Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952449
Kyungjae Lee
In this paper, we propose the segment-based roadmap (SRM) method for extreme motion planning. Unlike existing roadmap-based approaches, each vertex in the SRM contains a sequence of configurations. This segment-based motion planning can effectively handle the narrow passage problem caused by stability constraints in a high dimensional space. The SRM is generated from trajectory examples and trajectory optimization. We extract motion segments from the trajectory examples. The extracted motion segments and its connection is stored in vertex set and edge set, respectively. Furthermore, a trajectory optimization method is used to increase the con-nectivity of the SRM. In particular, a Gaussian random path (GRP) is used to initialize the trajectory optimization problem and shown to be more effective in terms of final cost as well as the running time. In simulation study, the average final cost using the GRP initialization shows 96.7% improvements compared to the initialization with linear interpolation which is often used in practice. In experiment study, we conducted experiments on NAO in order to verify the proposed motion planner using the SRM.
{"title":"Efficient Extreme Motion Planning by Learning from Experience","authors":"Kyungjae Lee","doi":"10.1109/ICTC55196.2022.9952449","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952449","url":null,"abstract":"In this paper, we propose the segment-based roadmap (SRM) method for extreme motion planning. Unlike existing roadmap-based approaches, each vertex in the SRM contains a sequence of configurations. This segment-based motion planning can effectively handle the narrow passage problem caused by stability constraints in a high dimensional space. The SRM is generated from trajectory examples and trajectory optimization. We extract motion segments from the trajectory examples. The extracted motion segments and its connection is stored in vertex set and edge set, respectively. Furthermore, a trajectory optimization method is used to increase the con-nectivity of the SRM. In particular, a Gaussian random path (GRP) is used to initialize the trajectory optimization problem and shown to be more effective in terms of final cost as well as the running time. In simulation study, the average final cost using the GRP initialization shows 96.7% improvements compared to the initialization with linear interpolation which is often used in practice. In experiment study, we conducted experiments on NAO in order to verify the proposed motion planner using the SRM.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121452468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952554
J. Lee, Gyungmin Kim, Yonggang Kim
The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.
{"title":"Crisis analysis on blockchain-based decentralized learning in wireless networks","authors":"J. Lee, Gyungmin Kim, Yonggang Kim","doi":"10.1109/ICTC55196.2022.9952554","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952554","url":null,"abstract":"The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9953011
Gyusang Cho, Chan-Hyun Youn
Fully-supervised learning and self-supervised learning are two standard learning frameworks for training visual representations. While the superiority and inferiority of the two frameworks are not obscured when pre-training is performed, this paper aims to compare the transferability performance for the hand posture estimation task. We conduct the experiment on a supervised pre-trained model and 5 self-supervised pre-trained models. To this end, we conclude that self-supervised pre-trained models do not necessarily outperform their supervised pre-trained counterparts, while self-supervised pre-trained models lead to faster convergence of the neural network.
{"title":"Supervised vs. Self-supervised Pre-trained models for Hand Pose Estimation","authors":"Gyusang Cho, Chan-Hyun Youn","doi":"10.1109/ICTC55196.2022.9953011","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9953011","url":null,"abstract":"Fully-supervised learning and self-supervised learning are two standard learning frameworks for training visual representations. While the superiority and inferiority of the two frameworks are not obscured when pre-training is performed, this paper aims to compare the transferability performance for the hand posture estimation task. We conduct the experiment on a supervised pre-trained model and 5 self-supervised pre-trained models. To this end, we conclude that self-supervised pre-trained models do not necessarily outperform their supervised pre-trained counterparts, while self-supervised pre-trained models lead to faster convergence of the neural network.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952420
M. Park, Yoonwan Ma, T. Choi
In the 5G and Beyond Era there are interesting trends on requirements for Federated Distributed Open Platforms (DOPs) for Cross-Industry Sectors End-to-End (E2E) Services Innovation and Delivery Agility. The DOPs should be formed by way of Federations of ICT Network Facilities and other Types of Assets or Facilities that are owned by various sectors (including public sector ICT infrastructures, enterprise/private ICT infrastructures, government owned infrastructures, Research Institutes, and other Stakeholders). Such a Concept of Cross-Industry End-to- End Services Innovation and Delivery Agility in the 5G & Beyond Era and the associated Ecosystem that would emerge DO NOT EXIST yet. This paper proposes an architecture to enable cross-industry DOP network federation and our proof of concept implementation, OneVisionNFP•
{"title":"OneVisionNFP - Design and Implementation of Agile Private/Public 5G/B5G Network Federation Platform","authors":"M. Park, Yoonwan Ma, T. Choi","doi":"10.1109/ICTC55196.2022.9952420","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952420","url":null,"abstract":"In the 5G and Beyond Era there are interesting trends on requirements for Federated Distributed Open Platforms (DOPs) for Cross-Industry Sectors End-to-End (E2E) Services Innovation and Delivery Agility. The DOPs should be formed by way of Federations of ICT Network Facilities and other Types of Assets or Facilities that are owned by various sectors (including public sector ICT infrastructures, enterprise/private ICT infrastructures, government owned infrastructures, Research Institutes, and other Stakeholders). Such a Concept of Cross-Industry End-to- End Services Innovation and Delivery Agility in the 5G & Beyond Era and the associated Ecosystem that would emerge DO NOT EXIST yet. This paper proposes an architecture to enable cross-industry DOP network federation and our proof of concept implementation, OneVisionNFP•","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952819
Kyoungsu Oh, Min Kang, SeoHyun Oh, Do-hyoung Kim, Seokhwan Kang, Youngho Lee
We conducted a study to identify drug-related information on non-standardized on non-standardized discharge summaries using a pre-trained BERT-based model. After tokenizing the dataset, it was identified with the IOB tagging schema and trained on the training data with the Random Insert technique through the pre-trained BERT. As a result, the F1-score of AB-XLNet was improved by 3% compared to XLNet, and ADE and Form, which could not be extracted from XLNet, were extracted. Future research will focus on presenting a generalized model using large amounts of data from multiple institutions.
