• Title/Summary/Keyword: environment sensor

Search Result 3,391, Processing Time 0.031 seconds

Quality Characteristics of Jochung Containing Various Level of Letinus edodes Powder (표고버섯 가루를 이용한 조청의 품질 특성)

  • Park, Jung-Suk;Na, Hwan-Sik
    • Korean Journal of Food Science and Technology
    • /
    • v.37 no.5
    • /
    • pp.768-775
    • /
    • 2005
  • Lentinus edodes powder was added at 1-3%(w/w) to improve functional properties of jocheong. Content of crude protein, ash, crude lipids, total mineral, free sugar and reducing sugar increased with increasing amount of L. edodes powder, while viscosity and solid and carbohydrate contents decreased. Through amino acid analysis, 17 amino acids were identified and quantified, glutamic acid being the major amino acid. No significant differences were observed in fatty acid composition and pH between control and L. edodes powder-added jocheong. Addition of mushroom powder in jocheong decreased lightness, yellowness and redness in Hunter's color value. Sensor score of jucheong containing 1% of L. edodes powder was similar to that of control. Results showed jocheong containing less than 2% L. edodes powder gave highest scores in quality characteristics and sensory evaluation.

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Growth of CdSe thin films using Hot Wall Epitaxy method and their photoelectrical characteristics (HWE방법에 의한 CdSe 박막 성장과 광전기적 특성)

  • Hong, K.J.;Lee, K.K.;Lee, S.Y.;You, S.H.;Shin, Y.J.;Suh, S.S.;Jeong, J.W.;Jeong, K.A.;Shin, Y.J.;Jeong, T.S.;Kim, T.S.;Moon, J.D.;Kim, H.S.
    • Journal of Sensor Science and Technology
    • /
    • v.6 no.4
    • /
    • pp.328-336
    • /
    • 1997
  • The CdSe thin films were grown on the Si(100) wafers by a hot wall epitaxy method (HWE). The source and substrate temperature are $600^{\circ}C$ and $430^{\circ}C$ respectively. The crystalline structure of epilayers was investigated by double crystal X-ray diffraction(DCXD). Hall effect on the sample was measured by the van der Pauw method and studied on the carrier density and mobility dependence on temperature. From Hall data, the mobility was increased in the temperature range 30K to 150K by impurity scattering and decreased in the temperature range 150k to 293k by the lattice scattering. In order to explore the applicability as a photoconductive cell, we measured the sensitivity(${\gamma}$), the ratio of photocurrent to darkcurrent(pc/dc), maximum allowable power dissipation(MAPD), spectral response and response time. The results indicated that the photoconductive characteristic were the best for the samples annealed in Cu vapor compare with in Cd, Se, air and vacuum vapour. Then we obtained the sensitivity of 0.99, the value of pc/dc of $1.39{\times}10^{7}$, the MAPD of 335mW, and the rise and decay time of 10ms and 9.5ms, respectively.

  • PDF

A Strategy for Environmental Improvement and Internationalization of the IEODO Ocean Research Station's Radiation Observatory (이어도 종합해양과학기지의 복사관측소 환경 개선 및 국제화 추진 전략)

  • LEE, SANG-HO;Zo, Il-SUNG;LEE, KYU-TAE;KIM, BU-YO;JUNG, HYUN-SEOK;RIM, SE-HUN;BYUN, DO-SEONG;LEE, JU-YEONG
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.22 no.3
    • /
    • pp.118-134
    • /
    • 2017
  • The radiation observation data will be used importantly in research field such as climatology, weather, architecture, agro-livestock and marine science. The Ieodo Ocean Research Station (IORS) is regarded as an ideal observatory because its location can minimize the solar radiation reflection from the surrounding background and also the data produced here can serve as a reference data for radiation observation. This station has the potential to emerge as a significant observatory and join a global radiation observation group such as the Baseline Surface Radiation Network (BSRN), if the surrounding of observatory is improved and be equipped with the essential radiation measuring instruments (pyaranometer and pyrheliometer). IORS has observed the solar radiation using a pyranometer since November 2004 and the data from January 1, 2005 to December 31, 2015 were analyzed in this study. During the period of this study, the daily mean solar radiation observed from IORS decreased to $-3.80W/m^2/year$ due to the variation of the sensor response in addition to the natural environment. Since the yellow sand and fine dust from China are of great interest to scientists around the world, it is necessary to establish a basis of global joint response through the radiation data obtained at the Ieodo as well as at Sinan Gageocho and Ongjin Socheongcho Ocean Research Station. So it is an urgent need to improve the observatory surrounding and the accuracy of the observed data.

