Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201835
Yingmin Zhang, Chao Feng, Lianfeng Huang, Chaolin Ye, Le Weng
The current number of Android malicious applications is growing rapidly, which brings great troubles and losses to mobile phone users. Therefore, we propose a lightweight and efficient method for Android malicious family detection. The method uses DREBIN's Android malicious application dataset to build a detection model that using the application manifest information and machine learning algorithms. Through the training and testing of 10 types of Android malicious family samples, it is found that the detection model has the characteristics of low complexity and high classification accuracy, which can detect the Android malicious family very well and effectively protect the security of user mobile phones.
{"title":"Detection of Android Malicious Family Based on Manifest Information","authors":"Yingmin Zhang, Chao Feng, Lianfeng Huang, Chaolin Ye, Le Weng","doi":"10.1109/ICCSE49874.2020.9201835","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201835","url":null,"abstract":"The current number of Android malicious applications is growing rapidly, which brings great troubles and losses to mobile phone users. Therefore, we propose a lightweight and efficient method for Android malicious family detection. The method uses DREBIN's Android malicious application dataset to build a detection model that using the application manifest information and machine learning algorithms. Through the training and testing of 10 types of Android malicious family samples, it is found that the detection model has the characteristics of low complexity and high classification accuracy, which can detect the Android malicious family very well and effectively protect the security of user mobile phones.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201884
Xinggen Fan, Xingjian Zheng, Yongqi Ge
In terms of engineering vehicle faults, CAN communication faults account for a large proportion. In order to detect the CAN communication faults of electronic control units (ECUs) for diesel vehicles, this paper designs a CAN communication detection system for engineering vehicle ECUs, and a fault detection algorithm is proposed for diesel vehicle ECU based on CAN. This system can analyze and diagnose the physical link faults of CAN based on "handshake" theory for the engineering vehicle ECUs. The fault is determined by the "handshake" theory between the host computer and the ECU. In addition, the paper also designs the fault detection system based on LabVIEW. Experimental results show that this method can detect the type of CAN fault in given simulation environment.
{"title":"CAN Communication Detection System Design for Engineering Vehicle Electronic Control Unit","authors":"Xinggen Fan, Xingjian Zheng, Yongqi Ge","doi":"10.1109/ICCSE49874.2020.9201884","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201884","url":null,"abstract":"In terms of engineering vehicle faults, CAN communication faults account for a large proportion. In order to detect the CAN communication faults of electronic control units (ECUs) for diesel vehicles, this paper designs a CAN communication detection system for engineering vehicle ECUs, and a fault detection algorithm is proposed for diesel vehicle ECU based on CAN. This system can analyze and diagnose the physical link faults of CAN based on \"handshake\" theory for the engineering vehicle ECUs. The fault is determined by the \"handshake\" theory between the host computer and the ECU. In addition, the paper also designs the fault detection system based on LabVIEW. Experimental results show that this method can detect the type of CAN fault in given simulation environment.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201831
Zetian Guo, Yingyue Chen
With the continuous improvement of Internet status, The number of computer courses offered by colleges and universities has increased, The computer equipment in the laboratory has increased dramatically, The device problems caused are becoming more prominent. In order to solve the problems of missed hearing and untimely repair caused by traditional telephone reporting, In this paper, a laboratory fault reporting system is designed to serve the laboratory management, Speed up the speed of fault reporting, Optimize the process of repair report, And the data statistical analysis is carried out, Thereby improving the service level of the management team and forming a complete fault handling emergency mechanism, It can guarantee the normal progress of experimental teaching activities.
