Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071643
R. Kavitha, M. Thayaambika, P. Malini, N. Almelu
One of the main issues confronted by Tamil Nadu Fishermen is encroachment of Indian trawlers into the Northern and Eastern shores of Sri Lanka. This problem becomes more complex when fishermen who unintentionally meander into Sri Lankan area are held captive. So there is a necessity for identifying those vessels which crosses the International Maritime Boundary Line. The Indian coast Guard has to track vessels which sail beyond the boundary and also has to determine the identity of vessel. The identity of the ship is necessary to differentiate registered ships of Tamil Nadu from the unregistered ships which may be considered suspicious. This arises the need for a static sensor which can be installed along the coastal line near Analtivu situated in Northern Province Jaffna of Sri Lanka which can detect, track and identify vessels crossing the border.
{"title":"Passive sensing and detection of boats along coastline using static sensors","authors":"R. Kavitha, M. Thayaambika, P. Malini, N. Almelu","doi":"10.1109/SSPS.2017.8071643","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071643","url":null,"abstract":"One of the main issues confronted by Tamil Nadu Fishermen is encroachment of Indian trawlers into the Northern and Eastern shores of Sri Lanka. This problem becomes more complex when fishermen who unintentionally meander into Sri Lankan area are held captive. So there is a necessity for identifying those vessels which crosses the International Maritime Boundary Line. The Indian coast Guard has to track vessels which sail beyond the boundary and also has to determine the identity of vessel. The identity of the ship is necessary to differentiate registered ships of Tamil Nadu from the unregistered ships which may be considered suspicious. This arises the need for a static sensor which can be installed along the coastal line near Analtivu situated in Northern Province Jaffna of Sri Lanka which can detect, track and identify vessels crossing the border.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133672265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071555
V. Sulochana, B. Shanthini
Today in the world of Internet of things, video consumption becomes high due to social media sites and mobile phones. Live streaming, 3DTV, IPTV, 4K technology will be the future of broadcasting. Internet traffic increases exponentially due to video streaming hence the focus of the research is to optimize the performance of streaming. The key challenge is to provide large resolution support in a multicore platform with various medium [1]. Currently H.264 and in future, H.265 will be the most adopted video format. This paper evaluates various video codec's, mainly transition of H.264 to H.265 and its implementation.
{"title":"Analysis of emerging video coding techniques for enhanced streaming","authors":"V. Sulochana, B. Shanthini","doi":"10.1109/SSPS.2017.8071555","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071555","url":null,"abstract":"Today in the world of Internet of things, video consumption becomes high due to social media sites and mobile phones. Live streaming, 3DTV, IPTV, 4K technology will be the future of broadcasting. Internet traffic increases exponentially due to video streaming hence the focus of the research is to optimize the performance of streaming. The key challenge is to provide large resolution support in a multicore platform with various medium [1]. Currently H.264 and in future, H.265 will be the most adopted video format. This paper evaluates various video codec's, mainly transition of H.264 to H.265 and its implementation.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071589
Sonal S. Patil, Ranjit M. Zende
This paper proposes highly economical, low price photovoltaic water pumping system incorporating a boost converter and a diode clamped multilevel inverter employing photovoltaic panel is initiated without batteries. This system is used in areas where electrical power is not accessible. Using photovoltaic energy is one of the solution to this problem. The converter boosts the voltage of the panel and inverter drives the Induction Motor by using Sinusoidal Pulse Width Modulation (SPWM) control. At the given irradiance level MPPT technique pushes the photovoltaic panel to obtain peak power.
{"title":"Solar powered water pumping system","authors":"Sonal S. Patil, Ranjit M. Zende","doi":"10.1109/SSPS.2017.8071589","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071589","url":null,"abstract":"This paper proposes highly economical, low price photovoltaic water pumping system incorporating a boost converter and a diode clamped multilevel inverter employing photovoltaic panel is initiated without batteries. This system is used in areas where electrical power is not accessible. Using photovoltaic energy is one of the solution to this problem. The converter boosts the voltage of the panel and inverter drives the Induction Motor by using Sinusoidal Pulse Width Modulation (SPWM) control. At the given irradiance level MPPT technique pushes the photovoltaic panel to obtain peak power.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121775941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071586
Devyani Patil, R. Mohapatra, Korra Sathya Babu
The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.
{"title":"Evaluation of generalization based K-anonymization algorithms","authors":"Devyani Patil, R. Mohapatra, Korra Sathya Babu","doi":"10.1109/SSPS.2017.8071586","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071586","url":null,"abstract":"The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071601
Naveen Kumar, R. Meenakshi
An increasing variety of organisations sources their knowledge, applications and business processes to the cloud, empowering them to realise money and technical advantages because of on-demand provisioning and pay-per-use valuation. However, organisations are still hesitant to adopt cloud services thanks to security, privacy, and dependability issues relating to provisioned cloud services likewise as doubts regarding the trustiness of their cloud service supplier. Cloud service certifications (CSC) are smart suggests that to deal with these issues by establishing trust, and increasing transparency of the cloud market. Cloud service certifications commit to assuring a high level of security and submission. However, considering that cloud services are a part of Associate in Nursing dynamic setting, multi-year validity periods might place ensure dependability of such certifications. Continuous auditing (CA) of chosen certification criteria is needed to assure ceaselessly reliable and secure cloud services, and thereby increase the trustiness of certifications. CA of cloud services remains in its infancy and reveal that almost all of the prevailing methodologies aren't applicable for third party auditing functions. The propose an abstract CA design and highlight vital elements and processes that got to be enforced.
