Wireless sensor networks represent an innovative prototype for extracting data from the environment for various applications. It consist of various sensors which send their sensed data to base station. So energy preservation is a key issue for sensor nodes as they have restricted power. This has led to a number of routing scheme for maximizing the network lifetime. In this paper we have enhanced the energy utilization efficiently with "Range Switching". Here, we have further applied range switching technique at its best rate to the Gradient based routing Protocol for enhancing the performance, which shows the potential gain in its throughput.
{"title":"An Energy Efficient Routing with Range Switching in WSN","authors":"T. Agrawal, R. S. Kushwah, R. S. Tomar","doi":"10.1109/CICN.2014.86","DOIUrl":"https://doi.org/10.1109/CICN.2014.86","url":null,"abstract":"Wireless sensor networks represent an innovative prototype for extracting data from the environment for various applications. It consist of various sensors which send their sensed data to base station. So energy preservation is a key issue for sensor nodes as they have restricted power. This has led to a number of routing scheme for maximizing the network lifetime. In this paper we have enhanced the energy utilization efficiently with \"Range Switching\". Here, we have further applied range switching technique at its best rate to the Gradient based routing Protocol for enhancing the performance, which shows the potential gain in its throughput.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"354-357"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91334625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main aim of this work is to study and show power reduction by using clock gating techniques with pulse enable concept. In this two 8 bit input data and a MUX 4:1 for selection of instruction which is a combination of logic and arithmetic operation's and total of 11 instruction are performed in the proposed design. This technique is applied on the D Flip-Flop based gated clock ALU & negative latch based gated ALU at RTL level. At different operating frequency 100MHZ, 200MHZ, 300MHZ, 500MHZ, 700MHZ, the percentage of dissipated power 1.02%, 1.15%, 1.24%, 1.49%, 1.63% respectively reduced in negative latch based gated clock ALU with respect to D flip-flop based gated clock ALU. The percentage of reduction is achieved in 1ns, 2ns, 3ns, 5ns, and 10ns clock period respectively. This paper is focused on the optimization of power by implementing pulse enable gated clock, after doing the operation by arithmetic and logic unit through gated clock approach, consumed power is slightly greater than the required power which is used to generate in gated clock signal. Xilinx 14.2 has been used as ISE in which vertex 6 is 40nm technology FPGA, 1 volt with Xc6vlx240t family. The negative flip flop is best for this design as less number of gate counts and also area is less.
{"title":"Power Optimization of Sequential Circuit Based ALU Using Gated Clock & Pulse Enable Logic","authors":"G. Shrivastava, Shivendra Singh","doi":"10.1109/CICN.2014.212","DOIUrl":"https://doi.org/10.1109/CICN.2014.212","url":null,"abstract":"The main aim of this work is to study and show power reduction by using clock gating techniques with pulse enable concept. In this two 8 bit input data and a MUX 4:1 for selection of instruction which is a combination of logic and arithmetic operation's and total of 11 instruction are performed in the proposed design. This technique is applied on the D Flip-Flop based gated clock ALU & negative latch based gated ALU at RTL level. At different operating frequency 100MHZ, 200MHZ, 300MHZ, 500MHZ, 700MHZ, the percentage of dissipated power 1.02%, 1.15%, 1.24%, 1.49%, 1.63% respectively reduced in negative latch based gated clock ALU with respect to D flip-flop based gated clock ALU. The percentage of reduction is achieved in 1ns, 2ns, 3ns, 5ns, and 10ns clock period respectively. This paper is focused on the optimization of power by implementing pulse enable gated clock, after doing the operation by arithmetic and logic unit through gated clock approach, consumed power is slightly greater than the required power which is used to generate in gated clock signal. Xilinx 14.2 has been used as ISE in which vertex 6 is 40nm technology FPGA, 1 volt with Xc6vlx240t family. The negative flip flop is best for this design as less number of gate counts and also area is less.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"36 1","pages":"1006-1010"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89529793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crisp set relations have been generalised to fuzzy relations, intuitionistic fuzzy relations, rough relations and also some hybrid relations related to these notions. Rough set is a fruitful model to capture imprecision in data. There are two approaches to the rough set notion. The approach by Pawlak is topological by nature and the approach of Iwinski is algebraic by nature. In this paper we define several generalised relations where the rough set definition considered is that of Iwinski and prove many properties of these relations. These relations can be used in different fields of computer science like, databases, artificial intelligence, granular computing and soft computing. We illustrate by example the structures of most of the concepts introduced in the paper.
