We propose VERA - an authentication scheme where sensitive data on mobile phones can be secured or whereby services can be locked by the user's voice. Our algorithm takes use of acoustic fingerprints to identify the personalized voice. The security of the algorithm depends on the discrete logarithm problem in ZN where N is a safe prime. Further we evaluate two practical examples on Android devices where our scheme is used: First the encryption of any data(set). Second locking a mobile phone. Voice is the basic for both of the fields.
{"title":"Voice Encrypted Recognition Authentication - VERA","authors":"Sebastian Szlósarczyk, Andrea Schulte","doi":"10.1109/NGMAST.2015.74","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.74","url":null,"abstract":"We propose VERA - an authentication scheme where sensitive data on mobile phones can be secured or whereby services can be locked by the user's voice. Our algorithm takes use of acoustic fingerprints to identify the personalized voice. The security of the algorithm depends on the discrete logarithm problem in ZN where N is a safe prime. Further we evaluate two practical examples on Android devices where our scheme is used: First the encryption of any data(set). Second locking a mobile phone. Voice is the basic for both of the fields.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile users today can choose among different competing network operators offers, influenced in their choice by perceived and experienced quality, during the fruition of the service. The network operators must be able to react on quality issues, before the user perceives them. In order to do this, it is essential to establish a link between Quality of Experience (QoE) and Quality of Service (QoS) offered by the network performances. The Long term Evolution (LTE) Standard focuses on QoS definition, but doesn't define the QoS/QoE relationship. This article identifies the QoS a QoE parameters, named respectively Key Performance Indicators (KPI), and Key Quality Indicators (KQI), for Video Streaming and Voice over LTE (VoLTE) services, and then analyzes QoS/QoE mathematical relationship. The main contribution of this research relies on the possibility to predict the expected QoE level through the QoS/QoE relationship for the services under study delivered through LTE network.
{"title":"QoS KPI and QoE KQI Relationship for LTE VIdeo Streaming and VoLTE Services","authors":"M. Vaser, S. Forconi","doi":"10.1109/NGMAST.2015.34","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.34","url":null,"abstract":"Mobile users today can choose among different competing network operators offers, influenced in their choice by perceived and experienced quality, during the fruition of the service. The network operators must be able to react on quality issues, before the user perceives them. In order to do this, it is essential to establish a link between Quality of Experience (QoE) and Quality of Service (QoS) offered by the network performances. The Long term Evolution (LTE) Standard focuses on QoS definition, but doesn't define the QoS/QoE relationship. This article identifies the QoS a QoE parameters, named respectively Key Performance Indicators (KPI), and Key Quality Indicators (KQI), for Video Streaming and Voice over LTE (VoLTE) services, and then analyzes QoS/QoE mathematical relationship. The main contribution of this research relies on the possibility to predict the expected QoE level through the QoS/QoE relationship for the services under study delivered through LTE network.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116291783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a power management system, using cloud services, for the power generated by an aero-bike fitted with a dynamo. The system requirements necessary for stable operation and use are summarized. The system incorporates elements to charge rechargeable batteries efficiently and also to maintain the user's motivation by providing some enjoyment and pleasure while using the system. The new system elements, which comprise a power sensing module, charging equipment and an entertainment system working in cooperation with Street View have been designed and their functions were confirmed prior to system integration. A system has been built using the developed equipment, and is now being operated by the group promoting ECO activities on the campus.
{"title":"Development of Management System for Generated Power Using Cloud Services: Application to Aero-Bike Equipped with Dynamo","authors":"T. Ebihara, Shotaro Murata, Hiroshi Tanaka","doi":"10.1109/NGMAST.2015.37","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.37","url":null,"abstract":"This paper presents a power management system, using cloud services, for the power generated by an aero-bike fitted with a dynamo. The system requirements necessary for stable operation and use are summarized. The system incorporates elements to charge rechargeable batteries efficiently and also to maintain the user's motivation by providing some enjoyment and pleasure while using the system. The new system elements, which comprise a power sensing module, charging equipment and an entertainment system working in cooperation with Street View have been designed and their functions were confirmed prior to system integration. A system has been built using the developed equipment, and is now being operated by the group promoting ECO activities on the campus.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Providing in-Enterprise cellular can be complex and costly, with a number of available technologies. This paper presents the design and operation of a smart and optimal in-building small cell solution.
