Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423371
Youngjun Heo, Byoung-Koo Kim, Dong-ho Kang, Jungchan Na
Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth strategy can be applied to industrial control systems. It separates control network and business network, and uses a one-way data transmission technology for data transfer between higher security area and lower security area. But most of the current unidirectional security gateway system is just only data transmission without considering the reliability and security. In this paper, to guarantee the reliability and security of transmitted data, we design a unidirectional security gateway system, UNIWAY, which provides forward error correction, session management, packet sequence number, IP/Port filter, content filter, and protocol break.
{"title":"A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems","authors":"Youngjun Heo, Byoung-Koo Kim, Dong-ho Kang, Jungchan Na","doi":"10.1109/ICACT.2016.7423371","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423371","url":null,"abstract":"Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth strategy can be applied to industrial control systems. It separates control network and business network, and uses a one-way data transmission technology for data transfer between higher security area and lower security area. But most of the current unidirectional security gateway system is just only data transmission without considering the reliability and security. In this paper, to guarantee the reliability and security of transmitted data, we design a unidirectional security gateway system, UNIWAY, which provides forward error correction, session management, packet sequence number, IP/Port filter, content filter, and protocol break.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423248
Daeyoung Kim
Presents a collection of slides covering the following topics: semantic overloading of IP address; Loc/ID separation; fallacy of IP address; global Internet; flat interior routing; and mapped interior routing.
{"title":"What to name, How to route","authors":"Daeyoung Kim","doi":"10.1109/ICACT.2016.7423248","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423248","url":null,"abstract":"Presents a collection of slides covering the following topics: semantic overloading of IP address; Loc/ID separation; fallacy of IP address; global Internet; flat interior routing; and mapped interior routing.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"97 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423430
S. H. Song, Yijeong Choi, Taeseon Yoon
This study focuses on the mosquito borne diseases including dengue-1, dengue-4, yellow fever, west nile virus infection, and filariasis. These are the diseases that are typically shown in the African continent and Eastern Asia, which are the places that suffer from poverty the most. Vaccines for some of the diseases have already been made but the ones who inhabit in those areas do not have the ability to afford it. The research will use 3, 5, 7 windows of decision tree and apriori algorithm. By finding the similarities between the amino acid sequences between these viruses the study to find the curing for all diseases will be in progress. Emerging filariviruses: the spread and resurgence of Japanese encephalitis, West Nile and dengue viruses.
{"title":"Comparison of episodes of mosquito borne disease: Dengue, yellow fever, west nile, and filariasis with decision tree, apriori algorithm","authors":"S. H. Song, Yijeong Choi, Taeseon Yoon","doi":"10.1109/ICACT.2016.7423430","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423430","url":null,"abstract":"This study focuses on the mosquito borne diseases including dengue-1, dengue-4, yellow fever, west nile virus infection, and filariasis. These are the diseases that are typically shown in the African continent and Eastern Asia, which are the places that suffer from poverty the most. Vaccines for some of the diseases have already been made but the ones who inhabit in those areas do not have the ability to afford it. The research will use 3, 5, 7 windows of decision tree and apriori algorithm. By finding the similarities between the amino acid sequences between these viruses the study to find the curing for all diseases will be in progress. Emerging filariviruses: the spread and resurgence of Japanese encephalitis, West Nile and dengue viruses.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126158419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423426
Jeong-Woo Son, Junekey Jeon, Sang-Yun Lee, Sun-Joong Kim
Spectral clustering is a typical unsupervised machine learning technique and it has widely adopted in various fields. This paper proposes a novel spectral clustering technique to handle the characteristics of multiview data. In the proposed method, co-training approach is adopted in the spectral clustering. When an instance has more than three views, it is difficult to handle different dependencies among views in ordinary co-training. To overcome this, the proposed method reflects these different dependencies among views when the information is propagated in the training phrase. In the experiment, the proposed method is evaluated with the synthetic data whose instances are represented with three views. The proposed method achieves up to 8.25% better ARI (Adjusted Rand Index) than those of five algorithms.
{"title":"Adaptive spectral co-clustering for multiview data","authors":"Jeong-Woo Son, Junekey Jeon, Sang-Yun Lee, Sun-Joong Kim","doi":"10.1109/ICACT.2016.7423426","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423426","url":null,"abstract":"Spectral clustering is a typical unsupervised machine learning technique and it has widely adopted in various fields. This paper proposes a novel spectral clustering technique to handle the characteristics of multiview data. In the proposed method, co-training approach is adopted in the spectral clustering. When an instance has more than three views, it is difficult to handle different dependencies among views in ordinary co-training. To overcome this, the proposed method reflects these different dependencies among views when the information is propagated in the training phrase. In the experiment, the proposed method is evaluated with the synthetic data whose instances are represented with three views. The proposed method achieves up to 8.25% better ARI (Adjusted Rand Index) than those of five algorithms.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423502
Green Bang, Myoungbeom Chung, Il-Ju Ko
In this paper, we proposed data communication method based on inaudible sound which the most people cannot listen to at near field. The proposed method can transmit some bits data as using mixed high frequencies which are mapped at each data bit. Besides, the proposed method increases the accuracy of data transmission as using cyclic redundancy check for prevention of transmission error. To evaluate the performance of the proposed method, we tested with the proposed method and the result showed 97.5% accuracy. Therefore, the proposed method could be applied at various wireless data communication technology fields.
