Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857611
S. Kaur, K. Kaur, Vipin Gupta
SDN is an emerging technology which is going to drive next generation networks. Lot of companies and organizations has started using SDN applications. It is giving network administrators the flexibility in implementing their networks. But at the same time, it is bringing new security issues. To secure SDN networks, we need strong firewall application. Already some firewall applications are there but they suffer from certain shortcomings. One of the main drawbacks of existing firewall solutions is that they suffer from single point of failure due to their centralized nature and overloading of rules in single device. Other drawback of existing firewall is that they are mostly layer 2 firewalls. In this paper, we are implementing Distributed Firewall where every OpenFlow switch in a network can acts as a firewall. Plus this firewall will be capable of handling TCP, UDP and ICMP Traffic. We have tested this firewall using Mininet Emulator installed in Ubuntu 14.04 Linux installed under VirtualBox virtualization solution. We are using python based POX controller. This work is extension of our earlier work on programmable firewalls.
{"title":"Implementing openflow based distributed firewall","authors":"S. Kaur, K. Kaur, Vipin Gupta","doi":"10.1109/INCITE.2016.7857611","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857611","url":null,"abstract":"SDN is an emerging technology which is going to drive next generation networks. Lot of companies and organizations has started using SDN applications. It is giving network administrators the flexibility in implementing their networks. But at the same time, it is bringing new security issues. To secure SDN networks, we need strong firewall application. Already some firewall applications are there but they suffer from certain shortcomings. One of the main drawbacks of existing firewall solutions is that they suffer from single point of failure due to their centralized nature and overloading of rules in single device. Other drawback of existing firewall is that they are mostly layer 2 firewalls. In this paper, we are implementing Distributed Firewall where every OpenFlow switch in a network can acts as a firewall. Plus this firewall will be capable of handling TCP, UDP and ICMP Traffic. We have tested this firewall using Mininet Emulator installed in Ubuntu 14.04 Linux installed under VirtualBox virtualization solution. We are using python based POX controller. This work is extension of our earlier work on programmable firewalls.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"86 1","pages":"172-175"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75204742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857590
Ajay Sharma, Asim Verma, Monika Bhalla
The task points in outlining a framework which makes working of electrical machines at home through android cell telephone conceivable. The controlling of electrical machines is done remotely through Wi-Fi application in android telephone. Wi-Fi Technology and Communication has seen a steady and exceptional headway in the course of the most recent two decades. Today Wi-Fi innovation is industrially accessible for a boundless however intriguing scope of undertakings. Android is a product stack for cell phones that incorporates a working framework, middle ware and key applications. Android supports a sound cluster of network alternatives including WIFI, Bluetooth, and remote information over cell association. Android incorporates a full arrangement of apparatuses that have been developed starting from the earliest stage furnishing engineers with high profitability and profound knowledge into their applications.
{"title":"WiFi home energy monitoring system","authors":"Ajay Sharma, Asim Verma, Monika Bhalla","doi":"10.1109/INCITE.2016.7857590","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857590","url":null,"abstract":"The task points in outlining a framework which makes working of electrical machines at home through android cell telephone conceivable. The controlling of electrical machines is done remotely through Wi-Fi application in android telephone. Wi-Fi Technology and Communication has seen a steady and exceptional headway in the course of the most recent two decades. Today Wi-Fi innovation is industrially accessible for a boundless however intriguing scope of undertakings. Android is a product stack for cell phones that incorporates a working framework, middle ware and key applications. Android supports a sound cluster of network alternatives including WIFI, Bluetooth, and remote information over cell association. Android incorporates a full arrangement of apparatuses that have been developed starting from the earliest stage furnishing engineers with high profitability and profound knowledge into their applications.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"46 6","pages":"59-61"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72617308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857618
Zain Hashim, Nishu Gupta
Emerging heterogeneous networking is designed to accommodate large volumes of data traffic especially in vehicular environment. As a result, an increased level of QoS requirements and new solutions to ensure fast and reliable data delivery has become indispensable. In this context, device-to-device (D2D) communication technology in 5G network provides a reliable infrastructure which will enable dissemination of various safety and non-safety applications. D2D communication alleviates fast communication between vehicles thereby improving the spectral efficiency, system capacity and throughput and overall performance of the system. This paper develops a paradigm to extend D2D for vehicular infrastructure with the capacity to facilitate vehicular traffic using the LTE band. To analyze the proposed scheme performance, simulations based on LTE network are performed. Results show that our approach provides significant enhancement over IEEE 802.11p standard and LTE-A technology in terms of different performance metrics.
