Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534937
A. Detti, P. Loreti, N. Blefari-Melazzi, F. Fedi
The Data Distribution Service (DDS) middleware is enjoying a rapid adoption in high-performance, mission-critical networks. At the same time, the H.264 Scalable Video Coding (SVC) has been recently standardized and it is deemed to be an effective solution for video streaming over a channel with time-varying bandwidth, like the wireless one. In these conditions, it is critical to adapt the video bit-rate to the actual wireless capacity, and bit-rate adaptation is extremely simple for a H.264 SVC video. In this paper we devise, evaluate and demonstrate a technique for streaming H.264 SVC video over a DDS middleware. The contribution is threefold: i) we design a structure of the DDS data-unit able to carry H.264 SVC video-units; ii) we devise a receiver-driven rate-control mechanism based on our DDS data-unit and exploiting specific DDS functionality; iii) we implement and show the effectiveness of our mechanism in an 802.11 wireless scenario, comparing our proposal with other solutions.
{"title":"Streaming H.264 scalable video over data distribution service in a wireless environment","authors":"A. Detti, P. Loreti, N. Blefari-Melazzi, F. Fedi","doi":"10.1109/WOWMOM.2010.5534937","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534937","url":null,"abstract":"The Data Distribution Service (DDS) middleware is enjoying a rapid adoption in high-performance, mission-critical networks. At the same time, the H.264 Scalable Video Coding (SVC) has been recently standardized and it is deemed to be an effective solution for video streaming over a channel with time-varying bandwidth, like the wireless one. In these conditions, it is critical to adapt the video bit-rate to the actual wireless capacity, and bit-rate adaptation is extremely simple for a H.264 SVC video. In this paper we devise, evaluate and demonstrate a technique for streaming H.264 SVC video over a DDS middleware. The contribution is threefold: i) we design a structure of the DDS data-unit able to carry H.264 SVC video-units; ii) we devise a receiver-driven rate-control mechanism based on our DDS data-unit and exploiting specific DDS functionality; iii) we implement and show the effectiveness of our mechanism in an 802.11 wireless scenario, comparing our proposal with other solutions.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125446543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534939
Amiotosh Ghosh, W. Hamouda
We propose channel selection algorithm for cognitive ad-hoc radios using noncooperative game theory and present simulation results that show, the proposed algorithm distributes cognitive nodes according to the bandwidth ratio of the channels.
{"title":"Game theory for channel assignment of cognitive radios","authors":"Amiotosh Ghosh, W. Hamouda","doi":"10.1109/WOWMOM.2010.5534939","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534939","url":null,"abstract":"We propose channel selection algorithm for cognitive ad-hoc radios using noncooperative game theory and present simulation results that show, the proposed algorithm distributes cognitive nodes according to the bandwidth ratio of the channels.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"335 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120895482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534974
Fawaz S. Bokhari
We present our initial work on the design and implementation of an efficient routing architecture for wireless mesh networks (WMNs). We have proposed two routing schemes namely AMIRA and AntMesh, which provide efficient data forwarding for improved load-balancing and reduced interference in single and multi-radio infrastructure mesh networks. Both of our proposed schemes are derived from the principle of Ant Colony Optimization (ACO) in which artificial ants (agents) perform the routing and data forwarding to stochastically solve a dynamic network optimization problem. The main focus in our work is to take advantage of the particular characteristics of ACO framework and exploit them in designing routing schemes for WMNs keeping in view the unique characteristics and requirements of these infrastructure mesh networks.
{"title":"Artificial ants for efficient data forwarding in wireless mesh networks","authors":"Fawaz S. Bokhari","doi":"10.1109/WOWMOM.2010.5534974","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534974","url":null,"abstract":"We present our initial work on the design and implementation of an efficient routing architecture for wireless mesh networks (WMNs). We have proposed two routing schemes namely AMIRA and AntMesh, which provide efficient data forwarding for improved load-balancing and reduced interference in single and multi-radio infrastructure mesh networks. Both of our proposed schemes are derived from the principle of Ant Colony Optimization (ACO) in which artificial ants (agents) perform the routing and data forwarding to stochastically solve a dynamic network optimization problem. The main focus in our work is to take advantage of the particular characteristics of ACO framework and exploit them in designing routing schemes for WMNs keeping in view the unique characteristics and requirements of these infrastructure mesh networks.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534988
N. Yarkony, K. Sayrafian-Pour, A. Possolo
Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable wireless sensors in healthcare applications. Due to their small size, such sensors have a very limited battery power supply, which necessitates frequent recharge or even sensor replacement. Energy harvesting can prolong the battery lifetime of these sensors. This could directly impact their everyday use and significantly help their commercial applications such as remote monitoring. In this paper, our aim is to estimate the amount of harvestable energy from typical human motion. To simplify the measurement process, we focus on the amount of kinetic energy harvested from the human forearm motion. We provide statistical analysis of measurements taken from 40 test subjects over a period of 8 hours during the day. Using this information and knowing the operational architecture of the harvesting device, the distribution of harvestable energy can also be determined. Our objective is to study whether kinetic energy generated by typical human forearm motion could be a promising supplemental energy resource that prolongs the operational lifetime of wearable medical sensors.
