This research explores the dynamic relationship between temperature and level of building occupancy; and their effect on electricity consumption of electric appliances. It develops a model for electricity consumption based on these variables. It is important that reliable electricity consumption models are employed in finding solution to energy needs, otherwise inappropriate models may result in poor estimates for decision making. In this research, models for the daily electricity consumption for a local university in Malaysia was developed based on extraneous factors, such as temperature and level of building occupancy . As a result of developing such models, social and economic welfare will be improved.
{"title":"A Procedure for the Analysis of Multivariate Factors Affecting Electricity Consumption","authors":"P. Ozoh, S. Abd-rahman","doi":"10.5120/ijais2017451726","DOIUrl":"https://doi.org/10.5120/ijais2017451726","url":null,"abstract":"This research explores the dynamic relationship between temperature and level of building occupancy; and their effect on electricity consumption of electric appliances. It develops a model for electricity consumption based on these variables. It is important that reliable electricity consumption models are employed in finding solution to energy needs, otherwise inappropriate models may result in poor estimates for decision making. In this research, models for the daily electricity consumption for a local university in Malaysia was developed based on extraneous factors, such as temperature and level of building occupancy . As a result of developing such models, social and economic welfare will be improved.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":"8-12"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85601739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the present scenario, a server rack has multiple platforms attached to it, each designed to perform a different set of actions, thus, having different hardware requirements. To increase the throughput of such a platform either the hardware requirements are multiplied or the platform is replaced completely. This unoptimized method is rather expensive and inefficient. [1] This paper focuses on improving the performance of a system by providing accurate analysis and predict hardware requirements to improve overall throughput. For this, data logs are collected over a period of time which take performance data dumps of sensors connected to the platform via BMC. These sensors monitor the platform and measure its internal physical parameters. This data is then used to create a database and a training set. This set is used to train a machine learning algorithm which gives an efficient algorithm to analyze the present performance and give accurate prediction. This gives an optimal solution to increase throughput of a platform. [2] General Terms Machine learning, data logs, BMC, performance analysis and IPMI.
{"title":"BMC based Data Logger for Performance Analysis","authors":"N. Nayak, D. S. Tomar, M. Shanmugasundaram","doi":"10.5120/IJAIS2017451732","DOIUrl":"https://doi.org/10.5120/IJAIS2017451732","url":null,"abstract":"In the present scenario, a server rack has multiple platforms attached to it, each designed to perform a different set of actions, thus, having different hardware requirements. To increase the throughput of such a platform either the hardware requirements are multiplied or the platform is replaced completely. This unoptimized method is rather expensive and inefficient. [1] This paper focuses on improving the performance of a system by providing accurate analysis and predict hardware requirements to improve overall throughput. For this, data logs are collected over a period of time which take performance data dumps of sensors connected to the platform via BMC. These sensors monitor the platform and measure its internal physical parameters. This data is then used to create a database and a training set. This set is used to train a machine learning algorithm which gives an efficient algorithm to analyze the present performance and give accurate prediction. This gives an optimal solution to increase throughput of a platform. [2] General Terms Machine learning, data logs, BMC, performance analysis and IPMI.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"76 1","pages":"38-45"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81138325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Yusuf Perwej, B. Kerim, M. S. Adrees, O. Sheta
The growth in population and progression of internet services, data size is getting increased day by day where 105000s of Trillion of data files are there in cloud available in unstructured nature. The coming times of Big Data are rapidly arriving for just about all industries. The Big Data can help in metamorphose major business processes by advisable and correct analysis of accessible data. Big data have also played an essential role in crime discover. Hadoop is opensource software in the form of an extremely scalable and fault tolerant distributed system which plays a very remarkable role in data storage and its processing. The Apache Hadoop Yarn is an open source framework developed by Apache Software Foundation. It is used for nursing Big Data. It endows storage as well as processing functionality. In this paper, we aimed to demonstrate a close look to about Yarn. The Yarn as a usual computing fabric to support MapReduce and another application instance within of the same kind Hadoop cluster. Yarn allow multiple applications to run simultaneously on the coequal shared cluster and assent applications to negotiate resources based on necessity. In the end, we are in a nutshell discuss about the design, development, and current state of deployment of the next generation of Hadoop's computes platform Yarn.
