Pub Date : 2024-05-13DOI: 10.18469/ikt.2023.21.3.12
The paper presents the first results obtained by modeling a routed inter-satellite network based on the parameters of the ReshUCube-3 space mission. ReshUCube-3 is a mission in which it is planned to launch a satellite constellation of four CubeSats. A network stack was proposed to provide the concept of a space integrated network. It is planned to use LoRa technology on the physical layer, and RPL as a routing protocol on the network layer. The model takes into account the orbital parameters of the satellite constellation, the antenna systems of spacecraft and ground station, and the parameters of radio modules. Based on this information, the analysis of inter-satellite communication channels was carried out. The maximum distance between the satellites, the energy properties of the channels, the average daily coverage time, etc. are determined. An important feature is the consideration of existing routes between satellites. It is planned that the proposed model will serve as a basis in the process of designing and operating an inter-satellite network.
{"title":"SPACE INTEGRATED NETWORK: ROUTED INTER-SATELLITE NETWORK PRIMARY MODELING RESULTS","authors":"","doi":"10.18469/ikt.2023.21.3.12","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.12","url":null,"abstract":"The paper presents the first results obtained by modeling a routed inter-satellite network based on the parameters of the ReshUCube-3 space mission. ReshUCube-3 is a mission in which it is planned to launch a satellite constellation of four CubeSats. A network stack was proposed to provide the concept of a space integrated network. It is planned to use LoRa technology on the physical layer, and RPL as a routing protocol on the network layer. The model takes into account the orbital parameters of the satellite constellation, the antenna systems of spacecraft and ground station, and the parameters of radio modules. Based on this information, the analysis of inter-satellite communication channels was carried out. The maximum distance between the satellites, the energy properties of the channels, the average daily coverage time, etc. are determined. An important feature is the consideration of existing routes between satellites. It is planned that the proposed model will serve as a basis in the process of designing and operating an inter-satellite network.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"17 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.18469/ikt.2023.21.3.06
In this article we analyze the Russian developments in the field of software-defined networks and software-defined wide area networks, professional standards and job vacancies in order to determine knowledge and skills required of specialists. We conclude that there is a lack of practical manuals for training network engineers, and suggest possible topics for laboratory exercises for educational textbooks. This article can be useful for teachers of educational institutions of vocational secondary education, higher education, supplementary education in the development of work programs of disciplines, lecture material and laboratory workshops in the field of software-defined networks, as well as for students of the educational institutions and for junior network engineers.
{"title":"KNOWLEDGE AND SKILLS FOR SOFTWARE-DEFINED NETWORKS MAINTENANCE ENGINEER","authors":"","doi":"10.18469/ikt.2023.21.3.06","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.06","url":null,"abstract":"In this article we analyze the Russian developments in the field of software-defined networks and software-defined wide area networks, professional standards and job vacancies in order to determine knowledge and skills required of specialists. We conclude that there is a lack of practical manuals for training network engineers, and suggest possible topics for laboratory exercises for educational textbooks. This article can be useful for teachers of educational institutions of vocational secondary education, higher education, supplementary education in the development of work programs of disciplines, lecture material and laboratory workshops in the field of software-defined networks, as well as for students of the educational institutions and for junior network engineers.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"32 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.18469/ikt.2023.21.3.04
The article describes a method of using machine learning for detecting anomalous traffic behavior. For this purpose, a data set containing a significant amount of traffic collected at the time of the attack on the Web application is used. The set contains three attack options: Brute Force, XSS, SQL injection. A traffic dump containing an Infiltration attack is considered separately. A comparative analysis of machine learning models was carried out with the selection of the most optimal one. The article also provides a description of the data preprocessing procedure, which is carried out in order to eliminate anomalies and voids in array records, which can lead to incorrect operation of the trained model. Models were trained on selected data in order to identify anomalous traffic behavior indicating a specific type of attack. In addition, a study was conducted on a data set that does not contain information about attacks.
