Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534961
M. Andreozzi, G. Stea, D. Sabella
We introduce OptiMOS, a method for selecting deadlines for the scheduling of downlink voice flows in a centralized-scheduling point-to-multipoint network. These include cellular networks such as LTE, UMTS HSDPA, or WiMAX, and WLANs with centralized control. OptiMOS selects the deadline of each packet so as to maximize the expected Mean Opinion Score (MOS) for the talkspurt it belongs to. It requires that absolute time is both included in RTP timestamps at the source and checked for scheduling decisions, in a cross-layer approach. OptiMOS can be employed in conjunction with any deadline-based scheduling algorithm, and does not require a specific playout buffering scheme at the receiver. Simulations of an LTE system show a performance improvement in terms of MOS for the VoIP flows, good tolerance to relatively large synchronization errors and qualitatively similar results with different playout buffers.
{"title":"OptiMOS: Optimal MOS-based scheduling of downlink voice flows in point-to-multipoint access networks","authors":"M. Andreozzi, G. Stea, D. Sabella","doi":"10.1109/WOWMOM.2010.5534961","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534961","url":null,"abstract":"We introduce OptiMOS, a method for selecting deadlines for the scheduling of downlink voice flows in a centralized-scheduling point-to-multipoint network. These include cellular networks such as LTE, UMTS HSDPA, or WiMAX, and WLANs with centralized control. OptiMOS selects the deadline of each packet so as to maximize the expected Mean Opinion Score (MOS) for the talkspurt it belongs to. It requires that absolute time is both included in RTP timestamps at the source and checked for scheduling decisions, in a cross-layer approach. OptiMOS can be employed in conjunction with any deadline-based scheduling algorithm, and does not require a specific playout buffering scheme at the receiver. Simulations of an LTE system show a performance improvement in terms of MOS for the VoIP flows, good tolerance to relatively large synchronization errors and qualitatively similar results with different playout buffers.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534980
B. Zamaere, Peter Sjödin, B. Pehrson
This paper presents a high-level overview of the CareNet Home Extension Project that aims to provide support for home-based healthcare for the elderly and outpatients. Details of a home networking environment based on a virtualized Residential Gateway (RG) are provided. The RG architecture is modular and scalable supporting the dynamic provision of third party services. This accommodates multiple independent stakeholders representing healthcare providers, Internet Services Providers (ISPs), and home automation system builders among others. Interoperability is guaranteed through adherence to open standards. Initial mechanisms facilitating the integration and consolidation of in-home systems, whilst providing a flexible framework for autonomous management, are described. This addresses issues of management and configuration of complex environments by individuals with little or no technical expertise. Finally, details of an initial implementation, in terms of architectural descriptions and enabling technological components, are outlined.
{"title":"The CareNet residential gateway: A conceptual overview","authors":"B. Zamaere, Peter Sjödin, B. Pehrson","doi":"10.1109/WOWMOM.2010.5534980","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534980","url":null,"abstract":"This paper presents a high-level overview of the CareNet Home Extension Project that aims to provide support for home-based healthcare for the elderly and outpatients. Details of a home networking environment based on a virtualized Residential Gateway (RG) are provided. The RG architecture is modular and scalable supporting the dynamic provision of third party services. This accommodates multiple independent stakeholders representing healthcare providers, Internet Services Providers (ISPs), and home automation system builders among others. Interoperability is guaranteed through adherence to open standards. Initial mechanisms facilitating the integration and consolidation of in-home systems, whilst providing a flexible framework for autonomous management, are described. This addresses issues of management and configuration of complex environments by individuals with little or no technical expertise. Finally, details of an initial implementation, in terms of architectural descriptions and enabling technological components, are outlined.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126449281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534936
Michela Papandrea, S. Giordano, S. Vanini, P. Cremonese
We present a prototype for a straightforward proximity marketing solution (PROMO) over heterogeneous smart phones tailored to the needs of individual users. The system is based on the collection of Wi-Fi fingerprints in an environment, and sends data to the users' smart phones based on their interests and their location. We believe that our system has high potential because, differently from existing similar solutions, it is highly customizable and works also in indoor environments. The market validity is further confirmed by the decision to fund the development of this prototype taken by the Swiss Innovation Promotion Agency (CTI-No 11556.1).