{"title":"Statistical modeling of harvestable kinetic energy for wearable medical sensors","authors":"N. Yarkony, K. Sayrafian-Pour, A. Possolo","doi":"10.1109/WOWMOM.2010.5534988","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534988","url":null,"abstract":"Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable wireless sensors in healthcare applications. Due to their small size, such sensors have a very limited battery power supply, which necessitates frequent recharge or even sensor replacement. Energy harvesting can prolong the battery lifetime of these sensors. This could directly impact their everyday use and significantly help their commercial applications such as remote monitoring. In this paper, our aim is to estimate the amount of harvestable energy from typical human motion. To simplify the measurement process, we focus on the amount of kinetic energy harvested from the human forearm motion. We provide statistical analysis of measurements taken from 40 test subjects over a period of 8 hours during the day. Using this information and knowing the operational architecture of the harvesting device, the distribution of harvestable energy can also be determined. Our objective is to study whether kinetic energy generated by typical human forearm motion could be a promising supplemental energy resource that prolongs the operational lifetime of wearable medical sensors.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534981
Johannes Barnickel, Hakan Karahan, Ulrike Meyer
In this paper we detail the security and privacy architecture and implementation of the HealthNet mobile electronic health monitoring and data collection system. HealthNet consists of a body sensor network embedded in clothing that communicates wirelessly to the wearer's mobile phone. The mobile phone is used to manage, store and transfer the data in a secure way. Data may be transferred to other parties, such as medical experts, emergency care and private parties trusted by the wearer himself, e.g. his family. The patient controls who may access his data. Only emergency physicians nearby the patient may access vital data without the patient's individual consent. We describe the unique security and privacy features of our architecture which may also be used to improve other telemonitoring solutions.
{"title":"Security and privacy for mobile electronic health monitoring and recording systems","authors":"Johannes Barnickel, Hakan Karahan, Ulrike Meyer","doi":"10.1109/WOWMOM.2010.5534981","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534981","url":null,"abstract":"In this paper we detail the security and privacy architecture and implementation of the HealthNet mobile electronic health monitoring and data collection system. HealthNet consists of a body sensor network embedded in clothing that communicates wirelessly to the wearer's mobile phone. The mobile phone is used to manage, store and transfer the data in a secure way. Data may be transferred to other parties, such as medical experts, emergency care and private parties trusted by the wearer himself, e.g. his family. The patient controls who may access his data. Only emergency physicians nearby the patient may access vital data without the patient's individual consent. We describe the unique security and privacy features of our architecture which may also be used to improve other telemonitoring solutions.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534984
A. Chowdhury, H. Chien, Sourabh Khire, S. Fan, Xianfeng Tang, N. Jayant, G. Chang
Delivering affordable high-quality E-health care services requires effective telecommunication and multimedia technologies in conjunction with medical expertise. In this paper, we propose and demonstrate a telecommunication and networking architecture for implementing next generation Telemedicine and Telehealth systems. Our integrated optical-wireless based network provides super broadband, ultra low-latency connectivity for voice, video, image and data across various telemedicine modalities to facilitate real-time and near real-time communication of remote health care information.
{"title":"Next-generation E-health communication infrastructure using converged super-broadband optical and wireless access system","authors":"A. Chowdhury, H. Chien, Sourabh Khire, S. Fan, Xianfeng Tang, N. Jayant, G. Chang","doi":"10.1109/WOWMOM.2010.5534984","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534984","url":null,"abstract":"Delivering affordable high-quality E-health care services requires effective telecommunication and multimedia technologies in conjunction with medical expertise. In this paper, we propose and demonstrate a telecommunication and networking architecture for implementing next generation Telemedicine and Telehealth systems. Our integrated optical-wireless based network provides super broadband, ultra low-latency connectivity for voice, video, image and data across various telemedicine modalities to facilitate real-time and near real-time communication of remote health care information.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534946
Shanying Zhu, Cailian Chen, X. Guan, C. Long
In this paper, we deal with distributed estimation using consensus algorithms for heterogenous wireless sensor networks (WSNs). To accommodate with the heterogeneity, we introduce a novel distributed estimator to track the weighted average of the input signals. Different from existing models, we consider a more practical scenario to take account of hierarchical processing abilities of different sensors: type-I sensors with high processing ability and type-II senors with low processing ability for distributed sensor fusion in WSNs. We investigate the properties of our model and illustrate the feasibility of the proposed estimator via a case study where we use the estimator to track the weighted average of a noisy time-varying signal based on the sensors' noisy and distorted measurements. Convergence analysis in this scenario is given as well as the effect of network topology and estimator parameters are also studied. Simulation results are provided to demonstrate the performance and effectiveness of the proposed estimator.
