Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963079
S. Shinde, U. Kulkarni
The basic fuzzy min-max neural network (FMMN) is capable to perform the supervised classification of data. As like other artificial neural networks, FMMN is also like a black box and expressed in terms of min-max values and associated class label. So the justification of classification results given by FMMN is required to be obtained to make it more adaptive to the real world applications. This paper proposes the model to extract classification rules from trained FMMN. These rules justify the classification decision given by FMMN. For this FMMN is trained for the input data and resulting min-max values in the quantized form and class labels of created hyperboxes are passed as a input to the partial rule extraction (PART) algorithm of Waikato Environment for Knowledge Analysis (WEKA). As a result, more comprehensible rules expressed in terms human readable linguistic terms are extracted. The proposed model is applied to iris and wine dataset taken from the UCI machine learning repository. Thus the extracted rules represent the trained FMMN in the more understandable form and can easily be applied to real world applications.
{"title":"Mining classification rules from fuzzy min-max neural network","authors":"S. Shinde, U. Kulkarni","doi":"10.1109/ICCCNT.2014.6963079","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963079","url":null,"abstract":"The basic fuzzy min-max neural network (FMMN) is capable to perform the supervised classification of data. As like other artificial neural networks, FMMN is also like a black box and expressed in terms of min-max values and associated class label. So the justification of classification results given by FMMN is required to be obtained to make it more adaptive to the real world applications. This paper proposes the model to extract classification rules from trained FMMN. These rules justify the classification decision given by FMMN. For this FMMN is trained for the input data and resulting min-max values in the quantized form and class labels of created hyperboxes are passed as a input to the partial rule extraction (PART) algorithm of Waikato Environment for Knowledge Analysis (WEKA). As a result, more comprehensible rules expressed in terms human readable linguistic terms are extracted. The proposed model is applied to iris and wine dataset taken from the UCI machine learning repository. Thus the extracted rules represent the trained FMMN in the more understandable form and can easily be applied to real world applications.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963001
Jingting Lu, Xiaoping Liu
Foot plant detection is a fundamental step of most motion editing researches. Due to the footskate of captured motions, it is difficult to precisely extract foot plants. In this paper, we present a general, efficient approach for foot plant detection. The key idea is determining the boundaries of foot plants by searching the most salient points around the boundaries. By this approach, foot plants can be precisely extracted from most of the flat terrain motions. The experimental results show the generality and robustness of our approach.
{"title":"Foot plant detection for motion capture data by curve saliency","authors":"Jingting Lu, Xiaoping Liu","doi":"10.1109/ICCCNT.2014.6963001","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963001","url":null,"abstract":"Foot plant detection is a fundamental step of most motion editing researches. Due to the footskate of captured motions, it is difficult to precisely extract foot plants. In this paper, we present a general, efficient approach for foot plant detection. The key idea is determining the boundaries of foot plants by searching the most salient points around the boundaries. By this approach, foot plants can be precisely extracted from most of the flat terrain motions. The experimental results show the generality and robustness of our approach.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963066
M. Hosny, Mohammed Amr, Ibrahim A. Zedan, M. Abdelsalam, Muhammad Al-Sayd
In this paper, a new computational fluid dynamics-based system identification for marine vehicles (such as ships and underwater vehicles) is proposed. The procedure has the advantage of being quite intuitive due to its clear similarity with conventional practical system identification experiments. This helps the user to quickly setup reliable simulation experiments and eliminates lengthy abstraction/ modeling that is often needed to perform a practical experiment in simulation. The simulation times are quite reasonable and can be performed using opensource software, thus eliminating the high cost and “time-consuming”ness typically associated with conventional practical experiments-based system identification. Two case studies are used to demonstrate the procedure as well as a discussion of candidate applications where it may prove to be useful.
