Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.025
Pablo Garcia-Aunon , Matilde Santos Peñas , Jesus Manuel de la Cruz García
In order to steer an Unmanned Aerial Vehicle (UAV) and make it follow a desired trajectory, a high level controller is needed. Depending on the control algorithm, one or more parameters have to be tuned, having their values high impact on the performance. In most of the works, these parameters are taken as constant. In this paper, we apply fuzzy logic to select the parameters of the control law and compare this approach with the tuning by constant parameters and with another adjusting method based on the kinematic analysis of the equations of the UAV. After many simulations of the quadrotor following randomly generated paths, we have proved that the fuzzy tuning law is not only a good and feasible solution, but also more general as it can be applied to any trajectory.
{"title":"Parameter selection based on fuzzy logic to improve UAV path-following algorithms","authors":"Pablo Garcia-Aunon , Matilde Santos Peñas , Jesus Manuel de la Cruz García","doi":"10.1016/j.jal.2016.11.025","DOIUrl":"10.1016/j.jal.2016.11.025","url":null,"abstract":"<div><p>In order to steer an Unmanned Aerial Vehicle (UAV) and make it follow a desired trajectory, a high level controller is needed. Depending on the control algorithm, one or more parameters have to be tuned, having their values high impact on the performance. In most of the works, these parameters are taken as constant. In this paper, we apply fuzzy logic to select the parameters of the control law and compare this approach with the tuning by constant parameters and with another adjusting method based on the kinematic analysis of the equations of the UAV. After many simulations of the quadrotor following randomly generated paths, we have proved that the fuzzy tuning law is not only a good and feasible solution, but also more general as it can be applied to any trajectory.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 62-75"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.014
Pedro Luis Galdámez, William Raveane, Angélica González Arrieta
The process of precisely recognize people by ears has been getting major attention in recent years. It represents an important step in the biometric research, especially as a complement to face recognition systems which have difficult in real conditions. This is due to the great variation in shapes, variable lighting conditions, and the changing profile shape which is a planar representation of a complex object. An ear recognition system involving a convolutional neural networks (CNN) is proposed to identify a person given an input image. The proposed method matches the performance of other traditional approaches when analyzed against clean photographs. However, the F1 metric of the results shows improvements in specificity of the recognition. We also present a technique for improving the speed of a CNN applied to large input images through the optimization of the sliding window approach.
{"title":"A brief review of the ear recognition process using deep neural networks","authors":"Pedro Luis Galdámez, William Raveane, Angélica González Arrieta","doi":"10.1016/j.jal.2016.11.014","DOIUrl":"10.1016/j.jal.2016.11.014","url":null,"abstract":"<div><p>The process of precisely recognize people by ears has been getting major attention in recent years. It represents an important step in the biometric research, especially as a complement to face recognition systems which have difficult in real conditions. This is due to the great variation in shapes, variable lighting conditions, and the changing profile shape which is a planar representation of a complex object. An ear recognition system involving a convolutional neural networks (CNN) is proposed to identify a person given an input image. The proposed method matches the performance of other traditional approaches when analyzed against clean photographs. However, the F1 metric of the results shows improvements in specificity of the recognition. We also present a technique for improving the speed of a CNN applied to large input images through the optimization of the sliding window approach.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 62-70"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122905965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.022
S. Valero, E. del Val, J. Alemany, V. Botti
Multi-agent system paradigm has been envisioned as an appropriate solution for challenges in the area of smart-environments. Specifically, MAS add new capabilities such as adaption, reorganization, learning, coordination, etc. These features allow to deal with open issues in the context of smart-homes such as multi-occupancy, activity tracking or profiling activities and behaviors from multiple residents. In this paper, we present Magentix2 as a suitable MAS platform for the development of dynamic smart environments. Specifically, the use of Magentix2 (http://gti-ia.upv.es/sma/tools/magentix2/index.php) facilitates the management of the multiple occupancy in smart living spaces. Normative virtual organizations provide the possibility of defining a set of norms and organizational roles that facilitate the regulation and control of the actions that can be carried out by internal and external agents depending on their profile. Moreover, Magentix2 provides a tracing service to keep track of activities carried out in the system. We illustrate the applicability and benefits of Magentix2 in a set of scenarios in the context of smart-homes.
