Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5442981
Nuraishah binti Zakaria, I. Elamvazuthi, Noor Hazrin Hany binti Mohd Hanif
The high temperature inside a grain storage will cause grain damage and thus lower the quality of the grain. Currently, aeration system is installed in grain storage to overcome this problem. This system has been proven practical, suitable and economical in the humid topics like Malaysia [1]. However, the automatic aeration system is not yet available in our country. So, the objective of this project is to develop a monitoring and control system for the grain storage. The monitoring system which is also known as SCADA system will monitor and control the aeration process in the grain storage. This paper will also discuss the aeration system design that consists of 4 important elements which is airflow rate, fan selection, air distribution and ventilation system. The system configuration that comprises hardware and software is designed to demonstrate the automatic aeration system.
{"title":"Silo management system","authors":"Nuraishah binti Zakaria, I. Elamvazuthi, Noor Hazrin Hany binti Mohd Hanif","doi":"10.1109/SCORED.2009.5442981","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5442981","url":null,"abstract":"The high temperature inside a grain storage will cause grain damage and thus lower the quality of the grain. Currently, aeration system is installed in grain storage to overcome this problem. This system has been proven practical, suitable and economical in the humid topics like Malaysia [1]. However, the automatic aeration system is not yet available in our country. So, the objective of this project is to develop a monitoring and control system for the grain storage. The monitoring system which is also known as SCADA system will monitor and control the aeration process in the grain storage. This paper will also discuss the aeration system design that consists of 4 important elements which is airflow rate, fan selection, air distribution and ventilation system. The system configuration that comprises hardware and software is designed to demonstrate the automatic aeration system.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122799949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443000
Shahid Nasim, T. Ali, Junaid Ali, Naveed Ahmed
The electronics fitted in an automobile need to be protected from voltage surges and overvoltages exhibited by car battery systems. These may have dangerous consequences to expensive electronic control units (ECU's) that require stable voltage supplies. The power regulating system outlined in this paper offers an inexpensive method for providing the necessary protection by utilizing a conventional transient voltage suppression (TVS) avalanche diode as well as employing a novel shutdown mechanism using a relay to allow disconnection of the ECU'S from the car battery, if required. This unit has given appropriate results when used to protect tracking units installed in the automobile.
{"title":"Cost-effective means of protecting electronics from voltage transients and overvoltages in an automotive network","authors":"Shahid Nasim, T. Ali, Junaid Ali, Naveed Ahmed","doi":"10.1109/SCORED.2009.5443000","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443000","url":null,"abstract":"The electronics fitted in an automobile need to be protected from voltage surges and overvoltages exhibited by car battery systems. These may have dangerous consequences to expensive electronic control units (ECU's) that require stable voltage supplies. The power regulating system outlined in this paper offers an inexpensive method for providing the necessary protection by utilizing a conventional transient voltage suppression (TVS) avalanche diode as well as employing a novel shutdown mechanism using a relay to allow disconnection of the ECU'S from the car battery, if required. This unit has given appropriate results when used to protect tracking units installed in the automobile.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125552659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443177
M. Alomari, K. Samsudin, A. Ramli
Securing data stored inside the storage devices is becoming an important concern in computer security now. It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. In this paper, the newly standardized IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. A performance comparison between the sequential and parallel algorithms of XTS mode has been presented. The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. In these simulations, AES is used as encryption algorithm with 256-bit encryption key.
{"title":"A parallel XTS encryption mode of operation","authors":"M. Alomari, K. Samsudin, A. Ramli","doi":"10.1109/SCORED.2009.5443177","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443177","url":null,"abstract":"Securing data stored inside the storage devices is becoming an important concern in computer security now. It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. In this paper, the newly standardized IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. A performance comparison between the sequential and parallel algorithms of XTS mode has been presented. The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. In these simulations, AES is used as encryption algorithm with 256-bit encryption key.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124636897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443289
Yusuf Sani, Ahmed Mohamedou, Khalid Ali, Anahita Farjamfar, Mohamed Azman, S. Shamsuddin
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
{"title":"An overview of neural networks use in anomaly Intrusion Detection Systems","authors":"Yusuf Sani, Ahmed Mohamedou, Khalid Ali, Anahita Farjamfar, Mohamed Azman, S. Shamsuddin","doi":"10.1109/SCORED.2009.5443289","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443289","url":null,"abstract":"With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443146
Yong Kok Ching, A. S. Prabuwono, R. Sulaiman
This paper presents the development of visitor face tracking system using OpenCV library. This system can be used for security purpose to record the visitor face. The user can identify who had been visiting him/her when away from the place. Visitors just need to appear in front of the web camera for at least 10 second, their image will be recorded. The system provides several functions such as activation of objects detection by user and retrieves the visitor's data. User can print out, delete or save the visitor image. The system had been tested in the real application environment.
