Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940828
S. Laxmaiah, T. Madhu, K. Kishore
802.11i defines the Robust Security Network Association (RSNA) establishment procedure to provide strong mutual authentications and generate fresh Transient keys (TKs) for the data confidentiality protocols. 802.11i RSNA establishment procedure consists of 802.1X, which provides high security by using dynamic Authentication and Key Management. It introduces latency due to the addition of extra messages thereby increasing the roam time. Long delays during roaming will affect the applications like Voice over IP over Wireless Local Area Network (VoWLAN) and streaming video and further will have serious impact on seamless handovers in wireless LANs. To overcome this issue, key caching techniques such as Cisco's Centralized Key Management (CCKM) and Opportunistic Key Caching (OKC) are introduced. Further with these techniques, roam time taken by the wireless clients can also be reduced.
802.11i定义了强健安全网络协会(Robust Security Network Association, RSNA)的建立过程,为数据保密协议提供强大的相互认证和生成新的瞬态密钥(Transient keys, tk)。802.11i RSNA建立过程由802.1X组成,通过动态认证和密钥管理提供了很高的安全性。它引入了延迟,因为增加了额外的消息,从而增加了漫游时间。漫游期间的长时间延迟将影响诸如VoWLAN (Voice over IP over Wireless Local Area Network)和流媒体视频等应用,并进一步对无线局域网的无缝切换产生严重影响。为了克服这个问题,引入了密钥缓存技术,如思科的集中式密钥管理(CCKM)和机会式密钥缓存(OKC)。此外,通过这些技术,还可以减少无线客户机所花费的漫游时间。
{"title":"Analysis of secure fast roaming techniques with coexistence of 802.1x","authors":"S. Laxmaiah, T. Madhu, K. Kishore","doi":"10.1109/WIRELESSVITAE.2011.5940828","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940828","url":null,"abstract":"802.11i defines the Robust Security Network Association (RSNA) establishment procedure to provide strong mutual authentications and generate fresh Transient keys (TKs) for the data confidentiality protocols. 802.11i RSNA establishment procedure consists of 802.1X, which provides high security by using dynamic Authentication and Key Management. It introduces latency due to the addition of extra messages thereby increasing the roam time. Long delays during roaming will affect the applications like Voice over IP over Wireless Local Area Network (VoWLAN) and streaming video and further will have serious impact on seamless handovers in wireless LANs. To overcome this issue, key caching techniques such as Cisco's Centralized Key Management (CCKM) and Opportunistic Key Caching (OKC) are introduced. Further with these techniques, roam time taken by the wireless clients can also be reduced.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"87 19 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88515910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940865
K. Harikrishna, T. Rao
Increasing the performance is the best criterion for developing any communication system. The work presented here is aimed at increasing the speed & performance of the OFDMA (Orthogonal Frequency-Division Multiple Access) modulator and demodulator. This paper presents a high level implementation of a high performance FFT for OFDM Modulator and Demodulator. The design has been coded in Verilog and targeted into Xilinx Spartan 3 FPGAs. The developed OFDMA communication structure is then targeted to the OFDMA based WiMAX communication modules, for increasing their efficiency by utilizing FPGA based FFT algorithm.
{"title":"FPGA based FFT algorithm implementation in WiMAX communications system","authors":"K. Harikrishna, T. Rao","doi":"10.1109/WIRELESSVITAE.2011.5940865","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940865","url":null,"abstract":"Increasing the performance is the best criterion for developing any communication system. The work presented here is aimed at increasing the speed & performance of the OFDMA (Orthogonal Frequency-Division Multiple Access) modulator and demodulator. This paper presents a high level implementation of a high performance FFT for OFDM Modulator and Demodulator. The design has been coded in Verilog and targeted into Xilinx Spartan 3 FPGAs. The developed OFDMA communication structure is then targeted to the OFDMA based WiMAX communication modules, for increasing their efficiency by utilizing FPGA based FFT algorithm.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75490898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940891
T. Maseng, Magnus Skjegstad
A distributed architecture for a commercial system for sharing the frequency spectrum is presented. This is obtained by running a new protocol called Frequency Resource Protocol. There are many challenges remaining, but none of these appear unrealistic to solve. Once a trial system has been demonstrated which is underway, the commercial incentives for launching this in terms of a realistic business model remains to be presented and will hopefully result in a standard used by many.
