This paper examines the concept of Mobile Femtocells to be the revolution of the next generation cellular networks. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. The purpose of this study is to help cell-edge users to have better signal strength. Therefore, an investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. In this paper, two scenarios have been considered in the case of Fixed/Mobile Femtocells. The handover of Mobile Femtocell has been expressed in three more scenarios. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users. The system behavior has been investigated under low, medium and high load traffic before and after adding the Mobile Femtocells. The results showed that adding the Mobile Femtocells in the high loaded traffic areas has the biggest affect on improving the UE's throughput.
{"title":"Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells","authors":"R. Raheem, A. Lasebae, J. Loo","doi":"10.1109/WAINA.2014.51","DOIUrl":"https://doi.org/10.1109/WAINA.2014.51","url":null,"abstract":"This paper examines the concept of Mobile Femtocells to be the revolution of the next generation cellular networks. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. The purpose of this study is to help cell-edge users to have better signal strength. Therefore, an investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. In this paper, two scenarios have been considered in the case of Fixed/Mobile Femtocells. The handover of Mobile Femtocell has been expressed in three more scenarios. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users. The system behavior has been investigated under low, medium and high load traffic before and after adding the Mobile Femtocells. The results showed that adding the Mobile Femtocells in the high loaded traffic areas has the biggest affect on improving the UE's throughput.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explores the issue of caching during TIP-tree navigation for location-based services. The TIP-tree is a recently proposed spatial access method for supporting continuous point queries in a tourist information system. In addition, its navigation strategy avoids repeating searching, thus providing efficient processing of user trajectories that are not known in advance. This paper proposes a caching strategy that further improves upon the efficiency of the TIP-tree navigation algorithm. A performance evaluation shows that significant improvement is possible when navigation and caching are applied together.
{"title":"A First Look at Caching during TIP-Tree Navigation for Location Based Services","authors":"W. Osborn","doi":"10.1109/WAINA.2014.37","DOIUrl":"https://doi.org/10.1109/WAINA.2014.37","url":null,"abstract":"This paper explores the issue of caching during TIP-tree navigation for location-based services. The TIP-tree is a recently proposed spatial access method for supporting continuous point queries in a tourist information system. In addition, its navigation strategy avoids repeating searching, thus providing efficient processing of user trajectories that are not known in advance. This paper proposes a caching strategy that further improves upon the efficiency of the TIP-tree navigation algorithm. A performance evaluation shows that significant improvement is possible when navigation and caching are applied together.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to temporally recover the information network infrastructure in disaster areas on the East Japan Great Earthquake on March 11, 2011, various wireless network technologies such as satellite IP network, 3G, Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed, but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, eventually the total network could not effectively function. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best network even though the serious disaster occurred. We introduce an OpenFlow based access network to automatically select the best network link and route among the possible access networks to Internet by periodically monitoring their network states and evaluate the those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.
{"title":"Performance Evaluation of PC Router Based Cognitive Wireless Network for Disaster-Resilient WANs","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/WAINA.2014.100","DOIUrl":"https://doi.org/10.1109/WAINA.2014.100","url":null,"abstract":"In order to temporally recover the information network infrastructure in disaster areas on the East Japan Great Earthquake on March 11, 2011, various wireless network technologies such as satellite IP network, 3G, Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed, but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, eventually the total network could not effectively function. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best network even though the serious disaster occurred. We introduce an OpenFlow based access network to automatically select the best network link and route among the possible access networks to Internet by periodically monitoring their network states and evaluate the those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the need for better understanding of malicious cyber activities. In this paper we use clustering to classify attacker activities aimed at Web systems. The empirical analysis is based on four datasets, each in duration of several months, collected by high-interaction honey pots. The results show that behavioral clustering analysis can be used to distinguish between attack sessions and vulnerability scan sessions. However, the performance heavily depends on the dataset. Furthermore, the results show that attacks differ from vulnerability scans in a small number of features (i.e., session characteristics). Specifically, for each dataset, the best feature selection method (in terms of the high probability of detection and low probability of false alarm) selects only three features and results into three to four clusters, significantly improving the performance of clustering compared to the case when all features are used. The best subset of features and the extent of the improvement, however, also depend on the dataset.
{"title":"Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics","authors":"K. Goseva-Popstojanova, Ana Dimitrijevikj","doi":"10.1109/WAINA.2014.15","DOIUrl":"https://doi.org/10.1109/WAINA.2014.15","url":null,"abstract":"The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the need for better understanding of malicious cyber activities. In this paper we use clustering to classify attacker activities aimed at Web systems. The empirical analysis is based on four datasets, each in duration of several months, collected by high-interaction honey pots. The results show that behavioral clustering analysis can be used to distinguish between attack sessions and vulnerability scan sessions. However, the performance heavily depends on the dataset. Furthermore, the results show that attacks differ from vulnerability scans in a small number of features (i.e., session characteristics). Specifically, for each dataset, the best feature selection method (in terms of the high probability of detection and low probability of false alarm) selects only three features and results into three to four clusters, significantly improving the performance of clustering compared to the case when all features are used. The best subset of features and the extent of the improvement, however, also depend on the dataset.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a mapping method with the virtual world and the real world for robot remote controlling via the internet. Server isolates a user operation side in the virtual world and a robot working side in the real world. We use a Game Engine for creating the virtual world. The Game Engine handles user operation and user side view. This view is used for the reference for comparing matching level with the real world view which is taken by robots in the real world and current intensity level comparing with measured intensity concurrently. These comparing processes are done on the server. We validate efficiency of the method for applying to campus guidance service.