{"title":"Visitor face tracking system using OpenCV library","authors":"Yong Kok Ching, A. S. Prabuwono, R. Sulaiman","doi":"10.1109/SCORED.2009.5443146","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443146","url":null,"abstract":"This paper presents the development of visitor face tracking system using OpenCV library. This system can be used for security purpose to record the visitor face. The user can identify who had been visiting him/her when away from the place. Visitors just need to appear in front of the web camera for at least 10 second, their image will be recorded. The system provides several functions such as activation of objects detection by user and retrieves the visitor's data. User can print out, delete or save the visitor image. The system had been tested in the real application environment.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443269
Syed Adeel Ali Shah, W. Shah, U. A. Rind, G. Das Menghwar
The operation of digital systems are based on time slotting and it finds many applications particularly in communication networks. It is important to analyze a digital network on some digital concepts. In this paper we analyze the network buffer through discrete time queueing system in which queue is discrete in nature and it is used to analyze the performance of the communication networks buffer. Discrete time models can be used to represents such type of systems in terms of slotted time units to models any physical system. More than one state changes in discrete time models from one time unit to another. Discrete time markov chains are used to describes the behavior of the network under the specific conditions and various performance measures are evaluated such as queue length, mean waiting time and mean number in the system.
{"title":"Analysis of networks buffer using discrete-time queueing models","authors":"Syed Adeel Ali Shah, W. Shah, U. A. Rind, G. Das Menghwar","doi":"10.1109/SCORED.2009.5443269","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443269","url":null,"abstract":"The operation of digital systems are based on time slotting and it finds many applications particularly in communication networks. It is important to analyze a digital network on some digital concepts. In this paper we analyze the network buffer through discrete time queueing system in which queue is discrete in nature and it is used to analyze the performance of the communication networks buffer. Discrete time models can be used to represents such type of systems in terms of slotted time units to models any physical system. More than one state changes in discrete time models from one time unit to another. Discrete time markov chains are used to describes the behavior of the network under the specific conditions and various performance measures are evaluated such as queue length, mean waiting time and mean number in the system.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5442945
M. Isa, N. Ibrahim, R. Shamsudin, Mohammd Hamiruce Marhaban
Determination of sugar content in 10 matured red seedless watermelons by measuring the dielectric properties is described in this paper. The determination is made based on the comparison of watermelon juice and water with sugar mixture. The dielectric properties of both the extracted watermelon juice and water with sugar mixture are measured over the frequency range from 200 MHz to 20 GHz and permittivity data at frequency 10.45 GHz is highlighted using an open-ended coaxial-line probe and network analyzer. Measurements are made at room temperature ± 27 °C; 70–80% RH. The sugar content was the most significant factor affecting the maturity of watermelon. Dielectric properties of watermelon juice and water with sugar mixture were measured and the dielectric properties of both liquids were compared. In this study, data obtained suggests that dielectric properties shows strong relation with sugar content. The dielectric constant is inversely proportional with increment of sugar content. From the dielectric properties measured, the sugar content in the watermelon is predicted. In additional, the standard sugar content measurement, HPLC method is also measured and result of the study is reported in this paper. Dielectric measurement of watermelon juice and water with sugar mixture are presented graphically to show their relationships.
{"title":"Sugar content in watermelon juice based on dielectric properties at 10.45GHz","authors":"M. Isa, N. Ibrahim, R. Shamsudin, Mohammd Hamiruce Marhaban","doi":"10.1109/SCORED.2009.5442945","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5442945","url":null,"abstract":"Determination of sugar content in 10 matured red seedless watermelons by measuring the dielectric properties is described in this paper. The determination is made based on the comparison of watermelon juice and water with sugar mixture. The dielectric properties of both the extracted watermelon juice and water with sugar mixture are measured over the frequency range from 200 MHz to 20 GHz and permittivity data at frequency 10.45 GHz is highlighted using an open-ended coaxial-line probe and network analyzer. Measurements are made at room temperature ± 27 °C; 70–80% RH. The sugar content was the most significant factor affecting the maturity of watermelon. Dielectric properties of watermelon juice and water with sugar mixture were measured and the dielectric properties of both liquids were compared. In this study, data obtained suggests that dielectric properties shows strong relation with sugar content. The dielectric constant is inversely proportional with increment of sugar content. From the dielectric properties measured, the sugar content in the watermelon is predicted. In additional, the standard sugar content measurement, HPLC method is also measured and result of the study is reported in this paper. Dielectric measurement of watermelon juice and water with sugar mixture are presented graphically to show their relationships.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443319
F. I. Margono, M. A. M. Zolkefpeli, S. A. Shaaya
IEEE 802.15.4 is a relatively new standard uniquely designed for low rate wireless personal area networks (LR-WPANs), which focus on low cost, efficient energy consumption and complexity. These characteristics are very appealing for wireless sensor network which mainly use IEEE 802.11 for its operation. The work would examine the performance of IEEE 802.15.4 compared to IEEE 802.11 in term of energy consumption and Quality of Services (QoS). The outcome of this work is to appraise these two MAC protocol using NS-2 simulation tool.
