Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066740
N. Sagar, P. Reddy
In recent world, the wireless sensor networks are used intensively in many applications fields, these are used by scientific researchers to improve and accelerate the performance features of networks. The designs are very challenging and are sustainable, on the above these energy-dependent sensors are relied to run for long periods. These Sensor nodes are usually battery-powered and thus have very shorter lifetime. Here this paper, introduces a improved approach for wake-up radio devices called REACH (Range Enhancing Energy Harvester) Mote in place of general sensor nodes, here these nodes use the energy harvesting circuit in combination with an ultra-low-power pulse generator to activate and wake-up the motes in the wireless network. And this scheme helps in reducing latency without increase in energy consumption
{"title":"Notice of Violation of IEEE Publication Principles Comparative approach for range enhancing energy harvester (REACH) mote passive wake-up radios for wireless networks","authors":"N. Sagar, P. Reddy","doi":"10.1109/ICCCT2.2014.7066740","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066740","url":null,"abstract":"In recent world, the wireless sensor networks are used intensively in many applications fields, these are used by scientific researchers to improve and accelerate the performance features of networks. The designs are very challenging and are sustainable, on the above these energy-dependent sensors are relied to run for long periods. These Sensor nodes are usually battery-powered and thus have very shorter lifetime. Here this paper, introduces a improved approach for wake-up radio devices called REACH (Range Enhancing Energy Harvester) Mote in place of general sensor nodes, here these nodes use the energy harvesting circuit in combination with an ultra-low-power pulse generator to activate and wake-up the motes in the wireless network. And this scheme helps in reducing latency without increase in energy consumption","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"105 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83389499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914187
Meysam Ahmadi Oskooei, S. Daud
Nowadays, likewise the functionality of a web service, Quality of Service (QoS) has become an essential feature of web service characteristic for users to select the suitable web services for a distributed application by identifying which characteristics make service more qualified to be selected. Although proposed QoS models by existing works may satisfy the required quantitative measurement of QoS attributes, clustering all generic quality attributes in a same group may have a negative impact on technical QoS attributes such as Response time. Consequently, from technical point of view, lack of a comprehensive model to evaluate web services in terms of technical and non-technical QoS attributes is an important issue on topic, affecting the accuracy of the results in general, and is addressed in this paper.
{"title":"Quality of service (QoS) model for web service selection","authors":"Meysam Ahmadi Oskooei, S. Daud","doi":"10.1109/I4CT.2014.6914187","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914187","url":null,"abstract":"Nowadays, likewise the functionality of a web service, Quality of Service (QoS) has become an essential feature of web service characteristic for users to select the suitable web services for a distributed application by identifying which characteristics make service more qualified to be selected. Although proposed QoS models by existing works may satisfy the required quantitative measurement of QoS attributes, clustering all generic quality attributes in a same group may have a negative impact on technical QoS attributes such as Response time. Consequently, from technical point of view, lack of a comprehensive model to evaluate web services in terms of technical and non-technical QoS attributes is an important issue on topic, affecting the accuracy of the results in general, and is addressed in this paper.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"52 1","pages":"266-270"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83776846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914150
Muhammad Ammar Shafi, Mohd Saifullah Rusiman, N. Yusof
ICU in terms of Intensive Care Unit was established in Malaysia since 1968. The number of patients receiving treatment at ICU had been increased day by days until now. Rapid development of medical and surgical subspecialties in the last decade resulted in increasing demands for more ICU beds and provides momentum for its development. This study aims to identify the determinants of patient status (alive or died) after receiving treatment in ICU. Secondary data of 1314 patients who received ICU treatment recorded by nurses and doctors using cluster sampling was used. Binary logistic regression was applied in order to identify the determinants of patient status. Based on the results of the logistic regression, this study discovered that patient's age, days of patients in ICU, comorbid diseases and patient's discharge score are the factors contributing patients to die after received treatment in ICU.