{"title":"On Some Generalized Relations","authors":"B. Tripathy, M. Satapathy, P. K. Choudhury","doi":"10.1109/CICN.2014.156","DOIUrl":"https://doi.org/10.1109/CICN.2014.156","url":null,"abstract":"Crisp set relations have been generalised to fuzzy relations, intuitionistic fuzzy relations, rough relations and also some hybrid relations related to these notions. Rough set is a fruitful model to capture imprecision in data. There are two approaches to the rough set notion. The approach by Pawlak is topological by nature and the approach of Iwinski is algebraic by nature. In this paper we define several generalised relations where the rough set definition considered is that of Iwinski and prove many properties of these relations. These relations can be used in different fields of computer science like, databases, artificial intelligence, granular computing and soft computing. We illustrate by example the structures of most of the concepts introduced in the paper.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"714-718"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73543209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Medical image segmentation is a challenging task for analyzing the magnetic resonance (MRI) images. These type of images contain missing or diffuse organ/tissue boundaries due to poor image contrast. Medical image segmentation can be addressed effectively by genetic algorithms (GAs). In this article, an application of pixel intensity based medical image segmentation is presented by the non-dominated sorting genetic algorithm-II (NSGA II) based optimized MUSIG (Opti MUSIG) activation function with a multilayer self organizing neural network (MLSONN) architecture. This method is compared with the process of medical image segmentation by the MUSIG activation function with the MLSONN architecture. Both the methods are applied on two real life MRI images. The comparison shows that NSGA II based Opti MUSIG activation function performs better medical image segmentation than the MUSIG activation function based method.
{"title":"Application of Pixel Intensity Based Medical Image Segmentation Using NSGA II Based Opti MUSIG Activation Function","authors":"S. De, S. Bhattacharyya, Susanta Chakraborty","doi":"10.1109/CICN.2014.67","DOIUrl":"https://doi.org/10.1109/CICN.2014.67","url":null,"abstract":"Medical image segmentation is a challenging task for analyzing the magnetic resonance (MRI) images. These type of images contain missing or diffuse organ/tissue boundaries due to poor image contrast. Medical image segmentation can be addressed effectively by genetic algorithms (GAs). In this article, an application of pixel intensity based medical image segmentation is presented by the non-dominated sorting genetic algorithm-II (NSGA II) based optimized MUSIG (Opti MUSIG) activation function with a multilayer self organizing neural network (MLSONN) architecture. This method is compared with the process of medical image segmentation by the MUSIG activation function with the MLSONN architecture. Both the methods are applied on two real life MRI images. The comparison shows that NSGA II based Opti MUSIG activation function performs better medical image segmentation than the MUSIG activation function based method.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"15 1","pages":"262-267"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78282047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the process of design and implementation of multimedia foreign language teaching simulation software is an open system, the simulation of the software system can realize multi computer courses in foreign language, practice. Course selection, foreign language selection method using menu, each foreign language simulation with animation, pictures and text forms, which uses the material is in the form of documents, and is easy to realize dynamic adding, modifying, lookup and update.
{"title":"Research on Interactive Simulation Software Is Applied to Foreign Language Teaching Based on Delphi","authors":"Wei Wei","doi":"10.1109/CICN.2014.233","DOIUrl":"https://doi.org/10.1109/CICN.2014.233","url":null,"abstract":"This paper describes the process of design and implementation of multimedia foreign language teaching simulation software is an open system, the simulation of the software system can realize multi computer courses in foreign language, practice. Course selection, foreign language selection method using menu, each foreign language simulation with animation, pictures and text forms, which uses the material is in the form of documents, and is easy to realize dynamic adding, modifying, lookup and update.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"10 1","pages":"1113-1116"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75438258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Efficient and cost optimal feature of micro fluidic based biochips are inspiring in automation of clinical diagnostics. Many laboratory oriented biochemical tests are transfigured into on chip operations. Droplet based micro fluidic is a sub-category of micro fluidic sciences. Actually this type of fluidic device is capable of manipulating multiple droplets concurrently. The main aim of droplet routing in a Digital Micro fluidic Biochip (DMFB) is to find an efficient path for each droplet from a designated source electrode to a destination electrode under different fluidic and static constraints of micro fluidic operations. The whole operation can be make more scalable and controlled through a programmable intelligent controller. In order to match up with the current needs and required flexibility of commercial applications, this intelligent controller has to take care of many issues like pin optimization, cross reference minimization and contamination detection during routing. This makes the task of intelligent controller quite complex and challenging. These online controllers need to control multiple biochip boards at different time intervals to promote optimum resource and time utilization. However, online controllers are very susceptible to wide range of cyber attacks. In recent literature, varieties of cyber physical attacks have been reported which cause remarkable impairment on the operation of physical system. This proposed method is able to adjudge such malicious operations at the physical system level. This will help to monitor the behavior of the physical operation and can stall it under any abnormality in operation. Experimental findings show that the proposed technique can detect the errors and superfluous operations accurately with minimum consumption of computing resources. Comparative performance of error detection efficiency shows betterment over the existing methods.