{"title":"Computational fluid dynamics-based system identification of marine vehicles","authors":"M. Hosny, Mohammed Amr, Ibrahim A. Zedan, M. Abdelsalam, Muhammad Al-Sayd","doi":"10.1109/ICCCNT.2014.6963066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963066","url":null,"abstract":"In this paper, a new computational fluid dynamics-based system identification for marine vehicles (such as ships and underwater vehicles) is proposed. The procedure has the advantage of being quite intuitive due to its clear similarity with conventional practical system identification experiments. This helps the user to quickly setup reliable simulation experiments and eliminates lengthy abstraction/ modeling that is often needed to perform a practical experiment in simulation. The simulation times are quite reasonable and can be performed using opensource software, thus eliminating the high cost and “time-consuming”ness typically associated with conventional practical experiments-based system identification. Two case studies are used to demonstrate the procedure as well as a discussion of candidate applications where it may prove to be useful.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963043
S. Sahu, Pooja Priyadarshini, Saurabh Bilgaiyan
Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of numerous researchers because of their various applications. They are resource constrained networks where memory capacity, energy and consumption of memory are limited. Therefore they are susceptible to several security threats and attacks. One such attack is Distributed Denial of Service (DDoS). These attacks' objective is to overwhelm the target with ample packets so that its resources get drained and also thwart its ability to procure genuine packets so that the victim fails to give desired response. This leads to the congestion of the network and the victim becomes exhausted leading to denial of service. In this paper we propose a traffic filtration mechanism which deploys mitigation measures to restrain the attackers' attempt at deluging the wireless sensor network with the motive of causing denial of service with enormous packets within limited time.
{"title":"Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network","authors":"S. Sahu, Pooja Priyadarshini, Saurabh Bilgaiyan","doi":"10.1109/ICCCNT.2014.6963043","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963043","url":null,"abstract":"Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of numerous researchers because of their various applications. They are resource constrained networks where memory capacity, energy and consumption of memory are limited. Therefore they are susceptible to several security threats and attacks. One such attack is Distributed Denial of Service (DDoS). These attacks' objective is to overwhelm the target with ample packets so that its resources get drained and also thwart its ability to procure genuine packets so that the victim fails to give desired response. This leads to the congestion of the network and the victim becomes exhausted leading to denial of service. In this paper we propose a traffic filtration mechanism which deploys mitigation measures to restrain the attackers' attempt at deluging the wireless sensor network with the motive of causing denial of service with enormous packets within limited time.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963092
P. Das, U. Bhattacharjee
In real world situation performance of speaker verification system drops significantly because of mismatched training and test conditions. In this paper we have analyzed three factors namely noise, channel variability and session variability, that are responsible for poor performance of a speaker verification system. The first step towards noise robustness GFCC features were used as recent research has shown better noise robustness of gammatone frequency cepstral coefficients over mel-frequency cepstral coefficients. In the second step robustness towards session and channel variability is achieved by shifting from the classical way of modeling a speaker to a rather new approach of joint factor analysis. Experimental results over different acoustic environment and over different SNR have shown significant improvement in the performance of the system.
{"title":"Robust speaker verification using GFCC and joint factor analysis","authors":"P. Das, U. Bhattacharjee","doi":"10.1109/ICCCNT.2014.6963092","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963092","url":null,"abstract":"In real world situation performance of speaker verification system drops significantly because of mismatched training and test conditions. In this paper we have analyzed three factors namely noise, channel variability and session variability, that are responsible for poor performance of a speaker verification system. The first step towards noise robustness GFCC features were used as recent research has shown better noise robustness of gammatone frequency cepstral coefficients over mel-frequency cepstral coefficients. In the second step robustness towards session and channel variability is achieved by shifting from the classical way of modeling a speaker to a rather new approach of joint factor analysis. Experimental results over different acoustic environment and over different SNR have shown significant improvement in the performance of the system.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963099
Pengyan Shen, Kai Guo, Mingzhong Xiao
Nowadays, the Personal Cloud Storage (PCS) service has been widely utilized by millions of users, not only because of its reliable ubiquitous storage but also numbers of exciting third-part applications that work as overlay networks based on user's data. However, we usually know few information about the PCS's performance which is quite important for both normal users and programmers. In this paper, we present a measurement study of four popular PCS services: Baidu, Kingsoft, Box and DropBox. By using the REST APIs offered by the storage providers, we collected the information from more than 41,000 storage operations with transferring over 200GB files, characterized the file transfer speed distributions, and analyzed important aspects that impact the file transfer speed. Indeed, we found some important characteristics in China that are different from the situations in the USA and Europe, which is significant. We believe our work can contribute to helping the researchers and developers to understand the behavior of these popular storage services.
