Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867516
Zhang Zhaohui, Mei Xuesong, Bian Xu, Cai Hanghang, Ti Jian
The research and development of intelligent interaction service robot become popular these years. Human-robot interaction play an important role in service robot as the intelligent behavior is natural way that people communicate with robot. This paper presents Xinxin, an intelligent interaction service robot designed as receptionist, partner and a mascot of 120th anniversary of XJTU. The robot combines simultaneous localization and mapping (SLAM), somatosensory interaction with the robotic arm, voice command, remote control by workstation and telephone's APP, using Robot Operate System (ROS) as the core of information processing. This paper describes the software and hardware platform of the robot, and the solution of system integration. Finally, experiments shows that the robot has reliable and effective performance on human-robot interaction.
{"title":"Development of an intelligent interaction service robot using ROS","authors":"Zhang Zhaohui, Mei Xuesong, Bian Xu, Cai Hanghang, Ti Jian","doi":"10.1109/IMCEC.2016.7867516","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867516","url":null,"abstract":"The research and development of intelligent interaction service robot become popular these years. Human-robot interaction play an important role in service robot as the intelligent behavior is natural way that people communicate with robot. This paper presents Xinxin, an intelligent interaction service robot designed as receptionist, partner and a mascot of 120th anniversary of XJTU. The robot combines simultaneous localization and mapping (SLAM), somatosensory interaction with the robotic arm, voice command, remote control by workstation and telephone's APP, using Robot Operate System (ROS) as the core of information processing. This paper describes the software and hardware platform of the robot, and the solution of system integration. Finally, experiments shows that the robot has reliable and effective performance on human-robot interaction.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867441
Minyi Xian, Yongtang Zhang
Traditional multi-step attack correlation approaches based on intrusion alerts face the challenge of recognizing attack scenarios because these approaches require complex pre-defined association rules as well as a high dependency on expert knowledge. Meanwhile, they barely consider the privacy issues. Under such circumstance, a novel algorithm is proposed to construct multi-step attack scenarios based on discovering attack behavior sequential patterns. It analyzes time sequential characteristics of attack behaviors and implements a support evaluation method. An optimized candidate attack sequence generation method is applied to solve the problem of pre-defined association rules complexity as well as expert knowledge dependency. An enhanced k-anonymity method is applied on this algorithm to realize privacy-preserving feature Experimental results indicate that the algorithm has comparatively better performance and accuracy on multi-step attack correlation and reaches a well balance between efficiency and privacy issues.
{"title":"A privacy-preserving multi-step attack correlation algorithm","authors":"Minyi Xian, Yongtang Zhang","doi":"10.1109/IMCEC.2016.7867441","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867441","url":null,"abstract":"Traditional multi-step attack correlation approaches based on intrusion alerts face the challenge of recognizing attack scenarios because these approaches require complex pre-defined association rules as well as a high dependency on expert knowledge. Meanwhile, they barely consider the privacy issues. Under such circumstance, a novel algorithm is proposed to construct multi-step attack scenarios based on discovering attack behavior sequential patterns. It analyzes time sequential characteristics of attack behaviors and implements a support evaluation method. An optimized candidate attack sequence generation method is applied to solve the problem of pre-defined association rules complexity as well as expert knowledge dependency. An enhanced k-anonymity method is applied on this algorithm to realize privacy-preserving feature Experimental results indicate that the algorithm has comparatively better performance and accuracy on multi-step attack correlation and reaches a well balance between efficiency and privacy issues.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128877528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867575
Bei Cao, Jiang Yu, Fengxiang Cao, Qingzhao Ji, G. Xie, Kansheng Yu, Lixia Xiong
To efficiently implement the technology validation and test of power electronic devices, a new test method is presented, APF controller closed-loop simulation based on RTDS. Simulate those primary circuits by software in RTDS, such as three-phase grid, load and APF inverter bridge, DC side capacitor and circuit breaker. The APF control and protection part are done through the control panel in real devices. The standard interfaces of RTDS physical controller simulation are formed by 5 signal-conditioning modules, which fix the signal mismatch between APF controller and RTDS software models. In addition, construct the overall simulation model in RTDS small-step environment and some modeling methods of core modules are presented, including IGBT trigger pulse, protection and control signal logic, short circuit fault model in RTDS, operation observation interface and etc., which establish the complete test procedures and items. In the end, the effectiveness of the method is verified through comparative analysis of the test data between RTDS and real device testing. It brings up a new idea to efficiently implement the development and test of power electronic devices.