{"title":"USING MACHINE LEARNING ALGORITHMS TO DETECT ANOMALOUS TRAFFIC BEHAVIOR","authors":"","doi":"10.18469/ikt.2023.21.3.04","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.04","url":null,"abstract":"The article describes a method of using machine learning for detecting anomalous traffic behavior. For this purpose, a data set containing a significant amount of traffic collected at the time of the attack on the Web application is used. The set contains three attack options: Brute Force, XSS, SQL injection. A traffic dump containing an Infiltration attack is considered separately. A comparative analysis of machine learning models was carried out with the selection of the most optimal one. The article also provides a description of the data preprocessing procedure, which is carried out in order to eliminate anomalies and voids in array records, which can lead to incorrect operation of the trained model. Models were trained on selected data in order to identify anomalous traffic behavior indicating a specific type of attack. In addition, a study was conducted on a data set that does not contain information about attacks.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"34 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.18469/ikt.2023.21.3.02
The possibility of using a group Poisson flow for simulation modeling of modern video traffic is considered in relation to the approximation of the first and second order statistical characteristics of the queue created by the traffic in the transmission buffer. A method is proposed for determining the parameters of an approximating group Poisson flow, which consists of simultaneously minimizing the deviation of the dependencies of the mathematical expectation of the queue and the dispersion of the queue on the channel load, calculated using the formulas for the approximating flow, from similar dependencies of real traffic. As analytical formulas for the mathematical expectation and queue dispersion, formulas obtained using the interval method for a queuing system with one device and constant service time are used. The quality of the approximation is checked by simulation of the passage of a group Poisson flow with calculated parameters through a given queuing system.
{"title":"USE OF GROUP POISSON FLOW IN SIMULATION MODELING OF MODERN VIDEO TRAFFIC","authors":"","doi":"10.18469/ikt.2023.21.3.02","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.02","url":null,"abstract":"The possibility of using a group Poisson flow for simulation modeling of modern video traffic is considered in relation to the approximation of the first and second order statistical characteristics of the queue created by the traffic in the transmission buffer. A method is proposed for determining the parameters of an approximating group Poisson flow, which consists of simultaneously minimizing the deviation of the dependencies of the mathematical expectation of the queue and the dispersion of the queue on the channel load, calculated using the formulas for the approximating flow, from similar dependencies of real traffic. As analytical formulas for the mathematical expectation and queue dispersion, formulas obtained using the interval method for a queuing system with one device and constant service time are used. The quality of the approximation is checked by simulation of the passage of a group Poisson flow with calculated parameters through a given queuing system.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"109 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140986086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.18469/ikt.2023.21.3.11
This article introduces the development of an innovative application aimed at analyzing comments on English-language YouTube videos to identify and systematize the most frequently used English abbreviations. This application not only facilitates the process of learning English, but also provides a deep understanding of the use of abbreviations in the context of real dialogues, contributing to a more effective use of them in everyday communication. It provides a native speaker’s perspective on the English language. Details the features of developing an application, such as using the YouTube Data API, analyzing comment text using regular expressions and saving data for further study. This paper focuses on the challenges of working with the API (Application Programming Interface), text processing techniques and shows the possibilities of exploring English in an online environment.
{"title":"DEVELOPMENT OF AN APPLICATION FOR ANALYZING COMMENTS ON ENGLISHLANGUAGE YOUTUBE","authors":"","doi":"10.18469/ikt.2023.21.3.11","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.11","url":null,"abstract":"This article introduces the development of an innovative application aimed at analyzing comments on English-language YouTube videos to identify and systematize the most frequently used English abbreviations. This application not only facilitates the process of learning English, but also provides a deep understanding of the use of abbreviations in the context of real dialogues, contributing to a more effective use of them in everyday communication. It provides a native speaker’s perspective on the English language. Details the features of developing an application, such as using the YouTube Data API, analyzing comment text using regular expressions and saving data for further study. This paper focuses on the challenges of working with the API (Application Programming Interface), text processing techniques and shows the possibilities of exploring English in an online environment.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"25 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.18469/ikt.2023.21.3.05
The task of identifying current security threats is becoming increasingly important, due to the increase in the volume of processed information of limited access, an increase in the number of all kinds of threats, and an increase in the potential of violators. At enterprises and organizations in various sectors of the economy, specialists regularly conduct information security audits in order to identify vulnerabilities and ultimately to prevent possible negative consequences. To build a rational information security system at the facility, it is important to organize protection against actual threats, since it is impossible to build protection against all threats, and it is impractical. The article proposes models and algorithms for determining current threats based on an expert approach, which can become the basis for the development of an automated system for making reliable decisions in the tasks of protecting informatization objects.
