Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765434
Daria Vazhenina, K. Markov
The Russian language is characterized by very flexible word order, which limits the ability of the standard n-grams to capture important regularities in the data. Moreover, Russian is highly inflectional language with rich morphology, which leads to high out-of-vocabulary word rates. Recently factored language model (FLM) was proposed with the aim of addressing the problems of morphologically rich languages. In this paper, we describe our implementation of the FLM for the Russian language automatic speech recognition (ASR). We investigated the effect of different factors, and propose a strategy to find the best factor set and back-off path. Evaluation experiments showed that FLM can decrease the perplexity as much as 20%. This allows to achieve 4.0% word error rate (WER) relative reduction, which further increases to 6.9% when FLM is interpolated with the conventional 3-gram LM.
{"title":"Factored language modeling for Russian LVCSR","authors":"Daria Vazhenina, K. Markov","doi":"10.1109/ICAWST.2013.6765434","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765434","url":null,"abstract":"The Russian language is characterized by very flexible word order, which limits the ability of the standard n-grams to capture important regularities in the data. Moreover, Russian is highly inflectional language with rich morphology, which leads to high out-of-vocabulary word rates. Recently factored language model (FLM) was proposed with the aim of addressing the problems of morphologically rich languages. In this paper, we describe our implementation of the FLM for the Russian language automatic speech recognition (ASR). We investigated the effect of different factors, and propose a strategy to find the best factor set and back-off path. Evaluation experiments showed that FLM can decrease the perplexity as much as 20%. This allows to achieve 4.0% word error rate (WER) relative reduction, which further increases to 6.9% when FLM is interpolated with the conventional 3-gram LM.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"108 1","pages":"205-211"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77290010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765525
Chih-Lin Hu, Pin-chun Chiu
The study of data dissemination with social relationship in delay-tolerant networks can be significant from the perspective of technical novelty and performance. This paper adopts the time-variant community mobility model to formulate the relationship between user mobility and social community in delay-tolerant networks. With synthetic trace data of various user mobility and community patterns, simulation results show that the proposed model is able to interpret many characteristics of movement behavior and social community structure, accordingly, with a friendly graphic presentation. Therefore, the proposed analysis model can be applied to facilitate the design of social-based data dissemination mechanisms in delay-tolerant networks.
{"title":"Analyzing the influence of mobile social communities on data dissemination in delay-tolerant networks","authors":"Chih-Lin Hu, Pin-chun Chiu","doi":"10.1109/ICAWST.2013.6765525","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765525","url":null,"abstract":"The study of data dissemination with social relationship in delay-tolerant networks can be significant from the perspective of technical novelty and performance. This paper adopts the time-variant community mobility model to formulate the relationship between user mobility and social community in delay-tolerant networks. With synthetic trace data of various user mobility and community patterns, simulation results show that the proposed model is able to interpret many characteristics of movement behavior and social community structure, accordingly, with a friendly graphic presentation. Therefore, the proposed analysis model can be applied to facilitate the design of social-based data dissemination mechanisms in delay-tolerant networks.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"457 1","pages":"685-691"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76692327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765523
Abdurhman Albasir, S. Naik, T. Abdunabi
Mobile web browsing is one of the most commonly used and wide-spread application (app) among smartphone apps. However, the complexity of web-pages is increasing especially if the web-pages are designed for desktop computers. The existence of advertisements (ads) in web-page leads to even higher complexity of the web-pages. This complexity in smartphone's environment where the resources are limited (e.g., battery and bandwidth) is reflected in longer loading time, more energy consumed, and more bytes transferred. In this paper, we classify the web contents into: (i) core information, and (ii) forced "unwanted" information, namely ads. Then, we evaluate resources used for web advertising. Based on the measurements of the cost of web advertising, we propose a framework for mobile browsing that adapts the web-pages delivered to the smartphone, based on the smartphone's current battery level and the network type. The adaptation of the web content is in the form of controlling the amount of ads to be displayed on the web-page. Our system aims to (i) extend smartphone battery life and (ii) preserve the bandwidth needed to download the web-pages while balancing the satisfaction of the publishers of web-pages as well as the end users.
