Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110872
Gang Pan , Xin Guan , Haiyang Jiang , Yongnan Liu , Huayang Wu , Hongyang Chen , Tomoaki Ohtsuki , Zhu Han
{"title":"Joint intelligent optimizing economic dispatch and electric vehicles charging in 5G vehicular networks","authors":"Gang Pan , Xin Guan , Haiyang Jiang , Yongnan Liu , Huayang Wu , Hongyang Chen , Tomoaki Ohtsuki , Zhu Han","doi":"10.1016/j.comnet.2024.110872","DOIUrl":"10.1016/j.comnet.2024.110872","url":null,"abstract":"<div><div>In recent years, with the rapid development of 5G networks, the road traffic network composed of vehicles with different energy sources has become more and more complex, and the problems of environmental pollution and road congestion have also become increasingly serious. Electric vehicles are favored by people due to their environmental protection and energy-saving characteristics. However, improper charging dispatching will cause excess energy in charging stations, affecting the power grid and road traffic, such as energy shortages and lower traffic throughput. Therefore, how to design a reasonable charging strategy that can maximize the user’s charging satisfaction and consume the energy of the charging station as much as possible becomes a challenge. Meanwhile, this strategy should consider power economic dispatch to reduce power generation costs and polluting gas emissions. With the support of 5G’s high-bandwidth and low-latency characteristics, this paper designs an intelligent charging model which indirectly reflects the charging satisfaction through the time cost, energy consumption cost, charging cost, and the user’s range anxiety, while consuming the remaining energy of the charging station as much as possible. Due to the uncertainty of wind and photovoltaic power generation, this paper proposes a two-stage economic dispatch model to improve the accuracy of power dispatch and reduce power generation costs and carbon emissions. Due to the highly variable traffic environment and energy demand, we employ proximal policy optimization-based deep reinforcement learning algorithms to realize electric vehicle charging dispatching and charging station power dispatching. Numerical results show the efficiency of our proposed strategy for electric vehicle charging in terms of the convergence speed.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110872"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142571413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110867
Jinbin Hu , Ruiqian Li , Ying Liu , Jin Wang
{"title":"Towards fine-grained load balancing with dynamical flowlet timeout in datacenter networks","authors":"Jinbin Hu , Ruiqian Li , Ying Liu , Jin Wang","doi":"10.1016/j.comnet.2024.110867","DOIUrl":"10.1016/j.comnet.2024.110867","url":null,"abstract":"<div><div>In modern datacenter networks (DCNs), load balancing mechanisms are widely deployed to enhance link utilization and alleviate congestion. Recently, a large number of load balancing algorithms have been proposed to spread traffic among the multiple parallel paths. The existing solutions make rerouting decisions for all flows once they experience congestion on a path. They are unable to distinguish between the flows that really need to be rerouted and the flows that potentially have negative effects due to rerouting, resulting in frequently ineffective rerouting. Fine-grained rerouting will also cause severe packet reordering, especially in asymmetric topology scenarios. To address the above issues, we present a fine-grained traffic-differentiated load balancing (TDLB) mechanism, which aims to distinguish flows that are necessarily to be rerouted and reroute traffic in fine-grained without packet reodering. Specifically, TDLB distinguishes the traffic that must be rerouted through the host pair information in the packet header, and selects an optimal path for rerouting. To prevent severe packet reodering caused by excessive path delay differences, TDLB dynamically adjusts the flowlet timeout to segment the traffic and select the optimal path for rerouting. The NS-2 simulation results show that TDLB effectively reduces tail latency and average flow completion time (FCT) for short flows by up to 49% and 46%, respectively, compared to the state-of-the-art load balancing schemes.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110867"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142662357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110856
Zaixing Zhu, Tao Hu, Di Wu, Chengcheng Liu, Siwei Yang, Zhifu Tian
