Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418515
A. Dubey, Vimal Mishra
Advancements in the cloud computing is initiating the new opportunities for cloud applications. Now people, devices and networks are constantly generating huge data. There exist several tools that can be used to model such environment and to study the behavior of large scale applications or services. Cloud Analyst is the one of the best visual modeler and analyzing tool for cloud environment. The Cloud Analyst tool is having global visualization modeling capability. In this tool, we can model geographically distributed computing servers and user workloads. It provides easy to use visual tool so that a modeler can fully concentrate on the simulation parameters rather than the complexities of programming. In this paper, we review the feature and simulation screens of Cloud Analyst and analytical study of different simulation configuration setup. We have explored various simulation scenarios and analyze the result of different scenarios.
{"title":"Performance analysis of cloud applications using cloud analyst","authors":"A. Dubey, Vimal Mishra","doi":"10.1109/CSNT.2017.8418515","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418515","url":null,"abstract":"Advancements in the cloud computing is initiating the new opportunities for cloud applications. Now people, devices and networks are constantly generating huge data. There exist several tools that can be used to model such environment and to study the behavior of large scale applications or services. Cloud Analyst is the one of the best visual modeler and analyzing tool for cloud environment. The Cloud Analyst tool is having global visualization modeling capability. In this tool, we can model geographically distributed computing servers and user workloads. It provides easy to use visual tool so that a modeler can fully concentrate on the simulation parameters rather than the complexities of programming. In this paper, we review the feature and simulation screens of Cloud Analyst and analytical study of different simulation configuration setup. We have explored various simulation scenarios and analyze the result of different scenarios.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418553
N. Yi, Xin Feng, Chunfang Li
With the continuous enrichment of film and television, the script management system came into being. At the same time, the arrival of the Web2.0 era has made people become stricter about the usability and interactive experience of the website. Well designed and well featured web sites can increase user experience and increase user retention, while poorly designed and slow acting sites make users feel bad and churn out a large number of users. Therefore, the front-end design and interaction of web applications is becoming more important. The first chapter introduces the background and significance of the development of art play library system, the second chapter introduces the three basic front-end technologies and the common framework, the third chapter introduces the overall structure of the system and the specific design and implementation of front end, the fourth chapter summarizes.
{"title":"The design and implementation of the front end of the art play library system","authors":"N. Yi, Xin Feng, Chunfang Li","doi":"10.1109/CSNT.2017.8418553","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418553","url":null,"abstract":"With the continuous enrichment of film and television, the script management system came into being. At the same time, the arrival of the Web2.0 era has made people become stricter about the usability and interactive experience of the website. Well designed and well featured web sites can increase user experience and increase user retention, while poorly designed and slow acting sites make users feel bad and churn out a large number of users. Therefore, the front-end design and interaction of web applications is becoming more important. The first chapter introduces the background and significance of the development of art play library system, the second chapter introduces the three basic front-end technologies and the common framework, the third chapter introduces the overall structure of the system and the specific design and implementation of front end, the fourth chapter summarizes.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418545
A. K. Ray, A. Bagwari
The IoT (Internet-of-Things) make possible the physical things or home appliances or hand held devices or objects (e.g., smart phones, TVs, cars) can be interconnected by means of suitable communication protocols and information technology infrastructure to share the data to each other and access a range of applications and services like data storage, analytics. In current scenario, application of IoT & its supporting tools and techniques in smart home implementation is one of the major area where many big companies like Google, Amazon etc are investing huge amount of money and initiated the research for better comfort security & safety at home. This paper will discuss about smart homes and its components, application of Internet of Things in smart homes, communication protocol details applicable for smart home devices communication, security flaws in existing protocols of communication for IoT enabled hardware and proposed secure protocol with desirable attributes for secure communication protocol for smart homes using IoT and it can interoperate and compatible with existing protocols.
