Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019639
S. Sathyanarayanan, Reynald Susainathan Reni Sagayaraj
Federated Cloud Computing facilitates scalable on-demand service, ensuring business continuity through improved reliability on the cloud. This environment demands efficient Global Workload Management in the cloud market and appropriate mapping between service providers and consumers. This necessitates an efficient Service-Oriented Architecture, with an Enterprise Service Bus (ESB) providing a rich service abstraction. Service Broker, one of the main entities of ESB the implements Match-Making Algorithm. GWM focuses on scalable provisioning through Load-sharing policy improving QoS of global market. To realize this feature, the cloud coordinator implements an efficient distributed algorithm that incorporates vector clock based mutual exclusion on workload bursting. This paper presents vision, challenges and architectural elements of the Federated Intelligent Cloud.
{"title":"Federated Intelligent Cloud Service-Oriented Federation in Global Cloud Market with Match-Making Service Broker and Global Workload Management","authors":"S. Sathyanarayanan, Reynald Susainathan Reni Sagayaraj","doi":"10.1109/IC3I.2014.7019639","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019639","url":null,"abstract":"Federated Cloud Computing facilitates scalable on-demand service, ensuring business continuity through improved reliability on the cloud. This environment demands efficient Global Workload Management in the cloud market and appropriate mapping between service providers and consumers. This necessitates an efficient Service-Oriented Architecture, with an Enterprise Service Bus (ESB) providing a rich service abstraction. Service Broker, one of the main entities of ESB the implements Match-Making Algorithm. GWM focuses on scalable provisioning through Load-sharing policy improving QoS of global market. To realize this feature, the cloud coordinator implements an efficient distributed algorithm that incorporates vector clock based mutual exclusion on workload bursting. This paper presents vision, challenges and architectural elements of the Federated Intelligent Cloud.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128651411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019773
Dr. Raju Shanmugam, Y. M. Sirajudeen
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the Internet. Since Cloud Computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud Computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.
{"title":"Data security in Cloud Computing using Cramer - Shoup cryptosystem","authors":"Dr. Raju Shanmugam, Y. M. Sirajudeen","doi":"10.1109/IC3I.2014.7019773","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019773","url":null,"abstract":"Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the Internet. Since Cloud Computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud Computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"76 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019761
C. S. Hanchinal, K. N. Muralidhara
Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, atmospheric effects, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key parameters and a mathematical model is important for: predicting signal coverage, achievable data rates, network planning, Quality of service, hand over performance, etc. Efficiency of present path loss models for cellular communication system suffers when they are used in the environment other than for which they have been used. Accurate path loss can be determined by measuring strength of signal through site specific field measurements.
{"title":"A review of theatmospheric effects on radiopath lossin cellular mobile communication system","authors":"C. S. Hanchinal, K. N. Muralidhara","doi":"10.1109/IC3I.2014.7019761","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019761","url":null,"abstract":"Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, atmospheric effects, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key parameters and a mathematical model is important for: predicting signal coverage, achievable data rates, network planning, Quality of service, hand over performance, etc. Efficiency of present path loss models for cellular communication system suffers when they are used in the environment other than for which they have been used. Accurate path loss can be determined by measuring strength of signal through site specific field measurements.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019681
Mohammad Shahid, Z. Raza
Load balancing on computational resources in a computational grid environment is an NP Hard problem. Therefore, a number of schemes can be proposed for the same under different constraints. Accordingly, a variety of techniques have been proposed in the literature but none of them can be treated as the best for all conditions and QoS parameters. A computational grid enables the users to execute their compute intensive jobs on the resources in which investing is either not wise or beyond their limit to invest. Grid resources can be used to meet the user's requirements in terms of QoS parameters if the scheduling strategy provides the efficient mapping between the software parallelisms available in the application on the hardware parallelism offered by the grid. This work presents a centralized precedence based load balancing strategy for a batch of jobs represented as Direct Acyclic Graph (DAG) having communication requirements. Performance evaluation is carried out by comparing the proposed strategy with other load balancing schemes viz. LRR and OLB. Experimental study reveals that load distribution on nodes is better than LRR and OLB. The strategy can be used for the jobs which are more interactive as it results in a lower response time for the jobs of the batch.
{"title":"A precedence based load balancing strategy for batch of DAGs for computational grid","authors":"Mohammad Shahid, Z. Raza","doi":"10.1109/IC3I.2014.7019681","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019681","url":null,"abstract":"Load balancing on computational resources in a computational grid environment is an NP Hard problem. Therefore, a number of schemes can be proposed for the same under different constraints. Accordingly, a variety of techniques have been proposed in the literature but none of them can be treated as the best for all conditions and QoS parameters. A computational grid enables the users to execute their compute intensive jobs on the resources in which investing is either not wise or beyond their limit to invest. Grid resources can be used to meet the user's requirements in terms of QoS parameters if the scheduling strategy provides the efficient mapping between the software parallelisms available in the application on the hardware parallelism offered by the grid. This work presents a centralized precedence based load balancing strategy for a batch of jobs represented as Direct Acyclic Graph (DAG) having communication requirements. Performance evaluation is carried out by comparing the proposed strategy with other load balancing schemes viz. LRR and OLB. Experimental study reveals that load distribution on nodes is better than LRR and OLB. The strategy can be used for the jobs which are more interactive as it results in a lower response time for the jobs of the batch.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019625
G. Soni, V. Banga
FSO technology offers the potential of broadband communication capacity using unlicensed optical wavelengths. FSO is an independent protocol that can be fixed to any network topology. Even if a line-of-sight condition of Free Space Optics (FSO) is satisfied, atmospheric-induced fading, scattering, and attenuation may severely deteriorate the availability of the communication link. In this paper the proposed FSO link with link range of 500 meters and at wavelength of 1550 nm is simulated under weak turbulence conditions and the link performance is evaluated at different data rates.
