Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737948
D. Mouromtsev, Vitaly Vlasov, Olga Parkhimovich, Mikhail Galkin, Vitaly Knyazev
This paper discusses the Russian projects publishing open government data. The article also describes the development of the open linked data portal and its approach to convert open government data in the open linked data. Information Workbench is used to build this system. It allows storing, visualizing and converting data files in Semantic Web formats.
{"title":"Development of the St. Petersburg's linked open data site using Information Workbench","authors":"D. Mouromtsev, Vitaly Vlasov, Olga Parkhimovich, Mikhail Galkin, Vitaly Knyazev","doi":"10.1109/FRUCT.2013.6737948","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737948","url":null,"abstract":"This paper discusses the Russian projects publishing open government data. The article also describes the development of the open linked data portal and its approach to convert open government data in the open linked data. Information Workbench is used to build this system. It allows storing, visualizing and converting data files in Semantic Web formats.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123033747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737940
V. Bashun, A. Sergeev, Victor Minchenkov, A. Yakovlev
Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) including also powerful security mechanisms (e.g. secure boot, update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. From the other side UEFI technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. The main goal of this research is to provide analysis of the UEFI security issues, find the point and source of the security problems and classify them. The paper describes the architectural and implementation troubles of UEFI which lead to threats, vulnerabilities and attacks. It also includes extensive review of the previous research activities in this area and the results of our own experiments. As the result of the work some recommendation about how to make this young technology more safe and secure are provided.
{"title":"Too young to be secure: Analysis of UEFI threats and vulnerabilities","authors":"V. Bashun, A. Sergeev, Victor Minchenkov, A. Yakovlev","doi":"10.1109/FRUCT.2013.6737940","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737940","url":null,"abstract":"Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) including also powerful security mechanisms (e.g. secure boot, update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. From the other side UEFI technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. The main goal of this research is to provide analysis of the UEFI security issues, find the point and source of the security problems and classify them. The paper describes the architectural and implementation troubles of UEFI which lead to threats, vulnerabilities and attacks. It also includes extensive review of the previous research activities in this area and the results of our own experiments. As the result of the work some recommendation about how to make this young technology more safe and secure are provided.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127418126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737950
V. Pavlov, V. Khryashchev, Evgeny Pavlov, L. Shmaglit
An application for video data analysis based on computer vision methods is presented. The proposed system consists of five consecutive stages: face detection, face tracking, gender recognition, age classification and statistics analysis. AdaBoost classifier is utilized for face detection. A modification of Lucas and Kanade algorithm is introduced on the stage of tracking. Novel gender and age classifiers based on adaptive features and support vector machines are proposed. All the stages are united into a single system of audience analysis. The proposed software complex can find its applications in different areas, from digital signage and video surveillance to automatic systems of accident prevention and intelligent human-computer interfaces.
{"title":"Application for video analysis based on machine learning and computer vision algorithms","authors":"V. Pavlov, V. Khryashchev, Evgeny Pavlov, L. Shmaglit","doi":"10.1109/FRUCT.2013.6737950","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737950","url":null,"abstract":"An application for video data analysis based on computer vision methods is presented. The proposed system consists of five consecutive stages: face detection, face tracking, gender recognition, age classification and statistics analysis. AdaBoost classifier is utilized for face detection. A modification of Lucas and Kanade algorithm is introduced on the stage of tracking. Novel gender and age classifiers based on adaptive features and support vector machines are proposed. All the stages are united into a single system of audience analysis. The proposed software complex can find its applications in different areas, from digital signage and video surveillance to automatic systems of accident prevention and intelligent human-computer interfaces.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737938
Yury A. Apanasik, I. Shabalina, A. Shabaev
The paper describes development process of information environment for persons with disabilities. Introduction gives a base understanding of the project idea. The first section of the main part describes common infrastructure architecture. Services are divided on government and public. The public part is presented by various services, based on the information collected by government service. Government service is presented by information system “Accessibility passports”, which in details is described in second section of main part. The “Accessibility passports” is a service for initial collection of data about accessibility of the social infrastructure facilities for people with disabilities. In the last section of the main part presented a mathematical method for measuring level of accessibility of the social infrastructure facilities for people with disabilities. Method is based on probability theory and provide possibility for formal ranging of the social infrastructure facilities according to the level of accessibility for persons with limited mobility.