{"title":"A Remote Control Method for Mobile Robots Using Game Engines","authors":"Osamu Ohashi, Eiji Ochiai, Y. Kato","doi":"10.1109/WAINA.2014.23","DOIUrl":"https://doi.org/10.1109/WAINA.2014.23","url":null,"abstract":"This paper proposes a mapping method with the virtual world and the real world for robot remote controlling via the internet. Server isolates a user operation side in the virtual world and a robot working side in the real world. We use a Game Engine for creating the virtual world. The Game Engine handles user operation and user side view. This view is used for the reference for comparing matching level with the real world view which is taken by robots in the real world and current intensity level comparing with measured intensity concurrently. These comparing processes are done on the server. We validate efficiency of the method for applying to campus guidance service.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based service in virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine's physical and network resources. In such environment, the virtual machine monitor (VMM) virtualizes the machine's resources in terms of CPU, memory, storage, network and I/O devices to allow multiple operating systems running in different VMs to operate and access the network concurrently. A key feature of virtualization is live migration (LM) that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. However, live migration is still in an early stage of implementation and its security is yet to be evaluated. The security concern of live migration is a major factor for its adoption by the IT industry. Therefore, this paper uses the X.805 security standard to investigate attacks on live virtual machine migration. The analysis highlights the main source of threats and suggests approaches to tackle them. The paper also surveys and compares different proposals in the literature to secure the live migration.
{"title":"Secure Live Virtual Machines Migration: Issues and Solutions","authors":"Mahdi Aiash, G. Mapp, O. Gemikonakli","doi":"10.1109/WAINA.2014.35","DOIUrl":"https://doi.org/10.1109/WAINA.2014.35","url":null,"abstract":"In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based service in virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine's physical and network resources. In such environment, the virtual machine monitor (VMM) virtualizes the machine's resources in terms of CPU, memory, storage, network and I/O devices to allow multiple operating systems running in different VMs to operate and access the network concurrently. A key feature of virtualization is live migration (LM) that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. However, live migration is still in an early stage of implementation and its security is yet to be evaluated. The security concern of live migration is a major factor for its adoption by the IT industry. Therefore, this paper uses the X.805 security standard to investigate attacks on live virtual machine migration. The analysis highlights the main source of threats and suggests approaches to tackle them. The paper also surveys and compares different proposals in the literature to secure the live migration.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126561521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. N. Zincir-Heywood
Botnets are one of the most destructive threats against the cyber security. Recently, HTTP protocol is frequently utilized by botnets as the Command and Communication (C&C) protocol. In this work, we aim to detect HTTP based botnet activity based on botnet behaviour analysis via machine learning approach. To achieve this, we employ flow-based network traffic utilizing NetFlow (via Softflowd). The proposed botnet analysis system is implemented by employing two different machine learning algorithms, C4.5 and Naive Bayes. Our results show that C4.5 learning algorithm based classifier obtained very promising performance on detecting HTTP based botnet activity.
{"title":"Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers","authors":"Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. N. Zincir-Heywood","doi":"10.1109/WAINA.2014.19","DOIUrl":"https://doi.org/10.1109/WAINA.2014.19","url":null,"abstract":"Botnets are one of the most destructive threats against the cyber security. Recently, HTTP protocol is frequently utilized by botnets as the Command and Communication (C&C) protocol. In this work, we aim to detect HTTP based botnet activity based on botnet behaviour analysis via machine learning approach. To achieve this, we employ flow-based network traffic utilizing NetFlow (via Softflowd). The proposed botnet analysis system is implemented by employing two different machine learning algorithms, C4.5 and Naive Bayes. Our results show that C4.5 learning algorithm based classifier obtained very promising performance on detecting HTTP based botnet activity.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The need of a modern system to be more autonomous with regard to its environment make autonomic systems very attractive, providing them with self-management capabilities. Usually, an autonomic system reconfigures itself to overcome some problem or optimize itself. However, these reconfigurations may result in a loss of performance or even a service degradation. To avoid such situations, this paper proposes a performance prediction approach for autonomic systems, based on formal modelling. Our goal is to forecast the most appropriate configuration for an autonomic system, particularly, a multi-tier system, in order to get an efficient use of resources. The main idea is to model resource allocation triggered by the autonomic loop for achieving the best configuration. Then, we show how to analyse the whole system and evaluate the autonomic loop impact on system performances. The method is based on Stochastic Petri Nets (SPN) modelling. The resource availability, the workload intensity and the autonomic features are targeted. A typical example of a multiers system with one server is presented, analysed with the GreatSPN tool, to show the effectiveness of the proposed approach.
