Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705223
K. Kósi, J. Tar, T. Haidegger
The traditional way of thinking in controller design prefers the use of the “state space representation” introduced by R. Kalman in the early sixties of the past century. This system description is in close relationship with linear or at least partly linear system in which the linear part can be used in forming a quadratic Lyapunov function in the stability proof. In the standard model of such systems it is assumed that the state of the system is not directly observable, only certain linear functions of the state variable are directly measurable. Since such approaches introduce certain feedback gains for the state variable, observers are needed that calculate the estimation of the state variable on the basis of directly measurable quantities. The Luenberger observers solve this task via introducing a differential equation for the estimated state. In order to avoid the mathematical difficulties of Lyapunov's “direct method” the “Robust Fixed Point Transformations (RFPT)” were introduced in a novel adaptive technique that instead of the state space representation directly utilized the available approximate model of the system to estimate its “response function”. In this approach it was assumed that the system's response is directly observable and an iterative sequence was generated by the use of “Banach's Fixed Point Theorem” that converged to an appropriate deformation of the rough initial model to obtain precise trajectory tracking. In the present paper it is shown that the Luenberger observers and the RFPT-based mathod can be combined in a more conventional approach of the adaptive controllers that are designed on the basis of finding appropriate feedback gains. Illustrative simulation examples are presented to substantiate this statement.
{"title":"Application of Luenberger's observer in RFPT-based adaptive control — A case study","authors":"K. Kósi, J. Tar, T. Haidegger","doi":"10.1109/CINTI.2013.6705223","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705223","url":null,"abstract":"The traditional way of thinking in controller design prefers the use of the “state space representation” introduced by R. Kalman in the early sixties of the past century. This system description is in close relationship with linear or at least partly linear system in which the linear part can be used in forming a quadratic Lyapunov function in the stability proof. In the standard model of such systems it is assumed that the state of the system is not directly observable, only certain linear functions of the state variable are directly measurable. Since such approaches introduce certain feedback gains for the state variable, observers are needed that calculate the estimation of the state variable on the basis of directly measurable quantities. The Luenberger observers solve this task via introducing a differential equation for the estimated state. In order to avoid the mathematical difficulties of Lyapunov's “direct method” the “Robust Fixed Point Transformations (RFPT)” were introduced in a novel adaptive technique that instead of the state space representation directly utilized the available approximate model of the system to estimate its “response function”. In this approach it was assumed that the system's response is directly observable and an iterative sequence was generated by the use of “Banach's Fixed Point Theorem” that converged to an appropriate deformation of the rough initial model to obtain precise trajectory tracking. In the present paper it is shown that the Luenberger observers and the RFPT-based mathod can be combined in a more conventional approach of the adaptive controllers that are designed on the basis of finding appropriate feedback gains. Illustrative simulation examples are presented to substantiate this statement.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705173
Hunor Sándor, T. Szabó, T. Vajda, P. Haller, Z. Szántó, L. Márton
In bilateral teleoperation systems, beside the haptic feedback, the human operator also needs video information about the motion of the distantly controlled robot to complete the teleoperation task. In this study a software design approach is presented for such bilateral teleoperation systems that include one or more video channels. A control algorithm is also presented that regulates the traffic in the video channels in order to assure good communication properties for the communication channels over which the control signals are interchanged by the master and slave side of the teleoperation system. Solutions are also given for the implementation of such teleoperation systems. Experimental measurements are presented to validate the proposed communication and software design approach.