Current Statues of Phenomics and its Application for Crop Improvement: Imaging Systems for High-throughput Screening (작물육종 효율 극대화를 위한 피노믹스(phenomics) 연구동향: 화상기술을 이용한 식물 표현형 분석을 중심으로)

  • Lee, Seong-Kon;Kwon, Tack-Ryoun;Suh, Eun-Jung;Bae, Shin-Chul
    • Korean Journal of Breeding Science
    • /
    • v.43 no.4
    • /
    • pp.233-240
    • /
    • 2011
  • Food security has been a main global issue due to climate changes and growing world population expected to 9 billion by 2050. While biodiversity is becoming more highlight, breeders are confronting shortage of various genetic materials needed for new variety to tackle food shortage challenge. Though biotechnology is still under debate on potential risk to human and environment, it is considered as one of alternative tools to address food supply issue for its potential to create a number of variations in genetic resource. The new technology, phenomics, is developing to improve efficiency of crop improvement. Phenomics is concerned with the measurement of phenomes which are the physical, morphological, physiological and/or biochemical traits of organisms as they change in response to genetic mutation and environmental influences. It can be served to provide better understanding of phenotypes at whole plant. For last decades, high-throughput screening (HTS) systems have been developed to measure phenomes, rapidly and quantitatively. Imaging technology such as thermal and chlorophyll fluorescence imaging systems is an area of HTS which has been used in agriculture. In this article, we review the current statues of high-throughput screening system in phenomics and its application for crop improvement.

Development of the Filterable Water Sampler System for eDNA Filtering and Performance Evaluation of the System through eDNA Monitoring at Catchment Conduit Intake-Reservoir (eDNA 포집용 채수 필터시스템 개발과 집수매거 취수지 내에서의 성능평가)

  • Kwak, Tae-Soo;Kim, Won-Seok;Lee, Sun Ho;Kwak, Ihn-Sil
    • Korean Journal of Ecology and Environment
    • /
    • v.54 no.4
    • /
    • pp.272-279
    • /
    • 2021
  • A pump-type eDNA filtering system that can control voltage and hydraulic pressure respectively has been developed, and applied a filter case that can filter out without damaging the filter. The filtering performance of the developed system was evaluated by comparing the eDNA concentration with the conventional vacuum-pressured filtering method at the catchment conduit intake reservoir. The developed system was divided into a voltage control (manual pump system) method and a pressure control (automatic pump system) method, and the pressure was measured during filtering and the pressure change of each system was compared. The voltage control method started with 65 [KPa] at the beginning of the filtering, and as the filtering time elapsed, the amount of filtrate accumulated in the filter increased, so the pressure gradually increased. As a result of controlling the pressure control method to maintain a constant pressure according to the designed algorithm, there was a difference in the width of the hydraulic pressure fluctuation during the filtering process according to the feedback time of the hydraulic pressure sensor, and it was confirmed that the pressure was converged to the target pressure. The filtering performance of the developed system was confirmed by measuring the eDNA concentration and comparing the voltage control method and the hydraulic control method with the control group. The voltage control method obtained similar results to the control group, but the hydraulic control method showed lower results than the control group. It is considered that the low eDNA concentration in the hydraulic control method is due to the large pressure deviation during filtering and maintaining a constant pressure during the filtering process. Therefore, rather than maintaining a constant pressure during filtering, it was confirmed that a voltage control method in which the pressure is gradually increased as the filtrate increases with the lapse of filtering time is suitable for collecting eDNA. As a result of comparing the average concentration of eDNA in lentic zone and lotic zone as a control group, it was found to be 96.2 [ng µL-1] and 88.4 [ng µL-1l], respectively. The result of comparing the average concentration of eDNA by the pump method was also high in the lentic zone sample as 90.7 [ng µL-1] and 74.8 [ng µL-1] in the lentic zone and the lotic zone, respectively. The high eDNA concentration in the lentic zone is thought to be due to the influence of microorganisms including the remaining eDNA.

