Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096746
Huda Alhawiti, Y. Bazi, M. M. Al Rahhal, H. Alhichri, M. Zuair
In this paper, we present a deep learning approach for learning for multiple remote sensing sources. The method starts by eliminating the distribution shift between the different sources and the target dataset using an adversarial learning approach based on min-max entropy optimization. After convergence, the results are aggregated using an average fusion layer. As pre-trained CNN we use in the work the recent state-of-the-art EfficientNet models. In the experiments, we assess the method on four remote sensing datasets acquired over different locations of the earth’s surface and are labeled by different experts. The obtained results confirm the promising capability of the proposed method.
{"title":"Deep Learning approach for Multiple Source Classification in Remote Sensing Imagery","authors":"Huda Alhawiti, Y. Bazi, M. M. Al Rahhal, H. Alhichri, M. Zuair","doi":"10.1109/ICCAIS48893.2020.9096746","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096746","url":null,"abstract":"In this paper, we present a deep learning approach for learning for multiple remote sensing sources. The method starts by eliminating the distribution shift between the different sources and the target dataset using an adversarial learning approach based on min-max entropy optimization. After convergence, the results are aggregated using an average fusion layer. As pre-trained CNN we use in the work the recent state-of-the-art EfficientNet models. In the experiments, we assess the method on four remote sensing datasets acquired over different locations of the earth’s surface and are labeled by different experts. The obtained results confirm the promising capability of the proposed method.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096778
R. P. Singh, V. Mukherjee, Dharmbir Prasad, W. Ansari
Goal of this paper is to investigate the potential of modified differential evolution (MDE) algorithm, to find solution for optimal power flow (OPF) problem of power systems incorporating flexible ac transmission system (FACTS) devices. The optimization problem of the present work is formulated with four different objective functions viz., (a) fuel cost minimization, (b) power transmission losses minimization, (c) emission reduction and (d) minimization of combined economic and environmental cost. In this context, two FACTS devices, namely, thyristor controlled phase shifter (TCPS) and thyristor controlled series capacitor (TCSC) are integrating at predefined locations on the standard IEEE-57 bus test system. The results demonstrate the potential of the proposed approach and show its effectiveness and robustness to solve the OPF problem for the test systems considered.
{"title":"Solution of optimal power flow problem of system with FACTS devices using MDE algorithm","authors":"R. P. Singh, V. Mukherjee, Dharmbir Prasad, W. Ansari","doi":"10.1109/ICCAIS48893.2020.9096778","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096778","url":null,"abstract":"Goal of this paper is to investigate the potential of modified differential evolution (MDE) algorithm, to find solution for optimal power flow (OPF) problem of power systems incorporating flexible ac transmission system (FACTS) devices. The optimization problem of the present work is formulated with four different objective functions viz., (a) fuel cost minimization, (b) power transmission losses minimization, (c) emission reduction and (d) minimization of combined economic and environmental cost. In this context, two FACTS devices, namely, thyristor controlled phase shifter (TCPS) and thyristor controlled series capacitor (TCSC) are integrating at predefined locations on the standard IEEE-57 bus test system. The results demonstrate the potential of the proposed approach and show its effectiveness and robustness to solve the OPF problem for the test systems considered.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096791
N. Alnaghaimshi, R. A. Alenizy, G. Alfayez, A.A. Almutairi
Nowadays, missing or losing items has become a common problem owing to our stressful and pressured lifestyle. Losing items can be highly inconvenient and may have an effect on emotional well-being. However, technology can be employed to provide effective solutions to help people in searching, verifying and finding their missing items. In response, a solution for effectively searching for the missing items in an outdoor environment is presented. This paper proposes a mobile-based technology designed for Arabic users for a more efficient method of finding lost items easily and quickly.