{"title":"Study on simulation technology of APF controller based on RTDS","authors":"Bei Cao, Jiang Yu, Fengxiang Cao, Qingzhao Ji, G. Xie, Kansheng Yu, Lixia Xiong","doi":"10.1109/IMCEC.2016.7867575","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867575","url":null,"abstract":"To efficiently implement the technology validation and test of power electronic devices, a new test method is presented, APF controller closed-loop simulation based on RTDS. Simulate those primary circuits by software in RTDS, such as three-phase grid, load and APF inverter bridge, DC side capacitor and circuit breaker. The APF control and protection part are done through the control panel in real devices. The standard interfaces of RTDS physical controller simulation are formed by 5 signal-conditioning modules, which fix the signal mismatch between APF controller and RTDS software models. In addition, construct the overall simulation model in RTDS small-step environment and some modeling methods of core modules are presented, including IGBT trigger pulse, protection and control signal logic, short circuit fault model in RTDS, operation observation interface and etc., which establish the complete test procedures and items. In the end, the effectiveness of the method is verified through comparative analysis of the test data between RTDS and real device testing. It brings up a new idea to efficiently implement the development and test of power electronic devices.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867529
Chun Jiao, Guojian Cheng, Ming Tang, Shipei Chen
The monitoring technology of physiological status, which is able to detect physiological information continuously and noninvasively, transmit data wirelessly, process the data in real time, is the main part of wearable or portable health monitoring technology, which has been the present research hotspot in health care field. In the paper, according to the design requirements of micro power consumption and miniaturization, on the basis of 16-bit microcontroller MSP430F4616, the overall design ideas and concrete realization method are all stated in detail combining with the design of the forward path, micro power consumption, the control program and the wireless communication unit.
{"title":"Portable monitoring instrument of physiological parameter based on MSP430 microcontroller","authors":"Chun Jiao, Guojian Cheng, Ming Tang, Shipei Chen","doi":"10.1109/IMCEC.2016.7867529","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867529","url":null,"abstract":"The monitoring technology of physiological status, which is able to detect physiological information continuously and noninvasively, transmit data wirelessly, process the data in real time, is the main part of wearable or portable health monitoring technology, which has been the present research hotspot in health care field. In the paper, according to the design requirements of micro power consumption and miniaturization, on the basis of 16-bit microcontroller MSP430F4616, the overall design ideas and concrete realization method are all stated in detail combining with the design of the forward path, micro power consumption, the control program and the wireless communication unit.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"1022 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115410927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867339
A. Alam, Lei Tao, Kashif Habib, Shahbaz Khan
The Buck-Boost converter with pulse width modulator has a large impact on power industry in energy management, specifically for electronic devices. In this paper the sub-optimal model predictive control algorithm applied to Buck-boost converter, which assured robust stability of system. Lyapunov function was used to ensure the constraints of model predictive cost function. In most of DC-DC converters, simple current control method is used for stability of system. This algorithm based on simpler optimization problems, which can be solved faster, and still have prior robust stability and discard all disturbances.
{"title":"Model predictive control for disturbance rejection and robust stability in Buck-Boost converter","authors":"A. Alam, Lei Tao, Kashif Habib, Shahbaz Khan","doi":"10.1109/IMCEC.2016.7867339","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867339","url":null,"abstract":"The Buck-Boost converter with pulse width modulator has a large impact on power industry in energy management, specifically for electronic devices. In this paper the sub-optimal model predictive control algorithm applied to Buck-boost converter, which assured robust stability of system. Lyapunov function was used to ensure the constraints of model predictive cost function. In most of DC-DC converters, simple current control method is used for stability of system. This algorithm based on simpler optimization problems, which can be solved faster, and still have prior robust stability and discard all disturbances.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867307
Y. Cheng, Hao Li, N. Zhang
As an important part of DRM, key management technology has been widely used in protecting various copyrights, including industries such as digital television technologies. With the development of all kinds of technologies, the key management scheme has been developed and evolved within which the key distribution also has a variety of forms like unicast and multicast. In this paper, a key management scheme based on user role is proposed for the live video service on the cloud platform. The project provides the solution of key management in real time and security to some extent. According to the user role and service type in the actual occasions, we propose the scheme better adapted to the current scene based on the centralized logic key tree.