{"title":"Securing multi-cloud by auditing","authors":"Naveen Kumar, R. Meenakshi","doi":"10.1109/SSPS.2017.8071601","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071601","url":null,"abstract":"An increasing variety of organisations sources their knowledge, applications and business processes to the cloud, empowering them to realise money and technical advantages because of on-demand provisioning and pay-per-use valuation. However, organisations are still hesitant to adopt cloud services thanks to security, privacy, and dependability issues relating to provisioned cloud services likewise as doubts regarding the trustiness of their cloud service supplier. Cloud service certifications (CSC) are smart suggests that to deal with these issues by establishing trust, and increasing transparency of the cloud market. Cloud service certifications commit to assuring a high level of security and submission. However, considering that cloud services are a part of Associate in Nursing dynamic setting, multi-year validity periods might place ensure dependability of such certifications. Continuous auditing (CA) of chosen certification criteria is needed to assure ceaselessly reliable and secure cloud services, and thereby increase the trustiness of certifications. CA of cloud services remains in its infancy and reveal that almost all of the prevailing methodologies aren't applicable for third party auditing functions. The propose an abstract CA design and highlight vital elements and processes that got to be enforced.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071640
P. K. Chakaravarthi, Dr.K.Suriyakrishnaan, K. Sujatha
Data dissemination is big issue to mobile users using a wireless network. Wireless networks face many difficulties like limited resources and high susceptibility to harsh environmental conditions that have to be considered carefully. The load-balancing algorithm can afford the accelerate path to reach the destination without any packet loss. After the nodes being allocated the data will be transferred to the sink and is secure to the control host, which issues commands and configures the network. In the modification process a general framework for the use of wireless networks using load-balancing to alteration the data and monitoring with emphasis on Authentication and security during the data transfer is proposed.
{"title":"Optimal data dissemination over wireless network","authors":"P. K. Chakaravarthi, Dr.K.Suriyakrishnaan, K. Sujatha","doi":"10.1109/SSPS.2017.8071640","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071640","url":null,"abstract":"Data dissemination is big issue to mobile users using a wireless network. Wireless networks face many difficulties like limited resources and high susceptibility to harsh environmental conditions that have to be considered carefully. The load-balancing algorithm can afford the accelerate path to reach the destination without any packet loss. After the nodes being allocated the data will be transferred to the sink and is secure to the control host, which issues commands and configures the network. In the modification process a general framework for the use of wireless networks using load-balancing to alteration the data and monitoring with emphasis on Authentication and security during the data transfer is proposed.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127065979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071584
Masoom Jain, Mohammed G. Vayada
The present scenario of image processing is approaching towards the perceptualization. This paper proposes perceptual segmentation with non cognitive low level color and texture features and the application is directly to crop images. Higher efficiency is guaranteed when human intervention is involved. This paper basically takes care of color texture based image segmentation specifically for the images in which the information frequencies are higher. Paper aims to present efficient and robust image segmentation of various crop images and providing some tuning between the low level color and texture feature with high level semantics to improve efficiency of segmentation. With the significant performance improvement a perceptual tuning can be used. Major difference between the normal image segmentation and perceptual image segmentation is also emphasis very clearly in this paper. The future work can be extended by involving non cognitive methodology such as evidence theory, data can be amalgam to make algorithm robust and efficient.
{"title":"Non-cognitive color and texture based image segmentation amalgamation with evidence theory of crop images","authors":"Masoom Jain, Mohammed G. Vayada","doi":"10.1109/SSPS.2017.8071584","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071584","url":null,"abstract":"The present scenario of image processing is approaching towards the perceptualization. This paper proposes perceptual segmentation with non cognitive low level color and texture features and the application is directly to crop images. Higher efficiency is guaranteed when human intervention is involved. This paper basically takes care of color texture based image segmentation specifically for the images in which the information frequencies are higher. Paper aims to present efficient and robust image segmentation of various crop images and providing some tuning between the low level color and texture feature with high level semantics to improve efficiency of segmentation. With the significant performance improvement a perceptual tuning can be used. Major difference between the normal image segmentation and perceptual image segmentation is also emphasis very clearly in this paper. The future work can be extended by involving non cognitive methodology such as evidence theory, data can be amalgam to make algorithm robust and efficient.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071645
D. S. Immaculate, P. Latha
In today's era, whether the client left a wallet in a taxicab or lost something at home, losing things is a genuine annoyance. What is more awful is that it feels like an issue that we shouldn't need to manage in the time of smart devices. The process of detecting the misplaced object manually is also time consuming. There are some most serious issues like size, range and area precision. To overcome these issues we use a technique to detect the misplaced objects based on Zigbee technology. Zigbee communication setup is used for detecting the misplaced objects. Zigbee is connected to mobile through OTG (On-The-Go) cable and one more Zigbee is connected to object. In case if any object is missing, with the help of Zigbee communication the object is detected automatically. The Zigbee is used to detect the objects in the indoor as well as in the outdoor environment. Thus the user can detect the missing object easily, the Zigbee and a phone app work together to do this.