{"title":"Topology sensing of FANET under missing data","authors":"Zaixing Zhu, Tao Hu, Di Wu, Chengcheng Liu, Siwei Yang, Zhifu Tian","doi":"10.1016/j.comnet.2024.110856","DOIUrl":"10.1016/j.comnet.2024.110856","url":null,"abstract":"<div><div>The topological structure of a flying ad hoc network (FANET) is crucial to understand, explain, and predict the behavior of unmanned aerial vehicle (UAV) swarms. Most studies focusing on topology sensing use perfect observations and complete datasets. However, the received signal dataset, being non-cooperative, commonly encounters instances of missing data, causing the performance of the existing algorithms to degrade. We investigate the issue of topology sensing of FANET based on external observations and propose a topology sensing method for FANET with missing data while introducing link-prediction methods to correct the topology inference results. First, we employ multi-dimensional Hawkes processes to model the communication event sequence in the network. Subsequently, to solve the problem in which the binary decision threshold is difficult to determine and cannot be adapted to the application scenario, we propose an extended multi-dimensional Hawkes model suitable for FANET and use the maximum likelihood estimation method for topology inference. Finally, to solve the problem of the low accuracy of inference results owing to missing data, we perform community detection on the observation network and combine the community detection and inference results to construct a mixed connection probability matrix, based on which we perform topology correction. The results of the analysis show that the topology sensing method proposed in this study is robust against missing data, indicating that it is an effective solution for solving this problem.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110856"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110870
Anjali Gupta, Abhishek Dixit
{"title":"Mathematical analysis of busy tone in full-duplex optical MAC for hidden node mitigation","authors":"Anjali Gupta, Abhishek Dixit","doi":"10.1016/j.comnet.2024.110870","DOIUrl":"10.1016/j.comnet.2024.110870","url":null,"abstract":"<div><div>This article provides the mathematical analysis of carrier sense multiple access with collision avoidance (CSMA/CA) media access control (MAC) protocol of IEEE 802.15.7 optical wireless communication (OWC). While the prior works have performed the OWC CSMA/CA mathematical analysis using the Markov models, deviation from the simulation results has been observed. We address this by improving the Markov model calculations, which display a mere 0.2% throughput deviation, nearly matching the simulation results. Furthermore, we work on the hidden node problem of the OWC networks. This problem is solved in literature by using various full-duplex communication methods, such as bi-directional data transmission and the busy tone signal; the latter is employed in our previous work on full-duplex optical MAC (FD-OMAC). These techniques increase the coverage area of the nodes by utilizing an access point (AP) as a relay node. However, the AP response is delayed by the processing time, causing an unexpected network behavior. The quantitative effect of this delay remains unexplored, which is critical for optimizing the OWC network. We bridge this gap by extending the proposed Markov analysis to model CSMA/CA and the aforementioned full-duplex techniques. This work equips readers with mathematical insights for future OWC MAC layer enhancements.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110870"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142587236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110869
Arash GhorbanniaDelavar, Zahra Jormand
{"title":"FMORT: The Meta-Heuristic routing method by integrating index parameters to optimize energy consumption and real execution time using FANET","authors":"Arash GhorbanniaDelavar, Zahra Jormand","doi":"10.1016/j.comnet.2024.110869","DOIUrl":"10.1016/j.comnet.2024.110869","url":null,"abstract":"<div><div>Decreasing energy consumption in Unmanned Aerial Vehicles (UAVs) while simultaneously enhancing their reliability and processing capabilities is considered a fundamental challenge. The routing mechanisms employed in Flying Ad Hoc Networks (FANETs) are more complex compared to those in Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), a challenge addressed by the FMORT method. To tackle these complex routing challenges, clustering techniques that utilize hybrid Meta-heuristic algorithms can be applied. Data analysis within the FMORT framework identified factors influencing service integration, leading to a reduction in redundant request transmissions and overall redundancy in the proposed method. The identification of food sources in the hybrid Meta-heuristic algorithm of the FMORT method is achieved through the integration of the Sparrow and Dragonfly algorithms. These algorithms work simultaneously to increase energy efficiency and increase network lifetime. This strategy optimizes information exchange by selecting an intelligent threshold detector and categorizing inputs, thereby minimizing node mobility. As a result, it improves performance metrics and decreases delivery costs, energy consumption, and delays. In the proposed method, a balanced performance is achieved by comparing existing methods in terms of transmission delay, Packet Delivery Ratio( PDR), throughput, and energy consumption. Simulation results show that the FMORT approach provides effective and stable outcomes in terms of reliability, decreased delays, and improved packet delivery rates. The FMORT framework includes principles for neighbor selection, determining suitable cluster heads, and scoring based on the average Euclidean distance. Additionally, it manages topology access, ensures proper distribution, guarantees data connectivity, and accurately categorizes inputs. By optimizing the sensitivity rate, this method minimizes the average delays and meekly values input data through effective load balancing. Key parameters considered for real time optimization of overall performance include the number of cluster heads during re-clustering, the ratio of request-to-acknowledgment packet transmission, node, and network lifetime, end-to-end delay, and energy consumption. Ultimately, the simulation results show that compared to the MWCRSF algorithm, the average optimization of index parameters,% 0.73 decrease in energy consumption,% 2.23 network lifetime, 1.35 re-cluster construction time and also% 0.11 re-cluster lifetime has increased.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110869"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-22DOI: 10.1016/j.comnet.2024.110871