{"title":"Intrusion Detection in Online Controller of Digital Microfluidic Biochips","authors":"Sudeep Basu, S. Saha, Indrajit Pan","doi":"10.1109/CICN.2014.215","DOIUrl":"https://doi.org/10.1109/CICN.2014.215","url":null,"abstract":"Efficient and cost optimal feature of micro fluidic based biochips are inspiring in automation of clinical diagnostics. Many laboratory oriented biochemical tests are transfigured into on chip operations. Droplet based micro fluidic is a sub-category of micro fluidic sciences. Actually this type of fluidic device is capable of manipulating multiple droplets concurrently. The main aim of droplet routing in a Digital Micro fluidic Biochip (DMFB) is to find an efficient path for each droplet from a designated source electrode to a destination electrode under different fluidic and static constraints of micro fluidic operations. The whole operation can be make more scalable and controlled through a programmable intelligent controller. In order to match up with the current needs and required flexibility of commercial applications, this intelligent controller has to take care of many issues like pin optimization, cross reference minimization and contamination detection during routing. This makes the task of intelligent controller quite complex and challenging. These online controllers need to control multiple biochip boards at different time intervals to promote optimum resource and time utilization. However, online controllers are very susceptible to wide range of cyber attacks. In recent literature, varieties of cyber physical attacks have been reported which cause remarkable impairment on the operation of physical system. This proposed method is able to adjudge such malicious operations at the physical system level. This will help to monitor the behavior of the physical operation and can stall it under any abnormality in operation. Experimental findings show that the proposed technique can detect the errors and superfluous operations accurately with minimum consumption of computing resources. Comparative performance of error detection efficiency shows betterment over the existing methods.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"74 1","pages":"1021-1025"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75520322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Wireless Personal Area Network is a network of interconnecting devices centered around an individual's work space. Wireless Sensor Networks as well as Body Area Networks can be used in a Wireless Personal Area Network. The IEEE 802.15 group is specifically concentrated on the standardization of the Wireless Personal Area Networks and also categorizes Wireless Sensor Networks (low powered) in the IEEE 802.15.4 standard. Body Area Networks are defined by the IEEE 802.15.6 standard. In this paper, both IEEE 802.15.4 and IEEE 802.15.6 are used on a similar setup with same parameters in order to study the outcome which may arise due to this type of implementation as it may be interesting to gauge the performance of a system of devices meant for a particular standard used with another standard.
{"title":"Comparative Analysis of IEEE 802.15.4 and IEEE 802.15.6 Standards","authors":"Manvir Singh, A. Verma","doi":"10.1109/CICN.2014.89","DOIUrl":"https://doi.org/10.1109/CICN.2014.89","url":null,"abstract":"A Wireless Personal Area Network is a network of interconnecting devices centered around an individual's work space. Wireless Sensor Networks as well as Body Area Networks can be used in a Wireless Personal Area Network. The IEEE 802.15 group is specifically concentrated on the standardization of the Wireless Personal Area Networks and also categorizes Wireless Sensor Networks (low powered) in the IEEE 802.15.4 standard. Body Area Networks are defined by the IEEE 802.15.6 standard. In this paper, both IEEE 802.15.4 and IEEE 802.15.6 are used on a similar setup with same parameters in order to study the outcome which may arise due to this type of implementation as it may be interesting to gauge the performance of a system of devices meant for a particular standard used with another standard.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"31 1","pages":"370-373"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74543670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Routing in Vehicular Ad hoc Network (VANET) plays a vital role data dissemination. Proactive and reactive routing of Mobile ad hoc networks (MANET) does not suit VANET owing to higher mobility. Hence researchers have proposed geographic routing protocols which are location based. They do not depend on routing tables as in MANET. These routing protocols have been classified into: Delay Tolerant (DTN), Non Delay Tolerant (N-DTN) and Hybrid. Most of the routing protocols in N-DTN follow greedy strategy. In scenarios where immediate neighbor towards the destination is not available, greedy mode fails. To overcome this researchers have come up with several recovery strategies. This paper focuses on the performance evaluation of the recovery strategy adopted by the various greedy routing protocols proposed for VANETs.
