Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533925
V. Vinothkumar, C. Muniraj
Induction motors are normally used in the industrial environments. Industry has begun to use energy efficient high power rating electrical drives. Multilevel inverter drives have become a solution for energy efficient drives in recent years. There may be probability for occurring of many faults in the multi-level inverter fed induction motor drive due to its complex switching patterns. So it is necessary to identify types of fault and its location in order to improve the reliability of the drives. In this paper presents a new fault diagnosis technique based on discrete wavelet transforms for diode clamped multilevel inverter fed induction motor drives. For demonstrating the proposed method the gate pulse failure fault are considered in the diode clamped multilevel inverter. The complete system is modeled using MATLAB/Simulink. The simulated results are shown to illustrate the effectiveness of the proposed method.
{"title":"Fault diagnosis in diode clamped multilevel inverter drive using wavelet transforms","authors":"V. Vinothkumar, C. Muniraj","doi":"10.1109/ICGHPC.2013.6533925","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533925","url":null,"abstract":"Induction motors are normally used in the industrial environments. Industry has begun to use energy efficient high power rating electrical drives. Multilevel inverter drives have become a solution for energy efficient drives in recent years. There may be probability for occurring of many faults in the multi-level inverter fed induction motor drive due to its complex switching patterns. So it is necessary to identify types of fault and its location in order to improve the reliability of the drives. In this paper presents a new fault diagnosis technique based on discrete wavelet transforms for diode clamped multilevel inverter fed induction motor drives. For demonstrating the proposed method the gate pulse failure fault are considered in the diode clamped multilevel inverter. The complete system is modeled using MATLAB/Simulink. The simulated results are shown to illustrate the effectiveness of the proposed method.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533913
Tomesh Verma, Raj Kumar Sahu
Face recognition has a major impact in security measures which makes it one of the most appealing areas to explore. To perform face recognition, researchers adopt mathematical calculations to develop automatic recognition systems. As a face recognition system has to perform over wide range of database, dimension reduction techniques become a prime requirement to reduce time and increase accuracy. In this paper, face recognition is performed using Principal Component Analysis followed by Linear Discriminant Analysis based dimension reduction techniques. Sequencing of this paper is preprocessing, dimension reduction of training database set by PCA, extraction of features for class separability by LDA and finally testing by nearest mean classification techniques. The proposed method is tested over ORL face database. It is found that recognition rate on this database is 96.35% and hence showing efficiency of the proposed method than previously adopted methods of face recognition systems.
{"title":"PCA-LDA based face recognition system & results comparison by various classification techniques","authors":"Tomesh Verma, Raj Kumar Sahu","doi":"10.1109/ICGHPC.2013.6533913","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533913","url":null,"abstract":"Face recognition has a major impact in security measures which makes it one of the most appealing areas to explore. To perform face recognition, researchers adopt mathematical calculations to develop automatic recognition systems. As a face recognition system has to perform over wide range of database, dimension reduction techniques become a prime requirement to reduce time and increase accuracy. In this paper, face recognition is performed using Principal Component Analysis followed by Linear Discriminant Analysis based dimension reduction techniques. Sequencing of this paper is preprocessing, dimension reduction of training database set by PCA, extraction of features for class separability by LDA and finally testing by nearest mean classification techniques. The proposed method is tested over ORL face database. It is found that recognition rate on this database is 96.35% and hence showing efficiency of the proposed method than previously adopted methods of face recognition systems.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533904
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
This paper presents a new approach for privacy preserving of user data and publishing in cloud storage area. Hybrid authentication technique overcomes the limitations of attackers and general intruders and preserves better utilization of user's confidential data by providing access only to authorized persons. In this proposed technique it is illustrated how this technique used to prevent user secret data attributes kept in digital cloud storage environment. Moreover the proposed system shows a better data privacy preserving utility by users and handling sensitive data during vulnerable attempts and attacks to the cloud storage area.
{"title":"Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/ICGHPC.2013.6533904","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533904","url":null,"abstract":"This paper presents a new approach for privacy preserving of user data and publishing in cloud storage area. Hybrid authentication technique overcomes the limitations of attackers and general intruders and preserves better utilization of user's confidential data by providing access only to authorized persons. In this proposed technique it is illustrated how this technique used to prevent user secret data attributes kept in digital cloud storage environment. Moreover the proposed system shows a better data privacy preserving utility by users and handling sensitive data during vulnerable attempts and attacks to the cloud storage area.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533903
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
The present paper focuses on user data privacy invasion and it is more important in cloud data storage. Numerous approaches and techniques have proposed so for, to preserve the cloud user privacy. This paper introduces a layered framework for preserving secrecy of cloud user and preventing digital data loss, using onion privacy layer, garlic privacy layer. This layered framework prevents the confidential information by multiple encryption of onion and garlic privacy preserving layered approach.
