Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161776
Halil Çimen, E. Palacios-García, N. Çetinkaya, J. Vasquez, J. Guerrero
Non-intrusive load monitoring (NILM) is the process of obtaining appliance-level data from users’ total electricity consumption data. These data can be of great benefit, especially in demand response applications. In this paper, a multi-label classification for NILM based on a two-input gated recurrent unit (GRU) is presented. Since the presented method is designed with a multi-label approach, great savings in training time are achieved. While a separate model is trained for each appliance in the literature, only one model is trained in the proposed model. Besides, the model was trained using two different inputs. The first is the total active power value consumed by the whole house. The second input is the Spikes obtained by analyzing this active power consumption. Simply put, spikes are obtained by analyzing the instant power changes in active power. Both inputs are evaluated with a convolutional layer and necessary features are extracted. Obtained features are fed into the GRU to be able to analyze time-dependent changes. The simulation results show that an additional input can slightly improve the analysis accuracy. Besides, it was found that the second input is useful especially in the analysis of short-term devices.
{"title":"A Dual-input Multi-label Classification Approach for Non-Intrusive Load Monitoring via Deep Learning","authors":"Halil Çimen, E. Palacios-García, N. Çetinkaya, J. Vasquez, J. Guerrero","doi":"10.1109/ZINC50678.2020.9161776","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161776","url":null,"abstract":"Non-intrusive load monitoring (NILM) is the process of obtaining appliance-level data from users’ total electricity consumption data. These data can be of great benefit, especially in demand response applications. In this paper, a multi-label classification for NILM based on a two-input gated recurrent unit (GRU) is presented. Since the presented method is designed with a multi-label approach, great savings in training time are achieved. While a separate model is trained for each appliance in the literature, only one model is trained in the proposed model. Besides, the model was trained using two different inputs. The first is the total active power value consumed by the whole house. The second input is the Spikes obtained by analyzing this active power consumption. Simply put, spikes are obtained by analyzing the instant power changes in active power. Both inputs are evaluated with a convolutional layer and necessary features are extracted. Obtained features are fed into the GRU to be able to analyze time-dependent changes. The simulation results show that an additional input can slightly improve the analysis accuracy. Besides, it was found that the second input is useful especially in the analysis of short-term devices.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"1 1","pages":"259-263"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88935894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161431
Wenlin Han, Viet-An Duong, Long Nguyen, Caesar Mier
Darknet websites, the warm beds for money laundry, child pornography, and illicit drug trafficking, are built on hidden services and anonymous communication protocols. Cryptocurrencies, such as Bitcoin, is the major payment method used on Darknet. In this paper, we summarize and introduce the latest development on de-anonymization techniques used to reveal the hidden information that are helpful for crime investigation, which is a key step for the future research work.
{"title":"Darknet and Bitcoin De-anonymization: Emerging Development","authors":"Wenlin Han, Viet-An Duong, Long Nguyen, Caesar Mier","doi":"10.1109/ZINC50678.2020.9161431","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161431","url":null,"abstract":"Darknet websites, the warm beds for money laundry, child pornography, and illicit drug trafficking, are built on hidden services and anonymous communication protocols. Cryptocurrencies, such as Bitcoin, is the major payment method used on Darknet. In this paper, we summarize and introduce the latest development on de-anonymization techniques used to reveal the hidden information that are helpful for crime investigation, which is a key step for the future research work.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"249 1","pages":"222-226"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85888070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161786
W. Suwarningsih
This paper aims to explain a new way of seeking case similarities to Case Based Reasoning question and answering system. A new concept used is to create a combination of sentence patterns with the variations of syntax and relation between words in sentences. More precisely, we improve the similarity from a resource-poor source language. The combination of pattern was made for the variation of the fridge using Predicate Argument Structure (PAS) analysis, whereas the combination of pattern with the relation between words was by forming Sub Tree (ST) and Subset Tree (SST) from parsing tree. The result of forming a combination of these patterns was then selected to obtain an appropriate answer. Accuracy resulted by using the combination of this pattern resulted in a significant value equal to 88.64% of 132 question sentences used as data testing.