{"title":"Using Value Added Services to Realise the Benefits of Enterprise Small Cell Deployments: Discussion and Prototype","authors":"David Lake, C. Balakrishna","doi":"10.1109/NGMAST.2015.76","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.76","url":null,"abstract":"Providing in-Enterprise cellular can be complex and costly, with a number of available technologies. This paper presents the design and operation of a smart and optimal in-building small cell solution.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emergence of social networks have opened a new paradigm for Web practises from an individual (called as an actor or a member) to a professional students groups to exchange their information with their contemporaries quickly and efficiently. The social networking enables to set up relations among the actors who share common interests, activities or connections. The blending of a social network with good Web practises is the new area of research, which has opened new opportunities for activity based actors to be aware of the developments in their area without themselves asking for the information. In this paper, we present Web Service Query Selection for a Professional Social Network Members (WSQSPSNM) by considering actor's characteristic features like personal information, professional information, etc., which reflects on the Web queries generated by actors. In this method, we classify professional group members based on their hierarchical and equivalence relations with respect to professional activities. In the case of any group of actors raises a Web query, the proposed system selects appropriate Web service query for the rest of the group members based on the allocated weights, relations and level of actors. The designed WSQSPSNM is tested over an Academic Social Network (ASN) which constitutes a set of actors related to the academic profession. If any one of them raises a professional Web query, the system generates appropriate Web queries for all the group members based on relations and level. We have simulated different sets of academic professionals, and results were obtained for the average time required by a set of Web queries of actors and the accuracy of the model.
{"title":"Web Service Query Selection for a Professional Social Network Members","authors":"Swapnil S. Ninawe, P. Venkataram","doi":"10.1109/NGMAST.2015.60","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.60","url":null,"abstract":"The emergence of social networks have opened a new paradigm for Web practises from an individual (called as an actor or a member) to a professional students groups to exchange their information with their contemporaries quickly and efficiently. The social networking enables to set up relations among the actors who share common interests, activities or connections. The blending of a social network with good Web practises is the new area of research, which has opened new opportunities for activity based actors to be aware of the developments in their area without themselves asking for the information. In this paper, we present Web Service Query Selection for a Professional Social Network Members (WSQSPSNM) by considering actor's characteristic features like personal information, professional information, etc., which reflects on the Web queries generated by actors. In this method, we classify professional group members based on their hierarchical and equivalence relations with respect to professional activities. In the case of any group of actors raises a Web query, the proposed system selects appropriate Web service query for the rest of the group members based on the allocated weights, relations and level of actors. The designed WSQSPSNM is tested over an Academic Social Network (ASN) which constitutes a set of actors related to the academic profession. If any one of them raises a professional Web query, the system generates appropriate Web queries for all the group members based on relations and level. We have simulated different sets of academic professionals, and results were obtained for the average time required by a set of Web queries of actors and the accuracy of the model.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose an efficient resource allocation scheme for an integrated satellite/terrestrial network. The proposed scheme is a frequency sharing technique to mitigate its inter-component interferences which can be generated between the satellite beam and terrestrial cells that are operated in the same frequency. The proposed dynamic resource allocation scheme can mitigate the total inter-component interference by optimizing the total transmission power, which can lead to an increase in capacity. In such a system, the interference situation can be different by the distributed traffic demands or up/down link communication environments. In this point of view, we evaluate the performance of the proposed scheme by analyzing the total consumed power as well as the amount of interference under the different traffic distributions and interference environments.