{"title":"An Approach for Performance Modelling and Analysis of Multi-tiers Autonomic Systems","authors":"Mehdi Sliem, Nabila Salmi, M. Ioualalen","doi":"10.1109/WAINA.2014.63","DOIUrl":"https://doi.org/10.1109/WAINA.2014.63","url":null,"abstract":"The need of a modern system to be more autonomous with regard to its environment make autonomic systems very attractive, providing them with self-management capabilities. Usually, an autonomic system reconfigures itself to overcome some problem or optimize itself. However, these reconfigurations may result in a loss of performance or even a service degradation. To avoid such situations, this paper proposes a performance prediction approach for autonomic systems, based on formal modelling. Our goal is to forecast the most appropriate configuration for an autonomic system, particularly, a multi-tier system, in order to get an efficient use of resources. The main idea is to model resource allocation triggered by the autonomic loop for achieving the best configuration. Then, we show how to analyse the whole system and evaluate the autonomic loop impact on system performances. The method is based on Stochastic Petri Nets (SPN) modelling. The resource availability, the workload intensity and the autonomic features are targeted. A typical example of a multiers system with one server is presented, analysed with the GreatSPN tool, to show the effectiveness of the proposed approach.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
REST architectural style gains increasing popularity in the networking protocol design, and it has become a prevalent choice for northbound API of Software-Defined Networking (SDN). This paper addresses many critical issues in RESTful networking protocol design, and presents a framework on how a networking protocol can be designed in a truly RESTful manner, making it towards a service oriented data networking. In particular, we introduce the HTTP content negotiation mechanism which allows clients to select different representation formats from the same resource URI. Most importantly, we present a hypertext-driven approach, so that hypertext links are defined between REST resources for the networking protocol to guide clients to identify the right resources rather than relying on fixed resource URIs. The advantages of our approach are verified in two folds. First, we show how to apply our approach to fix REST design problems in some existing northbound networking APIs, and then we show how to design a RESTful northbound API of SDN in the context of OpenStack. We implemented our proposed approach in the northbound REST API of SOX, a generalized SDN controller, and the benefits of the proposed approach are experimentally verified.
{"title":"REST API Design Patterns for SDN Northbound API","authors":"Wei Zhou, Li Li, Min Luo, W. Chou","doi":"10.1109/WAINA.2014.153","DOIUrl":"https://doi.org/10.1109/WAINA.2014.153","url":null,"abstract":"REST architectural style gains increasing popularity in the networking protocol design, and it has become a prevalent choice for northbound API of Software-Defined Networking (SDN). This paper addresses many critical issues in RESTful networking protocol design, and presents a framework on how a networking protocol can be designed in a truly RESTful manner, making it towards a service oriented data networking. In particular, we introduce the HTTP content negotiation mechanism which allows clients to select different representation formats from the same resource URI. Most importantly, we present a hypertext-driven approach, so that hypertext links are defined between REST resources for the networking protocol to guide clients to identify the right resources rather than relying on fixed resource URIs. The advantages of our approach are verified in two folds. First, we show how to apply our approach to fix REST design problems in some existing northbound networking APIs, and then we show how to design a RESTful northbound API of SDN in the context of OpenStack. We implemented our proposed approach in the northbound REST API of SOX, a generalized SDN controller, and the benefits of the proposed approach are experimentally verified.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The importance of the traffic control is a huge paradigm on the Internet. The AS (Autonomous Systems) by definition assumes no external control as priority; this could be an enormous problem when the traffic is asymmetric and the inbound is the higher portion. The problem is very often in networks hosted in South America countries; making the unbalancing inbound and outbound in a rate of more than 5:1 in some situations. In this article some Real South America networks will be analyzed, characterized including the specialist (e.g. Network Engineer) decision-making.
{"title":"Internet Traffic Engineering: Understanding the Specialist Decision-Making Process for Traffic Management in South America","authors":"M. Deus, P. Carvalho, J. P. Leite","doi":"10.1109/WAINA.2014.155","DOIUrl":"https://doi.org/10.1109/WAINA.2014.155","url":null,"abstract":"The importance of the traffic control is a huge paradigm on the Internet. The AS (Autonomous Systems) by definition assumes no external control as priority; this could be an enormous problem when the traffic is asymmetric and the inbound is the higher portion. The problem is very often in networks hosted in South America countries; making the unbalancing inbound and outbound in a rate of more than 5:1 in some situations. In this article some Real South America networks will be analyzed, characterized including the specialist (e.g. Network Engineer) decision-making.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115916057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}