{"title":"Performance analysis of Free Space Optics link at different data rates","authors":"G. Soni, V. Banga","doi":"10.1109/IC3I.2014.7019625","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019625","url":null,"abstract":"FSO technology offers the potential of broadband communication capacity using unlicensed optical wavelengths. FSO is an independent protocol that can be fixed to any network topology. Even if a line-of-sight condition of Free Space Optics (FSO) is satisfied, atmospheric-induced fading, scattering, and attenuation may severely deteriorate the availability of the communication link. In this paper the proposed FSO link with link range of 500 meters and at wavelength of 1550 nm is simulated under weak turbulence conditions and the link performance is evaluated at different data rates.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019712
Garima Mehta, M. Dutta, C. Travieso-González, Pyung Soo Kim
Security of biometric data plays a major concern due to extensive use of biometric systems in many applications. This paper proposes an efficient method for encryption of iris images using edge based encryption algorithm based on chaotic theory. In this proposed technique, the iris image is segmented into significant and non significant blocks to find region of interest (ROI) i.e. to localize iris from complete eye image from which features are extracted to generate biometric template. Selective encryption is used to encrypt the region of interest and it reduces the computational overhead and processing time as compared to full encryption techniques. The experimental results prove that edge based selective encryption significantly reduces the time of encryption of iris images as compared to full encryption method without any compromise in performance. Performance of proposed algorithm has been experimentally analyzed using key sensitivity analysis and the results prove that the encryption algorithm has high key sensitivity and the algorithm is lossless in nature.
{"title":"Edge based selective encryption scheme for biometric data using chaotic theory","authors":"Garima Mehta, M. Dutta, C. Travieso-González, Pyung Soo Kim","doi":"10.1109/IC3I.2014.7019712","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019712","url":null,"abstract":"Security of biometric data plays a major concern due to extensive use of biometric systems in many applications. This paper proposes an efficient method for encryption of iris images using edge based encryption algorithm based on chaotic theory. In this proposed technique, the iris image is segmented into significant and non significant blocks to find region of interest (ROI) i.e. to localize iris from complete eye image from which features are extracted to generate biometric template. Selective encryption is used to encrypt the region of interest and it reduces the computational overhead and processing time as compared to full encryption techniques. The experimental results prove that edge based selective encryption significantly reduces the time of encryption of iris images as compared to full encryption method without any compromise in performance. Performance of proposed algorithm has been experimentally analyzed using key sensitivity analysis and the results prove that the encryption algorithm has high key sensitivity and the algorithm is lossless in nature.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019607
P. N. Sharath Kumar, R. Rajesh Kumar, A. Sathar, V. Sahasranamam
These days, Automated screening systems are becoming the best possible solution for not only reducing burden on the medical practitioners but also reducing human prone errors with the help of accurate automated diagnosis of the disease. In Diabetic Retinopathy (DR), the crucial step for an automated system is exhaustive detection of the lesions. In this paper, a modified red lesion detection method is presented based on some changes to the filters used in the prior work by Spencer et al. Along with this, a novel three stage false positive elimination technique is presented to remove non red-lesion candidates detected in the modified filter approach. Firstly, false positive candidates detected elsewhere in the retina are removed. Secondly, falsely found candidates on the blood vessels are removed. Third, candidates found in the optic disc area are removed using our earlier work. To evaluate our method for the detection of red lesions, we examined two sets of fundus images, first set constituting of 94 images obtained from the routine screening at Regional Institute of Ophthalmology, Thiruvananthapuram and the second set of 89 images from DIARETDB1 database. When determining whether an image contains red lesions, our method achieved a sensitivity of 95.6% and specificity of 93.2%. Also, our method detected 78.9% red lesions present in each of the images.