{"title":"Proximity marketing solution tailored to user needs","authors":"Michela Papandrea, S. Giordano, S. Vanini, P. Cremonese","doi":"10.1109/WOWMOM.2010.5534936","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534936","url":null,"abstract":"We present a prototype for a straightforward proximity marketing solution (PROMO) over heterogeneous smart phones tailored to the needs of individual users. The system is based on the collection of Wi-Fi fingerprints in an environment, and sends data to the users' smart phones based on their interests and their location. We believe that our system has high potential because, differently from existing similar solutions, it is highly customizable and works also in indoor environments. The market validity is further confirmed by the decision to fund the development of this prototype taken by the Swiss Innovation Promotion Agency (CTI-No 11556.1).","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534903
A. Taddeo, Laura Micconi, A. Ferrante
Wireless sensor networks are composed of nodes with stringent constraints on resources. Some of this devices may have the possibility to recharge batteries (e.g., by means of solar panels); though, a reduced power consumption is anyway a key factor when recharge resources are not available (e.g., during the night for solar panels). In this paper we describe a method for security self-adaptation tailed for wireless sensor networks. This method allows devices to adapt security of applications gradually with the goal of guaranteeing the maximum possible level of security while satisfying power constraints. A case study, implemented on Sun SPOTs, is also presented to show how the method works in a real wireless sensor network.
{"title":"Gradual adaptation of security for sensor networks","authors":"A. Taddeo, Laura Micconi, A. Ferrante","doi":"10.1109/WOWMOM.2010.5534903","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534903","url":null,"abstract":"Wireless sensor networks are composed of nodes with stringent constraints on resources. Some of this devices may have the possibility to recharge batteries (e.g., by means of solar panels); though, a reduced power consumption is anyway a key factor when recharge resources are not available (e.g., during the night for solar panels). In this paper we describe a method for security self-adaptation tailed for wireless sensor networks. This method allows devices to adapt security of applications gradually with the goal of guaranteeing the maximum possible level of security while satisfying power constraints. A case study, implemented on Sun SPOTs, is also presented to show how the method works in a real wireless sensor network.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121596702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534920
Chibiao Liu, James T. Yu, G. B. Brewster
The growing popularity of 802.11-based wireless LANs (WLAN) also increases the risk of security attacks. Most studies of WLAN security are on the protection of data integrity, and few studies are addressing the issue of Denial of Service (DoS) attacks. This paper studies two major DoS attacks of authentication request flooding (AuthRF) and association request flooding (AssRF). Our studies show that these DoS attacks cause significant performance degradations and may disconnect the communications. A queuing model is presented to study the attacking mechanisms, and the causes of performance degradations. The analytical results of the queuing model are validated by the simulation model, and both results are consistent with the empirical data. The queuing model analysis leads to the development of four solutions: Request Authentication (RA), Reduction of Duplicate Requests (RDR), Reduction of Response Retransmissions (RRR), and Round Robin Transmission (RRT). We tested these four solutions and collected empirical data to validate the effectiveness of the solutions. A comparison of these four solutions is presented to show their strengths and weaknesses in resolving the attacks.
