Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6477851
M. Abouelenien, Yiwen Wan, Abdullah N. Saudagar
Classification of actions by human actors from video enables new technologies in diverse areas such as surveillance and content-based retrieval. We propose and evaluate alternative models, one based on feature-level fusion and the second on decision-level fusion. Both models employ direct classification - inferring from low-level features the nature of the action. Interesting points are assumed to have salient 3D (spatial plus temporal) gradients that distinguish them from their neighborhoods. They are identified using three distinct 3D interesting-point detectors. Each detected interest point set is represented as a bag-of-words descriptor. The feature level fusion model concatenates descriptors subsequently used as input to a classifier. The decision level fusion uses an ensemble and majority voting scheme. Public data sets consisting of hundreds of action videos were used in testing. Within the test videos, multiple actors performed various actions including walking, running, jogging, handclapping, boxing, and waving. Performance comparison showed very high classification accuracy for both models with feature-level fusion having an edge. For feature-level fusion the novelty is the fused histogram of visual words derived from different sets of interesting points detected by different saliency detectors. For decision fusion besides Adaboost the majority voting scheme is also utilized in ensemble classifiers based on support vector machines, knearest neighbor, and decision trees. The main contribution, however, is the comparison between the models and, drilling down, the performance of different base classifiers, and different interest point detectors for human motion recognition
{"title":"Feature and decision level fusion for action recognition","authors":"M. Abouelenien, Yiwen Wan, Abdullah N. Saudagar","doi":"10.1109/ICCCNT.2012.6477851","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6477851","url":null,"abstract":"Classification of actions by human actors from video enables new technologies in diverse areas such as surveillance and content-based retrieval. We propose and evaluate alternative models, one based on feature-level fusion and the second on decision-level fusion. Both models employ direct classification - inferring from low-level features the nature of the action. Interesting points are assumed to have salient 3D (spatial plus temporal) gradients that distinguish them from their neighborhoods. They are identified using three distinct 3D interesting-point detectors. Each detected interest point set is represented as a bag-of-words descriptor. The feature level fusion model concatenates descriptors subsequently used as input to a classifier. The decision level fusion uses an ensemble and majority voting scheme. Public data sets consisting of hundreds of action videos were used in testing. Within the test videos, multiple actors performed various actions including walking, running, jogging, handclapping, boxing, and waving. Performance comparison showed very high classification accuracy for both models with feature-level fusion having an edge. For feature-level fusion the novelty is the fused histogram of visual words derived from different sets of interesting points detected by different saliency detectors. For decision fusion besides Adaboost the majority voting scheme is also utilized in ensemble classifiers based on support vector machines, knearest neighbor, and decision trees. The main contribution, however, is the comparison between the models and, drilling down, the performance of different base classifiers, and different interest point detectors for human motion recognition","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131699030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395965
Du Ruiqing, Tan Jing, Zhou Ming
Magnetic data are often recorded in text files by magnetometers. They are not easy to deal with, and they are often transferred and written into Excel files to further process. The aim of this paper is to discuss how to use Visual C# to do the transferring work. Development tools, key technologies and flow chart of the program edited by Visual C# are introduced. The main steps of transferring work are elaborated.
{"title":"Transfer magnetic data from text files to excel files based on Visual C#","authors":"Du Ruiqing, Tan Jing, Zhou Ming","doi":"10.1109/ICCCNT.2012.6395965","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395965","url":null,"abstract":"Magnetic data are often recorded in text files by magnetometers. They are not easy to deal with, and they are often transferred and written into Excel files to further process. The aim of this paper is to discuss how to use Visual C# to do the transferring work. Development tools, key technologies and flow chart of the program edited by Visual C# are introduced. The main steps of transferring work are elaborated.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133241193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6479591
Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles
A robust 3-D model reconstruction plays vital role in many real world applications like city planning, architecture design and cartography. In this paper, we develop a low complexity robust hybrid model-based algorithm for registering oblique aerial images onto a 3D model generated from airborne Light Detection and Ranging data. Our proposed algorithm consists of two steps. In the first step, we use an intelligent search process to roughly estimate the extrinsic parameters of a calibrated camera without any apriori knowledge. The estimated camera parameters are used to transform the Digital Surface Model (DSM) to a view close to the view from which the visual image is taken. The second step is an adjustment process, in which we determine the transformation that maps the visual image onto DSM. Experiments were conducted on a real world datasets.