{"title":"Character-based online key management in cloud computing environment","authors":"Y. Cheng, Hao Li, N. Zhang","doi":"10.1109/IMCEC.2016.7867307","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867307","url":null,"abstract":"As an important part of DRM, key management technology has been widely used in protecting various copyrights, including industries such as digital television technologies. With the development of all kinds of technologies, the key management scheme has been developed and evolved within which the key distribution also has a variety of forms like unicast and multicast. In this paper, a key management scheme based on user role is proposed for the live video service on the cloud platform. The project provides the solution of key management in real time and security to some extent. According to the user role and service type in the actual occasions, we propose the scheme better adapted to the current scene based on the centralized logic key tree.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115000683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867396
Liu Jianglin, Zhang Dao-jie, Zhang Siyuan
Facing the problem and current situation of the power grid master-slave station dispatching system architecture, this paper using the master-slave station distributed file system and master-slave station two-level business platform to divide the traditional master station business into master-slave station interacted distribution business, also issued the master-slave station distributed integration application architecture plan. Then, discussed the technology include file system directory service, the concept of master-slave business partition, gateway proxy. Proceed further modeling analysis to the slave station business such as monitoring and control, smart alarm and also give a conclusion on apply authorization. Through the apply authorization to indicate the plan could effectively solve the current problem and the application development will have a brightened prospects.
{"title":"The application and research on master-slave station distributed integration business architecture","authors":"Liu Jianglin, Zhang Dao-jie, Zhang Siyuan","doi":"10.1109/IMCEC.2016.7867396","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867396","url":null,"abstract":"Facing the problem and current situation of the power grid master-slave station dispatching system architecture, this paper using the master-slave station distributed file system and master-slave station two-level business platform to divide the traditional master station business into master-slave station interacted distribution business, also issued the master-slave station distributed integration application architecture plan. Then, discussed the technology include file system directory service, the concept of master-slave business partition, gateway proxy. Proceed further modeling analysis to the slave station business such as monitoring and control, smart alarm and also give a conclusion on apply authorization. Through the apply authorization to indicate the plan could effectively solve the current problem and the application development will have a brightened prospects.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"733 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116988036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867232
Yikai Wu, Fang Hou, Xiaopei Cheng
High viscosity of quench oil is a critical problem of quench system in ethylene cracking furnaces in petrochemical plant, due to its influences on the safety and stability of equipments, meanwhile, the variety of viscosity of quench oil has a negative impact on yield of ethylene and other chemical products. This paper presents a new statistical learning model to forecast the real-time variety of quench oil viscosity based on statistical algorithm and machine learning method. Firstly, statistical algorithm is applied to reduce dimension of parameters, secondly, fitting real-time predictive model through machine learning method. The simulation results shows that this model can monitor the variety of viscosity per hour according to identified controllable parameters which are highly correlated with viscosity of quench oil.
