Pub Date : 2024-03-07DOI: 10.3103/S0146411624010115
Shuangshuang Yu
Accurate identification and analysis of semantics is beneficial for processing English texts effectively. This article briefly introduced Word2vec, which was used to extract semantic feature vectors from English texts, and the long short-term memory (LSTM) algorithm, which was used for semantic recognition of English texts. The relevant English comment texts were crawled from the Amazon movie database and used in a simulation experiment. The simulation experiment compared three algorithms: back propagation, recurrent neural network (RNN), and LSTM. The results showed that the LSTM algorithm’s recognition results for the part-of-speech and sentiment inclination of English texts were consistent with the label results. As the length of the English text increased, the recognition accuracy of all three algorithms decreased, and the LSTM algorithm had the smallest decrease. For the same length of English text, the LSTM algorithm had the highest accuracy in identifying part-of-speech and sentiment inclination, followed by the RNN algorithm, and the BP algorithm had the lowest. In terms of recognition time, the LSTM algorithm was the least.
{"title":"Extraction and Analysis of Semantic Features of English Texts under Intelligent Algorithms","authors":"Shuangshuang Yu","doi":"10.3103/S0146411624010115","DOIUrl":"10.3103/S0146411624010115","url":null,"abstract":"<p>Accurate identification and analysis of semantics is beneficial for processing English texts effectively. This article briefly introduced Word2vec, which was used to extract semantic feature vectors from English texts, and the long short-term memory (LSTM) algorithm, which was used for semantic recognition of English texts. The relevant English comment texts were crawled from the Amazon movie database and used in a simulation experiment. The simulation experiment compared three algorithms: back propagation, recurrent neural network (RNN), and LSTM. The results showed that the LSTM algorithm’s recognition results for the part-of-speech and sentiment inclination of English texts were consistent with the label results. As the length of the English text increased, the recognition accuracy of all three algorithms decreased, and the LSTM algorithm had the smallest decrease. For the same length of English text, the LSTM algorithm had the highest accuracy in identifying part-of-speech and sentiment inclination, followed by the RNN algorithm, and the BP algorithm had the lowest. In terms of recognition time, the LSTM algorithm was the least.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 1","pages":"109 - 115"},"PeriodicalIF":0.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140071032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.3103/S0146411624010048
Zhoe Comas-González, Johan Mardini, Shariq Aziz Butt, Andres Sanchez-Comas, Kåre Synnes, Aurelian Joliet, Emiro Delahoz-Franco, Diego Molina-Estren, Gabriel Piñeres-Espitia, Sumera Naz, Daniela Ospino-Balcázar
Human activity recognition (HAR) has become a focus of study over the past few years. It is widely used in many fields like health, home safety, security, and energy saving, among others. Research around the health area has evidenced an important increase and a promissory impact on the life quality of a population like the elderly. If we combine sensors and a health condition then we may have a technological solution with methods and techniques that will help us to improve life quality. Smart sensors have become popular. They allow us to monitor data and acquire data in real-time. In HAR, they are used to detect actions and activities like breathing, falling, standing up, or walking. Many commercial solutions use this technology in real-life applications. However, we focused this paper on the Vayaar sensor and the WideFind sensor, two commercial sensors based on ultra-wideband technology, with promising performance, as part of a study developed at the Human Health and Activity Laboratory (H2AL) in the Luleå Tekniska Universitet in Sweden. The study performed a technological and commercial comparison applying machine learning techniques in WEKA for two datasets created with the data gathered from each sensor during an experiment, in which precision and accuracy were analyzed as evaluation parameters of the applied methods. It was identified that random forest (RF) and LogitBoost were the most suitable classifiers to process both WideFind and Vayyar datasets. Random forest had a performance of 85.99% of precision, 85.48% of recall, and 96% of ROC area for the WideFind sensor while LogitBoost had a 69.39% of the performance for precision, 68.89% for recall, and 88.35% of ROC area for the Vayaar sensor.