{"title":"Pattern Combination and Variation Syntax for Case Similarity","authors":"W. Suwarningsih","doi":"10.1109/ZINC50678.2020.9161786","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161786","url":null,"abstract":"This paper aims to explain a new way of seeking case similarities to Case Based Reasoning question and answering system. A new concept used is to create a combination of sentence patterns with the variations of syntax and relation between words in sentences. More precisely, we improve the similarity from a resource-poor source language. The combination of pattern was made for the variation of the fridge using Predicate Argument Structure (PAS) analysis, whereas the combination of pattern with the relation between words was by forming Sub Tree (ST) and Subset Tree (SST) from parsing tree. The result of forming a combination of these patterns was then selected to obtain an appropriate answer. Accuracy resulted by using the combination of this pattern resulted in a significant value equal to 88.64% of 132 question sentences used as data testing.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"280 3 1","pages":"48-53"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86573695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161779
Stevan Stevic, Marko Dragojevic, Momcilo Krunic, N. Cetic
Keeping vehicle in the right track while driving is common task for humans, as they perceive lane lines with ease. Naturally, one of the essential tasks for autonomous vehicle would be to detect lane lines. Except for using them as constant reference in steering controller, they are used as inputs in other driver assistance functions like lane departure warning, for example. Different road and weather conditions make it difficult to detect lane lines, as marking can become indistinct or disappear. Many simple vision-based algorithms rely on detection of edges of the markings with Canny edge detection and previously mentioned problems can affect proper extrapolation of lanes. This paper also belongs to vision-based group of algorithms that use camera. It presents usage of color thresholding to detect lane edges and together with perspective transformations and Hough transform to extrapolate lane segments in image with controlled conditions. These conditions include straight road and sunny weather. We used OpenCV computer vision framework that supports mentioned functionalities and algorithms, with Python, to obtain and compare results.
{"title":"Vision-Based Extrapolation of Road Lane Lines in Controlled Conditions","authors":"Stevan Stevic, Marko Dragojevic, Momcilo Krunic, N. Cetic","doi":"10.1109/ZINC50678.2020.9161779","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161779","url":null,"abstract":"Keeping vehicle in the right track while driving is common task for humans, as they perceive lane lines with ease. Naturally, one of the essential tasks for autonomous vehicle would be to detect lane lines. Except for using them as constant reference in steering controller, they are used as inputs in other driver assistance functions like lane departure warning, for example. Different road and weather conditions make it difficult to detect lane lines, as marking can become indistinct or disappear. Many simple vision-based algorithms rely on detection of edges of the markings with Canny edge detection and previously mentioned problems can affect proper extrapolation of lanes. This paper also belongs to vision-based group of algorithms that use camera. It presents usage of color thresholding to detect lane edges and together with perspective transformations and Hough transform to extrapolate lane segments in image with controlled conditions. These conditions include straight road and sunny weather. We used OpenCV computer vision framework that supports mentioned functionalities and algorithms, with Python, to obtain and compare results.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"8 1","pages":"174-177"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90043330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161777
Mikoaj Bartłmiejczyk, L. Jarzebowicz
The article discusses two energy storage applications in power supply system of public electrified transport. The first application aims at reducing the peak power of the traction substation. The second application increases effectiveness of using solar power plant to cover partial power demand of traction supply system. These two applications were discussed and analyzed based on trolleybus supply system in Gdynia, where most measurements were recorded.
{"title":"Utility analysis and rating of energy storages in trolleybus power supply system","authors":"Mikoaj Bartłmiejczyk, L. Jarzebowicz","doi":"10.1109/ZINC50678.2020.9161777","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161777","url":null,"abstract":"The article discusses two energy storage applications in power supply system of public electrified transport. The first application aims at reducing the peak power of the traction substation. The second application increases effectiveness of using solar power plant to cover partial power demand of traction supply system. These two applications were discussed and analyzed based on trolleybus supply system in Gdynia, where most measurements were recorded.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"134 1","pages":"237-241"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73295124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161769
Malek Safieh, Johann-Philipp Thiers, J. Freudenberger
Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations of the elliptic curve point multiplication are prone to side channel attacks. In this work, we present a new key expansion algorithm which improves the resistance against timing and simple power analysis attacks. Furthermore, we consider a new concept for calculating the point multiplication, where the points of the curve are represented as Gaussian integers. Gaussian integers are subset of the complex numbers, such that the real and imaginary parts are integers. Since Gaussian integer fields are isomorphic to prime fields, this concept is suitable for many elliptic curves. Representing the key by a Gaussian integer expansion is beneficial to reduce the computational complexity and the memory requirements of a secure hardware implementation.