{"title":"Design a new real-time predictive model of viscosity of quench oil based on statistical learning method","authors":"Yikai Wu, Fang Hou, Xiaopei Cheng","doi":"10.1109/IMCEC.2016.7867232","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867232","url":null,"abstract":"High viscosity of quench oil is a critical problem of quench system in ethylene cracking furnaces in petrochemical plant, due to its influences on the safety and stability of equipments, meanwhile, the variety of viscosity of quench oil has a negative impact on yield of ethylene and other chemical products. This paper presents a new statistical learning model to forecast the real-time variety of quench oil viscosity based on statistical algorithm and machine learning method. Firstly, statistical algorithm is applied to reduce dimension of parameters, secondly, fitting real-time predictive model through machine learning method. The simulation results shows that this model can monitor the variety of viscosity per hour according to identified controllable parameters which are highly correlated with viscosity of quench oil.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867234
Weijia Cui, Yuzhu He
In this paper, an improved fruit fly optimization algorithm based on tournament selection mechanism (TS-FFO) is put forward. In TS-FFO, considering the fact that the aggregation way in the vision optimization phase will easily cause the loss of biodiversity and make the population jump into the local extreme, tournament selection mechanism is embed into FFO to randomly generate a new conductive individual to replace the current best fruit fly. In addition, in view of the blind search surrounding the best individual in the osphresis optimization phase, the evolutionary formula is also redefined by incorporating the current individual's own information to effectively control the evolution direction and step size. Six high dimensional benchmark functions are used to test and evaluate the TS-FFO. The experimental results demonstrate that TS-FFO has quicker optimizing efficiency and better accuracy compared with the standard FFO and several advanced algorithms. TS-FFO is also used to solve the image template matching problems and the statistical results show that our proposed approach is more effective and efficient than the particle swarm optimization (PSO) and differential search algorithms (DSA).
{"title":"Tournament selection based fruit fly optimization and its application in template matching","authors":"Weijia Cui, Yuzhu He","doi":"10.1109/IMCEC.2016.7867234","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867234","url":null,"abstract":"In this paper, an improved fruit fly optimization algorithm based on tournament selection mechanism (TS-FFO) is put forward. In TS-FFO, considering the fact that the aggregation way in the vision optimization phase will easily cause the loss of biodiversity and make the population jump into the local extreme, tournament selection mechanism is embed into FFO to randomly generate a new conductive individual to replace the current best fruit fly. In addition, in view of the blind search surrounding the best individual in the osphresis optimization phase, the evolutionary formula is also redefined by incorporating the current individual's own information to effectively control the evolution direction and step size. Six high dimensional benchmark functions are used to test and evaluate the TS-FFO. The experimental results demonstrate that TS-FFO has quicker optimizing efficiency and better accuracy compared with the standard FFO and several advanced algorithms. TS-FFO is also used to solve the image template matching problems and the statistical results show that our proposed approach is more effective and efficient than the particle swarm optimization (PSO) and differential search algorithms (DSA).","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/IMCEC.2016.7867173
Yuguo Wang, Zhongjin Zhang, Lufei He, Qi Zhong, Huaqiong Li
This paper analyzes the existing recursion formulas of SG-CMA, presents an improved SG-CMA with better convergence and stronger beam-forming gain. Considering the disadvantages of existing error functions, the algorithm makes some changes. It takes the sum of the signal modulus of each element as the expected value, which overcomes the fluctuation of signal modulus, and increases the application range and anti-noise capability. The signal modulus of an arbitrary array is built, then the SG-CMA and the improved SG-CMA are compared by simulation based on uniform linear array. The simulation results verify the effectiveness of the improved SG-CMA as well as its improvement on convergence and beam-forming gain.
{"title":"An improved stochastic gradient constant modulus beam-forming algorithm","authors":"Yuguo Wang, Zhongjin Zhang, Lufei He, Qi Zhong, Huaqiong Li","doi":"10.1109/IMCEC.2016.7867173","DOIUrl":"https://doi.org/10.1109/IMCEC.2016.7867173","url":null,"abstract":"This paper analyzes the existing recursion formulas of SG-CMA, presents an improved SG-CMA with better convergence and stronger beam-forming gain. Considering the disadvantages of existing error functions, the algorithm makes some changes. It takes the sum of the signal modulus of each element as the expected value, which overcomes the fluctuation of signal modulus, and increases the application range and anti-noise capability. The signal modulus of an arbitrary array is built, then the SG-CMA and the improved SG-CMA are compared by simulation based on uniform linear array. The simulation results verify the effectiveness of the improved SG-CMA as well as its improvement on convergence and beam-forming gain.","PeriodicalId":218222,"journal":{"name":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117185104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}