{"title":"MODELS AND ALGORITHMS FOR IDENTIFYING CURRENT THREATS BASED ON AN EXPERT APPROACH","authors":"","doi":"10.18469/ikt.2023.21.3.05","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.05","url":null,"abstract":"The task of identifying current security threats is becoming increasingly important, due to the increase in the volume of processed information of limited access, an increase in the number of all kinds of threats, and an increase in the potential of violators. At enterprises and organizations in various sectors of the economy, specialists regularly conduct information security audits in order to identify vulnerabilities and ultimately to prevent possible negative consequences. To build a rational information security system at the facility, it is important to organize protection against actual threats, since it is impossible to build protection against all threats, and it is impractical. The article proposes models and algorithms for determining current threats based on an expert approach, which can become the basis for the development of an automated system for making reliable decisions in the tasks of protecting informatization objects.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"11 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140983272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.18469/ikt.2023.21.2.04
The article describes a method of reorienting of the Earth remote sensing gyrostat satellite using a flywheel engine, while located in the same vertical plane with the observation object. In the course of the study, a geometric dependence of the nutation angle on time was derived, differential equations of the motion of the spacecraft relative to the center of mass were generated and solutions were obtained. These obtained equations allows to determine motion parameters (coordinates and speeds) depending on the inertial mass characteristics of the system, initial conditions and time, as well as control the effect of these parameters on the system. The article presents the results of conducted studies that show the performance of the developed mathematical model. Thanks to the developed model, it is possible to determine the necessary control actions to target the gyrostat satellite to the observation object with high accuracy.
{"title":"REORIENTATION OF THE EARTH REMOTE SENSING SPACECRAFT USING ROTORS","authors":"","doi":"10.18469/ikt.2023.21.2.04","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.2.04","url":null,"abstract":"The article describes a method of reorienting of the Earth remote sensing gyrostat satellite using a flywheel engine, while located in the same vertical plane with the observation object. In the course of the study, a geometric dependence of the nutation angle on time was derived, differential equations of the motion of the spacecraft relative to the center of mass were generated and solutions were obtained. These obtained equations allows to determine motion parameters (coordinates and speeds) depending on the inertial mass characteristics of the system, initial conditions and time, as well as control the effect of these parameters on the system. The article presents the results of conducted studies that show the performance of the developed mathematical model. Thanks to the developed model, it is possible to determine the necessary control actions to target the gyrostat satellite to the observation object with high accuracy.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"2 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140496022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.18469/ikt.2023.21.2.07
This article is devoted to the research of convolutional neural network architectures in counting objects in an image. Currently, methods using regression are gaining popularity. In this article in order to solve an object counting task using regression method, modifications of the reference convolutional neural networks AlexNet, VGG16, and ResNet 50, which were developed for image classification, were used. Modification presented by replacing the second part of the neural network, which classifies images, with one fully connected layer, consisting of one neuron without activating function. In experiments, modified architectures of the reference convolutional networks were initialized as folows: using random initialization of the weights and using pretrainedined weights trained on the ImageNet dataset. The results of experiments, which confirm the performance of the proposed models and the use of the neuroplasticity method to solve the problem using regression are preented. The database of images of bacterial cells was used as training and testing material.
{"title":"APPLICATION OF MODERN COMPUTER VISION ALGORITHMS TO MANAGE WITH THE COUNTING OF IMAGE OBJECTS","authors":"","doi":"10.18469/ikt.2023.21.2.07","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.2.07","url":null,"abstract":"This article is devoted to the research of convolutional neural network architectures in counting objects in an image. Currently, methods using regression are gaining popularity. In this article in order to solve an object counting task using regression method, modifications of the reference convolutional neural networks AlexNet, VGG16, and ResNet 50, which were developed for image classification, were used. Modification presented by replacing the second part of the neural network, which classifies images, with one fully connected layer, consisting of one neuron without activating function. In experiments, modified architectures of the reference convolutional networks were initialized as folows: using random initialization of the weights and using pretrainedined weights trained on the ImageNet dataset. The results of experiments, which confirm the performance of the proposed models and the use of the neuroplasticity method to solve the problem using regression are preented. The database of images of bacterial cells was used as training and testing material.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"83 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140496452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.18469/ikt.2023.21.2.08
This article examines using of iterative adaptation algorithms to solve the problem of determining measurement location of the carotid artery intima-media complex. The formulation of a multi-criteria decision-making problem, as the basis for determining correct criterion for proper selection and successful recognizing of the required object in an ultrasound image. The work discusses principles of constructing cascade classifiers as well as, the use of the cascade Haar classifier and the cascade LBP classifier, for which Haar primitives and local binary templates are used as a basis. The results of experimental studies in order to determine effectivity of different boosting algorithms to solve this problem are presented. The best results were shown by the Haar cascade classifier, developed using an iterative adaptation algorithm, which manages solving a multicriteria problem on a given training set more successfully and determines the most suitable areas for measuring the thickness of the common carotid artery intimate media complex.