{"title":"Cognitive Radio and the Frequency Resource Protocol (FRP)","authors":"T. Maseng, Magnus Skjegstad","doi":"10.1109/WIRELESSVITAE.2011.5940891","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940891","url":null,"abstract":"A distributed architecture for a commercial system for sharing the frequency spectrum is presented. This is obtained by running a new protocol called Frequency Resource Protocol. There are many challenges remaining, but none of these appear unrealistic to solve. Once a trial system has been demonstrated which is underway, the commercial incentives for launching this in terms of a realistic business model remains to be presented and will hopefully result in a standard used by many.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90235669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940875
P. Balamuralidhar
Ever increasing demand for communication bandwidth to meet the needs of population across various demography of India is is in the focus of government, operators and technology providers. Need for managing Spectrum as a scarce resource is well understood and explorations for efficient spectrum utilization is a national priority. Dynamic shared and opportunistic spectrum access and schemes for utilization of TV white spaces are of interest to the stake holders. An overview of the digital dividend with cognitive access and related opportunities in the context of India is discussed in this paper.1
{"title":"Regulatory aspects and opportunities of TV white spaces in India","authors":"P. Balamuralidhar","doi":"10.1109/WIRELESSVITAE.2011.5940875","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940875","url":null,"abstract":"Ever increasing demand for communication bandwidth to meet the needs of population across various demography of India is is in the focus of government, operators and technology providers. Need for managing Spectrum as a scarce resource is well understood and explorations for efficient spectrum utilization is a national priority. Dynamic shared and opportunistic spectrum access and schemes for utilization of TV white spaces are of interest to the stake holders. An overview of the digital dividend with cognitive access and related opportunities in the context of India is discussed in this paper.1","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"73 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87372507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940882
S. Kyriazakos, N. Prasad
Delivery of eHealth and eInclusion services is a topic that has already been addressed the last decades. The evolution of Internet and technology in general, enable the deployment of reliable infrastructures to even run life critical services, while inclusion of people who live in remote places is achieved through different channels available. Nevertheless systems and services for elderly people with mild dementia, which is a population that is rapidly increasing, is not tackled yet in a holistic way. There are services available that can serve some of the user requirements, but there is a clear lack of integrated solutions focusing on the elderly. Obviously this is a technological and social challenge and has triggered the initiative of ISISEMD project, which is described in this paper.
{"title":"Delivery of eHealth and eInclusion services for elderly people with mild dementia","authors":"S. Kyriazakos, N. Prasad","doi":"10.1109/WIRELESSVITAE.2011.5940882","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940882","url":null,"abstract":"Delivery of eHealth and eInclusion services is a topic that has already been addressed the last decades. The evolution of Internet and technology in general, enable the deployment of reliable infrastructures to even run life critical services, while inclusion of people who live in remote places is achieved through different channels available. Nevertheless systems and services for elderly people with mild dementia, which is a population that is rapidly increasing, is not tackled yet in a holistic way. There are services available that can serve some of the user requirements, but there is a clear lack of integrated solutions focusing on the elderly. Obviously this is a technological and social challenge and has triggered the initiative of ISISEMD project, which is described in this paper.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"15 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87781704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940895
Ram Kumar, F. Reichert
Ad hoc and Wireless Sensor Networks (WSNs) form a challenging domain for existing network protocols and paradigms to fit into. The traditional models conceived for wired networking and adapted for wireless and mobile environments provide an inefficient and ungraceful outcome when exercised against highly dynamic and highly mobile nature of ad hoc wireless sensor networks. Efforts are being made to tweak existing (and sometimes create from scratch) principles and models that can provide a concrete framework for such newer paradigms. The momentum of the traditional layered architecture carried over from the wired networks to infrastructure based wireless networks pushes the same approaches as the de facto standard for the new ad hoc WSNs. We argue that such an approach conflicts with the long term prospects of the new paradigms. Using a network architecture designed for static nodes, albeit with tweaks (such as cross-layering), to address a completely different model of communications with modalities beyond the scope of both wired and infrastructure based wireless networks is not the right path to follow. We present a new way of thinking about the network abstractions, away from the hierarchical layers, towards network functionality as layer-less services. Further, we propose the approaches that can be utilized to standardize this approach in the long term.