{"title":"“Accessibility passports” service in information environment for persons with disabilities","authors":"Yury A. Apanasik, I. Shabalina, A. Shabaev","doi":"10.1109/FRUCT.2013.6737938","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737938","url":null,"abstract":"The paper describes development process of information environment for persons with disabilities. Introduction gives a base understanding of the project idea. The first section of the main part describes common infrastructure architecture. Services are divided on government and public. The public part is presented by various services, based on the information collected by government service. Government service is presented by information system “Accessibility passports”, which in details is described in second section of main part. The “Accessibility passports” is a service for initial collection of data about accessibility of the social infrastructure facilities for people with disabilities. In the last section of the main part presented a mathematical method for measuring level of accessibility of the social infrastructure facilities for people with disabilities. Method is based on probability theory and provide possibility for formal ranging of the social infrastructure facilities according to the level of accessibility for persons with limited mobility.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129238046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737954
S. Prakash, T. N. Nagabhushan, K. Krinkin
In recent times Wireless Mesh Networks (WMN) have evolved as powerful networks for most commercial applications. Many contributions have been made to enhance the performance of WMN of which the enhancement of the network lifetime remains as one of the challenging area for research. IEEE standard proposed an amendment which introduced Power Save Mode (PSM) in order to increase the lifetime of WMN. It has three modes such as Active, Light Sleep and Deep Sleep. There exist a lot of literature on increasing energy efficiency by keeping node in Deep Sleep mode when it is not involved in transmission. But current Power Save Mode has some deficiency in low Packet Delivery Ratio (PDR). This paper presents Energy Aware Power Save Mode (EAPSM) which attempt to overcome the deficiency of low PDR by triggering PSM. EAPSM consist of three modules namely, remaining energy calculator, transmission mode identifier and PSM scheduler. EAPSM schedules PSM based on the constraints such as remaining energy of a node and its participation in transmission. The proposed method includes mathematical model and algorithms which gives improved performance over conventional PSM.
{"title":"Energy aware power save mode management in wireless mesh networks","authors":"S. Prakash, T. N. Nagabhushan, K. Krinkin","doi":"10.1109/FRUCT.2013.6737954","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737954","url":null,"abstract":"In recent times Wireless Mesh Networks (WMN) have evolved as powerful networks for most commercial applications. Many contributions have been made to enhance the performance of WMN of which the enhancement of the network lifetime remains as one of the challenging area for research. IEEE standard proposed an amendment which introduced Power Save Mode (PSM) in order to increase the lifetime of WMN. It has three modes such as Active, Light Sleep and Deep Sleep. There exist a lot of literature on increasing energy efficiency by keeping node in Deep Sleep mode when it is not involved in transmission. But current Power Save Mode has some deficiency in low Packet Delivery Ratio (PDR). This paper presents Energy Aware Power Save Mode (EAPSM) which attempt to overcome the deficiency of low PDR by triggering PSM. EAPSM consist of three modules namely, remaining energy calculator, transmission mode identifier and PSM scheduler. EAPSM schedules PSM based on the constraints such as remaining energy of a node and its participation in transmission. The proposed method includes mathematical model and algorithms which gives improved performance over conventional PSM.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737947
Nadezhda Matveeva, E. Suvorova
Some modern standards in space industry, which are being used in embedded networking designs, provide quality of service features, which are implemented by means of virtual channels. Implementations of virtual channels mechanisms are very different. Each implementation has its latency characteristics for packet flow, hardware cost and performance. These parameters depend on the virtual channels quantity in a port and switch matrix's channels quantity connected to every port (connection point). The connection point quantity can vary from one to a number of virtual channels in port. We consider three structures and implementations of network layer. In the first implementation quantity of connection points is equal to number of virtual channels in a port. In the second - one connection point. The third - one connection point with lower priority data transmission interruption. In this article we compare characteristics of different architecture implementations and structures of port controllers and switch matrix. Also we analyze and simulate proposed mechanism. We present formulas to calculate minimum and maximum data packet transmission latency and compare theoretic and simulation results. Count of virtual channels is 4 for simulation, packet length - 250, 750 bytes. Moreover router's switch matrix hardware cost is evaluated in the article.