本文研究使用迭代适应算法来解决确定颈动脉内膜-中膜复合体测量位置的问题。提出了一个多标准决策问题,作为确定正确标准的基础,以便在超声图像中正确选择并成功识别所需对象。作品讨论了级联分类器的构建原则,以及级联哈尔分类器和级联 LBP 分类器的使用,其中哈尔基元和局部二进制模板被用作级联分类器的基础。为了确定不同提升算法解决这一问题的有效性,本文介绍了实验研究的结果。使用迭代适应算法开发的 Haar 级联分类器显示了最佳结果,它能更成功地解决给定训练集上的多标准问题,并确定最适合测量颈总动脉亲密介质复合体厚度的区域。
{"title":"ITERATIVE ADAPTATION ALGORITHMS IN MULTICRITERIA TASKS","authors":"","doi":"10.18469/ikt.2023.21.2.08","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.2.08","url":null,"abstract":"This article examines using of iterative adaptation algorithms to solve the problem of determining measurement location of the carotid artery intima-media complex. The formulation of a multi-criteria decision-making problem, as the basis for determining correct criterion for proper selection and successful recognizing of the required object in an ultrasound image. The work discusses principles of constructing cascade classifiers as well as, the use of the cascade Haar classifier and the cascade LBP classifier, for which Haar primitives and local binary templates are used as a basis. The results of experimental studies in order to determine effectivity of different boosting algorithms to solve this problem are presented. The best results were shown by the Haar cascade classifier, developed using an iterative adaptation algorithm, which manages solving a multicriteria problem on a given training set more successfully and determines the most suitable areas for measuring the thickness of the common carotid artery intimate media complex.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"59 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140495907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.18469/ikt.2023.21.2.10
The choice of equipment installation location on the sides of an unmanned vehicle, and especially such a dump truck, is a difficult task, which is solved, as a rule, intuitively and by the method of fullscale modeling. The authors of the article have solved the formulated problem, on substantiation of the choice of places of sensorics arrangement on the dump truck, using the developed specialized software application. The Carla simulator was chosen as a tool for carrying out the research as it has wide possibilities of visualization of the surrounding world. At the initial stage of selecting the location of the camera arrangement, the requirements for their viewing angles and the quality of the image obtained from them were formulated. This required the development of a software application in the Python language using the Open3D library, the choice of which is justified by the fact that the Carla simulator provides access to its API through a library for this language, and also because it allows rapid prototyping of applications. The developed software application helps the user to select the location of the video cameras on the dump truck in order to experience the unmanned control system. Further research is aimed at automating the selection of camera locations on board an unmanned dump truck.
{"title":"SELECTION AND JUSTIFICATION OF THE LOCATION OF CAMERAS OF THE ALLROUND VISION SYSTEM ON AN UNMANNED DUMP TRUCK","authors":"","doi":"10.18469/ikt.2023.21.2.10","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.2.10","url":null,"abstract":"The choice of equipment installation location on the sides of an unmanned vehicle, and especially such a dump truck, is a difficult task, which is solved, as a rule, intuitively and by the method of fullscale modeling. The authors of the article have solved the formulated problem, on substantiation of the choice of places of sensorics arrangement on the dump truck, using the developed specialized software application. The Carla simulator was chosen as a tool for carrying out the research as it has wide possibilities of visualization of the surrounding world. At the initial stage of selecting the location of the camera arrangement, the requirements for their viewing angles and the quality of the image obtained from them were formulated. This required the development of a software application in the Python language using the Open3D library, the choice of which is justified by the fact that the Carla simulator provides access to its API through a library for this language, and also because it allows rapid prototyping of applications. The developed software application helps the user to select the location of the video cameras on the dump truck in order to experience the unmanned control system. Further research is aimed at automating the selection of camera locations on board an unmanned dump truck.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"190 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140495333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}