Infrared data transmission used to be a common communication means for devices that are spatially close to each other. Despite its reliability and cost efficiency, infrared communication has virtually disappeared as its bandwidth is but sufficient in many application domains. This paper reevaluates to what extent built-in cameras of up-to-date smart phones can be used as infrared receivers. It turns out that small data amounts, such as IDs, tags, and network addresses, can be easily recognized, which makes infrared-capable smart phones suitable of automatic target selection and setup.
{"title":"Proof-of-Concept: Infrared Transmission Using Smart Phone Cameras","authors":"Rene Romann","doi":"10.1109/WAINA.2015.108","DOIUrl":"https://doi.org/10.1109/WAINA.2015.108","url":null,"abstract":"Infrared data transmission used to be a common communication means for devices that are spatially close to each other. Despite its reliability and cost efficiency, infrared communication has virtually disappeared as its bandwidth is but sufficient in many application domains. This paper reevaluates to what extent built-in cameras of up-to-date smart phones can be used as infrared receivers. It turns out that small data amounts, such as IDs, tags, and network addresses, can be easily recognized, which makes infrared-capable smart phones suitable of automatic target selection and setup.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"17 1","pages":"658-661"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85540114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In our previous work, it has been shown that the students can improve the learning process by using smartphones. For the professors of the university, it is difficult to offer all necessary information to the students. In addition, they cannot provide the information to satisfy all students because the quantity of knowledge of each student attending a lecture is different. Therefore, for the lectures of a higher level than intermediate level, the students should study the learning materials by themselves. In the previous work, it was presented an interactive learning process in order to improve the students learning motivation and the self-learning time. However, the progress speed of a lecture was not good. In this paper, to solve this problem, we propose an active learning system for student's self-learning.
{"title":"An Active Learning System Using Smartphone for Improving Students Learning Concentration","authors":"Noriyasu Yamamoto","doi":"10.1109/WAINA.2015.87","DOIUrl":"https://doi.org/10.1109/WAINA.2015.87","url":null,"abstract":"In our previous work, it has been shown that the students can improve the learning process by using smartphones. For the professors of the university, it is difficult to offer all necessary information to the students. In addition, they cannot provide the information to satisfy all students because the quantity of knowledge of each student attending a lecture is different. Therefore, for the lectures of a higher level than intermediate level, the students should study the learning materials by themselves. In the previous work, it was presented an interactive learning process in order to improve the students learning motivation and the self-learning time. However, the progress speed of a lecture was not good. In this paper, to solve this problem, we propose an active learning system for student's self-learning.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"199-203"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81602383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuta Taniguchi, Daiki Monzen, Lutfiana Sari Ariestien, Daisuke Ikeda
Geotagging is an interesting feature of social media services which adds metadata of geographical locations to photos, web sites or messages. From a different perspective, geotagging can be seen as annotating geographical locations conversely by images or texts. It is a challenging task to summarize such annotations and uncover topical geographical regions characterized by specific topics locally since such knowledge is useful for location-based advertising and so on. Determining topical regions is not trivial since topical region's topic and geographical area are dependent on each other. In this paper, we aim to discover overlapping topical regions from geotagged text messages (tweets) collected from Twitter. To this end, we employ Mean Shift clustering algorithm and an integrated vector space of a geographic and semantic vector spaces. Running Mean Shift algorithm on the vector space, we can evaluate both geographical density and semantic density of tweets simultaneously. Subsequently, our method determines regions of clusters detected by Mean Shift algorithm applying the kernel density estimation on clustered tweets in the geographical space. Our experiments show clusters get broken into several sub-clusters that overlap each other when we increase the weight of semantic density over that of geographical density.