{"title":"Determinants status of patient after receiving treatment at Intensive Care Unit: A case study in Johor Bahru","authors":"Muhammad Ammar Shafi, Mohd Saifullah Rusiman, N. Yusof","doi":"10.1109/I4CT.2014.6914150","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914150","url":null,"abstract":"ICU in terms of Intensive Care Unit was established in Malaysia since 1968. The number of patients receiving treatment at ICU had been increased day by days until now. Rapid development of medical and surgical subspecialties in the last decade resulted in increasing demands for more ICU beds and provides momentum for its development. This study aims to identify the determinants of patient status (alive or died) after receiving treatment in ICU. Secondary data of 1314 patients who received ICU treatment recorded by nurses and doctors using cluster sampling was used. Binary logistic regression was applied in order to identify the determinants of patient status. Based on the results of the logistic regression, this study discovered that patient's age, days of patients in ICU, comorbid diseases and patient's discharge score are the factors contributing patients to die after received treatment in ICU.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"68 1","pages":"80-82"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85531848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914167
Mohd Hazmi Hamzah, Hadhrami Ab. Ghani
Cooperative transmission utilizes the presence of multiple radio transmission equipment including base stations, antennas and mobile stations to create transmission such that capacity and performance of the transmission are improved. This paper proposes a new transmission model embedded with a modified ant colony algorithm to improve transmission performance whilst reducing computational complexity.
{"title":"Energy-limited ant colony optimization with cooperative transmission","authors":"Mohd Hazmi Hamzah, Hadhrami Ab. Ghani","doi":"10.1109/I4CT.2014.6914167","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914167","url":null,"abstract":"Cooperative transmission utilizes the presence of multiple radio transmission equipment including base stations, antennas and mobile stations to create transmission such that capacity and performance of the transmission are improved. This paper proposes a new transmission model embedded with a modified ant colony algorithm to improve transmission performance whilst reducing computational complexity.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"95 1","pages":"161-165"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81832320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914175
Shahrul Badariah Mat Sah, N. Chyan, S. Hisham
Malaysia is a multicultural country and is known for its tourism industry. The uniqueness of Malaysian traditional games is one of the cultural aspects to promote tourism industry in Malaysia. This paper presents a mobile application that combines the use of printed media and marker-based augmented reality (AR) technology as an effective and engaging platform in promoting Malaysian traditional games. The mobile AR application developed in this study provides interactive features that allow users to interact and manipulate the 3D objects including videos using five assigned virtual buttons. User acceptance test was carried out with 15 users including foreigners to verify the effectiveness of the mobile AR application.
{"title":"Interactive augmented reality art book to promote Malaysia traditional game","authors":"Shahrul Badariah Mat Sah, N. Chyan, S. Hisham","doi":"10.1109/I4CT.2014.6914175","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914175","url":null,"abstract":"Malaysia is a multicultural country and is known for its tourism industry. The uniqueness of Malaysian traditional games is one of the cultural aspects to promote tourism industry in Malaysia. This paper presents a mobile application that combines the use of printed media and marker-based augmented reality (AR) technology as an effective and engaging platform in promoting Malaysian traditional games. The mobile AR application developed in this study provides interactive features that allow users to interact and manipulate the 3D objects including videos using five assigned virtual buttons. User acceptance test was carried out with 15 users including foreigners to verify the effectiveness of the mobile AR application.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"203-208"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82434652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914137
Nurul Hafiza Idayu Mohd Paudzi, H. M. Hanum, Z. Bakar
Changes in energy and pitch under various speaking conditions may corresponds to speaker intention and information content perceived by the speaker. In this paper, two prosody-related features which are energy and pitch of word utterances are experimented and the relationships with word frequency are investigated. Two parliamentary speeches are segmented manually into sentences and then into individual words in this experiment. Next, the maximum, minimum and mean of pitch and energy are extracted from each word to calculate word energy and pitch measure. The frequency of each word is counted to identify the relationship between word frequency with the pitch and energy measure. The study found that there is a significant relationship between word frequency and energy measure of word utterances in Malay speech but no significant relationship between word frequency and pitch measure.
