Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society of Computer and Information
Journal Basic Information
Journal DOI :
Korean Society of Computer Information
Editor in Chief :
Volume & Issues
Volume 20, Issue 12 - Dec 2015
Volume 20, Issue 11 - Nov 2015
Volume 20, Issue 10 - Oct 2015
Volume 20, Issue 9 - Sep 2015
Volume 20, Issue 8 - Aug 2015
Volume 20, Issue 7 - Jul 2015
Volume 20, Issue 6 - Jun 2015
Volume 20, Issue 5 - May 2015
Volume 20, Issue 4 - Apr 2015
Volume 20, Issue 3 - Mar 2015
Volume 20, Issue 2 - Feb 2015
Volume 20, Issue 1 - Jan 2015
Selecting the target year
Implementation and Performance Evaluation of a Video-Equipped Real-Time Fire Detection Method at Different Resolutions using a GPU
Shon, Dong-Koo ; Kim, Cheol-Hong ; Kim, Jong-Myon ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 1~10
DOI : 10.9708/jksci.2015.20.1.001
In this paper, we propose an efficient parallel implementation method of a widely used complex four-stage fire detection algorithm using a graphics processing unit (GPU) to improve the performance of the algorithm and analyze the performance of the parallel implementation method. In addition, we use seven different resolution videos (QVGA, VGA, SVGA, XGA, SXGA+, UXGA, QXGA) as inputs of the four-stage fire detection algorithm. Moreover, we compare the performance of the GPU-based approach with that of the CPU implementation for each different resolution video. Experimental results using five different fire videos with seven different resolutions indicate that the execution time of the proposed GPU implementation outperforms that of the CPU implementation in terms of execution time and takes a 25.11ms per frame for the UXGA resolution video, satisfying real-time processing (30 frames per second, 30fps) of the fire detection algorithm.
Use of Support Vector Machines for Defect Detection of Metal Bellows Welding
Park, Min-Chul ; Byun, Young-Tae ; Kim, Dong-Won ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 11~20
DOI : 10.9708/jksci.2015.20.1.011
Typically welded bellows are checked with human eye and microscope, and then go through leakage test of gas. The proposed system alternates these heuristic techniques using support vector machines. Image procedures in the proposed method can cover the irregularity problem induced from human being. To get easy observation through microscope, 3D display system is also exploited. Experimental results from this automatic measurement show the welding detection is done within one tenth of permitted error range.
Supervised Rank Normalization with Training Sample Selection
Heo, Gyeongyong ; Choi, Hun ; Youn, Joo-Sang ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 21~28
DOI : 10.9708/jksci.2015.20.1.021
Feature normalization as a pre-processing step has been widely used to reduce the effect of different scale in each feature dimension and error rate in classification. Most of the existing normalization methods, however, do not use the class labels of data points and, as a result, do not guarantee the optimality of normalization in classification aspect. A supervised rank normalization method, combination of rank normalization and supervised learning technique, was proposed and demonstrated better result than others. In this paper, another technique, training sample selection, is introduced in supervised feature normalization to reduce classification error more. Training sample selection is a common technique for increasing classification accuracy by removing noisy samples and can be applied in supervised normalization method. Two sample selection measures based on the classes of neighboring samples and the distance to neighboring samples were proposed and both of them showed better results than previous supervised rank normalization method.
A Multi-Agent MicroBlog Behavior based User Preference Profile Construction Approach
Kim, Jee-Hyun ; Cho, Young-Im ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 29~37
DOI : 10.9708/jksci.2015.20.1.029
Nowadays, the user-centric application based web 2.0 has replaced the web 1.0. The users gain and provide information by interactive network applications. As a result, traditional approaches that only extract and analyze users' local document operating behavior and network browsing behavior to build the users' preference profile cannot fully reflect their interests. Therefore this paper proposed a preference analysis and indicating approach based on the users' communication information from MicroBlog, such as reading, forwarding and @ behavior, and using the improved PersonalRank method to analyze the importance of a user to other users in the network and based on the users' communication behavior to update the weight of the items in the user preference. Simulation result shows that our proposed method outperforms the ontology model, TREC model, and the category model in terms of 11SPR value.
Problems of Korean Mural Villages and Ways to Make Use of Digital Contents
Eum, Yeong-Cheol ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 39~48
DOI : 10.9708/jksci.2015.20.1.039
In this research the problems and ways to improve the three mural villages and how to make use of digital contents have been sought. Three ways of solutions were searched for the problems. Firstly, The geographical and cultural advantages of the villages were not in practical use, so in long term, making proper brands of the villages is recommended. Secondly, most of the paintings are wall paintings. So in the aspects of esthetics, more wall paintings are encouraged to be made with ceramic works. Lastly, there should be various festivals in connection with the villages. Various smart phone applications should be prepared for easier use of digital contents such as sights, foods, and accommodation, Mural villages have become one of attractions for both local and foreign tourists. More tourists should feel free to visit the mural villages.