在当今时代,无论客户把钱包落在出租车上,还是在家里丢了东西,丢东西都是一件真正的烦恼。更糟糕的是,在智能设备时代,这似乎是一个我们不需要管理的问题。手工检测放错位置的过程也很耗时。有一些最严重的问题,如大小,范围和区域精度。为了克服这些问题,我们采用了一种基于Zigbee技术的物体错位检测技术。Zigbee通信设置用于检测放错位置的物体。Zigbee通过OTG (on - go)电缆连接到移动设备,另外一个Zigbee连接到对象。如果有任何物体丢失,在Zigbee通信的帮助下,物体会被自动检测出来。Zigbee用于检测室内和室外环境中的物体。因此,用户可以很容易地检测到丢失的物体,Zigbee和手机应用程序一起工作来做到这一点。
{"title":"Efficient detection of missing object using Zigbee technology","authors":"D. S. Immaculate, P. Latha","doi":"10.1109/SSPS.2017.8071645","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071645","url":null,"abstract":"In today's era, whether the client left a wallet in a taxicab or lost something at home, losing things is a genuine annoyance. What is more awful is that it feels like an issue that we shouldn't need to manage in the time of smart devices. The process of detecting the misplaced object manually is also time consuming. There are some most serious issues like size, range and area precision. To overcome these issues we use a technique to detect the misplaced objects based on Zigbee technology. Zigbee communication setup is used for detecting the misplaced objects. Zigbee is connected to mobile through OTG (On-The-Go) cable and one more Zigbee is connected to object. In case if any object is missing, with the help of Zigbee communication the object is detected automatically. The Zigbee is used to detect the objects in the indoor as well as in the outdoor environment. Thus the user can detect the missing object easily, the Zigbee and a phone app work together to do this.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071648
M. G. Gopalan, C. Prasanna, Y.V. Srihari Krishna, B. Shanthini, A. Arulkumar
As Technology advances, huge amount of data are generated every day from various sources like Social Media, Banking, Hospital Management etc. Modern businesses that use big data use cases are helping to build a different set of technologies to replace MySQL. Currently, the data migration is very important because of the ever-mounting volume of data, that are collected via many sources, has motivated the migration from Relational Database Management System (RDBMS) to NoSQL (Not Only SQL) database. The main aim this paper is to present a methodology for data migration from RDBMS to NoSQL database. To illustrate this methodology, we implement a software prototype using MySQL as a RDBMS and CassandraDB as a NoSQL database. In this, the MySQL database and the Cassandra database are connected to the Python Environment and the Conversion of Schema is processed, followed by Conversion of Data.
{"title":"MYSQL to cassandra conversion engine","authors":"M. G. Gopalan, C. Prasanna, Y.V. Srihari Krishna, B. Shanthini, A. Arulkumar","doi":"10.1109/SSPS.2017.8071648","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071648","url":null,"abstract":"As Technology advances, huge amount of data are generated every day from various sources like Social Media, Banking, Hospital Management etc. Modern businesses that use big data use cases are helping to build a different set of technologies to replace MySQL. Currently, the data migration is very important because of the ever-mounting volume of data, that are collected via many sources, has motivated the migration from Relational Database Management System (RDBMS) to NoSQL (Not Only SQL) database. The main aim this paper is to present a methodology for data migration from RDBMS to NoSQL database. To illustrate this methodology, we implement a software prototype using MySQL as a RDBMS and CassandraDB as a NoSQL database. In this, the MySQL database and the Cassandra database are connected to the Python Environment and the Conversion of Schema is processed, followed by Conversion of Data.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/SSPS.2017.8071644
R. Priyanka, S. Bhuvana, Archanaa Raveendran, R. Kavitha
The basic objective of this paper is to control the vehicle effluents like carbon dioxide, sulphur dioxide, carbon monoxide that may harm the ecosystem. We are also focussing on avoiding disasters due to fire and harmful gases using the appropriate sensors. Hence, this will be useful for Pollution Control Board to monitor the emission rate of harmful effluents from vehicles.
{"title":"Vehicle pollutants control using sensors and Arduino","authors":"R. Priyanka, S. Bhuvana, Archanaa Raveendran, R. Kavitha","doi":"10.1109/SSPS.2017.8071644","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071644","url":null,"abstract":"The basic objective of this paper is to control the vehicle effluents like carbon dioxide, sulphur dioxide, carbon monoxide that may harm the ecosystem. We are also focussing on avoiding disasters due to fire and harmful gases using the appropriate sensors. Hence, this will be useful for Pollution Control Board to monitor the emission rate of harmful effluents from vehicles.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124723748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}