{"title":"Sensors and Machine Learning Algorithms for Location and POSTURE Activity Recognition in Smart Environments","authors":"Zhoe Comas-González, Johan Mardini, Shariq Aziz Butt, Andres Sanchez-Comas, Kåre Synnes, Aurelian Joliet, Emiro Delahoz-Franco, Diego Molina-Estren, Gabriel Piñeres-Espitia, Sumera Naz, Daniela Ospino-Balcázar","doi":"10.3103/S0146411624010048","DOIUrl":"10.3103/S0146411624010048","url":null,"abstract":"<p>Human activity recognition (HAR) has become a focus of study over the past few years. It is widely used in many fields like health, home safety, security, and energy saving, among others. Research around the health area has evidenced an important increase and a promissory impact on the life quality of a population like the elderly. If we combine sensors and a health condition then we may have a technological solution with methods and techniques that will help us to improve life quality. Smart sensors have become popular. They allow us to monitor data and acquire data in real-time. In HAR, they are used to detect actions and activities like breathing, falling, standing up, or walking. Many commercial solutions use this technology in real-life applications. However, we focused this paper on the Vayaar sensor and the WideFind sensor, two commercial sensors based on ultra-wideband technology, with promising performance, as part of a study developed at the Human Health and Activity Laboratory (H2AL) in the Luleå Tekniska Universitet in Sweden. The study performed a technological and commercial comparison applying machine learning techniques in WEKA for two datasets created with the data gathered from each sensor during an experiment, in which precision and accuracy were analyzed as evaluation parameters of the applied methods. It was identified that random forest (RF) and LogitBoost were the most suitable classifiers to process both WideFind and Vayyar datasets. Random forest had a performance of 85.99% of precision, 85.48% of recall, and 96% of ROC area for the WideFind sensor while LogitBoost had a 69.39% of the performance for precision, 68.89% for recall, and 88.35% of ROC area for the Vayaar sensor.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 1","pages":"33 - 42"},"PeriodicalIF":0.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.3103/S0146411624010024
Alexander M. Andronov, Kristina Mahareva
The present paper considers a service system without the input flow of claims, that is, all claims are present in the queue initially from the beginning. The number of such claims equals Θmax, whereas the number of servers equals k. The time of one service has the Erlang distribution. The paper aims to calculate the time distribution until the completion of all services, as well as the average waiting time of one claim.
{"title":"Elaborated Analysis of a Nonreplenishable Queue with Erlang Distribution of the Service Time","authors":"Alexander M. Andronov, Kristina Mahareva","doi":"10.3103/S0146411624010024","DOIUrl":"10.3103/S0146411624010024","url":null,"abstract":"<p>The present paper considers a service system without the input flow of claims, that is, all claims are present in the queue initially from the beginning. The number of such claims equals Θmax, whereas the number of servers equals <i>k</i>. The time of one service has the Erlang distribution. The paper aims to calculate the time distribution until the completion of all services, as well as the average waiting time of one claim.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 1","pages":"1 - 10"},"PeriodicalIF":0.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.3103/S014641162401005X
Kexin Ding, Xueliang Zhang, Yurong Nan, Min Zhuang
In this paper, a fixed-time adaptive fuzzy control scheme is investigated to stabilize a class of uncertain nonlinear systems with full-state constraints. A novel secant barrier Lyapunov function (SBLF) is first constructed to design the controller and obtain the fixed-time stability properties by using the (SBLF) in the design process of back-stepping. The adaptive controller is presented to guarantee that the tracking errors of the system can converge into the neighborhood around the equilibrium point in a fixed time and all the system states can be restricted within the predefined time-varying boundaries. By making use of Lyapunov analysis, we can prove that all the signals in the closed loop system are uniformly ultimately bounded and the output is well driven to follow the desired trajectory. Finally, simulations are given to verify the effectiveness of the method.
{"title":"Fixed Time Adaptive Fuzzy Control of Nonlinear Systems with Time-Varying State Constraints","authors":"Kexin Ding, Xueliang Zhang, Yurong Nan, Min Zhuang","doi":"10.3103/S014641162401005X","DOIUrl":"10.3103/S014641162401005X","url":null,"abstract":"<p>In this paper, a fixed-time adaptive fuzzy control scheme is investigated to stabilize a class of uncertain nonlinear systems with full-state constraints. A novel secant barrier Lyapunov function (SBLF) is first constructed to design the controller and obtain the fixed-time stability properties by using the (SBLF) in the design process of back-stepping. The adaptive controller is presented to guarantee that the tracking errors of the system can converge into the neighborhood around the equilibrium point in a fixed time and all the system states can be restricted within the predefined time-varying boundaries. By making use of Lyapunov analysis, we can prove that all the signals in the closed loop system are uniformly ultimately bounded and the output is well driven to follow the desired trajectory. Finally, simulations are given to verify the effectiveness of the method.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 1","pages":"43 - 57"},"PeriodicalIF":0.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.3103/S0146411624010036
V. Aristov
This paper presents a study of the prerequisites and the original way of transition from a quasi-monostatic antenna system to a monostatic one as applied to ultrawideband pulsed contact radar subsurface sounding at shallow depths. For this purpose, the joint application of ultrawideband electric “Bow-Tie” and magnetic “Bi-Quad” antennas is investigated. The mutual arrangement proposed in this work allows reducing to zero the distance between the centers of the antennas in the plane orthogonal to the direction of signal emission-reception. The results of full-scale tests with the corresponding processing of the obtained ensembles by the example of probing the human body for the detection and determination of the parameters of biological rhythms and a tree trunk 58 cm in diameter showed satisfactory results for the radar with a central frequency of 1.5 GHz. At the same time, the suppression of the useful signal received due to the application of the described design was only 2.3 dB at an acceptable level of the direct signal, which does not lead to overloading of the radar stroboscopic receiver input.
