Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009546
A. Kar, A. Dutta, S. Debnath
In this paper, we describe the application of cloud computing in the field of robotics where a robot is assigned the job of picking up sticks lying in the floor and to keep them in the given space. The robot is connected to the cloud through a network. It receives the answer to the queries of the database residing in the cloud about the location of the sticks to be picked up and receives the coordinates of the location of the spaces where it is to be kept. The robot offloads the calculation of the distances of every stick from it and the distances of the spaces from the sticks and the sequence of the sticks and the spaces where it is to be kept. The cloud calculates the sequence of the sticks to be picked up by the robot and the location of the space where each stick is to be kept. Cloud computing minimizes the memory of the robot as the database, which may be very voluminous, are kept in the Cloud. It also reduces the need of the robot for high processor as the complex calculation is to be done in the cloud. It is assumed that the number of spaces is more than the number of sticks to be kept. So the calculation has the option of choosing the spaces that minimizes the total distance travelled by the robot.
{"title":"Task management of robot using cloud computing","authors":"A. Kar, A. Dutta, S. Debnath","doi":"10.1109/ICCECE.2016.8009546","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009546","url":null,"abstract":"In this paper, we describe the application of cloud computing in the field of robotics where a robot is assigned the job of picking up sticks lying in the floor and to keep them in the given space. The robot is connected to the cloud through a network. It receives the answer to the queries of the database residing in the cloud about the location of the sticks to be picked up and receives the coordinates of the location of the spaces where it is to be kept. The robot offloads the calculation of the distances of every stick from it and the distances of the spaces from the sticks and the sequence of the sticks and the spaces where it is to be kept. The cloud calculates the sequence of the sticks to be picked up by the robot and the location of the space where each stick is to be kept. Cloud computing minimizes the memory of the robot as the database, which may be very voluminous, are kept in the Cloud. It also reduces the need of the robot for high processor as the complex calculation is to be done in the cloud. It is assumed that the number of spaces is more than the number of sticks to be kept. So the calculation has the option of choosing the spaces that minimizes the total distance travelled by the robot.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"41 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009565
Rudraishwarya Banerjee, S. K. Parui
Here, a simple cylindrical dielectric resonator is cut into two equal segments and the two segments are used to design a broadband hybrid monopole-dielectric resonator antenna. The impedance bandwidth of the proposed antenna is 100%, whereas that of a cylindrical dielectric ring resonator (with same radius and height) loaded monopole antenna is only 58%. Also, this new proposed antenna cause gain enhancement of 4 dB over that of a CDRR loaded monopole antenna. The width of the air gap between the two segments is varied, the monopole being placed at the center of the gap, and the corresponding results are studied. Another important aspect of this work is the excitation of HEM21ô like mode near 13 GHz in the composite (considering the two segments together) CDR.
{"title":"Study of the effect of air gap in segmented cylindrical dielectric resonator loaded monopole","authors":"Rudraishwarya Banerjee, S. K. Parui","doi":"10.1109/ICCECE.2016.8009565","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009565","url":null,"abstract":"Here, a simple cylindrical dielectric resonator is cut into two equal segments and the two segments are used to design a broadband hybrid monopole-dielectric resonator antenna. The impedance bandwidth of the proposed antenna is 100%, whereas that of a cylindrical dielectric ring resonator (with same radius and height) loaded monopole antenna is only 58%. Also, this new proposed antenna cause gain enhancement of 4 dB over that of a CDRR loaded monopole antenna. The width of the air gap between the two segments is varied, the monopole being placed at the center of the gap, and the corresponding results are studied. Another important aspect of this work is the excitation of HEM21ô like mode near 13 GHz in the composite (considering the two segments together) CDR.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009556
Koustav Dasgupta, Sudip Kumar Ghorui
This paper proposes the implementation of Backtracking Search Algorithm (BSA) algorithm on Economic Load Dispatch problem (ELD) with Prohibited Zone constraints. ELD is an important optimization problem. Currently, Economic Load Dispatch problems have been solved by many types of soft computing techniques. Here, fifteen unit test system has been considered and solved using BSA technique. Optimal fuel cost of applied BSA technique is compared with PSO, PSOCFA, PSOIWA, PSOCFIWA techniques.