{"title":"Enhancing smart-home environments using Magentix2","authors":"S. Valero, E. del Val, J. Alemany, V. Botti","doi":"10.1016/j.jal.2016.11.022","DOIUrl":"10.1016/j.jal.2016.11.022","url":null,"abstract":"<div><p>Multi-agent system paradigm has been envisioned as an appropriate solution for challenges in the area of smart-environments. Specifically, MAS add new capabilities such as adaption, reorganization, learning, coordination, etc. These features allow to deal with open issues in the context of smart-homes such as multi-occupancy, activity tracking or profiling activities and behaviors from multiple residents. In this paper, we present Magentix2 as a suitable MAS platform for the development of dynamic smart environments. Specifically, the use of Magentix2 (<span>http://gti-ia.upv.es/sma/tools/magentix2/index.php</span><svg><path></path></svg>) facilitates the management of the multiple occupancy in smart living spaces. Normative virtual organizations provide the possibility of defining a set of norms and organizational roles that facilitate the regulation and control of the actions that can be carried out by internal and external agents depending on their profile. Moreover, Magentix2 provides a tracing service to keep track of activities carried out in the system. We illustrate the applicability and benefits of Magentix2 in a set of scenarios in the context of smart-homes.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 32-44"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.023
D. Álvarez, R.A. Fernández, L. Sánchez
We present a new approach for off-line intelligent word recognition based on a fuzzy classification model. First, we segment a word into its single characters, and label each pixel as vertical or as horizontal so that we can group all the pixels into vertical or horizontal strokes. Then, we use dynamic zoning to obtain the locations of the connections between the vertical strokes – which are the main strokes – and the horizontal ones. These features let us construct the representative string of a character using a regular grammar and, subsequently, use a Deterministic Finite Automaton to check them out. To accomplish the recognition, we use a Fuzzy Lattice Reasoning classifier. The combination of the representative strings and the fuzzy classifier provides promising performance rates.
{"title":"Fuzzy system for intelligent word recognition using a regular grammar","authors":"D. Álvarez, R.A. Fernández, L. Sánchez","doi":"10.1016/j.jal.2016.11.023","DOIUrl":"10.1016/j.jal.2016.11.023","url":null,"abstract":"<div><p>We present a new approach for off-line intelligent word recognition based on a fuzzy classification model. First, we segment a word into its single characters, and label each pixel as vertical or as horizontal so that we can group all the pixels into vertical or horizontal strokes. Then, we use dynamic zoning to obtain the locations of the connections between the vertical strokes – which are the main strokes – and the horizontal ones. These features let us construct the representative string of a character using a regular grammar and, subsequently, use a Deterministic Finite Automaton to check them out. To accomplish the recognition, we use a Fuzzy Lattice Reasoning classifier. The combination of the representative strings and the fuzzy classifier provides promising performance rates.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 45-53"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A comprehensive analysis of clustering techniques is presented in this paper through their application to data on meteorological conditions. Six partitional and hierarchical clustering techniques (k-means, k-medoids, SOM k-means, Agglomerative Hierarchical Clustering, and Clustering based on Gaussian Mixture Models) with different distance criteria, together with some clustering evaluation measures (Calinski–Harabasz, Davies–Bouldin, Gap and Silhouette criterion clustering evaluation object), present various analyses of the main climatic zones in Spain. Real-life data sets, recorded by AEMET (Spanish Meteorological Agency) at four of its weather stations, are analyzed in order to characterize the actual weather conditions at each location. The clustering techniques process the data on some of the main daily meteorological variables collected at these stations over six years between 2004 and 2010.
{"title":"Analysis of meteorological conditions in Spain by means of clustering techniques","authors":"Ángel Arroyo , Álvaro Herrero , Verónica Tricio , Emilio Corchado","doi":"10.1016/j.jal.2016.11.026","DOIUrl":"10.1016/j.jal.2016.11.026","url":null,"abstract":"<div><p>A comprehensive analysis of clustering techniques is presented in this paper through their application to data on meteorological conditions. Six partitional and hierarchical clustering techniques (<em>k</em>-means, <em>k</em>-medoids, SOM <em>k</em>-means, Agglomerative Hierarchical Clustering, and Clustering based on Gaussian Mixture Models) with different distance criteria, together with some clustering evaluation measures (Calinski–Harabasz, Davies–Bouldin, Gap and Silhouette criterion clustering evaluation object), present various analyses of the main climatic zones in Spain. Real-life data sets, recorded by AEMET (Spanish Meteorological Agency) at four of its weather stations, are analyzed in order to characterize the actual weather conditions at each location. The clustering techniques process the data on some of the main daily meteorological variables collected at these stations over six years between 2004 and 2010.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 76-89"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.017
Pavel Brandstetter, Martin Kuchar
High power of modern digital signal processors and their decreasing prices enable practical implementation of different speed estimators which are used in the sensorless control of AC drives. The paper describes application possibilities of artificial neural networks for the sensorless speed control of the A.C. induction motor drive. In the sensorless control structure of the A.C. drive, there is implemented the speed estimator which uses two different artificial neural networks for speed estimation. The first speed estimator uses a multilayer feedforward artificial neural network. Its properties are compared with the speed estimator using a radial basis function neural network. The sensorless A.C. drive was simulated in program Matlab-Simulink. The main goal of many simulations was finding suitable structure of the artificial neural network with required number of neuron units which will ensure good control characteristics and simultaneously will enable a practical implementation of the artificial neural network in the digital signal processor control system.