{"title":"AB-XLNet: Named Entity Recognition Tool for Health Information Technology Standardization","authors":"Kyoungsu Oh, Min Kang, SeoHyun Oh, Do-hyoung Kim, Seokhwan Kang, Youngho Lee","doi":"10.1109/ICTC55196.2022.9952819","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952819","url":null,"abstract":"We conducted a study to identify drug-related information on non-standardized on non-standardized discharge summaries using a pre-trained BERT-based model. After tokenizing the dataset, it was identified with the IOB tagging schema and trained on the training data with the Random Insert technique through the pre-trained BERT. As a result, the F1-score of AB-XLNet was improved by 3% compared to XLNet, and ADE and Form, which could not be extracted from XLNet, were extracted. Future research will focus on presenting a generalized model using large amounts of data from multiple institutions.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952927
Murad Khan, Teef S. Alenezi, Shouq S. Alenezi, Sara S. Alenezi, Albandari A Alenezi, Basil Alothman, C. Joumaa
This paper outlines a framework to prevent the COVID19 like pandemics for visitors to buildings or sites that receive many visitors. The proposed system is used to detect visitors who have not worn a facemask, or visitors with high body temperature, communicate daily visitor data to the security officer, sound an alarm to notify the officer, and screen the visitors with the results of the measurements. Also, the proposed solution uses deep learning and computer vision techniques to detect the facemask. Further, a testbed is designed based on an Arduino microcontroller connected to a PC for collecting, processing, and storing the data. Furthermore, the proposed system used a contactless infrared temperature sensor to avoid any chance to transfer the COVID-like disease to normal visitors. Finally, we tested the system by passing many subjects with and without face masks and high temperatures. The accuracy of the system shows that the system accurately detects each subject with and without a face mask and with high temperatures.
{"title":"A Framework to Combat COVID19 like Pandemic in Future","authors":"Murad Khan, Teef S. Alenezi, Shouq S. Alenezi, Sara S. Alenezi, Albandari A Alenezi, Basil Alothman, C. Joumaa","doi":"10.1109/ICTC55196.2022.9952927","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952927","url":null,"abstract":"This paper outlines a framework to prevent the COVID19 like pandemics for visitors to buildings or sites that receive many visitors. The proposed system is used to detect visitors who have not worn a facemask, or visitors with high body temperature, communicate daily visitor data to the security officer, sound an alarm to notify the officer, and screen the visitors with the results of the measurements. Also, the proposed solution uses deep learning and computer vision techniques to detect the facemask. Further, a testbed is designed based on an Arduino microcontroller connected to a PC for collecting, processing, and storing the data. Furthermore, the proposed system used a contactless infrared temperature sensor to avoid any chance to transfer the COVID-like disease to normal visitors. Finally, we tested the system by passing many subjects with and without face masks and high temperatures. The accuracy of the system shows that the system accurately detects each subject with and without a face mask and with high temperatures.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132300921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952812
Sangjin Lee, Seokjoo Cho, K. Pham, Sunggon Kim, Yongseok Son
Binary Search Tree is the data structure that has fast search speed and easy addition, removal of elements. Due to these advantages, binary search tree (BST) is one of the frequently used data structures of these days. However, most binary search tree schemes use locking technique to support multiple access of multiple threads for synchronization. Unfortunately, this locking techniques significantly reduce the performance of BST. Locking techniques block or spin the threads that has not obtained the lock until the thread that has obtained the lock completes its job. Thus, to improve the performance of BST, efficient concurrent programming technique should be applied, such as lock-free technique. In this paper, we conduct a comparison of existing lock-free/non-blocking BST methods. We analyze operations and evaluate the strengths and weaknesses of each schemes.
