In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.
{"title":"A Secure Authentication Scheme of Health Care Based on the Cloud","authors":"Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu","doi":"10.1109/IMIS.2014.72","DOIUrl":"https://doi.org/10.1109/IMIS.2014.72","url":null,"abstract":"In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio
Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New medical applications based on remote monitoring will significantly increasing the volume of health information to manage, including data from medical and biological sensors, is then necessary process this huge volume of data using techniques from Big Data. In this paper we propose one potential solution for creating those new services, based on Big Data processing and vital signs monitoring.
{"title":"Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing","authors":"Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio","doi":"10.1109/IMIS.2014.54","DOIUrl":"https://doi.org/10.1109/IMIS.2014.54","url":null,"abstract":"Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New medical applications based on remote monitoring will significantly increasing the volume of health information to manage, including data from medical and biological sensors, is then necessary process this huge volume of data using techniques from Big Data. In this paper we propose one potential solution for creating those new services, based on Big Data processing and vital signs monitoring.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.
{"title":"A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANET","authors":"Ing-Chau Chang, Jacky Lo","doi":"10.1109/IMIS.2014.65","DOIUrl":"https://doi.org/10.1109/IMIS.2014.65","url":null,"abstract":"As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data are required. Conventional infrastructures have the risks of over/under size the infrastructure when big data is used, they are not flexible to cover sudden changes in the demand of services and the access to the information presents large latencies. These aspects limit the use of EO technology for real time use. The use of cloud computing technology can overcome the previously defined limitations. The GEO-Cloud experiment emerged to find viable solutions to provide highly demanding EO services by using future internet technologies. It is a close to reality experiment, part of the FP7 Fed4FIRE project. GEO-Cloud consists of the design, implementation and testing in cloud a complete EO system, from the acquisition of geo-data with a constellation of satellites to its on demand distribution to end users with remote access. This paper presents the GEO-Cloud experiment design, architecture and foreseen research activity.
{"title":"The GEO-Cloud Experiment: Global Earth Observation System Computed in Cloud","authors":"J. Becedas","doi":"10.1109/IMIS.2014.2","DOIUrl":"https://doi.org/10.1109/IMIS.2014.2","url":null,"abstract":"Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data are required. Conventional infrastructures have the risks of over/under size the infrastructure when big data is used, they are not flexible to cover sudden changes in the demand of services and the access to the information presents large latencies. These aspects limit the use of EO technology for real time use. The use of cloud computing technology can overcome the previously defined limitations. The GEO-Cloud experiment emerged to find viable solutions to provide highly demanding EO services by using future internet technologies. It is a close to reality experiment, part of the FP7 Fed4FIRE project. GEO-Cloud consists of the design, implementation and testing in cloud a complete EO system, from the acquisition of geo-data with a constellation of satellites to its on demand distribution to end users with remote access. This paper presents the GEO-Cloud experiment design, architecture and foreseen research activity.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda
As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.
{"title":"Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)","authors":"T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda","doi":"10.1109/IMIS.2014.86","DOIUrl":"https://doi.org/10.1109/IMIS.2014.86","url":null,"abstract":"As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. One of the protocols, Fast Handovers for Proxy Mobile IPv6 (FPMIPv6) [1] was studied by the Internet Engineering Task Force (IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6 (FMIPv6) in Proxy Mobile IPv6 (PMIPv6), it reduces the packet loss. The conventional scheme has been proposed to cooperate with an Authentication, Authorization and Accounting (AAA) infrastructure for authentication of a mobile node in PMIPv6. Despite the fact that this approach resulted in the best efficiency, without beginning secured signaling messages, The PMIPv6 is vulnerable to various security threats and it does not support global mobility. In this paper, the authors analyzed the Kang-Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6 and its handover latency was analyzed and compared with that of the Kang-Park scheme & ESS-FH.