Hesham Mohammed, Dola Saha
{"title":"Encrypted-OFDM: A secured wireless waveform","authors":"Hesham Mohammed, Dola Saha","doi":"10.1016/j.comnet.2024.110871","DOIUrl":"10.1016/j.comnet.2024.110871","url":null,"abstract":"<div><div>Wireless communication has been a broadcast system since its inception, which violates security and privacy issues at the physical layer between the intended transmit and receive pairs. Consequently, it is essential to secure the wireless signal such that only the intended receiver can realize the signal properties. In this paper, we propose <span>Encrypted-OFDM</span>, a new waveform, where the signal structure is altered to encrypt the waveform with a shared secret key. We achieve the signal level security by modifying the OFDM signal in time-domain, thus erasing the OFDM properties and obfuscating the signal properties to an eavesdropper. We present a two-stage encryption algorithm to increase the robustness of the transmitted waveform and achieve a high level of secrecy, even when low entropy keys are used. We also introduce a novel channel estimation algorithm by removing the pilots, so that only the intended receiver can estimate the channel correctly. Furthermore, we perform both secrecy and error analysis for the transmitted and received <span>Encrypted-OFDM</span> waveform. Extensive simulation and over-the-air experiments show that the performance of <span>Encrypted-OFDM</span> is comparable to legacy OFDM, and the SNR penalty due to the secured waveform varies between <span><math><mo>≈</mo></math></span> 1–4 dB. In all these scenarios, <span>Encrypted-OFDM</span> remains unrecognized at the eavesdropper.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110871"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-22DOI: 10.1016/j.comnet.2024.110866
Ruidong Zhang, Jiadong Zhang, Xue Wang, Wenxiao Shi
{"title":"Utility optimization for computation offloading and splitting in time-varying HAP and LEO satellite integrated MEC networks","authors":"Ruidong Zhang, Jiadong Zhang, Xue Wang, Wenxiao Shi","doi":"10.1016/j.comnet.2024.110866","DOIUrl":"10.1016/j.comnet.2024.110866","url":null,"abstract":"<div><div>To provide ubiquitous and low-latency communication and computation services for remote and disaster areas, high altitude platform (HAP) and low earth orbit (LEO) satellite integrated multi-access edge computing (HLS-MEC) networks have emerged as a promising solution. However, most current studies directly assume that the number of connected satellites is fixed and neglect the modeling of the time-varying multi-satellite computing process. Motivated by this, we establish an M/G/K(t) queuing model to illustrate task computation on satellites. To evaluate the efficiency and quality of computation offloading and splitting, we develop a utility model. This model is defined as a difference between a value function that assesses the trade-offs of task offloading, considering latency reductions and energy savings, and a cost function that quantifies expenses related to latency and energy consumption. After formulating the utility maximization problem, we propose the deep reinforcement learning-based offloading and splitting (DBOS) scheme that can overcome the time-varying uncertainties and high dynamics in the HLS-MEC network. Specifically, the DBOS scheme can learn the best computation offloading and splitting policy to maximize the utility by sensing the number of connected satellites, the distance between the HAP and satellites, the available computing resources, and the task arrival rate. Finally, we evaluate and validate the computational complexity and convergence property of the DBOS scheme. Numerical results show that the DBOS scheme outperforms the other three benchmarks and maximizes the utility under time-varying dynamics.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110866"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-22DOI: 10.1016/j.comnet.2024.110865
Lei Yang , Juan A. Fraire , Kanglian Zhao , Ruhai Wang , Wenfeng Li , Hong Yang