{"title":"An Empirical Exploration of the Yarn in Big Data","authors":"Dr. Yusuf Perwej, B. Kerim, M. S. Adrees, O. Sheta","doi":"10.5120/ijais2017451730","DOIUrl":"https://doi.org/10.5120/ijais2017451730","url":null,"abstract":"The growth in population and progression of internet services, data size is getting increased day by day where 105000s of Trillion of data files are there in cloud available in unstructured nature. The coming times of Big Data are rapidly arriving for just about all industries. The Big Data can help in metamorphose major business processes by advisable and correct analysis of accessible data. Big data have also played an essential role in crime discover. Hadoop is opensource software in the form of an extremely scalable and fault tolerant distributed system which plays a very remarkable role in data storage and its processing. The Apache Hadoop Yarn is an open source framework developed by Apache Software Foundation. It is used for nursing Big Data. It endows storage as well as processing functionality. In this paper, we aimed to demonstrate a close look to about Yarn. The Yarn as a usual computing fabric to support MapReduce and another application instance within of the same kind Hadoop cluster. Yarn allow multiple applications to run simultaneously on the coequal shared cluster and assent applications to negotiate resources based on necessity. In the end, we are in a nutshell discuss about the design, development, and current state of deployment of the next generation of Hadoop's computes platform Yarn.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"40 1","pages":"19-29"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84634487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad, E. O. Ernest, M. Jabar
{"title":"Spam Detection Approaches and Strategies: A Phenomenons","authors":"Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad, E. O. Ernest, M. Jabar","doi":"10.5120/ijais2017451728","DOIUrl":"https://doi.org/10.5120/ijais2017451728","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"207 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76464993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The improvement in Information Technology has encouraged the use of Igbo in the creation of text such as resources and news articles online. Text similarity is of great importance in any text-based applications. This paper presents a comparative analysis of n-gram text representation on Igbo text document similarity. It adopted Euclidean similarity measure to determine the similarities between Igbo text documents represented with two word-based n-gram text representation (unigram and bigram) models. The evaluation of the similarity measure is based on the adopted text representation models. The model is designed with Object-Oriented Methodology and implemented with Python programming language with tools from Natural Language Toolkits (NLTK). The result shows that unigram represented text has highest distance values whereas bigram has the lowest corresponding distance values. The lower the distance value, the more similar the two documents and better the quality of the model when used for a task that requires similarity measure. The similarity of two documents increases as the distance value moves down to zero (0). Ideally, the result analyzed revealed that Igbo text document similarity measured on bigram represented text gives accurate similarity result. This will give better, effective and accurate result when used for tasks such as text classification, clustering and ranking on Igbo text.
{"title":"Comparative Analysis of N-gram Text Representation on Igbo Text Document Similarity","authors":"U. Chidiebere","doi":"10.5120/IJAIS2017451724","DOIUrl":"https://doi.org/10.5120/IJAIS2017451724","url":null,"abstract":"The improvement in Information Technology has encouraged the use of Igbo in the creation of text such as resources and news articles online. Text similarity is of great importance in any text-based applications. This paper presents a comparative analysis of n-gram text representation on Igbo text document similarity. It adopted Euclidean similarity measure to determine the similarities between Igbo text documents represented with two word-based n-gram text representation (unigram and bigram) models. The evaluation of the similarity measure is based on the adopted text representation models. The model is designed with Object-Oriented Methodology and implemented with Python programming language with tools from Natural Language Toolkits (NLTK). The result shows that unigram represented text has highest distance values whereas bigram has the lowest corresponding distance values. The lower the distance value, the more similar the two documents and better the quality of the model when used for a task that requires similarity measure. The similarity of two documents increases as the distance value moves down to zero (0). Ideally, the result analyzed revealed that Igbo text document similarity measured on bigram represented text gives accurate similarity result. This will give better, effective and accurate result when used for tasks such as text classification, clustering and ranking on Igbo text.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"66 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90887587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hasan, Redhawan Raziur Rouf, Md. Shajaratul B. Islam
Our paper considers the distinctive route frameworks and tries to recognize the best reasonable route system for Bangladesh. It is required as additional satellites will enhance execution for all applications, and particularly where satellite signs can be clouded, for example, in urban gullies, under tree shelters, or in open-cut mines. The advantages of the normal additional satellites and their signs are expanded accessibility, exactness, congruity, and dependability. General Terms Analysis of the DOP Values and Availability of combined GPS/GLONASS/GALILEO Navigation system in Bangladesh and some specific city of the country
