Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085653
J. Badmapriyadharisiny, K. Anusudha
A proficient technique to distinguish changes in the geometry of an urban environment is proposed in this paper. Generally, many of the change detection techniques involve a pixel to pixel comparison by using an algebraic or a transform method of change detection. This technique profoundly depends on the optimum choice of threshold value to separate the real altered pixels. Moreover all these techniques are capable of calculating only the two dimensionality change in the environment, whereas in the proposed technique a differential geometry approach is used to detect changes from images which are done by involving the geometric property of the pixels with respect to its environment. Finally the quality of image is measured using various performance parameters like PSNR and MSE.
{"title":"Geometric image change detection in urban environment","authors":"J. Badmapriyadharisiny, K. Anusudha","doi":"10.1109/ICSCN.2017.8085653","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085653","url":null,"abstract":"A proficient technique to distinguish changes in the geometry of an urban environment is proposed in this paper. Generally, many of the change detection techniques involve a pixel to pixel comparison by using an algebraic or a transform method of change detection. This technique profoundly depends on the optimum choice of threshold value to separate the real altered pixels. Moreover all these techniques are capable of calculating only the two dimensionality change in the environment, whereas in the proposed technique a differential geometry approach is used to detect changes from images which are done by involving the geometric property of the pixels with respect to its environment. Finally the quality of image is measured using various performance parameters like PSNR and MSE.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124256567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085664
R. Hariharan, P. Rani
In power system restoration process, the major issue is to identify the Black start unit, by providing cranking power to the unit and abundant start-up time for the Black-Start unit generator to start. There are many issues that arise in the delaying Blackout restoration process. This paper is proposed to avoid the faced issues by Electric vehicle charging station that act as Black-start unit to provide Cranking power to Non Black-Start Unit. Few intelligent integrated systems are developed by virtual instrumentation and tested in the different situations including the normal state and the restoration state.
{"title":"Blackout restoration process by PHEV charging station integrated system using virtual instrumentation","authors":"R. Hariharan, P. Rani","doi":"10.1109/ICSCN.2017.8085664","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085664","url":null,"abstract":"In power system restoration process, the major issue is to identify the Black start unit, by providing cranking power to the unit and abundant start-up time for the Black-Start unit generator to start. There are many issues that arise in the delaying Blackout restoration process. This paper is proposed to avoid the faced issues by Electric vehicle charging station that act as Black-start unit to provide Cranking power to Non Black-Start Unit. Few intelligent integrated systems are developed by virtual instrumentation and tested in the different situations including the normal state and the restoration state.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"31 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120997402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085702
Mirishkar Sai Ganesh, M. Karthik, B. Patnaik
This contribution presents an efficient technique for the speech enhancement of a signal using statistical estimators which are based on squared magnitude spectra's. In any speech enhancement systems, an estimate of power spectral density is required. As conventional methods for noise elimination fails due to the non-stationary properties of the speech signal, in this context, minimum mean square error (MMSE) and maximum a posterior (MAP) estimators are derived based on Gaussian statistical model. The acquisition function which is obtained in the MAP estimator is same as the acquisition function used in the ideal binary masking. As a binary masking depends on the signal-to-noise ratio (SNR), if the SNR value exceeds 0 dB then the value assumes to be 1 otherwise 0. The results accomplished using the proposed estimator embarked with better enhancement of the speech signal than the standard minimum mean square error spectral power estimator, with low residual noise and low speech distortion.