{"title":"Discover Overlapping Topical Regions by Geo-Semantic Clustering of Tweets","authors":"Yuta Taniguchi, Daiki Monzen, Lutfiana Sari Ariestien, Daisuke Ikeda","doi":"10.1109/WAINA.2015.85","DOIUrl":"https://doi.org/10.1109/WAINA.2015.85","url":null,"abstract":"Geotagging is an interesting feature of social media services which adds metadata of geographical locations to photos, web sites or messages. From a different perspective, geotagging can be seen as annotating geographical locations conversely by images or texts. It is a challenging task to summarize such annotations and uncover topical geographical regions characterized by specific topics locally since such knowledge is useful for location-based advertising and so on. Determining topical regions is not trivial since topical region's topic and geographical area are dependent on each other. In this paper, we aim to discover overlapping topical regions from geotagged text messages (tweets) collected from Twitter. To this end, we employ Mean Shift clustering algorithm and an integrated vector space of a geographic and semantic vector spaces. Running Mean Shift algorithm on the vector space, we can evaluate both geographical density and semantic density of tweets simultaneously. Subsequently, our method determines regions of clusters detected by Mean Shift algorithm applying the kernel density estimation on clustered tweets in the geographical space. Our experiments show clusters get broken into several sub-clusters that overlap each other when we increase the weight of semantic density over that of geographical density.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"552-557"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79875255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Takahagi, Tomoyuki Ishida, S. Noda, Akira Sakuraba, Noriki Uchida, Y. Shibata
In this research, we built the fire fighting support system for supporting the fire fighting of the volunteer fire company. This system is the mobile application based on Web-GIS. By using this system, the fire corps volunteers can confirm the fire fighting water sources around the fire site in real time. In fire fighting, secure of the fire fighting water sources are the most important. Therefore, this system can expect a big effect from the fire fighting of the volunteer fire company, since the fire fighting water sources around the fire site can be visually confirmed on a mobile terminal device.
{"title":"Proposal of the Fire Fighting Support System for the Volunteer Fire Company","authors":"K. Takahagi, Tomoyuki Ishida, S. Noda, Akira Sakuraba, Noriki Uchida, Y. Shibata","doi":"10.1109/WAINA.2015.12","DOIUrl":"https://doi.org/10.1109/WAINA.2015.12","url":null,"abstract":"In this research, we built the fire fighting support system for supporting the fire fighting of the volunteer fire company. This system is the mobile application based on Web-GIS. By using this system, the fire corps volunteers can confirm the fire fighting water sources around the fire site in real time. In fire fighting, secure of the fire fighting water sources are the most important. Therefore, this system can expect a big effect from the fire fighting of the volunteer fire company, since the fire fighting water sources around the fire site can be visually confirmed on a mobile terminal device.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"11 1","pages":"484-489"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85247379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Lam, Nelson Wai-Hung Tsang, Song Han, J. Ng, Sze-Wei Tam, Ajit Nath
In this paper, we introduce SmartMind, an activity tracking and monitoring system to help Alzheimer's diseases (AD) patients to live independently within their living rooms while providing emergent help and support when necessary. Allowing AD patients to handle their daily activities not only can release some of the burdens on their families and caregivers, but also is highly important to help them regain confidence towards a healthy life and reduce the degeneration rates of their memories. The daily activities of a patient captured from SmartMind can also serve as important indicators to describe his/her normal living habit (NLH). By checking with NLH, the patient's current health status can be estimated on a daily basis.
{"title":"SmartMind: Activity Tracking and Monitoring for Patients with Alzheimer's Disease","authors":"K. Lam, Nelson Wai-Hung Tsang, Song Han, J. Ng, Sze-Wei Tam, Ajit Nath","doi":"10.1109/AINA.2015.221","DOIUrl":"https://doi.org/10.1109/AINA.2015.221","url":null,"abstract":"In this paper, we introduce SmartMind, an activity tracking and monitoring system to help Alzheimer's diseases (AD) patients to live independently within their living rooms while providing emergent help and support when necessary. Allowing AD patients to handle their daily activities not only can release some of the burdens on their families and caregivers, but also is highly important to help them regain confidence towards a healthy life and reduce the degeneration rates of their memories. The daily activities of a patient captured from SmartMind can also serve as important indicators to describe his/her normal living habit (NLH). By checking with NLH, the patient's current health status can be estimated on a daily basis.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"453-460"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85294935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arcangelo Castiglione, A. D. Santis, Raffaele Pizzolante, Aniello Castiglione, V. Loia, F. Palmieri
Functional Magnetic Resonance Imaging provides researchers with an effective and non-invasive tool to understand cerebral functions and correlate them with brain activities. With the ever increasing diffusion of the Internet such images may be exchanged in several ways, thus allowing new research and medical services. On the other hand, ensuring the security of exchanged fMRI data becomes a main concern, due to the special characteristics arising from strict ethics, legislative and diagnostic implications. So it is very important to prevent unauthorized manipulation and misappropriation of such images. The risks are increased when dealing with open environments like the Internet. For this reason, security mechanisms which ensure protection of such data are required. In this paper we introduce a watermarking scheme explicitly designed for this kind of images. In particular, such a scheme belongs to the category of fragile reversible watermarking. The validity of this scheme has been demonstrated through testing. Finally, by using the proposed scheme, we show how to create a distributed security solution that models a multi-domain environment, for ensuring authenticity and integrity of such images.