{"title":"An analysis of economic load dispatch with prohibited zone constraints using BSA algorithm","authors":"Koustav Dasgupta, Sudip Kumar Ghorui","doi":"10.1109/ICCECE.2016.8009556","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009556","url":null,"abstract":"This paper proposes the implementation of Backtracking Search Algorithm (BSA) algorithm on Economic Load Dispatch problem (ELD) with Prohibited Zone constraints. ELD is an important optimization problem. Currently, Economic Load Dispatch problems have been solved by many types of soft computing techniques. Here, fifteen unit test system has been considered and solved using BSA technique. Optimal fuel cost of applied BSA technique is compared with PSO, PSOCFA, PSOIWA, PSOCFIWA techniques.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131937383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009572
Debanka De, S. Sahana, B. Roy
This paper presents the performance analysis of different types of energy-efficient lamps used in indoor lighting applications. The objectives of this paper is to investigate and compare the electrical power quality and different photometrical parameters of few energy efficient lamps widely used in indoor applications now-a-days i.e. Fluorescent Tube Lights (FTLs), Compact Fluorescent Lamps (CFLs) and white Light Emitting Diodes (LEDs). These energy efficient lamps produce high total harmonic distortion but operate at high power factor. Few samples of commercial energy saving lamps are tested with different combinations of control gears and their performances are compared. The electrical and photometrical parameters are presented to verify the effectiveness of the lamp-ballast combinations. The result shows that although these lamps provide higher luminous efficacy, higher illumination but also high level of THD. The result also shows that the performance of these lamps do not change significantly with the change of normal commercial available control gears.
{"title":"Performance analysis of fluorescent and led lamp system","authors":"Debanka De, S. Sahana, B. Roy","doi":"10.1109/ICCECE.2016.8009572","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009572","url":null,"abstract":"This paper presents the performance analysis of different types of energy-efficient lamps used in indoor lighting applications. The objectives of this paper is to investigate and compare the electrical power quality and different photometrical parameters of few energy efficient lamps widely used in indoor applications now-a-days i.e. Fluorescent Tube Lights (FTLs), Compact Fluorescent Lamps (CFLs) and white Light Emitting Diodes (LEDs). These energy efficient lamps produce high total harmonic distortion but operate at high power factor. Few samples of commercial energy saving lamps are tested with different combinations of control gears and their performances are compared. The electrical and photometrical parameters are presented to verify the effectiveness of the lamp-ballast combinations. The result shows that although these lamps provide higher luminous efficacy, higher illumination but also high level of THD. The result also shows that the performance of these lamps do not change significantly with the change of normal commercial available control gears.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132023676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009555
Sabyasachi Saha, Mallika Roy, M. Dey, A. Chakrabarti
Local linear filters like Gaussian filter smooth the whole image irrespective of its edges or fine details, whereas Anisotropic Diffusion is a Non-Linear Filtering approach which considers both image intensity and geometric closeness of the neighboring pixels without smoothing the edges. In this paper, we have worked on the Anisotropic Diffusion filtering and proposed an efficient FPGA design of this filter for both two dimensional and three dimensional images. In this approach, the region boundaries of the image remains sharp and the local operations replicated over to the image making parallel hardware implementations feasible.
{"title":"An efficient FPGA implementation of Anisotropic Diffusion filter on 2-dimensional and 3-dimensional images","authors":"Sabyasachi Saha, Mallika Roy, M. Dey, A. Chakrabarti","doi":"10.1109/ICCECE.2016.8009555","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009555","url":null,"abstract":"Local linear filters like Gaussian filter smooth the whole image irrespective of its edges or fine details, whereas Anisotropic Diffusion is a Non-Linear Filtering approach which considers both image intensity and geometric closeness of the neighboring pixels without smoothing the edges. In this paper, we have worked on the Anisotropic Diffusion filtering and proposed an efficient FPGA design of this filter for both two dimensional and three dimensional images. In this approach, the region boundaries of the image remains sharp and the local operations replicated over to the image making parallel hardware implementations feasible.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009580
Salankara Mukherjee, I. De
Handwriting can be used to predict or analyze a person's behavioral or personality traits. Characteristics of a handwriting are studied for that. In this work various characteristics like size, spacing, slant, skew, pressure, etc are studied. Since signature reflects important characteristics of human being, we analyze them also. As our objective is to build an automated or computerized handwriting analysis system, we discuss the features from algorithmic view points. For experimental purpose, various handwriting of different writers are collected. Identical as well as different texts is used for that. Implementing these algorithms on the data sets, we obtain experimental results which are given here.