{"title":"Futuristic device-to-device communication paradigm in vehicular ad-hoc network","authors":"Zain Hashim, Nishu Gupta","doi":"10.1109/INCITE.2016.7857618","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857618","url":null,"abstract":"Emerging heterogeneous networking is designed to accommodate large volumes of data traffic especially in vehicular environment. As a result, an increased level of QoS requirements and new solutions to ensure fast and reliable data delivery has become indispensable. In this context, device-to-device (D2D) communication technology in 5G network provides a reliable infrastructure which will enable dissemination of various safety and non-safety applications. D2D communication alleviates fast communication between vehicles thereby improving the spectral efficiency, system capacity and throughput and overall performance of the system. This paper develops a paradigm to extend D2D for vehicular infrastructure with the capacity to facilitate vehicular traffic using the LTE band. To analyze the proposed scheme performance, simulations based on LTE network are performed. Results show that our approach provides significant enhancement over IEEE 802.11p standard and LTE-A technology in terms of different performance metrics.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"45 1","pages":"209-214"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90721095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857620
Adiba Abidin, D. Lal, Naveen Garg, V. Deep
Big data is a big affair of discussion these days. It is usually used everywhere from newspaper to technical magazines from social media to journals. The term big data refers to complex data sets whose size is beyond the ability of traditional processing techniques within a desired span of time. Big data consists of large volume that might be petabytes or Exabyte's of data consisting of billions to trillions of records of millions of people. Testing of this huge volume of data is a big challenge. With the emergence of social media, cloud and smart phones, industries have to deal with the voluminous data. while big data provide solutions to complex business problems like analysis of huge data serves as a basis for faster and better decision making, new products and services are being developed for the customers[4]. This paper focuses on the various techniques that have been implemented.
{"title":"Comparative analysis on techniques for big data testing","authors":"Adiba Abidin, D. Lal, Naveen Garg, V. Deep","doi":"10.1109/INCITE.2016.7857620","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857620","url":null,"abstract":"Big data is a big affair of discussion these days. It is usually used everywhere from newspaper to technical magazines from social media to journals. The term big data refers to complex data sets whose size is beyond the ability of traditional processing techniques within a desired span of time. Big data consists of large volume that might be petabytes or Exabyte's of data consisting of billions to trillions of records of millions of people. Testing of this huge volume of data is a big challenge. With the emergence of social media, cloud and smart phones, industries have to deal with the voluminous data. while big data provide solutions to complex business problems like analysis of huge data serves as a basis for faster and better decision making, new products and services are being developed for the customers[4]. This paper focuses on the various techniques that have been implemented.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"19 1","pages":"219-223"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78628704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857635
A. J. Das, Navajit Saikia
Pedestrian detection plays a vital role in numerous vision-based safety and security applications in recent days. Given an image, a pedestrian detector computes features from it and works on the features to classify if there is pedestrian. This paper presents a new feature set for pedestrian detection where a modified version of the local difference binary features are combined with the histogram of oriented gradients features. The linear support vector machine is used as the classifier. The performance of the proposed detector is presented in terms of miss-rate versus FPPI and miss-rate versus FPPW, and is compared with available pedestrian detectors of similar type. The computational efficiency of the detector is also studied.
{"title":"Pedestrian detection using dense LDB descriptor combined with HOG","authors":"A. J. Das, Navajit Saikia","doi":"10.1109/INCITE.2016.7857635","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857635","url":null,"abstract":"Pedestrian detection plays a vital role in numerous vision-based safety and security applications in recent days. Given an image, a pedestrian detector computes features from it and works on the features to classify if there is pedestrian. This paper presents a new feature set for pedestrian detection where a modified version of the local difference binary features are combined with the histogram of oriented gradients features. The linear support vector machine is used as the classifier. The performance of the proposed detector is presented in terms of miss-rate versus FPPI and miss-rate versus FPPW, and is compared with available pedestrian detectors of similar type. The computational efficiency of the detector is also studied.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"105 2 1","pages":"299-304"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88717469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857633
Suvidha D. Dhore, S. Patil
Technology of wireless sensor communication has revolutionized our way of living motivated in development and improvement in the field of wireless sensor network. Among many applications target tracking application requires sensor nodes to be localized with minor error. To maintain the target tracking in timely fashion with accurate measurement of target movement is difficult as it summed up with many noises during the detection. Possibilities of node failure often come across in the tracking which results in loss of tracking. Thus to overcome difficulties of tracking new improved tracking framework called as Face (Polygons) Track is proposed. In Face Track sensors are deployed in polygonal fashion. Where polygon share common edge with non overlapping pattern these polygons are the faces and edges being reconstructed to generate each face further so as to avoid loss of tracking. In Face track with Kalman filter, KF optimally selects node as target moves ahead crossing the edges of the face. The Face track network is mapped to develop the courier management system. In this courier management, optimal node selection function selects the number of nodes between source and destination on basis of distance calculated between these node so as to refer nearest node.