{"title":"Monostatic Pulsed Ultrawideband Radar Antenna for Studying Biological Rhythms of the Human Body and Internal Inhomogeneities of Dielectric Objects","authors":"V. Aristov","doi":"10.3103/S0146411624010036","DOIUrl":"10.3103/S0146411624010036","url":null,"abstract":"<p>This paper presents a study of the prerequisites and the original way of transition from a quasi-monostatic antenna system to a monostatic one as applied to ultrawideband pulsed contact radar subsurface sounding at shallow depths. For this purpose, the joint application of ultrawideband electric “Bow-Tie” and magnetic “Bi-Quad” antennas is investigated. The mutual arrangement proposed in this work allows reducing to zero the distance between the centers of the antennas in the plane orthogonal to the direction of signal emission-reception. The results of full-scale tests with the corresponding processing of the obtained ensembles by the example of probing the human body for the detection and determination of the parameters of biological rhythms and a tree trunk 58 cm in diameter showed satisfactory results for the radar with a central frequency of 1.5 GHz. At the same time, the suppression of the useful signal received due to the application of the described design was only 2.3 dB at an acceptable level of the direct signal, which does not lead to overloading of the radar stroboscopic receiver input.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 1","pages":"101 - 108"},"PeriodicalIF":0.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-07DOI: 10.3103/S0146411624010103
Hanhua Yang
A two-level multisensor data fusion model is proposed to monitor animal breeding environment. The effectiveness of various sensors is judged by the first level of analysis, and the data are screened by calculating the optimal fusion set. The probability distribution function is calculated using fuzzy membership degree and the final decision is obtained using an improved information fusion approach based on D-S evidence theory by the second level of analysis. Conflict allocation is more reasonable when using the improved D-S and the fusion effect is better. Therefore, the real state of the piggery environment can be obtained based on the fusion result, so as to perform corresponding operations on the field equipment.
{"title":"Research on Multisensor Data Fusion Model for Monitoring Animal Breeding Environment","authors":"Hanhua Yang","doi":"10.3103/S0146411624010103","DOIUrl":"10.3103/S0146411624010103","url":null,"abstract":"<p>A two-level multisensor data fusion model is proposed to monitor animal breeding environment. The effectiveness of various sensors is judged by the first level of analysis, and the data are screened by calculating the optimal fusion set. The probability distribution function is calculated using fuzzy membership degree and the final decision is obtained using an improved information fusion approach based on D-S evidence theory by the second level of analysis. Conflict allocation is more reasonable when using the improved D-S and the fusion effect is better. Therefore, the real state of the piggery environment can be obtained based on the fusion result, so as to perform corresponding operations on the field equipment.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 1","pages":"23 - 32"},"PeriodicalIF":0.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140070659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.3103/S0146411623080345
D. P. Zegzhda, T. N. Saurenko, V. G. Anisimov, E. G. Anisimov
This article discusses a methodological approach to building models for assessing the effectiveness of a program (project) for creating or modernizing an information security system in the interests of ensuring the sustainability and competitiveness of a company in the face of increasing threats to the integrity, confidentiality, availability, and reliability of information that is important for its activities. At the same time, the effectiveness of a program (project) is understood as the degree of use of the opportunities allocated for their implementation of material, intangible, and temporary resources to achieve the set goals. When mathematically formalizing a generalized efficiency indicator, it is taken into account that the implementation of technical, technological, organizational, and other elements (events) included in this program (project) is accompanied by the influence of many random factors influencing the achievement of their particular goals. The proposed generalized indicator provides a dominant assessment of the effectiveness of programs (projects) taking into account the risks during their implementation.