Development of Augmented Reality Tool for Architectural Design
Ryu, Jae-Ho ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 49~62
DOI : 10.9708/jksci.2015.20.1.049
In this study we have proposed the prototype of design support device for architectural design assessment using the building information modeling(BIM) data and the augmented reality(AR) technology. The proposed system consists of novel hardware composition with the transparent display, the mock-up model and the digital architectural model in the new shape of frame. The removal of background and the correction of viewer point in the capture video are proposed in order to use the transparent display in AR application. The BIM data formats are reviewed to be converted for using in AR application. Also the proposed system can be expanded to multi-user collaboration system from two user system through the suggested hardware and software compositions. The results of this study will be applied to use the mock-up model and digital architectural model in order to carry out the design assessment process efficiently and economically in the architectural design field.
A quality improvement scheme of magnified image using effectively the various curved surface characteristics of Image
Jung, Soo-Mok ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 63~73
DOI : 10.9708/jksci.2015.20.1.063
In this paper, a quality improvement scheme is proposed for magnified image using the various curved surface characteristics of image. After testing horizontal and vertical directional surface characteristics of source image, interpolation value is calculated to have the surface characteristics such as simple convex surface, simple concave surface, and compound surface. The calculated interpolation value become the value of the interpolated pixel of magnified image. The calculated interpolation value is closer to the pixel value of real image. So, the quality of the magnified image is improved. The PSNR value of the magnified image using the proposed scheme is larger than the PSNR values of the magnified image using the existing techniques.
A Study on The Correlation Between Ego-state and Five Factor Model for Game Character's Personality
Kim, Mi-Sun ; Ko, Il-Ju ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 75~83
DOI : 10.9708/jksci.2015.20.1.075
As the importance of realistic game character in order to cause the interest of player is increased, it is necessary to develop the character that acts like a man by applying the human characteristics in the step of game character design. Formerly, there is a limit to create the human-like character because there is no set the character's personality in the game developing level. In this paper, therefore, we propose the correlation between Five Factor Model and Ego-state for game character. Five Factor Model and Ego-state are theories about person's characteristic. Five Factor Model is personality description method. Ego-state has an emphasis on internal mental processes directly from observable behaviors. In this regard, these theories could be used to the character defined its personality and designed to act by personality. To do this, it needs to determine the relations between Five Factor Model and Ego-state. Therefore we seek for the relations between two theories using Adjective Check List(ACL) and analysis their results with surveys. In the future, it is expected to construct a personality model using these analysis results, and develop the character based on realistic behavior.
Design of Heuristics Using Vertex Information in a Grid-based Map
Kim, Ji-Hyui ; Jung, Ye-Won ; Yu, Kyeon-Ah ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 85~92
DOI : 10.9708/jksci.2015.20.1.085
As computer game maps get more elaborate, path-finding by using
algorithm in grid-based game maps becomes bottlenecks of the overall game performance. It is because the search space becomes large as the number of nodes increases with detailed representation in cells. In this paper we propose an efficient pathfinding method in which the computer game maps in a regular grid is converted into the polygon-based representation of the list of vertices and then the visibility information about vertices of polygons can be utilized. The conversion to the polygon-based map does not give any effect to the real-time query process because it is preprocessed offline. The number of visited nodes during search can be reduced dramatically by designing heuristics using visibility information of vertices that make the accuracy of the estimation enhanced. Through simulations, we show that the proposed methods reduce the search space and the search time effectively while maintaining the advantages of the grid-based method.
A study to Predictive modeling of crime using Web traffic information
Park, Jung-Min ; Chung, Young-Suk ; Park, Koo-Rack ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 93~101
DOI : 10.9708/jksci.2015.20.1.093
In modern society, various crimes is occurred. It is necessary to predict the criminal in order to prevent crimes, various studies on the prediction of crime is in progress. Crime-related data, is announced to the statistical processing of once a year from the Public Prosecutor's Office. However, relative to the current point in time, data that has been statistical processing is a data of about two years ago. It does not fit to the data of the crime currently being generated. In This paper, crime prediction data was apply with Naver trend data. By using the Web traffic Naver trend, it is possible to obtain the data of interest level for crime currently being generated. It was constructed a modeling that can predict the crime by using traffic data of the Naver web search. There have been applied to Markov chains prediction theory. Among various crimes, murder, arson, rape, predictive modeling was applied to target. And the result of predictive modeling value was analyzed. As a result, it got the same results within 20%, based on the value of crime that actually occurred. In the future, it plan to advance research for the predictive modeling of crime that takes into the characteristics of the season.