{"title":"Evaluation of the Greedy Recovery Strategy in VANETs","authors":"D. Nithya, N. Kumari","doi":"10.1109/CICN.2014.91","DOIUrl":"https://doi.org/10.1109/CICN.2014.91","url":null,"abstract":"Routing in Vehicular Ad hoc Network (VANET) plays a vital role data dissemination. Proactive and reactive routing of Mobile ad hoc networks (MANET) does not suit VANET owing to higher mobility. Hence researchers have proposed geographic routing protocols which are location based. They do not depend on routing tables as in MANET. These routing protocols have been classified into: Delay Tolerant (DTN), Non Delay Tolerant (N-DTN) and Hybrid. Most of the routing protocols in N-DTN follow greedy strategy. In scenarios where immediate neighbor towards the destination is not available, greedy mode fails. To overcome this researchers have come up with several recovery strategies. This paper focuses on the performance evaluation of the recovery strategy adopted by the various greedy routing protocols proposed for VANETs.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"43 1","pages":"380-384"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72976767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. A. Rishikeshan, S. Katiyar, V. N. Vishnu Mahesh
Digital Elevation Model (DEM) is a numerical representation of topography and is made up of equal-sized grid cells, each with a value of elevation. The DEMs that were generated from the spot heights by general interpolation techniques namely Inverse Distance Weighted (IDW), Kriging, Topo to Raster, Natural Neighbor (NN) and Spline approaches have been compared. The relative performance of each method depends on various ground parameters and spatial distribution of sampling points. In this research investigation, performance of the above mentioned five interpolation methods have been evaluated by generating and validating the DEM from Differential Global Positioning System (DGPS) data in the ArcGIS software. With respect to our sample observations' spatial distribution and densities, the investigation results have shown that IDW method is giving better performance in plane and mild slope area, Natural Neighbor provides better performance in steep slope and whole area as compared to other methods.
数字高程模型(DEM)是地形的数字表示,由大小相等的网格单元组成,每个网格单元都有一个高程值。比较了常用插值方法(逆距离加权法、Kriging法、Topo to Raster法、自然邻域法和样条法)对斑点高度产生的dem。每种方法的相对性能取决于各种地面参数和采样点的空间分布。本研究通过在ArcGIS软件中对差分全球定位系统(DGPS)数据生成DEM并进行验证,对上述五种插值方法的性能进行了评价。就样本观测的空间分布和密度而言,调查结果表明,IDW法在平面和缓坡区域具有较好的效果,而Natural Neighbor法在陡坡和全区域具有较好的效果。
{"title":"Detailed Evaluation of DEM Interpolation Methods in GIS Using DGPS Data","authors":"C. A. Rishikeshan, S. Katiyar, V. N. Vishnu Mahesh","doi":"10.1109/CICN.2014.148","DOIUrl":"https://doi.org/10.1109/CICN.2014.148","url":null,"abstract":"Digital Elevation Model (DEM) is a numerical representation of topography and is made up of equal-sized grid cells, each with a value of elevation. The DEMs that were generated from the spot heights by general interpolation techniques namely Inverse Distance Weighted (IDW), Kriging, Topo to Raster, Natural Neighbor (NN) and Spline approaches have been compared. The relative performance of each method depends on various ground parameters and spatial distribution of sampling points. In this research investigation, performance of the above mentioned five interpolation methods have been evaluated by generating and validating the DEM from Differential Global Positioning System (DGPS) data in the ArcGIS software. With respect to our sample observations' spatial distribution and densities, the investigation results have shown that IDW method is giving better performance in plane and mild slope area, Natural Neighbor provides better performance in steep slope and whole area as compared to other methods.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"42 1","pages":"666-671"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72787417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the last few decades many Arabic question answering systems have been developed. These systems may extract answers from texts or web-pages. None of these systems make use of question answering database where user can present questions in natural language which differ from the stored questions. The proposed system uses information retrieval approaches to get to the closest answers to the input question, so the system gives partially or totally correct answers. The Latent Semantic Indexing (LSI) is implemented to enhance the resultant selections. Arabic natural language processing is used in the proposed system along with LSI.
{"title":"Enhancing Arabic Question Answering System","authors":"Aml Ibrahim Kamal, Mostafa Abd Azim, M. Mahmoud","doi":"10.1109/CICN.2014.143","DOIUrl":"https://doi.org/10.1109/CICN.2014.143","url":null,"abstract":"During the last few decades many Arabic question answering systems have been developed. These systems may extract answers from texts or web-pages. None of these systems make use of question answering database where user can present questions in natural language which differ from the stored questions. The proposed system uses information retrieval approaches to get to the closest answers to the input question, so the system gives partially or totally correct answers. The Latent Semantic Indexing (LSI) is implemented to enhance the resultant selections. Arabic natural language processing is used in the proposed system along with LSI.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"33 2 1","pages":"641-645"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74126888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}