{"title":"An estimator model for distributed estimation in heterogenous wireless sensor networks","authors":"Shanying Zhu, Cailian Chen, X. Guan, C. Long","doi":"10.1109/WOWMOM.2010.5534946","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534946","url":null,"abstract":"In this paper, we deal with distributed estimation using consensus algorithms for heterogenous wireless sensor networks (WSNs). To accommodate with the heterogeneity, we introduce a novel distributed estimator to track the weighted average of the input signals. Different from existing models, we consider a more practical scenario to take account of hierarchical processing abilities of different sensors: type-I sensors with high processing ability and type-II senors with low processing ability for distributed sensor fusion in WSNs. We investigate the properties of our model and illustrate the feasibility of the proposed estimator via a case study where we use the estimator to track the weighted average of a noisy time-varying signal based on the sensors' noisy and distorted measurements. Convergence analysis in this scenario is given as well as the effect of network topology and estimator parameters are also studied. Simulation results are provided to demonstrate the performance and effectiveness of the proposed estimator.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534940
M. Barbeau
The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.
{"title":"Assessment of the true risks to the protection of confidential information in the wireless home and office environment","authors":"M. Barbeau","doi":"10.1109/WOWMOM.2010.5534940","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534940","url":null,"abstract":"The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"45 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534923
Mohammad Reza Pasandideh, M. St-Hilaire
Since Universal Mobile Telecommunications System (UMTS) networks are very expensive to deploy, network optimization is an important issue for service providers to remain competitive. As a result, this paper proposes a new mathematical programming model in order to plan UMTS Release 4.0 networks. Given realistic traffic profile as input, the model simultaneously considers voice and data services as well as network signaling. More precisely, the model finds the number, the type and the location of the network elements (NE), selects the number and the type of links and interfaces and finally designs the network topology. The objective of the model is to minimize network cost. An illustrative example of the model is described and a set of randomly generated problems are solved using a commercial implementation of the branch-and-bound algorithm.
{"title":"Automatic planning of UMTS release 4.0 networks using realistic traffic","authors":"Mohammad Reza Pasandideh, M. St-Hilaire","doi":"10.1109/WOWMOM.2010.5534923","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534923","url":null,"abstract":"Since Universal Mobile Telecommunications System (UMTS) networks are very expensive to deploy, network optimization is an important issue for service providers to remain competitive. As a result, this paper proposes a new mathematical programming model in order to plan UMTS Release 4.0 networks. Given realistic traffic profile as input, the model simultaneously considers voice and data services as well as network signaling. More precisely, the model finds the number, the type and the location of the network elements (NE), selects the number and the type of links and interfaces and finally designs the network topology. The objective of the model is to minimize network cost. An illustrative example of the model is described and a set of randomly generated problems are solved using a commercial implementation of the branch-and-bound algorithm.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127934486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-14DOI: 10.1109/WOWMOM.2010.5534994
J. Lessmann, M. Schöller, Frank A. Zdarsky
In this paper, we present a novel multipath structure called rope-ladder which combines the advantages of path, node and link protection schemes. We also propose a position-based multipath routing protocol in order to efficiently construct rope-ladders in wireless networks. By design, the paths which are constructed by our protocol are closely together which allows to quickly switch back and forth between them in cases of node or link failures. Hence, the size of loss gaps (i.e. the number of consecutively lost packets) can be minimized. Previous works mostly confine themselves to overall packet loss comparisons. However, the loss gap size is crucial to ensure high quality for gap-sensitive traffic like voice flows. Our multipath structure can also tolerate failures of multiple consecutive nodes on the primary path, and has a superior path diversity and path lifetime compared to even perfect braids. We evaluate the performance of our protocol using analysis and simulations1.
{"title":"Rope ladder routing: Position-based multipath routing for wireless mesh networks","authors":"J. Lessmann, M. Schöller, Frank A. Zdarsky","doi":"10.1109/WOWMOM.2010.5534994","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534994","url":null,"abstract":"In this paper, we present a novel multipath structure called rope-ladder which combines the advantages of path, node and link protection schemes. We also propose a position-based multipath routing protocol in order to efficiently construct rope-ladders in wireless networks. By design, the paths which are constructed by our protocol are closely together which allows to quickly switch back and forth between them in cases of node or link failures. Hence, the size of loss gaps (i.e. the number of consecutively lost packets) can be minimized. Previous works mostly confine themselves to overall packet loss comparisons. However, the loss gap size is crucial to ensure high quality for gap-sensitive traffic like voice flows. Our multipath structure can also tolerate failures of multiple consecutive nodes on the primary path, and has a superior path diversity and path lifetime compared to even perfect braids. We evaluate the performance of our protocol using analysis and simulations1.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129096563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}