{"title":"Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs","authors":"Chibiao Liu, James T. Yu, G. B. Brewster","doi":"10.1109/WOWMOM.2010.5534920","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534920","url":null,"abstract":"The growing popularity of 802.11-based wireless LANs (WLAN) also increases the risk of security attacks. Most studies of WLAN security are on the protection of data integrity, and few studies are addressing the issue of Denial of Service (DoS) attacks. This paper studies two major DoS attacks of authentication request flooding (AuthRF) and association request flooding (AssRF). Our studies show that these DoS attacks cause significant performance degradations and may disconnect the communications. A queuing model is presented to study the attacking mechanisms, and the causes of performance degradations. The analytical results of the queuing model are validated by the simulation model, and both results are consistent with the empirical data. The queuing model analysis leads to the development of four solutions: Request Authentication (RA), Reduction of Duplicate Requests (RDR), Reduction of Response Retransmissions (RRR), and Round Robin Transmission (RRT). We tested these four solutions and collected empirical data to validate the effectiveness of the solutions. A comparison of these four solutions is presented to show their strengths and weaknesses in resolving the attacks.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534891
Hongbin Li, Fan Zhang, Jiming Chen, Youxian Sun
Technology advancements in robotics and communication make it possible to combine mobility and static wireless sensor networks. Being able to locomote enables sensors to (1) adjust their positions for better sensing quality, (2) ensure field coverage by spreading out and (3) fill up communication gap to guarantee information sharing in wireless environment. Concerning the above three criteria, we propose a autonomous management scheme for mobile sensors, aims to achieve distributed sensor position control. Accordingly, we developed a testbed for mobile sensor network verification, with good interfaces to obtain ranging measurements and control sensor motion. Implementation details of building static and mobile sensors are given. Finally we present experiment results to verify the proposed sensor control scheme.
{"title":"Experiments on autonomous mobile sensor control for target tracking","authors":"Hongbin Li, Fan Zhang, Jiming Chen, Youxian Sun","doi":"10.1109/WOWMOM.2010.5534891","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534891","url":null,"abstract":"Technology advancements in robotics and communication make it possible to combine mobility and static wireless sensor networks. Being able to locomote enables sensors to (1) adjust their positions for better sensing quality, (2) ensure field coverage by spreading out and (3) fill up communication gap to guarantee information sharing in wireless environment. Concerning the above three criteria, we propose a autonomous management scheme for mobile sensors, aims to achieve distributed sensor position control. Accordingly, we developed a testbed for mobile sensor network verification, with good interfaces to obtain ranging measurements and control sensor motion. Implementation details of building static and mobile sensors are given. Finally we present experiment results to verify the proposed sensor control scheme.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534970
A. Apavatjrut
This extended thesis abstract provides an overview of my research on exploiting diversity in Wireless Sensor Networks using Fountain codes.
这篇扩展的论文摘要概述了我在利用喷泉码开发无线传感器网络多样性方面的研究。
{"title":"Fountain codes for exploiting diversity in wireless sensor networks","authors":"A. Apavatjrut","doi":"10.1109/WOWMOM.2010.5534970","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534970","url":null,"abstract":"This extended thesis abstract provides an overview of my research on exploiting diversity in Wireless Sensor Networks using Fountain codes.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534959
Paul Boone, M. Barbeau, E. Kranakis
In WiMAX/IEEE 802.16 with mobility support, scanning for an available channel by a mobile station, especially during a handover, must be done promptly in order to reduce delays in network access. We have shown previously that mobile stations can reduce scanning times by maintaining a most probable list of frequencies in use. In this paper, we extend this idea to further capture the mobility patterns of users. By using time-of-day and location-based mobility profiles a mobile station improves scanning performance during handovers. We show this improvement by modeling and simulating an area of WiMAX coverage with various mobility patterns and real-world mobility traces.