{"title":"Sensorless control of variable speed induction motor drive using RBF neural network","authors":"Pavel Brandstetter, Martin Kuchar","doi":"10.1016/j.jal.2016.11.017","DOIUrl":"10.1016/j.jal.2016.11.017","url":null,"abstract":"<div><p>High power of modern digital signal processors and their decreasing prices enable practical implementation of different speed estimators which are used in the sensorless control of AC drives. The paper describes application possibilities of artificial neural networks for the sensorless speed control of the A.C. induction motor drive. In the sensorless control structure of the A.C. drive, there is implemented the speed estimator which uses two different artificial neural networks for speed estimation. The first speed estimator uses a multilayer feedforward artificial neural network. Its properties are compared with the speed estimator using a radial basis function neural network. The sensorless A.C. drive was simulated in program Matlab-Simulink. The main goal of many simulations was finding suitable structure of the artificial neural network with required number of neuron units which will ensure good control characteristics and simultaneously will enable a practical implementation of the artificial neural network in the digital signal processor control system.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 97-108"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.018
Amira Sayed A. Aziz , Sanaa EL-Ola Hanafi , Aboul Ella Hassanien
In a previous research, a multi-agent artificial immune system for network intrusion detection and classification was proposed and tested, where a multi-layer detection and classification process was executed on each agent, for each host in the network. In this paper, we show the experiments that were held to chose the appropriate classifiers by testing different classifiers and comparing them to increase the detection accuracy and obtain more information on the detected anomalies. It will be shown that no single classifier should be used for all types of attacks, due to different classification rates obtained. This is due to attacks representations in the train set and dependency between features used to detect them. It will also be shown that a basic and simple classifier such as Naive Bayes has better classification results in the case of low-represented attacks, and the basic decision trees such as Naive-Bayes Tree and Best-First Tree give very good results compared to well-known J48 (Weka implementation of C4.5) and Random Forest decision trees. Based on these experiments and their results, Naive Bayes and Best-First tree classifiers were selected to classify the anomaly-detected traffic. It was shown that in the detection phase, 90% of anomalies were detected, and in the classification phase, 88% of false positives were successfully labeled as normal traffic connections, and 79% of DoS and Probe attacks were labeled correctly, mostly by NB, NBTree, and BFTree classifiers.
{"title":"Comparison of classification techniques applied for network intrusion detection and classification","authors":"Amira Sayed A. Aziz , Sanaa EL-Ola Hanafi , Aboul Ella Hassanien","doi":"10.1016/j.jal.2016.11.018","DOIUrl":"10.1016/j.jal.2016.11.018","url":null,"abstract":"<div><p>In a previous research, a multi-agent artificial immune system for network intrusion detection and classification was proposed and tested, where a multi-layer detection and classification process was executed on each agent, for each host in the network. In this paper, we show the experiments that were held to chose the appropriate classifiers by testing different classifiers and comparing them to increase the detection accuracy and obtain more information on the detected anomalies. It will be shown that no single classifier should be used for all types of attacks, due to different classification rates obtained. This is due to attacks representations in the train set and dependency between features used to detect them. It will also be shown that a basic and simple classifier such as Naive Bayes has better classification results in the case of low-represented attacks, and the basic decision trees such as Naive-Bayes Tree and Best-First Tree give very good results compared to well-known J48 (Weka implementation of C4.5) and Random Forest decision trees. Based on these experiments and their results, Naive Bayes and Best-First tree classifiers were selected to classify the anomaly-detected traffic. It was shown that in the detection phase, 90% of anomalies were detected, and in the classification phase, 88% of false positives were successfully labeled as normal traffic connections, and 79% of DoS and Probe attacks were labeled correctly, mostly by NB, NBTree, and BFTree classifiers.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 109-118"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.020
C. Puente , A. Sobrino , J.A. Olivas , E. Garrido
The objective of this work is to propose a complete system able to extract causal sentences from a set of text documents, select the causal sentences contained, create a causal graph in base to a given concept using as source these causal sentences, and finally produce a text summary gathering all the information connected by means of this causal graph. This procedure has three main steps. The first one is focused in the extraction, filtering and selection of those causal sentences that could have relevant information for the system. The second one is focused on the composition of a suitable causal graph, removing redundant information and solving ambiguity problems. The third step is a procedure able to read the causal graph to compose a suitable answer to a proposed causal question by summarizing the information contained in it.
