Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880291
D. Novak, D. Kocur, J. Demcak
In the past period, great efforts have been made to develop the methods for the detection of human beings based on a monitoring their respiratory motion. For that purpose, ultra-wideband sensors (radars) operating in the frequency band DC-5GHz can be used with advantage. The basic principle of respiratory motion detection consists in the identification of sensor signal components possessing a significant power in the frequency band 0.2–0.7 Hz (frequency band of a human respiratory rate) corresponding to a constant range between the target and radar. However, the problem of person localization associated with the estimation of their breathing rate has not been studied deeply. In order to fill this gap, an approach for a joint localization and breathing rate estimation of a person will be introduced in this chapter. For that purpose, a combination of a method for the static person localization based on power-spectrum estimation using Welch periodogram referred to as WP-STAPELOC method and the Welch periodogram, MUSIC algorithm and Burg methods for the estimation of a fundamental harmonic of respiratory motion will be introduced. The performance of proposed procedure will be evaluated using a data obtained at experimental scenario. Moreover, a reference measurement will be performed in order to compare the results from UWB radar with the results from the optical sensor.
{"title":"Static person detection and localization with estimation of person's breathing rate using single multistatic UWB radar","authors":"D. Novak, D. Kocur, J. Demcak","doi":"10.1109/SAMI.2017.7880291","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880291","url":null,"abstract":"In the past period, great efforts have been made to develop the methods for the detection of human beings based on a monitoring their respiratory motion. For that purpose, ultra-wideband sensors (radars) operating in the frequency band DC-5GHz can be used with advantage. The basic principle of respiratory motion detection consists in the identification of sensor signal components possessing a significant power in the frequency band 0.2–0.7 Hz (frequency band of a human respiratory rate) corresponding to a constant range between the target and radar. However, the problem of person localization associated with the estimation of their breathing rate has not been studied deeply. In order to fill this gap, an approach for a joint localization and breathing rate estimation of a person will be introduced in this chapter. For that purpose, a combination of a method for the static person localization based on power-spectrum estimation using Welch periodogram referred to as WP-STAPELOC method and the Welch periodogram, MUSIC algorithm and Burg methods for the estimation of a fundamental harmonic of respiratory motion will be introduced. The performance of proposed procedure will be evaluated using a data obtained at experimental scenario. Moreover, a reference measurement will be performed in order to compare the results from UWB radar with the results from the optical sensor.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880331
T. Lojka, P. Papcun, I. Zolotová
The aim of this work is to design and build a pilot agile educational extension for a virtual laboratory, CyberLabTrainSystem. We identified and designed a virtual laboratory educational extesnsion that is based on Business Rule Engine (BRE) and Business process model and Notation (BPMN). The output is a web portal, which allows a teacher to easily implement educational methodologies, curricula and improves monitoring, controlling and interactions with students via the BRE.
{"title":"Business rule engine for education in virtual laboratory CyberLabTrainSystem","authors":"T. Lojka, P. Papcun, I. Zolotová","doi":"10.1109/SAMI.2017.7880331","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880331","url":null,"abstract":"The aim of this work is to design and build a pilot agile educational extension for a virtual laboratory, CyberLabTrainSystem. We identified and designed a virtual laboratory educational extesnsion that is based on Business Rule Engine (BRE) and Business process model and Notation (BPMN). The output is a web portal, which allows a teacher to easily implement educational methodologies, curricula and improves monitoring, controlling and interactions with students via the BRE.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880276
D. Krokavec, A. Filasová
New design conditions for the Takagi-Sugeno fuzzy model based unknown input observer, is presented in the paper. By the proposed methods, the design problem is parameterized in terms of linear matrix inequalities in relaxed and enhanced structures. Related to the state decoupling and reconstruction in the given class nonlinear systems, the design steps are revealed in the example for attenuation of an unknown input to the state estimation error.
{"title":"Relaxed design conditions for Takagi-Sugeno unknown input observers","authors":"D. Krokavec, A. Filasová","doi":"10.1109/SAMI.2017.7880276","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880276","url":null,"abstract":"New design conditions for the Takagi-Sugeno fuzzy model based unknown input observer, is presented in the paper. By the proposed methods, the design problem is parameterized in terms of linear matrix inequalities in relaxed and enhanced structures. Related to the state decoupling and reconstruction in the given class nonlinear systems, the design steps are revealed in the example for attenuation of an unknown input to the state estimation error.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880294
N. Ádám, B. Madoš, A. Baláz, T. Pavlík
The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also for non-malicious communication.
