Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285823
J. Karam, Samer E. Mansour
The construction of orthogonal Daubechies wavelets via two channel perfect reconstruction filter bank requires the identification of necessary conditions that the coefficients of the filters and the roots of binomial polynomials associated with it should exhibit. In this paper, Biorthogonal Daubechies families of wavelets are considered and their filters are derived. In particular, the Biorthogonal wavelets Bior3.5, Bior3.9 and Bior6.8 are examined and the zeros distribution of their polynomials associated filters are located.
{"title":"On the roots of Daubechies polynomials for Biorthogonal wavelets","authors":"J. Karam, Samer E. Mansour","doi":"10.1109/ICCITECHNOL.2012.6285823","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285823","url":null,"abstract":"The construction of orthogonal Daubechies wavelets via two channel perfect reconstruction filter bank requires the identification of necessary conditions that the coefficients of the filters and the roots of binomial polynomials associated with it should exhibit. In this paper, Biorthogonal Daubechies families of wavelets are considered and their filters are derived. In particular, the Biorthogonal wavelets Bior3.5, Bior3.9 and Bior6.8 are examined and the zeros distribution of their polynomials associated filters are located.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285801
F. Mhiri, K. Sethom, R. Bouallègue, G. Pujolle
The femtocell concept is an emerging technology for deploying the next generation of the wireless networks, aiming at indoor coverage enhancement, increasing capacity, and offloading the overlay macrocell traffic. Nevertheless, one of the most critical issues in femtocells deployment is the potential interference, thus mitigating the overall system capacity. In this paper, we propose a novel joint power resource allocation mechanism to deal with the interference between nearby femtocells in Enterprise networks. With the autonomic and distributed architecture considered we aim to improve the energy efficiency. Based on cognitive approach, we formulate a multi-objective optimization problem with mixed integer variables for the joint power control, base station assignment, and channel assignments according to user's QoS.
{"title":"3-On-3: A new algorithm for femtocell self organized networks","authors":"F. Mhiri, K. Sethom, R. Bouallègue, G. Pujolle","doi":"10.1109/ICCITECHNOL.2012.6285801","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285801","url":null,"abstract":"The femtocell concept is an emerging technology for deploying the next generation of the wireless networks, aiming at indoor coverage enhancement, increasing capacity, and offloading the overlay macrocell traffic. Nevertheless, one of the most critical issues in femtocells deployment is the potential interference, thus mitigating the overall system capacity. In this paper, we propose a novel joint power resource allocation mechanism to deal with the interference between nearby femtocells in Enterprise networks. With the autonomic and distributed architecture considered we aim to improve the energy efficiency. Based on cognitive approach, we formulate a multi-objective optimization problem with mixed integer variables for the joint power control, base station assignment, and channel assignments according to user's QoS.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285837
Han-Kui Chang, Jia-Chin Lin, Meng-Lin Ku
Spectrum sensing is a crucial technique used to discover available bands that are not occupied by primary users in cognitive networks (CNs). With good sensing capability in terms of low probability of a miss occurrence, secondary users can effectively recycle the spectrum resource without disturbing active primary users. With low probability of a false alarm occurrence, spectral utilization may be relatively simple spectrum sensing technique. In practice, a cognitive radio (CR) receiver has to operate at low signal-to-noise ratio (SNR) regimes because of channel fades and noise. Therefore, low SNR inevitably degrades the performance of ED dramatically. In this paper, a sequential test detector based on higher-order statistics (HOS) is investigated to conduct effective spectral sensing, especially in low-SNR environments. By taking advantage of cumulant statistics, spectrum sensing reliability can be significantly improved as Gaussian noise can be overwhelmed. Based on binary hypothesis testing, a low-complexity sequential probability ratio test (SPRT) is thus developed for effectively detecting the vacant spectrum to meet the requirements of the sensing duty cycle. Simulation results show that the proposed detector outperforms conventional ED, especially in low SNR environments.
