability of various Ethereum clients. By our research we hope to support the investigation of novel applications and blending Internet of things with blockchain technologies, and in particular for elaboration of possible new use cases in the domain of electrical energy and mobility.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a new method is proposed to improve radar angular super-resolution on the basis of the constrained optimization theory. We provide a quasi-BFGS algorithm for updating antenna pattern matrix so that the antenna pattern matrix and its transpose matrix could approximate a positive semi-definite matrix, then the model of radar scanning system meets the requirement of convex quadratic programming. By using Newton algorithm, the optimal solution of that model could be gained and then the target angular information is accordingly restored. Simulations manifest that a desirable resolution result is gained and it provides an amazing result that our method is superior to other methods at signal to noise ratio (SNR).
{"title":"A Novel Iterative Method for Improving Radar Angular Super-Resolution","authors":"Xin Zhang, Xiaoming Liu","doi":"10.1109/IIKI.2016.47","DOIUrl":"https://doi.org/10.1109/IIKI.2016.47","url":null,"abstract":"In this paper a new method is proposed to improve radar angular super-resolution on the basis of the constrained optimization theory. We provide a quasi-BFGS algorithm for updating antenna pattern matrix so that the antenna pattern matrix and its transpose matrix could approximate a positive semi-definite matrix, then the model of radar scanning system meets the requirement of convex quadratic programming. By using Newton algorithm, the optimal solution of that model could be gained and then the target angular information is accordingly restored. Simulations manifest that a desirable resolution result is gained and it provides an amazing result that our method is superior to other methods at signal to noise ratio (SNR).","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}