Edge Restoration in Blurred Image using 1/4 Selective Filter
Jeong, Woo-Jin ; Lee, Jong-Min ; Kim, Chaeyoung ; Moon, Young-Shik ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 103~110
DOI : 10.9708/jksci.2015.20.1.103
In this paper, we propose a deblurring method using 1/4 selective filter. Deblurring methods require a lot of processing time for deblurring. In order to enhance execution speed, we propose a novel 1/4 selective filter. The proposed 1/4 selective filter restores major edge, but it distorts minor edge and texture. To solve this problem, we apply 1/4 selective filter to restore major edge and DOG(Difference of Gaussian) filter to restore minor edge and texture. Experimental results show that the proposed method removes the blur effectively.
Independent Set Bin Packing Algorithm for Routing and Wavelength Assignment (RWA) Problem
Lee, Sang-Un ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 111~118
DOI : 10.9708/jksci.2015.20.1.111
This paper deals with the routing and wavelength assignment problem (RWAP) that decides the best lightpaths for multiple packet demands for (s,t) in optical communication and assigns the minimum number of wavelengths to given lightpaths. There has been unknown of polynomial-time algorithm to obtain the optimal solution for RWAP. Hence, the RWAP is classified as NP-complete problem and one can obtain the approximate solution in polynomial-time. This paper decides the shortest main and alternate lightpath with same hop count for all (s,t) for given network in advance. When the actual demands of communication for particular multiple packet for (s,t), we decrease the maximum utilized edge into b utilized number using these dual-paths. Then, we put these (s,t) into b-wavelength bins without duplicated edge. This algorithm can be get the optimal solution within O(kn) computational complexity. For two experimental data, the proposed algorithm shows that can be obtain the known optimal solution.
Password-based user authentication scheme using a dual-display method
Yong, Seung-Lim ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 119~125
DOI : 10.9708/jksci.2015.20.1.119
In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. The proposed method is a numeric password input method such as a conventional PIN method. One of the buttons, numbers and colors, so as to display the two pieces of information to double. The user can select one of the colors or numbers within one button to type in the password. Because an attacker does not know whether the user has entered any color and number, the proposed technique is safe from the SSA. Also to be secure for smudge attacks and password guessing attacks through random changes in the number and color information.
Space Syntax-based Application to Recommend Paths for Female's Safe Leisure Life
Lim, Won-Jun ; Lee, Kang-Hee ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 127~135
DOI : 10.9708/jksci.2015.20.1.127
In this paper, we propose and implement an application that recommends safe paths for outdoor leisure activity of women based on Space Syntax theory. Compared to general navigation systems which focuses on the shortest time or the shortest distance, the proposed application makes safe paths the first priority. It generates path recommendation with regard to accessibility of travel time and correlation of regions and considers various risk factors for searching for the safest path. Concludingly, the employed Space Syntax algorithm enables the women users to select their own customized paths.
A study of determination probability function to the hidden inheritance in SR DEVS
Park, Sang-Joon ; Lee, Jong-Chan ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 137~142
DOI : 10.9708/jksci.2015.20.1.137
In the object inheritance of SR DEVS, partial or overall asset inheritance can be possible. To a asset inherited from parent object, by respective dedicated function a child object can implement partial or whole asset, or not. Even though a child has a inherited asset, if the asset is the hidden property its implementation will not be provided. A inherited asset cannot be showed in whole asset implementation, or it can be implemented by special system state. Here, the whole asset implementation means may include time parameter. In this paper, we describe a determination probability scheme for partial or whole asset inherited from the parent object to determine the hidden inheritance. By the determination probability function it is decided that the inherited asset will be hidden or normal asset.
A Framework of User Authentication for Financial Transaction based Multi-Biometrics in Mobile Environments
Han, Seung-Jin ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 143~151
DOI : 10.9708/jksci.2015.20.1.143
Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. Therefore, the existing single modality with single biometrics is critical when it expose. However in this paper, we use a multi-modality and multi-biometrics to authenticate between users and TTP or between users and financial institutions. Thereby, we propose a more reliable method and compared this paper with existed methods about security and performance in this paper.