{"title":"Optimizing deep-space DTN congestion control via deep reinforcement learning","authors":"Lei Yang , Juan A. Fraire , Kanglian Zhao , Ruhai Wang , Wenfeng Li , Hong Yang","doi":"10.1016/j.comnet.2024.110865","DOIUrl":"10.1016/j.comnet.2024.110865","url":null,"abstract":"<div><div>This paper introduces an innovative congestion control mechanism for delay/disruption-tolerant networking (DTN) within deep-space communication systems, leveraging the nuanced capabilities of deep reinforcement learning (DRL). This approach significantly departs from traditional methods, addressing the unique challenges of deep-space data transmissions. The proposed DRL-based strategy demonstrates a superior balance of critical factors, including transmission delay, energy efficiency, and data reception integrity. We assess our approach through meticulous simulation and comparison with established benchmark schemes. The findings underscore the mechanism’s enhanced performance metrics, positing it as an appealing solution in the evolving landscape of non-terrestrial networking.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110865"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Hybrid Congestion Mitigation Strategy for ‘6LoWPAN-RPL based patient-centric IoHT’","authors":"Himanshu Verma , Naveen Chauhan , Lalit Kumar Awasthi","doi":"10.1016/j.comnet.2024.110862","DOIUrl":"10.1016/j.comnet.2024.110862","url":null,"abstract":"<div><div>The <em>Internet of Healthcare Things</em> (IoHT) is rapidly evolving, providing new opportunities to enhance healthcare delivery. However, the resource limitation of connected medical sensing devices leads to congestion, resulting in reduced network performance, delayed data transmission, and loss of critical medical information, which can have significant consequences in healthcare. To address this issue, this paper proposes an Enhanced Hybrid Congestion Mitigation Strategy (EHCMS) for <em>IPv6 over low-power wireless personal area networks (6LoWPAN)</em> and <em>routing protocol for low-Power and lossy networks (RPL)</em> based patient-centric IoHT (PC-IoHT). The EHCMS combines several techniques, including traffic management, network topology optimization, and load balancing, to enhance network performance and reduce congestion. The proposed framework is a hybrid strategy that utilizes resource- and traffic-control mechanisms to alleviate congestion in the 6LoWPAN-RPL-based patient-centric IoHT network. For the resource-control-based approach, a congestion-aware composite objective function is designed using a few congestion-specific routing metrics and formulated as a multi-attribute decision-making problem solved using Grey relational analysis (GRA). In addition, a non-linear multi-criteria optimization problem-based transmission rate adaptation mechanism is contrived as a traffic-control scheme for congestion mitigation. The effectiveness of the proposed EHCMS is evaluated using simulations on the <em>Cooja</em> simulator in the <em>Contiki-3.0 OS</em> and compared with existing congestion-alleviating strategies. The results demonstrate that the proposed framework can significantly reduce congestion in the IoHT network, perform better than existing works, and improve the quality of service. This research paper contributes to the field of IoHT by proposing an effective congestion mitigation strategy that enhances the reliability and performance of the PC-IoHT network, ultimately improving the quality of healthcare delivery.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110862"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-21DOI: 10.1016/j.comnet.2024.110850
Yingzhuo Deng, Zicheng Hu, Weihao Xu, Ningning Han, Haibin Cai
{"title":"Collaborative resource allocation in computing power networks: A game-theoretic double auction perspective","authors":"Yingzhuo Deng, Zicheng Hu, Weihao Xu, Ningning Han, Haibin Cai","doi":"10.1016/j.comnet.2024.110850","DOIUrl":"10.1016/j.comnet.2024.110850","url":null,"abstract":"<div><div>The growth of global data is increasing exponentially, leading to a greater demand for computing power. To address this requirement, expanding computing power from the cloud to the edge is essential. However, this transformation presents two significant challenges: how to share computing resources more efficiently and how to optimize resource allocation. To tackle these challenges, we propose a three-layer Computing Power Network (CPN) framework that focuses on implementing the collaborative allocation of computing nodes and user tasks. We formulate the resource allocation problem in CPN as a double auction game and use an experience-weighted attraction algorithm that enables participants to adjust bidding strategies based on environmental interactions. We implemented a prototype of our proposed CPN framework and conducted extensive experiments to verify our algorithm’s convergence and evaluate the benefits obtained by buyers (users) and sellers (computing nodes) from the perspective of transaction prices, rewards, and average pricing. The comprehensive experimental results demonstrate the effectiveness of our proposed method. Compared with state-of-the-art pricing strategies, our approach achieves a 20% increase in convergence speed and an 88% increase in overall returns. Furthermore, it also exhibits a 2.5% increase in deal prices and a substantial 83% rise in the income of individual users. These outcomes convincingly prove the superiority of our method in achieving better convergence, improving overall returns, and benefiting both buyers and sellers in the CPN resource auction market.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110850"},"PeriodicalIF":4.4,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}