{"title":"Measuring the QoS of Personal Cloud Storage","authors":"Pengyan Shen, Kai Guo, Mingzhong Xiao","doi":"10.1109/ICCCNT.2014.6963099","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963099","url":null,"abstract":"Nowadays, the Personal Cloud Storage (PCS) service has been widely utilized by millions of users, not only because of its reliable ubiquitous storage but also numbers of exciting third-part applications that work as overlay networks based on user's data. However, we usually know few information about the PCS's performance which is quite important for both normal users and programmers. In this paper, we present a measurement study of four popular PCS services: Baidu, Kingsoft, Box and DropBox. By using the REST APIs offered by the storage providers, we collected the information from more than 41,000 storage operations with transferring over 200GB files, characterized the file transfer speed distributions, and analyzed important aspects that impact the file transfer speed. Indeed, we found some important characteristics in China that are different from the situations in the USA and Europe, which is significant. We believe our work can contribute to helping the researchers and developers to understand the behavior of these popular storage services.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963112
Yang Jian, Yang Dengqi
The cryptographic operations in existing searchable encryption protocols will consume a lot of energy of terminals if they are used in mobile computing environment. To address this issue, novel schemes of searchable encryption are required. In this paper, for reducing user's computational burden generated by the expensive cryptographic operations, an agent-based searchable encryption (ABSE) scheme with its security model is proposed in order that the searchable encryption can be used in mobile computing environment. A concrete implement of ABSE with its security proof is presented to help user search the related data with some keywords trapdoors in either cases that the agent is online or offline. Performance analysis is also provided to show this scheme is suitable to be used in mobile environments.
{"title":"An agent-based searchable encryption scheme in mobile computing environment","authors":"Yang Jian, Yang Dengqi","doi":"10.1109/ICCCNT.2014.6963112","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963112","url":null,"abstract":"The cryptographic operations in existing searchable encryption protocols will consume a lot of energy of terminals if they are used in mobile computing environment. To address this issue, novel schemes of searchable encryption are required. In this paper, for reducing user's computational burden generated by the expensive cryptographic operations, an agent-based searchable encryption (ABSE) scheme with its security model is proposed in order that the searchable encryption can be used in mobile computing environment. A concrete implement of ABSE with its security proof is presented to help user search the related data with some keywords trapdoors in either cases that the agent is online or offline. Performance analysis is also provided to show this scheme is suitable to be used in mobile environments.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963016
Enming Miao, Zhishang Xu, Xiaoshuai Zhou, Derong Lei, Guannan Li
Thermal characteristic is one of the most important mechanical properties of materials. The paper studied the thermal deformation characteristics of mechanical parts by using the microscopic numerical simulation and macroscopic experiment. The paper took a set of 3D aluminum crystal models as the objects of study and got the thermal deformation data by the Molecular statics method. Meanwhile, we also carried out series of macroscopic thermal deformation experiments of aluminum sample. The consistency of microscopic simulation and macroscopic experiment results demonstrate that the thermal deformation of mechanical part is obviously affected by its shape and structure parameters, which should not be ignored in precision machinery engineering. The further study in this area will guide the optimization design of mechanical part parameters and improve the accuracy of precision machinery and instrument.