{"title":"An estimation theory-based approach for speech enhancement","authors":"Mirishkar Sai Ganesh, M. Karthik, B. Patnaik","doi":"10.1109/ICSCN.2017.8085702","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085702","url":null,"abstract":"This contribution presents an efficient technique for the speech enhancement of a signal using statistical estimators which are based on squared magnitude spectra's. In any speech enhancement systems, an estimate of power spectral density is required. As conventional methods for noise elimination fails due to the non-stationary properties of the speech signal, in this context, minimum mean square error (MMSE) and maximum a posterior (MAP) estimators are derived based on Gaussian statistical model. The acquisition function which is obtained in the MAP estimator is same as the acquisition function used in the ideal binary masking. As a binary masking depends on the signal-to-noise ratio (SNR), if the SNR value exceeds 0 dB then the value assumes to be 1 otherwise 0. The results accomplished using the proposed estimator embarked with better enhancement of the speech signal than the standard minimum mean square error spectral power estimator, with low residual noise and low speech distortion.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130570376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085725
M. Jayashree, C. Ranjith, S. Rani
A genetic algorithm (GA) is a powerful heuristic method of selection based on natural living process. Because of larger size of the scheduling, implementing GA in software was tiresome and highly time complex. GA processor parallelizes the work in order to reduce the processing time and increases the speed, but still the efficiency of the GA is maintained through quality solutions. This work proposes a fast Adaptive Genetic Algorithm Processor (AGAP) for the implementation of Adaptive Noise Cancelation (ANC) filters in VLSI. The AGAP updates the coefficients of the ANC filter nullifying the effect of noise at the output end. The coefficients are optimized at every stage of the algorithm and are adaptively changed in order to meet the constraints of active noise canceller. AGAP processor is modeled using Verilog HDL in Xilinx ISE 14.6 platform. The functional performance of each module and the processor are simulated for their correctness to be synthesized using Spartan 6 XC6SLX45-3CSG324I FPGA.
遗传算法是一种基于自然生命过程的强大的启发式选择方法。由于调度规模较大,在软件中实现遗传算法非常繁琐,且时间复杂度高。遗传算法处理器将工作并行化,以减少处理时间和提高速度,但仍然通过高质量的解来保持遗传算法的效率。本工作提出了一种快速自适应遗传算法处理器(AGAP),用于在VLSI中实现自适应噪声消除(ANC)滤波器。AGAP更新ANC滤波器的系数,消除输出端噪声的影响。在算法的每个阶段都对系数进行了优化,并自适应地改变,以满足主动降噪的约束。AGAP处理器在Xilinx ISE 14.6平台上使用Verilog HDL进行建模。利用Spartan 6 XC6SLX45-3CSG324I FPGA对各模块和处理器的功能性能进行了仿真,验证了其合成正确性。
{"title":"A VLSI implementation of an adaptive genetic algorithm processor","authors":"M. Jayashree, C. Ranjith, S. Rani","doi":"10.1109/ICSCN.2017.8085725","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085725","url":null,"abstract":"A genetic algorithm (GA) is a powerful heuristic method of selection based on natural living process. Because of larger size of the scheduling, implementing GA in software was tiresome and highly time complex. GA processor parallelizes the work in order to reduce the processing time and increases the speed, but still the efficiency of the GA is maintained through quality solutions. This work proposes a fast Adaptive Genetic Algorithm Processor (AGAP) for the implementation of Adaptive Noise Cancelation (ANC) filters in VLSI. The AGAP updates the coefficients of the ANC filter nullifying the effect of noise at the output end. The coefficients are optimized at every stage of the algorithm and are adaptively changed in order to meet the constraints of active noise canceller. AGAP processor is modeled using Verilog HDL in Xilinx ISE 14.6 platform. The functional performance of each module and the processor are simulated for their correctness to be synthesized using Spartan 6 XC6SLX45-3CSG324I FPGA.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085712
A. Karpagam, M. Manikandan
Interpolation tool plays a vital role in estimating missing values. This classical problem aims to preserve the structural information-edges and textures, in the resultant image. In this process of developing a continuous function, distractions such as blur, noise or other artifacts should not be entertained. This paper provides an overview of commonly used interpolation algorithms. Comparative discussions are presented in this paper. This paper is focusing choice of interpolation for specific applications. Interpolation is applied in numerous fields like remote sensing, medical diagnosis, agriculture, geology, etc. Choosing appropriate interpolation is practically a rigorous study and it is the primary need for this analysis.