{"title":"Sequential spectrum sensing based on higher-order statistics for cognitive radios","authors":"Han-Kui Chang, Jia-Chin Lin, Meng-Lin Ku","doi":"10.1109/ICCITECHNOL.2012.6285837","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285837","url":null,"abstract":"Spectrum sensing is a crucial technique used to discover available bands that are not occupied by primary users in cognitive networks (CNs). With good sensing capability in terms of low probability of a miss occurrence, secondary users can effectively recycle the spectrum resource without disturbing active primary users. With low probability of a false alarm occurrence, spectral utilization may be relatively simple spectrum sensing technique. In practice, a cognitive radio (CR) receiver has to operate at low signal-to-noise ratio (SNR) regimes because of channel fades and noise. Therefore, low SNR inevitably degrades the performance of ED dramatically. In this paper, a sequential test detector based on higher-order statistics (HOS) is investigated to conduct effective spectral sensing, especially in low-SNR environments. By taking advantage of cumulant statistics, spectrum sensing reliability can be significantly improved as Gaussian noise can be overwhelmed. Based on binary hypothesis testing, a low-complexity sequential probability ratio test (SPRT) is thus developed for effectively detecting the vacant spectrum to meet the requirements of the sensing duty cycle. Simulation results show that the proposed detector outperforms conventional ED, especially in low SNR environments.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285786
K. Sundararaman, Jinka Parthasarathi, G. S. V. Rao, S. N. Kumar
Baseline prediction is an important to devise marketing strategy for a consumer goods product. Simulation techniques, time series algorithms are often used to generate baseline for the future. However the algorithm that fits a particular point of sales (POS) data varies according to the datasets. Sample set of point of sales data were simulated under different conditions and constraints incorporating seasonal and non seasonal trends. This study has compared the performance of two time series models namely Winters model and linear exponential smoothening on the simulated datasets. Winters model was found to be a better fit for the point of sales data that were used for testing.
{"title":"Baseline prediction of point of sales data for trade promotion optimization","authors":"K. Sundararaman, Jinka Parthasarathi, G. S. V. Rao, S. N. Kumar","doi":"10.1109/ICCITECHNOL.2012.6285786","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285786","url":null,"abstract":"Baseline prediction is an important to devise marketing strategy for a consumer goods product. Simulation techniques, time series algorithms are often used to generate baseline for the future. However the algorithm that fits a particular point of sales (POS) data varies according to the datasets. Sample set of point of sales data were simulated under different conditions and constraints incorporating seasonal and non seasonal trends. This study has compared the performance of two time series models namely Winters model and linear exponential smoothening on the simulated datasets. Winters model was found to be a better fit for the point of sales data that were used for testing.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285789
Mariem Thaalbi, N. Tabbane, T. Bejaoui, A. Meddahi
Nowadays, a new paradigm is emerging: the challenging integration of Peer-to-Peer into mobile Ad hoc networks (MANETs). In this context, this paper proposes to combine two Chord extensions for MANETs. Its main objective is to reduce the lookup failures. Simulation results indicate that the proposed scheme has an improved performance in comparison with the two Chord extensions, the Backtracking Chord protocol and the Enhanced Mobile Chord.
{"title":"Enhanced Backtracking Chord protocol for mobile Ad hoc networks","authors":"Mariem Thaalbi, N. Tabbane, T. Bejaoui, A. Meddahi","doi":"10.1109/ICCITECHNOL.2012.6285789","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285789","url":null,"abstract":"Nowadays, a new paradigm is emerging: the challenging integration of Peer-to-Peer into mobile Ad hoc networks (MANETs). In this context, this paper proposes to combine two Chord extensions for MANETs. Its main objective is to reduce the lookup failures. Simulation results indicate that the proposed scheme has an improved performance in comparison with the two Chord extensions, the Backtracking Chord protocol and the Enhanced Mobile Chord.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285825
Emad Q. Al-Dalakta, C. Tsimenidis, B. Sharif, A. Al-Dweik, A. Hazmi
Multi-carrier systems are significantly affected by inter-carrier interference (ICI) produced by both travelling wave tube amplifiers (TWTAs) utilized in satellite systems and carrier frequency offsets (CFOs). To reduce the ICI, an improved version of the partial transmit sequences (PTS) scheme is proposed based the distortion-to-signal power ratio (DSR) measurements. Monte Carlo simulation results demonstrated that the proposed system outperforms the conventional PTS in terms of bit error rate (BER), effective signal-to-noise ratio (ESNR) and complementary cumulative distribution function (CCDF).