{"title":"Target tracking in face track with Kalman filter using wireless sensor network and development of courier management service in Face Track network","authors":"Suvidha D. Dhore, S. Patil","doi":"10.1109/INCITE.2016.7857633","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857633","url":null,"abstract":"Technology of wireless sensor communication has revolutionized our way of living motivated in development and improvement in the field of wireless sensor network. Among many applications target tracking application requires sensor nodes to be localized with minor error. To maintain the target tracking in timely fashion with accurate measurement of target movement is difficult as it summed up with many noises during the detection. Possibilities of node failure often come across in the tracking which results in loss of tracking. Thus to overcome difficulties of tracking new improved tracking framework called as Face (Polygons) Track is proposed. In Face Track sensors are deployed in polygonal fashion. Where polygon share common edge with non overlapping pattern these polygons are the faces and edges being reconstructed to generate each face further so as to avoid loss of tracking. In Face track with Kalman filter, KF optimally selects node as target moves ahead crossing the edges of the face. The Face track network is mapped to develop the courier management system. In this courier management, optimal node selection function selects the number of nodes between source and destination on basis of distance calculated between these node so as to refer nearest node.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"65 1","pages":"288-292"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84027621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857583
S. Khatri, Aakanksha Sonik, Deepak Kumar, R. Majumdar
Software Reliability is a significant attribute of the software quality, so attaining reliability is a vital subject for the evaluation of any software product. Software Reliability Growth model defines the phenomenon for fault discovery in testing phase of the development process of a software. Software Reliability models being a contrivance of Software Reliability Engineering (SRE), focuses on engineering methodology and techniques that can be used for the quantitative assessment of the software product, develop test results, schedule timely status, and observe the variations in software reliability performance [9]. Due to extreme competitions, the software companies are approaching with multiple upgrade versions of the software to endure the competition, thus analysing the software in the functional stage. This paper presents a continuous successive releases time modelling based on S-shaped SRGM with imperfect debugging.
{"title":"Modelling the successive software release time of S-shaped model with imperfect debugging","authors":"S. Khatri, Aakanksha Sonik, Deepak Kumar, R. Majumdar","doi":"10.1109/INCITE.2016.7857583","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857583","url":null,"abstract":"Software Reliability is a significant attribute of the software quality, so attaining reliability is a vital subject for the evaluation of any software product. Software Reliability Growth model defines the phenomenon for fault discovery in testing phase of the development process of a software. Software Reliability models being a contrivance of Software Reliability Engineering (SRE), focuses on engineering methodology and techniques that can be used for the quantitative assessment of the software product, develop test results, schedule timely status, and observe the variations in software reliability performance [9]. Due to extreme competitions, the software companies are approaching with multiple upgrade versions of the software to endure the competition, thus analysing the software in the functional stage. This paper presents a continuous successive releases time modelling based on S-shaped SRGM with imperfect debugging.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"122 1","pages":"27-31"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87683002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857604
Neelam Sharma, B. M. Singh, Karan Singh
Mobility of users and enhancement of bandwidth have been characterizing factors for the global telecommunication development which also witnessed improvements in services. If user needs to send some information over the prescribed bandwidth with dure reliability then the (QOS) Quality of services becomes more critical and seeks expected performance. A Mobile Adhoc Network is self-possessed combination of mobile nodes. It has to be self-structured. These are mobility extensions into wireless domain and autonomous mobile dominion. In this set of specified nodes which form adhoc network with routing infrastructure too. Multicasting is responsible for transferring information efficiently from a source to any destination; duplication of messages and delivery takes place only once and that too at the branch points, due to splitting of the destination links. The authors have successfully been able to address several issues relating to MANET, especially multicasting, its routing protocols and qualitative comparisons. Further, in this paper, we particularly focused on implementation as well as performance analysis of multicast routing protocols like AODV, MAODV using network simulator NS3. By using the performance parameter such as average end-to-end delay and packet delivery ratio (PDR) and routing-overhead.