{"title":"Design and Implementation of Laboratory Fault Reporting System Based on Asp.net","authors":"Zetian Guo, Yingyue Chen","doi":"10.1109/ICCSE49874.2020.9201831","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201831","url":null,"abstract":"With the continuous improvement of Internet status, The number of computer courses offered by colleges and universities has increased, The computer equipment in the laboratory has increased dramatically, The device problems caused are becoming more prominent. In order to solve the problems of missed hearing and untimely repair caused by traditional telephone reporting, In this paper, a laboratory fault reporting system is designed to serve the laboratory management, Speed up the speed of fault reporting, Optimize the process of repair report, And the data statistical analysis is carried out, Thereby improving the service level of the management team and forming a complete fault handling emergency mechanism, It can guarantee the normal progress of experimental teaching activities.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201857
Luona Song, Xin Guo, Yiqi Fan
With the popularization of the internet and the increase of video facilities, the recognition and segmentation of actions in the video have become research highlights of high application value. Different from images, the information in the video is more complex and also brings time sequences as a new dimension. This paper proposes a video action recognition and segmentation model in the human keypoint detection task. The main contributions are as follows:1) Based on the speech signal processing method, this paper designs an analysis framework for video action, which consists of three steps. The first step is to obtain data from the key point frame of the human body; the second is the action segmentation model; the third is to visualize the model results;2)the dynamic time warping algorithm is used and improved from calculation cost and constraint conditions;3) a distance function is designed to measure the similarity between time series. Four kinds of features are introduced, and the final distance is the weighted sum of the four kinds of features;4) a non-maximum suppression method is designed to filter the overlapped segments to get the final results. Experiment design verifies the validity of the proposed model and the importance of proposed features is illustrated.
{"title":"Action Recognition in Video Using Human Keypoint Detection","authors":"Luona Song, Xin Guo, Yiqi Fan","doi":"10.1109/ICCSE49874.2020.9201857","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201857","url":null,"abstract":"With the popularization of the internet and the increase of video facilities, the recognition and segmentation of actions in the video have become research highlights of high application value. Different from images, the information in the video is more complex and also brings time sequences as a new dimension. This paper proposes a video action recognition and segmentation model in the human keypoint detection task. The main contributions are as follows:1) Based on the speech signal processing method, this paper designs an analysis framework for video action, which consists of three steps. The first step is to obtain data from the key point frame of the human body; the second is the action segmentation model; the third is to visualize the model results;2)the dynamic time warping algorithm is used and improved from calculation cost and constraint conditions;3) a distance function is designed to measure the similarity between time series. Four kinds of features are introduced, and the final distance is the weighted sum of the four kinds of features;4) a non-maximum suppression method is designed to filter the overlapped segments to get the final results. Experiment design verifies the validity of the proposed model and the importance of proposed features is illustrated.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127333703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201782
J. Jost, Benedikt Mättig, T. Schneider
In this article, an approach is presented in which transports in a production facility are performed by self-controlling and self-managing agents. In this context, the organization is carried out by a decentralized multi-agent system and is roughly oriented on the model of the market economy. It is to be shown that a system of heterogeneous transport resources can organize itself independently and are self-optimized, fulfilling all requirements to transport parts to the respective processing points at the right time. The heterogeneous system shall be represented in this consideration by three different transport resources including the human worker. Different aspects of the market economy are implemented via cost-benefit functions of the agents and in decision making processes. The benefits of those aspects for the overall system e.g. workload are investigated.
{"title":"A Novel Heterogeneous Multi-Agent System for Production Processes Based on the Market Economy","authors":"J. Jost, Benedikt Mättig, T. Schneider","doi":"10.1109/ICCSE49874.2020.9201782","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201782","url":null,"abstract":"In this article, an approach is presented in which transports in a production facility are performed by self-controlling and self-managing agents. In this context, the organization is carried out by a decentralized multi-agent system and is roughly oriented on the model of the market economy. It is to be shown that a system of heterogeneous transport resources can organize itself independently and are self-optimized, fulfilling all requirements to transport parts to the respective processing points at the right time. The heterogeneous system shall be represented in this consideration by three different transport resources including the human worker. Different aspects of the market economy are implemented via cost-benefit functions of the agents and in decision making processes. The benefits of those aspects for the overall system e.g. workload are investigated.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"59 28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201880
Y. Xi, Bin Li, Zhan Zhang, Yuehai Wang
Speech enhancement (SE) plays an important role in the domain of speech recognition and speech evaluation. As for the previous time-frequency based SE methods, we find that the denoise network may cause damage to the structure of the speech spectrum and will lead to a discontinuity of the auditory perception. In contrast to the existing approaches that train networks directly, we propose a two-stage based method called ShareNet. We first train a convolutional neural network to perform noise reduction, and then we stack these two pretrained blocks while keeping the parameters shared. We set different input data to train each block in different stages so that the parameters can be adapted to perform both denoising and repairing tasks. The experimental results show that the proposed method is effective for speech enhancement tasks. We compare our method with conventional algorithms and convolutional neural networks (CNN) based speech enhancement techniques. The experiment results demonstrate that our method can get an improvement over several objective metrics.