{"title":"Evaluation of prosody-related features and word frequency for Malay speeches","authors":"Nurul Hafiza Idayu Mohd Paudzi, H. M. Hanum, Z. Bakar","doi":"10.1109/I4CT.2014.6914137","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914137","url":null,"abstract":"Changes in energy and pitch under various speaking conditions may corresponds to speaker intention and information content perceived by the speaker. In this paper, two prosody-related features which are energy and pitch of word utterances are experimented and the relationships with word frequency are investigated. Two parliamentary speeches are segmented manually into sentences and then into individual words in this experiment. Next, the maximum, minimum and mean of pitch and energy are extracted from each word to calculate word energy and pitch measure. The frequency of each word is counted to identify the relationship between word frequency with the pitch and energy measure. The study found that there is a significant relationship between word frequency and energy measure of word utterances in Malay speech but no significant relationship between word frequency and pitch measure.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"110 1","pages":"15-20"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89438025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICRITO.2014.7014665
M. Bokhari
This paper discusses about the requirements which should be incorporated in the development of the requirement management tools. A new-fangled Requirements Management Tool has been proposed and named as BOKHARI-Tool for Secure Software Requirements (TSSR) Managemnt which encompasses the requirement decisive factor that have been mentioned in this paper. Bokhari-TSSR manages risk analysis, security of the system and project, system requirements, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the Bokhari-TSSR architecture and its framework, which has four components: Planner, Modeller, Prover and Documenter which will be helpful in managing requirements and interacting with arbitrary number of external tools for secure software development.
{"title":"BOKHARI-Tool for Secure Software Requirements (TSSR) Management","authors":"M. Bokhari","doi":"10.1109/ICRITO.2014.7014665","DOIUrl":"https://doi.org/10.1109/ICRITO.2014.7014665","url":null,"abstract":"This paper discusses about the requirements which should be incorporated in the development of the requirement management tools. A new-fangled Requirements Management Tool has been proposed and named as BOKHARI-Tool for Secure Software Requirements (TSSR) Managemnt which encompasses the requirement decisive factor that have been mentioned in this paper. Bokhari-TSSR manages risk analysis, security of the system and project, system requirements, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the Bokhari-TSSR architecture and its framework, which has four components: Planner, Modeller, Prover and Documenter which will be helpful in managing requirements and interacting with arbitrary number of external tools for secure software development.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"50 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/I4CT.2014.6914181
C. Gan, B. Ooi, S. Liew
Many solutions have been proposed to harness underutilized workstations to form ad-hoc and low-cost computer clusters. The success of forming ad-hoc computer clusters greatly depends on the usage characteristic of an organization. An organization with hundreds of workstations does not necessarily imply that it has the opportunity to form an ad-hoc computer cluster because different workstations may have different turned-on durations and these workstations may not be available at the same time depending on their users' usage. The objective of this work is to devise a framework to predict when and which workstations may be turned-on and for how long based on previously monitored uptime. 97 workstations have been selected from a real environment for 42 days to test the proposed framework. From the test results, it showed that there are indeed turned-on patterns on weekly basis. Some workstations have more consistent repetitive turned-on patterns while some do not, and this work created a framework to distinguish these workstations. The contribution of this work is the creation of a framework that allows administrators to identify potential workstations for forming ad-hoc computer clusters of their environment.
{"title":"Workstations uptime analysis framework to identify opportunity for forming ad-hoc computer clusters","authors":"C. Gan, B. Ooi, S. Liew","doi":"10.1109/I4CT.2014.6914181","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914181","url":null,"abstract":"Many solutions have been proposed to harness underutilized workstations to form ad-hoc and low-cost computer clusters. The success of forming ad-hoc computer clusters greatly depends on the usage characteristic of an organization. An organization with hundreds of workstations does not necessarily imply that it has the opportunity to form an ad-hoc computer cluster because different workstations may have different turned-on durations and these workstations may not be available at the same time depending on their users' usage. The objective of this work is to devise a framework to predict when and which workstations may be turned-on and for how long based on previously monitored uptime. 97 workstations have been selected from a real environment for 42 days to test the proposed framework. From the test results, it showed that there are indeed turned-on patterns on weekly basis. Some workstations have more consistent repetitive turned-on patterns while some do not, and this work created a framework to distinguish these workstations. The contribution of this work is the creation of a framework that allows administrators to identify potential workstations for forming ad-hoc computer clusters of their environment.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"34 1","pages":"234-238"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77697624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-08DOI: 10.1109/INFCOMW.2014.6849187
Luis Sanabria-Russo, J. Barceló, A. Faridi, B. Bellalta
Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol for WLANs, capable of achieving greater throughput than the current contention mechanism in WLANs. It does so by changing to a deterministic backoff after successful transmissions, which leads to a collision-free schedule that under ideal conditions can be permanently maintained. This demo shows the first implementation of CSMA/ECA using commercial hardware and OpenFWWF in a realistic network testbed. Results show how CSMA/ECA outperforms the current MAC for WLANs in terms of throughput, even through a permanent collision-free schedule cannot be maintained due to unideal practical conditions.
