Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368862
I. Karimov, S. Jafarova, M. Zeynalli, S. Rustamov, A. Adamov, Aslan Babakhanov
This research paper examines the full lifecycle of the case of turning the gas and oil industry to a data-driven operation model. The study presents the approach of re-engineering production data, building a predictive model for temperature forecast, statistical analysis, and visualization of Distributed Temperature Sensing (DTS) data provided by the oil-gas industry. For better analysis, the raw data have been pre-processed and organized according to the proper model. Furthermore, after the data organization, we proceed with observing relationships among three features (Date, Depth and Temperature), analyze vague upheavals and similarities utilizing plot histograms, scatterplots, box plots, heatmaps, violin plots for better visualization. Since the drastic temperature change indicates the anomaly, several alternative Outlier Detection Techniques are offered to predict early equipment failure and prevent production outage. Our results indicated a high correlation between depth and temperature, presence of trend in temperature distribution, and temperature drops in specific ranges. Proper analysis of the data allows the specialist to understand reservoir performance and prolong the production file of the wells.
{"title":"Transformation, Analysis and Visualization of Distributed Temperature Sensing Data generated by Oil Wells","authors":"I. Karimov, S. Jafarova, M. Zeynalli, S. Rustamov, A. Adamov, Aslan Babakhanov","doi":"10.1109/AICT50176.2020.9368862","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368862","url":null,"abstract":"This research paper examines the full lifecycle of the case of turning the gas and oil industry to a data-driven operation model. The study presents the approach of re-engineering production data, building a predictive model for temperature forecast, statistical analysis, and visualization of Distributed Temperature Sensing (DTS) data provided by the oil-gas industry. For better analysis, the raw data have been pre-processed and organized according to the proper model. Furthermore, after the data organization, we proceed with observing relationships among three features (Date, Depth and Temperature), analyze vague upheavals and similarities utilizing plot histograms, scatterplots, box plots, heatmaps, violin plots for better visualization. Since the drastic temperature change indicates the anomaly, several alternative Outlier Detection Techniques are offered to predict early equipment failure and prevent production outage. Our results indicated a high correlation between depth and temperature, presence of trend in temperature distribution, and temperature drops in specific ranges. Proper analysis of the data allows the specialist to understand reservoir performance and prolong the production file of the wells.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368866
Z. Yuldashev, A. Nemirko, D. Ripka
Detection algorithm of the ventricular late potentials using surface ECG signal for the diagnostics of abnormal electrical excitation of ventricular myocardium is developed, ventricular late potentials indicators reflecting the area size and degree of the ventricular excitation abnormality, verification method of abnormality detection using intracardial electrograms are suggested.
{"title":"Algorithm for the Abnormal Ventricular Electrical Excitation Detection","authors":"Z. Yuldashev, A. Nemirko, D. Ripka","doi":"10.1109/AICT50176.2020.9368866","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368866","url":null,"abstract":"Detection algorithm of the ventricular late potentials using surface ECG signal for the diagnostics of abnormal electrical excitation of ventricular myocardium is developed, ventricular late potentials indicators reflecting the area size and degree of the ventricular excitation abnormality, verification method of abnormality detection using intracardial electrograms are suggested.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368575
Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim
Flying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.
{"title":"Flying Ad hoc Network Expedited by DTN Scenario: Reliable and Cost-effective MAC Protocols Perspective","authors":"Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim","doi":"10.1109/AICT50176.2020.9368575","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368575","url":null,"abstract":"Flying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368675
M. Farkhadov, N. Petukhova, Mukhabbat Farkhadova
This paper proposes a computerized audio simulator to teach how to correctly pronounce sounds, syllables, and words of the Russian language; the simulator is based on automatic speech recognition systems. The sound and speech simulator is designed to help hearing-impaired people to learn how to correctly pronounce sounds. If we deploy such a service on the Internet and provide high-speed online access to the service, we significantly increase the number of people who can learn how to pronounce sounds.
{"title":"Web-based Sound and Speech Training Software to Help Hearing-impaired People","authors":"M. Farkhadov, N. Petukhova, Mukhabbat Farkhadova","doi":"10.1109/AICT50176.2020.9368675","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368675","url":null,"abstract":"This paper proposes a computerized audio simulator to teach how to correctly pronounce sounds, syllables, and words of the Russian language; the simulator is based on automatic speech recognition systems. The sound and speech simulator is designed to help hearing-impaired people to learn how to correctly pronounce sounds. If we deploy such a service on the Internet and provide high-speed online access to the service, we significantly increase the number of people who can learn how to pronounce sounds.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368828
K. Izrailov, A. Chechulin, L. Vitkova
The concept of a Smart City is the forefront in the development of our near future. One of the most important parts of such cities is the transport infrastructure. Threats implementation for such infrastructure can have critical consequences for a city. To prevent such threats in the future we should investigate and counteraction them in the present. The first step in this way can be the creation of a threats classification for the transport infrastructure of a Smart City. The paper describes a set of methods that can be used for this. As a result, a scheme for categorical and cluster classifications creation is proposed. The categorical classification relies on the division of categories for elements grouping. The cluster one uses machine learning methods for elements grouping. Examples of classifications applying for the top-10 threats from the official state database are given.