{"title":"Shared Network for Speech Enhancement Based on Multi-Task Learning","authors":"Y. Xi, Bin Li, Zhan Zhang, Yuehai Wang","doi":"10.1109/ICCSE49874.2020.9201880","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201880","url":null,"abstract":"Speech enhancement (SE) plays an important role in the domain of speech recognition and speech evaluation. As for the previous time-frequency based SE methods, we find that the denoise network may cause damage to the structure of the speech spectrum and will lead to a discontinuity of the auditory perception. In contrast to the existing approaches that train networks directly, we propose a two-stage based method called ShareNet. We first train a convolutional neural network to perform noise reduction, and then we stack these two pretrained blocks while keeping the parameters shared. We set different input data to train each block in different stages so that the parameters can be adapted to perform both denoising and repairing tasks. The experimental results show that the proposed method is effective for speech enhancement tasks. We compare our method with conventional algorithms and convolutional neural networks (CNN) based speech enhancement techniques. The experiment results demonstrate that our method can get an improvement over several objective metrics.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9202382
J. Xuan, Hezhi Lin, Lianfeng Huang
In this paper, in order to solve the limitations of a single signal for the laryngeal health analysis, we propose a laryngeal data acquisition and processing system based on the concept of multi-modal. The system we designed is small and portable. In the system design, real-time, synchronous, and high-precision collection of multi-modal data of the throat is realized by calling each modal sensor. At the same time, the development of terminal software has realized the wireless transmission of multi-modal data, real-time storage, dynamic display, preliminary processing, and put forward new ideas for analyzing laryngeal problems.
{"title":"Multi-modal laryngeal data acquisition and processing system","authors":"J. Xuan, Hezhi Lin, Lianfeng Huang","doi":"10.1109/ICCSE49874.2020.9202382","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9202382","url":null,"abstract":"In this paper, in order to solve the limitations of a single signal for the laryngeal health analysis, we propose a laryngeal data acquisition and processing system based on the concept of multi-modal. The system we designed is small and portable. In the system design, real-time, synchronous, and high-precision collection of multi-modal data of the throat is realized by calling each modal sensor. At the same time, the development of terminal software has realized the wireless transmission of multi-modal data, real-time storage, dynamic display, preliminary processing, and put forward new ideas for analyzing laryngeal problems.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201833
Weina Cheng, Xinguo Yu
The development of intelligent technology has given birth to the emergence of new elements and relations in education, as well as the upgrading and transformation of the notification of old ones. An education model can help us better clarifying the core elements and their relations in education, so as to accurately discovering and grasping the primary contradictions and problems in the future work. This paper makes a literature review and finds that there are gaps between theory and technology, technology and industry, which make obstacles to the application of intelligent technology in education. The research first proposes a four-factor education reference model based on the perspective of embodied cognitive theory, and further elaborates the research status of each element in the model and its corresponding education problems. Secondly, the research and application of intelligent technology in solving educational problems are mainly discussed. Then, from three perspectives of teaching, learning, resources and space construction, this paper discusses how to solve the education problems with intelligent technology in recent years. Finally, this paper integrates the existing experience and the development trend of intelligent technology and proposes strategies for advancing the development of intelligent technology in the field of education from two aspects: dialogue between theory and technology, technology landing industry.