{"title":"Mafqudat: Arabic Smartphone Application for Reporting Lost and Found Items","authors":"N. Alnaghaimshi, R. A. Alenizy, G. Alfayez, A.A. Almutairi","doi":"10.1109/ICCAIS48893.2020.9096791","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096791","url":null,"abstract":"Nowadays, missing or losing items has become a common problem owing to our stressful and pressured lifestyle. Losing items can be highly inconvenient and may have an effect on emotional well-being. However, technology can be employed to provide effective solutions to help people in searching, verifying and finding their missing items. In response, a solution for effectively searching for the missing items in an outdoor environment is presented. This paper proposes a mobile-based technology designed for Arabic users for a more efficient method of finding lost items easily and quickly.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096828
Laid Degaa, B. Bendjedia, N. Rizoug, A. Saidane, A. Belaidi
In recent years, the Energy Storage Systems field for all electric vehicle applications has attracted many researchers and academic institutions. The main challenge concerns the design in terms of weight, volume, and increasing as possible the hybrid source lifetime. Therefore, increasing the vehicle drive range is very important parameter to facilitate their commercialization.Several storage components can be used to achieve the needed performances as super capacitor, batteries and fuel cell systems. However, fuel cells are energetic components where it is needed to add a powerful element to ensure the power peaks during acceleration and deceleration phases. This paper deals with, a comparative study between fuel cell and battery based power trains for lightweight electric vehicles. A developed algorithm is used to obtain the optimal sizes and constraints of different Energy Storage Systems (ESS) based on fuel cells, batteries and supercapacitors. The comparison between the several systems is based on their costs, volumes, weights and constraints applied to cells. First, to confirm the hybridization benefits we present a comparative study between single and hybrid ESSs according to the desired drive range in terms of energy consumption, weight and cost. Furthermore, in the objective to improve the hybrid ESS performances, different technologies batteries and supercapacitors are tested and their performances will be evaluated. Simulation results show that the desired range influences the choice of storage system technologies for the hybrid enrgy storage system. This results confirm also the interest of hybrid storage system composed with fuel cells and battery for high drive range (>400km).
{"title":"Comparative study between different energy storage technologies to design hybrid source supplying urban electric vehicles","authors":"Laid Degaa, B. Bendjedia, N. Rizoug, A. Saidane, A. Belaidi","doi":"10.1109/ICCAIS48893.2020.9096828","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096828","url":null,"abstract":"In recent years, the Energy Storage Systems field for all electric vehicle applications has attracted many researchers and academic institutions. The main challenge concerns the design in terms of weight, volume, and increasing as possible the hybrid source lifetime. Therefore, increasing the vehicle drive range is very important parameter to facilitate their commercialization.Several storage components can be used to achieve the needed performances as super capacitor, batteries and fuel cell systems. However, fuel cells are energetic components where it is needed to add a powerful element to ensure the power peaks during acceleration and deceleration phases. This paper deals with, a comparative study between fuel cell and battery based power trains for lightweight electric vehicles. A developed algorithm is used to obtain the optimal sizes and constraints of different Energy Storage Systems (ESS) based on fuel cells, batteries and supercapacitors. The comparison between the several systems is based on their costs, volumes, weights and constraints applied to cells. First, to confirm the hybridization benefits we present a comparative study between single and hybrid ESSs according to the desired drive range in terms of energy consumption, weight and cost. Furthermore, in the objective to improve the hybrid ESS performances, different technologies batteries and supercapacitors are tested and their performances will be evaluated. Simulation results show that the desired range influences the choice of storage system technologies for the hybrid enrgy storage system. This results confirm also the interest of hybrid storage system composed with fuel cells and battery for high drive range (>400km).","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096815
Fatimah Alghamdi
Software companies’ acceptance to adopt security practices during the software development life cycle differs from one company to another. It can be said that one of the reasons for these differences is the varied characteristics of each company, such as its size, resources, and field. This paper aims to study the characteristics of companies that affect the adoption of security practices during software development. We studied eight company characteristics, some of which are classified as primary characteristics, including company size, type of developed software, and type of company. Meanwhile, the remaining five characteristics are classified as secondary characteristics, including company field, years of experience, methodology, presence of security experts, and approach to adopting security practices. A survey method was designed to find company characteristics that impact security adoption during software development. Results show that large companies, especially generic companies, adoption security practices more than other types of companies.