{"title":"Performance study on energy consumption and QoS of wireless sensor network under different MAC layer protocols: IEEE802.15.4 and IEEE802.11","authors":"F. I. Margono, M. A. M. Zolkefpeli, S. A. Shaaya","doi":"10.1109/SCORED.2009.5443319","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443319","url":null,"abstract":"IEEE 802.15.4 is a relatively new standard uniquely designed for low rate wireless personal area networks (LR-WPANs), which focus on low cost, efficient energy consumption and complexity. These characteristics are very appealing for wireless sensor network which mainly use IEEE 802.11 for its operation. The work would examine the performance of IEEE 802.15.4 compared to IEEE 802.11 in term of energy consumption and Quality of Services (QoS). The outcome of this work is to appraise these two MAC protocol using NS-2 simulation tool.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443019
Md. Zunaid Baten, Raisul Islam, E. Amin, Q. Khosru
Capacitance-Voltage (C-V) characteristics of Tri-Gate (TG) and Double Gate (DG) Silicon-on-Insulator (SOI) FinFETs having sub 10nm dimensions are obtained by self consistent method using coupled Schrodinger-Poisson solver taking into account quantum mechanical effects. Though self-consistent simulation to determine current and other short channel effects in these devices have been demonstrated in recent literature, C-V characterization is yet to be done using self-consistent method. We investigate here the C-V characteristics of the devices with the variation of an important process parameter, the silicon film thickness. The gate inversion capacitance should be higher in TG FinFET than that of DG FinFET because of the presence of thick oxide layer under the top gate of DG FinFET. Simulation results validate this phenomenon with an indication that drive current tends to increase with an increase in the number of gates.
{"title":"Self consistent simulation for C-V characterization of sub 10nm Tri-Gate and Double Gate SOI FinFETs incorporating quantum mechanical effects","authors":"Md. Zunaid Baten, Raisul Islam, E. Amin, Q. Khosru","doi":"10.1109/SCORED.2009.5443019","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443019","url":null,"abstract":"Capacitance-Voltage (C-V) characteristics of Tri-Gate (TG) and Double Gate (DG) Silicon-on-Insulator (SOI) FinFETs having sub 10nm dimensions are obtained by self consistent method using coupled Schrodinger-Poisson solver taking into account quantum mechanical effects. Though self-consistent simulation to determine current and other short channel effects in these devices have been demonstrated in recent literature, C-V characterization is yet to be done using self-consistent method. We investigate here the C-V characteristics of the devices with the variation of an important process parameter, the silicon film thickness. The gate inversion capacitance should be higher in TG FinFET than that of DG FinFET because of the presence of thick oxide layer under the top gate of DG FinFET. Simulation results validate this phenomenon with an indication that drive current tends to increase with an increase in the number of gates.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130474067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5442955
Lai Guan Rhung, A. C. Soh, R. A. Rahman, M. Hassan
This paper presents a Sugeno-type fuzzy traffic controller for controlling isolated traffic intersection. The model framework used in this study developed using M/M/l queuing theory. The principles and rules for the fuzzy control system are modeled based on the arrivals of vehicles, vehicles queue length at current green phase, and vehicles queue lengths at the other phases. The phase sequence and phase length extension are used in the decision making to switch the current phase to the appropriate next phase. Using the information from its traffic detectors at each of the four lanes of isolated intersection, the fuzzy rule-based system gives optimal signals to adapt the phase lengths to the traffic conditions. The phase sequence is managed by a simple program using if-else statement. In this paper, an isolated traffic intersection is simulated for both fixed-cycle traffic control system and fuzzy logic based traffic control system. The comparison of performance between the two models of traffic light system clearly indicates that the fuzzy logic based traffic lights control system is more efficient, flexible and adaptable in controlling the traffic flow.
{"title":"Fuzzy traffic light controller using Sugeno method for isolated intersection","authors":"Lai Guan Rhung, A. C. Soh, R. A. Rahman, M. Hassan","doi":"10.1109/SCORED.2009.5442955","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5442955","url":null,"abstract":"This paper presents a Sugeno-type fuzzy traffic controller for controlling isolated traffic intersection. The model framework used in this study developed using M/M/l queuing theory. The principles and rules for the fuzzy control system are modeled based on the arrivals of vehicles, vehicles queue length at current green phase, and vehicles queue lengths at the other phases. The phase sequence and phase length extension are used in the decision making to switch the current phase to the appropriate next phase. Using the information from its traffic detectors at each of the four lanes of isolated intersection, the fuzzy rule-based system gives optimal signals to adapt the phase lengths to the traffic conditions. The phase sequence is managed by a simple program using if-else statement. In this paper, an isolated traffic intersection is simulated for both fixed-cycle traffic control system and fuzzy logic based traffic control system. The comparison of performance between the two models of traffic light system clearly indicates that the fuzzy logic based traffic lights control system is more efficient, flexible and adaptable in controlling the traffic flow.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}