{"title":"On the Protection of fMRI Images in Multi-domain Environments","authors":"Arcangelo Castiglione, A. D. Santis, Raffaele Pizzolante, Aniello Castiglione, V. Loia, F. Palmieri","doi":"10.1109/AINA.2015.224","DOIUrl":"https://doi.org/10.1109/AINA.2015.224","url":null,"abstract":"Functional Magnetic Resonance Imaging provides researchers with an effective and non-invasive tool to understand cerebral functions and correlate them with brain activities. With the ever increasing diffusion of the Internet such images may be exchanged in several ways, thus allowing new research and medical services. On the other hand, ensuring the security of exchanged fMRI data becomes a main concern, due to the special characteristics arising from strict ethics, legislative and diagnostic implications. So it is very important to prevent unauthorized manipulation and misappropriation of such images. The risks are increased when dealing with open environments like the Internet. For this reason, security mechanisms which ensure protection of such data are required. In this paper we introduce a watermarking scheme explicitly designed for this kind of images. In particular, such a scheme belongs to the category of fragile reversible watermarking. The validity of this scheme has been demonstrated through testing. Finally, by using the proposed scheme, we show how to create a distributed security solution that models a multi-domain environment, for ensuring authenticity and integrity of such images.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"18 1","pages":"476-481"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83756625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geographic routing protocols have been developed for efficient V2V and V2I communications in vehicular ad hoc networks (VANETs). Existing approaches tackle challenges in urban environments such as dynamic vehicular network topology. However, in more realistic urban environments, vehicular networks are highly dynamic due to the complicated road topology and vehicular mobility, as well as shadowing caused by buildings. Therefore, traditional protocols based on the node-oriented approach could not be robust in such environments and suffer the trade-off between reach ability and scalability. In this paper, we propose a road-oriented geographic routing protocol with a road-based path definition. It integrates the sender-based forwarder suppression and receiver-based opportunistic forwarding by exploiting road map information as well as vehicular connectivity. A sender selects a road segment as a next-hop, and each qualified receiver carries out the Contention-Based Forwarding (CBF). We evaluate the proposed protocol and existing protocols through network simulations in an urban scenario with a real road map. Following simulation results, we discuss availability and remaining challenges in terms of reach ability as well as scalability.
{"title":"Road-Oriented Geographic Routing Protocol for Urban Vehicular Ad Hoc Networks","authors":"Ryosuke Akamatsu, Keiji Obara, H. Shigeno","doi":"10.1109/WAINA.2015.72","DOIUrl":"https://doi.org/10.1109/WAINA.2015.72","url":null,"abstract":"Geographic routing protocols have been developed for efficient V2V and V2I communications in vehicular ad hoc networks (VANETs). Existing approaches tackle challenges in urban environments such as dynamic vehicular network topology. However, in more realistic urban environments, vehicular networks are highly dynamic due to the complicated road topology and vehicular mobility, as well as shadowing caused by buildings. Therefore, traditional protocols based on the node-oriented approach could not be robust in such environments and suffer the trade-off between reach ability and scalability. In this paper, we propose a road-oriented geographic routing protocol with a road-based path definition. It integrates the sender-based forwarder suppression and receiver-based opportunistic forwarding by exploiting road map information as well as vehicular connectivity. A sender selects a road segment as a next-hop, and each qualified receiver carries out the Contention-Based Forwarding (CBF). We evaluate the proposed protocol and existing protocols through network simulations in an urban scenario with a real road map. Following simulation results, we discuss availability and remaining challenges in terms of reach ability as well as scalability.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"353 1","pages":"721-726"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82608756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
About 5 years ago Content Centric Network (CCN) has a role in the communication on diverse devices which had made bandwidth in backbone traffic was rapidly increasing until now, there was a problem in CCN number of users and devices is connected in network increases. We thus propose a new technique to manage bandwidth between backbone traffic and Content Centric Network that combined the concept of Provider Portal for Application (P4P) to managed bandwidth accordingly which measurably number of seed and speed of download time. When we demonstrate transfer some content on simulate network available transmission bandwidth path in auction algorithm to get information for the best path and counting seeder that occur at different times, we found the number of seeder in optimize Content Centric Network was increases more than native Content Centric Network and Hybrid Content Distribution Network (HCDN). The result of demonstrate that implement in CCN has resilient and performance with file downloads are increasing more than native content centric network (CCN) in number of seeders.