{"title":"Data communication method based on inaudible sound at near field","authors":"Green Bang, Myoungbeom Chung, Il-Ju Ko","doi":"10.1109/ICACT.2016.7423502","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423502","url":null,"abstract":"In this paper, we proposed data communication method based on inaudible sound which the most people cannot listen to at near field. The proposed method can transmit some bits data as using mixed high frequencies which are mapped at each data bit. Besides, the proposed method increases the accuracy of data transmission as using cyclic redundancy check for prevention of transmission error. To evaluate the performance of the proposed method, we tested with the proposed method and the result showed 97.5% accuracy. Therefore, the proposed method could be applied at various wireless data communication technology fields.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper depicts a results of field test for an implemented digital video broadcasting for cable system (DVB-C2) transceiver, which has been implemented using field programmable gate arrays (FPGAs). The test results show the physical channel status and performance of the DVB-C2 transceiver, which includes the sampling clock offset (SCO), the frequency offset (FO), the frequency response of the hybrid fiber coax (HFC) channel, the uncoded-bit error rate (BER) before the forward error correction (FEC) decoder, and the BER after the FEC decoder. Since the moving picture exports group-transport stream (MPEG-TS) is received successfully with a raw data rate of 55 Mbps through a commercial in-service HFC network, a high data rate such as ultra-high definition (UHD) can be expected to be serviced. In addition, because the measured uncoded-BER satisfies the requirement of 10-2 uncoded-BER, the implemented DVB-C2 transceiver can support 4096QAM as well as 16384QAM. Therefore, it can be used as a cable modem supporting DVB-C2 and the data-over-cable-service-interface-specifications (DOCSIS) 3.1.
本文介绍了一种采用现场可编程门阵列(fpga)实现的有线数字视频广播系统(DVB-C2)收发器的现场测试结果。测试结果显示了DVB-C2收发器的物理信道状态和性能,包括采样时钟偏移(SCO)、频率偏移(FO)、混合光纤同轴(HFC)信道的频率响应、前向纠错(FEC)解码器前的未编码误码率(BER)和前向纠错(FEC)解码器后的误码率(BER)。由于通过商用HFC网络以55mbps的原始数据速率成功接收了运动图像导出组传输流(MPEG-TS),因此可以期望为超高清(UHD)等高数据速率提供服务。此外,由于测量的无编码误码率满足10-2的无编码误码率要求,因此所实现的DVB-C2收发器可以支持4096QAM和16384QAM。因此,它可以作为支持DVB-C2和DOCSIS (data-over-cable service interface specification) 3.1的电缆调制解调器使用。
{"title":"Performance analysis and implementation of a DVB-C2 transceiver","authors":"Jaeho Lee, Woongshik You, Jintae Oh, Sang-Jung Ra, Junyoung Jung","doi":"10.1109/ICACT.2016.7423492","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423492","url":null,"abstract":"This paper depicts a results of field test for an implemented digital video broadcasting for cable system (DVB-C2) transceiver, which has been implemented using field programmable gate arrays (FPGAs). The test results show the physical channel status and performance of the DVB-C2 transceiver, which includes the sampling clock offset (SCO), the frequency offset (FO), the frequency response of the hybrid fiber coax (HFC) channel, the uncoded-bit error rate (BER) before the forward error correction (FEC) decoder, and the BER after the FEC decoder. Since the moving picture exports group-transport stream (MPEG-TS) is received successfully with a raw data rate of 55 Mbps through a commercial in-service HFC network, a high data rate such as ultra-high definition (UHD) can be expected to be serviced. In addition, because the measured uncoded-BER satisfies the requirement of 10-2 uncoded-BER, the implemented DVB-C2 transceiver can support 4096QAM as well as 16384QAM. Therefore, it can be used as a cable modem supporting DVB-C2 and the data-over-cable-service-interface-specifications (DOCSIS) 3.1.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122893225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423427
Min-Suk Bang, Ji-Won Kim, Sung-Hoon Kim, Ki-Doo Kim, Kyeong-Hoon Jung
Conditional replenishment algorithm (CRA) was proposed to improve the quality of a hybrid 3DTV system with mixed resolution. In the hybrid 3DTV system, the role of a reference view is important since not only the overall quality of the hybrid 3DTV depends on the quality of the reference view, but also the reference view directly affects the quality improvement of the hybrid 3DTV using CRA. Moreover, since stereo mismatch between left and right cameras can be occurred, carefully choosing the reference view between the left and right views is very important. In this paper, we observe effects of the selection of a reference view on the quality of a hybrid 3DTV which is improved by CRA.