{"title":"Investigation of Most Ideal GNSS Framework (GPS, GLONASS and GALILEO) for Asia Pacific Region (Bangladesh)","authors":"M. Hasan, Redhawan Raziur Rouf, Md. Shajaratul B. Islam","doi":"10.5120/IJAIS2017451719","DOIUrl":"https://doi.org/10.5120/IJAIS2017451719","url":null,"abstract":"Our paper considers the distinctive route frameworks and tries to recognize the best reasonable route system for Bangladesh. It is required as additional satellites will enhance execution for all applications, and particularly where satellite signs can be clouded, for example, in urban gullies, under tree shelters, or in open-cut mines. The advantages of the normal additional satellites and their signs are expanded accessibility, exactness, congruity, and dependability. General Terms Analysis of the DOP Values and Availability of combined GPS/GLONASS/GALILEO Navigation system in Bangladesh and some specific city of the country","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"84 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90275264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms
{"title":"Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm","authors":"Salim Ali Abbas, Malik Mohammed","doi":"10.5120/IJAIS2017451715","DOIUrl":"https://doi.org/10.5120/IJAIS2017451715","url":null,"abstract":"Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"43 1","pages":"27-32"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76293740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study was undertaken to determine the users’ perception and satisfaction with information services provision by mobile communication networks in Zaria, Nigeria. The study raised three research questions and answers were sought to them, among which are the types of information services provided by mobile communication network to GSM users, as well as the perception of users and their satisfaction with those mobile networks information services. Survey research method was adopted for the study and data was collected from the sample of 1,269 out of the total population of the study of 1534. The data were analyzed descriptively using frequency tables, percentage, mean, mode, pie chart and histogram. The study revealed that GSM users in Zaria metropolis are provided with awide range of information services The study revealed that users’ experience high quality with information services in Etisalat and Airtel network as they rate half (50%)of their services as good than MTN and GLO. It was also revealed that GSM users are partially satisfied with the overall services of call, S.M.S, Internet, and SIM card service in the entire networks. The study recommends that urgent step should be taken by network providers to reduce the gap by considering users perception in this study rather than from their perception with services quality which will help them to reduce the gap on lower service quality and improve the services quality. Attention should be directed to services with lower satisfaction by setting a target using a set of bench mark of ACSI and N.C.C standard of communication services to serve as a guide for mobile network industries and telecommunication industries to raise the satisfaction level so as to maintain the market share, maintain and generate their users.
{"title":"Users’ Perception and Satisfaction with Information Services Provision by Mobile Communication Networks in Zaria, Nigeria","authors":"Hadizatu Hassan, I. Umar","doi":"10.5120/ijais2017451721","DOIUrl":"https://doi.org/10.5120/ijais2017451721","url":null,"abstract":"The study was undertaken to determine the users’ perception and satisfaction with information services provision by mobile communication networks in Zaria, Nigeria. The study raised three research questions and answers were sought to them, among which are the types of information services provided by mobile communication network to GSM users, as well as the perception of users and their satisfaction with those mobile networks information services. Survey research method was adopted for the study and data was collected from the sample of 1,269 out of the total population of the study of 1534. The data were analyzed descriptively using frequency tables, percentage, mean, mode, pie chart and histogram. The study revealed that GSM users in Zaria metropolis are provided with awide range of information services The study revealed that users’ experience high quality with information services in Etisalat and Airtel network as they rate half (50%)of their services as good than MTN and GLO. It was also revealed that GSM users are partially satisfied with the overall services of call, S.M.S, Internet, and SIM card service in the entire networks. The study recommends that urgent step should be taken by network providers to reduce the gap by considering users perception in this study rather than from their perception with services quality which will help them to reduce the gap on lower service quality and improve the services quality. Attention should be directed to services with lower satisfaction by setting a target using a set of bench mark of ACSI and N.C.C standard of communication services to serve as a guide for mobile network industries and telecommunication industries to raise the satisfaction level so as to maintain the market share, maintain and generate their users.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"11 1","pages":"38-45"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75335698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The existing Extended Dijkstra's algorithm for Software Defined Networks was developed to handle shortcomings associated with the traditional shortest path routing used in SDN. Today's SDN controllers route allocation mechanism is mainly based on Dijkstra algorithm. However, both approaches do not consider bandwidth utilization and do not take knowledge of the topology into consideration. This may result in network congestion and sub-optimal performance of applications. This paper presents a modified Extended Dijkstra's algorithm for Software Defined Networks using REST APIs and introduces a congestion control component responsible for handling traffic overhead in an SDN topology. The Abilene network topology was used to evaluate the performance of both approaches using throughput and latency as performance metrics.