A New Locomotor Evaluation System for Mouses Based on Continuous Shooting Images
Kwak, Ho-Young ; Huh, Jisoon ; Lee, Won Joo ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 153~161
DOI : 10.9708/jksci.2015.20.1.153
In this paper, we propose a locomotor evaluation System for mouse based on continuous shooting images. In the field of veterinary medicine and animal studies are subjected to using the mouse for the quality of human life. In particular, during the experiments using the artificially created mice injury, through a variety of scoring and a lot of experiments to measure the extent of recovery from the injury. The traditional method of measuring the quantity of exercise while in this experiment was made of a method for directly observing person. The proposed system performs the continuous shooting per unit of time specified by the movement of the mouse is extracted from a continuous image shooting with the outline of a mouse point cloud. And using the extracted point cloud to extract again the inner contour of the body of the mouse. So using the new point cloud obtained its center, Then, using the center point calculated by accumulating the distance between two points on locomotor evaluation system design and implement to obtain the total distance the mouse moves over a unit of time.
Optimal Inventory Level of Bicycle Sharing Service Considering Operation Costs
Kim, Jin-Sik ; Lee, Chul-Ung ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 163~173
DOI : 10.9708/jksci.2015.20.1.163
In this paper, it shows optimal inventory level of bicycle sharing service terminal by maintaining the lowest costs. As the interest to environment and exhaustion of resource increases globally, investment to sustainable transportation increases around advanced countries and interest to efficient transportation, managing and consuming of vehicle increases also. Vehicle sharing service is a model of rental car where customer rent cars for short periods of time often by the hour and its users are increasing for the reason that it is more convenient than car rent. In addition, bicycle sharing service is one of the major parts in vehicle sharing program and many of country are already managing it. This paper proposes optimal inventory levels of vehicle sharing service's terminal by using simulation calculating operation costs of vehicle sharing service.
A Study on Customized Employment Strategy for Utilizing Big Data
Koo, Gun-Seo ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 175~183
DOI : 10.9708/jksci.2015.20.1.175
In this paper, we propose a analyses the big data of students who are willing to find employment and thus presents strategy for their higher success rate of employment. The experiment covered in this paper is based on female two-year community college students who are yet unsure about their future employment. The primary flaw of pervious employment strategy was job opportunity was only based on simple factors such as student's grade, appearance, and personality due to employers and firms's demand. Therefore, students were less satisfied and often resign. In order to prevent these failures, this paper plans a strategy by analyzing the big data. Furthermore, this is proven by the comparison between 2014 employment statistics and those of previous years, and employment request has been 21.3 percent increased along with 81.4 percent increase in match rate between firms and graduating students. Most importantly, the final success rate of employment presented 63.1 percent increase compared to the previous year.
An Improvement of Hospital Reception System using Web Socket
Son, Man-Geun ; Park, Ki-Seong ; Kong, Yong-Hae ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 185~195
DOI : 10.9708/jksci.2015.20.1.185
During hospital peak times of outpatients, an effective mechanism that informs the newly receipted patient information to corresponding medical departments is lacking in current hospital reception systems. Since every department repeatedly searches entire patient reception database in sequential manner to acquire its reception information, this is a significant performance degradation factor in hospital information system. To improve hospital reception system efficiency, we developed two web socket based systems, a primary key transmitting batch system and a reception information transmitting real time system. The former reduced database access time compared to sequential search system as well as kept search time low regardless of receipted patient number. The latter effectively reduced waiting list updating time in request/response patient reception system by eliminating database access.
A Metrics Set for Measuring Software Module Severity
Hong, Euy-Seok ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 197~206
DOI : 10.9708/jksci.2015.20.1.197
Defect severity that is a measure of the impact caused by the defect plays an important role in software quality activities because not all software defects are equal. Earlier studies have concentrated on defining defect severity levels, but there have almost never been trials of measuring module severity. In this paper, first, we define a defect severity metric in the form of an exponential function using the characteristics that defect severity values increase much faster than severity levels. Then we define a new metrics set for software module severity using the number of defects in a module and their defect severity metric values. In order to show the applicability of the proposed metrics, we performed an analytical validation using Weyuker's properties and experimental validation using NASA open data sets. The results show that ms is very useful for measuring the module severity and msd can be used to compare different systems in terms of module severity.
Rule-Based Engine to support Warships' Text Communication
Kim, Gyu-Hwan ; Lee, Sang-Hoon ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 207~216
DOI : 10.9708/jksci.2015.20.1.207
The development of IT technology has brought many changes in military operations. For example, the way of transmitting and receiving information from one another has changed. Partiicularly, in the case of the ROK Navy, they utilize encrypted real-time chattig over wire wireless network in operations and tranings. However, text communication is being utilized more in exanging of simple informations, and not for the partical informations required in the operations and exercises, doctrines and guidebooks are still being used in these cases. Therefore, I have designed a rule-based engine which can provide real-time informations by linking ECA rules to text communication, and it has been verified by running virtual scenarios. As a rusult, this engine showed an accuracy of 83%.