{"title":"Low-complexity registration of visual imagery with 3-D LiDAR","authors":"Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles","doi":"10.1109/ICCCNT.2012.6479591","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6479591","url":null,"abstract":"A robust 3-D model reconstruction plays vital role in many real world applications like city planning, architecture design and cartography. In this paper, we develop a low complexity robust hybrid model-based algorithm for registering oblique aerial images onto a 3D model generated from airborne Light Detection and Ranging data. Our proposed algorithm consists of two steps. In the first step, we use an intelligent search process to roughly estimate the extrinsic parameters of a calibrated camera without any apriori knowledge. The estimated camera parameters are used to transform the Digital Surface Model (DSM) to a view close to the view from which the visual image is taken. The second step is an adjustment process, in which we determine the transformation that maps the visual image onto DSM. Experiments were conducted on a real world datasets.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395945
T. Rao, S. Ramesh
This paper deals with the design of 2×2 Microstrip, Slotted rectangular waveguide antenna array and Patch-fed rod antennas needed for ultra high-speed, ultra high-capacity wireless communication systems which work at Millimeter waves at 60 GHz for different multimedia applications in indoor environments and illustrates its specifications and requirements. The antenna in such systems requires high gain, high-efficient, wider beamwidth and high performance design specifications. The designed antennas were simulated using electromagnetic software Agilent's EMPro and Ansys HFSS.
{"title":"Microstrip, slotted rectangular waveguide array and Patch-fed rod antenna design and simulation for Gigabit wireless communications at 60 GHz","authors":"T. Rao, S. Ramesh","doi":"10.1109/ICCCNT.2012.6395945","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395945","url":null,"abstract":"This paper deals with the design of 2×2 Microstrip, Slotted rectangular waveguide antenna array and Patch-fed rod antennas needed for ultra high-speed, ultra high-capacity wireless communication systems which work at Millimeter waves at 60 GHz for different multimedia applications in indoor environments and illustrates its specifications and requirements. The antenna in such systems requires high gain, high-efficient, wider beamwidth and high performance design specifications. The designed antennas were simulated using electromagnetic software Agilent's EMPro and Ansys HFSS.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114901011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395942
Narendra V G, Dasharathraj K. Shetty, Dr Hareesh
Carrying out Food and Agricultural product Quality Inspection manually is a laborious task. Maintaining consistent product quality is not possible due to human errors. Customer expectations are increasing day by day and seek products of high quality. However, in India the Inspection of Food and Agricultural produce is done manually in most of the cases. Work in the Computer Vision area is being extensively carried out these days to provide automated, non-destructive and cost-effective techniques to achieve this. Computer Vision uses Image processing as one of the intermediary tools to achieve the ultimate objective. Cashew is one of the important commercial crops of India. The objective of this research is to provide an image processing method for measuring cashew kernel Size (i.e. length and width/height) with an accurate and smallest relative error.
{"title":"Computer Vision system for cashew kernel area estimation","authors":"Narendra V G, Dasharathraj K. Shetty, Dr Hareesh","doi":"10.1109/ICCCNT.2012.6395942","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395942","url":null,"abstract":"Carrying out Food and Agricultural product Quality Inspection manually is a laborious task. Maintaining consistent product quality is not possible due to human errors. Customer expectations are increasing day by day and seek products of high quality. However, in India the Inspection of Food and Agricultural produce is done manually in most of the cases. Work in the Computer Vision area is being extensively carried out these days to provide automated, non-destructive and cost-effective techniques to achieve this. Computer Vision uses Image processing as one of the intermediary tools to achieve the ultimate objective. Cashew is one of the important commercial crops of India. The objective of this research is to provide an image processing method for measuring cashew kernel Size (i.e. length and width/height) with an accurate and smallest relative error.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395962
S. Vinothkumar, R. Asokan
A Mobile Ad hoc Network (MANET) is a collection of nodes or mobile devices that communicate with each other without any centralized administrator. When a route is broken in an on-demand routing protocol, route recovery and maintenance procedures are initiated and it will consume more bandwidth and the delay will be high. To improve the performance of DSR a simple stability model is used. The stability of the route is analyzed by the received signal strength. The received signal strength from a node is higher than the threshold value the signal strength value will be stored in the neighbor information table. Using this information source select the path with high stability value and thus reduce the path break in intermediate nodes. Simulation results show improved performance in the throughput and reduce the packet loss, delay.
{"title":"Improving the quality of service based on route stability in MANETs Using Dynamic Source routing protocol","authors":"S. Vinothkumar, R. Asokan","doi":"10.1109/ICCCNT.2012.6395962","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395962","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of nodes or mobile devices that communicate with each other without any centralized administrator. When a route is broken in an on-demand routing protocol, route recovery and maintenance procedures are initiated and it will consume more bandwidth and the delay will be high. To improve the performance of DSR a simple stability model is used. The stability of the route is analyzed by the received signal strength. The received signal strength from a node is higher than the threshold value the signal strength value will be stored in the neighbor information table. Using this information source select the path with high stability value and thus reduce the path break in intermediate nodes. Simulation results show improved performance in the throughput and reduce the packet loss, delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116067578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395992
N. Padmapriya, R. Rajmohan
Cloud computing is emanated as a useful paradigm for building applications with cloud services. Different types of resources can be published as services, and a many benefits are delivered with them. For the services to be more reliable to service consumers a reliability model should be proposed for cloud based services. Since in cloud many users' access the same information the services should have high reliability feature. Hence reliability is most important feature for cloud. In this paper, we propose a reliability evaluation suite for cloud services, which includes quality attributes and metrics. A case study is presented to show its applicability.
