{"title":"Cyber Security Audit using CIS CSC, NIST CSF and COBIT 2019 Framework","authors":"Viny Fadila, Nurul Mutiah, Renny Puspita Sari","doi":"10.24114/cess.v8i2.43257","DOIUrl":"https://doi.org/10.24114/cess.v8i2.43257","url":null,"abstract":"Tingginya penggunaan teknologi dan informasi saat ini mengakibatkan peningkatan risiko dan ancaman keamanan data dan informasi. Dinas Komunikasi dan Informatika Kota Pontianak, dinas pemerintahan yang memanfaatkan dan menggunakan banyak teknologi informasi. Untuk mengetahui sejauh mana kemampuan Dinas Komunikasi dan Informatika Kota Pontianak dalam mengelola keamanan siber, maka diperlukan audit keamanan siber. Audit dapat dilakukan dengan menggabungkan framework CIS CSC (Center for Internet Security Critical Security Controls) untuk membatasi focus area keamanan siber aset TI serta menggunakan NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) dan COBIT 2019 (Control Objective for Information Technologies) untuk melakukan perhitungan level kapabilitas. Perhitungan level kapabilitas menggunakan metode CPM (COBIT Performance Model). Hasil perhitungan level kapabilitas keamanan siber Dinas Komunikasi dan Informatika Kota Pontianak pada Identify (ID) mencapai level 3.9, Protect (PR) mencapai level 3.4, Detect (DE) mencapai level 2.5, dan Respond (RS) mencapai level 4. Terdapat 19 rekomendasi aktivitas untuk dilakukan agar mencapai level keamanan siber yang diinginkan, kemudian dilakukan pemetaan aktivitas rekomendasi ke dalam action priority matrix, 10 aktivitas masuk ke dalam kuadran Quick Wins, dan 9 aktivitas yang masuk ke dalam kuadran Major Projects. The frequent use of technology and information today impacts the increased risk and threats to data and information security. Department of Information and Communications of Pontianak is the department that utilizes and uses a lot of information technology. To find out how far the Pontianak City Communication and Informatics Office is capable of managing cyber security, a cyber security audit is needed. Audits can be conducted by combining the CIS CSC (Center for Internet Security Critical Security Controls) framework to define the cybersecurity focus areas of IT assets and using the NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and COBIT 2019 (Control Objective for Information Technologies) to calculate the capability level. Capability level calculation uses the CPM (COBIT Performance Model) method. The results of calculating the level of cyber security capability of the Pontianak City Communication and Informatics Service for Identification (ID) reaches level 3.9, Protect (PR) reaches level 3.4, Detect (DE) reaches level 2.5, and Respond (RS) reaches level 4. There are 19 activity recommendations to be carried out in order to achieve the desired level of cybersecurity, then capture recommendation activities into the action priority matrix, 10 activities included in the Quick Wins quadrant, and 9 activities entered into the Major Projects quadrant.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47189118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Build a Travel Taxi Ordering Application Using the FIFO Algorithm and the Flutter Framework","authors":"S. Susanto, Nurul Mutiah, Dian Prawira","doi":"10.24114/cess.v8i2.43792","DOIUrl":"https://doi.org/10.24114/cess.v8i2.43792","url":null,"abstract":"Antrian merupakan suatu keadaan dimana seseorang harus menunggu gilirannya untuk mendapatkan pelayanan. Seringkali antrian menjadi suatu masalah bagi masyarakat ataupun sebuah perusahaan yang memberikan pelayanan. Hal ini terjadi pada PT. Citra Surya Sejati, dimana proses pemesanan taksi masih manual dan disana penumpang harus mengantri untuk mendapatkan pelayanan. Disisi lain PT. Citra Surya Sejati juga mengalami permasalahan dimana pencatatan laporan pemesanan taksi masih menggunakan cara manual dengan mencatatnya dibuku, sehingga diperlukan sebuah sistem untuk mengatasi masalah tersebut. Sistem yang akan dibuat oleh peneliti menggunakan algoritma First In First Out untuk konfirmasi pesanannya, sehingga penumpang yang pertama kali memesan akan pertama kali mendapatkan pelayanan. Hasil dari penelitian ini berupa aplikasi berbasis Mobile untuk penumpang, sedangkan admin berbasis Website. Sistem ini telah dilakukan pengujian dengan menggunakan metode black box testing. Seluruh fungsionalitas sistem berjalan sesuai dengan perancangan yang telah dibuat sebelumnya dan antarmuka sistem memperoleh persentase 81,64% yang masuk ke dalam kategori Baik Sekali. Queuing is a situation where a person has to wait for his turn to get service. Often queues become a problem for the community or a company that provides services. This happened to PT. Citra Surya Sejati, where the taxi ordering process is where passengers have to queue to get service. On the other hand PT. Citra Surya Sejati also experienced a problem where the recording of taxi order reports still used the manual method by recording them in a book, so a system was needed to overcome this problem. The system that the researcher will create uses the First In First Out algorithm to confirm orders, so that passengers who order for the first time will receive service first. The results of this study are in the form of a Mobile-based application for passengers, while the Website-based admin. This system has been tested using the black box testing method. All system functionality goes according to the design that has been made before and the system interface gets a percentage of 81.64% which is in the Very Good category. ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47211090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elma Rulfin Tiara Kiu, Ornensya Br Sembiring, K. M. Ngafidin