{"title":"Feature extraction from handwritten documents for personality analysis","authors":"Salankara Mukherjee, I. De","doi":"10.1109/ICCECE.2016.8009580","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009580","url":null,"abstract":"Handwriting can be used to predict or analyze a person's behavioral or personality traits. Characteristics of a handwriting are studied for that. In this work various characteristics like size, spacing, slant, skew, pressure, etc are studied. Since signature reflects important characteristics of human being, we analyze them also. As our objective is to build an automated or computerized handwriting analysis system, we discuss the features from algorithmic view points. For experimental purpose, various handwriting of different writers are collected. Identical as well as different texts is used for that. Implementing these algorithms on the data sets, we obtain experimental results which are given here.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009589
Saptarshi Mitra, Bappaditya Jana, Jayanta Poray
Now a days the rapid advancement of wireless communication, Cognitive Radio for vehicular Ad Hoc networks has received immense attention from researchers. Due to the ever increasing demand for more radio spectrum, Cognitive Radio Networks is a one of the solution for this crisis. Security is the one of the basic issue to implement a better CRN. CRN is established in a open communication environment that's why CRN are more vulnerable to security threats than wired networks. Black hole attack is one of the most common attack in CR-VANETs. If the Ad-hoc networks are affected by this attack, it not able to perform effectively. In this situation as a consequence the process of any event detection severely affected. The affected nodes can lead to discrepancies in data analysis and hence come with an erroneous report. We have proposed a simple scheme for recognition of malicious node in Black Hole attack in CR-VANET. In our proposed model, we used a Trusty Dynamic Software Agent (TDSA) which are employed for each node in VANETs and shares databases in the memory spaces of the neighboring nodes. We have compared the communication range(R) and distance between two adjacency nodes. Thus we can detect the connectivity of the two nodes and decide the actual alternate path. After recognition of malicious node we change the effected route and an alternate pathway have proposed. and thus we can eliminate black hole attack from CR-VANETs.
{"title":"A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks(CR-VANETs)","authors":"Saptarshi Mitra, Bappaditya Jana, Jayanta Poray","doi":"10.1109/ICCECE.2016.8009589","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009589","url":null,"abstract":"Now a days the rapid advancement of wireless communication, Cognitive Radio for vehicular Ad Hoc networks has received immense attention from researchers. Due to the ever increasing demand for more radio spectrum, Cognitive Radio Networks is a one of the solution for this crisis. Security is the one of the basic issue to implement a better CRN. CRN is established in a open communication environment that's why CRN are more vulnerable to security threats than wired networks. Black hole attack is one of the most common attack in CR-VANETs. If the Ad-hoc networks are affected by this attack, it not able to perform effectively. In this situation as a consequence the process of any event detection severely affected. The affected nodes can lead to discrepancies in data analysis and hence come with an erroneous report. We have proposed a simple scheme for recognition of malicious node in Black Hole attack in CR-VANET. In our proposed model, we used a Trusty Dynamic Software Agent (TDSA) which are employed for each node in VANETs and shares databases in the memory spaces of the neighboring nodes. We have compared the communication range(R) and distance between two adjacency nodes. Thus we can detect the connectivity of the two nodes and decide the actual alternate path. After recognition of malicious node we change the effected route and an alternate pathway have proposed. and thus we can eliminate black hole attack from CR-VANETs.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123899974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009536
Sauvik Biswas, P. K. Nayak
In this paper, a Thyristor Controlled Series Capacitor (TCSC) is studied and simulated by using EMTDC/PSCAD software. Different fault cases are generated by placing the TCSC at the middle of the transmission line of a two source equivalent power system. The fault data are used for evaluating the performance of the distance relay placed at one end of the line. The findings are reported in this paper for few representative test cases. The observations clearly show that by using only conventional distance relaying based protection scheme reliable protection for TCSC based transmission line cannot be achieved. Thus, additional algorithms are required which can support conventional distance relaying for protecting such transmission systems.