{"title":"Effects of selection of a reference view on quality improvement of hybrid 3DTV","authors":"Min-Suk Bang, Ji-Won Kim, Sung-Hoon Kim, Ki-Doo Kim, Kyeong-Hoon Jung","doi":"10.1109/ICACT.2016.7423427","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423427","url":null,"abstract":"Conditional replenishment algorithm (CRA) was proposed to improve the quality of a hybrid 3DTV system with mixed resolution. In the hybrid 3DTV system, the role of a reference view is important since not only the overall quality of the hybrid 3DTV depends on the quality of the reference view, but also the reference view directly affects the quality improvement of the hybrid 3DTV using CRA. Moreover, since stereo mismatch between left and right cameras can be occurred, carefully choosing the reference view between the left and right views is very important. In this paper, we observe effects of the selection of a reference view on the quality of a hybrid 3DTV which is improved by CRA.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122158772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to pinpoint the victim's position. As a countermeasure, most of location-based applications have already implemented the "hide distance" function to protect their user's location privacy. The effectiveness of such approach however is still questionable. Therefore, in this paper, we first investigate how popular location-based dating applications are currently protecting their user's privacy by testing the two most popular GLBT-focused applications: Jack'd and Grindr. As one of our findings, we then demonstrate how an adversary can still figure out the location of the targeted victim even when the "hide distance" function is enabled. Our threat model is simply an enhanced version of the trilateration model. Without using sophisticated hacking tools or complex attack techniques, the model is still very effective and efficient at locating the targeted victim, and of course in a so-called "legal" manner since we only utilize the information that can be obtained just as same as any other ordinary user. In addition, we also introduce a potential side channel attack fashion due to the current design of Jack'd. Our study thus raises an urgent alarm to those location-based applications' users in general, and especially to those GLBT-focused dating application's users about their privacy. Finally, the paper concludes by suggesting some possible solutions from the viewpoints of both the provider and the user considering the implementation cost and the trade-off of utility.
{"title":"Your neighbors are my spies: Location and other privacy concerns in dating apps","authors":"Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa","doi":"10.1109/ICACT.2016.7423532","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423532","url":null,"abstract":"Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to pinpoint the victim's position. As a countermeasure, most of location-based applications have already implemented the \"hide distance\" function to protect their user's location privacy. The effectiveness of such approach however is still questionable. Therefore, in this paper, we first investigate how popular location-based dating applications are currently protecting their user's privacy by testing the two most popular GLBT-focused applications: Jack'd and Grindr. As one of our findings, we then demonstrate how an adversary can still figure out the location of the targeted victim even when the \"hide distance\" function is enabled. Our threat model is simply an enhanced version of the trilateration model. Without using sophisticated hacking tools or complex attack techniques, the model is still very effective and efficient at locating the targeted victim, and of course in a so-called \"legal\" manner since we only utilize the information that can be obtained just as same as any other ordinary user. In addition, we also introduce a potential side channel attack fashion due to the current design of Jack'd. Our study thus raises an urgent alarm to those location-based applications' users in general, and especially to those GLBT-focused dating application's users about their privacy. Finally, the paper concludes by suggesting some possible solutions from the viewpoints of both the provider and the user considering the implementation cost and the trade-off of utility.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115960588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423280
R. Kirichek, A. Vladyko, Maxim Zakharov, A. Koucheryavy
The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network, created on the basis of the Laboratory of the Internet of Things in the State University of Telecommunication and a description of features of the network for a comprehensive research of the Internet of Things.
{"title":"Model networks for Internet of Things and SDN","authors":"R. Kirichek, A. Vladyko, Maxim Zakharov, A. Koucheryavy","doi":"10.1109/ICACT.2016.7423280","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423280","url":null,"abstract":"The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network, created on the basis of the Laboratory of the Internet of Things in the State University of Telecommunication and a description of features of the network for a comprehensive research of the Internet of Things.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127398379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423453
Jin-Soo Park, H. Yoon, Byung-Jun Jang
In this paper, we suggested a software-defined radio (SDR)-based frequency interference analysis test-bed designed to consider both frequency and time domain characteristics of the interferer. Due to the versatile programming capability of universal software radio peripheral (USRP) and LabVIEW, performance degradation effects of victim receiver due to various interferer's parameters in both frequency and time domain can be analyzed intuitively. As an example, we demonstrated a frequency interference scenario consisting of Zigbee as a victim and three Wi-Fi nodes as interferers. From the measured results, it was verified that our test-bed can analyze easily actual interference environments in both frequency and time domain.
{"title":"SDR-based frequency interference analysis test-bed considering time domain characteristics of interferer","authors":"Jin-Soo Park, H. Yoon, Byung-Jun Jang","doi":"10.1109/ICACT.2016.7423453","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423453","url":null,"abstract":"In this paper, we suggested a software-defined radio (SDR)-based frequency interference analysis test-bed designed to consider both frequency and time domain characteristics of the interferer. Due to the versatile programming capability of universal software radio peripheral (USRP) and LabVIEW, performance degradation effects of victim receiver due to various interferer's parameters in both frequency and time domain can be analyzed intuitively. As an example, we demonstrated a frequency interference scenario consisting of Zigbee as a victim and three Wi-Fi nodes as interferers. From the measured results, it was verified that our test-bed can analyze easily actual interference environments in both frequency and time domain.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}