{"title":"Performance Analysis of Dynamic Resource Allocation for Interference Mitigation in Integrated Satellite and Terrestrial Systems","authors":"Unhee Park, Heechul Kim, D. Oh, D. Chang","doi":"10.1109/NGMAST.2015.16","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.16","url":null,"abstract":"In this paper, we propose an efficient resource allocation scheme for an integrated satellite/terrestrial network. The proposed scheme is a frequency sharing technique to mitigate its inter-component interferences which can be generated between the satellite beam and terrestrial cells that are operated in the same frequency. The proposed dynamic resource allocation scheme can mitigate the total inter-component interference by optimizing the total transmission power, which can lead to an increase in capacity. In such a system, the interference situation can be different by the distributed traffic demands or up/down link communication environments. In this point of view, we evaluate the performance of the proposed scheme by analyzing the total consumed power as well as the amount of interference under the different traffic distributions and interference environments.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Bellido, C. M. Lentisco, Miguel Aguayo, E. Pastor
The heterogeneity of the network poses new challenges on the paradigm of multimedia content distribution. Nowadays, different access technologies coexist in user terminals, so it is possible to improve the performance or avoid coverage problems by switching from one to another. This process is known as handover. In this work we have focused on vertical handover, which is the process of switching between different access technologies without losing connectivity. If a handover happens during a video streaming session, the session will need to adapt to the different channel conditions. This paper discusses the proposal of a new mechanism at the application level to support a handover between a unicast video streaming session and a video session based on LTE broadcasting.
{"title":"Supporting Handover between LTE Video Broadcasting and Unicast Streaming","authors":"L. Bellido, C. M. Lentisco, Miguel Aguayo, E. Pastor","doi":"10.1109/NGMAST.2015.59","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.59","url":null,"abstract":"The heterogeneity of the network poses new challenges on the paradigm of multimedia content distribution. Nowadays, different access technologies coexist in user terminals, so it is possible to improve the performance or avoid coverage problems by switching from one to another. This process is known as handover. In this work we have focused on vertical handover, which is the process of switching between different access technologies without losing connectivity. If a handover happens during a video streaming session, the session will need to adapt to the different channel conditions. This paper discusses the proposal of a new mechanism at the application level to support a handover between a unicast video streaming session and a video session based on LTE broadcasting.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing has created a remarkable paradigm shift in the IT industry and brought several advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. These advantages enabled cloud to have significant impact on different sectors of smart cites. However, cloud adoption has increased the sophistication of the ever changing security risks which frustrate enterprises on expanding their on-premises infrastructure towards cloud horizons. These risks have the potential of being a major concern for smart cities due to the increasing impact of cloud on them. Managing these security risks requires adopting effective risk management method which involve both the cloud service provider and the customer. The risk management frameworks currently applied to manage enterprise IT risks do not readily fit the cloud environment and the dynamic nature of clouds, which are characterized by on demand self-service and rapid elasticity. Therefore, researchers have proposed different cloud security risk management methods and frameworks. This paper critically reviews these risk management methods and frameworks. In addition, it conducts critical analysis on two of them using qualitative content analysis technique, and evaluates their effectiveness for assessing and mitigating cloud security risks.
{"title":"Cloud Security Risk Management: A Critical Review","authors":"Temesgen Kitaw Damenu, C. Balakrishna","doi":"10.1109/NGMAST.2015.25","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.25","url":null,"abstract":"Cloud computing has created a remarkable paradigm shift in the IT industry and brought several advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. These advantages enabled cloud to have significant impact on different sectors of smart cites. However, cloud adoption has increased the sophistication of the ever changing security risks which frustrate enterprises on expanding their on-premises infrastructure towards cloud horizons. These risks have the potential of being a major concern for smart cities due to the increasing impact of cloud on them. Managing these security risks requires adopting effective risk management method which involve both the cloud service provider and the customer. The risk management frameworks currently applied to manage enterprise IT risks do not readily fit the cloud environment and the dynamic nature of clouds, which are characterized by on demand self-service and rapid elasticity. Therefore, researchers have proposed different cloud security risk management methods and frameworks. This paper critically reviews these risk management methods and frameworks. In addition, it conducts critical analysis on two of them using qualitative content analysis technique, and evaluates their effectiveness for assessing and mitigating cloud security risks.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134013626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A vehicular ad hoc network (VANET) is composed by a group of communicating vehicles without the use of any infrastructure. The services provided by a VANET range from enhancing safety on an accident scene to advertisements of local services or events. Time-critical applications require packets to be broadcast with the lowest possible delay. In this paper, we propose Fast-OB-VAN, which is a broadcast opportunistic protocol compliant with the IEEE 802.11p standard. We show that by carefully setting what is sent by nodes during a transmission interval, delay may be considerably reduced. Our protocol is able to reach great achievements on delay compared with OB-VAN, which has been previously proposed in the literature. We execute an extensive campaign of simulations with the NS-3 simulator and we find that Fast-OB-VAN incurs on very low delay for broadcast packets. Moreover, we consider three additional key performance measures being the number of vehicles rebroadcasting a packet, the number of times that the protocol completes correctly, and the percentage of vehicles receiving the broadcast packet. We show that our proposed Fast-OB-VAN protocol greatly outperforms OB-VAN for most of the metrics considered.