{"title":"Different implementation of network level in embedded networking with QoS","authors":"Nadezhda Matveeva, E. Suvorova","doi":"10.1109/FRUCT.2013.6737947","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737947","url":null,"abstract":"Some modern standards in space industry, which are being used in embedded networking designs, provide quality of service features, which are implemented by means of virtual channels. Implementations of virtual channels mechanisms are very different. Each implementation has its latency characteristics for packet flow, hardware cost and performance. These parameters depend on the virtual channels quantity in a port and switch matrix's channels quantity connected to every port (connection point). The connection point quantity can vary from one to a number of virtual channels in port. We consider three structures and implementations of network layer. In the first implementation quantity of connection points is equal to number of virtual channels in a port. In the second - one connection point. The third - one connection point with lower priority data transmission interruption. In this article we compare characteristics of different architecture implementations and structures of port controllers and switch matrix. Also we analyze and simulate proposed mechanism. We present formulas to calculate minimum and maximum data packet transmission latency and compare theoretic and simulation results. Count of virtual channels is 4 for simulation, packet length - 250, 750 bytes. Moreover router's switch matrix hardware cost is evaluated in the article.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737941
O. Dementev
Machine-Type Communications is an important part of the infrastructure of LTE. This technology connects with all the other new technologies in mobile communications. In this paper, we describe Machine-Type Communications and its relation with other technologies, e.g. heterogeneous networks and device-to-device communications. We will show a simple model of Machine Type Communications in the LTE-A network (random access procedure) and discuss M2M technology. First we describe the concept of heterogeneous networks and device-to-device communications. After that we consider the Machine-Type Communications and power consumption problem.
{"title":"Machine-type communications as part of LTE-advanced technology in beyond-4G networks","authors":"O. Dementev","doi":"10.1109/FRUCT.2013.6737941","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737941","url":null,"abstract":"Machine-Type Communications is an important part of the infrastructure of LTE. This technology connects with all the other new technologies in mobile communications. In this paper, we describe Machine-Type Communications and its relation with other technologies, e.g. heterogeneous networks and device-to-device communications. We will show a simple model of Machine Type Communications in the LTE-A network (random access procedure) and discuss M2M technology. First we describe the concept of heterogeneous networks and device-to-device communications. After that we consider the Machine-Type Communications and power consumption problem.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737955
C. Schuss, T. Rahkonen
In this paper we present strategies to harvest solar energy for mobile phones. Thereby, we discuss system structures, in which mobile phones act as either active or passive devices depending on an available communication between smartphones and their solar chargers. Both design approaches have their advantages and disadvantages, which we will elaborate in more detail in our analysis. At the moment, conventional solar chargers do not meet user expectations and need substantial improvements. We aim to establish design guidelines to make solar chargers competitive with normal chargers, which are plugged into electric sockets. As a result, we achieve appropriate recharging times for smartphones on the one hand and satisfy user requirements on the other hand.