{"title":"Smart mobile web browsing","authors":"Abdurhman Albasir, S. Naik, T. Abdunabi","doi":"10.1109/ICAWST.2013.6765523","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765523","url":null,"abstract":"Mobile web browsing is one of the most commonly used and wide-spread application (app) among smartphone apps. However, the complexity of web-pages is increasing especially if the web-pages are designed for desktop computers. The existence of advertisements (ads) in web-page leads to even higher complexity of the web-pages. This complexity in smartphone's environment where the resources are limited (e.g., battery and bandwidth) is reflected in longer loading time, more energy consumed, and more bytes transferred. In this paper, we classify the web contents into: (i) core information, and (ii) forced \"unwanted\" information, namely ads. Then, we evaluate resources used for web advertising. Based on the measurements of the cost of web advertising, we propose a framework for mobile browsing that adapts the web-pages delivered to the smartphone, based on the smartphone's current battery level and the network type. The adaptation of the web content is in the form of controlling the amount of ads to be displayed on the web-page. Our system aims to (i) extend smartphone battery life and (ii) preserve the bandwidth needed to download the web-pages while balancing the satisfaction of the publishers of web-pages as well as the end users.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"7 1","pages":"671-679"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84845891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765480
Li-Hong Juang, Ming-Ni Wu
Nowadays medical technology makes the inevitable trend of an ageing population. So intelligent home care is an important direction of development of science and technology, in particular, elderly in-home safety management issues become more and more important. In this research, we propose a low of operation algorithm and use the triangular pattern rule, then can quickly detect abnormal movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the abnormal movements of in-home elderly in real time. In this research, we will present a preliminary design and experimental results of abnormal movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt the few characteristic value and the accuracy can reach to 90% a single character posture. Furthermore the accuracy can be up to 100% when a continuous-time sampling criterion and support vector machine (SVM) classifier are taken.
{"title":"Abnormal action tracking using robot vision system","authors":"Li-Hong Juang, Ming-Ni Wu","doi":"10.1109/ICAWST.2013.6765480","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765480","url":null,"abstract":"Nowadays medical technology makes the inevitable trend of an ageing population. So intelligent home care is an important direction of development of science and technology, in particular, elderly in-home safety management issues become more and more important. In this research, we propose a low of operation algorithm and use the triangular pattern rule, then can quickly detect abnormal movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the abnormal movements of in-home elderly in real time. In this research, we will present a preliminary design and experimental results of abnormal movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt the few characteristic value and the accuracy can reach to 90% a single character posture. Furthermore the accuracy can be up to 100% when a continuous-time sampling criterion and support vector machine (SVM) classifier are taken.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"24 1","pages":"438-444"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89081739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765487
Chuan-Feng Chiu, S. J. Hsu, S. Jan
In past years, Cloud computing is gained more attention in industry and academic area. The advance technologies are needed to match the demand of the development of cloud computing. MapReduce is one of the enabling technology. MapReduce is a programming model supporting parallel computation especially for data-intensive cloud computing applications. However, MapReduce needs a master node to coordinate the execution of the parallel computation. This may cause communication bottleneck and single point of failure error. Therefore, in this paper we propose a distributed MapReduce framework based on Distributed Hash Tables to support large scale cloud computing applications.
{"title":"Distributed MapReduce framework using distributed hash table","authors":"Chuan-Feng Chiu, S. J. Hsu, S. Jan","doi":"10.1109/ICAWST.2013.6765487","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765487","url":null,"abstract":"In past years, Cloud computing is gained more attention in industry and academic area. The advance technologies are needed to match the demand of the development of cloud computing. MapReduce is one of the enabling technology. MapReduce is a programming model supporting parallel computation especially for data-intensive cloud computing applications. However, MapReduce needs a master node to coordinate the execution of the parallel computation. This may cause communication bottleneck and single point of failure error. Therefore, in this paper we propose a distributed MapReduce framework based on Distributed Hash Tables to support large scale cloud computing applications.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"38 1","pages":"475-481"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76149384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765531
Wei-Chen Lin, Jiun-Jian Liaw, Chiung-Ta Wu
File Transfer Protocol is the most popular file transfer standard. This FTP can let a computer system connect to the internet via a communication network, and it can also access the system resources from the internet. File server is being downloaded now by TCP/IP protocol, while before it was downloaded by signal server. Due to the limited flow control, the old method could not use download time efficiently. In order to solve the flow control problem, some researchers came up with a distributed file transfer method that can share the document with other users, thus allowing the shortest transfer time using neighboring servers. Although the distributed file transfer can reduce the file transfer time, it was not concerned with the quality of the transfer between two servers, and was inappropriate for file segmentation and transfer, so the file transfer could not attain the optimal transfer efficacy. Based on our research, we propose a new method called Distributed Parallelized File Transfer Protocol (DPFTP). This method is based on Parallelized File Transfer Protocol (P-FTP) and is beneficial to multi-users, as it utilizes server loading and reduces the download time.