{"title":"Study of smart home communication protocol's and security & privacy aspects","authors":"A. K. Ray, A. Bagwari","doi":"10.1109/CSNT.2017.8418545","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418545","url":null,"abstract":"The IoT (Internet-of-Things) make possible the physical things or home appliances or hand held devices or objects (e.g., smart phones, TVs, cars) can be interconnected by means of suitable communication protocols and information technology infrastructure to share the data to each other and access a range of applications and services like data storage, analytics. In current scenario, application of IoT & its supporting tools and techniques in smart home implementation is one of the major area where many big companies like Google, Amazon etc are investing huge amount of money and initiated the research for better comfort security & safety at home. This paper will discuss about smart homes and its components, application of Internet of Things in smart homes, communication protocol details applicable for smart home devices communication, security flaws in existing protocols of communication for IoT enabled hardware and proposed secure protocol with desirable attributes for secure communication protocol for smart homes using IoT and it can interoperate and compatible with existing protocols.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124419313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418519
Deepali Doliya, M. Bhandari
In this paper, a polytopic model of an uncertain buck converter with parasitic resistances is obtained in continuous conduction mode. Although linear quadratic regulators (LQRs) provide good stability and are optimal but they do not ensure robustness for the highly uncertain system. Therefore, A robust LQR designing method for power converters is presented using linear matrix inequalities (LMIs) to ensure robust stability of highly uncertain systems and the output is analyzed in the presence of line and load perturbations. In addition, an input voltage feedforward gain is included in this closed loop converter system to achieve a good line regulation. It is shown that with feedforward, there is no transient due to the line voltage perturbations. The results of the proposed approach are verified through simulation.
{"title":"An LMI approach for robust LQR control of PWM buck converter with parasitics","authors":"Deepali Doliya, M. Bhandari","doi":"10.1109/CSNT.2017.8418519","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418519","url":null,"abstract":"In this paper, a polytopic model of an uncertain buck converter with parasitic resistances is obtained in continuous conduction mode. Although linear quadratic regulators (LQRs) provide good stability and are optimal but they do not ensure robustness for the highly uncertain system. Therefore, A robust LQR designing method for power converters is presented using linear matrix inequalities (LMIs) to ensure robust stability of highly uncertain systems and the output is analyzed in the presence of line and load perturbations. In addition, an input voltage feedforward gain is included in this closed loop converter system to achieve a good line regulation. It is shown that with feedforward, there is no transient due to the line voltage perturbations. The results of the proposed approach are verified through simulation.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud storage system (CSS) provides storage service through which users can upload their files for getting several benefits like ease of access, less cost and robustness. The uploaded files must be encrypted to achieve confidentiality. These files are replicated across multiple nodes distributed over various geographical boundaries by the CSS provider to ensure robust-ness. But these files may get corrupted unintentionally during transmission or intentionally by malicious users. To ensure the integrity of the uploaded file, an efficient integrity verifier tool is essential. In this paper, the design and implementation of an integrity verifier tool for files uploaded to cloud has been presented. Merkle Hash Tree (MHT) and digital signatures have been used to verify the integrity. The tool has been integrated with Dropbox Cloud Storage Provider and its performance results have been presented.
{"title":"Design and implementation of an efficient tool to verify integrity of files uploaded to cloud storage","authors":"Priyansi Parida, Snehalata Konhar, Bharati Mishra, Debsish Jena","doi":"10.1109/CSNT.2017.8418512","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418512","url":null,"abstract":"Cloud storage system (CSS) provides storage service through which users can upload their files for getting several benefits like ease of access, less cost and robustness. The uploaded files must be encrypted to achieve confidentiality. These files are replicated across multiple nodes distributed over various geographical boundaries by the CSS provider to ensure robust-ness. But these files may get corrupted unintentionally during transmission or intentionally by malicious users. To ensure the integrity of the uploaded file, an efficient integrity verifier tool is essential. In this paper, the design and implementation of an integrity verifier tool for files uploaded to cloud has been presented. Merkle Hash Tree (MHT) and digital signatures have been used to verify the integrity. The tool has been integrated with Dropbox Cloud Storage Provider and its performance results have been presented.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418538
Mohit Mittal, Shafalika Vijayal
Nowadays, the concept of Internet of Things (IoT) has been manifested into reality with the help of latest developments or transformations in hardware circuitry, devices and protocols. IoT is such a diversified field in which a lot of challenges are faced during implementations of IoT applications including smart cities, smart homes, industrial sectors etc. The current scenario is highly demanding for deployment of smart sensors into existing applications to deliver a fully automated system. The major issue faced by IoT's existing system is security issue. In this paper, various attacks in IoT systems has discussed and focuses on ontology based model to deal with various attacks.