{"title":"Using time-of-day and location-based mobility profiles to improve scanning during handovers","authors":"Paul Boone, M. Barbeau, E. Kranakis","doi":"10.1109/WOWMOM.2010.5534959","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534959","url":null,"abstract":"In WiMAX/IEEE 802.16 with mobility support, scanning for an available channel by a mobile station, especially during a handover, must be done promptly in order to reduce delays in network access. We have shown previously that mobile stations can reduce scanning times by maintaining a most probable list of frequencies in use. In this paper, we extend this idea to further capture the mobility patterns of users. By using time-of-day and location-based mobility profiles a mobile station improves scanning performance during handovers. We show this improvement by modeling and simulating an area of WiMAX coverage with various mobility patterns and real-world mobility traces.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127528321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534907
Y. P. Fallah, P. Nasiopoulos, R. Sengupta
Successful deployment of Broadband Wireless Access Networks such as WiMAX (IEEE 802.16) will be contingent on provisions for supporting multimedia traffic. In this paper, we review the quality of service features of access networks such as the 802.16 standard, and identify algorithms and schemes that are needed for supporting multimedia traffic in such networks. The 802.16 standard only specifies the features that should be implemented and leaves the design of a quality of service solution to developers. This includes the design of a mandatory scheduling framework. We present a comprehensive multimedia support framework based on the standard features. The framework specifies the architectures for the base station and the subscriber station, and contributes a number of algorithms for different service provisioning objectives. We use the concept of virtual packets to provide fair packet based centralized scheduling of uplink and downlink packets. The presented solution also provides algorithms for temporal and throughput fair scheduling in multirate physical layer of the 802.16 networks. An important part of the presented design is a multi-class fair scheduling scheme which is proposed for providing better delay performance for real time applications, while maintaining slightly longer term fairness.
{"title":"Fair scheduling for real-time multimedia support in IEEE 802.16 wireless access networks","authors":"Y. P. Fallah, P. Nasiopoulos, R. Sengupta","doi":"10.1109/WOWMOM.2010.5534907","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534907","url":null,"abstract":"Successful deployment of Broadband Wireless Access Networks such as WiMAX (IEEE 802.16) will be contingent on provisions for supporting multimedia traffic. In this paper, we review the quality of service features of access networks such as the 802.16 standard, and identify algorithms and schemes that are needed for supporting multimedia traffic in such networks. The 802.16 standard only specifies the features that should be implemented and leaves the design of a quality of service solution to developers. This includes the design of a mandatory scheduling framework. We present a comprehensive multimedia support framework based on the standard features. The framework specifies the architectures for the base station and the subscriber station, and contributes a number of algorithms for different service provisioning objectives. We use the concept of virtual packets to provide fair packet based centralized scheduling of uplink and downlink packets. The presented solution also provides algorithms for temporal and throughput fair scheduling in multirate physical layer of the 802.16 networks. An important part of the presented design is a multi-class fair scheduling scheme which is proposed for providing better delay performance for real time applications, while maintaining slightly longer term fairness.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534977
Jin Kim, Hyeok-soo Choi, Hui Wang, N. Agoulmine, M. Deen, J. W. Hong
With the increase of the aging society worldwide, hospitals, medical practitioners and health insurers are now increasingly seeking ways to reduce the cost of healthcare while maitaining its quality. One solution subject to attention from gouvernement and healthcare providers is the U-Health Smart Home that aims to provide non-intrusive and non-invasive monitoring and assistance to the elderly directly in their own home. At POSTECH, the U-Health Smart Home project is focused on building a smart home along with an autonomic system to monitor the home as well as the inhabitants to provide intelligent support and assistance in any situation at anytime. This paper presents our initial results from this project. The first contribution is a general framework for the U-Health smart home and the second one is an initial semantic model that can be used in the autonomic system to provide autonomic support to the elderly.
{"title":"POSTECH's U-Health Smart Home for elderly monitoring and support","authors":"Jin Kim, Hyeok-soo Choi, Hui Wang, N. Agoulmine, M. Deen, J. W. Hong","doi":"10.1109/WOWMOM.2010.5534977","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534977","url":null,"abstract":"With the increase of the aging society worldwide, hospitals, medical practitioners and health insurers are now increasingly seeking ways to reduce the cost of healthcare while maitaining its quality. One solution subject to attention from gouvernement and healthcare providers is the U-Health Smart Home that aims to provide non-intrusive and non-invasive monitoring and assistance to the elderly directly in their own home. At POSTECH, the U-Health Smart Home project is focused on building a smart home along with an autonomic system to monitor the home as well as the inhabitants to provide intelligent support and assistance in any situation at anytime. This paper presents our initial results from this project. The first contribution is a general framework for the U-Health smart home and the second one is an initial semantic model that can be used in the autonomic system to provide autonomic support to the elderly.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}