{"title":"Interpolation tool: Qualitative and quantitative analysis for machine vision applications","authors":"A. Karpagam, M. Manikandan","doi":"10.1109/ICSCN.2017.8085712","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085712","url":null,"abstract":"Interpolation tool plays a vital role in estimating missing values. This classical problem aims to preserve the structural information-edges and textures, in the resultant image. In this process of developing a continuous function, distractions such as blur, noise or other artifacts should not be entertained. This paper provides an overview of commonly used interpolation algorithms. Comparative discussions are presented in this paper. This paper is focusing choice of interpolation for specific applications. Interpolation is applied in numerous fields like remote sensing, medical diagnosis, agriculture, geology, etc. Choosing appropriate interpolation is practically a rigorous study and it is the primary need for this analysis.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129869967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085714
S. Prabavathy, K. Sundarakantham, S. Shalinie
The Social-Collaborative Internet of Things (SCIoT) provides the ability for objects to autonomously establish social relationship among them based on the rules imposed by its owners'. This paper proposes a new secure framework for SCIoTto tackle the issues related to security and privacy. The proposed framework adopts a decentralized architecture to handle the problems of large-scale deployment and management of heterogeneous objects in different Internet of Things platforms. The proposed framework consists Relationship Based Dynamic Trust Management Protocol to ensure trustworthiness among objects in the dynamic environment of SCIoT.
{"title":"Decentralized secure framework for social collaborative Internet of Things","authors":"S. Prabavathy, K. Sundarakantham, S. Shalinie","doi":"10.1109/ICSCN.2017.8085714","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085714","url":null,"abstract":"The Social-Collaborative Internet of Things (SCIoT) provides the ability for objects to autonomously establish social relationship among them based on the rules imposed by its owners'. This paper proposes a new secure framework for SCIoTto tackle the issues related to security and privacy. The proposed framework adopts a decentralized architecture to handle the problems of large-scale deployment and management of heterogeneous objects in different Internet of Things platforms. The proposed framework consists Relationship Based Dynamic Trust Management Protocol to ensure trustworthiness among objects in the dynamic environment of SCIoT.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085679
V. Venkatesan, M. Sandhya, B. M. Jenefer
A Computed Tomography scan employs various combinations of X-ray images taken from different angles to create cross sectional images of specific portions of a scanned object. It allows the user to view the interior regions of the object without dismantling or cutting. This process is complex and involves a lot of parameters. Peak voltage of X-ray source, total number of scans needed, source to iso center distance, angle step and source to detector distance are some of the required parameters for the computed tomography scan. An incorrect scan procedure leads to heavy losses in terms of time and cost. Therefore simulation of computed tomography scan is required to avoid these losses. Scan simulation is a vital task for determining the scan plan for optimal reconstruction of a given object of interest. This paper presents the need for this scan simulation and a survey on the various scan simulation techniques used in medical and industrial applications. It also discusses the various issues associated with the scan simulation techniques.
{"title":"Computed tomography scan simulation techniques: A survey","authors":"V. Venkatesan, M. Sandhya, B. M. Jenefer","doi":"10.1109/ICSCN.2017.8085679","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085679","url":null,"abstract":"A Computed Tomography scan employs various combinations of X-ray images taken from different angles to create cross sectional images of specific portions of a scanned object. It allows the user to view the interior regions of the object without dismantling or cutting. This process is complex and involves a lot of parameters. Peak voltage of X-ray source, total number of scans needed, source to iso center distance, angle step and source to detector distance are some of the required parameters for the computed tomography scan. An incorrect scan procedure leads to heavy losses in terms of time and cost. Therefore simulation of computed tomography scan is required to avoid these losses. Scan simulation is a vital task for determining the scan plan for optimal reconstruction of a given object of interest. This paper presents the need for this scan simulation and a survey on the various scan simulation techniques used in medical and industrial applications. It also discusses the various issues associated with the scan simulation techniques.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085663
Modigari Narendra, D. Ben, C. P. Jetlin, L. Anbarasi
Secret image is converted into meaningful shares using a technique called visual sharing. Information is not disclosed by any single share except for all shares. Printing the encrypted secret on transparencies and stacking them will reveal the secret. More than one secret is encrypted by the visual sharing of multiple secrets and thus encryption capacity is increased when compared to a single secret. A code book resulting in at least two times of pixel expansion is followed by visual cryptography thus creating a poor contrast level. This proposed visual secret sharing scheme share two color images on rectangular shares with no pixel expansion. The originality of secret is verified by watermark which is embedded into the secret image followed by the sharing process. The secret is reconstructed and watermarks are retrieved from the original secret to perform authenticity. The experimental results shows that the proposed scheme has tremendous reconstruction quality resulting in 50.06dB of PSNR value.