{"title":"The Mechanism of Intelligent Technology Reforming Education Based on the Perspective of Embodied Cognitive Theory*","authors":"Weina Cheng, Xinguo Yu","doi":"10.1109/ICCSE49874.2020.9201833","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201833","url":null,"abstract":"The development of intelligent technology has given birth to the emergence of new elements and relations in education, as well as the upgrading and transformation of the notification of old ones. An education model can help us better clarifying the core elements and their relations in education, so as to accurately discovering and grasping the primary contradictions and problems in the future work. This paper makes a literature review and finds that there are gaps between theory and technology, technology and industry, which make obstacles to the application of intelligent technology in education. The research first proposes a four-factor education reference model based on the perspective of embodied cognitive theory, and further elaborates the research status of each element in the model and its corresponding education problems. Secondly, the research and application of intelligent technology in solving educational problems are mainly discussed. Then, from three perspectives of teaching, learning, resources and space construction, this paper discusses how to solve the education problems with intelligent technology in recent years. Finally, this paper integrates the existing experience and the development trend of intelligent technology and proposes strategies for advancing the development of intelligent technology in the field of education from two aspects: dialogue between theory and technology, technology landing industry.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201788
Honghong Chen, Xu Wang, Liangguang Pan
With the rapid development of software industry, software testing, as an important means of software quality assurance, has been paid more and more attention by software enterprises. It has become an urgent need to train professional software testing talents, so software testing teaching is of great significance. This paper analyzes the current situation and existing problems of software testing curriculum teaching, discusses and improves the teaching methods of software testing courses, and develops a simple suspicious codes recognition tool based on abstract grammar tree and state machine for the difficulties of teaching content which based on defected modes testing , so as to help improve the quality of classroom teaching and better train professional software testing talents suitable for market demand.
{"title":"Research On Teaching Methods And Tools Of Software Testing","authors":"Honghong Chen, Xu Wang, Liangguang Pan","doi":"10.1109/ICCSE49874.2020.9201788","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201788","url":null,"abstract":"With the rapid development of software industry, software testing, as an important means of software quality assurance, has been paid more and more attention by software enterprises. It has become an urgent need to train professional software testing talents, so software testing teaching is of great significance. This paper analyzes the current situation and existing problems of software testing curriculum teaching, discusses and improves the teaching methods of software testing courses, and develops a simple suspicious codes recognition tool based on abstract grammar tree and state machine for the difficulties of teaching content which based on defected modes testing , so as to help improve the quality of classroom teaching and better train professional software testing talents suitable for market demand.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116078705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ICCSE49874.2020.9201727
Siyuan Chang, Caiquan Xiong, Dahai Xia
In marine navigation, we need to calculate the maneuver scheme of ships. The existing solution is lack of intelligence, which generally use the method of manual drawing for calculation, is also inevitably to increase the cost of manpower and time. For solving this problem, this paper proposes a ship maneuvering algorithm based on triangle transformation, which includes three aspects of approach maneuver, occupation position maneuver and avoidance maneuver. The algorithm takes the relative bearing, speed and position of target ship as inputs, predicts the relative bearing and the time required to complete the maneuver, and provides the support of decision for maritime tactical operations. Finally, the algorithm is implemented by Java programming language and simulated in all directions by MATLAB. The results show that the ship maneuvering scheme predicted by this method has a good fit with the actual situation, which verifies that the proposed algorithm has higher reliability and effectiveness.
{"title":"Algorithm and Simulation of Ship Maneuver Scheme in Marine Environment","authors":"Siyuan Chang, Caiquan Xiong, Dahai Xia","doi":"10.1109/ICCSE49874.2020.9201727","DOIUrl":"https://doi.org/10.1109/ICCSE49874.2020.9201727","url":null,"abstract":"In marine navigation, we need to calculate the maneuver scheme of ships. The existing solution is lack of intelligence, which generally use the method of manual drawing for calculation, is also inevitably to increase the cost of manpower and time. For solving this problem, this paper proposes a ship maneuvering algorithm based on triangle transformation, which includes three aspects of approach maneuver, occupation position maneuver and avoidance maneuver. The algorithm takes the relative bearing, speed and position of target ship as inputs, predicts the relative bearing and the time required to complete the maneuver, and provides the support of decision for maritime tactical operations. Finally, the algorithm is implemented by Java programming language and simulated in all directions by MATLAB. The results show that the ship maneuvering scheme predicted by this method has a good fit with the actual situation, which verifies that the proposed algorithm has higher reliability and effectiveness.","PeriodicalId":350703,"journal":{"name":"2020 15th International Conference on Computer Science & Education (ICCSE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116156389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}