{"title":"The Modified parallelized file transfer protocol for multi-users","authors":"Wei-Chen Lin, Jiun-Jian Liaw, Chiung-Ta Wu","doi":"10.1109/ICAWST.2013.6765531","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765531","url":null,"abstract":"File Transfer Protocol is the most popular file transfer standard. This FTP can let a computer system connect to the internet via a communication network, and it can also access the system resources from the internet. File server is being downloaded now by TCP/IP protocol, while before it was downloaded by signal server. Due to the limited flow control, the old method could not use download time efficiently. In order to solve the flow control problem, some researchers came up with a distributed file transfer method that can share the document with other users, thus allowing the shortest transfer time using neighboring servers. Although the distributed file transfer can reduce the file transfer time, it was not concerned with the quality of the transfer between two servers, and was inappropriate for file segmentation and transfer, so the file transfer could not attain the optimal transfer efficacy. Based on our research, we propose a new method called Distributed Parallelized File Transfer Protocol (DPFTP). This method is based on Parallelized File Transfer Protocol (P-FTP) and is beneficial to multi-users, as it utilizes server loading and reduces the download time.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"9 1","pages":"718-724"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78474942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765536
Chih-Hsiao Tsai, Yu-Jie Lin, Han-Ming Chang, Ying-Hong Wang
Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. These sensor nodes are sometimes random deployed, so they have to be aware to their location before starting their tasks. Most sensor nodes need hardware support or receive packets with location information to estimate their location, and this needs lots of time or costs, and may have a huge error. In this paper we present a localization mechanism in wireless sensor networks (MRN). This mechanism can cooperate with node localization algorithm and mobile reference node moving direction scheme. We use a mobile reference node with GPS to move to the whole environment, and we use RSSI and trilateration to estimate unknown nodes' location. We can obtain more unknown nodes location by mobile reference node moving scheme, and will decreases the energy consumption and average location error.
{"title":"Localization mechanism with mobile reference node in grid-based wireless sensor networks","authors":"Chih-Hsiao Tsai, Yu-Jie Lin, Han-Ming Chang, Ying-Hong Wang","doi":"10.1109/ICAWST.2013.6765536","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765536","url":null,"abstract":"Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. These sensor nodes are sometimes random deployed, so they have to be aware to their location before starting their tasks. Most sensor nodes need hardware support or receive packets with location information to estimate their location, and this needs lots of time or costs, and may have a huge error. In this paper we present a localization mechanism in wireless sensor networks (MRN). This mechanism can cooperate with node localization algorithm and mobile reference node moving direction scheme. We use a mobile reference node with GPS to move to the whole environment, and we use RSSI and trilateration to estimate unknown nodes' location. We can obtain more unknown nodes location by mobile reference node moving scheme, and will decreases the energy consumption and average location error.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"6 1","pages":"747-753"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79077162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765526
Zhihao Shang, Wenbo Chen, Q. Ma, Bin Wu
Nowadays, the Internet is flooded with huge traffic, many applications have millions users, a single server is difficult to bear a large number of clients' access, so many application providers will put several servers as a computing unit to provide support for a specific application, usually people will use distributed computing, load balancing technology to complete the work. A typical load balancing technique is to use a dedicated load balancer to forward the client requests to different servers, this technique requires dedicated hardware support, the hardware is expensive, lacks of flexibility and is easy to become a single point failure. There will be a new solution for load balancing with OpenFlow proposed., this paper mainly studies dynamic load balancing technology in the OpenFlow environment, the Controller collected the server running status through the SNMP protocol, and calculated the aggregated load of the severs according to dynamic load balancing scheduling algorithm, the OpenFlow switch will forward the client's request to the server whose aggregated load is smallest, thus minimize the response time of the web server. In the OpenFlow network environment, using this method can brings high flexibility without additional equipment.