{"title":"Twitter Sentiment Analysis Using the Naive Bayes Algorithm in the Case of the Indosurya Savings and Loans Cooperative","authors":"Elma Rulfin Tiara Kiu, Ornensya Br Sembiring, K. M. Ngafidin","doi":"10.24114/cess.v8i2.45527","DOIUrl":"https://doi.org/10.24114/cess.v8i2.45527","url":null,"abstract":"Kasus KSP Indosurya kembali mencuri perhatian saat ini karena terduga pelaku selaku pendiri KSP Indosurya divonis bebas oleh Hakim Ketua Pengadilan Negeri Jakarta Barat atas segala dakwaan pada dengan peryataan bahwa terdakwa terbukti melakukan perbuatan yang didakwakan tetapi bukan merupakan tindak pidana, melakukan perkara perdata yang kemudian menyita perhatian publik serta mengundang reaksi masyarakat diberbagai media sosial bahkan sempat menjadi tranding topik dimedia sosial twitter Indonesia. Oleh karena itu dilakukan penelitian ini guna mengetahui dan mengklasifikasikan sentimen masyarakat pada kasua KSP Indosurya menggunakan metode Naïve bayes. Dimana hasil tertinggi didapatkan oleh sentimen negative, sehingga didapatkan kesimpulan sentimen publik terhadap topik kasus KSP Indosurya di twitter Indonesia adalah negative dengan jumlah parameter 1200 berdasarkan analisis menggunakan metode Naïve bayes.The KSP Indosurya case has again stolen attention at this time because the alleged perpetrator Henry Surya as the founder of KSP Indosurya was acquitted by the Chief Judge of the West Jakarta District Court Syafrudin Ainor for all charges on Tuesday (24/1/2023) with a statement that the defendant Henry Surya was proven to have committed an act who was charged but did not constitute a crime, carried out a civil case which then seized the public's attention and invited public reaction on various social media and even became a trending topic on Indonesian Twitter social media Therefore, this research was carried out to find out and classify public sentiment in the KSP Indosurya case using the Naïve Bayes method. Where the highest results were obtained by negative sentiment, so it was concluded that public sentiment on the topic of the KSP Indosurya case on Twitter Indonesia was negative with a total of 1200 parameters based on analysis using the Naïve Bayes method.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46731420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Surayya Safira Milania, Cucu Suhery, Tedy Rismawan
{"title":"Fever Classification Using the Neighbor Weighted K-Nearest Neighbor Method","authors":"Surayya Safira Milania, Cucu Suhery, Tedy Rismawan","doi":"10.24114/cess.v8i2.43267","DOIUrl":"https://doi.org/10.24114/cess.v8i2.43267","url":null,"abstract":"Demam merupakan gejala atau reaksi tubuh terhadap suatu infeksi atau penyakit. Demam dapat disebabkan karena adanya infeksi virus, bakteri, dan parasit. Serta demam akibat gigitan nyamuk. Beberapa penyakit penyebab demam yang perlu diwaspadai antara lain Demam Berdarah Dengue (DBD), Demam Tifoid, dan Malaria dikarenakan gejala klinis dari ketiga penyakit tersebut sangat mirip dan sulit untuk dibedakan. Akibat dari gejala yang mirip, seringkali menyebabkan kesulitan dalam mendapatkan diagnosis awal sehingga kurang tepat dalam penanganan. Oleh karena itu, pada penelitian ini dibangun sebuah sistem yang dapat mengklasifikasikan demam menggunakan metode Neighbor Weighted K-Nearest Neighbor. Data yang digunakan berjumlah 300 data dengan komposisi rasio data latih dan data uji sebesar 70%:30% sehingga data latih yang digunakan berjumlah 210 data dan data uji berjumlah 90 data. Penelitian ini dilakukan dengan mengamati variasi nilai ketetanggaan (K) dan nilai exp (E) terhadap akurasi sistem klasifikasi demam. Hasil pelatihan menunjukkan bahwa nilai K dan E yang bervariasi tidak mempunyai pengaruh terhadap akurasi tersebut. Hasil pengujian yang dilakukan mendapatkan akurasi sebesar 100% pada setiap variasi nilai K dan E.Fever is a symptom of the body's reaction to an infection or disease. Fever can be caused by viral, bacterial, or parasitic infections. as well as fever due to mosquito bites. Several diseases that cause fever that need to be watched out for include dengue hemorrhagic fever (DHF), typhoid fever, and malaria because the clinical symptoms of these three diseases are very similar and difficult to distinguish. As a result of similar symptoms, it often causes difficulties in getting an early diagnosis, so treatment is not appropriate. Therefore, in this study, a system was developed that could classify fever using the neighbor weighted K-nearest neighbor method. The data used totaled 300, with a composition ratio of 70% training data to 30% test data, for a total of 210 training data and 90 test data. This research was conducted by observing the variation in the value of neighborliness (K) and the value of exp (E) on the accuracy of the fever classification system. The results of the training show that the varying K and E values have no effect on accuracy. The results of the tests carried out obtained an accuracy of 100% for each variation in the values of K and E. ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47927071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation Scorring Game Application Construct Based Learning Arabic Letter with Analytical Heuristic Processing","authors":"A. Hayati","doi":"10.24114/cess.v8i2.45284","DOIUrl":"https://doi.org/10.24114/cess.v8i2.45284","url":null,"abstract":"Pada penelitian ini mengimplementasikan evaluasi penilaian dengan berbasis metode Analytical Heuristic Process (AHP) yang diimplementasikan untuk menilai aplikasi belajar huruf Arab Hijaiyah yang bertujuan menilai lebih sesuai dengan permainan yang terselesaikan. Terdapat beberapa level permainan dan setiap level memiliki desain permainan yang berbeda, dimana pada level 1 adalah kuis soal, level 2 adalah drag and drop, level 3 adalah mencari kata dimana karakter fani akan bergerak atas bawah kanan kiri dengan animasi, level 4 adalah mengumpulkan poin dengan karakter fani meloncat objek dan bergerak kanan kiri atas bawah. Hasil penilaian scor permainan user dihasilkan dengan akumulasi nilai pada semua level permainan dengan metode AHP dengan variabel level, variabel nilai, dan variabel waktu sebagai dasar penghitungan weight dari metode AHP.In this research implementation evaluation use Analytical Heuristic Process (AHP) for analysis application game education for learning Arabic Letter Hijaiyah the purpose is evaluated user score actually as level user finished. Application there is few level in this application game and every level has game desain which different. Level 1 user should solve game with quizioner game, level 2 user should drag and drop the game, level 3 user should find word where fani character can move to up,bottom, right and left whith animation, level 4 user should collect poin value with fani character can jump object and move to right,left, uo and bottom. Evaluation scor for user result from accumulation value from all level game use AHP method with level variabel, score variabel and time variable as basic weight from AHP method.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44357317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"K-Means Cluster Analysis for District or City Clustering in Bengkulu Province based on The Number of Base Transceiver Stations and The Strength of Cell Phone Signal","authors":"Anisa Rahmawati, E. Setyowati","doi":"10.24114/cess.v8i1.40913","DOIUrl":"https://doi.org/10.24114/cess.v8i1.40913","url":null,"abstract":"The existence of a Base Transceiver Station (BTS) and the strength of cell phone signals in an area have greatly affected the ease of communication and exchanging information between people. This is one aspect to measure technological developments in a region. This study aims to use the K-Means algorithm to classify districts or cities in Bengkulu Province based on the proportion of BTS presence, the proportion of villages with strong telephone signals, and the proportion of villages with 4G internet signals. There are three clusters based on these three variables and there are still significant differences between districts or cities in Bengkulu Province. The output of this study becomes an input for the Bengkulu provincial government to be able to pay attention to the distribution of communication infrastructures in their province.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48105577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of CPU Performance on FreeBSD 64-bit and RedHat 64-bit Operating System Against Denial of Service (DoS) Using Hping3","authors":"Ihsan Fadli Tampati, Faizal Gani Setyawan, Wiyar Wilujengning Sejati, Aqwam Rosadi Kardian","doi":"10.24114/cess.v8i1.42824","DOIUrl":"https://doi.org/10.24114/cess.v8i1.42824","url":null,"abstract":"Denial of Services (Dos) attack is a type of attack against server traffic. DoS works by placing a heavy load on the server, so that the server cannot accommodate connections from other users and can cause system failure on the server. On the other hand, Denial of Services (DoS) attacks can be used to test server resilience. The servers to be tested are using RedHat Linux and FreeBSD operating systems. Testing is carried out by flooding the system with DoS attacks using the hping3 tool, then comparing the test results in the form of percentages of CPU consumption and memory consumption between operating systems to determine vulnerabilities in each operating system. Based on a comparison of test results between operating systems, the FreeBSD operating system has better CPU performance than the RedHat Linux operating system, but has a vulnerability in internal memory to DoS attacks. Meanwhile, the RedHat Linux operating system has better internal memory performance than the FreeBSD operating system, but has a vulnerability in CPU performance against DoS attacks.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42113798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adi Widarma, Dharyana Suryadijaya, Bagus Rizki Lubis, Ira Murni