{"title":"Video supported bilateral teleoperation system: Design and implementation","authors":"Hunor Sándor, T. Szabó, T. Vajda, P. Haller, Z. Szántó, L. Márton","doi":"10.1109/CINTI.2013.6705173","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705173","url":null,"abstract":"In bilateral teleoperation systems, beside the haptic feedback, the human operator also needs video information about the motion of the distantly controlled robot to complete the teleoperation task. In this study a software design approach is presented for such bilateral teleoperation systems that include one or more video channels. A control algorithm is also presented that regulates the traffic in the video channels in order to assure good communication properties for the communication channels over which the control signals are interchanged by the master and slave side of the teleoperation system. Solutions are also given for the implementation of such teleoperation systems. Experimental measurements are presented to validate the proposed communication and software design approach.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705179
S. Aradi, Tamás Bécsi, P. Gáspár
Rising energy prices motivate all participants in transportation to pay attention to the possibilities of reducing the amount of energy used. The paper deals with the reduction of energy consumption of trains. The main goal is to generate a speed profile that is more energy efficient than a given reference journey taking the slopes of the track into consideration. The paper shows that by using a predictive optimization approach both journey time keeping and energy consumption reduction can be achieved. The proposed method has been tested by simulation based on a real case study of the SBB. The presented algorithm could be used in drivers' training or as a core algorithm for automatic train operation.
{"title":"A predictive optimization method for energy-optimal speed profile generation for trains","authors":"S. Aradi, Tamás Bécsi, P. Gáspár","doi":"10.1109/CINTI.2013.6705179","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705179","url":null,"abstract":"Rising energy prices motivate all participants in transportation to pay attention to the possibilities of reducing the amount of energy used. The paper deals with the reduction of energy consumption of trains. The main goal is to generate a speed profile that is more energy efficient than a given reference journey taking the slopes of the track into consideration. The paper shows that by using a predictive optimization approach both journey time keeping and energy consumption reduction can be achieved. The proposed method has been tested by simulation based on a real case study of the SBB. The presented algorithm could be used in drivers' training or as a core algorithm for automatic train operation.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114727270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705215
J. Horalek, J. Matyska, V. Sobeslav
The suitability assessment of implemented virtual platform must precede the implementation itself. The aim of the article is to experimentally assess the performance of freely available virtualization tools in several aspects. In the process of virtualization of any environment the performance decreases regarding a host system because of an application of isolating technologies. The performance parameters of CPU, inquired in two different tests, speed of retrieving and writing on a virtualized hard disc and also speed of response of a virtual network interface were chosen for comparison. The aim of the article is also to present the results of testing and chosen tested tools together with used methodology. The measured values are presented in graphs and accompanied by their interpretations. On the grounds of measured values one of the tested virtualization tools is recommended, which measured values shown the best characteristics.
{"title":"Performance comparison of selected virtualization platforms","authors":"J. Horalek, J. Matyska, V. Sobeslav","doi":"10.1109/CINTI.2013.6705215","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705215","url":null,"abstract":"The suitability assessment of implemented virtual platform must precede the implementation itself. The aim of the article is to experimentally assess the performance of freely available virtualization tools in several aspects. In the process of virtualization of any environment the performance decreases regarding a host system because of an application of isolating technologies. The performance parameters of CPU, inquired in two different tests, speed of retrieving and writing on a virtualized hard disc and also speed of response of a virtual network interface were chosen for comparison. The aim of the article is also to present the results of testing and chosen tested tools together with used methodology. The measured values are presented in graphs and accompanied by their interpretations. On the grounds of measured values one of the tested virtualization tools is recommended, which measured values shown the best characteristics.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705185
Wei Wei, Zhou Jun
There is memory and storage problem of long key in encryption algorithm, so combining biometric characteristic with the traditional encryption algorithm is a new research direction. An encryption algorithm based on key from iris features and AES is proposed. On the basis of iris images preprocessing stage, effective iris area is decomposed to three layers by 2D Haar wavelet. Detail coefficients from the third layer is extracted and 375-bit iris codes is generated, 128-bit key is extracted from iris codes by using unit mapping function. The encryption and decryption experiments with AES was applied on the image with size of 512×512. Experimental result shows that the encrypted image has high security, also the purpose of protecting image information is reached.