{"title":"Towards a layer-less network architecture — A case from Wireless Sensor Networks","authors":"Ram Kumar, F. Reichert","doi":"10.1109/WIRELESSVITAE.2011.5940895","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940895","url":null,"abstract":"Ad hoc and Wireless Sensor Networks (WSNs) form a challenging domain for existing network protocols and paradigms to fit into. The traditional models conceived for wired networking and adapted for wireless and mobile environments provide an inefficient and ungraceful outcome when exercised against highly dynamic and highly mobile nature of ad hoc wireless sensor networks. Efforts are being made to tweak existing (and sometimes create from scratch) principles and models that can provide a concrete framework for such newer paradigms. The momentum of the traditional layered architecture carried over from the wired networks to infrastructure based wireless networks pushes the same approaches as the de facto standard for the new ad hoc WSNs. We argue that such an approach conflicts with the long term prospects of the new paradigms. Using a network architecture designed for static nodes, albeit with tweaks (such as cross-layering), to address a completely different model of communications with modalities beyond the scope of both wired and infrastructure based wireless networks is not the right path to follow. We present a new way of thinking about the network abstractions, away from the hierarchical layers, towards network functionality as layer-less services. Further, we propose the approaches that can be utilized to standardize this approach in the long term.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"115 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78722953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940857
K. Doppler, C. Ribeiro, Jarkko Kneckt
Device-to-Device communications with automated connectivity to sensors, machines and other users is an important enabler for a multitude of use cases with local social networks as one example. In this paper we focus on the main challenges to build a seamless user experience. In particular, we present a novel device beaconing scheme to facilitate service and device discovery. Moreover, the mechanism enables the exchange of small data packets and facilitates the connection setup of a suitable transport radio. We discuss the energy efficiency of the proposed device discovery mechanism and evaluate the capability to form a network in a residential scenario with different device densities.
{"title":"Advances in D2D communications: Energy efficient service and device discovery radio","authors":"K. Doppler, C. Ribeiro, Jarkko Kneckt","doi":"10.1109/WIRELESSVITAE.2011.5940857","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940857","url":null,"abstract":"Device-to-Device communications with automated connectivity to sensors, machines and other users is an important enabler for a multitude of use cases with local social networks as one example. In this paper we focus on the main challenges to build a seamless user experience. In particular, we present a novel device beaconing scheme to facilitate service and device discovery. Moreover, the mechanism enables the exchange of small data packets and facilitates the connection setup of a suitable transport radio. We discuss the energy efficiency of the proposed device discovery mechanism and evaluate the capability to form a network in a residential scenario with different device densities.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82188293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940879
Mihai Gavrilescu, Valentin Andrei, E. Popovici, Tiberius P. Beganu, R. Nastase, O. Fratu, S. Halunga
In this paper we describe a context-aware reconfigurable system, which implements the IEEE 802.21 Media Independent Handover (MIH) standard for interoperability between wireless hybrid access networks. The proposed approach uses vertical handover prediction algorithms to improve the resource management decisions, through access to our Web Service implementation of the Media Independent Information Service (MIIS), which stores previously acquired information about surrounding hybrid access networks. Various prediction alternatives are discussed, and two proposed algorithms are evaluated, on our prototype implementation of the system.