{"title":"Automatic detection of red lesions in digital color retinal images","authors":"P. N. Sharath Kumar, R. Rajesh Kumar, A. Sathar, V. Sahasranamam","doi":"10.1109/IC3I.2014.7019607","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019607","url":null,"abstract":"These days, Automated screening systems are becoming the best possible solution for not only reducing burden on the medical practitioners but also reducing human prone errors with the help of accurate automated diagnosis of the disease. In Diabetic Retinopathy (DR), the crucial step for an automated system is exhaustive detection of the lesions. In this paper, a modified red lesion detection method is presented based on some changes to the filters used in the prior work by Spencer et al. Along with this, a novel three stage false positive elimination technique is presented to remove non red-lesion candidates detected in the modified filter approach. Firstly, false positive candidates detected elsewhere in the retina are removed. Secondly, falsely found candidates on the blood vessels are removed. Third, candidates found in the optic disc area are removed using our earlier work. To evaluate our method for the detection of red lesions, we examined two sets of fundus images, first set constituting of 94 images obtained from the routine screening at Regional Institute of Ophthalmology, Thiruvananthapuram and the second set of 89 images from DIARETDB1 database. When determining whether an image contains red lesions, our method achieved a sensitivity of 95.6% and specificity of 93.2%. Also, our method detected 78.9% red lesions present in each of the images.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126397648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019662
T. K. Das, D. Acharjya, M. Patra
In this paper we have explained the detailed work done in developing a framework which can be used for the purpose of discovering business intelligence with the help of decision rules induced from the customer reviews of a product or a service posted online. We have explained the analysis for the product Samsung Galaxy S5. Our proposed framework has been designed by collecting the reviews from Samsung home page, preprocessing it and inducing rules by using rough set based LEM2 algorithm. The induced rules would be helpful for Business analyst in understanding the product dimensions, attributes and inherent association among them.
{"title":"Business intelligence from online product review-a rough set based rule induction approach","authors":"T. K. Das, D. Acharjya, M. Patra","doi":"10.1109/IC3I.2014.7019662","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019662","url":null,"abstract":"In this paper we have explained the detailed work done in developing a framework which can be used for the purpose of discovering business intelligence with the help of decision rules induced from the customer reviews of a product or a service posted online. We have explained the analysis for the product Samsung Galaxy S5. Our proposed framework has been designed by collecting the reviews from Samsung home page, preprocessing it and inducing rules by using rough set based LEM2 algorithm. The induced rules would be helpful for Business analyst in understanding the product dimensions, attributes and inherent association among them.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124422534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019674
H. Mallikarjun, H. N. Suresh
Depression is one of the most common mental disorders that at its worst can lead to suicide. Diagnosing depression in the early curable stage is very important. It may also lead to various disorders like sleep disorders and alcoholism. Here in this project the Electroencephalogram Gram (EEG) signals are obtained from publicly available database are processed in MATLAB. This can be useful in classifying subjects with the disorders using classifier tools present in it. For this aim, the features are extracted from frequency bands (alpha, delta and theta).
{"title":"Depression level prediction using EEG signal processing","authors":"H. Mallikarjun, H. N. Suresh","doi":"10.1109/IC3I.2014.7019674","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019674","url":null,"abstract":"Depression is one of the most common mental disorders that at its worst can lead to suicide. Diagnosing depression in the early curable stage is very important. It may also lead to various disorders like sleep disorders and alcoholism. Here in this project the Electroencephalogram Gram (EEG) signals are obtained from publicly available database are processed in MATLAB. This can be useful in classifying subjects with the disorders using classifier tools present in it. For this aim, the features are extracted from frequency bands (alpha, delta and theta).","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019705
M. Dutta, Anushikha Singh, M. Parthasarathi, C. Travieso
This paper proposes a method of inserting a digital pattern having patient identity information in the medical retinal image without changing the perceptual property and without causing any loss of medical information of this image. To achieve this insertion of the digital signature identity of the patient is done in the singular value based decomposition (SVD) domain of the image. After the insertion of this digital signature is done in the retinal image a detailed comparative study and analysis is done between original image and marked image to test if all the medical information and features of the image is retained. The important feature of the medical image like blood arteries, macula and optic disc has been segmented from the original and stego-image. The experimental results indicate that the original and the stego image have similar perceptual properties and no medical information is lost in the process of digital watermarking. Features of the original and stego image has been analyzed and experimental results indicates that the variation in the features is minimal and do not affect the medical information which has been validated by professional ophthalmologists. The correlation of the features extracted is above 0.99 indicating the insertion of the digital pattern did not cause any loss of medical information in the image.
{"title":"Imperceptible digital watermarking in medical retinal images for tele-medicine applications","authors":"M. Dutta, Anushikha Singh, M. Parthasarathi, C. Travieso","doi":"10.1109/IC3I.2014.7019705","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019705","url":null,"abstract":"This paper proposes a method of inserting a digital pattern having patient identity information in the medical retinal image without changing the perceptual property and without causing any loss of medical information of this image. To achieve this insertion of the digital signature identity of the patient is done in the singular value based decomposition (SVD) domain of the image. After the insertion of this digital signature is done in the retinal image a detailed comparative study and analysis is done between original image and marked image to test if all the medical information and features of the image is retained. The important feature of the medical image like blood arteries, macula and optic disc has been segmented from the original and stego-image. The experimental results indicate that the original and the stego image have similar perceptual properties and no medical information is lost in the process of digital watermarking. Features of the original and stego image has been analyzed and experimental results indicates that the variation in the features is minimal and do not affect the medical information which has been validated by professional ophthalmologists. The correlation of the features extracted is above 0.99 indicating the insertion of the digital pattern did not cause any loss of medical information in the image.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}