{"title":"Reliability evaluation suite for cloud services","authors":"N. Padmapriya, R. Rajmohan","doi":"10.1109/ICCCNT.2012.6395992","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395992","url":null,"abstract":"Cloud computing is emanated as a useful paradigm for building applications with cloud services. Different types of resources can be published as services, and a many benefits are delivered with them. For the services to be more reliable to service consumers a reliability model should be proposed for cloud based services. Since in cloud many users' access the same information the services should have high reliability feature. Hence reliability is most important feature for cloud. In this paper, we propose a reliability evaluation suite for cloud services, which includes quality attributes and metrics. A case study is presented to show its applicability.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395955
V. R. Vanajaa, N. A. Vasanthi
Electric-power transmission is the bulk transfer of electrical energy, from generating power plants to electrical substations located near demand centers. Electricity is transmitted at high voltages (110 kV or above) to reduce the energy lost in long-distance transmission. Since 2004, an alternative technology has been in commercial operation in North America, which has proven to be a reliable and stable vehicle to move power between two points. The two points in question need not be synchronous. This technology is the Variable Frequency Transformer, or VFT. Variable frequency transformers provide transmission solutions for a smarter grid, enabling transmission system operators to control power flows between power grids with high reliability, speed and efficiency, while offering flexibility It is a controllable, bi-directional transmission device that can transfer power between asynchronous networks. Variable Frequency Transformers can convert this power to and from grids without converting the power into DC thus eliminating the harmonic distortions. Another advantage with VFT is that we can have infinite phase shifts between the two powers where as in conventional devices we could have only few predefined phase shifts. This paper introduces the VFT and provides a brief explanation of the technology and its benefits.
{"title":"Conceptual study and operational overview on Variable Frequency Transformer used for grid interconnections","authors":"V. R. Vanajaa, N. A. Vasanthi","doi":"10.1109/ICCCNT.2012.6395955","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395955","url":null,"abstract":"Electric-power transmission is the bulk transfer of electrical energy, from generating power plants to electrical substations located near demand centers. Electricity is transmitted at high voltages (110 kV or above) to reduce the energy lost in long-distance transmission. Since 2004, an alternative technology has been in commercial operation in North America, which has proven to be a reliable and stable vehicle to move power between two points. The two points in question need not be synchronous. This technology is the Variable Frequency Transformer, or VFT. Variable frequency transformers provide transmission solutions for a smarter grid, enabling transmission system operators to control power flows between power grids with high reliability, speed and efficiency, while offering flexibility It is a controllable, bi-directional transmission device that can transfer power between asynchronous networks. Variable Frequency Transformers can convert this power to and from grids without converting the power into DC thus eliminating the harmonic distortions. Another advantage with VFT is that we can have infinite phase shifts between the two powers where as in conventional devices we could have only few predefined phase shifts. This paper introduces the VFT and provides a brief explanation of the technology and its benefits.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395920
T. Thenmozhi, R. Somasundaram
Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.
{"title":"Towards an approach for improved security in wireless sensor networks","authors":"T. Thenmozhi, R. Somasundaram","doi":"10.1109/ICCCNT.2012.6395920","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395920","url":null,"abstract":"Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395940
K. Muthumanickam, E. Ilavarasan
As Internet becomes part of our daily life, Botnet (BotNetwork) attacker take advantage of it to misuse in different ways. Botnet is a collection of interconnected compromised computers (Bots) which are remotely controlled by its owner (BotMaster) under a common command-and-control(C&C) infrastructure. Botnets can be innovatively designed propositionally for technology improvement, which makes the bonet detection a challenging problem. As P2P (peer to peer) Botnet has a unique distributed attacking behavior, it is difficult to detect this bot. Thus to build an efficient botnet detection system we coined a framework that combines host level information and network level information for p2p botnet detection.
{"title":"P2P Botnet detection: Combined host- and network-level analysis","authors":"K. Muthumanickam, E. Ilavarasan","doi":"10.1109/ICCCNT.2012.6395940","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395940","url":null,"abstract":"As Internet becomes part of our daily life, Botnet (BotNetwork) attacker take advantage of it to misuse in different ways. Botnet is a collection of interconnected compromised computers (Bots) which are remotely controlled by its owner (BotMaster) under a common command-and-control(C&C) infrastructure. Botnets can be innovatively designed propositionally for technology improvement, which makes the bonet detection a challenging problem. As P2P (peer to peer) Botnet has a unique distributed attacking behavior, it is difficult to detect this bot. Thus to build an efficient botnet detection system we coined a framework that combines host level information and network level information for p2p botnet detection.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}