{"title":"Threats Classification Method for the Transport Infrastructure of a Smart City","authors":"K. Izrailov, A. Chechulin, L. Vitkova","doi":"10.1109/AICT50176.2020.9368828","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368828","url":null,"abstract":"The concept of a Smart City is the forefront in the development of our near future. One of the most important parts of such cities is the transport infrastructure. Threats implementation for such infrastructure can have critical consequences for a city. To prevent such threats in the future we should investigate and counteraction them in the present. The first step in this way can be the creation of a threats classification for the transport infrastructure of a Smart City. The paper describes a set of methods that can be used for this. As a result, a scheme for categorical and cluster classifications creation is proposed. The categorical classification relies on the division of categories for elements grouping. The cluster one uses machine learning methods for elements grouping. Examples of classifications applying for the top-10 threats from the official state database are given.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes an approach to the classification of network anomalies and provides a description of the relationship of anomalies classified due to the occurrence and nature of changes in network traffic. A scheme for detecting network anomalies and abuses based on network traffic indicators also models for identifying and detecting network anomalies are presented.
{"title":"Improvement the schemes and models of detecting network traffic anomalies on computer systems","authors":"Yusupov Sabirjan Yusupdjanovich, Gulomov Sherzod Rajaboevich","doi":"10.1109/AICT50176.2020.9368781","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368781","url":null,"abstract":"This paper proposes an approach to the classification of network anomalies and provides a description of the relationship of anomalies classified due to the occurrence and nature of changes in network traffic. A scheme for detecting network anomalies and abuses based on network traffic indicators also models for identifying and detecting network anomalies are presented.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368747
Thaer Thaher, Badie Sartawi
The Artificial Bee Colony (ABC) is a novel nature-inspired metaheuristic optimization algorithm that mimics the behavior of honey bees searching for food sources. The main drawback of ABC, similar to the most of metaheuristics, is the premature convergence (i.e., the earlier stuck into local optima). Recently, the structured population approach, in which the individuals are distributed into multiple sub-populations (called islands), has been widely exploited to maintain the required diversity during the search process and thus reducing the prematurity problem. In this paper, the island model, which is a common structured population approach, is incorporated with the ABC to introduce a parallel variant called (iABC). Besides, an experimental design approach is proposed to analyze the sensitivity of iABC to the parameters of the island model as well as the main specific parameters. The linear regression model and the Analysis of variance (ANOVA) are utilized to estimate the effect of parameters and identify the importance of them. Two well-known benchmark functions are used for evaluation purposes. Experimental results revealed that most parameters and their low-order interactions have a significant influence on the performance of the iABC. Furthermore, the proposed iABC proved its superiority compared to other state-of-the-art algorithms.
{"title":"An Experimental Design Approach to Analyse the Performance of Island-Based Parallel Artificial Bee Colony Algorithm","authors":"Thaer Thaher, Badie Sartawi","doi":"10.1109/AICT50176.2020.9368747","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368747","url":null,"abstract":"The Artificial Bee Colony (ABC) is a novel nature-inspired metaheuristic optimization algorithm that mimics the behavior of honey bees searching for food sources. The main drawback of ABC, similar to the most of metaheuristics, is the premature convergence (i.e., the earlier stuck into local optima). Recently, the structured population approach, in which the individuals are distributed into multiple sub-populations (called islands), has been widely exploited to maintain the required diversity during the search process and thus reducing the prematurity problem. In this paper, the island model, which is a common structured population approach, is incorporated with the ABC to introduce a parallel variant called (iABC). Besides, an experimental design approach is proposed to analyze the sensitivity of iABC to the parameters of the island model as well as the main specific parameters. The linear regression model and the Analysis of variance (ANOVA) are utilized to estimate the effect of parameters and identify the importance of them. Two well-known benchmark functions are used for evaluation purposes. Experimental results revealed that most parameters and their low-order interactions have a significant influence on the performance of the iABC. Furthermore, the proposed iABC proved its superiority compared to other state-of-the-art algorithms.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368689
K. Nisar, A. Mu'azu, Ibrahim A. Lawal, Sohrab Khan, Shuaib K. Memon
It has proven that to provide priority to different traffic types in wireless vehicular networking (VANET) is attracting wide attention for guaranteeing high quality real-time traffic routing. Choosing a reliable and stable route with Quality of Service (QoS) constraints is always a challenging task because of the high mobility in VANET. This paper proposes an approach that prioritizes the transmission of traffic data packet according to the transmission distance and urgency metrics of messages before making a selection of routes. The approach utilizes a priority classifying a mechanism to differentiate traffic information into various priorities imposed in the VANET communications. The performance of the proposed approach was simulated extensively using NCTUns simulator in terms of throughput, packet loss and delay. The results obtained show efficient solutions on the impact of mobility for the prioritized flows in enhancing safety messaging. This approach makes safety messages to be transmitted with high reliability and low delay as compared to non-prioritized traffic flows.