{"title":"The performance evaluation of distance protection for transmission lines possessing TCSC","authors":"Sauvik Biswas, P. K. Nayak","doi":"10.1109/ICCECE.2016.8009536","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009536","url":null,"abstract":"In this paper, a Thyristor Controlled Series Capacitor (TCSC) is studied and simulated by using EMTDC/PSCAD software. Different fault cases are generated by placing the TCSC at the middle of the transmission line of a two source equivalent power system. The fault data are used for evaluating the performance of the distance relay placed at one end of the line. The findings are reported in this paper for few representative test cases. The observations clearly show that by using only conventional distance relaying based protection scheme reliable protection for TCSC based transmission line cannot be achieved. Thus, additional algorithms are required which can support conventional distance relaying for protecting such transmission systems.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009574
Swarup Das, D. Mitra, S. Chaudhuri
This paper presents an I-shaped third order fractal slot loaded CPW fed microstrip patch antenna for multiband operation along with bandwidth enhancement. Tri band resonances have been obtained at frequencies of 2.33, 5.10, 7.11 GHz with large bandwidth. A good radiation characteristics with significant amount of gain at those frequencies have also been observed. This antenna is suitable for its applications in LTE, Bluetooth, WLAN and C-band communications.
{"title":"I-shaped fractal slot loaded multiband microstrip patch antenna for wireless applications","authors":"Swarup Das, D. Mitra, S. Chaudhuri","doi":"10.1109/ICCECE.2016.8009574","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009574","url":null,"abstract":"This paper presents an I-shaped third order fractal slot loaded CPW fed microstrip patch antenna for multiband operation along with bandwidth enhancement. Tri band resonances have been obtained at frequencies of 2.33, 5.10, 7.11 GHz with large bandwidth. A good radiation characteristics with significant amount of gain at those frequencies have also been observed. This antenna is suitable for its applications in LTE, Bluetooth, WLAN and C-band communications.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009586
Saberi Goswamil, Jayanta Poray
Inspite of much emphasis in the field of man machine interface, very little has been established till date. Researchers have studied many ways of communication between man and machine using signals from human beings and machine to help them communicate with each other in an easier way. Brain signal is such an example which can be used on a system for a variety of purposes. This can be useful in the medical, cognitive science as well as technological field in a wider aspect. Therefore, keeping this in mind a system can be implemented which can solve some common problems related to the brain, by dealing with conversion of brain signals into useful formats to solve such problems. There are several approaches to find the sentiment (emotion) from the EEG signals such that machine can interpret the exact or near meaning of the sentiment. Here, we have studied such approaches and showed how these methods could be adopted for further enhancements in this domain.
{"title":"Human computer interaction for sentiment analysis and opinion mining: A review","authors":"Saberi Goswamil, Jayanta Poray","doi":"10.1109/ICCECE.2016.8009586","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009586","url":null,"abstract":"Inspite of much emphasis in the field of man machine interface, very little has been established till date. Researchers have studied many ways of communication between man and machine using signals from human beings and machine to help them communicate with each other in an easier way. Brain signal is such an example which can be used on a system for a variety of purposes. This can be useful in the medical, cognitive science as well as technological field in a wider aspect. Therefore, keeping this in mind a system can be implemented which can solve some common problems related to the brain, by dealing with conversion of brain signals into useful formats to solve such problems. There are several approaches to find the sentiment (emotion) from the EEG signals such that machine can interpret the exact or near meaning of the sentiment. Here, we have studied such approaches and showed how these methods could be adopted for further enhancements in this domain.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129902185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}