Multi-resolution SAR Image-based Agricultural Reservoir Monitoring (농업용 저수지 모니터링을 위한 다해상도 SAR 영상의 활용)

  • Lee, Seulchan;Jeong, Jaehwan;Oh, Seungcheol;Jeong, Hagyu;Choi, Minha
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_1
    • /
    • pp.497-510
    • /
    • 2022
  • Agricultural reservoirs are essential structures for water supplies during dry period in the Korean peninsula, where water resources are temporally unequally distributed. For efficient water management, systematic and effective monitoring of medium-small reservoirs is required. Synthetic Aperture Radar (SAR) provides a way for continuous monitoring of those, with its capability of all-weather observation. This study aims to evaluate the applicability of SAR in monitoring medium-small reservoirs using Sentinel-1 (10 m resolution) and Capella X-SAR (1 m resolution), at Chari (CR), Galjeon (GJ), Dwitgol (DG) reservoirs located in Ulsan, Korea. Water detected results applying Z fuzzy function-based threshold (Z-thresh) and Chan-vese (CV), an object detection-based segmentation algorithm, are quantitatively evaluated using UAV-detected water boundary (UWB). Accuracy metrics from Z-thresh were 0.87, 0.89, 0.77 (at CR, GJ, DG, respectively) using Sentinel-1 and 0.78, 0.72, 0.81 using Capella, and improvements were observed when CV was applied (Sentinel-1: 0.94, 0.89, 0.84, Capella: 0.92, 0.89, 0.93). Boundaries of the waterbody detected from Capella agreed relatively well with UWB; however, false- and un-detections occurred from speckle noises, due to its high resolution. When masked with optical sensor-based supplementary images, improvements up to 13% were observed. More effective water resource management is expected to be possible with continuous monitoring of available water quantity, when more accurate and precise SAR-based water detection technique is developed.

An Implementation of OTB Extension to Produce TOA and TOC Reflectance of LANDSAT-8 OLI Images and Its Product Verification Using RadCalNet RVUS Data (Landsat-8 OLI 영상정보의 대기 및 지표반사도 산출을 위한 OTB Extension 구현과 RadCalNet RVUS 자료를 이용한 성과검증)

  • Kim, Kwangseob;Lee, Kiwon
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.3
    • /
    • pp.449-461
    • /
    • 2021
  • Analysis Ready Data (ARD) for optical satellite images represents a pre-processed product by applying spectral characteristics and viewing parameters for each sensor. The atmospheric correction is one of the fundamental and complicated topics, which helps to produce Top-of-Atmosphere (TOA) and Top-of-Canopy (TOC) reflectance from multi-spectral image sets. Most remote sensing software provides algorithms or processing schemes dedicated to those corrections of the Landsat-8 OLI sensors. Furthermore, Google Earth Engine (GEE), provides direct access to Landsat reflectance products, USGS-based ARD (USGS-ARD), on the cloud environment. We implemented the Orfeo ToolBox (OTB) atmospheric correction extension, an open-source remote sensing software for manipulating and analyzing high-resolution satellite images. This is the first tool because OTB has not provided calibration modules for any Landsat sensors. Using this extension software, we conducted the absolute atmospheric correction on the Landsat-8 OLI images of Railroad Valley, United States (RVUS) to validate their reflectance products using reflectance data sets of RVUS in the RadCalNet portal. The results showed that the reflectance products using the OTB extension for Landsat revealed a difference by less than 5% compared to RadCalNet RVUS data. In addition, we performed a comparative analysis with reflectance products obtained from other open-source tools such as a QGIS semi-automatic classification plugin and SAGA, besides USGS-ARD products. The reflectance products by the OTB extension showed a high consistency to those of USGS-ARD within the acceptable level in the measurement data range of the RadCalNet RVUS, compared to those of the other two open-source tools. In this study, the verification of the atmospheric calibration processor in OTB extension was carried out, and it proved the application possibility for other satellite sensors in the Compact Advanced Satellite (CAS)-500 or new optical satellites.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.