{"title":"Efficient ICI reduction technique for OFDM systems distorted by TWTA and CFO","authors":"Emad Q. Al-Dalakta, C. Tsimenidis, B. Sharif, A. Al-Dweik, A. Hazmi","doi":"10.1109/ICCITECHNOL.2012.6285825","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285825","url":null,"abstract":"Multi-carrier systems are significantly affected by inter-carrier interference (ICI) produced by both travelling wave tube amplifiers (TWTAs) utilized in satellite systems and carrier frequency offsets (CFOs). To reduce the ICI, an improved version of the partial transmit sequences (PTS) scheme is proposed based the distortion-to-signal power ratio (DSR) measurements. Monte Carlo simulation results demonstrated that the proposed system outperforms the conventional PTS in terms of bit error rate (BER), effective signal-to-noise ratio (ESNR) and complementary cumulative distribution function (CCDF).","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127884249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285810
Amer Al-Ghadhban, M. Abu-Amara
Recently, the Internet is essential in providing numerous services to different types of users. Preventing the users from accessing these services has a serious impact on the daily life of the user. In this paper we considered a scenario wherein a specific region is maliciously denied from accessing the Internet by a single upstream International Internet Service Provider (IISP). Assuming the availability of a cooperative AS, we prototype and evaluate a tunnel-based solution proposed by M. Abu-Amara [1]. The prototyping is conducted in a real laboratory designed and configured to be close to the Internet's ASes connectivity structure. Different tunneling protocols are examined with different Internet applications and background traffic loads. The prototyping proves the ability of the tunneling techniques in circumventing the Internet access denial performed by the malicious IISP. In addition, the IP-in-IP tunneling technique has shown the lowest end-to-end delay and traffic overhead.
{"title":"Prototyping and evaluating a tunnel-based solution to circumvent malicious IISP blocking","authors":"Amer Al-Ghadhban, M. Abu-Amara","doi":"10.1109/ICCITECHNOL.2012.6285810","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285810","url":null,"abstract":"Recently, the Internet is essential in providing numerous services to different types of users. Preventing the users from accessing these services has a serious impact on the daily life of the user. In this paper we considered a scenario wherein a specific region is maliciously denied from accessing the Internet by a single upstream International Internet Service Provider (IISP). Assuming the availability of a cooperative AS, we prototype and evaluate a tunnel-based solution proposed by M. Abu-Amara [1]. The prototyping is conducted in a real laboratory designed and configured to be close to the Internet's ASes connectivity structure. Different tunneling protocols are examined with different Internet applications and background traffic loads. The prototyping proves the ability of the tunneling techniques in circumventing the Internet access denial performed by the malicious IISP. In addition, the IP-in-IP tunneling technique has shown the lowest end-to-end delay and traffic overhead.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285850
H. Mcheick, Y. Qi
Software architecture has a vital role in achieving quality goals for large scale software systems which is made up of components and connectors. For reducing the complexity of software, components and connectors are applied to understanding, designing, and implementing software, especially connectors residing in distributed systems. To satisfy requirements of interaction between various components, it is time and cost consuming process to create a connector. In particular, it is often difficult to select only one type of connector to develop connectors in distributed systems. To address the difficulties, our research focuses on the issue: how do traditional types of connectors, in combination with new technologies in distributed systems, provide systems architectures with loosely coupled structures. In this paper, we propose an approach to the combination of connectors in order to provide distributed systems with loosely coupled interaction. Our approach involves AOP technology and design pattern, as well as messaging systems. In the end, we present an example of our approach in which we show a connector designed by combining the AspectJ, shared memory, UDP Socket and publish-subscribe design pattern with the aim of designing a loosely coupled system architecture.