{"title":"Image encryption algorithm Based on the key extracted from iris characteristics","authors":"Wei Wei, Zhou Jun","doi":"10.1109/CINTI.2013.6705185","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705185","url":null,"abstract":"There is memory and storage problem of long key in encryption algorithm, so combining biometric characteristic with the traditional encryption algorithm is a new research direction. An encryption algorithm based on key from iris features and AES is proposed. On the basis of iris images preprocessing stage, effective iris area is decomposed to three layers by 2D Haar wavelet. Detail coefficients from the third layer is extracted and 375-bit iris codes is generated, 128-bit key is extracted from iris codes by using unit mapping function. The encryption and decryption experiments with AES was applied on the image with size of 512×512. Experimental result shows that the encrypted image has high security, also the purpose of protecting image information is reached.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705227
E. M. Albornoz, L. D. Vignolo, Cesar E. Martínez, Diego H. Milone
The pervasive development disorders in autism condition lead to impairments in language and social communication. They are evidenced as atypical prosody production, emotion recognition and apraxia, among others communication deficits. This work tackle with the problem of the recognition of pathologies derived from these disorders in children, based on the acoustic analysis of speech. Specifically, the task consists of the diagnosis of normality (typically developing children) or three different pathologies. We propose an evolutionary approach to the feature selection stage. It relies on the use of genetic algorithm to find the set of features that optimally represent the speech data for this classification task. The genetic algorithm uses a support vector machine in order to evaluate the solutions (each individual) during the search. The results showed that our methodology improves the baseline provided for the task. The obtained unweighted classification accuracy was 54.80% on the development set, which represents a relative improvement of 6%, and 55.41% on test set. On the related task of binary classification between typical versus atypical developing condition, our approach achieved an unweighted classification accuracy of 92.66% on the test set.
{"title":"Genetic wrapper approach for automatic diagnosis of speech disorders related to Autism","authors":"E. M. Albornoz, L. D. Vignolo, Cesar E. Martínez, Diego H. Milone","doi":"10.1109/CINTI.2013.6705227","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705227","url":null,"abstract":"The pervasive development disorders in autism condition lead to impairments in language and social communication. They are evidenced as atypical prosody production, emotion recognition and apraxia, among others communication deficits. This work tackle with the problem of the recognition of pathologies derived from these disorders in children, based on the acoustic analysis of speech. Specifically, the task consists of the diagnosis of normality (typically developing children) or three different pathologies. We propose an evolutionary approach to the feature selection stage. It relies on the use of genetic algorithm to find the set of features that optimally represent the speech data for this classification task. The genetic algorithm uses a support vector machine in order to evaluate the solutions (each individual) during the search. The results showed that our methodology improves the baseline provided for the task. The obtained unweighted classification accuracy was 54.80% on the development set, which represents a relative improvement of 6%, and 55.41% on test set. On the related task of binary classification between typical versus atypical developing condition, our approach achieved an unweighted classification accuracy of 92.66% on the test set.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705250
Tomás Kucecka, D. Chudá, P. Sladecek
Document clustering is a process of organizing text data into clusters where a cluster usually represents a group of topic related documents. Most effective text clustering approaches are based on frequent itemsets. A popular algorithm that uses this approach is FIHC (Frequent Itemset-based Hierarchical Clustering). In recent years, many modifications have been made to this algorithm. In this paper we focus on clustering web articles which represent a special type of text data. They contain hyperlinks through which they are linked with other articles on the web. We propose a FICWAN algorithm which is a modification of FIHC. FICWAN is especially suited for web data. We show that by considering the neighborhood of a web article and its HTML tags and CSS we are able to significantly improve the quality of created clusters. We experimented with our approach on several corpuses and the results clearly outperformed FIHC.
{"title":"FIC WAN frequent itemset clustering of web articles by analyzing the article neighborhood","authors":"Tomás Kucecka, D. Chudá, P. Sladecek","doi":"10.1109/CINTI.2013.6705250","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705250","url":null,"abstract":"Document clustering is a process of organizing text data into clusters where a cluster usually represents a group of topic related documents. Most effective text clustering approaches are based on frequent itemsets. A popular algorithm that uses this approach is FIHC (Frequent Itemset-based Hierarchical Clustering). In recent years, many modifications have been made to this algorithm. In this paper we focus on clustering web articles which represent a special type of text data. They contain hyperlinks through which they are linked with other articles on the web. We propose a FICWAN algorithm which is a modification of FIHC. FICWAN is especially suited for web data. We show that by considering the neighborhood of a web article and its HTML tags and CSS we are able to significantly improve the quality of created clusters. We experimented with our approach on several corpuses and the results clearly outperformed FIHC.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705237
A. Walaszek-Babiszewska
This work deals with the creating probabilistic-fuzzy knowledge-based systems by using the theory of fuzzy systems as well as the probability and stochastic processes theory. We show that such systems can be applied in different diagnostic tasks. The structure of the reason-result fuzzy model has a form of weighted rules. Weights represent empirical probabilities of fuzzy statements in antecedents and consequent parts of rules. The calculated probabilities of fuzzy events are included into inference/forecast procedures.