{"title":"Reliable Priority Based QoS Real-Time Traffic Routing in VANET: Open Issues & Parameter","authors":"K. Nisar, A. Mu'azu, Ibrahim A. Lawal, Sohrab Khan, Shuaib K. Memon","doi":"10.1109/AICT50176.2020.9368689","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368689","url":null,"abstract":"It has proven that to provide priority to different traffic types in wireless vehicular networking (VANET) is attracting wide attention for guaranteeing high quality real-time traffic routing. Choosing a reliable and stable route with Quality of Service (QoS) constraints is always a challenging task because of the high mobility in VANET. This paper proposes an approach that prioritizes the transmission of traffic data packet according to the transmission distance and urgency metrics of messages before making a selection of routes. The approach utilizes a priority classifying a mechanism to differentiate traffic information into various priorities imposed in the VANET communications. The performance of the proposed approach was simulated extensively using NCTUns simulator in terms of throughput, packet loss and delay. The results obtained show efficient solutions on the impact of mobility for the prioritized flows in enhancing safety messaging. This approach makes safety messages to be transmitted with high reliability and low delay as compared to non-prioritized traffic flows.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368576
M. Farkhadov, Aleksander Eliseev, N. Petukhova
Artificial intelligence-based medical systems can by now diagnose various disorders highly accurately. However, we should stress that despite encouraging and ever improving results, people still distrust such systems. We review relevant publications over the past five years, to identify the main causes of such mistrust and ways to overcome it. Our study showes that the main reasons to distrust these systems are opaque models, blackbox algorithms, and potentially unrepresentful training samples. We demonstrate that explainable artificial intelligence, aimed to create more user-friendly and understandable systems, has become a noticeable new topic in theoretical research and practical development. Another notable trend is to develop approaches to build hybrid systems, where artificial and human intelligence interact according to the teamwork model.
{"title":"Explained Artificial Intelligence Helps to Integrate Artificial and Human Intelligence Into Medical Diagnostic Systems: Analytical Review of Publications","authors":"M. Farkhadov, Aleksander Eliseev, N. Petukhova","doi":"10.1109/AICT50176.2020.9368576","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368576","url":null,"abstract":"Artificial intelligence-based medical systems can by now diagnose various disorders highly accurately. However, we should stress that despite encouraging and ever improving results, people still distrust such systems. We review relevant publications over the past five years, to identify the main causes of such mistrust and ways to overcome it. Our study showes that the main reasons to distrust these systems are opaque models, blackbox algorithms, and potentially unrepresentful training samples. We demonstrate that explainable artificial intelligence, aimed to create more user-friendly and understandable systems, has become a noticeable new topic in theoretical research and practical development. Another notable trend is to develop approaches to build hybrid systems, where artificial and human intelligence interact according to the teamwork model.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133692436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-07DOI: 10.1109/AICT50176.2020.9368580
Fahiba Farhin, M. S. Kaiser, M. Mahmud
The Internet of Healthcare Things (IoHT) is an emerging intelligent pervasive framework that interconnects smart healthcare devices, stakeholders (e.g., doctors, patients, researchers, healthcare professionals, etc.), and infrastructure using smart sensors. Emergence of novel tools and techniques for data sensing and analysis during the last decade have allowed many researchers to develop and deliver services tailored for the IoHT. This resulted in a considerable number of research outcomes addressing the applications, challenges, and probable solutions targeting secured communication within the IoHT framework. Despite considerable efforts dedicated to it, secured service provisioning still remains as a major challenge. This work provides a detailed account on the current challenges and solutions towards providing secured service provisioning focusing on the IoHT attacks and countermeasures with an aim to facilitate more investigation in this area.
{"title":"Towards Secured Service Provisioning for the Internet of Healthcare Things","authors":"Fahiba Farhin, M. S. Kaiser, M. Mahmud","doi":"10.1109/AICT50176.2020.9368580","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368580","url":null,"abstract":"The Internet of Healthcare Things (IoHT) is an emerging intelligent pervasive framework that interconnects smart healthcare devices, stakeholders (e.g., doctors, patients, researchers, healthcare professionals, etc.), and infrastructure using smart sensors. Emergence of novel tools and techniques for data sensing and analysis during the last decade have allowed many researchers to develop and deliver services tailored for the IoHT. This resulted in a considerable number of research outcomes addressing the applications, challenges, and probable solutions targeting secured communication within the IoHT framework. Despite considerable efforts dedicated to it, secured service provisioning still remains as a major challenge. This work provides a detailed account on the current challenges and solutions towards providing secured service provisioning focusing on the IoHT attacks and countermeasures with an aim to facilitate more investigation in this area.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117314004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}