{"title":"Side Channel Attack Resistance of the Elliptic Curve Point Multiplication using Gaussian Integers","authors":"Malek Safieh, Johann-Philipp Thiers, J. Freudenberger","doi":"10.1109/ZINC50678.2020.9161769","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161769","url":null,"abstract":"Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations of the elliptic curve point multiplication are prone to side channel attacks. In this work, we present a new key expansion algorithm which improves the resistance against timing and simple power analysis attacks. Furthermore, we consider a new concept for calculating the point multiplication, where the points of the curve are represented as Gaussian integers. Gaussian integers are subset of the complex numbers, such that the real and imaginary parts are integers. Since Gaussian integer fields are isomorphic to prime fields, this concept is suitable for many elliptic curves. Representing the key by a Gaussian integer expansion is beneficial to reduce the computational complexity and the memory requirements of a secure hardware implementation.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"109 1","pages":"231-236"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161804
Wenlin Han, Yugali Bafna
Social media networking has turned out to be an essential factor for people wherein from sharing relevant documents to exchanging messages; everything is taken place via these social media sites. However, on social media, when a new user joins the group, (s)he must not be given access to all the previous messages. Hence it is necessary to predict the relationship between the users. This primary aim is to predict the link by taking into consideration using three criteria, which includes classifying sentiments from text messages, recognizing faces from pictures and videos posted on social media to find the relationship between the users. Various algorithms and methods were studies for this purpose wherein neural networks can be used for predicting the relationship between the users.
{"title":"Automatic Privacy Preservation for User-based Data Sharing on Social Media","authors":"Wenlin Han, Yugali Bafna","doi":"10.1109/ZINC50678.2020.9161804","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161804","url":null,"abstract":"Social media networking has turned out to be an essential factor for people wherein from sharing relevant documents to exchanging messages; everything is taken place via these social media sites. However, on social media, when a new user joins the group, (s)he must not be given access to all the previous messages. Hence it is necessary to predict the relationship between the users. This primary aim is to predict the link by taking into consideration using three criteria, which includes classifying sentiments from text messages, recognizing faces from pictures and videos posted on social media to find the relationship between the users. Various algorithms and methods were studies for this purpose wherein neural networks can be used for predicting the relationship between the users.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"336 1","pages":"227-230"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74981789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161807
Johann-Philipp Thiers, Malek Safieh, J. Freudenberger
Many resource-constrained systems still rely on symmetric cryptography for verification and authentication. Asymmetric cryptographic systems provide higher security levels, but are very computational intensive. Hence, embedded systems can benefit from hardware assistance, i.e., coprocessors optimized for the required public key operations. In this work, we propose an elliptic curve cryptographic coprocessors design for resource-constrained systems. Many such coprocessor designs consider only special (Solinas) prime fields, which enable a low-complexity modulo arithmetic. Other implementations support arbitrary prime curves using the Montgomery reduction. These implementations typically require more time for the point multiplication. We present a coprocessor design that has low area requirements and enables a trade-off between performance and flexibility. The point multiplication can be performed either using a fast arithmetic based on Solinas primes or using a slower, but flexible Montgomery modular arithmetic.