{"title":"Detection of attacks in IoT based on ontology using SPARQL","authors":"Mohit Mittal, Shafalika Vijayal","doi":"10.1109/CSNT.2017.8418538","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418538","url":null,"abstract":"Nowadays, the concept of Internet of Things (IoT) has been manifested into reality with the help of latest developments or transformations in hardware circuitry, devices and protocols. IoT is such a diversified field in which a lot of challenges are faced during implementations of IoT applications including smart cities, smart homes, industrial sectors etc. The current scenario is highly demanding for deployment of smart sensors into existing applications to deliver a fully automated system. The major issue faced by IoT's existing system is security issue. In this paper, various attacks in IoT systems has discussed and focuses on ontology based model to deal with various attacks.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today ensuring security is one of the major concern in cloud environment. Cloud privacy is a one of the tentative issue in cloud computing. As the entire cloud user do not have same demands regarding cloud privacy. Some of the clients are satisfied with current policy where as others are quite concerned about the corresponding privacy. As per the fundamental cloud architecture it is generally deployed via three core service models, namely software as a service, platform as service and infrastructure as a service. But unfortunately these entire delivery services model are vulnerable to a range of security attacks by intelligent intruder. Although government as well as major of the organizations are moving fast towards a secure cloud cryptography offers a wide range of algorithms for cloud security but all these algorithms provide single level encryption. To enhance the security level we have proposed a multilevel security scheme which is more secure than any type of single level encryption. Particularly our technique shows that only authorized user can able to access the cloud data. Our algorithm is fast and safe in both direction such as upload and download of a file. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data.
{"title":"A multilevel encryption technique in cloud security","authors":"Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule","doi":"10.1109/CSNT.2017.8418541","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418541","url":null,"abstract":"Today ensuring security is one of the major concern in cloud environment. Cloud privacy is a one of the tentative issue in cloud computing. As the entire cloud user do not have same demands regarding cloud privacy. Some of the clients are satisfied with current policy where as others are quite concerned about the corresponding privacy. As per the fundamental cloud architecture it is generally deployed via three core service models, namely software as a service, platform as service and infrastructure as a service. But unfortunately these entire delivery services model are vulnerable to a range of security attacks by intelligent intruder. Although government as well as major of the organizations are moving fast towards a secure cloud cryptography offers a wide range of algorithms for cloud security but all these algorithms provide single level encryption. To enhance the security level we have proposed a multilevel security scheme which is more secure than any type of single level encryption. Particularly our technique shows that only authorized user can able to access the cloud data. Our algorithm is fast and safe in both direction such as upload and download of a file. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418558
Abhisek Maiti, Sayantan Majumdar, S. Bhattacharjee, A. Nath
Most Android smartphones have numerous built-in sensors. These sensors are capable of providing raw data with high precision and accuracy. However, the applicability of these sensors is not limited to the host device. This paper focuses on the application of inertial sensors (Accelerometer and Gyroscope) to monitor three-dimensional device movement and orientation and emulate the mobile device as a virtual multi-purpose input device by making appropriate use of these data in realtime. Predictive text and auto-correct are useful features of smartphones that traditional PCs generally do not offer. The paper also focuses on incorporating these features while emulating the mobile device as a text input device capable of inputting together a sequence of characters. Strong end to end encryption is enforced on these data for obvious security reasons.