{"title":"Motivational Company’s Characteristics to Secure Software","authors":"Fatimah Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096815","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096815","url":null,"abstract":"Software companies’ acceptance to adopt security practices during the software development life cycle differs from one company to another. It can be said that one of the reasons for these differences is the varied characteristics of each company, such as its size, resources, and field. This paper aims to study the characteristics of companies that affect the adoption of security practices during software development. We studied eight company characteristics, some of which are classified as primary characteristics, including company size, type of developed software, and type of company. Meanwhile, the remaining five characteristics are classified as secondary characteristics, including company field, years of experience, methodology, presence of security experts, and approach to adopting security practices. A survey method was designed to find company characteristics that impact security adoption during software development. Results show that large companies, especially generic companies, adoption security practices more than other types of companies.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096726
Jana Alghamdi, Renad Alharthi, Raneem Alghamdi, Wafaa Alsubaie, Rawan AlSubaie, Dana Alqahtani, Rawan Al ramadan, Leena Alqarni, Reem Alshammari
Facial Recognition System is a computer technology that uses a variety of algorithms that identify the human face in digital images, identify the person and then verify the captured images by comparing them with the facial images stored in the database. Facial recognition is an important topic in computer vision, and many researchers have studied this topic in many different ways; it is important especially in some applications such as surveillance systems. The main objective of this survey paper is to compare the multiple algorithms used for facial recognition.
{"title":"A Survey On Face Recognition Algorithms","authors":"Jana Alghamdi, Renad Alharthi, Raneem Alghamdi, Wafaa Alsubaie, Rawan AlSubaie, Dana Alqahtani, Rawan Al ramadan, Leena Alqarni, Reem Alshammari","doi":"10.1109/ICCAIS48893.2020.9096726","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096726","url":null,"abstract":"Facial Recognition System is a computer technology that uses a variety of algorithms that identify the human face in digital images, identify the person and then verify the captured images by comparing them with the facial images stored in the database. Facial recognition is an important topic in computer vision, and many researchers have studied this topic in many different ways; it is important especially in some applications such as surveillance systems. The main objective of this survey paper is to compare the multiple algorithms used for facial recognition.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096870
P. Razumov, O. Safaryan, I. Smirnov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, Sergey A. Osikov
One of most relevant cyberattacks are DDoS–attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in financial losses for IS owner, as well as failure of hardware as a whole. Practical implementation of the method for detecting DDoS attacks at L7 level of OSI model – HTTP Flood if offered. This method is based on mathematical model that reproduces the interaction of clients with the server. It takes into account the individual characteristics of parameters describing operation of network and server, which affects to the possibility of more effective attack detection. Authors’ development offers the software implementation of this procedure as extension module to reflect large number of non– valid requests from attacking side of HTTP_Flood_reject. Such solution realization is aimed to protect critical resources of commercial organizations and natural persons to provide service from DDos–type attacks.
{"title":"Developing of Algorithm of HTTP FLOOD DDoS Protection","authors":"P. Razumov, O. Safaryan, I. Smirnov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, Sergey A. Osikov","doi":"10.1109/ICCAIS48893.2020.9096870","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096870","url":null,"abstract":"One of most relevant cyberattacks are DDoS–attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in financial losses for IS owner, as well as failure of hardware as a whole. Practical implementation of the method for detecting DDoS attacks at L7 level of OSI model – HTTP Flood if offered. This method is based on mathematical model that reproduces the interaction of clients with the server. It takes into account the individual characteristics of parameters describing operation of network and server, which affects to the possibility of more effective attack detection. Authors’ development offers the software implementation of this procedure as extension module to reflect large number of non– valid requests from attacking side of HTTP_Flood_reject. Such solution realization is aimed to protect critical resources of commercial organizations and natural persons to provide service from DDos–type attacks.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096809
Dalia Alsaffar, Atheer Sultan Almutiri, Bashaier Alqahtani, Rahaf Alamri, Hanan Fahhad Alqahtani, Nada Alqahtani, Ghadeer Mohammed alshammari, Azza A. Ali