{"title":"Artificial neural network based IDS","authors":"N. Ádám, B. Madoš, A. Baláz, T. Pavlík","doi":"10.1109/SAMI.2017.7880294","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880294","url":null,"abstract":"The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also for non-malicious communication.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114282174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880360
Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow
As quadriplegia patients lost the ability to control the upper and lower limbs due to upper spinal cord injury, they need an intelligent control system to use a traditional electric wheelchair, which is driven normally by a joystick controller. One of the successful control systems for this kind of user is the use of head tilts as a controller. It allows the quadriplegia patient to drive the rehabilitation wheelchair with the head tilt or motion around x, y and z-axes. In this paper, the design and realization of a speed compensation algorithm are proposed. The speed compensation algorithm enhances the head tilts controller performance in case of non-straight roads and passing ramps. It is designed to compensate the lost speed in one or both of the wheelchair motors depending on the value of the road slope angle and the user weight. The algorithm uses a closed loop control by receiving speed feedback from two magnetic encoders fixed at the wheelchair motors. The speed of each motor is calculated by counting the number of wheels rotating per time. The wheelchair position and slope information acquisition are realized using a sophisticated Bosch BNO055 orientation sensor fixed on the wheelchair chassis. The practical tests showed excellent performance for the system enhancing both the control and the safety of the user.
{"title":"A speed compensation algorithm for a head tilts controller used for wheelchairs and rehabilitation applications","authors":"Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow","doi":"10.1109/SAMI.2017.7880360","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880360","url":null,"abstract":"As quadriplegia patients lost the ability to control the upper and lower limbs due to upper spinal cord injury, they need an intelligent control system to use a traditional electric wheelchair, which is driven normally by a joystick controller. One of the successful control systems for this kind of user is the use of head tilts as a controller. It allows the quadriplegia patient to drive the rehabilitation wheelchair with the head tilt or motion around x, y and z-axes. In this paper, the design and realization of a speed compensation algorithm are proposed. The speed compensation algorithm enhances the head tilts controller performance in case of non-straight roads and passing ramps. It is designed to compensate the lost speed in one or both of the wheelchair motors depending on the value of the road slope angle and the user weight. The algorithm uses a closed loop control by receiving speed feedback from two magnetic encoders fixed at the wheelchair motors. The speed of each motor is calculated by counting the number of wheels rotating per time. The wheelchair position and slope information acquisition are realized using a sophisticated Bosch BNO055 orientation sensor fixed on the wheelchair chassis. The practical tests showed excellent performance for the system enhancing both the control and the safety of the user.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880286
V. Raskin
At the 2014 AAAI, Pat Langley, one of the founders of machine learning and, recently, of its detractors, publicly lamented the current abandonment of the "big issues" in AI. Indeed, from emulating human intelligence in the process of learning more about it, AI is often confused with non-intelligent emulation of human intelligent activities. Both in the States and Europe, cognitive computing has emerged as attempts to equip the computer with some knowledge of the domain in which it operates. Cognitive robotics is one of the latest applications of this approach. What I am planning to discuss in the plenary is that our Ontological Semantic Technology offers a framework for capturing, structuring, and computerizing our entire knowledge of the world and anchoring natural language semantics in that knowledge.
{"title":"Semantics as the basis of truly cognitive computing","authors":"V. Raskin","doi":"10.1109/SAMI.2017.7880286","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880286","url":null,"abstract":"At the 2014 AAAI, Pat Langley, one of the founders of machine learning and, recently, of its detractors, publicly lamented the current abandonment of the \"big issues\" in AI. Indeed, from emulating human intelligence in the process of learning more about it, AI is often confused with non-intelligent emulation of human intelligent activities. Both in the States and Europe, cognitive computing has emerged as attempts to equip the computer with some knowledge of the domain in which it operates. Cognitive robotics is one of the latest applications of this approach. What I am planning to discuss in the plenary is that our Ontological Semantic Technology offers a framework for capturing, structuring, and computerizing our entire knowledge of the world and anchoring natural language semantics in that knowledge.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880304
N. Iacobici, F. Frigura-Iliasa, P. Andea, M. Frigura-Iliasa
This paper presents a new approach developed in order to provide a better design solution for the 110–123 kV, SF6 type switches. Having an efficient computer based tool for the design of such important equipment it's always a challenge for any high voltage equipment manufacturer worldwide. We have to mention, in the first part of the paper, the particular technical characteristic of SF6 HV switches and all the advantages of using this type of expensive equipment. Our team developed a simple and new algorithm/procedure and a new software package used to optimize the design of that kind of equipment, briefly described in the second part of the paper. The principles and the solutions involved are part of a contract made with Electroputere S.A. a traditional Romanian high voltage equipment manufacturer. It is not only a classic CAD procedure, but also a computational and testing sequence as well