{"title":"An Elliptic Curve Cryptographic Coprocessor for Resource-Constrained Systems with Arithmetic over Solinas Primes and Arbitrary Prime Fields","authors":"Johann-Philipp Thiers, Malek Safieh, J. Freudenberger","doi":"10.1109/ZINC50678.2020.9161807","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161807","url":null,"abstract":"Many resource-constrained systems still rely on symmetric cryptography for verification and authentication. Asymmetric cryptographic systems provide higher security levels, but are very computational intensive. Hence, embedded systems can benefit from hardware assistance, i.e., coprocessors optimized for the required public key operations. In this work, we propose an elliptic curve cryptographic coprocessors design for resource-constrained systems. Many such coprocessor designs consider only special (Solinas) prime fields, which enable a low-complexity modulo arithmetic. Other implementations support arbitrary prime curves using the Montgomery reduction. These implementations typically require more time for the point multiplication. We present a coprocessor design that has low area requirements and enables a trade-off between performance and flexibility. The point multiplication can be performed either using a fast arithmetic based on Solinas primes or using a slower, but flexible Montgomery modular arithmetic.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"16 1","pages":"313-318"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75888369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161813
Orhan Yaman, Hasan Yetiş, M. Karakose
In this study, a method based on image processing and machine learning is proposed for classification in hyperspectral images. The proposed method is tested on Indian Pines and KSC (Kennedy Space Center) datasets. As a preprocessing step, normalization, median filter and mean filter were applied to all bands in the hyperspectral data set. After the pre-processing, new bands are obtained by averaging the 5, 25 and 125 bands in the dataset. The obtained bands are combined and features extracted. The multi-band dataset is transformed into a single-band feature matrix. Classification is made by adding class labels to the feature matrix. SVM (Support Vector Machines) Linear, SVM Quadratic and SVM Cubic methods are used for classification using MATLAB Classification Learner Toolbox. For all the two data sets, 99% accuracy was obtained with the SVM classification algorithm.
{"title":"Band Reducing Based SVM Classification Method in Hyperspectral Image Processing","authors":"Orhan Yaman, Hasan Yetiş, M. Karakose","doi":"10.1109/ZINC50678.2020.9161813","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161813","url":null,"abstract":"In this study, a method based on image processing and machine learning is proposed for classification in hyperspectral images. The proposed method is tested on Indian Pines and KSC (Kennedy Space Center) datasets. As a preprocessing step, normalization, median filter and mean filter were applied to all bands in the hyperspectral data set. After the pre-processing, new bands are obtained by averaging the 5, 25 and 125 bands in the dataset. The obtained bands are combined and features extracted. The multi-band dataset is transformed into a single-band feature matrix. Classification is made by adding class labels to the feature matrix. SVM (Support Vector Machines) Linear, SVM Quadratic and SVM Cubic methods are used for classification using MATLAB Classification Learner Toolbox. For all the two data sets, 99% accuracy was obtained with the SVM classification algorithm.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"11 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76436716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ZINC50678.2020.9161802
Hristo Skačev, A. Mićović, Bojan Gutić, Dusan Dotilic, Ana Vesić, Vuk Ignjatović, Sava Lakićević, M. Jakovljević, M. Zivkovic
The goal of this project is to digitalize, and improve the agriculture industry in our region, in the Republic of Serbia. Agriculture is largely involved in Serbia’s financial state, with the potential to be one of the main sources of revenue. Unfortunately, it lacks structure and innovation. Once we understood the significance and the importance it has on our economy, we decided to develop an application that would tackle these issues with specialized tools and services that we would provide to our user in an elegant and easy to use interface. The tool we created is used for weed detection, enabling farmers to easily locate and remove it. In this document are written the details of our current state of development and the plans we have for the future.
{"title":"On the Development of the Automatic Weed Detection Tool","authors":"Hristo Skačev, A. Mićović, Bojan Gutić, Dusan Dotilic, Ana Vesić, Vuk Ignjatović, Sava Lakićević, M. Jakovljević, M. Zivkovic","doi":"10.1109/ZINC50678.2020.9161802","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161802","url":null,"abstract":"The goal of this project is to digitalize, and improve the agriculture industry in our region, in the Republic of Serbia. Agriculture is largely involved in Serbia’s financial state, with the potential to be one of the main sources of revenue. Unfortunately, it lacks structure and innovation. Once we understood the significance and the importance it has on our economy, we decided to develop an application that would tackle these issues with specialized tools and services that we would provide to our user in an elegant and easy to use interface. The tool we created is used for weed detection, enabling farmers to easily locate and remove it. In this document are written the details of our current state of development and the plans we have for the future.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"26 1","pages":"123-126"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73941294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}