{"title":"A novel framework to prevent privacy breach in cloud data storage area service","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/ICGHPC.2013.6533903","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533903","url":null,"abstract":"The present paper focuses on user data privacy invasion and it is more important in cloud data storage. Numerous approaches and techniques have proposed so for, to preserve the cloud user privacy. This paper introduces a layered framework for preserving secrecy of cloud user and preventing digital data loss, using onion privacy layer, garlic privacy layer. This layered framework prevents the confidential information by multiple encryption of onion and garlic privacy preserving layered approach.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134568765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533905
A. Mary, J. S. Bersiya
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Also an third party auditor for the auditing mechanism.
{"title":"Efficacious applicability of foolproof security and reliable storage services in cloud computing","authors":"A. Mary, J. S. Bersiya","doi":"10.1109/ICGHPC.2013.6533905","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533905","url":null,"abstract":"Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Also an third party auditor for the auditing mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533936
S. Belinsha, A. Raghavendra
Search log records can enhance the quality and delivery of internet information services to the end user. Analysing and exploring the search log can explore the user's behaviour. When these search logs are published it must ensure privacy of the users at the same time it should exhibit better utility. The existing ZEALOUS algorithm uses a two threshold framework to provide probabilistic differential privacy. In the course of providing this level of privacy the search log looses it's utility, as it publishes only frequent items. So an algorithm is proposed to enhance the utility of search log by qualifying the infrequent items while publishing at the same time preserving the stronger level of privacy.
{"title":"Privacy preservation and enhanced utility in search log publishing using improved zealous algorithm","authors":"S. Belinsha, A. Raghavendra","doi":"10.1109/ICGHPC.2013.6533936","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533936","url":null,"abstract":"Search log records can enhance the quality and delivery of internet information services to the end user. Analysing and exploring the search log can explore the user's behaviour. When these search logs are published it must ensure privacy of the users at the same time it should exhibit better utility. The existing ZEALOUS algorithm uses a two threshold framework to provide probabilistic differential privacy. In the course of providing this level of privacy the search log looses it's utility, as it publishes only frequent items. So an algorithm is proposed to enhance the utility of search log by qualifying the infrequent items while publishing at the same time preserving the stronger level of privacy.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533935
P. Joyce, Beryl Princess
Formal specifications have a variety of applications, including testing, maintenance, optimization, refactoring, documentation, and program repair. However, such specifications are difficult for human programmers to produce and verify manually, and existing automatic specification miners that discover two-state temporal properties have prohibitively high false positive rates, Wireless Sensor Networks are usually deployed at unattended or hostile environments. So they are very vulnerable to injecting false data attack. An adversary could compromise a sensor node accesses all stored keying materials and inject false data causing energy wasted in en-route nodes. In this paper, we propose En-Route Filtering Based Batch Verification (EFBV) scheme to find gang injecting false data attack and filter the false data. By batch verification of reports the false data can be identified and filtered easily. With the proposed mechanism, injected bogus data can be early detected and filtered by En-Route sensor nodes. Thus, it can be discover the intruder before it reaches the sink. The proposed EFBV scheme could be effectively saving energy and avoid sink overhead. It also makes possible to thwart the false data even if network contains at least one uncompromised neighboring node. The proposed scheme achieves most energy efficient, the high filtering probability, scalability and reliability, reduce traffic overhead.
{"title":"EFBV: En-Route Filtering Based Batch Verification scheme for false data injection attack in wireless sensor networks","authors":"P. Joyce, Beryl Princess","doi":"10.1109/ICGHPC.2013.6533935","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533935","url":null,"abstract":"Formal specifications have a variety of applications, including testing, maintenance, optimization, refactoring, documentation, and program repair. However, such specifications are difficult for human programmers to produce and verify manually, and existing automatic specification miners that discover two-state temporal properties have prohibitively high false positive rates, Wireless Sensor Networks are usually deployed at unattended or hostile environments. So they are very vulnerable to injecting false data attack. An adversary could compromise a sensor node accesses all stored keying materials and inject false data causing energy wasted in en-route nodes. In this paper, we propose En-Route Filtering Based Batch Verification (EFBV) scheme to find gang injecting false data attack and filter the false data. By batch verification of reports the false data can be identified and filtered easily. With the proposed mechanism, injected bogus data can be early detected and filtered by En-Route sensor nodes. Thus, it can be discover the intruder before it reaches the sink. The proposed EFBV scheme could be effectively saving energy and avoid sink overhead. It also makes possible to thwart the false data even if network contains at least one uncompromised neighboring node. The proposed scheme achieves most energy efficient, the high filtering probability, scalability and reliability, reduce traffic overhead.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533937
J. Anand, A. Jones, T. Sandhya, K. Besna
In recent years, ecological monitoring is given more importance to preserve the various species in the environment. Wildlife monitoring gradually progressed with the developments in Global Positioning System (GPS) and wireless sensor communication. In this paper, a study on our national animal reserves is made and reviewed papers related to animal tracking. Also the paper proposed an efficient monitoring approach for tigers using wireless sensor network based on hotspot algorithm to preserve the wild species. This system can be used by the ecologists to track and monitor various parameter of the wild species to preserve the habitats.