{"title":"A new computer based design for a 145 kV SF6 switch","authors":"N. Iacobici, F. Frigura-Iliasa, P. Andea, M. Frigura-Iliasa","doi":"10.1109/SAMI.2017.7880304","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880304","url":null,"abstract":"This paper presents a new approach developed in order to provide a better design solution for the 110–123 kV, SF6 type switches. Having an efficient computer based tool for the design of such important equipment it's always a challenge for any high voltage equipment manufacturer worldwide. We have to mention, in the first part of the paper, the particular technical characteristic of SF6 HV switches and all the advantages of using this type of expensive equipment. Our team developed a simple and new algorithm/procedure and a new software package used to optimize the design of that kind of equipment, briefly described in the second part of the paper. The principles and the solutions involved are part of a contract made with Electroputere S.A. a traditional Romanian high voltage equipment manufacturer. It is not only a classic CAD procedure, but also a computational and testing sequence as well","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880283
L. Horváth, I. Rudas
This paper is about extended application of virtual engineering principles, methodologies, and systems as a possible answer to urgent need for integrated industrial, research, and higher educational programs and processes. One of the motivations is the changed world of engineering which requires quick utilization of new findings as new context. At the same time, development of virtual engineering allows for and requires organized knowledge, experience, and expertise content as active context in engineering model structures. Laboratory of Intelligent Engineering Systems published research results in relevant topics such as virtual engineering space, active information content, content structure for the driving product system model entities, integrating higher education course into industrial engineering systems, and application of intellectual property at virtual engineering processes. In this paper, multipurpose potential of a formerly defined and industrial virtual technology conform virtual engineering space is analyzed, specific contextual knowledge driving of model entity generation is conceptualized, a modified driving content structure is explained, and intellectual property as source of driving knowledge is considered. Finally, configuration and user programming capabilities of recent professional virtual industrial engineering system is considered as the only way for the implementation of proposed multipurpose concept and method.
{"title":"Role of information content in multipurpose virtual engineering space","authors":"L. Horváth, I. Rudas","doi":"10.1109/SAMI.2017.7880283","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880283","url":null,"abstract":"This paper is about extended application of virtual engineering principles, methodologies, and systems as a possible answer to urgent need for integrated industrial, research, and higher educational programs and processes. One of the motivations is the changed world of engineering which requires quick utilization of new findings as new context. At the same time, development of virtual engineering allows for and requires organized knowledge, experience, and expertise content as active context in engineering model structures. Laboratory of Intelligent Engineering Systems published research results in relevant topics such as virtual engineering space, active information content, content structure for the driving product system model entities, integrating higher education course into industrial engineering systems, and application of intellectual property at virtual engineering processes. In this paper, multipurpose potential of a formerly defined and industrial virtual technology conform virtual engineering space is analyzed, specific contextual knowledge driving of model entity generation is conceptualized, a modified driving content structure is explained, and intellectual property as source of driving knowledge is considered. Finally, configuration and user programming capabilities of recent professional virtual industrial engineering system is considered as the only way for the implementation of proposed multipurpose concept and method.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880322
Ádám Tóth, I. Vajda, Z. Vámossy
This paper features a software system called ∞Exarns (InfinityExams) which supports (primarily in higher education) paper-based examination and makes it easier, more comfortable and speeds up the whole process while keeping every single positive attribute of it but also reducing the number of negative aspects. The approach significantly differs from the ones used in the previous 10+ years which were implemented in such a way that they could not reproduce and replace the traditional paper-based examination model. The heart of the article relies on the most important element of the software which is the image processing flow.
{"title":"E-assessment using image processing in ∞Exams","authors":"Ádám Tóth, I. Vajda, Z. Vámossy","doi":"10.1109/SAMI.2017.7880322","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880322","url":null,"abstract":"This paper features a software system called ∞Exarns (InfinityExams) which supports (primarily in higher education) paper-based examination and makes it easier, more comfortable and speeds up the whole process while keeping every single positive attribute of it but also reducing the number of negative aspects. The approach significantly differs from the ones used in the previous 10+ years which were implemented in such a way that they could not reproduce and replace the traditional paper-based examination model. The heart of the article relies on the most important element of the software which is the image processing flow.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880329
L. Vokorokos, Zuzana Dankovičová, L. Lescisin
The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.
{"title":"Using of the forensic analyzing tools, code obfuscation","authors":"L. Vokorokos, Zuzana Dankovičová, L. Lescisin","doi":"10.1109/SAMI.2017.7880329","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880329","url":null,"abstract":"The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132361803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}