{"title":"Fuzzy knowledge-based approach to diagnosis tasks in stochastic environment","authors":"A. Walaszek-Babiszewska","doi":"10.1109/CINTI.2013.6705237","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705237","url":null,"abstract":"This work deals with the creating probabilistic-fuzzy knowledge-based systems by using the theory of fuzzy systems as well as the probability and stochastic processes theory. We show that such systems can be applied in different diagnostic tasks. The structure of the reason-result fuzzy model has a form of weighted rules. Weights represent empirical probabilities of fuzzy statements in antecedents and consequent parts of rules. The calculated probabilities of fuzzy events are included into inference/forecast procedures.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705176
T. Hajjari
Ranking fuzzy numbers plays a very important role in linguistic decision making, data analysis and some other fuzzy application systems. The last decades have seen a large number of methods investigated for ranking fuzzy numbers. The most commonly used approached for ranking fuzzy numbers is ranking indices based on centroid of fuzzy numbers. However, there are some weakness associated with these indices. This paper, proposes a new centroid index ranking method that is capable of effectively ranking various types of fuzzy numbers. The contents herein present a comparative example demonstrating the usage and advantages of the proposed centroid index ranking method for fuzzy numbers.
{"title":"An improved centroid-index by Reviewing on centroid-index methods","authors":"T. Hajjari","doi":"10.1109/CINTI.2013.6705176","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705176","url":null,"abstract":"Ranking fuzzy numbers plays a very important role in linguistic decision making, data analysis and some other fuzzy application systems. The last decades have seen a large number of methods investigated for ranking fuzzy numbers. The most commonly used approached for ranking fuzzy numbers is ranking indices based on centroid of fuzzy numbers. However, there are some weakness associated with these indices. This paper, proposes a new centroid index ranking method that is capable of effectively ranking various types of fuzzy numbers. The contents herein present a comparative example demonstrating the usage and advantages of the proposed centroid index ranking method for fuzzy numbers.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705240
Sasa Arsovski, B. Markoski, P. Pecev, D. Lacmanovic, M. Ivkovic
Administrative tasks are a crucial part of the business process in Public Administration. Ontologies, generated from the workflow of administrative processes, can provide significant improvements and reduce the time of modelling, testing and integration in the process of building an information system of the Public Administration (PA). In this paper, the authors propose an approach for building an ontological model of the administrative task (OMAT) of the Public Administration. The annotation of the proposed ontology with elements of user interface components and presented algorithm for a direct transformation of the semantic description of the administrative task in the user interface components, contribute to the improvement of information systems modeling techniques. The proposed approach, with standardized formalism in the method of creating an ontology of the administrative process (task), can be applied to any administrative process.
{"title":"Modeling of an ontology of the administrative task","authors":"Sasa Arsovski, B. Markoski, P. Pecev, D. Lacmanovic, M. Ivkovic","doi":"10.1109/CINTI.2013.6705240","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705240","url":null,"abstract":"Administrative tasks are a crucial part of the business process in Public Administration. Ontologies, generated from the workflow of administrative processes, can provide significant improvements and reduce the time of modelling, testing and integration in the process of building an information system of the Public Administration (PA). In this paper, the authors propose an approach for building an ontological model of the administrative task (OMAT) of the Public Administration. The annotation of the proposed ontology with elements of user interface components and presented algorithm for a direct transformation of the semantic description of the administrative task in the user interface components, contribute to the improvement of information systems modeling techniques. The proposed approach, with standardized formalism in the method of creating an ontology of the administrative process (task), can be applied to any administrative process.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134191143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}