{"title":"Improved Extended Dijkstra’s Algorithm for Software Defined Networks","authors":"A. Abdulaziz, E. A. Adedokun, S. Man-Yahya","doi":"10.5120/ijais2017451714","DOIUrl":"https://doi.org/10.5120/ijais2017451714","url":null,"abstract":"The existing Extended Dijkstra's algorithm for Software Defined Networks was developed to handle shortcomings associated with the traditional shortest path routing used in SDN. Today's SDN controllers route allocation mechanism is mainly based on Dijkstra algorithm. However, both approaches do not consider bandwidth utilization and do not take knowledge of the topology into consideration. This may result in network congestion and sub-optimal performance of applications. This paper presents a modified Extended Dijkstra's algorithm for Software Defined Networks using REST APIs and introduces a congestion control component responsible for handling traffic overhead in an SDN topology. The Abilene network topology was used to evaluate the performance of both approaches using throughput and latency as performance metrics.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"22-26"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75292225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Privacy preserving data mining has two major directions: one is the protection of private data, i.e., data hiding in the database whereas another one is the protection of sensitive rule (Knowledge) contained in data known as knowledge hiding in the database. This research work focuses on protection of sensitive association rule. Corporation individual & other may get mutual benefit by sharing their data, but at the same time, they would like to be sure that their sensitive data remains private or not disclosed, i.e., hiding sensitive association rules. Approaches need to be given sensitive association rule in advance to hide them, i.e., mining is repaired. However, for some application pre-process of these sensitive association rules is combined with hiding process when predictive items are given, i.e., hiding informative association rule set. In this work, we propose two algorithms ISLFASTPREDICTIVE, DSRFASTPREDICTIVE to hide informative association rule with n-items. Earlier work hided 2-item association rules. Algorithms proposed in the paper execute faster than ISL & DSR algorithms prepared earlier as well as a side effect have been reduced. ISLFASTPREDICTIVE and DSRFASTPREDICTIVE algorithms work better as database scans are reduced since transaction list of elements is used in algorithms, i.e., a list of the transaction which supports itemsets and selection of transactions are done on the basis of presence of frequent itemsets.
{"title":"Privacy Preserving Informative Association Rule Mining","authors":"K. Pathak, S. Silakari, N. Chaudhari","doi":"10.5120/IJAIS2017451717","DOIUrl":"https://doi.org/10.5120/IJAIS2017451717","url":null,"abstract":"Privacy preserving data mining has two major directions: one is the protection of private data, i.e., data hiding in the database whereas another one is the protection of sensitive rule (Knowledge) contained in data known as knowledge hiding in the database. This research work focuses on protection of sensitive association rule. Corporation individual & other may get mutual benefit by sharing their data, but at the same time, they would like to be sure that their sensitive data remains private or not disclosed, i.e., hiding sensitive association rules. Approaches need to be given sensitive association rule in advance to hide them, i.e., mining is repaired. However, for some application pre-process of these sensitive association rules is combined with hiding process when predictive items are given, i.e., hiding informative association rule set. In this work, we propose two algorithms ISLFASTPREDICTIVE, DSRFASTPREDICTIVE to hide informative association rule with n-items. Earlier work hided 2-item association rules. Algorithms proposed in the paper execute faster than ISL & DSR algorithms prepared earlier as well as a side effect have been reduced. ISLFASTPREDICTIVE and DSRFASTPREDICTIVE algorithms work better as database scans are reduced since transaction list of elements is used in algorithms, i.e., a list of the transaction which supports itemsets and selection of transactions are done on the basis of presence of frequent itemsets.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"605 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81803471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}