Cryptography is the science that concern of protecting data by transforming its comprehensible form into incomprehensible one. This study aims to compare between Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) encryption algorithms in image encryption using MATLAB. The comparison is done in the terms of testing image encryption quality for each algorithm. In addition, analyzing the histogram and correlation results. The results showed that AES algorithm has a better image encryption quality with a more convergent columns in the histogram. Moreover, AES algorithm correlation coefficient tends to be closer to the zero, thus a stronger correlation. Generally, the outcomes of this study showed that the AES algorithm is better than RSA algorithm in image encryption.1
{"title":"Image Encryption Based on AES and RSA Algorithms","authors":"Dalia Alsaffar, Atheer Sultan Almutiri, Bashaier Alqahtani, Rahaf Alamri, Hanan Fahhad Alqahtani, Nada Alqahtani, Ghadeer Mohammed alshammari, Azza A. Ali","doi":"10.1109/ICCAIS48893.2020.9096809","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096809","url":null,"abstract":"Cryptography is the science that concern of protecting data by transforming its comprehensible form into incomprehensible one. This study aims to compare between Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) encryption algorithms in image encryption using MATLAB. The comparison is done in the terms of testing image encryption quality for each algorithm. In addition, analyzing the histogram and correlation results. The results showed that AES algorithm has a better image encryption quality with a more convergent columns in the histogram. Moreover, AES algorithm correlation coefficient tends to be closer to the zero, thus a stronger correlation. Generally, the outcomes of this study showed that the AES algorithm is better than RSA algorithm in image encryption.1","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCAIS48893.2020.9096853
N. Alnaghaimshi, S. Almutairi, R. A. Alfaham, G. R. Alkhanini
In June 2018, it became legal for women to drive in Saudi. Since then, driving schools cannot keep up with demand for driver training and licensing. Applicants may take several months to start their classes at a school, most of which are located in major cities such as Riyadh. Official driving schools for women in Saudi Arabia are noticeably fewer than those for men and those schools cannot cope with the high demand, thus increasing the waiting time to enrol. The proposed Driving Coach Finder application aims to provide a communication space for Saudi women learning to drive and trainers or coaches. Further, creative features aim to make the experience of driving education enjoyable and support Saudi women willing to learn to drive but who cannot access driving schools. A participatory design process was undertaken with Saudi women who had had no driving experience. During the focus group, participants revealed several challenges and needs in order to learn how to drive; their responses have provided a powerful guidance for the design of proposed application. Saudi women will be able to find, review and share details of female driving instructors and locations in which to practise driving. Driving Coach Finder will assist in the creation of a marketplace to help find a private professional driving instructor and, at the same time, consider the specificity of society local culture and the needs of users. Helping to empower women wishing to obtain a driver’s licence will contribute to the country’s high economic and social growth. Further, Driving Coach Finder is expected to aid the generation of employment opportunities for women.
{"title":"Driving Coach Finder","authors":"N. Alnaghaimshi, S. Almutairi, R. A. Alfaham, G. R. Alkhanini","doi":"10.1109/ICCAIS48893.2020.9096853","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096853","url":null,"abstract":"In June 2018, it became legal for women to drive in Saudi. Since then, driving schools cannot keep up with demand for driver training and licensing. Applicants may take several months to start their classes at a school, most of which are located in major cities such as Riyadh. Official driving schools for women in Saudi Arabia are noticeably fewer than those for men and those schools cannot cope with the high demand, thus increasing the waiting time to enrol. The proposed Driving Coach Finder application aims to provide a communication space for Saudi women learning to drive and trainers or coaches. Further, creative features aim to make the experience of driving education enjoyable and support Saudi women willing to learn to drive but who cannot access driving schools. A participatory design process was undertaken with Saudi women who had had no driving experience. During the focus group, participants revealed several challenges and needs in order to learn how to drive; their responses have provided a powerful guidance for the design of proposed application. Saudi women will be able to find, review and share details of female driving instructors and locations in which to practise driving. Driving Coach Finder will assist in the creation of a marketplace to help find a private professional driving instructor and, at the same time, consider the specificity of society local culture and the needs of users. Helping to empower women wishing to obtain a driver’s licence will contribute to the country’s high economic and social growth. Further, Driving Coach Finder is expected to aid the generation of employment opportunities for women.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}