在基于pmipv6的网络中,由于网络节点代表移动节点执行与移动管理相关的功能,因此可以使移动节点更小、更轻。Internet工程任务组(IETF)研究了其中一种协议FPMIPv6[1]。由于FPMIPv6采用了Proxy Mobile IPv6 (PMIPv6)中的FMIPv6 (Fast hanvers for Mobile IPv6)的实体和概念,减少了丢包。在PMIPv6中,传统的方案是配合认证、授权和计费(Authentication, Authorization and Accounting, AAA)基础架构对移动节点进行认证。尽管这种方法产生了最佳的效率,但没有开始安全的信令消息,PMIPv6容易受到各种安全威胁,并且不支持全局移动性。在分析了Kang-Park和ESS-FH方案的基础上,提出了一种针对FPMIPv6的增强安全方案(ESS-FP)。基于CGA方法和公钥加密技术的ESS-FP在改善FPMIPv6的弱点的同时,提供了强大的密钥交换和密钥独立性,并与Kang-Park方案和ESS-FH方案的切换延迟进行了分析和比较。
{"title":"On Security-Effective and Global Mobility Management for FPMIPv6 Networks","authors":"H. Chai, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.91","DOIUrl":"https://doi.org/10.1109/IMIS.2014.91","url":null,"abstract":"In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. One of the protocols, Fast Handovers for Proxy Mobile IPv6 (FPMIPv6) [1] was studied by the Internet Engineering Task Force (IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6 (FMIPv6) in Proxy Mobile IPv6 (PMIPv6), it reduces the packet loss. The conventional scheme has been proposed to cooperate with an Authentication, Authorization and Accounting (AAA) infrastructure for authentication of a mobile node in PMIPv6. Despite the fact that this approach resulted in the best efficiency, without beginning secured signaling messages, The PMIPv6 is vulnerable to various security threats and it does not support global mobility. In this paper, the authors analyzed the Kang-Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6 and its handover latency was analyzed and compared with that of the Kang-Park scheme & ESS-FH.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Villanueva, C. Aguirre, D. Villa, M. Santofimia, J. C. López
Real-time data stream visualization is a challenge in multiple application fields of Smart Cities. Examples of these streams are traffic, pollution, social media activity, citizens dynamic, etc. which show us what, where and when is happening in the city. The purpose of this paper is to apply different types of glyphs for showing real-time stream evolution of data gathered in the city. The use of glyphs is intended to make the most out human capability for outperforming in detecting visual patterns.
{"title":"Smart City Data Stream Visualization Using Glyphs","authors":"F. Villanueva, C. Aguirre, D. Villa, M. Santofimia, J. C. López","doi":"10.1109/IMIS.2014.46","DOIUrl":"https://doi.org/10.1109/IMIS.2014.46","url":null,"abstract":"Real-time data stream visualization is a challenge in multiple application fields of Smart Cities. Examples of these streams are traffic, pollution, social media activity, citizens dynamic, etc. which show us what, where and when is happening in the city. The purpose of this paper is to apply different types of glyphs for showing real-time stream evolution of data gathered in the city. The use of glyphs is intended to make the most out human capability for outperforming in detecting visual patterns.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124493390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ubiquitous Computing is characterized by heterogeneous devices of a dynamic nature. So far, semantics and space-based computing have been widely applied to cope with both aspects. However, the integration of these devices with the web has gained momentum in the last years. Therefore, the seamless reuse of these web-enabled devices drastically increases the actuation possibilities of any application. This paper explores how semantic space-based applications can perform the aforementioned reuse. This exploration is guided by the implementation of a scenario. The scenario shows a neat interoperation between nodes from both worlds: space-based computing and the web. In addition, the generalization of the proposed solution poses new challenges to be tackled.
{"title":"Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective","authors":"Aitor Gómez-Goiri, Íñigo Goiri, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.45","DOIUrl":"https://doi.org/10.1109/IMIS.2014.45","url":null,"abstract":"Ubiquitous Computing is characterized by heterogeneous devices of a dynamic nature. So far, semantics and space-based computing have been widely applied to cope with both aspects. However, the integration of these devices with the web has gained momentum in the last years. Therefore, the seamless reuse of these web-enabled devices drastically increases the actuation possibilities of any application. This paper explores how semantic space-based applications can perform the aforementioned reuse. This exploration is guided by the implementation of a scenario. The scenario shows a neat interoperation between nodes from both worlds: space-based computing and the web. In addition, the generalization of the proposed solution poses new challenges to be tackled.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.
{"title":"How to Find an Appropriate K for K-Anonymization","authors":"S. Kiyomoto, Yutaka Miyake","doi":"10.1109/IMIS.2014.34","DOIUrl":"https://doi.org/10.1109/IMIS.2014.34","url":null,"abstract":"Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han
Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.
{"title":"Efficient Identification of Windows Executable Programs to Prevent Software Piracy","authors":"Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han","doi":"10.1109/IMIS.2014.29","DOIUrl":"https://doi.org/10.1109/IMIS.2014.29","url":null,"abstract":"Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}