{"title":"Fast-OB-VAN: A Fast Opportunistic Broadcast Protocol for VANETs","authors":"Salvador Gonzalez, V. Ramos","doi":"10.1109/NGMAST.2015.52","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.52","url":null,"abstract":"A vehicular ad hoc network (VANET) is composed by a group of communicating vehicles without the use of any infrastructure. The services provided by a VANET range from enhancing safety on an accident scene to advertisements of local services or events. Time-critical applications require packets to be broadcast with the lowest possible delay. In this paper, we propose Fast-OB-VAN, which is a broadcast opportunistic protocol compliant with the IEEE 802.11p standard. We show that by carefully setting what is sent by nodes during a transmission interval, delay may be considerably reduced. Our protocol is able to reach great achievements on delay compared with OB-VAN, which has been previously proposed in the literature. We execute an extensive campaign of simulations with the NS-3 simulator and we find that Fast-OB-VAN incurs on very low delay for broadcast packets. Moreover, we consider three additional key performance measures being the number of vehicles rebroadcasting a packet, the number of times that the protocol completes correctly, and the percentage of vehicles receiving the broadcast packet. We show that our proposed Fast-OB-VAN protocol greatly outperforms OB-VAN for most of the metrics considered.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Multi-hop Infrastructures (WMIs) enable mobile users to access the Internet through wireless multi-hop connections. Compared with conventional network infrastructures, WMIs have the low cost and flexible network deployment. The applications of WMI include smart cities, emergency responses and Internet of things. In emergency situations, WMI networks may have energy constraint. Furthermore, user mobility may be restricted to a limited area. In this paper, we study the network sustainability performance in WMI networks that have energy constraint and limited scope of user mobility. The sustainability of the WMI depends on network energy, connectivity, as well as user distributions. The collective sharing of network tasks among infrastructure nodes highly affects the network sustainability. However, few studies to date addressed the sustainability performance of network with the decreasing of both node energy and network connectivity. This paper specially examines the impact of decreasing energy and connectivity depletion in WMIs that have biased scope of user mobility. Performance evaluation is conducted based on packetlevel simulations. The evaluation show spatio-temporal features of energy-and-connectivity in WMI networks. With the investigation of various routing metrics, evaluation results show that energyaware metric leads to the collective sharing of packet forwarding with 16-30 percent improvement at the BSs out of the user mobility scope. The results also show that limited scope of user mobility leads to a decrease of network lifetime.
{"title":"Performance Evaluation of the Network Sustainability in Wireless Multi-hop Infrastructures with Biased User Mobility","authors":"R. Teng, Huan-Bang Li, R. Miura","doi":"10.1109/NGMAST.2015.58","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.58","url":null,"abstract":"Wireless Multi-hop Infrastructures (WMIs) enable mobile users to access the Internet through wireless multi-hop connections. Compared with conventional network infrastructures, WMIs have the low cost and flexible network deployment. The applications of WMI include smart cities, emergency responses and Internet of things. In emergency situations, WMI networks may have energy constraint. Furthermore, user mobility may be restricted to a limited area. In this paper, we study the network sustainability performance in WMI networks that have energy constraint and limited scope of user mobility. The sustainability of the WMI depends on network energy, connectivity, as well as user distributions. The collective sharing of network tasks among infrastructure nodes highly affects the network sustainability. However, few studies to date addressed the sustainability performance of network with the decreasing of both node energy and network connectivity. This paper specially examines the impact of decreasing energy and connectivity depletion in WMIs that have biased scope of user mobility. Performance evaluation is conducted based on packetlevel simulations. The evaluation show spatio-temporal features of energy-and-connectivity in WMI networks. With the investigation of various routing metrics, evaluation results show that energyaware metric leads to the collective sharing of packet forwarding with 16-30 percent improvement at the BSs out of the user mobility scope. The results also show that limited scope of user mobility leads to a decrease of network lifetime.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}