{"title":"Microscopic numerical simulation and experimental study of thermal deformation of mechanical parts","authors":"Enming Miao, Zhishang Xu, Xiaoshuai Zhou, Derong Lei, Guannan Li","doi":"10.1109/ICCCNT.2014.6963016","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963016","url":null,"abstract":"Thermal characteristic is one of the most important mechanical properties of materials. The paper studied the thermal deformation characteristics of mechanical parts by using the microscopic numerical simulation and macroscopic experiment. The paper took a set of 3D aluminum crystal models as the objects of study and got the thermal deformation data by the Molecular statics method. Meanwhile, we also carried out series of macroscopic thermal deformation experiments of aluminum sample. The consistency of microscopic simulation and macroscopic experiment results demonstrate that the thermal deformation of mechanical part is obviously affected by its shape and structure parameters, which should not be ignored in precision machinery engineering. The further study in this area will guide the optimization design of mechanical part parameters and improve the accuracy of precision machinery and instrument.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963057
K. Subbu, Suchith Soman
IEEE 802.11 and IEEE 802.15.4 are two of the main standards for wireless communications and networking in the unlicensed 2.4GHz band. Coexistence of devices functioning on these standards is imperative in scenarios such as smart homes, wireless body area networks etc. However, interference of one standard over the other has to be alleviated in order to coexist. In this paper, we propose a framework that serves a two-fold purpose. It provides an experimental methodology to infer WiFi interference through packet delivery ratio and RSSI measurements. Then it provides an algorithm for coexistence that run on Zigbee nodes to detect the presence of a WiFi interferer and accordingly switch to a non overlapping channel. Performance evaluation of the proposed coexistence mechanism across a pair of IEEE 802.15.14 receiver and sender yielded 73% reduction in the packet loss and 116% increase in packet delivery ratio when compared to no mechanism present.
{"title":"An interference mitigation scheme for IEEE 802.15.4 networks under IEEE 802.11b/g interference","authors":"K. Subbu, Suchith Soman","doi":"10.1109/ICCCNT.2014.6963057","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963057","url":null,"abstract":"IEEE 802.11 and IEEE 802.15.4 are two of the main standards for wireless communications and networking in the unlicensed 2.4GHz band. Coexistence of devices functioning on these standards is imperative in scenarios such as smart homes, wireless body area networks etc. However, interference of one standard over the other has to be alleviated in order to coexist. In this paper, we propose a framework that serves a two-fold purpose. It provides an experimental methodology to infer WiFi interference through packet delivery ratio and RSSI measurements. Then it provides an algorithm for coexistence that run on Zigbee nodes to detect the presence of a WiFi interferer and accordingly switch to a non overlapping channel. Performance evaluation of the proposed coexistence mechanism across a pair of IEEE 802.15.14 receiver and sender yielded 73% reduction in the packet loss and 116% increase in packet delivery ratio when compared to no mechanism present.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-11DOI: 10.1109/ICCCNT.2014.6963097
J. Cindhamani, Naguboynia Punya, Rasha Ealaruvi, L. D. Dhinesh Babu
Cloud computing is an emerging and advanced technology in IT enterprise which provides services on demand. Cloud computing includes many advantages such as flexibility, improved performance and low cost. Besides its advantages, cloud has many security issues and challenges. In this paper, we propose an enhanced frame work for data security in cloud which follows the security polices such as integrity, confidentiality and availability. The data is stored in cloud by using 128 bit encryption and RSA algorithm, then we use the trust management i.e., Trusted Party Auditor (TPA) which audits the data instead of client. Thus, we show how efficiently the data can be secured related to performance analysis.
{"title":"An enhanced data security and trust management enabled framework for cloud computing systems","authors":"J. Cindhamani, Naguboynia Punya, Rasha Ealaruvi, L. D. Dhinesh Babu","doi":"10.1109/ICCCNT.2014.6963097","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963097","url":null,"abstract":"Cloud computing is an emerging and advanced technology in IT enterprise which provides services on demand. Cloud computing includes many advantages such as flexibility, improved performance and low cost. Besides its advantages, cloud has many security issues and challenges. In this paper, we propose an enhanced frame work for data security in cloud which follows the security polices such as integrity, confidentiality and availability. The data is stored in cloud by using 128 bit encryption and RSA algorithm, then we use the trust management i.e., Trusted Party Auditor (TPA) which audits the data instead of client. Thus, we show how efficiently the data can be secured related to performance analysis.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130155387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}