{"title":"Design and implementation of server cluster dynamic load balancing based on OpenFlow","authors":"Zhihao Shang, Wenbo Chen, Q. Ma, Bin Wu","doi":"10.1109/ICAWST.2013.6765526","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765526","url":null,"abstract":"Nowadays, the Internet is flooded with huge traffic, many applications have millions users, a single server is difficult to bear a large number of clients' access, so many application providers will put several servers as a computing unit to provide support for a specific application, usually people will use distributed computing, load balancing technology to complete the work. A typical load balancing technique is to use a dedicated load balancer to forward the client requests to different servers, this technique requires dedicated hardware support, the hardware is expensive, lacks of flexibility and is easy to become a single point failure. There will be a new solution for load balancing with OpenFlow proposed., this paper mainly studies dynamic load balancing technology in the OpenFlow environment, the Controller collected the server running status through the SNMP protocol, and calculated the aggregated load of the severs according to dynamic load balancing scheduling algorithm, the OpenFlow switch will forward the client's request to the server whose aggregated load is smallest, thus minimize the response time of the web server. In the OpenFlow network environment, using this method can brings high flexibility without additional equipment.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"171 1","pages":"691-697"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85422193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765430
Akira Saji, K. Tanno, Jie Huang
Recently, we have proposed a 3-D sound system using horizontal arrange loudspeakers by combine the effect of HRTF and the amplitude panning method. In that system, loudspeakers are set at the height of subject's ear level and its sweet-spot is limited by the height of loudspeakers. When listener's ear level is different with loudspeakers, it will cause difficulty of sound localization or breakdown of sound localization. However, it is difficult to adjust properly both the height of loudspeakers and subject's ear level every time. In this paper, we aimed to improve the robustness of the 3-D sound system using vertical loudspeakers array. As a result of experiments, we verify that the loudspeaker arrays can improve the robustness of the 3-D sound system.
{"title":"Improve vertical sweet-spot of 3-D sound system by loudspeaker arrays","authors":"Akira Saji, K. Tanno, Jie Huang","doi":"10.1109/ICAWST.2013.6765430","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765430","url":null,"abstract":"Recently, we have proposed a 3-D sound system using horizontal arrange loudspeakers by combine the effect of HRTF and the amplitude panning method. In that system, loudspeakers are set at the height of subject's ear level and its sweet-spot is limited by the height of loudspeakers. When listener's ear level is different with loudspeakers, it will cause difficulty of sound localization or breakdown of sound localization. However, it is difficult to adjust properly both the height of loudspeakers and subject's ear level every time. In this paper, we aimed to improve the robustness of the 3-D sound system using vertical loudspeakers array. As a result of experiments, we verify that the loudspeaker arrays can improve the robustness of the 3-D sound system.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"15 1","pages":"179-183"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82606722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICAWST.2013.6765417
A. Takeuchi, Y. Manabe, K. Sugawara
In the last decade, soft biometric traits have emerged as more convenient and non-intrusive alternatives for person authentication task. However a soft biometric trait cannot be a main feature for person authentication because it lacks distinctiveness compared with fingerprint, palm vein pattern and so on. Therefore this study proposes a person verification method integrating handwriting motion in the air and a shape of a hand, which can be successively measured by a device (RGB and depth camera). As the result of person verification experiment for 10 subjects, we obtained a good verification performance that FAR is 2% when FRR is 0%.
{"title":"Multimodal soft biometrie verification by hand shape and handwriting motion in the air","authors":"A. Takeuchi, Y. Manabe, K. Sugawara","doi":"10.1109/ICAWST.2013.6765417","DOIUrl":"https://doi.org/10.1109/ICAWST.2013.6765417","url":null,"abstract":"In the last decade, soft biometric traits have emerged as more convenient and non-intrusive alternatives for person authentication task. However a soft biometric trait cannot be a main feature for person authentication because it lacks distinctiveness compared with fingerprint, palm vein pattern and so on. Therefore this study proposes a person verification method integrating handwriting motion in the air and a shape of a hand, which can be successively measured by a device (RGB and depth camera). As the result of person verification experiment for 10 subjects, we obtained a good verification performance that FAR is 2% when FRR is 0%.","PeriodicalId":68697,"journal":{"name":"炎黄地理","volume":"93 1","pages":"103-109"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83881494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}