CSMA/ECA (Carrier Sense Multiple Access with Enhanced Collision Avoidance)是一种面向无线局域网的分布式MAC协议,能够实现比当前无线局域网竞争机制更高的吞吐量。它通过在成功传输后改变为确定性后退来实现这一点,这导致在理想条件下可以永久保持无碰撞的时间表。这个演示展示了在一个现实的网络测试平台上使用商用硬件和OpenFWWF的CSMA/ECA的第一个实现。结果表明,CSMA/ECA如何在吞吐量方面优于当前的wlan MAC,即使由于不理想的实际条件而无法维持永久无冲突调度。
{"title":"WLANs throughput improvement with CSMA/ECA","authors":"Luis Sanabria-Russo, J. Barceló, A. Faridi, B. Bellalta","doi":"10.1109/INFCOMW.2014.6849187","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849187","url":null,"abstract":"Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol for WLANs, capable of achieving greater throughput than the current contention mechanism in WLANs. It does so by changing to a deterministic backoff after successful transmissions, which leads to a collision-free schedule that under ideal conditions can be permanently maintained. This demo shows the first implementation of CSMA/ECA using commercial hardware and OpenFWWF in a realistic network testbed. Results show how CSMA/ECA outperforms the current MAC for WLANs in terms of throughput, even through a permanent collision-free schedule cannot be maintained due to unideal practical conditions.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"39 1","pages":"125-126"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73572627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-08DOI: 10.1109/INFCOMW.2014.6849208
Kai Sun, Zhikui Chen, Jiankang Ren, Song Yang, Jing Li
With the number increasing of applications and services that are available on mobile devices, mobile cloud computing has drawn a substantial amount of attention by academia and industry in the past several years. When facing the most exciting machine learning applications such as deep learning, the computing requirement is intensive. For the purpose of improving energy efficiency of mobile device and enhancing the performance of applications through reducing execution time, M2C offloads computation of its machine learning application to the cloud side. We propose the prototype of M2C with the mobile side on Android, iPad and with the cloud side on the open source cloud: Spark, a part of the Berkeley Data Analytics Stack with NVIDA GPU. M2C's distinct set of varying computational tools and mobile nodes allows for thorough implementing distributed machine learning algorithm and innovative wireless protocols with energy efficiency, verifying the theoretical research and bringing the user extremely fast experience.
{"title":"M2C: Energy efficient mobile cloud system for deep learning","authors":"Kai Sun, Zhikui Chen, Jiankang Ren, Song Yang, Jing Li","doi":"10.1109/INFCOMW.2014.6849208","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849208","url":null,"abstract":"With the number increasing of applications and services that are available on mobile devices, mobile cloud computing has drawn a substantial amount of attention by academia and industry in the past several years. When facing the most exciting machine learning applications such as deep learning, the computing requirement is intensive. For the purpose of improving energy efficiency of mobile device and enhancing the performance of applications through reducing execution time, M2C offloads computation of its machine learning application to the cloud side. We propose the prototype of M2C with the mobile side on Android, iPad and with the cloud side on the open source cloud: Spark, a part of the Berkeley Data Analytics Stack with NVIDA GPU. M2C's distinct set of varying computational tools and mobile nodes allows for thorough implementing distributed machine learning algorithm and innovative wireless protocols with energy efficiency, verifying the theoretical research and bringing the user extremely fast experience.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"63 8 1","pages":"167-168"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77590762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}