{"title":"An efficient retrieval of watermarked multiple color images using secret sharing","authors":"Modigari Narendra, D. Ben, C. P. Jetlin, L. Anbarasi","doi":"10.1109/ICSCN.2017.8085663","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085663","url":null,"abstract":"Secret image is converted into meaningful shares using a technique called visual sharing. Information is not disclosed by any single share except for all shares. Printing the encrypted secret on transparencies and stacking them will reveal the secret. More than one secret is encrypted by the visual sharing of multiple secrets and thus encryption capacity is increased when compared to a single secret. A code book resulting in at least two times of pixel expansion is followed by visual cryptography thus creating a poor contrast level. This proposed visual secret sharing scheme share two color images on rectangular shares with no pixel expansion. The originality of secret is verified by watermark which is embedded into the secret image followed by the sharing process. The secret is reconstructed and watermarks are retrieved from the original secret to perform authenticity. The experimental results shows that the proposed scheme has tremendous reconstruction quality resulting in 50.06dB of PSNR value.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085692
A. Bindhu, O. Maheswari
The obstacles for images that are taken under the water are haze, low contrast, loss of color, etc. The quality of images that are taken under the water is not clear due to the impurities present in the water and some properties of water. This paper proposes methods to improve the quality of the underwater images. The proposed work in the paper consist of two methods they are Interpolation based Enhancement and Limited Image Enhancer. The First method is based on increasing the resolution of the image and the second method is based on increasing the contrast of the images. The main aim of the paper is to enhance the image that are taken under water. The qualitative for both the algorithms compared with the previous image enhancement techniques.
{"title":"Under water image enhancement based on linear image interpolation and limited image enhancer techniques","authors":"A. Bindhu, O. Maheswari","doi":"10.1109/ICSCN.2017.8085692","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085692","url":null,"abstract":"The obstacles for images that are taken under the water are haze, low contrast, loss of color, etc. The quality of images that are taken under the water is not clear due to the impurities present in the water and some properties of water. This paper proposes methods to improve the quality of the underwater images. The proposed work in the paper consist of two methods they are Interpolation based Enhancement and Limited Image Enhancer. The First method is based on increasing the resolution of the image and the second method is based on increasing the contrast of the images. The main aim of the paper is to enhance the image that are taken under water. The qualitative for both the algorithms compared with the previous image enhancement techniques.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133098469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085667
C. P. Kumar, R. Selvakumar
Concatenated codes proposed by Forney are used extensively in digital communication. In this paper, concatenated kernel codes, a class of group codes is constructed with inner code and outer code. Binary and non — binary variants of concatenated kernel code is discussed with example. Constructed concatenated kernel code is represented over trellis. Minimal trellis representation is given for the concatenated kernel code and its state complexity profile is discussed. Performance evaluation of concatenated kernel code is derived in terms of BER. It is observed that the concatenated kernel codes with random selection of groups perform better than kernel codes with random selection of homomorphisms with coding gain.
{"title":"Performance evaluation of concatenated kernel codes","authors":"C. P. Kumar, R. Selvakumar","doi":"10.1109/ICSCN.2017.8085667","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085667","url":null,"abstract":"Concatenated codes proposed by Forney are used extensively in digital communication. In this paper, concatenated kernel codes, a class of group codes is constructed with inner code and outer code. Binary and non — binary variants of concatenated kernel code is discussed with example. Constructed concatenated kernel code is represented over trellis. Minimal trellis representation is given for the concatenated kernel code and its state complexity profile is discussed. Performance evaluation of concatenated kernel code is derived in terms of BER. It is observed that the concatenated kernel codes with random selection of groups perform better than kernel codes with random selection of homomorphisms with coding gain.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}