{"title":"Smart input: Provide mouse and keyboard input to a PC from android devices","authors":"Abhisek Maiti, Sayantan Majumdar, S. Bhattacharjee, A. Nath","doi":"10.1109/CSNT.2017.8418558","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418558","url":null,"abstract":"Most Android smartphones have numerous built-in sensors. These sensors are capable of providing raw data with high precision and accuracy. However, the applicability of these sensors is not limited to the host device. This paper focuses on the application of inertial sensors (Accelerometer and Gyroscope) to monitor three-dimensional device movement and orientation and emulate the mobile device as a virtual multi-purpose input device by making appropriate use of these data in realtime. Predictive text and auto-correct are useful features of smartphones that traditional PCs generally do not offer. The paper also focuses on incorporating these features while emulating the mobile device as a text input device capable of inputting together a sequence of characters. Strong end to end encryption is enforced on these data for obvious security reasons.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"22 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114030896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418501
P. Mondal, S. K. Parui
In this manuscript, a two step gap coupled resonator is modelled for designing a bandpass filter. The proposed structure is viewed simultaneously as edge coupled section and parallel coupled section. A detailed nodal analysis of the proposed coupled gap sections using different current and voltage equations are described, which is further derived to obtain different admittance parameter equations. Finally comparing those equations with normal two port network, even and odd mode impedance difference (Z0o-Z0e) equations are obtained in terms of parallel coupled admittance inverter (Jg1) and shunt susceptance (Bg1) at the edge coupled section. This equation is further used for designing the resonator with bandaccepted characteristics. A three pole wideband bandpass filter is demonstrated by series arrangement of four such coupled resonator unit. The proposed bandpass filter exhibits FBW of 53.5%. All the results are well verified by numerical simulation and validated through experiments.
{"title":"Analysis and synthesis of two step coupled gap resonator and its application as a bandpass filter","authors":"P. Mondal, S. K. Parui","doi":"10.1109/CSNT.2017.8418501","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418501","url":null,"abstract":"In this manuscript, a two step gap coupled resonator is modelled for designing a bandpass filter. The proposed structure is viewed simultaneously as edge coupled section and parallel coupled section. A detailed nodal analysis of the proposed coupled gap sections using different current and voltage equations are described, which is further derived to obtain different admittance parameter equations. Finally comparing those equations with normal two port network, even and odd mode impedance difference (Z0o-Z0e) equations are obtained in terms of parallel coupled admittance inverter (Jg1) and shunt susceptance (Bg1) at the edge coupled section. This equation is further used for designing the resonator with bandaccepted characteristics. A three pole wideband bandpass filter is demonstrated by series arrangement of four such coupled resonator unit. The proposed bandpass filter exhibits FBW of 53.5%. All the results are well verified by numerical simulation and validated through experiments.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418503
Aastha Gupta, Vipin Choudhary, M. Tripathy, P. Ranjan
In this paper, a compact quad-port four-element multiple input multiple output (MIMO) antenna operating at 2.4 GHz is reported. The frequency bandwidth is obtained as 1.1–5.3 GHz and is suitable for WLAN/WiMAX and IoT applications. The overall dimension of the substrate is 30×70×1.6 mm3. The area covered by antenna elements and the coplanar ground plane are 30×20 mm2 and 30×50 mm2 respectively. To reduce mutual coupling between the elements and achieve good isolation, parasitic element is used at the back of the antenna. The maximum isolation obtained is −20 dB at 2GHz. The peak gain is obtained as 4.1 dB at operating frequency 2.4 GHz. The proposed compact and planar four element MIMO antenna is designed and simulated by using HFSS 14.
{"title":"A compact wideband staircase-shaped four-element MIMO antenna for WLAN, L-band and S-band applications","authors":"Aastha Gupta, Vipin Choudhary, M. Tripathy, P. Ranjan","doi":"10.1109/CSNT.2017.8418503","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418503","url":null,"abstract":"In this paper, a compact quad-port four-element multiple input multiple output (MIMO) antenna operating at 2.4 GHz is reported. The frequency bandwidth is obtained as 1.1–5.3 GHz and is suitable for WLAN/WiMAX and IoT applications. The overall dimension of the substrate is 30×70×1.6 mm3. The area covered by antenna elements and the coplanar ground plane are 30×20 mm2 and 30×50 mm2 respectively. To reduce mutual coupling between the elements and achieve good isolation, parasitic element is used at the back of the antenna. The maximum isolation obtained is −20 dB at 2GHz. The peak gain is obtained as 4.1 dB at operating frequency 2.4 GHz. The proposed compact and planar four element MIMO antenna is designed and simulated by using HFSS 14.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}