{"title":"Combination of connectors with loosely coupled architecture based on aspect-oriented computing","authors":"H. Mcheick, Y. Qi","doi":"10.1109/ICCITECHNOL.2012.6285850","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285850","url":null,"abstract":"Software architecture has a vital role in achieving quality goals for large scale software systems which is made up of components and connectors. For reducing the complexity of software, components and connectors are applied to understanding, designing, and implementing software, especially connectors residing in distributed systems. To satisfy requirements of interaction between various components, it is time and cost consuming process to create a connector. In particular, it is often difficult to select only one type of connector to develop connectors in distributed systems. To address the difficulties, our research focuses on the issue: how do traditional types of connectors, in combination with new technologies in distributed systems, provide systems architectures with loosely coupled structures. In this paper, we propose an approach to the combination of connectors in order to provide distributed systems with loosely coupled interaction. Our approach involves AOP technology and design pattern, as well as messaging systems. In the end, we present an example of our approach in which we show a connector designed by combining the AspectJ, shared memory, UDP Socket and publish-subscribe design pattern with the aim of designing a loosely coupled system architecture.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285821
Rui Xue, Chun-Li Xiao
The increasing number of users of mobile communication systems and the corresponding need for increased capacity show the importance of using a modulation scheme which is both power and bandwidth efficient. Continuous phase modulation (CPM) provides an attractive option for spectral efficient communication systems. Low-density parity-check (LDPC) codes combined with CPM has a potential to result in a spectrally efficient scheme that is also energy efficient in that it yields low error rates at low signal-to-noise ratios. In this paper, LDPC coded CPM which can be decoded and demodulated iteratively is considered for uplink of satellite communications. In order to reduce the positive feedback during iterative detection with short frame, an improved method based on weighed extrinsic information exchange is presented. Theoretic analysis and simulation results over Rayleigh fading channel show that the proposed method can not only achieve lower bit error rate (BER) and better convergence compared to the previous methods, but also offer very low error-floor and good BER performance in waterfall region. Meanwhile, the method can reduce the average number of iteration as well as the iterative decoding delay.
{"title":"An improved iterative decoding method for LDPC coded CPM systems in Rayleigh fading channel","authors":"Rui Xue, Chun-Li Xiao","doi":"10.1109/ICCITECHNOL.2012.6285821","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285821","url":null,"abstract":"The increasing number of users of mobile communication systems and the corresponding need for increased capacity show the importance of using a modulation scheme which is both power and bandwidth efficient. Continuous phase modulation (CPM) provides an attractive option for spectral efficient communication systems. Low-density parity-check (LDPC) codes combined with CPM has a potential to result in a spectrally efficient scheme that is also energy efficient in that it yields low error rates at low signal-to-noise ratios. In this paper, LDPC coded CPM which can be decoded and demodulated iteratively is considered for uplink of satellite communications. In order to reduce the positive feedback during iterative detection with short frame, an improved method based on weighed extrinsic information exchange is presented. Theoretic analysis and simulation results over Rayleigh fading channel show that the proposed method can not only achieve lower bit error rate (BER) and better convergence compared to the previous methods, but also offer very low error-floor and good BER performance in waterfall region. Meanwhile, the method can reduce the average number of iteration as well as the iterative decoding delay.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285841
S. Ouamour, H. Sayoud
In this paper the authors investigate the task of authorship attribution on very old Arabic texts that were written by ten ancient Arabic travelers. Several features such as characters n-grams and word n-grams are used as input of a SMO-SVM (i.e. Sequential Minimal Optimization based Support Vector Machine). Experiments of authorship attribution, on this text database, show interesting results with a classification precision of 80%. This research work, which represents a rare text-mining work on the Arabic language, has revealed several interesting points.
{"title":"Authorship attribution of ancient texts written by ten arabic travelers using a SMO-SVM classifier","authors":"S. Ouamour, H. Sayoud","doi":"10.1109/ICCITECHNOL.2012.6285841","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285841","url":null,"abstract":"In this paper the authors investigate the task of authorship attribution on very old Arabic texts that were written by ten ancient Arabic travelers. Several features such as characters n-grams and word n-grams are used as input of a SMO-SVM (i.e. Sequential Minimal Optimization based Support Vector Machine). Experiments of authorship attribution, on this text database, show interesting results with a classification precision of 80%. This research work, which represents a rare text-mining work on the Arabic language, has revealed several interesting points.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124379394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}