{"title":"Preserving national animal using wireless sensor network based hotspot algorithm","authors":"J. Anand, A. Jones, T. Sandhya, K. Besna","doi":"10.1109/ICGHPC.2013.6533937","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533937","url":null,"abstract":"In recent years, ecological monitoring is given more importance to preserve the various species in the environment. Wildlife monitoring gradually progressed with the developments in Global Positioning System (GPS) and wireless sensor communication. In this paper, a study on our national animal reserves is made and reviewed papers related to animal tracking. Also the paper proposed an efficient monitoring approach for tigers using wireless sensor network based on hotspot algorithm to preserve the wild species. This system can be used by the ecologists to track and monitor various parameter of the wild species to preserve the habitats.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115209067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533929
Y. Krishnan, G. Shobha
Routing protocol is taking a vital role in the modern internet era. A routing protocol determines how the routers communicate with each other to forward the packets by taking the optimal path to travel from a source node to a destination node. In this paper we have explored two eminent protocols namely, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics such as Convergence Time, Jitter, End-to-End delay, Throughput and Packet Loss through the simulated network models. The evaluation results show that EIGRP routing protocol provides a better performance than OSPF routing protocol for real time applications. Through network simulations we have proved that EIGRP is more CPU intensive than OSPF and hence uses a lot of system power. Therefore EIGRP is a greener routing protocol and provides for greener internetworking.
{"title":"Performance analysis of OSPF and EIGRP routing protocols for greener internetworking","authors":"Y. Krishnan, G. Shobha","doi":"10.1109/ICGHPC.2013.6533929","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533929","url":null,"abstract":"Routing protocol is taking a vital role in the modern internet era. A routing protocol determines how the routers communicate with each other to forward the packets by taking the optimal path to travel from a source node to a destination node. In this paper we have explored two eminent protocols namely, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics such as Convergence Time, Jitter, End-to-End delay, Throughput and Packet Loss through the simulated network models. The evaluation results show that EIGRP routing protocol provides a better performance than OSPF routing protocol for real time applications. Through network simulations we have proved that EIGRP is more CPU intensive than OSPF and hence uses a lot of system power. Therefore EIGRP is a greener routing protocol and provides for greener internetworking.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533923
K. Gobinath, S. Mahendran, I. Gnanambal
Multilevel inverter is one of the most recent and popular type of advances in power electronics. It synthesizes desired output voltage waveform from several dc sources used as input for the multilevel inverter. This paper presents the two techniques for improving the quality of the output voltage and efficiency. First, new novel topology for multilevel inverter is introduced which reduces the number of switches compared to other for the same level of output voltage. Second, Selective Harmonics Elimination Stepped Waveform (SHESW) method is implemented to eliminate the lower order harmonics. Fundamental switching scheme is used to control the power electronics switches in the inverter. The proposed topology is suitable for any number of levels. When the levels are increased the number of switches used is reduced compared to the conventional cascaded H-bridge multilevel inverter. This paper is particularly focuses on seven level inverter. In the proposed topology only 7 switches were used. The harmonic reduction is achieved by selecting appropriate switching angles. It shows hope to reduce initial cost and complexity hence it is apt for industrial applications. In this paper third and fifth level harmonics have been eliminated. Simulation work is done using the MATLAB software which validates the proposed method and finally THD comparison is presented for analysis.
{"title":"Novel cascaded H-bridge multilevel inverter with harmonics elimination","authors":"K. Gobinath, S. Mahendran, I. Gnanambal","doi":"10.1109/ICGHPC.2013.6533923","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533923","url":null,"abstract":"Multilevel inverter is one of the most recent and popular type of advances in power electronics. It synthesizes desired output voltage waveform from several dc sources used as input for the multilevel inverter. This paper presents the two techniques for improving the quality of the output voltage and efficiency. First, new novel topology for multilevel inverter is introduced which reduces the number of switches compared to other for the same level of output voltage. Second, Selective Harmonics Elimination Stepped Waveform (SHESW) method is implemented to eliminate the lower order harmonics. Fundamental switching scheme is used to control the power electronics switches in the inverter. The proposed topology is suitable for any number of levels. When the levels are increased the number of switches used is reduced compared to the conventional cascaded H-bridge multilevel inverter. This paper is particularly focuses on seven level inverter. In the proposed topology only 7 switches were used. The harmonic reduction is achieved by selecting appropriate switching angles. It shows hope to reduce initial cost and complexity hence it is apt for industrial applications. In this paper third and fifth level harmonics have been eliminated. Simulation work is done using the MATLAB software which validates the proposed method and finally THD comparison is presented for analysis.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}