{"title":"Performance analysis of multicast routing protocols using NS-3","authors":"Neelam Sharma, B. M. Singh, Karan Singh","doi":"10.1109/INCITE.2016.7857604","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857604","url":null,"abstract":"Mobility of users and enhancement of bandwidth have been characterizing factors for the global telecommunication development which also witnessed improvements in services. If user needs to send some information over the prescribed bandwidth with dure reliability then the (QOS) Quality of services becomes more critical and seeks expected performance. A Mobile Adhoc Network is self-possessed combination of mobile nodes. It has to be self-structured. These are mobility extensions into wireless domain and autonomous mobile dominion. In this set of specified nodes which form adhoc network with routing infrastructure too. Multicasting is responsible for transferring information efficiently from a source to any destination; duplication of messages and delivery takes place only once and that too at the branch points, due to splitting of the destination links. The authors have successfully been able to address several issues relating to MANET, especially multicasting, its routing protocols and qualitative comparisons. Further, in this paper, we particularly focused on implementation as well as performance analysis of multicast routing protocols like AODV, MAODV using network simulator NS3. By using the performance parameter such as average end-to-end delay and packet delivery ratio (PDR) and routing-overhead.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"28 1","pages":"132-137"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91045211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857596
Shruti Sharma, Nitasha Hasteer, S. Mishra, J. Van Belle
Today, industry is moving towards adopting an Agile development methodology due to its numerous benefits over other methodologies. There are certain pertinent attributes of this methodology that facilitates towards adoption of Agile at large. Our study focuses on identification of these attributes and establishes a contextual relationship among them. We have incorporated the Interpretive Structural Modeling (ISM) approach to establish a model and classify the identified attributes.
{"title":"Identifying the contextual relationship among the Agile adoption factors through interpretive structural modeling","authors":"Shruti Sharma, Nitasha Hasteer, S. Mishra, J. Van Belle","doi":"10.1109/INCITE.2016.7857596","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857596","url":null,"abstract":"Today, industry is moving towards adopting an Agile development methodology due to its numerous benefits over other methodologies. There are certain pertinent attributes of this methodology that facilitates towards adoption of Agile at large. Our study focuses on identification of these attributes and establishes a contextual relationship among them. We have incorporated the Interpretive Structural Modeling (ISM) approach to establish a model and classify the identified attributes.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"2 1","pages":"87-92"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82355718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857630
J. Dhar, Vipul Gandhi
Amateur writers usually find it difficult and often make errors while building up content when they are doing so in a style different from their own writing style. This causes loss of interest by the readers and sometimes even misinterpretations of actual thoughts desired to be conveyed by author. This work attempts to embark upon this problem statement by ranking the best available choices of words fitting the style of writing that the author would like to adopt. Our methodology allows authors to choose from amongst default, formal and literature style of writing. Also, authors can infer words and traces from his own past writings by developing a custom corpus of his own write-ups. A spell checker and N-gram based statistical model along with a corpus based technique is proposed to achieve above objectives. Rank 4 N-gram along with backoff smoothing provided optimum results for our work. To showcase the effectiveness of this method, we have tested it on real time data and performance evaluation fetched satisfactory results.
{"title":"Content development using N-gram model in custom writing style","authors":"J. Dhar, Vipul Gandhi","doi":"10.1109/INCITE.2016.7857630","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857630","url":null,"abstract":"Amateur writers usually find it difficult and often make errors while building up content when they are doing so in a style different from their own writing style. This causes loss of interest by the readers and sometimes even misinterpretations of actual thoughts desired to be conveyed by author. This work attempts to embark upon this problem statement by ranking the best available choices of words fitting the style of writing that the author would like to adopt. Our methodology allows authors to choose from amongst default, formal and literature style of writing. Also, authors can infer words and traces from his own past writings by developing a custom corpus of his own write-ups. A spell checker and N-gram based statistical model along with a corpus based technique is proposed to achieve above objectives. Rank 4 N-gram along with backoff smoothing provided optimum results for our work. To showcase the effectiveness of this method, we have tested it on real time data and performance evaluation fetched satisfactory results.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"219 1","pages":"271-275"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89461394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}