{"title":"Solar energy harvesting strategies for portable devices such as mobile phones","authors":"C. Schuss, T. Rahkonen","doi":"10.1109/FRUCT.2013.6737955","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737955","url":null,"abstract":"In this paper we present strategies to harvest solar energy for mobile phones. Thereby, we discuss system structures, in which mobile phones act as either active or passive devices depending on an available communication between smartphones and their solar chargers. Both design approaches have their advantages and disadvantages, which we will elaborate in more detail in our analysis. At the moment, conventional solar chargers do not meet user expectations and need substantial improvements. We aim to establish design guidelines to make solar chargers competitive with normal chargers, which are plugged into electric sockets. As a result, we achieve appropriate recharging times for smartphones on the one hand and satisfy user requirements on the other hand.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126010596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737961
Roman Zharinov, Dmitriy Virovlyanskiy, Yu.M. Shvedov
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move confidential data around. Safety measures can be both: hardware and software information security solutions. The cases of development and usage of custom, their own systems of automation of information processing (electronic document management, accounting, backup, etc.) are not rare, any more. In that case information security department assess the sustainability of computer networks or systems to attacks by the software, forgetting the data that being transmitted over the Ethernet (except, perhaps, Wi-Fi channel, but they only checking for cryptographically strong algorithm and a password). In current article, we propose a concept of the device for not-detectable interception (and modification) of the transmitted information through the Ethernet network.
{"title":"Undetectable interception of network traffic on LAN technologies","authors":"Roman Zharinov, Dmitriy Virovlyanskiy, Yu.M. Shvedov","doi":"10.1109/FRUCT.2013.6737961","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737961","url":null,"abstract":"Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move confidential data around. Safety measures can be both: hardware and software information security solutions. The cases of development and usage of custom, their own systems of automation of information processing (electronic document management, accounting, backup, etc.) are not rare, any more. In that case information security department assess the sustainability of computer networks or systems to attacks by the software, forgetting the data that being transmitted over the Ethernet (except, perhaps, Wi-Fi channel, but they only checking for cryptographically strong algorithm and a password). In current article, we propose a concept of the device for not-detectable interception (and modification) of the transmitted information through the Ethernet network.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/FRUCT.2013.6737953
S. Popova, Liubov Kovriguina, D. Mouromtsev, I. Khodyrev
Keyword extraction problem is one of the most significant tasks in information retrieval. High-quality keyword extraction sufficiently influences the progress in the following subtasks of information retrieval: classification and clustering, data mining, knowledge extraction and representation, etc. The research environment has specified a layout for keyphrase extraction. However, some of the possible decisions remain uninvolved in the paradigm. In the paper the authors observe the scope of interdisciplinary methods applicable to automatic stop list feeding. The chosen method belongs to the class of experiential models. The research procedure based on this method allows to improve the quality of keyphrase extraction on the stage of candidate keyphrase building. Several ways to automatic feeding of the stop lists are proposed in the paper as well. One of them is based on provisions of lexical statistics and the results of its application to the discussed task point out the non-gaussian nature of text corpora. The second way based on usage of the Inspec train collection to the feeding of stop lists improves the quality considerably.
{"title":"Stop-words in keyphrase extraction problem","authors":"S. Popova, Liubov Kovriguina, D. Mouromtsev, I. Khodyrev","doi":"10.1109/FRUCT.2013.6737953","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737953","url":null,"abstract":"Keyword extraction problem is one of the most significant tasks in information retrieval. High-quality keyword extraction sufficiently influences the progress in the following subtasks of information retrieval: classification and clustering, data mining, knowledge extraction and representation, etc. The research environment has specified a layout for keyphrase extraction. However, some of the possible decisions remain uninvolved in the paradigm. In the paper the authors observe the scope of interdisciplinary methods applicable to automatic stop list feeding. The chosen method belongs to the class of experiential models. The research procedure based on this method allows to improve the quality of keyphrase extraction on the stage of candidate keyphrase building. Several ways to automatic feeding of the stop lists are proposed in the paper as well. One of them is based on provisions of lexical statistics and the results of its application to the discussed task point out the non-gaussian nature of text corpora. The second way based on usage of the Inspec train collection to the feeding of stop lists improves the quality considerably.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}