The effects of Perceived Organizational Support on Job Commitment and Organizational Citizenship
Lee, Hong-Ki ; Myoung, Sung-Min ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 217~225
DOI : 10.9708/jksci.2015.20.1.217
The purpose of this study is to investigate the influence and effects of perceived organizational support on the organizational citizenship on the basis of perception of the importance of organizational support. In modern society, the perception of perceived organizational support and the manufacturing industry as well have been becoming more important, and, if, besides the manufacturing industry, the interest in the support to and the welfare of the employees could be taken in the service and distribution industries, too, the employees come to realize the organizational support, which causes them to be immersed in their duties and show more organizational citizenship for their organizations and colleagues. Accordingly, in order to enhance the employees' outcome, the organizations should support their employees and provide help more, letting the employees perceive the support of the organization more actively. Consequently, it can be said that the perceived organizational support is able to strengthen the employees' outcome and motivate the organizational citizenship as well.
Maximum Degree Vertex-Based Algorithm for Maximum Clique Problem
Lee, Sang-Un ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 227~235
DOI : 10.9708/jksci.2015.20.1.227
In this paper, I propose a linear time algorithm devised to produce exact solution to NP-complete maximum clique problem. The proposed algorithm firstly, from a given graph G=(V,E), sets vertex
of the maximum degree
as clique's major vertex. It then selects vertex
that are adjacent to
, only to determine
as candidate cliques w and
. Next it obtains
in the descending order. Lastly, the algorithm executes the same procedure on
graph to compare newly attained cliques to previously attained cliques so as to choose the lower. With this simple method, multiple independent cliques would also be attainable. When applied to various regular and irregular graphs, the algorithm proposed in this paper has obtained exact solutions to all the given graphs linear time O(n).
The Estimation of Productivity Considering New Technology Port- Equipment By Using Simulation
Kim, Dong-Won ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 237~246
DOI : 10.9708/jksci.2015.20.1.237
In this paper, Improved productivity models of container terminal are provided by utilizing a simulation considering Tandem-lift Quay Crane and transport vehicle of container's high productivity 'Alternative ship-to-yard vehicles.' Feature of this method is deriving the data of tandem-lift Quay Crane and Alternative ship-to-yard vehicles, estimating the productivity model of tandem-lift Quay Crane by using regression analysis. Tandem-lift Quay Crane is equipment of loading and unloading to increase productivity approximately by 2 time existing (single, twin) Quay Crane by dealing with four 20ft containers or two 40ft containers at the same. Alternative ship-to-yard vehicles can transfer containers(4TEU) more than existing Yard Tractor. This paper is deriving the optimal combination showing the highest productivity by using simulation considering Tandem-lift Quay Crane and Alternative ship-to-yard vehicles on container terminals and developing estimating model of productivity by using regression analysis using data of simulation.
A study on the moderation effects of parents and adolescent's communication in the causal relationships between adolescent's stress and juvenile's delinquents
Lim, Guem-Ok ; Kang, Kil-Hyun ; Park, Hwie-Seo ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 247~254
DOI : 10.9708/jksci.2015.20.1.247
This study is to explore the effects of adolescent's stress on juvenile delinquents and the moderating effects of communication between adolescent and the parents. For this study, we sampled and surveyed middle school students. The analytical results are the followings. Juvenile's stress has a significant effects on juvenile's delinquents and the level of communication between juveniles and the parents is an important factor concerned with juvenile's delinquents. This study suggested some policy implications based on this results.
A study on the efficient extraction method of SNS data related to crime risk factor
Lee, Jong-Hoon ; Song, Ki-Sung ; Kang, Jin-A ; Hwang, Jung-Rae ;
Journal of the Korea Society of Computer and Information, volume 20, issue 1, 2015, Pages 255~263
DOI : 10.9708/jksci.2015.20.1.255
In this paper, we suggest a plan to take advantage of the SNS data to proactively identify the information on crime risk factor and to prevent crime. Recently, SNS(Social Network Service) data have been used to build a proactive prevention system in a variety of fields. However, when users are collecting SNS data with simple keyword, the result is contain a large amount of unrelated data. It may possibly accuracy decreases and lead to confusion in the data analysis. So we present a method that can be efficiently extracted by improving the search accuracy through text mining analysis of SNS data.