{"title":"Recommendations for the Best Contract Labor Handling Staff Using the Complex Proportional Assessment Method","authors":"Adi Widarma, Dharyana Suryadijaya, Bagus Rizki Lubis, Ira Murni","doi":"10.24114/cess.v8i1.42655","DOIUrl":"https://doi.org/10.24114/cess.v8i1.42655","url":null,"abstract":"Staff or commonly referred to as employees are an important part of a company/institution, especially those who have the quality and enthusiasm to maintain the progress of the agency. The purpose of this research is to find out decision making or problem solving in determining the best contract staff recommendations at SERGAI DISPORAPARBUD so that later these staff can be more motivated in their performance. To conduct this research, observational research methods, interviews and literature studies were carried out and the calculation process was carried out using the COPRAS method. In addition to determining the best contract labor recommendations, several criteria must be met by each alternative, namely discipline, honesty, communication, cooperation, and responsibility. The results of this study indicate that 10 alternatives get the top ranking, one of which is a staff named Jaliya SE with a utility value of 100 getting the first rank in the recommendation to become the best contract worker at DISPORAPARBUD SERGAI.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41680793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things based Control and Monitoring System for Koi Fish Cultivation","authors":"Kevin William, Ikhwan Ruslianto, Irma Nirmala","doi":"10.24114/cess.v8i1.40886","DOIUrl":"https://doi.org/10.24114/cess.v8i1.40886","url":null,"abstract":"Water quality is an important factor for fish koi cultivation. Poor water quality such as inappropriate temperature, pH, and turbidity can disrupt metabolic processes, inhibit growth and cause death in koi fish. Apart from that, feeding and checking water quality are still done manually. Because of this, we need a system that can monitor and control the feeding, temperature, and water quality according to the living environment of koi fish. In this study the system was built on an Android-based mobile application using the flutter framework. In addition, the system has a notification to provide information on changes in sensor readings in real time to users. The notifications are changes in temperature, pH, turbidity, water level, feed level and changes in control device modes. Testing the water temperature readings obtained a relative error value of 0,66%, water turbidity readings obtained an error value of 8,79%, water pH readings obtained a relative error value of 2,45%, water level readings obtained an error relative value of 1,57% and feed availability readings obtained an error value of 3,1%.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44548424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alhu Waladan Naufal Sholihan, Aan Restu Mukti, Suryayusra Suryayusra, Rahmat Novrianda Dasmen
{"title":"Implementation of Network Security and Anticipating Attackers Using pfSense Firewall","authors":"Alhu Waladan Naufal Sholihan, Aan Restu Mukti, Suryayusra Suryayusra, Rahmat Novrianda Dasmen","doi":"10.24114/cess.v8i1.42377","DOIUrl":"https://doi.org/10.24114/cess.v8i1.42377","url":null,"abstract":"At PT. PLN (Persero) UPDL Palembang uses routers from the Cisco 1900 series, hardware-wise this Cisco device is very old because it was released in 2009 according to a Cisco website source, using the Cisco 1900 series as a router is something that is very vulnerable to attack by attackers due to its backwardness. the times in terms of network security, and the lack of attention to network security is also a matter of concern in this regard. With these problems, routing is added for network security by designing a pc router firewall from pfSense, the pc router itself uses computer assets that are is no longer used but has sufficient specifications. Using the action research method, carrying out diagnoses, planning actions, following up, conducting evaluations, and learning materials. By designing a pc router firewall using pfSense it is hoped that the results will be quite good, because it uses the router firewall feature using pfSense to block attacks. Using pfSense as network security will certainly be safer because pfSense still regularly updates or improves its security and has an active forum community to date so that information can be exchanged.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}