{"title":"Assessment of the Effectiveness of an Information Security System","authors":"D. P. Zegzhda, T. N. Saurenko, V. G. Anisimov, E. G. Anisimov","doi":"10.3103/S0146411623080345","DOIUrl":"10.3103/S0146411623080345","url":null,"abstract":"<p>This article discusses a methodological approach to building models for assessing the effectiveness of a program (project) for creating or modernizing an information security system in the interests of ensuring the sustainability and competitiveness of a company in the face of increasing threats to the integrity, confidentiality, availability, and reliability of information that is important for its activities. At the same time, the effectiveness of a program (project) is understood as the degree of use of the opportunities allocated for their implementation of material, intangible, and temporary resources to achieve the set goals. When mathematically formalizing a generalized efficiency indicator, it is taken into account that the implementation of technical, technological, organizational, and other elements (events) included in this program (project) is accompanied by the influence of many random factors influencing the achievement of their particular goals. The proposed generalized indicator provides a dominant assessment of the effectiveness of programs (projects) taking into account the risks during their implementation.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"855 - 861"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142414749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.3103/S014641162308031X
I. A. Sikarev, T. V. Vekshina, V. A. Bol’shakov, E. M. Korinets
This article considers the problem of automating the determination of daily water discharge rates based on continuously measured levels and individual water discharge measurements using discharge curves (DCs), which are the most basic characteristic of river (and floodplain) channel capacity and are widely used in river flow analysis and hydraulic calculations. Conclusions on the optimal analytical representation of the DC and the possibilities of constructing a universal model of hydrometric flow analysis are presented.
{"title":"Current Trends in Methods of the Efficient Automation of Data Processing","authors":"I. A. Sikarev, T. V. Vekshina, V. A. Bol’shakov, E. M. Korinets","doi":"10.3103/S014641162308031X","DOIUrl":"10.3103/S014641162308031X","url":null,"abstract":"<p>This article considers the problem of automating the determination of daily water discharge rates based on continuously measured levels and individual water discharge measurements using discharge curves (DCs), which are the most basic characteristic of river (and floodplain) channel capacity and are widely used in river flow analysis and hydraulic calculations. Conclusions on the optimal analytical representation of the DC and the possibilities of constructing a universal model of hydrometric flow analysis are presented.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"875 - 880"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142414942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.3103/S0146411623080291
N. N. Shenets
An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor authentication, secret sharing, visual cryptography, and steganography; and it also uses the built-in security features of the operating system. It ensures the confidentiality of personal data even if both the mobile device and the related remote storage (server) are compromised.
{"title":"Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography","authors":"N. N. Shenets","doi":"10.3103/S0146411623080291","DOIUrl":"10.3103/S0146411623080291","url":null,"abstract":"<p>An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor authentication, secret sharing, visual cryptography, and steganography; and it also uses the built-in security features of the operating system. It ensures the confidentiality of personal data even if both the mobile device and the related remote storage (server) are compromised.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"886 - 893"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142414943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.3103/S0146411623080229
E. Yu. Pavlenko
This article proposes an approach to study states of complex industrial networks with adaptive topology based on network motifs: statistically significant subgraphs of a larger graph. The presented analysis concerns the applicability of network motifs to characterizing the system’s performance and for short-, medium-, and long-term forecasting of system states. A smart grid network structure is used as an example: it is represented as a directed graph, in which the most frequent motifs are identified; several scenarios of attacks on network nodes are modeled, and a forecast of the network state is compiled. The results of experimental studies demonstrate the accuracy and consistency of the application of this mathematical tool to the considered problems.
{"title":"Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs","authors":"E. Yu. Pavlenko","doi":"10.3103/S0146411623080229","DOIUrl":"10.3103/S0146411623080229","url":null,"abstract":"<p>This article proposes an approach to study states of complex industrial networks with adaptive topology based on network motifs: statistically significant subgraphs of a larger graph. The presented analysis concerns the applicability of network motifs to characterizing the system’s performance and for short-, medium-, and long-term forecasting of system states. A smart grid network structure is used as an example: it is represented as a directed graph, in which the most frequent motifs are identified; several scenarios of attacks on network nodes are modeled, and a forecast of the network state is compiled. The results of experimental studies demonstrate the accuracy and consistency of the application of this mathematical tool to the considered problems.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1084 - 1095"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}