{"title":"Context-aware reconfigurable interoperability for vertical handover in wireless communications","authors":"Mihai Gavrilescu, Valentin Andrei, E. Popovici, Tiberius P. Beganu, R. Nastase, O. Fratu, S. Halunga","doi":"10.1109/WIRELESSVITAE.2011.5940879","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940879","url":null,"abstract":"In this paper we describe a context-aware reconfigurable system, which implements the IEEE 802.21 Media Independent Handover (MIH) standard for interoperability between wireless hybrid access networks. The proposed approach uses vertical handover prediction algorithms to improve the resource management decisions, through access to our Web Service implementation of the Media Independent Information Service (MIIS), which stores previously acquired information about surrounding hybrid access networks. Various prediction alternatives are discussed, and two proposed algorithms are evaluated, on our prototype implementation of the system.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"27 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87267832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940934
A. Boni, C. Stallo, T. Rossi, Marina Ruggieri, P. D. Nardo
In the last years Game Theory (GT) has been widely used in wireless technologies to model medium access, power control or resource exchange. In order to have a wider vision of the problem and describe the evolution of such networks, Evolutionary Game Theory (EGT) is currently considered as an important tool. This theory has been applied in biology since the seventies to describe animals' behaviour. We applied the theory to a new field of research and we describe how it could provide very interesting results. Cardiac diseases represent one of the biggest death causes in modern society. Despite their importance, current therapies do not give an efficient solution to the problem. However, stem cells research could represent a future hope for a more efficient solution. In particular, there is currently a great interest in myocardial tissue generation from stem cells cultures in 3D bio-active scaffolds. Those polymeric structures intend to mimic the environment inside the heart where cardiac cells, cardiomyocytes, are generated. Well designed scaffolds along with chemical substances contribute to the differentiation process of the stem cell. How this happens, and how a stem cells population becomes a myocardial tissue? We studied a solution using Evolutionary Game Theory (EGT). We set a very simple model to describe the basic concepts of EGT and present some early results.
{"title":"Evolutionary Game Theory: An innovative Tool for ad-hoc networks modeling applied to stem cells interaction in bio-active scaffolds","authors":"A. Boni, C. Stallo, T. Rossi, Marina Ruggieri, P. D. Nardo","doi":"10.1109/WIRELESSVITAE.2011.5940934","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940934","url":null,"abstract":"In the last years Game Theory (GT) has been widely used in wireless technologies to model medium access, power control or resource exchange. In order to have a wider vision of the problem and describe the evolution of such networks, Evolutionary Game Theory (EGT) is currently considered as an important tool. This theory has been applied in biology since the seventies to describe animals' behaviour. We applied the theory to a new field of research and we describe how it could provide very interesting results. Cardiac diseases represent one of the biggest death causes in modern society. Despite their importance, current therapies do not give an efficient solution to the problem. However, stem cells research could represent a future hope for a more efficient solution. In particular, there is currently a great interest in myocardial tissue generation from stem cells cultures in 3D bio-active scaffolds. Those polymeric structures intend to mimic the environment inside the heart where cardiac cells, cardiomyocytes, are generated. Well designed scaffolds along with chemical substances contribute to the differentiation process of the stem cell. How this happens, and how a stem cells population becomes a myocardial tissue? We studied a solution using Evolutionary Game Theory (EGT). We set a very simple model to describe the basic concepts of EGT and present some early results.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"47 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84078574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940835
J. Norman, Paulraj Joseph
Applications of wireless sensor networks often include sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Lacking security services in the routing protocols, WSNs are vulnerable to many kinds of attacks. A secure routing in WSN must address several challenges: vulnerable wireless communication, highly resource-constrained senor nodes in terms of processing power, storage, and battery life, and the risk of physically captured. However, a few of existing routing protocols for WSNs have been designed with security as a goal. As sensors communicate in a multi-hop fashion, identification of secure neighbours in a mobile topology is critical for routing. Since these devices are resource constrained, we propose a secure neighbour authentication protocol based on a variant of HB, an authentication protocol for RFID devices. Simulation results show that the routing protocol SHLAODV is secure and energy efficient.
{"title":"Secure neighbour authentication in wireless sensor networks","authors":"J. Norman, Paulraj Joseph","doi":"10.1109/WIRELESSVITAE.2011.5940835","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940835","url":null,"abstract":"Applications of wireless sensor networks often include sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Lacking security services in the routing protocols, WSNs are vulnerable to many kinds of attacks. A secure routing in WSN must address several challenges: vulnerable wireless communication, highly resource-constrained senor nodes in terms of processing power, storage, and battery life, and the risk of physically captured. However, a few of existing routing protocols for WSNs have been designed with security as a goal. As sensors communicate in a multi-hop fashion, identification of secure neighbours in a mobile topology is critical for routing. Since these devices are resource constrained, we propose a secure neighbour authentication protocol based on a variant of HB, an authentication protocol for RFID devices. Simulation results show that the routing protocol SHLAODV is secure and energy efficient.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"16 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81524717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}