{"title":"Optimize Auction Bandwidth in Content Centric Network with Provider Portal for Application","authors":"Wisarut Suesuwan, W. Lilakiatsakun","doi":"10.1109/WAINA.2015.125","DOIUrl":"https://doi.org/10.1109/WAINA.2015.125","url":null,"abstract":"About 5 years ago Content Centric Network (CCN) has a role in the communication on diverse devices which had made bandwidth in backbone traffic was rapidly increasing until now, there was a problem in CCN number of users and devices is connected in network increases. We thus propose a new technique to manage bandwidth between backbone traffic and Content Centric Network that combined the concept of Provider Portal for Application (P4P) to managed bandwidth accordingly which measurably number of seed and speed of download time. When we demonstrate transfer some content on simulate network available transmission bandwidth path in auction algorithm to get information for the best path and counting seeder that occur at different times, we found the number of seeder in optimize Content Centric Network was increases more than native Content Centric Network and Hybrid Content Distribution Network (HCDN). The result of demonstrate that implement in CCN has resilient and performance with file downloads are increasing more than native content centric network (CCN) in number of seeders.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"50 1","pages":"108-116"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80713100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fragmentary in wearable ECG measurement is an unacceptable failure as the lost of information will affect the result of health information analysis. Therefore, there is recent attempt to analyze physical activity information and compare with biological signal to improve the accuracy of health information diagnosis. Furthermore, effective data transmission scheme for Wireless ECG + activity data transmission is another challenge to solve. In this paper, we implement a wearable ECG monitoring system to monitor ECG in real time. Within the system, we deploy abnormal heart rate detection scheme and minimum activity classification scheme to detect abnormal cardiac activity and provide instantaneous feedback of activity status to the user. Finally we also implement a simple data compression algorithm to suppress the size of data packet transmitted for effective data transmission. The whole proposed ECG monitoring system is offering a long time ECG monitoring solution for effective health information analysis.
{"title":"Implementation of the Variable ECG Data Packet Transmission System with Activity State","authors":"Byeong-Gu Ahn, Yun-Hong Noh, Do-Un Jeong","doi":"10.1109/WAINA.2015.98","DOIUrl":"https://doi.org/10.1109/WAINA.2015.98","url":null,"abstract":"Fragmentary in wearable ECG measurement is an unacceptable failure as the lost of information will affect the result of health information analysis. Therefore, there is recent attempt to analyze physical activity information and compare with biological signal to improve the accuracy of health information diagnosis. Furthermore, effective data transmission scheme for Wireless ECG + activity data transmission is another challenge to solve. In this paper, we implement a wearable ECG monitoring system to monitor ECG in real time. Within the system, we deploy abnormal heart rate detection scheme and minimum activity classification scheme to detect abnormal cardiac activity and provide instantaneous feedback of activity status to the user. Finally we also implement a simple data compression algorithm to suppress the size of data packet transmitted for effective data transmission. The whole proposed ECG monitoring system is offering a long time ECG monitoring solution for effective health information analysis.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"6-10"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83258161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donald Elmazi, Elis Kulla, Tetsuya Oda, Evjola Spaho, L. Barolli, K. Uchida
In Wireless Sensor and Actor Network (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters. Different from our previous work, we consider also the actor mobility. The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system selects the actor node in order to have short delays, low energy consumption and proper task assignment.
{"title":"Selection of Actor Nodes in Wireless Sensor and Actor Networks: A Fuzzy Based Method Considering Actor Mobility","authors":"Donald Elmazi, Elis Kulla, Tetsuya Oda, Evjola Spaho, L. Barolli, K. Uchida","doi":"10.1109/WAINA.2015.96","DOIUrl":"https://doi.org/10.1109/WAINA.2015.96","url":null,"abstract":"In Wireless Sensor and Actor Network (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters. Different from our previous work, we consider also the actor mobility. The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system selects the actor node in order to have short delays, low energy consumption and proper task assignment.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"44 1","pages":"304-310"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90213766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}