{"title":"Summarizing information by means of causal sentences through causal graphs","authors":"C. Puente , A. Sobrino , J.A. Olivas , E. Garrido","doi":"10.1016/j.jal.2016.11.020","DOIUrl":"10.1016/j.jal.2016.11.020","url":null,"abstract":"<div><p>The objective of this work is to propose a complete system able to extract causal sentences from a set of text documents, select the causal sentences contained, create a causal graph in base to a given concept using as source these causal sentences, and finally produce a text summary gathering all the information connected by means of this causal graph. This procedure has three main steps. The first one is focused in the extraction, filtering and selection of those causal sentences that could have relevant information for the system. The second one is focused on the composition of a suitable causal graph, removing redundant information and solving ambiguity problems. The third step is a procedure able to read the causal graph to compose a suitable answer to a proposed causal question by summarizing the information contained in it.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 3-14"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1016/j.jal.2016.11.019
Mar Lopez , Javier Carbo , Jose M. Molina , Juanita Pedraza
In this paper we present an integral solution for law-compliance privacy-protection into trust models for agent systems. Several privacy issues are concerned into trust relationships. Specifically, we define which privacy rights must legally be guaranteed in trusting communities of agents. From them, we describe additional interaction protocols that are required to implement such guarantees. Next, we apply additional message exchanges into a specific application domain (the Agent Trust and Reputation testbed) using JADE agent platform. The decisions about how to apply these control mechanisms (about when to launch the corresponding JADE protocol) has been efficiently carried out by neural computing. It uses past behavior of agents to decide (classify) which agents are worthy to share privacy with, considering which number of past interactions we should take into account. Furthermore, we also enumerate the corresponding privacy violations that would have taken place if these control mechanisms (in form of interaction protocols) were ignored or misused. From the possible existence of privacy violations, a regulatory structure is required to address (prevent and fix) the corresponding harmful consequences. We use Islander (an electronic institution editor) to formally define the scenes where privacy violation may be produced, attached to the ways to repair it: the defeasible actions that could voluntarily reduce or eliminate the privacy damage, and the obligations that the electronic institution would impose as penalties.
{"title":"Electronic institutions and neural computing providing law-compliance privacy for trusting agents","authors":"Mar Lopez , Javier Carbo , Jose M. Molina , Juanita Pedraza","doi":"10.1016/j.jal.2016.11.019","DOIUrl":"10.1016/j.jal.2016.11.019","url":null,"abstract":"<div><p>In this paper we present an integral solution for law-compliance privacy-protection into trust models for agent systems. Several privacy issues are concerned into trust relationships. Specifically, we define which privacy rights must legally be guaranteed in trusting communities of agents. From them, we describe additional interaction protocols that are required to implement such guarantees. Next, we apply additional message exchanges into a specific application domain (the Agent Trust and Reputation testbed) using JADE agent platform. The decisions about how to apply these control mechanisms (about when to launch the corresponding JADE protocol) has been efficiently carried out by neural computing. It uses past behavior of agents to decide (classify) which agents are worthy to share privacy with, considering which number of past interactions we should take into account. Furthermore, we also enumerate the corresponding privacy violations that would have taken place if these control mechanisms (in form of interaction protocols) were ignored or misused. From the possible existence of privacy violations, a regulatory structure is required to address (prevent and fix) the corresponding harmful consequences. We use Islander (an electronic institution editor) to formally define the scenes where privacy violation may be produced, attached to the ways to repair it: the defeasible actions that could voluntarily reduce or eliminate the privacy damage, and the obligations that the electronic institution would impose as penalties.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 119-131"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}