{"title":"A Survey on Lock-free Binary Search Tree","authors":"Sangjin Lee, Seokjoo Cho, K. Pham, Sunggon Kim, Yongseok Son","doi":"10.1109/ICTC55196.2022.9952812","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952812","url":null,"abstract":"Binary Search Tree is the data structure that has fast search speed and easy addition, removal of elements. Due to these advantages, binary search tree (BST) is one of the frequently used data structures of these days. However, most binary search tree schemes use locking technique to support multiple access of multiple threads for synchronization. Unfortunately, this locking techniques significantly reduce the performance of BST. Locking techniques block or spin the threads that has not obtained the lock until the thread that has obtained the lock completes its job. Thus, to improve the performance of BST, efficient concurrent programming technique should be applied, such as lock-free technique. In this paper, we conduct a comparison of existing lock-free/non-blocking BST methods. We analyze operations and evaluate the strengths and weaknesses of each schemes.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952866
Jaehwan Lee, Woongsoo Na
Recently, interest in vehicular applications has increased such as autonomous driving and vehicle platooning. The importance of supporting driving safety is becoming more prominent. In order to provide driving safety, the vehicle to vehicle (V2V) communication standard stipulates that a vehicle safety message is periodically broadcasted to nearby vehicles every 100 ms. However, as the number of vehicles on the road increases, communication channels become easily congested, making it difficult to transmit and receive safety messages thereby increase the risk of traffic accidents. In order to address the problem, various V2V communication methods that improve the existing channel contention method have been proposed. In this paper, we introduce and analyze the communication methods for vehicular communications.
{"title":"A Survey on Vehicular Communication Methods","authors":"Jaehwan Lee, Woongsoo Na","doi":"10.1109/ICTC55196.2022.9952866","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952866","url":null,"abstract":"Recently, interest in vehicular applications has increased such as autonomous driving and vehicle platooning. The importance of supporting driving safety is becoming more prominent. In order to provide driving safety, the vehicle to vehicle (V2V) communication standard stipulates that a vehicle safety message is periodically broadcasted to nearby vehicles every 100 ms. However, as the number of vehicles on the road increases, communication channels become easily congested, making it difficult to transmit and receive safety messages thereby increase the risk of traffic accidents. In order to address the problem, various V2V communication methods that improve the existing channel contention method have been proposed. In this paper, we introduce and analyze the communication methods for vehicular communications.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952708
Jong Won, Do-Yup Kim, Jang-Won Lee
In this paper, we consider an unmanned aerial vehicle (UAV)-enabled network in which a UAV equipped with a directional antenna relays data from a ground base station (GBS) to ground users (GUs). Under this system, we study a problem minimizing the weighted sum power consumption of the GBS and the UAV by jointly optimizing the location of the UAV, beamwidth of the directional antenna, and power allocation. To solve the problem, we develop a simple heuristic algorithm, and verify its effectiveness through simulation results.
{"title":"Joint Optimization of Placement, Beamwidth, and Power Allocation in the UAV-Enabled Network","authors":"Jong Won, Do-Yup Kim, Jang-Won Lee","doi":"10.1109/ICTC55196.2022.9952708","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952708","url":null,"abstract":"In this paper, we consider an unmanned aerial vehicle (UAV)-enabled network in which a UAV equipped with a directional antenna relays data from a ground base station (GBS) to ground users (GUs). Under this system, we study a problem minimizing the weighted sum power consumption of the GBS and the UAV by jointly optimizing the location of the UAV, beamwidth of the directional antenna, and power allocation. To solve the problem, we develop a simple heuristic algorithm, and verify its effectiveness through simulation results.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.1109/ICTC55196.2022.9952648
Chunglae Cho, Seungjae Shin, H. Jeon, Seunghyun Yoon
Thanks to the development of virtualization technology, content service providers can flexibly lease virtualized resources from infrastructure service providers when they deploy the cache nodes in edge networks. As a result, they have two orthogonal objectives: to maximize the caching utility on the one hand and minimize the cost of leasing the cache storage on the other hand. This paper presents a caching algorithm using deep reinforcement learning (DRL) that controls the caching policy with the content time-to-live (TTL) values and elastically adjusts the cache size according to a dynamically changing environment to maximize the utility-minus-cost objective. We show that, under non-stationary traffic scenarios, our DRL-based approach outperforms the conventional algorithms known to be optimal under stationary traffic scenarios.
{"title":"Elastic Network Cache Control Using Deep Reinforcement Learning","authors":"Chunglae Cho, Seungjae Shin, H. Jeon, Seunghyun Yoon","doi":"10.1109/ICTC55196.2022.9952648","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952648","url":null,"abstract":"Thanks to the development of virtualization technology, content service providers can flexibly lease virtualized resources from infrastructure service providers when they deploy the cache nodes in edge networks. As a result, they have two orthogonal objectives: to maximize the caching utility on the one hand and minimize the cost of leasing the cache storage on the other hand. This paper presents a caching algorithm using deep reinforcement learning (DRL) that controls the caching policy with the content time-to-live (TTL) values and elastically adjusts the cache size according to a dynamically changing environment to maximize the utility-minus-cost objective. We show that, under non-stationary traffic scenarios, our DRL-based approach outperforms the conventional algorithms known to be optimal under stationary traffic scenarios.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}